From 74c5e0a62f71a38aeace5bbde84af2e858e287a9 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 21 Dec 2023 17:24:23 -0600 Subject: [PATCH 001/126] solana: add admin methods + tests --- solana/.gitignore | 10 + solana/.prettierignore | 5 + solana/.prettierrc.json | 14 + solana/Anchor.toml | 127 + solana/Cargo.lock | 2477 ++++++++ solana/Cargo.toml | 27 + solana/Makefile | 45 + solana/README.md | 91 + solana/package-lock.json | 5335 +++++++++++++++++ solana/package.json | 32 + solana/programs/token-router/Cargo.toml | 29 + solana/programs/token-router/README.md | 0 solana/programs/token-router/Xargo.toml | 2 + solana/programs/token-router/src/constants.rs | 10 + solana/programs/token-router/src/error.rs | 164 + solana/programs/token-router/src/lib.rs | 191 + solana/programs/token-router/src/messages.rs | 89 + .../processor/admin/add_router_endpoint.rs | 71 + .../src/processor/admin/initialize.rs | 78 + .../token-router/src/processor/admin/mod.rs | 29 + .../ownership_transfer_request/cancel.rs | 25 + .../ownership_transfer_request/confirm.rs | 29 + .../admin/ownership_transfer_request/mod.rs | 8 + .../ownership_transfer_request/submit.rs | 34 + .../src/processor/admin/set_pause.rs | 26 + .../src/processor/admin/update/mod.rs | 2 + .../processor/admin/update/owner_assistant.rs | 31 + .../processor/complete_transfer_with_relay.rs | 223 + .../token-router/src/processor/mod.rs | 8 + .../src/processor/old_inbound/mod.rs | 150 + .../src/processor/old_inbound/native.rs | 278 + .../src/processor/old_inbound/wrapped.rs | 225 + .../processor/transfer_tokens_with_relay.rs | 291 + .../token-router/src/state/custodian.rs | 29 + solana/programs/token-router/src/state/mod.rs | 8 + .../token-router/src/state/payer_sequence.rs | 27 + .../token-router/src/state/router_endpoint.rs | 18 + .../confirm_ownership_transfer_request.ts | 57 + solana/ts/scripts/create_ata.ts | 52 + solana/ts/scripts/deregister_token.ts | 64 + solana/ts/scripts/helpers/consts.ts | 11 + solana/ts/scripts/helpers/utils.ts | 104 + solana/ts/scripts/initialize.ts | 69 + .../ts/scripts/register_foreign_contracts.ts | 134 + solana/ts/scripts/register_tokens.ts | 110 + solana/ts/scripts/set_pause_for_transfer.ts | 65 + solana/ts/scripts/set_relayer_fees.ts | 102 + .../submit_ownership_transfer_request.ts | 70 + .../test/complete_transfer_with_relay.ts | 161 + .../test/transfer_tokens_with_relay.ts | 122 + solana/ts/scripts/update_fee_assistant.ts | 68 + solana/ts/scripts/update_owner_assistant.ts | 68 + solana/ts/scripts/update_token_info.ts | 134 + solana/ts/src/index.ts | 323 + .../completeNativeTransferWithRelay.ts | 121 + solana/ts/src/instructions/index.ts | 1 + solana/ts/src/state/Custodian.ts | 30 + solana/ts/src/state/PayerSequence.ts | 10 + solana/ts/src/state/RouterEndpoint.ts | 23 + solana/ts/src/state/index.ts | 14 + solana/ts/src/utils.ts | 12 + .../circle/idl/message_transmitter.json | 1099 ++++ .../circle/idl/token_messenger_minter.json | 1451 +++++ solana/ts/src/wormholeCctp/circle/index.ts | 6 + .../MessageTransmitterConfig.ts | 48 + .../circle/messageTransmitter/UsedNonces.ts | 17 + .../circle/messageTransmitter/index.ts | 145 + solana/ts/src/wormholeCctp/circle/messages.ts | 152 + .../RemoteTokenMessenger.ts | 18 + .../circle/tokenMessengerMinter/index.ts | 137 + .../circle/types/message_transmitter.ts | 2193 +++++++ .../circle/types/token_messenger_minter.ts | 2897 +++++++++ solana/ts/src/wormholeCctp/consts.ts | 5 + .../idl/wormhole_cctp_solana.json | 916 +++ solana/ts/src/wormholeCctp/index.ts | 700 +++ solana/ts/src/wormholeCctp/messages.ts | 89 + solana/ts/src/wormholeCctp/state/Custodian.ts | 15 + .../wormholeCctp/state/RegisteredEmitter.ts | 24 + solana/ts/src/wormholeCctp/state/index.ts | 2 + .../types/wormhole_cctp_solana.ts | 1827 ++++++ solana/ts/src/wormholeCctp/wormhole/index.ts | 150 + solana/ts/tests/01__tokenRouter.ts | 1958 ++++++ .../ts/tests/accounts/core_bridge/config.json | 14 + .../accounts/core_bridge/fee_collector.json | 14 + .../accounts/core_bridge/guardian_set_0.json | 14 + .../message_transmitter_config.json | 14 + .../ethereum_remote_token_messenger.json | 14 + .../misconfigured_remote_token_messenger.json | 14 + .../token_messenger.json | 14 + .../token_messenger_minter/token_minter.json | 14 + .../usdc_custody_token.json | 14 + .../usdc_local_token.json | 14 + .../usdc_token_pair.json | 14 + solana/ts/tests/accounts/usdc_mint.json | 14 + .../ts/tests/accounts/usdc_payer_token.json | 14 + .../avalanche_registered_emitter.json | 14 + .../accounts/wormhole_cctp/custodian.json | 14 + .../ethereum_registered_emitter.json | 14 + solana/ts/tests/helpers/consts.ts | 27 + solana/ts/tests/helpers/index.ts | 2 + solana/ts/tests/helpers/utils.ts | 212 + ...bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json | 1 + solana/tsconfig.json | 12 + 103 files changed, 26490 insertions(+) create mode 100644 solana/.gitignore create mode 100644 solana/.prettierignore create mode 100644 solana/.prettierrc.json create mode 100644 solana/Anchor.toml create mode 100644 solana/Cargo.lock create mode 100644 solana/Cargo.toml create mode 100644 solana/Makefile create mode 100644 solana/README.md create mode 100644 solana/package-lock.json create mode 100644 solana/package.json create mode 100644 solana/programs/token-router/Cargo.toml create mode 100644 solana/programs/token-router/README.md create mode 100644 solana/programs/token-router/Xargo.toml create mode 100644 solana/programs/token-router/src/constants.rs create mode 100644 solana/programs/token-router/src/error.rs create mode 100644 solana/programs/token-router/src/lib.rs create mode 100644 solana/programs/token-router/src/messages.rs create mode 100644 solana/programs/token-router/src/processor/admin/add_router_endpoint.rs create mode 100644 solana/programs/token-router/src/processor/admin/initialize.rs create mode 100644 solana/programs/token-router/src/processor/admin/mod.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs create mode 100644 solana/programs/token-router/src/processor/admin/set_pause.rs create mode 100644 solana/programs/token-router/src/processor/admin/update/mod.rs create mode 100644 solana/programs/token-router/src/processor/admin/update/owner_assistant.rs create mode 100644 solana/programs/token-router/src/processor/complete_transfer_with_relay.rs create mode 100644 solana/programs/token-router/src/processor/mod.rs create mode 100644 solana/programs/token-router/src/processor/old_inbound/mod.rs create mode 100644 solana/programs/token-router/src/processor/old_inbound/native.rs create mode 100644 solana/programs/token-router/src/processor/old_inbound/wrapped.rs create mode 100644 solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs create mode 100644 solana/programs/token-router/src/state/custodian.rs create mode 100644 solana/programs/token-router/src/state/mod.rs create mode 100644 solana/programs/token-router/src/state/payer_sequence.rs create mode 100644 solana/programs/token-router/src/state/router_endpoint.rs create mode 100644 solana/ts/scripts/confirm_ownership_transfer_request.ts create mode 100644 solana/ts/scripts/create_ata.ts create mode 100644 solana/ts/scripts/deregister_token.ts create mode 100644 solana/ts/scripts/helpers/consts.ts create mode 100644 solana/ts/scripts/helpers/utils.ts create mode 100644 solana/ts/scripts/initialize.ts create mode 100644 solana/ts/scripts/register_foreign_contracts.ts create mode 100644 solana/ts/scripts/register_tokens.ts create mode 100644 solana/ts/scripts/set_pause_for_transfer.ts create mode 100644 solana/ts/scripts/set_relayer_fees.ts create mode 100644 solana/ts/scripts/submit_ownership_transfer_request.ts create mode 100644 solana/ts/scripts/test/complete_transfer_with_relay.ts create mode 100644 solana/ts/scripts/test/transfer_tokens_with_relay.ts create mode 100644 solana/ts/scripts/update_fee_assistant.ts create mode 100644 solana/ts/scripts/update_owner_assistant.ts create mode 100644 solana/ts/scripts/update_token_info.ts create mode 100644 solana/ts/src/index.ts create mode 100644 solana/ts/src/instructions/completeNativeTransferWithRelay.ts create mode 100644 solana/ts/src/instructions/index.ts create mode 100644 solana/ts/src/state/Custodian.ts create mode 100644 solana/ts/src/state/PayerSequence.ts create mode 100644 solana/ts/src/state/RouterEndpoint.ts create mode 100644 solana/ts/src/state/index.ts create mode 100644 solana/ts/src/utils.ts create mode 100644 solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json create mode 100644 solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json create mode 100644 solana/ts/src/wormholeCctp/circle/index.ts create mode 100644 solana/ts/src/wormholeCctp/circle/messageTransmitter/MessageTransmitterConfig.ts create mode 100644 solana/ts/src/wormholeCctp/circle/messageTransmitter/UsedNonces.ts create mode 100644 solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts create mode 100644 solana/ts/src/wormholeCctp/circle/messages.ts create mode 100644 solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/RemoteTokenMessenger.ts create mode 100644 solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts create mode 100644 solana/ts/src/wormholeCctp/circle/types/message_transmitter.ts create mode 100644 solana/ts/src/wormholeCctp/circle/types/token_messenger_minter.ts create mode 100644 solana/ts/src/wormholeCctp/consts.ts create mode 100644 solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json create mode 100644 solana/ts/src/wormholeCctp/index.ts create mode 100644 solana/ts/src/wormholeCctp/messages.ts create mode 100644 solana/ts/src/wormholeCctp/state/Custodian.ts create mode 100644 solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts create mode 100644 solana/ts/src/wormholeCctp/state/index.ts create mode 100644 solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts create mode 100644 solana/ts/src/wormholeCctp/wormhole/index.ts create mode 100644 solana/ts/tests/01__tokenRouter.ts create mode 100644 solana/ts/tests/accounts/core_bridge/config.json create mode 100644 solana/ts/tests/accounts/core_bridge/fee_collector.json create mode 100644 solana/ts/tests/accounts/core_bridge/guardian_set_0.json create mode 100644 solana/ts/tests/accounts/message_transmitter/message_transmitter_config.json create mode 100644 solana/ts/tests/accounts/token_messenger_minter/ethereum_remote_token_messenger.json create mode 100644 solana/ts/tests/accounts/token_messenger_minter/misconfigured_remote_token_messenger.json create mode 100644 solana/ts/tests/accounts/token_messenger_minter/token_messenger.json create mode 100644 solana/ts/tests/accounts/token_messenger_minter/token_minter.json create mode 100644 solana/ts/tests/accounts/token_messenger_minter/usdc_custody_token.json create mode 100644 solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json create mode 100644 solana/ts/tests/accounts/token_messenger_minter/usdc_token_pair.json create mode 100644 solana/ts/tests/accounts/usdc_mint.json create mode 100644 solana/ts/tests/accounts/usdc_payer_token.json create mode 100644 solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json create mode 100644 solana/ts/tests/accounts/wormhole_cctp/custodian.json create mode 100644 solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json create mode 100644 solana/ts/tests/helpers/consts.ts create mode 100644 solana/ts/tests/helpers/index.ts create mode 100644 solana/ts/tests/helpers/utils.ts create mode 100644 solana/ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json create mode 100644 solana/tsconfig.json diff --git a/solana/.gitignore b/solana/.gitignore new file mode 100644 index 00000000..fa4e2e40 --- /dev/null +++ b/solana/.gitignore @@ -0,0 +1,10 @@ +.DS_Store +.anchor +.env +.private +.vscode +**/*.rs.bk +artifacts-* +node_modules +target +ts/tests/artifacts diff --git a/solana/.prettierignore b/solana/.prettierignore new file mode 100644 index 00000000..602b87c3 --- /dev/null +++ b/solana/.prettierignore @@ -0,0 +1,5 @@ + +.DS_Store +.anchor +node_modules +target diff --git a/solana/.prettierrc.json b/solana/.prettierrc.json new file mode 100644 index 00000000..b0e52c3c --- /dev/null +++ b/solana/.prettierrc.json @@ -0,0 +1,14 @@ +{ + "overrides": [ + { + "files": "*.ts", + "options": { + "printWidth": 100, + "tabWidth": 4, + "useTabs": false, + "singleQuote": false, + "bracketSpacing": true + } + } + ] +} diff --git a/solana/Anchor.toml b/solana/Anchor.toml new file mode 100644 index 00000000..5f847a7f --- /dev/null +++ b/solana/Anchor.toml @@ -0,0 +1,127 @@ +[toolchain] +anchor_version = "0.29.0" # CLI +solana_version = "1.16.16" + +[features] +seeds = false +skip-lint = false + +[workspace] +members = [ + "programs/token-router" +] + +[programs.localnet] +token_router = "TokenRouter11111111111111111111111111111111" + +[registry] +url = "https://api.apr.dev" + +[provider] +cluster = "Localnet" +wallet = "ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json" + +[scripts] +test = "npx ts-mocha -p ./tsconfig.json -t 1000000 ts/tests/[0-9]*.ts" + +[test] +startup_wait = 16000 + +[test.validator] +url = "https://api.devnet.solana.com" + +### Wormhole CCTP Program +[[test.validator.clone]] +address = "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW" + +### Wormhole CCTP PDA -- Custodian +[[test.validator.account]] +address = "2LtnJESn3gEmte4pEBjnTjWX4Npb8esKKPeyWTN6cJP9" +filename = "ts/tests/accounts/wormhole_cctp/custodian.json" + +### Wormhole CCTP PDA -- Registered Emitter (Ethereum) +[[test.validator.account]] +address = "ERX9PQpfrY7rBJJwA62gY5dMeKmxtMRztwMcxdLJ7Eg8" +filename = "ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json" + +### Wormhole CCTP PDA -- Registered Emitter (Avalanche) +[[test.validator.account]] +address = "EaSe23XdXyWsKzmrRkwdpdUEWy4AnU5YZ8SSjQJnpji" +filename = "ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json" + +### Wormhole Core Bridge Program +[[test.validator.clone]] +address = "3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5" + +### Circle Message Transmitter Program +[[test.validator.clone]] +address = "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + +### Circle Token Messenger Minter Program +[[test.validator.clone]] +address = "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + +### Mint -- USDC +[[test.validator.account]] +address = "4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU" +filename = "ts/tests/accounts/usdc_mint.json" + +### Payer Token Account -- USDC +[[test.validator.account]] +address = "6s9vuDVXZsJY1Qp29cFxKgbSmpTH2QWnrjZzPHWmFXCz" +filename = "ts/tests/accounts/usdc_payer_token.json" + +### Circle Token Messenger Minter PDA -- Token Messenger +[[test.validator.account]] +address = "Afgq3BHEfCE7d78D2XE9Bfyu2ieDqvE24xX8KDwreBms" +filename = "ts/tests/accounts/token_messenger_minter/token_messenger.json" + +### Circle Token Messenger Minter PDA -- Token Minter +[[test.validator.account]] +address = "DBD8hAwLDRQkTsu6EqviaYNGKPnsAMmQonxf7AH8ZcFY" +filename = "ts/tests/accounts/token_messenger_minter/token_minter.json" + +### Circle Token Messenger Minter PDA -- USDC Custody Token Account +[[test.validator.account]] +address = "AEfKU8wHGtYgsXpymQ6e1cGHJJeKqCj95pw82iyRUKEs" +filename = "ts/tests/accounts/token_messenger_minter/usdc_custody_token.json" + +### Circle Token Messenger Minter PDA -- USDC Local Token +[[test.validator.account]] +address = "4xt9P42CcMHXAgvemTnzineHp6owfGUcrg1xD9V7mdk1" +filename = "ts/tests/accounts/token_messenger_minter/usdc_local_token.json" + +### Circle Token Messenger Minter PDA -- USDC Token Pair +[[test.validator.account]] +address = "ADcG1d7znq6wR73BJgEh7dR4vTJcETLLyfXMNZjJVwk4" +filename = "ts/tests/accounts/token_messenger_minter/usdc_token_pair.json" + +### Circle Token Messenger Minter PDA -- Ethereum Remote Token Messenger +[[test.validator.account]] +address = "Hazwi3jFQtLKc2ughi7HFXPkpDeso7DQaMR9Ks4afh3j" +filename = "ts/tests/accounts/token_messenger_minter/ethereum_remote_token_messenger.json" + +### Circle Token Messenger Minter PDA -- Base Remote Token Messenger +[[test.validator.account]] +address = "BWyFzH6LsnmDAaDWbGsriQ9SiiKq1CF6pbH4Ye3kzSBV" +filename = "ts/tests/accounts/token_messenger_minter/misconfigured_remote_token_messenger.json" + +### Circle Message Transmitter PDA -- Message Transmitter Config +[[test.validator.account]] +address = "BWrwSWjbikT3H7qHAkUEbLmwDQoB4ZDJ4wcSEhSPTZCu" +filename = "ts/tests/accounts/message_transmitter/message_transmitter_config.json" + +### Wormhole Core Bridge -- Config +[[test.validator.account]] +address = "6bi4JGDoRwUs9TYBuvoA7dUVyikTJDrJsJU1ew6KVLiu" +filename = "ts/tests/accounts/core_bridge/config.json" + +### Wormhole Core Bridge -- Fee Collector +[[test.validator.account]] +address = "7s3a1ycs16d6SNDumaRtjcoyMaTDZPavzgsmS3uUZYWX" +filename = "ts/tests/accounts/core_bridge/fee_collector.json" + +### Wormhole Core Bridge -- Guardian Set 0 +[[test.validator.account]] +address = "dxZtypiKT5D9LYzdPxjvSZER9MgYfeRVU5qpMTMTRs4" +filename = "ts/tests/accounts/core_bridge/guardian_set_0.json" \ No newline at end of file diff --git a/solana/Cargo.lock b/solana/Cargo.lock new file mode 100644 index 00000000..147b74d2 --- /dev/null +++ b/solana/Cargo.lock @@ -0,0 +1,2477 @@ +# This file is automatically @generated by Cargo. +# It is not intended for manual editing. +version = 3 + +[[package]] +name = "aead" +version = "0.4.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b613b8e1e3cf911a086f53f03bf286f52fd7a7258e4fa606f0ef220d39d8877" +dependencies = [ + "generic-array", +] + +[[package]] +name = "aes" +version = "0.7.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9e8b47f52ea9bae42228d07ec09eb676433d7c4ed1ebdf0f1d1c29ed446f1ab8" +dependencies = [ + "cfg-if", + "cipher", + "cpufeatures", + "opaque-debug", +] + +[[package]] +name = "aes-gcm-siv" +version = "0.10.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "589c637f0e68c877bbd59a4599bbe849cac8e5f3e4b5a3ebae8f528cd218dcdc" +dependencies = [ + "aead", + "aes", + "cipher", + "ctr", + "polyval", + "subtle", + "zeroize", +] + +[[package]] +name = "ahash" +version = "0.7.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a824f2aa7e75a0c98c5a504fceb80649e9c35265d44525b5f94de4771a395cd" +dependencies = [ + "getrandom 0.2.11", + "once_cell", + "version_check", +] + +[[package]] +name = "ahash" +version = "0.8.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "91429305e9f0a25f6205c5b8e0d2db09e0708a7a6df0f42212bb56c32c8ac97a" +dependencies = [ + "cfg-if", + "getrandom 0.2.11", + "once_cell", + "version_check", + "zerocopy", +] + +[[package]] +name = "aho-corasick" +version = "1.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b2969dcb958b36655471fc61f7e416fa76033bdd4bfed0678d8fee1e2d07a1f0" +dependencies = [ + "memchr", +] + +[[package]] +name = "anchor-attribute-access-control" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "faa5be5b72abea167f87c868379ba3c2be356bfca9e6f474fd055fa0f7eeb4f2" +dependencies = [ + "anchor-syn", + "anyhow", + "proc-macro2", + "quote", + "regex", + "syn 1.0.109", +] + +[[package]] +name = "anchor-attribute-account" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f468970344c7c9f9d03b4da854fd7c54f21305059f53789d0045c1dd803f0018" +dependencies = [ + "anchor-syn", + "anyhow", + "bs58 0.5.0", + "proc-macro2", + "quote", + "rustversion", + "syn 1.0.109", +] + +[[package]] +name = "anchor-attribute-constant" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "59948e7f9ef8144c2aefb3f32a40c5fce2798baeec765ba038389e82301017ef" +dependencies = [ + "anchor-syn", + "proc-macro2", + "syn 1.0.109", +] + +[[package]] +name = "anchor-attribute-error" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fc753c9d1c7981cb8948cf7e162fb0f64558999c0413058e2d43df1df5448086" +dependencies = [ + "anchor-syn", + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "anchor-attribute-event" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f38b4e172ba1b52078f53fdc9f11e3dc0668ad27997838a0aad2d148afac8c97" +dependencies = [ + "anchor-syn", + "anyhow", + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "anchor-attribute-program" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4eebd21543606ab61e2d83d9da37d24d3886a49f390f9c43a1964735e8c0f0d5" +dependencies = [ + "anchor-syn", + "anyhow", + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "anchor-derive-accounts" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec4720d899b3686396cced9508f23dab420f1308344456ec78ef76f98fda42af" +dependencies = [ + "anchor-syn", + "anyhow", + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "anchor-derive-space" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f495e85480bd96ddeb77b71d499247c7d4e8b501e75ecb234e9ef7ae7bd6552a" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "anchor-lang" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0d2d4b20100f1310a774aba3471ef268e5c4ba4d5c28c0bbe663c2658acbc414" +dependencies = [ + "anchor-attribute-access-control", + "anchor-attribute-account", + "anchor-attribute-constant", + "anchor-attribute-error", + "anchor-attribute-event", + "anchor-attribute-program", + "anchor-derive-accounts", + "anchor-derive-space", + "arrayref", + "base64 0.13.1", + "bincode", + "borsh 0.10.3", + "bytemuck", + "getrandom 0.2.11", + "solana-program", + "thiserror", +] + +[[package]] +name = "anchor-spl" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "78f860599da1c2354e7234c768783049eb42e2f54509ecfc942d2e0076a2da7b" +dependencies = [ + "anchor-lang", + "solana-program", + "spl-associated-token-account", + "spl-token", + "spl-token-2022", +] + +[[package]] +name = "anchor-syn" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a125e4b0cc046cfec58f5aa25038e34cf440151d58f0db3afc55308251fe936d" +dependencies = [ + "anyhow", + "bs58 0.5.0", + "heck", + "proc-macro2", + "quote", + "serde", + "serde_json", + "sha2 0.10.8", + "syn 1.0.109", + "thiserror", +] + +[[package]] +name = "anyhow" +version = "1.0.75" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a4668cab20f66d8d020e1fbc0ebe47217433c1b6c8f2040faf858554e394ace6" + +[[package]] +name = "ark-bn254" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a22f4561524cd949590d78d7d4c5df8f592430d221f7f3c9497bbafd8972120f" +dependencies = [ + "ark-ec", + "ark-ff", + "ark-std", +] + +[[package]] +name = "ark-ec" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "defd9a439d56ac24968cca0571f598a61bc8c55f71d50a89cda591cb750670ba" +dependencies = [ + "ark-ff", + "ark-poly", + "ark-serialize", + "ark-std", + "derivative", + "hashbrown 0.13.2", + "itertools", + "num-traits", + "zeroize", +] + +[[package]] +name = "ark-ff" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec847af850f44ad29048935519032c33da8aa03340876d351dfab5660d2966ba" +dependencies = [ + "ark-ff-asm", + "ark-ff-macros", + "ark-serialize", + "ark-std", + "derivative", + "digest 0.10.7", + "itertools", + "num-bigint", + "num-traits", + "paste", + "rustc_version", + "zeroize", +] + +[[package]] +name = "ark-ff-asm" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3ed4aa4fe255d0bc6d79373f7e31d2ea147bcf486cba1be5ba7ea85abdb92348" +dependencies = [ + "quote", + "syn 1.0.109", +] + +[[package]] +name = "ark-ff-macros" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7abe79b0e4288889c4574159ab790824d0033b9fdcb2a112a3182fac2e514565" +dependencies = [ + "num-bigint", + "num-traits", + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "ark-poly" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d320bfc44ee185d899ccbadfa8bc31aab923ce1558716e1997a1e74057fe86bf" +dependencies = [ + "ark-ff", + "ark-serialize", + "ark-std", + "derivative", + "hashbrown 0.13.2", +] + +[[package]] +name = "ark-serialize" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "adb7b85a02b83d2f22f89bd5cac66c9c89474240cb6207cb1efc16d098e822a5" +dependencies = [ + "ark-serialize-derive", + "ark-std", + "digest 0.10.7", + "num-bigint", +] + +[[package]] +name = "ark-serialize-derive" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ae3281bc6d0fd7e549af32b52511e1302185bd688fd3359fa36423346ff682ea" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "ark-std" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "94893f1e0c6eeab764ade8dc4c0db24caf4fe7cbbaafc0eba0a9030f447b5185" +dependencies = [ + "num-traits", + "rand 0.8.5", +] + +[[package]] +name = "array-bytes" +version = "1.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ad284aeb45c13f2fb4f084de4a420ebf447423bdf9386c0540ce33cb3ef4b8c" + +[[package]] +name = "arrayref" +version = "0.3.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6b4930d2cb77ce62f89ee5d5289b4ac049559b1c45539271f5ed4fdc7db34545" + +[[package]] +name = "arrayvec" +version = "0.7.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "96d30a06541fbafbc7f82ed10c06164cfbd2c401138f6addd8404629c4b16711" + +[[package]] +name = "assert_matches" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9b34d609dfbaf33d6889b2b7106d3ca345eacad44200913df5ba02bfd31d2ba9" + +[[package]] +name = "atty" +version = "0.2.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8" +dependencies = [ + "hermit-abi", + "libc", + "winapi", +] + +[[package]] +name = "autocfg" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d468802bab17cbc0cc575e9b053f41e72aa36bfa6b7f55e3529ffa43161b97fa" + +[[package]] +name = "base64" +version = "0.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff" + +[[package]] +name = "base64" +version = "0.13.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9e1b586273c5702936fe7b7d6896644d8be71e6314cfe09d3167c95f712589e8" + +[[package]] +name = "base64" +version = "0.21.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "35636a1494ede3b646cc98f74f8e62c773a38a659ebc777a2cf26b9b74171df9" + +[[package]] +name = "bincode" +version = "1.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b1f45e9417d87227c7a56d22e471c6206462cba514c7590c09aff4cf6d1ddcad" +dependencies = [ + "serde", +] + +[[package]] +name = "bitflags" +version = "1.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a" + +[[package]] +name = "bitmaps" +version = "2.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "031043d04099746d8db04daf1fa424b2bc8bd69d92b25962dcde24da39ab64a2" +dependencies = [ + "typenum", +] + +[[package]] +name = "blake3" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0231f06152bf547e9c2b5194f247cd97aacf6dcd8b15d8e5ec0663f64580da87" +dependencies = [ + "arrayref", + "arrayvec", + "cc", + "cfg-if", + "constant_time_eq", + "digest 0.10.7", +] + +[[package]] +name = "block-buffer" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4152116fd6e9dadb291ae18fc1ec3575ed6d84c29642d97890f4b4a3417297e4" +dependencies = [ + "block-padding", + "generic-array", +] + +[[package]] +name = "block-buffer" +version = "0.10.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3078c7629b62d3f0439517fa394996acacc5cbc91c5a20d8c658e77abd503a71" +dependencies = [ + "generic-array", +] + +[[package]] +name = "block-padding" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8d696c370c750c948ada61c69a0ee2cbbb9c50b1019ddb86d9317157a99c2cae" + +[[package]] +name = "borsh" +version = "0.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "15bf3650200d8bffa99015595e10f1fbd17de07abbc25bb067da79e769939bfa" +dependencies = [ + "borsh-derive 0.9.3", + "hashbrown 0.11.2", +] + +[[package]] +name = "borsh" +version = "0.10.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4114279215a005bc675e386011e594e1d9b800918cea18fcadadcce864a2046b" +dependencies = [ + "borsh-derive 0.10.3", + "hashbrown 0.13.2", +] + +[[package]] +name = "borsh-derive" +version = "0.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6441c552f230375d18e3cc377677914d2ca2b0d36e52129fe15450a2dce46775" +dependencies = [ + "borsh-derive-internal 0.9.3", + "borsh-schema-derive-internal 0.9.3", + "proc-macro-crate 0.1.5", + "proc-macro2", + "syn 1.0.109", +] + +[[package]] +name = "borsh-derive" +version = "0.10.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0754613691538d51f329cce9af41d7b7ca150bc973056f1156611489475f54f7" +dependencies = [ + "borsh-derive-internal 0.10.3", + "borsh-schema-derive-internal 0.10.3", + "proc-macro-crate 0.1.5", + "proc-macro2", + "syn 1.0.109", +] + +[[package]] +name = "borsh-derive-internal" +version = "0.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5449c28a7b352f2d1e592a8a28bf139bc71afb0764a14f3c02500935d8c44065" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "borsh-derive-internal" +version = "0.10.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "afb438156919598d2c7bad7e1c0adf3d26ed3840dbc010db1a882a65583ca2fb" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "borsh-schema-derive-internal" +version = "0.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cdbd5696d8bfa21d53d9fe39a714a18538bad11492a42d066dbbc395fb1951c0" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "borsh-schema-derive-internal" +version = "0.10.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "634205cc43f74a1b9046ef87c4540ebda95696ec0f315024860cad7c5b0f5ccd" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "bs58" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "771fe0050b883fcc3ea2359b1a96bcfbc090b7116eae7c3c512c7a083fdf23d3" + +[[package]] +name = "bs58" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f5353f36341f7451062466f0b755b96ac3a9547e4d7f6b70d603fc721a7d7896" +dependencies = [ + "tinyvec", +] + +[[package]] +name = "bumpalo" +version = "3.14.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f30e7476521f6f8af1a1c4c0b8cc94f0bee37d91763d0ca2665f299b6cd8aec" + +[[package]] +name = "bv" +version = "0.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8834bb1d8ee5dc048ee3124f2c7c1afcc6bc9aed03f11e9dfd8c69470a5db340" +dependencies = [ + "feature-probe", + "serde", +] + +[[package]] +name = "bytemuck" +version = "1.14.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "374d28ec25809ee0e23827c2ab573d729e293f281dfe393500e7ad618baa61c6" +dependencies = [ + "bytemuck_derive", +] + +[[package]] +name = "bytemuck_derive" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "965ab7eb5f8f97d2a083c799f3a1b994fc397b2fe2da5d1da1626ce15a39f2b1" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.39", +] + +[[package]] +name = "byteorder" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" + +[[package]] +name = "cc" +version = "1.0.83" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f1174fb0b6ec23863f8b971027804a42614e347eafb0a95bf0b12cdae21fc4d0" +dependencies = [ + "jobserver", + "libc", +] + +[[package]] +name = "cfg-if" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd" + +[[package]] +name = "chrono" +version = "0.4.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f2c685bad3eb3d45a01354cedb7d5faa66194d1d58ba6e267a8de788f79db38" +dependencies = [ + "num-traits", +] + +[[package]] +name = "cipher" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7ee52072ec15386f770805afd189a01c8841be8696bed250fa2f13c4c0d6dfb7" +dependencies = [ + "generic-array", +] + +[[package]] +name = "console_error_panic_hook" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a06aeb73f470f66dcdbf7223caeebb85984942f22f1adb2a088cf9668146bbbc" +dependencies = [ + "cfg-if", + "wasm-bindgen", +] + +[[package]] +name = "console_log" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e89f72f65e8501878b8a004d5a1afb780987e2ce2b4532c562e367a72c57499f" +dependencies = [ + "log", + "web-sys", +] + +[[package]] +name = "constant_time_eq" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f7144d30dcf0fafbce74250a3963025d8d52177934239851c917d29f1df280c2" + +[[package]] +name = "cpufeatures" +version = "0.2.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ce420fe07aecd3e67c5f910618fe65e94158f6dcc0adf44e00d69ce2bdfe0fd0" +dependencies = [ + "libc", +] + +[[package]] +name = "crossbeam-deque" +version = "0.8.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ce6fd6f855243022dcecf8702fef0c297d4338e226845fe067f6341ad9fa0cef" +dependencies = [ + "cfg-if", + "crossbeam-epoch", + "crossbeam-utils", +] + +[[package]] +name = "crossbeam-epoch" +version = "0.9.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ae211234986c545741a7dc064309f67ee1e5ad243d0e48335adc0484d960bcc7" +dependencies = [ + "autocfg", + "cfg-if", + "crossbeam-utils", + "memoffset", + "scopeguard", +] + +[[package]] +name = "crossbeam-utils" +version = "0.8.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a22b2d63d4d1dc0b7f1b6b2747dd0088008a9be28b6ddf0b1e7d335e3037294" +dependencies = [ + "cfg-if", +] + +[[package]] +name = "crunchy" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7a81dae078cea95a014a339291cec439d2f232ebe854a9d672b796c6afafa9b7" + +[[package]] +name = "crypto-common" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1bfb12502f3fc46cca1bb51ac28df9d618d813cdc3d2f25b9fe775a34af26bb3" +dependencies = [ + "generic-array", + "typenum", +] + +[[package]] +name = "crypto-mac" +version = "0.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b584a330336237c1eecd3e94266efb216c56ed91225d634cb2991c5f3fd1aeab" +dependencies = [ + "generic-array", + "subtle", +] + +[[package]] +name = "ctr" +version = "0.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "049bb91fb4aaf0e3c7efa6cd5ef877dbbbd15b39dad06d9948de4ec8a75761ea" +dependencies = [ + "cipher", +] + +[[package]] +name = "curve25519-dalek" +version = "3.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "90f9d052967f590a76e62eb387bd0bbb1b000182c3cefe5364db6b7211651bc0" +dependencies = [ + "byteorder", + "digest 0.9.0", + "rand_core 0.5.1", + "serde", + "subtle", + "zeroize", +] + +[[package]] +name = "darling" +version = "0.20.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0209d94da627ab5605dcccf08bb18afa5009cfbef48d8a8b7d7bdbc79be25c5e" +dependencies = [ + "darling_core", + "darling_macro", +] + +[[package]] +name = "darling_core" +version = "0.20.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "177e3443818124b357d8e76f53be906d60937f0d3a90773a664fa63fa253e621" +dependencies = [ + "fnv", + "ident_case", + "proc-macro2", + "quote", + "strsim", + "syn 2.0.39", +] + +[[package]] +name = "darling_macro" +version = "0.20.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "836a9bbc7ad63342d6d6e7b815ccab164bc77a2d95d84bc3117a8c0d5c98e2d5" +dependencies = [ + "darling_core", + "quote", + "syn 2.0.39", +] + +[[package]] +name = "derivation-path" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6e5c37193a1db1d8ed868c03ec7b152175f26160a5b740e5e484143877e0adf0" + +[[package]] +name = "derivative" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fcc3dd5e9e9c0b295d6e1e4d811fb6f157d5ffd784b8d202fc62eac8035a770b" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "digest" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d3dd60d1080a57a05ab032377049e0591415d2b31afd7028356dbf3cc6dcb066" +dependencies = [ + "generic-array", +] + +[[package]] +name = "digest" +version = "0.10.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292" +dependencies = [ + "block-buffer 0.10.4", + "crypto-common", + "subtle", +] + +[[package]] +name = "ed25519" +version = "1.5.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "91cff35c70bba8a626e3185d8cd48cc11b5437e1a5bcd15b9b5fa3c64b6dfee7" +dependencies = [ + "signature", +] + +[[package]] +name = "ed25519-dalek" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c762bae6dcaf24c4c84667b8579785430908723d5c889f469d76a41d59cc7a9d" +dependencies = [ + "curve25519-dalek", + "ed25519", + "rand 0.7.3", + "serde", + "sha2 0.9.9", + "zeroize", +] + +[[package]] +name = "ed25519-dalek-bip32" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9d2be62a4061b872c8c0873ee4fc6f101ce7b889d039f019c5fa2af471a59908" +dependencies = [ + "derivation-path", + "ed25519-dalek", + "hmac 0.12.1", + "sha2 0.10.8", +] + +[[package]] +name = "either" +version = "1.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a26ae43d7bcc3b814de94796a5e736d4029efb0ee900c12e2d54c993ad1a1e07" + +[[package]] +name = "env_logger" +version = "0.9.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a12e6657c4c97ebab115a42dcee77225f7f482cdd841cf7088c657a42e9e00e7" +dependencies = [ + "atty", + "humantime", + "log", + "regex", + "termcolor", +] + +[[package]] +name = "equivalent" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5443807d6dff69373d433ab9ef5378ad8df50ca6298caf15de6e52e24aaf54d5" + +[[package]] +name = "feature-probe" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "835a3dc7d1ec9e75e2b5fb4ba75396837112d2060b03f7d43bc1897c7f7211da" + +[[package]] +name = "fnv" +version = "1.0.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1" + +[[package]] +name = "generic-array" +version = "0.14.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "85649ca51fd72272d7821adaf274ad91c288277713d9c18820d8499a7ff69e9a" +dependencies = [ + "serde", + "typenum", + "version_check", +] + +[[package]] +name = "getrandom" +version = "0.1.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8fc3cb4d91f53b50155bdcfd23f6a4c39ae1969c2ae85982b135750cccaf5fce" +dependencies = [ + "cfg-if", + "js-sys", + "libc", + "wasi 0.9.0+wasi-snapshot-preview1", + "wasm-bindgen", +] + +[[package]] +name = "getrandom" +version = "0.2.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fe9006bed769170c11f845cf00c7c1e9092aeb3f268e007c3e760ac68008070f" +dependencies = [ + "cfg-if", + "js-sys", + "libc", + "wasi 0.11.0+wasi-snapshot-preview1", + "wasm-bindgen", +] + +[[package]] +name = "hashbrown" +version = "0.11.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ab5ef0d4909ef3724cc8cce6ccc8572c5c817592e9285f5464f8e86f8bd3726e" +dependencies = [ + "ahash 0.7.7", +] + +[[package]] +name = "hashbrown" +version = "0.13.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "43a3c133739dddd0d2990f9a4bdf8eb4b21ef50e4851ca85ab661199821d510e" +dependencies = [ + "ahash 0.8.6", +] + +[[package]] +name = "hashbrown" +version = "0.14.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f93e7192158dbcda357bdec5fb5788eebf8bbac027f3f33e719d29135ae84156" + +[[package]] +name = "heck" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6d621efb26863f0e9924c6ac577e8275e5e6b77455db64ffa6c65c904e9e132c" +dependencies = [ + "unicode-segmentation", +] + +[[package]] +name = "hermit-abi" +version = "0.1.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "62b467343b94ba476dcb2500d242dadbb39557df889310ac77c5d99100aaac33" +dependencies = [ + "libc", +] + +[[package]] +name = "hex" +version = "0.4.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f24254aa9a54b5c858eaee2f5bccdb46aaf0e486a595ed5fd8f86ba55232a70" + +[[package]] +name = "hex-literal" +version = "0.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6fe2267d4ed49bc07b63801559be28c718ea06c4738b7a03c94df7386d2cde46" + +[[package]] +name = "hmac" +version = "0.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "126888268dcc288495a26bf004b38c5fdbb31682f992c84ceb046a1f0fe38840" +dependencies = [ + "crypto-mac", + "digest 0.9.0", +] + +[[package]] +name = "hmac" +version = "0.12.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6c49c37c09c17a53d937dfbb742eb3a961d65a994e6bcdcf37e7399d0cc8ab5e" +dependencies = [ + "digest 0.10.7", +] + +[[package]] +name = "hmac-drbg" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "17ea0a1394df5b6574da6e0c1ade9e78868c9fb0a4e5ef4428e32da4676b85b1" +dependencies = [ + "digest 0.9.0", + "generic-array", + "hmac 0.8.1", +] + +[[package]] +name = "humantime" +version = "2.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9a3a5bfb195931eeb336b2a7b4d761daec841b97f947d34394601737a7bba5e4" + +[[package]] +name = "ident_case" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b9e0384b61958566e926dc50660321d12159025e767c18e043daf26b70104c39" + +[[package]] +name = "im" +version = "15.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d0acd33ff0285af998aaf9b57342af478078f53492322fafc47450e09397e0e9" +dependencies = [ + "bitmaps", + "rand_core 0.6.4", + "rand_xoshiro", + "rayon", + "serde", + "sized-chunks", + "typenum", + "version_check", +] + +[[package]] +name = "indexmap" +version = "2.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d530e1a18b1cb4c484e6e34556a0d948706958449fca0cab753d649f2bce3d1f" +dependencies = [ + "equivalent", + "hashbrown 0.14.2", +] + +[[package]] +name = "itertools" +version = "0.10.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b0fd2260e829bddf4cb6ea802289de2f86d6a7a690192fbe91b3f46e0f2c8473" +dependencies = [ + "either", +] + +[[package]] +name = "itoa" +version = "1.0.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "af150ab688ff2122fcef229be89cb50dd66af9e01a4ff320cc137eecc9bacc38" + +[[package]] +name = "jobserver" +version = "0.1.27" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8c37f63953c4c63420ed5fd3d6d398c719489b9f872b9fa683262f8edd363c7d" +dependencies = [ + "libc", +] + +[[package]] +name = "js-sys" +version = "0.3.65" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "54c0c35952f67de54bb584e9fd912b3023117cbafc0a77d8f3dee1fb5f572fe8" +dependencies = [ + "wasm-bindgen", +] + +[[package]] +name = "keccak" +version = "0.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f6d5ed8676d904364de097082f4e7d240b571b67989ced0240f08b7f966f940" +dependencies = [ + "cpufeatures", +] + +[[package]] +name = "lazy_static" +version = "1.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646" + +[[package]] +name = "libc" +version = "0.2.150" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "89d92a4743f9a61002fae18374ed11e7973f530cb3a3255fb354818118b2203c" + +[[package]] +name = "libsecp256k1" +version = "0.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c9d220bc1feda2ac231cb78c3d26f27676b8cf82c96971f7aeef3d0cf2797c73" +dependencies = [ + "arrayref", + "base64 0.12.3", + "digest 0.9.0", + "hmac-drbg", + "libsecp256k1-core", + "libsecp256k1-gen-ecmult", + "libsecp256k1-gen-genmult", + "rand 0.7.3", + "serde", + "sha2 0.9.9", + "typenum", +] + +[[package]] +name = "libsecp256k1-core" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d0f6ab710cec28cef759c5f18671a27dae2a5f952cdaaee1d8e2908cb2478a80" +dependencies = [ + "crunchy", + "digest 0.9.0", + "subtle", +] + +[[package]] +name = "libsecp256k1-gen-ecmult" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ccab96b584d38fac86a83f07e659f0deafd0253dc096dab5a36d53efe653c5c3" +dependencies = [ + "libsecp256k1-core", +] + +[[package]] +name = "libsecp256k1-gen-genmult" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "67abfe149395e3aa1c48a2beb32b068e2334402df8181f818d3aee2b304c4f5d" +dependencies = [ + "libsecp256k1-core", +] + +[[package]] +name = "lock_api" +version = "0.4.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3c168f8615b12bc01f9c17e2eb0cc07dcae1940121185446edc3744920e8ef45" +dependencies = [ + "autocfg", + "scopeguard", +] + +[[package]] +name = "log" +version = "0.4.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b5e6163cb8c49088c2c36f57875e58ccd8c87c7427f7fbd50ea6710b2f3f2e8f" + +[[package]] +name = "memchr" +version = "2.6.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f665ee40bc4a3c5590afb1e9677db74a508659dfd71e126420da8274909a0167" + +[[package]] +name = "memmap2" +version = "0.5.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "83faa42c0a078c393f6b29d5db232d8be22776a891f8f56e5284faee4a20b327" +dependencies = [ + "libc", +] + +[[package]] +name = "memoffset" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a634b1c61a95585bd15607c6ab0c4e5b226e695ff2800ba0cdccddf208c406c" +dependencies = [ + "autocfg", +] + +[[package]] +name = "merlin" +version = "3.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "58c38e2799fc0978b65dfff8023ec7843e2330bb462f19198840b34b6582397d" +dependencies = [ + "byteorder", + "keccak", + "rand_core 0.6.4", + "zeroize", +] + +[[package]] +name = "num-bigint" +version = "0.4.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "608e7659b5c3d7cba262d894801b9ec9d00de989e8a82bd4bef91d08da45cdc0" +dependencies = [ + "autocfg", + "num-integer", + "num-traits", +] + +[[package]] +name = "num-derive" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "876a53fff98e03a936a674b29568b0e605f06b29372c2489ff4de23f1949743d" +dependencies = [ + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "num-integer" +version = "0.1.45" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "225d3389fb3509a24c93f5c29eb6bde2586b98d9f016636dff58d7c6f7569cd9" +dependencies = [ + "autocfg", + "num-traits", +] + +[[package]] +name = "num-traits" +version = "0.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "39e3200413f237f41ab11ad6d161bc7239c84dcb631773ccd7de3dfe4b5c267c" +dependencies = [ + "autocfg", +] + +[[package]] +name = "num_enum" +version = "0.5.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1f646caf906c20226733ed5b1374287eb97e3c2a5c227ce668c1f2ce20ae57c9" +dependencies = [ + "num_enum_derive 0.5.11", +] + +[[package]] +name = "num_enum" +version = "0.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7a015b430d3c108a207fd776d2e2196aaf8b1cf8cf93253e3a097ff3085076a1" +dependencies = [ + "num_enum_derive 0.6.1", +] + +[[package]] +name = "num_enum_derive" +version = "0.5.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dcbff9bc912032c62bf65ef1d5aea88983b420f4f839db1e9b0c281a25c9c799" +dependencies = [ + "proc-macro-crate 1.3.1", + "proc-macro2", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "num_enum_derive" +version = "0.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "96667db765a921f7b295ffee8b60472b686a51d4f21c2ee4ffdb94c7013b65a6" +dependencies = [ + "proc-macro-crate 1.3.1", + "proc-macro2", + "quote", + "syn 2.0.39", +] + +[[package]] +name = "once_cell" +version = "1.18.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dd8b5dd2ae5ed71462c540258bedcb51965123ad7e7ccf4b9a8cafaa4a63576d" + +[[package]] +name = "opaque-debug" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "624a8340c38c1b80fd549087862da4ba43e08858af025b236e509b6649fc13d5" + +[[package]] +name = "parking_lot" +version = "0.12.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3742b2c103b9f06bc9fff0a37ff4912935851bee6d36f3c02bcc755bcfec228f" +dependencies = [ + "lock_api", + "parking_lot_core", +] + +[[package]] +name = "parking_lot_core" +version = "0.9.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4c42a9226546d68acdd9c0a280d17ce19bfe27a46bf68784e4066115788d008e" +dependencies = [ + "cfg-if", + "libc", + "redox_syscall", + "smallvec", + "windows-targets", +] + +[[package]] +name = "paste" +version = "1.0.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "de3145af08024dea9fa9914f381a17b8fc6034dfb00f3a84013f7ff43f29ed4c" + +[[package]] +name = "pbkdf2" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "216eaa586a190f0a738f2f918511eecfa90f13295abec0e457cdebcceda80cbd" +dependencies = [ + "crypto-mac", +] + +[[package]] +name = "pbkdf2" +version = "0.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "83a0692ec44e4cf1ef28ca317f14f8f07da2d95ec3fa01f86e4467b725e60917" +dependencies = [ + "digest 0.10.7", +] + +[[package]] +name = "percent-encoding" +version = "2.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9b2a4787296e9989611394c33f193f676704af1686e70b8f8033ab5ba9a35a94" + +[[package]] +name = "polyval" +version = "0.5.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8419d2b623c7c0896ff2d5d96e2cb4ede590fed28fcc34934f4c33c036e620a1" +dependencies = [ + "cfg-if", + "cpufeatures", + "opaque-debug", + "universal-hash", +] + +[[package]] +name = "ppv-lite86" +version = "0.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5b40af805b3121feab8a3c29f04d8ad262fa8e0561883e7653e024ae4479e6de" + +[[package]] +name = "proc-macro-crate" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1d6ea3c4595b96363c13943497db34af4460fb474a95c43f4446ad341b8c9785" +dependencies = [ + "toml", +] + +[[package]] +name = "proc-macro-crate" +version = "1.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f4c021e1093a56626774e81216a4ce732a735e5bad4868a03f3ed65ca0c3919" +dependencies = [ + "once_cell", + "toml_edit", +] + +[[package]] +name = "proc-macro2" +version = "1.0.69" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "134c189feb4956b20f6f547d2cf727d4c0fe06722b20a0eec87ed445a97f92da" +dependencies = [ + "unicode-ident", +] + +[[package]] +name = "qstring" +version = "0.7.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d464fae65fff2680baf48019211ce37aaec0c78e9264c84a3e484717f965104e" +dependencies = [ + "percent-encoding", +] + +[[package]] +name = "quote" +version = "1.0.33" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5267fca4496028628a95160fc423a33e8b2e6af8a5302579e322e4b520293cae" +dependencies = [ + "proc-macro2", +] + +[[package]] +name = "rand" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03" +dependencies = [ + "getrandom 0.1.16", + "libc", + "rand_chacha 0.2.2", + "rand_core 0.5.1", + "rand_hc", +] + +[[package]] +name = "rand" +version = "0.8.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "34af8d1a0e25924bc5b7c43c079c942339d8f0a8b57c39049bef581b46327404" +dependencies = [ + "rand_chacha 0.3.1", + "rand_core 0.6.4", +] + +[[package]] +name = "rand_chacha" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402" +dependencies = [ + "ppv-lite86", + "rand_core 0.5.1", +] + +[[package]] +name = "rand_chacha" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e6c10a63a0fa32252be49d21e7709d4d4baf8d231c2dbce1eaa8141b9b127d88" +dependencies = [ + "ppv-lite86", + "rand_core 0.6.4", +] + +[[package]] +name = "rand_core" +version = "0.5.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19" +dependencies = [ + "getrandom 0.1.16", +] + +[[package]] +name = "rand_core" +version = "0.6.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec0be4795e2f6a28069bec0b5ff3e2ac9bafc99e6a9a7dc3547996c5c816922c" +dependencies = [ + "getrandom 0.2.11", +] + +[[package]] +name = "rand_hc" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c" +dependencies = [ + "rand_core 0.5.1", +] + +[[package]] +name = "rand_xoshiro" +version = "0.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6f97cdb2a36ed4183de61b2f824cc45c9f1037f28afe0a322e9fff4c108b5aaa" +dependencies = [ + "rand_core 0.6.4", +] + +[[package]] +name = "rayon" +version = "1.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9c27db03db7734835b3f53954b534c91069375ce6ccaa2e065441e07d9b6cdb1" +dependencies = [ + "either", + "rayon-core", +] + +[[package]] +name = "rayon-core" +version = "1.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5ce3fb6ad83f861aac485e76e1985cd109d9a3713802152be56c3b1f0e0658ed" +dependencies = [ + "crossbeam-deque", + "crossbeam-utils", +] + +[[package]] +name = "redox_syscall" +version = "0.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4722d768eff46b75989dd134e5c353f0d6296e5aaa3132e776cbdb56be7731aa" +dependencies = [ + "bitflags", +] + +[[package]] +name = "regex" +version = "1.10.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "380b951a9c5e80ddfd6136919eef32310721aa4aacd4889a8d39124b026ab343" +dependencies = [ + "aho-corasick", + "memchr", + "regex-automata", + "regex-syntax", +] + +[[package]] +name = "regex-automata" +version = "0.4.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5f804c7828047e88b2d32e2d7fe5a105da8ee3264f01902f796c8e067dc2483f" +dependencies = [ + "aho-corasick", + "memchr", + "regex-syntax", +] + +[[package]] +name = "regex-syntax" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c08c74e62047bb2de4ff487b251e4a92e24f48745648451635cec7d591162d9f" + +[[package]] +name = "ruint" +version = "1.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "77e1574d439643c8962edf612a888e7cc5581bcdf36cb64e6bc88466b03b2daa" +dependencies = [ + "ruint-macro", + "thiserror", +] + +[[package]] +name = "ruint-macro" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e666a5496a0b2186dbcd0ff6106e29e093c15591bde62c20d3842007c6978a09" + +[[package]] +name = "rustc-hash" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "08d43f7aa6b08d49f382cde6a7982047c3426db949b1424bc4b7ec9ae12c6ce2" + +[[package]] +name = "rustc_version" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bfa0f585226d2e68097d4f95d113b15b83a82e819ab25717ec0590d9584ef366" +dependencies = [ + "semver", +] + +[[package]] +name = "rustversion" +version = "1.0.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7ffc183a10b4478d04cbbbfc96d0873219d962dd5accaff2ffbd4ceb7df837f4" + +[[package]] +name = "ryu" +version = "1.0.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ad4cc8da4ef723ed60bced201181d83791ad433213d8c24efffda1eec85d741" + +[[package]] +name = "scopeguard" +version = "1.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "94143f37725109f92c262ed2cf5e59bce7498c01bcc1502d7b9afe439a4e9f49" + +[[package]] +name = "semver" +version = "1.0.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "836fa6a3e1e547f9a2c4040802ec865b5d85f4014efe00555d7090a3dcaa1090" + +[[package]] +name = "serde" +version = "1.0.193" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "25dd9975e68d0cb5aa1120c288333fc98731bd1dd12f561e468ea4728c042b89" +dependencies = [ + "serde_derive", +] + +[[package]] +name = "serde_bytes" +version = "0.11.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ab33ec92f677585af6d88c65593ae2375adde54efdbf16d597f2cbc7a6d368ff" +dependencies = [ + "serde", +] + +[[package]] +name = "serde_derive" +version = "1.0.193" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "43576ca501357b9b071ac53cdc7da8ef0cbd9493d8df094cd821777ea6e894d3" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.39", +] + +[[package]] +name = "serde_json" +version = "1.0.108" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3d1c7e3eac408d115102c4c24ad393e0821bb3a5df4d506a80f85f7a742a526b" +dependencies = [ + "itoa", + "ryu", + "serde", +] + +[[package]] +name = "serde_with" +version = "2.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07ff71d2c147a7b57362cead5e22f772cd52f6ab31cfcd9edcd7f6aeb2a0afbe" +dependencies = [ + "serde", + "serde_with_macros", +] + +[[package]] +name = "serde_with_macros" +version = "2.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "881b6f881b17d13214e5d494c939ebab463d01264ce1811e9d4ac3a882e7695f" +dependencies = [ + "darling", + "proc-macro2", + "quote", + "syn 2.0.39", +] + +[[package]] +name = "sha2" +version = "0.9.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4d58a1e1bf39749807d89cf2d98ac2dfa0ff1cb3faa38fbb64dd88ac8013d800" +dependencies = [ + "block-buffer 0.9.0", + "cfg-if", + "cpufeatures", + "digest 0.9.0", + "opaque-debug", +] + +[[package]] +name = "sha2" +version = "0.10.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "793db75ad2bcafc3ffa7c68b215fee268f537982cd901d132f89c6343f3a3dc8" +dependencies = [ + "cfg-if", + "cpufeatures", + "digest 0.10.7", +] + +[[package]] +name = "sha3" +version = "0.9.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f81199417d4e5de3f04b1e871023acea7389672c4135918f05aa9cbf2f2fa809" +dependencies = [ + "block-buffer 0.9.0", + "digest 0.9.0", + "keccak", + "opaque-debug", +] + +[[package]] +name = "sha3" +version = "0.10.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "75872d278a8f37ef87fa0ddbda7802605cb18344497949862c0d4dcb291eba60" +dependencies = [ + "digest 0.10.7", + "keccak", +] + +[[package]] +name = "signature" +version = "1.6.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "74233d3b3b2f6d4b006dc19dee745e73e2a6bfb6f93607cd3b02bd5b00797d7c" + +[[package]] +name = "sized-chunks" +version = "0.6.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "16d69225bde7a69b235da73377861095455d298f2b970996eec25ddbb42b3d1e" +dependencies = [ + "bitmaps", + "typenum", +] + +[[package]] +name = "smallvec" +version = "1.11.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4dccd0940a2dcdf68d092b8cbab7dc0ad8fa938bf95787e1b916b0e3d0e8e970" + +[[package]] +name = "solana-frozen-abi" +version = "1.16.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7e77bfd59ad4e64c0f06fbcbe16d58f3a40bdbcc050fb78fc7134a55a5c290b9" +dependencies = [ + "ahash 0.8.6", + "blake3", + "block-buffer 0.10.4", + "bs58 0.4.0", + "bv", + "byteorder", + "cc", + "either", + "generic-array", + "getrandom 0.1.16", + "im", + "lazy_static", + "log", + "memmap2", + "once_cell", + "rand_core 0.6.4", + "rustc_version", + "serde", + "serde_bytes", + "serde_derive", + "serde_json", + "sha2 0.10.8", + "solana-frozen-abi-macro", + "subtle", + "thiserror", +] + +[[package]] +name = "solana-frozen-abi-macro" +version = "1.16.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "992b866b9f0510fd3c290afe6a37109ae8d15b74fa24e3fb6d164be2971ee94f" +dependencies = [ + "proc-macro2", + "quote", + "rustc_version", + "syn 2.0.39", +] + +[[package]] +name = "solana-logger" +version = "1.16.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0278658cd4fb5405932452bf20f7df496ce8b9e9cf66a7d1c621bbe3b01fe297" +dependencies = [ + "env_logger", + "lazy_static", + "log", +] + +[[package]] +name = "solana-program" +version = "1.16.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "aa5ac2110c5b927d6114b2d4f32af7f749fde0e6fd8f34777407ce89d66630be" +dependencies = [ + "ark-bn254", + "ark-ec", + "ark-ff", + "ark-serialize", + "array-bytes", + "base64 0.21.5", + "bincode", + "bitflags", + "blake3", + "borsh 0.10.3", + "borsh 0.9.3", + "bs58 0.4.0", + "bv", + "bytemuck", + "cc", + "console_error_panic_hook", + "console_log", + "curve25519-dalek", + "getrandom 0.2.11", + "itertools", + "js-sys", + "lazy_static", + "libc", + "libsecp256k1", + "log", + "memoffset", + "num-bigint", + "num-derive", + "num-traits", + "parking_lot", + "rand 0.7.3", + "rand_chacha 0.2.2", + "rustc_version", + "rustversion", + "serde", + "serde_bytes", + "serde_derive", + "serde_json", + "sha2 0.10.8", + "sha3 0.10.8", + "solana-frozen-abi", + "solana-frozen-abi-macro", + "solana-sdk-macro", + "thiserror", + "tiny-bip39", + "wasm-bindgen", + "zeroize", +] + +[[package]] +name = "solana-sdk" +version = "1.16.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dbe17a1ce6082979e7beffb7cadd7051e29d873594622a11a7d0a4c2dd4b7934" +dependencies = [ + "assert_matches", + "base64 0.21.5", + "bincode", + "bitflags", + "borsh 0.10.3", + "bs58 0.4.0", + "bytemuck", + "byteorder", + "chrono", + "derivation-path", + "digest 0.10.7", + "ed25519-dalek", + "ed25519-dalek-bip32", + "generic-array", + "hmac 0.12.1", + "itertools", + "js-sys", + "lazy_static", + "libsecp256k1", + "log", + "memmap2", + "num-derive", + "num-traits", + "num_enum 0.6.1", + "pbkdf2 0.11.0", + "qstring", + "rand 0.7.3", + "rand_chacha 0.2.2", + "rustc_version", + "rustversion", + "serde", + "serde_bytes", + "serde_derive", + "serde_json", + "serde_with", + "sha2 0.10.8", + "sha3 0.10.8", + "solana-frozen-abi", + "solana-frozen-abi-macro", + "solana-logger", + "solana-program", + "solana-sdk-macro", + "thiserror", + "uriparse", + "wasm-bindgen", +] + +[[package]] +name = "solana-sdk-macro" +version = "1.16.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9fe4363d2503a75325ec94aa18b063574edb3454d38840e01c5af477b3b0689d" +dependencies = [ + "bs58 0.4.0", + "proc-macro2", + "quote", + "rustversion", + "syn 2.0.39", +] + +[[package]] +name = "solana-zk-token-sdk" +version = "1.16.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e0c83eec033c30c95938905374292fb8a3559dd3dfb36d715624e5f8f41b078e" +dependencies = [ + "aes-gcm-siv", + "base64 0.21.5", + "bincode", + "bytemuck", + "byteorder", + "curve25519-dalek", + "getrandom 0.1.16", + "itertools", + "lazy_static", + "merlin", + "num-derive", + "num-traits", + "rand 0.7.3", + "serde", + "serde_json", + "sha3 0.9.1", + "solana-program", + "solana-sdk", + "subtle", + "thiserror", + "zeroize", +] + +[[package]] +name = "spl-associated-token-account" +version = "1.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "978dba3bcbe88d0c2c58366c254d9ea41c5f73357e72fc0bdee4d6b5fc99c8f4" +dependencies = [ + "assert_matches", + "borsh 0.9.3", + "num-derive", + "num-traits", + "solana-program", + "spl-token", + "spl-token-2022", + "thiserror", +] + +[[package]] +name = "spl-memo" +version = "3.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bd0dc6f70db6bacea7ff25870b016a65ba1d1b6013536f08e4fd79a8f9005325" +dependencies = [ + "solana-program", +] + +[[package]] +name = "spl-token" +version = "3.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e85e168a785e82564160dcb87b2a8e04cee9bfd1f4d488c729d53d6a4bd300d" +dependencies = [ + "arrayref", + "bytemuck", + "num-derive", + "num-traits", + "num_enum 0.5.11", + "solana-program", + "thiserror", +] + +[[package]] +name = "spl-token-2022" +version = "0.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0043b590232c400bad5ee9eb983ced003d15163c4c5d56b090ac6d9a57457b47" +dependencies = [ + "arrayref", + "bytemuck", + "num-derive", + "num-traits", + "num_enum 0.5.11", + "solana-program", + "solana-zk-token-sdk", + "spl-memo", + "spl-token", + "thiserror", +] + +[[package]] +name = "strsim" +version = "0.10.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "73473c0e59e6d5812c5dfe2a064a6444949f089e20eec9a2e5506596494e4623" + +[[package]] +name = "subtle" +version = "2.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6bdef32e8150c2a081110b42772ffe7d7c9032b606bc226c8260fd97e0976601" + +[[package]] +name = "syn" +version = "1.0.109" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "72b64191b275b66ffe2469e8af2c1cfe3bafa67b529ead792a6d0160888b4237" +dependencies = [ + "proc-macro2", + "quote", + "unicode-ident", +] + +[[package]] +name = "syn" +version = "2.0.39" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "23e78b90f2fcf45d3e842032ce32e3f2d1545ba6636271dcbf24fa306d87be7a" +dependencies = [ + "proc-macro2", + "quote", + "unicode-ident", +] + +[[package]] +name = "termcolor" +version = "1.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ff1bc3d3f05aff0403e8ac0d92ced918ec05b666a43f83297ccef5bea8a3d449" +dependencies = [ + "winapi-util", +] + +[[package]] +name = "thiserror" +version = "1.0.50" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f9a7210f5c9a7156bb50aa36aed4c95afb51df0df00713949448cf9e97d382d2" +dependencies = [ + "thiserror-impl", +] + +[[package]] +name = "thiserror-impl" +version = "1.0.50" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "266b2e40bc00e5a6c09c3584011e08b06f123c00362c92b975ba9843aaaa14b8" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.39", +] + +[[package]] +name = "tiny-bip39" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ffc59cb9dfc85bb312c3a78fd6aa8a8582e310b0fa885d5bb877f6dcc601839d" +dependencies = [ + "anyhow", + "hmac 0.8.1", + "once_cell", + "pbkdf2 0.4.0", + "rand 0.7.3", + "rustc-hash", + "sha2 0.9.9", + "thiserror", + "unicode-normalization", + "wasm-bindgen", + "zeroize", +] + +[[package]] +name = "tinyvec" +version = "1.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "87cc5ceb3875bb20c2890005a4e226a4651264a5c75edb2421b52861a0a0cb50" +dependencies = [ + "tinyvec_macros", +] + +[[package]] +name = "tinyvec_macros" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1f3ccbac311fea05f86f61904b462b55fb3df8837a366dfc601a0161d0532f20" + +[[package]] +name = "token-router" +version = "0.0.0" +dependencies = [ + "anchor-lang", + "anchor-spl", + "cfg-if", + "hex", + "hex-literal", + "ruint", + "solana-program", + "wormhole-cctp-solana", +] + +[[package]] +name = "toml" +version = "0.5.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f4f7f0dd8d50a853a531c426359045b1998f04219d88799810762cd4ad314234" +dependencies = [ + "serde", +] + +[[package]] +name = "toml_datetime" +version = "0.6.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3550f4e9685620ac18a50ed434eb3aec30db8ba93b0287467bca5826ea25baf1" + +[[package]] +name = "toml_edit" +version = "0.19.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1b5bb770da30e5cbfde35a2d7b9b8a2c4b8ef89548a7a6aeab5c9a576e3e7421" +dependencies = [ + "indexmap", + "toml_datetime", + "winnow", +] + +[[package]] +name = "typenum" +version = "1.17.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "42ff0bf0c66b8238c6f3b578df37d0b7848e55df8577b3f74f92a69acceeb825" + +[[package]] +name = "unicode-ident" +version = "1.0.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3354b9ac3fae1ff6755cb6db53683adb661634f67557942dea4facebec0fee4b" + +[[package]] +name = "unicode-normalization" +version = "0.1.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c5713f0fc4b5db668a2ac63cdb7bb4469d8c9fed047b1d0292cc7b0ce2ba921" +dependencies = [ + "tinyvec", +] + +[[package]] +name = "unicode-segmentation" +version = "1.10.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1dd624098567895118886609431a7c3b8f516e41d30e0643f03d94592a147e36" + +[[package]] +name = "universal-hash" +version = "0.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9f214e8f697e925001e66ec2c6e37a4ef93f0f78c2eed7814394e10c62025b05" +dependencies = [ + "generic-array", + "subtle", +] + +[[package]] +name = "uriparse" +version = "0.6.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0200d0fc04d809396c2ad43f3c95da3582a2556eba8d453c1087f4120ee352ff" +dependencies = [ + "fnv", + "lazy_static", +] + +[[package]] +name = "version_check" +version = "0.9.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "49874b5167b65d7193b8aba1567f5c7d93d001cafc34600cee003eda787e483f" + +[[package]] +name = "wasi" +version = "0.9.0+wasi-snapshot-preview1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519" + +[[package]] +name = "wasi" +version = "0.11.0+wasi-snapshot-preview1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9c8d87e72b64a3b4db28d11ce29237c246188f4f51057d65a7eab63b7987e423" + +[[package]] +name = "wasm-bindgen" +version = "0.2.88" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7daec296f25a1bae309c0cd5c29c4b260e510e6d813c286b19eaadf409d40fce" +dependencies = [ + "cfg-if", + "wasm-bindgen-macro", +] + +[[package]] +name = "wasm-bindgen-backend" +version = "0.2.88" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e397f4664c0e4e428e8313a469aaa58310d302159845980fd23b0f22a847f217" +dependencies = [ + "bumpalo", + "log", + "once_cell", + "proc-macro2", + "quote", + "syn 2.0.39", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-macro" +version = "0.2.88" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5961017b3b08ad5f3fe39f1e79877f8ee7c23c5e5fd5eb80de95abc41f1f16b2" +dependencies = [ + "quote", + "wasm-bindgen-macro-support", +] + +[[package]] +name = "wasm-bindgen-macro-support" +version = "0.2.88" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c5353b8dab669f5e10f5bd76df26a9360c748f054f862ff5f3f8aae0c7fb3907" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.39", + "wasm-bindgen-backend", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-shared" +version = "0.2.88" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0d046c5d029ba91a1ed14da14dca44b68bf2f124cfbaf741c54151fdb3e0750b" + +[[package]] +name = "web-sys" +version = "0.3.65" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5db499c5f66323272151db0e666cd34f78617522fb0c1604d31a27c50c206a85" +dependencies = [ + "js-sys", + "wasm-bindgen", +] + +[[package]] +name = "winapi" +version = "0.3.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419" +dependencies = [ + "winapi-i686-pc-windows-gnu", + "winapi-x86_64-pc-windows-gnu", +] + +[[package]] +name = "winapi-i686-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6" + +[[package]] +name = "winapi-util" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f29e6f9198ba0d26b4c9f07dbe6f9ed633e1f3d5b8b414090084349e46a52596" +dependencies = [ + "winapi", +] + +[[package]] +name = "winapi-x86_64-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" + +[[package]] +name = "windows-targets" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9a2fa6e2155d7247be68c096456083145c183cbbbc2764150dda45a87197940c" +dependencies = [ + "windows_aarch64_gnullvm", + "windows_aarch64_msvc", + "windows_i686_gnu", + "windows_i686_msvc", + "windows_x86_64_gnu", + "windows_x86_64_gnullvm", + "windows_x86_64_msvc", +] + +[[package]] +name = "windows_aarch64_gnullvm" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b38e32f0abccf9987a4e3079dfb67dcd799fb61361e53e2882c3cbaf0d905d8" + +[[package]] +name = "windows_aarch64_msvc" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dc35310971f3b2dbbf3f0690a219f40e2d9afcf64f9ab7cc1be722937c26b4bc" + +[[package]] +name = "windows_i686_gnu" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a75915e7def60c94dcef72200b9a8e58e5091744960da64ec734a6c6e9b3743e" + +[[package]] +name = "windows_i686_msvc" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f55c233f70c4b27f66c523580f78f1004e8b5a8b659e05a4eb49d4166cca406" + +[[package]] +name = "windows_x86_64_gnu" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "53d40abd2583d23e4718fddf1ebec84dbff8381c07cae67ff7768bbf19c6718e" + +[[package]] +name = "windows_x86_64_gnullvm" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b7b52767868a23d5bab768e390dc5f5c55825b6d30b86c844ff2dc7414044cc" + +[[package]] +name = "windows_x86_64_msvc" +version = "0.48.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ed94fce61571a4006852b7389a063ab983c02eb1bb37b47f8272ce92d06d9538" + +[[package]] +name = "winnow" +version = "0.5.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "829846f3e3db426d4cee4510841b71a8e58aa2a76b1132579487ae430ccd9c7b" +dependencies = [ + "memchr", +] + +[[package]] +name = "wormhole-cctp-solana" +version = "0.0.0-alpha.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c68dee99fb7bba33193d5ddebda340b6c7d07fc94de9891abecfa61c8814ad7" +dependencies = [ + "anchor-lang", + "anchor-spl", + "cfg-if", + "hex", + "ruint", + "solana-program", + "wormhole-core-bridge-solana", + "wormhole-raw-vaas", +] + +[[package]] +name = "wormhole-core-bridge-solana" +version = "0.0.1-alpha.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "22222ab2f60cd584afb647a98c53242a772d850d0b1b2b0792b0aa5d59ab8d95" +dependencies = [ + "anchor-lang", + "cfg-if", + "hex", + "ruint", + "solana-program", + "wormhole-io", + "wormhole-raw-vaas", +] + +[[package]] +name = "wormhole-io" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6926b6a0b383df50bbb0d0b11378b6d0cf4f606e8386fb624472b7f9a90e830f" + +[[package]] +name = "wormhole-raw-vaas" +version = "0.0.1-alpha.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1cb59754ad91d99c0e3d7d159fffcbb4087c18a1c13b1b2a945775635ef9bd03" +dependencies = [ + "ruint", + "ruint-macro", +] + +[[package]] +name = "zerocopy" +version = "0.7.26" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e97e415490559a91254a2979b4829267a57d2fcd741a98eee8b722fb57289aa0" +dependencies = [ + "zerocopy-derive", +] + +[[package]] +name = "zerocopy-derive" +version = "0.7.26" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dd7e48ccf166952882ca8bd778a43502c64f33bf94c12ebe2a7f08e5a0f6689f" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.39", +] + +[[package]] +name = "zeroize" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4756f7db3f7b5574938c3eb1c117038b8e07f95ee6718c0efad4ac21508f1efd" +dependencies = [ + "zeroize_derive", +] + +[[package]] +name = "zeroize_derive" +version = "1.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ce36e65b0d2999d2aafac989fb249189a141aee1f53c612c1f37d72631959f69" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.39", +] diff --git a/solana/Cargo.toml b/solana/Cargo.toml new file mode 100644 index 00000000..4c843dd7 --- /dev/null +++ b/solana/Cargo.toml @@ -0,0 +1,27 @@ +[workspace] +members = [ + "programs/*" +] + +[workspace.dependencies.wormhole-cctp-program] +package = "wormhole-cctp-solana" +version = "0.0.0-alpha.12" +features = ["cpi"] +default-features = false + +[workspace.dependencies.anchor-lang] +version = "0.28.0" +features = ["derive", "init-if-needed"] + +[workspace.dependencies] +anchor-spl = "0.28.0" +solana-program = "1.16.16" +hex = "0.4.3" +ruint = "1.9.0" +cfg-if = "1.0" +hex-literal = "0.4.1" + +[profile.release.build-override] +opt-level = 3 +incremental = false +codegen-units = 1 diff --git a/solana/Makefile b/solana/Makefile new file mode 100644 index 00000000..3f8fcdee --- /dev/null +++ b/solana/Makefile @@ -0,0 +1,45 @@ +SOLANA_CLI="v1.16.16" +ANCHOR_CLI="v0.28.0" + +out_mainnet=artifacts-mainnet +out_testnet=artifacts-testnet +out_localnet=artifacts-localnet + +.PHONY: all clean check build test lint ci + +all: check + +check: + cargo check --all-features + +clean: + anchor clean + rm -rf node_modules artifacts-mainnet artifacts-testnet artifacts-localnet ts/tests/artifacts + +node_modules: + npm ci + +build: $(out_$(NETWORK)) +$(out_$(NETWORK)): +ifdef out_$(NETWORK) + anchor build -p token_router --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features + mkdir -p $(out_$(NETWORK)) + cp target/deploy/*.so $(out_$(NETWORK))/ +endif + +test: node_modules + cargo test --all-features + anchor build -p token_router --arch sbf -- --features testnet + mkdir -p ts/tests/artifacts && cp target/deploy/token_router.so ts/tests/artifacts/testnet_token_router.so + anchor build --arch sbf -- --features integration-test + anchor test --skip-build + +lint: + cargo fmt --check + cargo clippy --no-deps --all-targets --all-features -- -D warnings + +ci: + DOCKER_BUILDKIT=1 docker build -f Dockerfile.ci \ + --build-arg SOLANA_CLI=$(SOLANA_CLI) \ + --build-arg ANCHOR_CLI=$(ANCHOR_CLI) \ + . diff --git a/solana/README.md b/solana/README.md new file mode 100644 index 00000000..c8178ef0 --- /dev/null +++ b/solana/README.md @@ -0,0 +1,91 @@ +# Example Token Router on Solana + +## Dependencies + +> **Warning** +> Only Solana versions >= 1.14.14 and < 1.15 are supported. + +First, you will need `cargo` and `anchor` CLI tools. If you need these tools, +please visit the [Anchor book] for more details. + +## Build + +Once you have the above CLI tools, you can build the programs by simply running: + +- `NETWORK=testnet make` + +This will also install this subdirectory's dependencies, such as +`node_modules` and the Wormhole programs from the `solana` directory of the +[Wormhole repo]. This will also create a keypair for the program in the +`target/deploy/`. This keypair can be used for devnet, testnet and mainnet. Do not delete this +key after deploying to the network of your choice. + +## Tests + +To run both unit and integration tests, run `make test`. If you want to isolate +your testing, use either of these commands: + +- `make unit-test` - Runs `cargo clippy` and `cargo test` +- `make integration-test` - Spawns a solana local validator and uses `ts-mocha` + with `@solana/web3.js` to interact with the example programs. + +## Deployment + +First, generate a program public key by running the following command: + +- `solana-keygen pubkey target/deploy/token_bridge_relayer-keypair.json` + +Add your program's public key to the following file: + +- `programs/src/lib.rs` + +Then, build based on the target network. The deployment options are `devnet`, `testnet` and `mainnet`. We will use `testnet` as an example for this README. + +- `NETWORK=testnet make build` + +Next, we will need to create some keypairs for the deployment. The keypair that is used to deploy the program will become the `owner` of the program. Optionally, you can create a new keypair for the `assistant` and the `fee_recipient`, however, the same keypair can be used for all three. Create the keypair(s) in a location of your choice by running: + +- `solana-keygen new -o path/to/keypair.json` + +Then set the `FEE_RECIPIENT`, `ASSISTANT` and `TOKEN_ROUTER_PID` in the `env/tesnet.env` file. This env file will be used for your deployment, as well as setting up the program. + +Finally, deploy the program (from the `solana`) directory with the following command: + +``` +solana program deploy target/deploy/token_bridge_relayer.so \ + --program-id target/deploy/token_bridge_relayer-keypair.json \ + --commitment confirmed \ + -u your_testnet_rpc \ + -k your_deployment_keypair.json` +``` + +## Program Setup + +### Step 1: Env File + +You should still have your environment file from the [deployment](#deployment) section of this README. However (if you deleted it) create a new one and set the `FEE_RECIPIENT`, `ASSISTANT` and `TOKEN_ROUTER_PID` environment variables. + +### Step 2: Setup Configuration File + +Depending on your target network, there should be an example config file in the `cfg` directory. Open your file of choice and configure it to your liking. DO NOT change the name of this file. + +### Step 3: Initialize the program + +Run the following command to initialize the program. Make sure to supply the keypair that was used to deploy the program: + +- `source env/testnet.env && yarn initialize -k your_deployment_keypair.json` + +### Step 4: Register Foreign Contracts + +- `source env/testnet.env && yarn register-contracts -k your_deployment_keypair.json -n testnet` + +### Step 5: Register Tokens (Sets Swap Rate and Max Swap Amount) + +- `source env/testnet.env && yarn register-tokens -k your_deployment_keypair.json -n testnet` + +### Step 6: Set Relayer Fees + +- `source env/testnet.env && yarn set-relayer-fees -k your_deployment_keypair.json -n testnet` + +[anchor book]: https://book.anchor-lang.com/getting_started/installation.html +[wormhole repo]: https://github.com/wormhole-foundation/wormhole/tree/dev.v2/solana diff --git a/solana/package-lock.json b/solana/package-lock.json new file mode 100644 index 00000000..2581f067 --- /dev/null +++ b/solana/package-lock.json @@ -0,0 +1,5335 @@ +{ + "name": "solana", + "lockfileVersion": 3, + "requires": true, + "packages": { + "": { + "dependencies": { + "@certusone/wormhole-sdk": "^0.10.5", + "@coral-xyz/anchor": "^0.29.0", + "@solana/spl-token": "^0.3.9", + "@solana/web3.js": "^1.87.6", + "ethers": "^5.7.2", + "yargs": "^17.7.2" + }, + "devDependencies": { + "@types/bn.js": "^5.1.0", + "@types/chai": "^4.3.4", + "@types/chai-as-promised": "^7.1.5", + "@types/mocha": "^10.0.1", + "@types/node": "^18.14.5", + "@types/yargs": "^17.0.24", + "chai": "^4.3.7", + "chai-as-promised": "^7.1.1", + "mocha": "^10.0.0", + "ts-mocha": "^10.0.0", + "ts-results": "^3.3.0", + "typescript": "^4.3.5" + } + }, + "node_modules/@apollo/client": { + "version": "3.8.7", + "resolved": "https://registry.npmjs.org/@apollo/client/-/client-3.8.7.tgz", + "integrity": "sha512-DnQtFkQrCyxHTSa9gR84YRLmU/al6HeXcLZazVe+VxKBmx/Hj4rV8xWtzfWYX5ijartsqDR7SJgV037MATEecA==", + "optional": true, + "dependencies": { + "@graphql-typed-document-node/core": "^3.1.1", + "@wry/context": "^0.7.3", + "@wry/equality": "^0.5.6", + "@wry/trie": "^0.4.3", + "graphql-tag": "^2.12.6", + "hoist-non-react-statics": "^3.3.2", + "optimism": "^0.17.5", + "prop-types": "^15.7.2", + "response-iterator": "^0.2.6", + "symbol-observable": "^4.0.0", + "ts-invariant": "^0.10.3", + "tslib": "^2.3.0", + "zen-observable-ts": "^1.2.5" + }, + "peerDependencies": { + "graphql": "^14.0.0 || ^15.0.0 || ^16.0.0", + "graphql-ws": "^5.5.5", + "react": "^16.8.0 || ^17.0.0 || ^18.0.0", + "react-dom": "^16.8.0 || ^17.0.0 || ^18.0.0", + "subscriptions-transport-ws": "^0.9.0 || ^0.11.0" + }, + "peerDependenciesMeta": { + "graphql-ws": { + "optional": true + }, + "react": { + "optional": true + }, + "react-dom": { + "optional": true + }, + "subscriptions-transport-ws": { + "optional": true + } + } + }, + "node_modules/@babel/runtime": { + "version": "7.23.4", + "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.23.4.tgz", + "integrity": "sha512-2Yv65nlWnWlSpe3fXEyX5i7fx5kIKo4Qbcj+hMO0odwaneFjfXw5fdum+4yL20O0QiaHpia0cYQ9xpNMqrBwHg==", + "dependencies": { + "regenerator-runtime": "^0.14.0" + }, + "engines": { + "node": ">=6.9.0" + } + }, + "node_modules/@babel/runtime/node_modules/regenerator-runtime": { + "version": "0.14.0", + "resolved": "https://registry.npmjs.org/regenerator-runtime/-/regenerator-runtime-0.14.0.tgz", + "integrity": "sha512-srw17NI0TUWHuGa5CFGGmhfNIeja30WMBfbslPNhf6JrqQlLN5gcrvig1oqPxiVaXb0oW0XRKtH6Nngs5lKCIA==" + }, + "node_modules/@certusone/wormhole-sdk": { + "version": "0.10.5", + "resolved": "https://registry.npmjs.org/@certusone/wormhole-sdk/-/wormhole-sdk-0.10.5.tgz", + "integrity": "sha512-wKONuigkakoFx9HplBt2Jh5KPxc7xgtDJVrIb2/SqYWbFrdpiZrMC4H6kTZq2U4+lWtqaCa1aJ1q+3GOTNx2CQ==", + "dependencies": { + "@certusone/wormhole-sdk-proto-web": "0.0.6", + "@certusone/wormhole-sdk-wasm": "^0.0.1", + "@coral-xyz/borsh": "0.2.6", + "@mysten/sui.js": "0.32.2", + "@project-serum/anchor": "^0.25.0", + "@solana/spl-token": "^0.3.5", + "@solana/web3.js": "^1.66.2", + "@terra-money/terra.js": "3.1.9", + "@xpla/xpla.js": "^0.2.1", + "algosdk": "^2.4.0", + "aptos": "1.5.0", + "axios": "^0.24.0", + "bech32": "^2.0.0", + "binary-parser": "^2.2.1", + "bs58": "^4.0.1", + "elliptic": "^6.5.4", + "js-base64": "^3.6.1", + "near-api-js": "^1.0.0" + }, + "optionalDependencies": { + "@injectivelabs/networks": "1.10.12", + "@injectivelabs/sdk-ts": "1.10.72", + "@injectivelabs/utils": "1.10.12" + } + }, + "node_modules/@certusone/wormhole-sdk-proto-web": { + "version": "0.0.6", + "license": "Apache-2.0", + "dependencies": { + "@improbable-eng/grpc-web": "^0.15.0", + "protobufjs": "^7.0.0", + "rxjs": "^7.5.6" + } + }, + "node_modules/@certusone/wormhole-sdk-proto-web/node_modules/@improbable-eng/grpc-web": { + "version": "0.15.0", + "license": "Apache-2.0", + "dependencies": { + "browser-headers": "^0.4.1" + }, + "peerDependencies": { + "google-protobuf": "^3.14.0" + } + }, + "node_modules/@certusone/wormhole-sdk-proto-web/node_modules/long": { + "version": "5.2.3", + "license": "Apache-2.0" + }, + "node_modules/@certusone/wormhole-sdk-proto-web/node_modules/protobufjs": { + "version": "7.2.3", + "hasInstallScript": true, + "license": "BSD-3-Clause", + "dependencies": { + "@protobufjs/aspromise": "^1.1.2", + "@protobufjs/base64": "^1.1.2", + "@protobufjs/codegen": "^2.0.4", + "@protobufjs/eventemitter": "^1.1.0", + "@protobufjs/fetch": "^1.1.0", + "@protobufjs/float": "^1.0.2", + "@protobufjs/inquire": "^1.1.0", + "@protobufjs/path": "^1.1.2", + "@protobufjs/pool": "^1.1.0", + "@protobufjs/utf8": "^1.1.0", + "@types/node": ">=13.7.0", + "long": "^5.0.0" + }, + "engines": { + "node": ">=12.0.0" + } + }, + "node_modules/@certusone/wormhole-sdk-wasm": { + "version": "0.0.1", + "license": "Apache-2.0", + "dependencies": { + "@types/long": "^4.0.2", + "@types/node": "^18.0.3" + } + }, + "node_modules/@certusone/wormhole-sdk/node_modules/axios": { + "version": "0.24.0", + "license": "MIT", + "dependencies": { + "follow-redirects": "^1.14.4" + } + }, + "node_modules/@classic-terra/terra.proto": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/@classic-terra/terra.proto/-/terra.proto-1.1.0.tgz", + "integrity": "sha512-bYhQG5LUaGF0KPRY9hYT/HEcd1QExZPQd6zLV/rQkCe/eDxfwFRLzZHpaaAdfWoAAZjsRWqJbUCqCg7gXBbJpw==", + "dependencies": { + "@improbable-eng/grpc-web": "^0.14.1", + "google-protobuf": "^3.17.3", + "long": "^4.0.0", + "protobufjs": "~6.11.2" + } + }, + "node_modules/@confio/ics23": { + "version": "0.6.8", + "resolved": "https://registry.npmjs.org/@confio/ics23/-/ics23-0.6.8.tgz", + "integrity": "sha512-wB6uo+3A50m0sW/EWcU64xpV/8wShZ6bMTa7pF8eYsTrSkQA7oLUIJcs/wb8g4y2Oyq701BaGiO6n/ak5WXO1w==", + "optional": true, + "dependencies": { + "@noble/hashes": "^1.0.0", + "protobufjs": "^6.8.8" + } + }, + "node_modules/@coral-xyz/anchor": { + "version": "0.29.0", + "resolved": "https://registry.npmjs.org/@coral-xyz/anchor/-/anchor-0.29.0.tgz", + "integrity": "sha512-eny6QNG0WOwqV0zQ7cs/b1tIuzZGmP7U7EcH+ogt4Gdbl8HDmIYVMh/9aTmYZPaFWjtUaI8qSn73uYEXWfATdA==", + "dependencies": { + "@coral-xyz/borsh": "^0.29.0", + "@noble/hashes": "^1.3.1", + "@solana/web3.js": "^1.68.0", + "bn.js": "^5.1.2", + "bs58": "^4.0.1", + "buffer-layout": "^1.2.2", + "camelcase": "^6.3.0", + "cross-fetch": "^3.1.5", + "crypto-hash": "^1.3.0", + "eventemitter3": "^4.0.7", + "pako": "^2.0.3", + "snake-case": "^3.0.4", + "superstruct": "^0.15.4", + "toml": "^3.0.0" + }, + "engines": { + "node": ">=11" + } + }, + "node_modules/@coral-xyz/anchor/node_modules/@coral-xyz/borsh": { + "version": "0.29.0", + "resolved": "https://registry.npmjs.org/@coral-xyz/borsh/-/borsh-0.29.0.tgz", + "integrity": "sha512-s7VFVa3a0oqpkuRloWVPdCK7hMbAMY270geZOGfCnaqexrP5dTIpbEHL33req6IYPPJ0hYa71cdvJ1h6V55/oQ==", + "dependencies": { + "bn.js": "^5.1.2", + "buffer-layout": "^1.2.0" + }, + "engines": { + "node": ">=10" + }, + "peerDependencies": { + "@solana/web3.js": "^1.68.0" + } + }, + "node_modules/@coral-xyz/borsh": { + "version": "0.2.6", + "license": "Apache-2.0", + "dependencies": { + "bn.js": "^5.1.2", + "buffer-layout": "^1.2.0" + }, + "engines": { + "node": ">=10" + }, + "peerDependencies": { + "@solana/web3.js": "^1.2.0" + } + }, + "node_modules/@cosmjs/amino": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/amino/-/amino-0.30.1.tgz", + "integrity": "sha512-yNHnzmvAlkETDYIpeCTdVqgvrdt1qgkOXwuRVi8s27UKI5hfqyE9fJ/fuunXE6ZZPnKkjIecDznmuUOMrMvw4w==", + "optional": true, + "dependencies": { + "@cosmjs/crypto": "^0.30.1", + "@cosmjs/encoding": "^0.30.1", + "@cosmjs/math": "^0.30.1", + "@cosmjs/utils": "^0.30.1" + } + }, + "node_modules/@cosmjs/crypto": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/crypto/-/crypto-0.30.1.tgz", + "integrity": "sha512-rAljUlake3MSXs9xAm87mu34GfBLN0h/1uPPV6jEwClWjNkAMotzjC0ab9MARy5FFAvYHL3lWb57bhkbt2GtzQ==", + "optional": true, + "dependencies": { + "@cosmjs/encoding": "^0.30.1", + "@cosmjs/math": "^0.30.1", + "@cosmjs/utils": "^0.30.1", + "@noble/hashes": "^1", + "bn.js": "^5.2.0", + "elliptic": "^6.5.4", + "libsodium-wrappers": "^0.7.6" + } + }, + "node_modules/@cosmjs/encoding": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/encoding/-/encoding-0.30.1.tgz", + "integrity": "sha512-rXmrTbgqwihORwJ3xYhIgQFfMSrwLu1s43RIK9I8EBudPx3KmnmyAKzMOVsRDo9edLFNuZ9GIvysUCwQfq3WlQ==", + "optional": true, + "dependencies": { + "base64-js": "^1.3.0", + "bech32": "^1.1.4", + "readonly-date": "^1.0.0" + } + }, + "node_modules/@cosmjs/encoding/node_modules/bech32": { + "version": "1.1.4", + "resolved": "https://registry.npmjs.org/bech32/-/bech32-1.1.4.tgz", + "integrity": "sha512-s0IrSOzLlbvX7yp4WBfPITzpAU8sqQcpsmwXDiKwrG4r491vwCO/XpejasRNl0piBMe/DvP4Tz0mIS/X1DPJBQ==", + "optional": true + }, + "node_modules/@cosmjs/json-rpc": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/json-rpc/-/json-rpc-0.30.1.tgz", + "integrity": "sha512-pitfC/2YN9t+kXZCbNuyrZ6M8abnCC2n62m+JtU9vQUfaEtVsgy+1Fk4TRQ175+pIWSdBMFi2wT8FWVEE4RhxQ==", + "optional": true, + "dependencies": { + "@cosmjs/stream": "^0.30.1", + "xstream": "^11.14.0" + } + }, + "node_modules/@cosmjs/math": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/math/-/math-0.30.1.tgz", + "integrity": "sha512-yaoeI23pin9ZiPHIisa6qqLngfnBR/25tSaWpkTm8Cy10MX70UF5oN4+/t1heLaM6SSmRrhk3psRkV4+7mH51Q==", + "optional": true, + "dependencies": { + "bn.js": "^5.2.0" + } + }, + "node_modules/@cosmjs/proto-signing": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/proto-signing/-/proto-signing-0.30.1.tgz", + "integrity": "sha512-tXh8pPYXV4aiJVhTKHGyeZekjj+K9s2KKojMB93Gcob2DxUjfKapFYBMJSgfKPuWUPEmyr8Q9km2hplI38ILgQ==", + "optional": true, + "dependencies": { + "@cosmjs/amino": "^0.30.1", + "@cosmjs/crypto": "^0.30.1", + "@cosmjs/encoding": "^0.30.1", + "@cosmjs/math": "^0.30.1", + "@cosmjs/utils": "^0.30.1", + "cosmjs-types": "^0.7.1", + "long": "^4.0.0" + } + }, + "node_modules/@cosmjs/socket": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/socket/-/socket-0.30.1.tgz", + "integrity": "sha512-r6MpDL+9N+qOS/D5VaxnPaMJ3flwQ36G+vPvYJsXArj93BjgyFB7BwWwXCQDzZ+23cfChPUfhbINOenr8N2Kow==", + "optional": true, + "dependencies": { + "@cosmjs/stream": "^0.30.1", + "isomorphic-ws": "^4.0.1", + "ws": "^7", + "xstream": "^11.14.0" + } + }, + "node_modules/@cosmjs/stargate": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/stargate/-/stargate-0.30.1.tgz", + "integrity": "sha512-RdbYKZCGOH8gWebO7r6WvNnQMxHrNXInY/gPHPzMjbQF6UatA6fNM2G2tdgS5j5u7FTqlCI10stNXrknaNdzog==", + "optional": true, + "dependencies": { + "@confio/ics23": "^0.6.8", + "@cosmjs/amino": "^0.30.1", + "@cosmjs/encoding": "^0.30.1", + "@cosmjs/math": "^0.30.1", + "@cosmjs/proto-signing": "^0.30.1", + "@cosmjs/stream": "^0.30.1", + "@cosmjs/tendermint-rpc": "^0.30.1", + "@cosmjs/utils": "^0.30.1", + "cosmjs-types": "^0.7.1", + "long": "^4.0.0", + "protobufjs": "~6.11.3", + "xstream": "^11.14.0" + } + }, + "node_modules/@cosmjs/stream": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/stream/-/stream-0.30.1.tgz", + "integrity": "sha512-Fg0pWz1zXQdoxQZpdHRMGvUH5RqS6tPv+j9Eh7Q953UjMlrwZVo0YFLC8OTf/HKVf10E4i0u6aM8D69Q6cNkgQ==", + "optional": true, + "dependencies": { + "xstream": "^11.14.0" + } + }, + "node_modules/@cosmjs/tendermint-rpc": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/tendermint-rpc/-/tendermint-rpc-0.30.1.tgz", + "integrity": "sha512-Z3nCwhXSbPZJ++v85zHObeUggrEHVfm1u18ZRwXxFE9ZMl5mXTybnwYhczuYOl7KRskgwlB+rID0WYACxj4wdQ==", + "optional": true, + "dependencies": { + "@cosmjs/crypto": "^0.30.1", + "@cosmjs/encoding": "^0.30.1", + "@cosmjs/json-rpc": "^0.30.1", + "@cosmjs/math": "^0.30.1", + "@cosmjs/socket": "^0.30.1", + "@cosmjs/stream": "^0.30.1", + "@cosmjs/utils": "^0.30.1", + "axios": "^0.21.2", + "readonly-date": "^1.0.0", + "xstream": "^11.14.0" + } + }, + "node_modules/@cosmjs/tendermint-rpc/node_modules/axios": { + "version": "0.21.4", + "resolved": "https://registry.npmjs.org/axios/-/axios-0.21.4.tgz", + "integrity": "sha512-ut5vewkiu8jjGBdqpM44XxjuCjq9LAKeHVmoVfHVzy8eHgxxq8SbAVQNovDA8mVi05kP0Ea/n/UzcSHcTJQfNg==", + "optional": true, + "dependencies": { + "follow-redirects": "^1.14.0" + } + }, + "node_modules/@cosmjs/utils": { + "version": "0.30.1", + "resolved": "https://registry.npmjs.org/@cosmjs/utils/-/utils-0.30.1.tgz", + "integrity": "sha512-KvvX58MGMWh7xA+N+deCfunkA/ZNDvFLw4YbOmX3f/XBIkqrVY7qlotfy2aNb1kgp6h4B6Yc8YawJPDTfvWX7g==", + "optional": true + }, + "node_modules/@ethereumjs/common": { + "version": "2.6.5", + "resolved": "https://registry.npmjs.org/@ethereumjs/common/-/common-2.6.5.tgz", + "integrity": "sha512-lRyVQOeCDaIVtgfbowla32pzeDv2Obr8oR8Put5RdUBNRGr1VGPGQNGP6elWIpgK3YdpzqTOh4GyUGOureVeeA==", + "optional": true, + "dependencies": { + "crc-32": "^1.2.0", + "ethereumjs-util": "^7.1.5" + } + }, + "node_modules/@ethereumjs/tx": { + "version": "3.5.2", + "resolved": "https://registry.npmjs.org/@ethereumjs/tx/-/tx-3.5.2.tgz", + "integrity": "sha512-gQDNJWKrSDGu2w7w0PzVXVBNMzb7wwdDOmOqczmhNjqFxFuIbhVJDwiGEnxFNC2/b8ifcZzY7MLcluizohRzNw==", + "optional": true, + "dependencies": { + "@ethereumjs/common": "^2.6.4", + "ethereumjs-util": "^7.1.5" + } + }, + "node_modules/@ethersproject/abi": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/address": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/constants": "^5.7.0", + "@ethersproject/hash": "^5.7.0", + "@ethersproject/keccak256": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/strings": "^5.7.0" + } + }, + "node_modules/@ethersproject/abstract-provider": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/networks": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/transactions": "^5.7.0", + "@ethersproject/web": "^5.7.0" + } + }, + "node_modules/@ethersproject/abstract-signer": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abstract-provider": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0" + } + }, + "node_modules/@ethersproject/address": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/keccak256": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/rlp": "^5.7.0" + } + }, + "node_modules/@ethersproject/base64": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0" + } + }, + "node_modules/@ethersproject/basex": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/properties": "^5.7.0" + } + }, + "node_modules/@ethersproject/bignumber": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "bn.js": "^5.2.1" + } + }, + "node_modules/@ethersproject/bytes": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/logger": "^5.7.0" + } + }, + "node_modules/@ethersproject/constants": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bignumber": "^5.7.0" + } + }, + "node_modules/@ethersproject/contracts": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abi": "^5.7.0", + "@ethersproject/abstract-provider": "^5.7.0", + "@ethersproject/abstract-signer": "^5.7.0", + "@ethersproject/address": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/constants": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/transactions": "^5.7.0" + } + }, + "node_modules/@ethersproject/hash": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abstract-signer": "^5.7.0", + "@ethersproject/address": "^5.7.0", + "@ethersproject/base64": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/keccak256": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/strings": "^5.7.0" + } + }, + "node_modules/@ethersproject/hdnode": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abstract-signer": "^5.7.0", + "@ethersproject/basex": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/pbkdf2": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/sha2": "^5.7.0", + "@ethersproject/signing-key": "^5.7.0", + "@ethersproject/strings": "^5.7.0", + "@ethersproject/transactions": "^5.7.0", + "@ethersproject/wordlists": "^5.7.0" + } + }, + "node_modules/@ethersproject/json-wallets": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abstract-signer": "^5.7.0", + "@ethersproject/address": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/hdnode": "^5.7.0", + "@ethersproject/keccak256": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/pbkdf2": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/random": "^5.7.0", + "@ethersproject/strings": "^5.7.0", + "@ethersproject/transactions": "^5.7.0", + "aes-js": "3.0.0", + "scrypt-js": "3.0.1" + } + }, + "node_modules/@ethersproject/keccak256": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "js-sha3": "0.8.0" + } + }, + "node_modules/@ethersproject/logger": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT" + }, + "node_modules/@ethersproject/networks": { + "version": "5.7.1", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/logger": "^5.7.0" + } + }, + "node_modules/@ethersproject/pbkdf2": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/sha2": "^5.7.0" + } + }, + "node_modules/@ethersproject/properties": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/logger": "^5.7.0" + } + }, + "node_modules/@ethersproject/providers": { + "version": "5.7.2", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abstract-provider": "^5.7.0", + "@ethersproject/abstract-signer": "^5.7.0", + "@ethersproject/address": "^5.7.0", + "@ethersproject/base64": "^5.7.0", + "@ethersproject/basex": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/constants": "^5.7.0", + "@ethersproject/hash": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/networks": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/random": "^5.7.0", + "@ethersproject/rlp": "^5.7.0", + "@ethersproject/sha2": "^5.7.0", + "@ethersproject/strings": "^5.7.0", + "@ethersproject/transactions": "^5.7.0", + "@ethersproject/web": "^5.7.0", + "bech32": "1.1.4", + "ws": "7.4.6" + } + }, + "node_modules/@ethersproject/providers/node_modules/bech32": { + "version": "1.1.4", + "license": "MIT" + }, + "node_modules/@ethersproject/providers/node_modules/ws": { + "version": "7.4.6", + "license": "MIT", + "engines": { + "node": ">=8.3.0" + }, + "peerDependencies": { + "bufferutil": "^4.0.1", + "utf-8-validate": "^5.0.2" + }, + "peerDependenciesMeta": { + "bufferutil": { + "optional": true + }, + "utf-8-validate": { + "optional": true + } + } + }, + "node_modules/@ethersproject/random": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0" + } + }, + "node_modules/@ethersproject/rlp": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0" + } + }, + "node_modules/@ethersproject/sha2": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "hash.js": "1.1.7" + } + }, + "node_modules/@ethersproject/signing-key": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "bn.js": "^5.2.1", + "elliptic": "6.5.4", + "hash.js": "1.1.7" + } + }, + "node_modules/@ethersproject/solidity": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/keccak256": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/sha2": "^5.7.0", + "@ethersproject/strings": "^5.7.0" + } + }, + "node_modules/@ethersproject/strings": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/constants": "^5.7.0", + "@ethersproject/logger": "^5.7.0" + } + }, + "node_modules/@ethersproject/transactions": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/address": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/constants": "^5.7.0", + "@ethersproject/keccak256": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/rlp": "^5.7.0", + "@ethersproject/signing-key": "^5.7.0" + } + }, + "node_modules/@ethersproject/units": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/constants": "^5.7.0", + "@ethersproject/logger": "^5.7.0" + } + }, + "node_modules/@ethersproject/wallet": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abstract-provider": "^5.7.0", + "@ethersproject/abstract-signer": "^5.7.0", + "@ethersproject/address": "^5.7.0", + "@ethersproject/bignumber": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/hash": "^5.7.0", + "@ethersproject/hdnode": "^5.7.0", + "@ethersproject/json-wallets": "^5.7.0", + "@ethersproject/keccak256": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/random": "^5.7.0", + "@ethersproject/signing-key": "^5.7.0", + "@ethersproject/transactions": "^5.7.0", + "@ethersproject/wordlists": "^5.7.0" + } + }, + "node_modules/@ethersproject/web": { + "version": "5.7.1", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/base64": "^5.7.0", + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/strings": "^5.7.0" + } + }, + "node_modules/@ethersproject/wordlists": { + "version": "5.7.0", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.7.0", + "@ethersproject/hash": "^5.7.0", + "@ethersproject/logger": "^5.7.0", + "@ethersproject/properties": "^5.7.0", + "@ethersproject/strings": "^5.7.0" + } + }, + "node_modules/@graphql-typed-document-node/core": { + "version": "3.2.0", + "resolved": "https://registry.npmjs.org/@graphql-typed-document-node/core/-/core-3.2.0.tgz", + "integrity": "sha512-mB9oAsNCm9aM3/SOv4YtBMqZbYj10R7dkq8byBqxGY/ncFwhf2oQzMV+LCRlWoDSEBJ3COiR1yeDvMtsoOsuFQ==", + "optional": true, + "peerDependencies": { + "graphql": "^0.8.0 || ^0.9.0 || ^0.10.0 || ^0.11.0 || ^0.12.0 || ^0.13.0 || ^14.0.0 || ^15.0.0 || ^16.0.0 || ^17.0.0" + } + }, + "node_modules/@improbable-eng/grpc-web": { + "version": "0.14.1", + "license": "Apache-2.0", + "dependencies": { + "browser-headers": "^0.4.1" + }, + "peerDependencies": { + "google-protobuf": "^3.14.0" + } + }, + "node_modules/@injectivelabs/core-proto-ts": { + "version": "0.0.14", + "resolved": "https://registry.npmjs.org/@injectivelabs/core-proto-ts/-/core-proto-ts-0.0.14.tgz", + "integrity": "sha512-NZWlgBzgVrXow9IknFQHvcYKX4QkUD25taRigoNYQK8PDn4+VXd9xM5WFUDRhzm2smTCguyl/+MghpEp4oTPWw==", + "optional": true, + "dependencies": { + "@injectivelabs/grpc-web": "^0.0.1", + "google-protobuf": "^3.14.0", + "protobufjs": "^7.0.0", + "rxjs": "^7.4.0" + } + }, + "node_modules/@injectivelabs/core-proto-ts/node_modules/long": { + "version": "5.2.3", + "resolved": "https://registry.npmjs.org/long/-/long-5.2.3.tgz", + "integrity": "sha512-lcHwpNoggQTObv5apGNCTdJrO69eHOZMi4BNC+rTLER8iHAqGrUVeLh/irVIM7zTw2bOXA8T6uNPeujwOLg/2Q==", + "optional": true + }, + "node_modules/@injectivelabs/core-proto-ts/node_modules/protobufjs": { + "version": "7.2.5", + "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.5.tgz", + "integrity": "sha512-gGXRSXvxQ7UiPgfw8gevrfRWcTlSbOFg+p/N+JVJEK5VhueL2miT6qTymqAmjr1Q5WbOCyJbyrk6JfWKwlFn6A==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@protobufjs/aspromise": "^1.1.2", + "@protobufjs/base64": "^1.1.2", + "@protobufjs/codegen": "^2.0.4", + "@protobufjs/eventemitter": "^1.1.0", + "@protobufjs/fetch": "^1.1.0", + "@protobufjs/float": "^1.0.2", + "@protobufjs/inquire": "^1.1.0", + "@protobufjs/path": "^1.1.2", + "@protobufjs/pool": "^1.1.0", + "@protobufjs/utf8": "^1.1.0", + "@types/node": ">=13.7.0", + "long": "^5.0.0" + }, + "engines": { + "node": ">=12.0.0" + } + }, + "node_modules/@injectivelabs/exceptions": { + "version": "1.14.4", + "resolved": "https://registry.npmjs.org/@injectivelabs/exceptions/-/exceptions-1.14.4.tgz", + "integrity": "sha512-mJVzDsw+anL85NzXl0l1Ortk7MEgHdD5EQwFp/XaI1U3cupsHKUfHpAuXjggD+XQVFeWoYOFzk4CJPCBgz6u+w==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@injectivelabs/grpc-web": "^0.0.1", + "@injectivelabs/ts-types": "^1.14.4", + "http-status-codes": "^2.2.0", + "link-module-alias": "^1.2.0", + "shx": "^0.3.2" + } + }, + "node_modules/@injectivelabs/grpc-web": { + "version": "0.0.1", + "resolved": "https://registry.npmjs.org/@injectivelabs/grpc-web/-/grpc-web-0.0.1.tgz", + "integrity": "sha512-Pu5YgaZp+OvR5UWfqbrPdHer3+gDf+b5fQoY+t2VZx1IAVHX8bzbN9EreYTvTYtFeDpYRWM8P7app2u4EX5wTw==", + "optional": true, + "dependencies": { + "browser-headers": "^0.4.1" + }, + "peerDependencies": { + "google-protobuf": "^3.14.0" + } + }, + "node_modules/@injectivelabs/grpc-web-node-http-transport": { + "version": "0.0.2", + "resolved": "https://registry.npmjs.org/@injectivelabs/grpc-web-node-http-transport/-/grpc-web-node-http-transport-0.0.2.tgz", + "integrity": "sha512-rpyhXLiGY/UMs6v6YmgWHJHiO9l0AgDyVNv+jcutNVt4tQrmNvnpvz2wCAGOFtq5LuX/E9ChtTVpk3gWGqXcGA==", + "optional": true, + "peerDependencies": { + "@injectivelabs/grpc-web": ">=0.0.1" + } + }, + "node_modules/@injectivelabs/grpc-web-react-native-transport": { + "version": "0.0.2", + "resolved": "https://registry.npmjs.org/@injectivelabs/grpc-web-react-native-transport/-/grpc-web-react-native-transport-0.0.2.tgz", + "integrity": "sha512-mk+aukQXnYNgPsPnu3KBi+FD0ZHQpazIlaBZ2jNZG7QAVmxTWtv3R66Zoq99Wx2dnE946NsZBYAoa0K5oSjnow==", + "optional": true, + "peerDependencies": { + "@injectivelabs/grpc-web": ">=0.0.1" + } + }, + "node_modules/@injectivelabs/indexer-proto-ts": { + "version": "1.10.8-rc.4", + "resolved": "https://registry.npmjs.org/@injectivelabs/indexer-proto-ts/-/indexer-proto-ts-1.10.8-rc.4.tgz", + "integrity": "sha512-IwbepTfsHHAv3Z36As6yH/+HIplOEpUu6SFHBCVgdSIaQ8GuvTib4HETiVnV4mjYqoyVgWs+zLSAfih46rdMJQ==", + "optional": true, + "dependencies": { + "@injectivelabs/grpc-web": "^0.0.1", + "google-protobuf": "^3.14.0", + "protobufjs": "^7.0.0", + "rxjs": "^7.4.0" + } + }, + "node_modules/@injectivelabs/indexer-proto-ts/node_modules/long": { + "version": "5.2.3", + "resolved": "https://registry.npmjs.org/long/-/long-5.2.3.tgz", + "integrity": "sha512-lcHwpNoggQTObv5apGNCTdJrO69eHOZMi4BNC+rTLER8iHAqGrUVeLh/irVIM7zTw2bOXA8T6uNPeujwOLg/2Q==", + "optional": true + }, + "node_modules/@injectivelabs/indexer-proto-ts/node_modules/protobufjs": { + "version": "7.2.5", + "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.5.tgz", + "integrity": "sha512-gGXRSXvxQ7UiPgfw8gevrfRWcTlSbOFg+p/N+JVJEK5VhueL2miT6qTymqAmjr1Q5WbOCyJbyrk6JfWKwlFn6A==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@protobufjs/aspromise": "^1.1.2", + "@protobufjs/base64": "^1.1.2", + "@protobufjs/codegen": "^2.0.4", + "@protobufjs/eventemitter": "^1.1.0", + "@protobufjs/fetch": "^1.1.0", + "@protobufjs/float": "^1.0.2", + "@protobufjs/inquire": "^1.1.0", + "@protobufjs/path": "^1.1.2", + "@protobufjs/pool": "^1.1.0", + "@protobufjs/utf8": "^1.1.0", + "@types/node": ">=13.7.0", + "long": "^5.0.0" + }, + "engines": { + "node": ">=12.0.0" + } + }, + "node_modules/@injectivelabs/mito-proto-ts": { + "version": "1.0.9", + "resolved": "https://registry.npmjs.org/@injectivelabs/mito-proto-ts/-/mito-proto-ts-1.0.9.tgz", + "integrity": "sha512-+TZMvJ4SHwcn6SFPdqaiQFZdNhjH7hyRFozY15nOTC2utdGij9jEsjz1NsyOejfYDA0s1z5Wm1SgrMYKaVpAmQ==", + "optional": true, + "dependencies": { + "@injectivelabs/grpc-web": "^0.0.1", + "google-protobuf": "^3.14.0", + "protobufjs": "^7.0.0", + "rxjs": "^7.4.0" + } + }, + "node_modules/@injectivelabs/mito-proto-ts/node_modules/long": { + "version": "5.2.3", + "resolved": "https://registry.npmjs.org/long/-/long-5.2.3.tgz", + "integrity": "sha512-lcHwpNoggQTObv5apGNCTdJrO69eHOZMi4BNC+rTLER8iHAqGrUVeLh/irVIM7zTw2bOXA8T6uNPeujwOLg/2Q==", + "optional": true + }, + "node_modules/@injectivelabs/mito-proto-ts/node_modules/protobufjs": { + "version": "7.2.5", + "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.5.tgz", + "integrity": "sha512-gGXRSXvxQ7UiPgfw8gevrfRWcTlSbOFg+p/N+JVJEK5VhueL2miT6qTymqAmjr1Q5WbOCyJbyrk6JfWKwlFn6A==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@protobufjs/aspromise": "^1.1.2", + "@protobufjs/base64": "^1.1.2", + "@protobufjs/codegen": "^2.0.4", + "@protobufjs/eventemitter": "^1.1.0", + "@protobufjs/fetch": "^1.1.0", + "@protobufjs/float": "^1.0.2", + "@protobufjs/inquire": "^1.1.0", + "@protobufjs/path": "^1.1.2", + "@protobufjs/pool": "^1.1.0", + "@protobufjs/utf8": "^1.1.0", + "@types/node": ">=13.7.0", + "long": "^5.0.0" + }, + "engines": { + "node": ">=12.0.0" + } + }, + "node_modules/@injectivelabs/networks": { + "version": "1.10.12", + "resolved": "https://registry.npmjs.org/@injectivelabs/networks/-/networks-1.10.12.tgz", + "integrity": "sha512-tTHyLls1Nik5QTs/S03qqG2y/ITvNwI8CJOQbMmmsr1CL2CdjJBtzRYn9Dyx2p8XgzRFf9hmlybpe20tq9O3SA==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@injectivelabs/exceptions": "^1.10.12", + "@injectivelabs/ts-types": "^1.10.12", + "@injectivelabs/utils": "^1.10.12", + "link-module-alias": "^1.2.0", + "shx": "^0.3.2" + } + }, + "node_modules/@injectivelabs/sdk-ts": { + "version": "1.10.72", + "resolved": "https://registry.npmjs.org/@injectivelabs/sdk-ts/-/sdk-ts-1.10.72.tgz", + "integrity": "sha512-A5mHNNBgO4fI1c/7CZ0bGfVXliy8laP+VaYZ++aWh1YyudoZw4CTCEmLetZRy7AUU3XcfbHa8sAImRi7db+v6Q==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@apollo/client": "^3.5.8", + "@cosmjs/amino": "^0.30.1", + "@cosmjs/proto-signing": "^0.30.1", + "@cosmjs/stargate": "^0.30.1", + "@ethersproject/bytes": "^5.7.0", + "@injectivelabs/core-proto-ts": "^0.0.14", + "@injectivelabs/exceptions": "^1.10.12", + "@injectivelabs/grpc-web": "^0.0.1", + "@injectivelabs/grpc-web-node-http-transport": "^0.0.2", + "@injectivelabs/grpc-web-react-native-transport": "^0.0.2", + "@injectivelabs/indexer-proto-ts": "1.10.8-rc.4", + "@injectivelabs/mito-proto-ts": "1.0.9", + "@injectivelabs/networks": "^1.10.12", + "@injectivelabs/test-utils": "^1.10.12", + "@injectivelabs/token-metadata": "^1.10.42", + "@injectivelabs/ts-types": "^1.10.12", + "@injectivelabs/utils": "^1.10.12", + "@metamask/eth-sig-util": "^4.0.0", + "axios": "^0.27.2", + "bech32": "^2.0.0", + "bip39": "^3.0.4", + "cosmjs-types": "^0.7.1", + "eth-crypto": "^2.6.0", + "ethereumjs-util": "^7.1.4", + "ethers": "^5.7.2", + "google-protobuf": "^3.21.0", + "graphql": "^16.3.0", + "http-status-codes": "^2.2.0", + "js-sha3": "^0.8.0", + "jscrypto": "^1.0.3", + "keccak256": "^1.0.6", + "link-module-alias": "^1.2.0", + "rxjs": "^7.8.0", + "secp256k1": "^4.0.3", + "shx": "^0.3.2", + "snakecase-keys": "^5.4.1" + } + }, + "node_modules/@injectivelabs/test-utils": { + "version": "1.14.3", + "resolved": "https://registry.npmjs.org/@injectivelabs/test-utils/-/test-utils-1.14.3.tgz", + "integrity": "sha512-dVe262sACa7YkRr7mfXx58yI/ieuQqm3IMGq7EMweFKI6Kh2gh8FAM2bsDgm1cGewEIhJ9tWh6OM5uNheeVamg==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "axios": "^0.21.1", + "bignumber.js": "^9.0.1", + "link-module-alias": "^1.2.0", + "shx": "^0.3.2", + "snakecase-keys": "^5.1.2", + "store2": "^2.12.0" + } + }, + "node_modules/@injectivelabs/test-utils/node_modules/axios": { + "version": "0.21.4", + "resolved": "https://registry.npmjs.org/axios/-/axios-0.21.4.tgz", + "integrity": "sha512-ut5vewkiu8jjGBdqpM44XxjuCjq9LAKeHVmoVfHVzy8eHgxxq8SbAVQNovDA8mVi05kP0Ea/n/UzcSHcTJQfNg==", + "optional": true, + "dependencies": { + "follow-redirects": "^1.14.0" + } + }, + "node_modules/@injectivelabs/token-metadata": { + "version": "1.14.4", + "resolved": "https://registry.npmjs.org/@injectivelabs/token-metadata/-/token-metadata-1.14.4.tgz", + "integrity": "sha512-g0jrIFpEdQ4kjUUaMcXWmXWu5owpIGE6GQPj7Gx07kkPTDNDiIfcaHUQ0nzTmcG02h0AhFx1eSpkHZFLSwyG/Q==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@injectivelabs/exceptions": "^1.14.4", + "@injectivelabs/networks": "^1.14.4", + "@injectivelabs/ts-types": "^1.14.4", + "@injectivelabs/utils": "^1.14.4", + "@types/lodash.values": "^4.3.6", + "copyfiles": "^2.4.1", + "jsonschema": "^1.4.0", + "link-module-alias": "^1.2.0", + "lodash": "^4.17.21", + "lodash.values": "^4.3.0", + "shx": "^0.3.2" + } + }, + "node_modules/@injectivelabs/token-metadata/node_modules/@injectivelabs/networks": { + "version": "1.14.4", + "resolved": "https://registry.npmjs.org/@injectivelabs/networks/-/networks-1.14.4.tgz", + "integrity": "sha512-2DbbaiI/v5PY+X90zhFMstVcVokpxEytMWZZvRKls6YqSBERhE3lxUF696lk0TEecfZ37CikuxZ7E9hx+eXg2A==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@injectivelabs/exceptions": "^1.14.4", + "@injectivelabs/ts-types": "^1.14.4", + "@injectivelabs/utils": "^1.14.4", + "link-module-alias": "^1.2.0", + "shx": "^0.3.2" + } + }, + "node_modules/@injectivelabs/token-metadata/node_modules/@injectivelabs/utils": { + "version": "1.14.4", + "resolved": "https://registry.npmjs.org/@injectivelabs/utils/-/utils-1.14.4.tgz", + "integrity": "sha512-eyx6XpgqdmEhEhdwNT4zEDYx+wXOhW01foCGC6e0Dmmrcxv5Bjd+R2BuLopKJ9h22OYNJm6dAX3ZtcoFwpFYbQ==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@injectivelabs/exceptions": "^1.14.4", + "@injectivelabs/ts-types": "^1.14.4", + "axios": "^0.21.1", + "bignumber.js": "^9.0.1", + "http-status-codes": "^2.2.0", + "link-module-alias": "^1.2.0", + "shx": "^0.3.2", + "snakecase-keys": "^5.1.2", + "store2": "^2.12.0" + } + }, + "node_modules/@injectivelabs/token-metadata/node_modules/axios": { + "version": "0.21.4", + "resolved": "https://registry.npmjs.org/axios/-/axios-0.21.4.tgz", + "integrity": "sha512-ut5vewkiu8jjGBdqpM44XxjuCjq9LAKeHVmoVfHVzy8eHgxxq8SbAVQNovDA8mVi05kP0Ea/n/UzcSHcTJQfNg==", + "optional": true, + "dependencies": { + "follow-redirects": "^1.14.0" + } + }, + "node_modules/@injectivelabs/ts-types": { + "version": "1.14.4", + "resolved": "https://registry.npmjs.org/@injectivelabs/ts-types/-/ts-types-1.14.4.tgz", + "integrity": "sha512-c8g81bdrOQoi6S1CbeERRifkwNhjyLWB8lmF7liwRnPjyDciVHfHjikZjVWFLS9tJegNm44N9PWsM4RN9g0rXQ==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "link-module-alias": "^1.2.0", + "shx": "^0.3.2" + } + }, + "node_modules/@injectivelabs/utils": { + "version": "1.10.12", + "resolved": "https://registry.npmjs.org/@injectivelabs/utils/-/utils-1.10.12.tgz", + "integrity": "sha512-c8al79nxIJgV1cBAdW2TPDGldj/8gm5k0h5TIN/AJs8/AeIjpTwwVGfLY3QvPOpRsxuQ9CjBkTXrAcSL1wwkcw==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "@injectivelabs/exceptions": "^1.10.12", + "@injectivelabs/ts-types": "^1.10.12", + "axios": "^0.21.1", + "bignumber.js": "^9.0.1", + "http-status-codes": "^2.2.0", + "link-module-alias": "^1.2.0", + "shx": "^0.3.2", + "snakecase-keys": "^5.1.2", + "store2": "^2.12.0" + } + }, + "node_modules/@injectivelabs/utils/node_modules/axios": { + "version": "0.21.4", + "resolved": "https://registry.npmjs.org/axios/-/axios-0.21.4.tgz", + "integrity": "sha512-ut5vewkiu8jjGBdqpM44XxjuCjq9LAKeHVmoVfHVzy8eHgxxq8SbAVQNovDA8mVi05kP0Ea/n/UzcSHcTJQfNg==", + "optional": true, + "dependencies": { + "follow-redirects": "^1.14.0" + } + }, + "node_modules/@metamask/eth-sig-util": { + "version": "4.0.1", + "resolved": "https://registry.npmjs.org/@metamask/eth-sig-util/-/eth-sig-util-4.0.1.tgz", + "integrity": "sha512-tghyZKLHZjcdlDqCA3gNZmLeR0XvOE9U1qoQO9ohyAZT6Pya+H9vkBPcsyXytmYLNgVoin7CKCmweo/R43V+tQ==", + "optional": true, + "dependencies": { + "ethereumjs-abi": "^0.6.8", + "ethereumjs-util": "^6.2.1", + "ethjs-util": "^0.1.6", + "tweetnacl": "^1.0.3", + "tweetnacl-util": "^0.15.1" + }, + "engines": { + "node": ">=12.0.0" + } + }, + "node_modules/@metamask/eth-sig-util/node_modules/@types/bn.js": { + "version": "4.11.6", + "resolved": "https://registry.npmjs.org/@types/bn.js/-/bn.js-4.11.6.tgz", + "integrity": "sha512-pqr857jrp2kPuO9uRjZ3PwnJTjoQy+fcdxvBTvHm6dkmEL9q+hDD/2j/0ELOBPtPnS8LjCX0gI9nbl8lVkadpg==", + "optional": true, + "dependencies": { + "@types/node": "*" + } + }, + "node_modules/@metamask/eth-sig-util/node_modules/bn.js": { + "version": "4.12.0", + "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.12.0.tgz", + "integrity": "sha512-c98Bf3tPniI+scsdk237ku1Dc3ujXQTSgyiPUDEOe7tRkhrqridvh8klBv0HCEso1OLOYcHuCv/cS6DNxKH+ZA==", + "optional": true + }, + "node_modules/@metamask/eth-sig-util/node_modules/ethereumjs-util": { + "version": "6.2.1", + "resolved": "https://registry.npmjs.org/ethereumjs-util/-/ethereumjs-util-6.2.1.tgz", + "integrity": "sha512-W2Ktez4L01Vexijrm5EB6w7dg4n/TgpoYU4avuT5T3Vmnw/eCRtiBrJfQYS/DCSvDIOLn2k57GcHdeBcgVxAqw==", + "optional": true, + "dependencies": { + "@types/bn.js": "^4.11.3", + "bn.js": "^4.11.0", + "create-hash": "^1.1.2", + "elliptic": "^6.5.2", + "ethereum-cryptography": "^0.1.3", + "ethjs-util": "0.1.6", + "rlp": "^2.2.3" + } + }, + "node_modules/@mysten/bcs": { + "version": "0.7.1", + "resolved": "https://registry.npmjs.org/@mysten/bcs/-/bcs-0.7.1.tgz", + "integrity": "sha512-wFPb8bkhwrbiStfZMV5rFM7J+umpke59/dNjDp+UYJKykNlW23LCk2ePyEUvGdb62HGJM1jyOJ8g4egE3OmdKA==", + "dependencies": { + "bs58": "^5.0.0" + } + }, + "node_modules/@mysten/bcs/node_modules/base-x": { + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/base-x/-/base-x-4.0.0.tgz", + "integrity": "sha512-FuwxlW4H5kh37X/oW59pwTzzTKRzfrrQwhmyspRM7swOEZcHtDZSCt45U6oKgtuFE+WYPblePMVIPR4RZrh/hw==" + }, + "node_modules/@mysten/bcs/node_modules/bs58": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/bs58/-/bs58-5.0.0.tgz", + "integrity": "sha512-r+ihvQJvahgYT50JD05dyJNKlmmSlMoOGwn1lCcEzanPglg7TxYjioQUYehQ9mAR/+hOSd2jRc/Z2y5UxBymvQ==", + "dependencies": { + "base-x": "^4.0.0" + } + }, + "node_modules/@mysten/sui.js": { + "version": "0.32.2", + "resolved": "https://registry.npmjs.org/@mysten/sui.js/-/sui.js-0.32.2.tgz", + "integrity": "sha512-/Hm4xkGolJhqj8FvQr7QSHDTlxIvL52mtbOao9f75YjrBh7y1Uh9kbJSY7xiTF1NY9sv6p5hUVlYRJuM0Hvn9A==", + "dependencies": { + "@mysten/bcs": "0.7.1", + "@noble/curves": "^1.0.0", + "@noble/hashes": "^1.3.0", + "@scure/bip32": "^1.3.0", + "@scure/bip39": "^1.2.0", + "@suchipi/femver": "^1.0.0", + "jayson": "^4.0.0", + "rpc-websockets": "^7.5.1", + "superstruct": "^1.0.3", + "tweetnacl": "^1.0.3" + }, + "engines": { + "node": ">=16" + } + }, + "node_modules/@mysten/sui.js/node_modules/@scure/bip39": { + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/@scure/bip39/-/bip39-1.2.1.tgz", + "integrity": "sha512-Z3/Fsz1yr904dduJD0NpiyRHhRYHdcnyh73FZWiV+/qhWi83wNJ3NWolYqCEN+ZWsUz2TWwajJggcRE9r1zUYg==", + "dependencies": { + "@noble/hashes": "~1.3.0", + "@scure/base": "~1.1.0" + }, + "funding": { + "url": "https://paulmillr.com/funding/" + } + }, + "node_modules/@mysten/sui.js/node_modules/superstruct": { + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/superstruct/-/superstruct-1.0.3.tgz", + "integrity": "sha512-8iTn3oSS8nRGn+C2pgXSKPI3jmpm6FExNazNpjvqS6ZUJQCej3PUXEKM8NjHBOs54ExM+LPW/FBRhymrdcCiSg==", + "engines": { + "node": ">=14.0.0" + } + }, + "node_modules/@noble/curves": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/@noble/curves/-/curves-1.2.0.tgz", + "integrity": "sha512-oYclrNgRaM9SsBUBVbb8M6DTV7ZHRTKugureoYEncY5c65HOmRzvSiTE3y5CYaPYJA/GVkrhXEoF0M3Ya9PMnw==", + "dependencies": { + "@noble/hashes": "1.3.2" + }, + "funding": { + "url": "https://paulmillr.com/funding/" + } + }, + "node_modules/@noble/hashes": { + "version": "1.3.2", + "resolved": "https://registry.npmjs.org/@noble/hashes/-/hashes-1.3.2.tgz", + "integrity": "sha512-MVC8EAQp7MvEcm30KWENFjgR+Mkmf+D189XJTkFIlwohU5hcBbn1ZkKq7KVTi2Hme3PMGF390DaL52beVrIihQ==", + "engines": { + "node": ">= 16" + }, + "funding": { + "url": "https://paulmillr.com/funding/" + } + }, + "node_modules/@project-serum/anchor": { + "version": "0.25.0", + "license": "(MIT OR Apache-2.0)", + "dependencies": { + "@project-serum/borsh": "^0.2.5", + "@solana/web3.js": "^1.36.0", + "base64-js": "^1.5.1", + "bn.js": "^5.1.2", + "bs58": "^4.0.1", + "buffer-layout": "^1.2.2", + "camelcase": "^5.3.1", + "cross-fetch": "^3.1.5", + "crypto-hash": "^1.3.0", + "eventemitter3": "^4.0.7", + "js-sha256": "^0.9.0", + "pako": "^2.0.3", + "snake-case": "^3.0.4", + "superstruct": "^0.15.4", + "toml": "^3.0.0" + }, + "engines": { + "node": ">=11" + } + }, + "node_modules/@project-serum/anchor/node_modules/camelcase": { + "version": "5.3.1", + "license": "MIT", + "engines": { + "node": ">=6" + } + }, + "node_modules/@project-serum/borsh": { + "version": "0.2.5", + "license": "Apache-2.0", + "dependencies": { + "bn.js": "^5.1.2", + "buffer-layout": "^1.2.0" + }, + "engines": { + "node": ">=10" + }, + "peerDependencies": { + "@solana/web3.js": "^1.2.0" + } + }, + "node_modules/@protobufjs/aspromise": { + "version": "1.1.2", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/base64": { + "version": "1.1.2", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/codegen": { + "version": "2.0.4", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/eventemitter": { + "version": "1.1.0", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/fetch": { + "version": "1.1.0", + "license": "BSD-3-Clause", + "dependencies": { + "@protobufjs/aspromise": "^1.1.1", + "@protobufjs/inquire": "^1.1.0" + } + }, + "node_modules/@protobufjs/float": { + "version": "1.0.2", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/inquire": { + "version": "1.1.0", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/path": { + "version": "1.1.2", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/pool": { + "version": "1.1.0", + "license": "BSD-3-Clause" + }, + "node_modules/@protobufjs/utf8": { + "version": "1.1.0", + "license": "BSD-3-Clause" + }, + "node_modules/@scure/base": { + "version": "1.1.3", + "resolved": "https://registry.npmjs.org/@scure/base/-/base-1.1.3.tgz", + "integrity": "sha512-/+SgoRjLq7Xlf0CWuLHq2LUZeL/w65kfzAPG5NH9pcmBhs+nunQTn4gvdwgMTIXnt9b2C/1SeL2XiysZEyIC9Q==", + "funding": { + "url": "https://paulmillr.com/funding/" + } + }, + "node_modules/@scure/bip32": { + "version": "1.3.2", + "resolved": "https://registry.npmjs.org/@scure/bip32/-/bip32-1.3.2.tgz", + "integrity": "sha512-N1ZhksgwD3OBlwTv3R6KFEcPojl/W4ElJOeCZdi+vuI5QmTFwLq3OFf2zd2ROpKvxFdgZ6hUpb0dx9bVNEwYCA==", + "dependencies": { + "@noble/curves": "~1.2.0", + "@noble/hashes": "~1.3.2", + "@scure/base": "~1.1.2" + }, + "funding": { + "url": "https://paulmillr.com/funding/" + } + }, + "node_modules/@scure/bip39": { + "version": "1.1.0", + "funding": [ + { + "type": "individual", + "url": "https://paulmillr.com/funding/" + } + ], + "license": "MIT", + "dependencies": { + "@noble/hashes": "~1.1.1", + "@scure/base": "~1.1.0" + } + }, + "node_modules/@scure/bip39/node_modules/@noble/hashes": { + "version": "1.1.5", + "funding": [ + { + "type": "individual", + "url": "https://paulmillr.com/funding/" + } + ], + "license": "MIT" + }, + "node_modules/@solana/buffer-layout": { + "version": "4.0.1", + "license": "MIT", + "dependencies": { + "buffer": "~6.0.3" + }, + "engines": { + "node": ">=5.10" + } + }, + "node_modules/@solana/buffer-layout-utils": { + "version": "0.2.0", + "license": "Apache-2.0", + "dependencies": { + "@solana/buffer-layout": "^4.0.0", + "@solana/web3.js": "^1.32.0", + "bigint-buffer": "^1.1.5", + "bignumber.js": "^9.0.1" + }, + "engines": { + "node": ">= 10" + } + }, + "node_modules/@solana/spl-token": { + "version": "0.3.9", + "resolved": "https://registry.npmjs.org/@solana/spl-token/-/spl-token-0.3.9.tgz", + "integrity": "sha512-1EXHxKICMnab35MvvY/5DBc/K/uQAOJCYnDZXw83McCAYUAfi+rwq6qfd6MmITmSTEhcfBcl/zYxmW/OSN0RmA==", + "dependencies": { + "@solana/buffer-layout": "^4.0.0", + "@solana/buffer-layout-utils": "^0.2.0", + "buffer": "^6.0.3" + }, + "engines": { + "node": ">=16" + }, + "peerDependencies": { + "@solana/web3.js": "^1.47.4" + } + }, + "node_modules/@solana/web3.js": { + "version": "1.87.6", + "resolved": "https://registry.npmjs.org/@solana/web3.js/-/web3.js-1.87.6.tgz", + "integrity": "sha512-LkqsEBgTZztFiccZZXnawWa8qNCATEqE97/d0vIwjTclmVlc8pBpD1DmjfVHtZ1HS5fZorFlVhXfpwnCNDZfyg==", + "dependencies": { + "@babel/runtime": "^7.23.2", + "@noble/curves": "^1.2.0", + "@noble/hashes": "^1.3.1", + "@solana/buffer-layout": "^4.0.0", + "agentkeepalive": "^4.3.0", + "bigint-buffer": "^1.1.5", + "bn.js": "^5.2.1", + "borsh": "^0.7.0", + "bs58": "^4.0.1", + "buffer": "6.0.3", + "fast-stable-stringify": "^1.0.0", + "jayson": "^4.1.0", + "node-fetch": "^2.6.12", + "rpc-websockets": "^7.5.1", + "superstruct": "^0.14.2" + } + }, + "node_modules/@solana/web3.js/node_modules/superstruct": { + "version": "0.14.2", + "license": "MIT" + }, + "node_modules/@suchipi/femver": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/@suchipi/femver/-/femver-1.0.0.tgz", + "integrity": "sha512-bprE8+K5V+DPX7q2e2K57ImqNBdfGHDIWaGI5xHxZoxbKOuQZn4wzPiUxOAHnsUr3w3xHrWXwN7gnG/iIuEMIg==" + }, + "node_modules/@terra-money/legacy.proto": { + "name": "@terra-money/terra.proto", + "version": "0.1.7", + "license": "Apache-2.0", + "dependencies": { + "google-protobuf": "^3.17.3", + "long": "^4.0.0", + "protobufjs": "~6.11.2" + } + }, + "node_modules/@terra-money/terra.js": { + "version": "3.1.9", + "resolved": "https://registry.npmjs.org/@terra-money/terra.js/-/terra.js-3.1.9.tgz", + "integrity": "sha512-JulSvOHLM56fL7s+cIjIbZeWPBluq883X1soWxA4TG5rKkDythT/DHeLXr3jP5Ld/26VENPSg6lNvK7cEYKpiw==", + "dependencies": { + "@classic-terra/terra.proto": "^1.1.0", + "@terra-money/terra.proto": "^2.1.0", + "axios": "^0.27.2", + "bech32": "^2.0.0", + "bip32": "^2.0.6", + "bip39": "^3.0.3", + "bufferutil": "^4.0.3", + "decimal.js": "^10.2.1", + "jscrypto": "^1.0.1", + "readable-stream": "^3.6.0", + "secp256k1": "^4.0.2", + "tmp": "^0.2.1", + "utf-8-validate": "^5.0.5", + "ws": "^7.5.9" + }, + "engines": { + "node": ">=14" + } + }, + "node_modules/@terra-money/terra.proto": { + "version": "2.1.0", + "license": "Apache-2.0", + "dependencies": { + "@improbable-eng/grpc-web": "^0.14.1", + "google-protobuf": "^3.17.3", + "long": "^4.0.0", + "protobufjs": "~6.11.2" + } + }, + "node_modules/@types/bn.js": { + "version": "5.1.1", + "license": "MIT", + "dependencies": { + "@types/node": "*" + } + }, + "node_modules/@types/chai": { + "version": "4.3.4", + "dev": true, + "license": "MIT" + }, + "node_modules/@types/chai-as-promised": { + "version": "7.1.5", + "dev": true, + "license": "MIT", + "dependencies": { + "@types/chai": "*" + } + }, + "node_modules/@types/connect": { + "version": "3.4.35", + "license": "MIT", + "dependencies": { + "@types/node": "*" + } + }, + "node_modules/@types/json5": { + "version": "0.0.29", + "dev": true, + "license": "MIT", + "optional": true + }, + "node_modules/@types/lodash": { + "version": "4.14.202", + "resolved": "https://registry.npmjs.org/@types/lodash/-/lodash-4.14.202.tgz", + "integrity": "sha512-OvlIYQK9tNneDlS0VN54LLd5uiPCBOp7gS5Z0f1mjoJYBrtStzgmJBxONW3U6OZqdtNzZPmn9BS/7WI7BFFcFQ==", + "optional": true + }, + "node_modules/@types/lodash.values": { + "version": "4.3.9", + "resolved": "https://registry.npmjs.org/@types/lodash.values/-/lodash.values-4.3.9.tgz", + "integrity": "sha512-IJ20OEfqNwm3k8ENwoM3q0yOs4UMpgtD4GqxB4lwBHToGthHWqhyh5DdSgQjioocz0QK2SSBkJfCq95ZTV8BTw==", + "optional": true, + "dependencies": { + "@types/lodash": "*" + } + }, + "node_modules/@types/long": { + "version": "4.0.2", + "license": "MIT" + }, + "node_modules/@types/mocha": { + "version": "10.0.1", + "dev": true, + "license": "MIT" + }, + "node_modules/@types/node": { + "version": "18.16.0", + "license": "MIT" + }, + "node_modules/@types/pbkdf2": { + "version": "3.1.0", + "license": "MIT", + "dependencies": { + "@types/node": "*" + } + }, + "node_modules/@types/secp256k1": { + "version": "4.0.3", + "license": "MIT", + "dependencies": { + "@types/node": "*" + } + }, + "node_modules/@types/ws": { + "version": "7.4.7", + "license": "MIT", + "dependencies": { + "@types/node": "*" + } + }, + "node_modules/@types/yargs": { + "version": "17.0.24", + "dev": true, + "license": "MIT", + "dependencies": { + "@types/yargs-parser": "*" + } + }, + "node_modules/@types/yargs-parser": { + "version": "21.0.0", + "dev": true, + "license": "MIT" + }, + "node_modules/@wry/context": { + "version": "0.7.4", + "resolved": "https://registry.npmjs.org/@wry/context/-/context-0.7.4.tgz", + "integrity": "sha512-jmT7Sb4ZQWI5iyu3lobQxICu2nC/vbUhP0vIdd6tHC9PTfenmRmuIFqktc6GH9cgi+ZHnsLWPvfSvc4DrYmKiQ==", + "optional": true, + "dependencies": { + "tslib": "^2.3.0" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/@wry/equality": { + "version": "0.5.7", + "resolved": "https://registry.npmjs.org/@wry/equality/-/equality-0.5.7.tgz", + "integrity": "sha512-BRFORjsTuQv5gxcXsuDXx6oGRhuVsEGwZy6LOzRRfgu+eSfxbhUQ9L9YtSEIuIjY/o7g3iWFjrc5eSY1GXP2Dw==", + "optional": true, + "dependencies": { + "tslib": "^2.3.0" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/@wry/trie": { + "version": "0.4.3", + "resolved": "https://registry.npmjs.org/@wry/trie/-/trie-0.4.3.tgz", + "integrity": "sha512-I6bHwH0fSf6RqQcnnXLJKhkSXG45MFral3GxPaY4uAl0LYDZM+YDVDAiU9bYwjTuysy1S0IeecWtmq1SZA3M1w==", + "optional": true, + "dependencies": { + "tslib": "^2.3.0" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/@xpla/xpla.js": { + "version": "0.2.3", + "license": "MIT", + "dependencies": { + "@ethersproject/bytes": "^5.6.1", + "@ethersproject/keccak256": "^5.6.1", + "@ethersproject/signing-key": "^5.6.2", + "@terra-money/legacy.proto": "npm:@terra-money/terra.proto@^0.1.7", + "@terra-money/terra.proto": "^2.1.0", + "axios": "^0.26.1", + "bech32": "^2.0.0", + "bip32": "^2.0.6", + "bip39": "^3.0.3", + "bufferutil": "^4.0.3", + "crypto-addr-codec": "^0.1.7", + "decimal.js": "^10.2.1", + "elliptic": "^6.5.4", + "ethereumjs-util": "^7.1.5", + "jscrypto": "^1.0.1", + "readable-stream": "^3.6.0", + "secp256k1": "^4.0.2", + "tmp": "^0.2.1", + "utf-8-validate": "^5.0.5", + "ws": "^7.5.8" + }, + "engines": { + "node": ">=14" + } + }, + "node_modules/@xpla/xpla.js/node_modules/axios": { + "version": "0.26.1", + "license": "MIT", + "dependencies": { + "follow-redirects": "^1.14.8" + } + }, + "node_modules/acorn": { + "version": "7.1.1", + "resolved": "https://registry.npmjs.org/acorn/-/acorn-7.1.1.tgz", + "integrity": "sha512-add7dgA5ppRPxCFJoAGfMDi7PIBXq1RtGo7BhbLaxwrXPOmw8gq48Y9ozT01hUKy9byMjlR20EJhu5zlkErEkg==", + "optional": true, + "bin": { + "acorn": "bin/acorn" + }, + "engines": { + "node": ">=0.4.0" + } + }, + "node_modules/aes-js": { + "version": "3.0.0", + "license": "MIT" + }, + "node_modules/agentkeepalive": { + "version": "4.3.0", + "license": "MIT", + "dependencies": { + "debug": "^4.1.0", + "depd": "^2.0.0", + "humanize-ms": "^1.2.1" + }, + "engines": { + "node": ">= 8.0.0" + } + }, + "node_modules/algo-msgpack-with-bigint": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/algo-msgpack-with-bigint/-/algo-msgpack-with-bigint-2.1.1.tgz", + "integrity": "sha512-F1tGh056XczEaEAqu7s+hlZUDWwOBT70Eq0lfMpBP2YguSQVyxRbprLq5rELXKQOyOaixTWYhMeMQMzP0U5FoQ==", + "engines": { + "node": ">= 10" + } + }, + "node_modules/algosdk": { + "version": "2.7.0", + "resolved": "https://registry.npmjs.org/algosdk/-/algosdk-2.7.0.tgz", + "integrity": "sha512-sBE9lpV7bup3rZ+q2j3JQaFAE9JwZvjWKX00vPlG8e9txctXbgLL56jZhSWZndqhDI9oI+0P4NldkuQIWdrUyg==", + "dependencies": { + "algo-msgpack-with-bigint": "^2.1.1", + "buffer": "^6.0.3", + "hi-base32": "^0.5.1", + "js-sha256": "^0.9.0", + "js-sha3": "^0.8.0", + "js-sha512": "^0.8.0", + "json-bigint": "^1.0.0", + "tweetnacl": "^1.0.3", + "vlq": "^2.0.4" + }, + "engines": { + "node": ">=18.0.0" + } + }, + "node_modules/ansi-colors": { + "version": "4.1.1", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=6" + } + }, + "node_modules/ansi-regex": { + "version": "5.0.1", + "license": "MIT", + "engines": { + "node": ">=8" + } + }, + "node_modules/ansi-styles": { + "version": "4.3.0", + "license": "MIT", + "dependencies": { + "color-convert": "^2.0.1" + }, + "engines": { + "node": ">=8" + }, + "funding": { + "url": "https://github.com/chalk/ansi-styles?sponsor=1" + } + }, + "node_modules/anymatch": { + "version": "3.1.3", + "dev": true, + "license": "ISC", + "dependencies": { + "normalize-path": "^3.0.0", + "picomatch": "^2.0.4" + }, + "engines": { + "node": ">= 8" + } + }, + "node_modules/aptos": { + "version": "1.5.0", + "license": "Apache-2.0", + "dependencies": { + "@noble/hashes": "1.1.3", + "@scure/bip39": "1.1.0", + "axios": "0.27.2", + "form-data": "4.0.0", + "tweetnacl": "1.0.3" + }, + "engines": { + "node": ">=11.0.0" + } + }, + "node_modules/aptos/node_modules/@noble/hashes": { + "version": "1.1.3", + "funding": [ + { + "type": "individual", + "url": "https://paulmillr.com/funding/" + } + ], + "license": "MIT" + }, + "node_modules/argparse": { + "version": "2.0.1", + "dev": true, + "license": "Python-2.0" + }, + "node_modules/arrify": { + "version": "1.0.1", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/assertion-error": { + "version": "1.1.0", + "dev": true, + "license": "MIT", + "engines": { + "node": "*" + } + }, + "node_modules/asynckit": { + "version": "0.4.0", + "license": "MIT" + }, + "node_modules/axios": { + "version": "0.27.2", + "resolved": "https://registry.npmjs.org/axios/-/axios-0.27.2.tgz", + "integrity": "sha512-t+yRIyySRTp/wua5xEr+z1q60QmLq8ABsS5O9Me1AsE5dfKqgnCFzwiCZZ/cGNd1lq4/7akDWMxdhVlucjmnOQ==", + "dependencies": { + "follow-redirects": "^1.14.9", + "form-data": "^4.0.0" + } + }, + "node_modules/balanced-match": { + "version": "1.0.2", + "license": "MIT" + }, + "node_modules/base-x": { + "version": "3.0.9", + "license": "MIT", + "dependencies": { + "safe-buffer": "^5.0.1" + } + }, + "node_modules/base64-js": { + "version": "1.5.1", + "funding": [ + { + "type": "github", + "url": "https://github.com/sponsors/feross" + }, + { + "type": "patreon", + "url": "https://www.patreon.com/feross" + }, + { + "type": "consulting", + "url": "https://feross.org/support" + } + ], + "license": "MIT" + }, + "node_modules/bech32": { + "version": "2.0.0", + "license": "MIT" + }, + "node_modules/big-integer": { + "version": "1.6.36", + "license": "Unlicense", + "engines": { + "node": ">=0.6" + } + }, + "node_modules/bigint-buffer": { + "version": "1.1.5", + "hasInstallScript": true, + "license": "Apache-2.0", + "dependencies": { + "bindings": "^1.3.0" + }, + "engines": { + "node": ">= 10.0.0" + } + }, + "node_modules/bignumber.js": { + "version": "9.1.1", + "license": "MIT", + "engines": { + "node": "*" + } + }, + "node_modules/binary-extensions": { + "version": "2.2.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, + "node_modules/binary-parser": { + "version": "2.2.1", + "license": "MIT", + "engines": { + "node": ">=12" + } + }, + "node_modules/bindings": { + "version": "1.5.0", + "license": "MIT", + "dependencies": { + "file-uri-to-path": "1.0.0" + } + }, + "node_modules/bip32": { + "version": "2.0.6", + "license": "MIT", + "dependencies": { + "@types/node": "10.12.18", + "bs58check": "^2.1.1", + "create-hash": "^1.2.0", + "create-hmac": "^1.1.7", + "tiny-secp256k1": "^1.1.3", + "typeforce": "^1.11.5", + "wif": "^2.0.6" + }, + "engines": { + "node": ">=6.0.0" + } + }, + "node_modules/bip32/node_modules/@types/node": { + "version": "10.12.18", + "license": "MIT" + }, + "node_modules/bip39": { + "version": "3.1.0", + "license": "ISC", + "dependencies": { + "@noble/hashes": "^1.2.0" + } + }, + "node_modules/bip66": { + "version": "1.1.5", + "resolved": "https://registry.npmjs.org/bip66/-/bip66-1.1.5.tgz", + "integrity": "sha512-nemMHz95EmS38a26XbbdxIYj5csHd3RMP3H5bwQknX0WYHF01qhpufP42mLOwVICuH2JmhIhXiWs89MfUGL7Xw==", + "optional": true, + "dependencies": { + "safe-buffer": "^5.0.1" + } + }, + "node_modules/blakejs": { + "version": "1.2.1", + "license": "MIT" + }, + "node_modules/bn.js": { + "version": "5.2.1", + "license": "MIT" + }, + "node_modules/borsh": { + "version": "0.7.0", + "license": "Apache-2.0", + "dependencies": { + "bn.js": "^5.2.0", + "bs58": "^4.0.0", + "text-encoding-utf-8": "^1.0.2" + } + }, + "node_modules/brace-expansion": { + "version": "1.1.11", + "license": "MIT", + "dependencies": { + "balanced-match": "^1.0.0", + "concat-map": "0.0.1" + } + }, + "node_modules/braces": { + "version": "3.0.2", + "dev": true, + "license": "MIT", + "dependencies": { + "fill-range": "^7.0.1" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/brorand": { + "version": "1.1.0", + "license": "MIT" + }, + "node_modules/browser-headers": { + "version": "0.4.1", + "license": "Apache-2.0" + }, + "node_modules/browser-stdout": { + "version": "1.3.1", + "dev": true, + "license": "ISC" + }, + "node_modules/browserify-aes": { + "version": "1.2.0", + "license": "MIT", + "dependencies": { + "buffer-xor": "^1.0.3", + "cipher-base": "^1.0.0", + "create-hash": "^1.1.0", + "evp_bytestokey": "^1.0.3", + "inherits": "^2.0.1", + "safe-buffer": "^5.0.1" + } + }, + "node_modules/bs58": { + "version": "4.0.1", + "license": "MIT", + "dependencies": { + "base-x": "^3.0.2" + } + }, + "node_modules/bs58check": { + "version": "2.1.2", + "license": "MIT", + "dependencies": { + "bs58": "^4.0.0", + "create-hash": "^1.1.0", + "safe-buffer": "^5.1.2" + } + }, + "node_modules/buffer": { + "version": "6.0.3", + "funding": [ + { + "type": "github", + "url": "https://github.com/sponsors/feross" + }, + { + "type": "patreon", + "url": "https://www.patreon.com/feross" + }, + { + "type": "consulting", + "url": "https://feross.org/support" + } + ], + "license": "MIT", + "dependencies": { + "base64-js": "^1.3.1", + "ieee754": "^1.2.1" + } + }, + "node_modules/buffer-from": { + "version": "1.1.2", + "dev": true, + "license": "MIT" + }, + "node_modules/buffer-layout": { + "version": "1.2.2", + "license": "MIT", + "engines": { + "node": ">=4.5" + } + }, + "node_modules/buffer-xor": { + "version": "1.0.3", + "license": "MIT" + }, + "node_modules/bufferutil": { + "version": "4.0.7", + "hasInstallScript": true, + "license": "MIT", + "dependencies": { + "node-gyp-build": "^4.3.0" + }, + "engines": { + "node": ">=6.14.2" + } + }, + "node_modules/camelcase": { + "version": "6.3.0", + "license": "MIT", + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/capability": { + "version": "0.2.5", + "license": "MIT" + }, + "node_modules/chai": { + "version": "4.3.7", + "dev": true, + "license": "MIT", + "dependencies": { + "assertion-error": "^1.1.0", + "check-error": "^1.0.2", + "deep-eql": "^4.1.2", + "get-func-name": "^2.0.0", + "loupe": "^2.3.1", + "pathval": "^1.1.1", + "type-detect": "^4.0.5" + }, + "engines": { + "node": ">=4" + } + }, + "node_modules/chai-as-promised": { + "version": "7.1.1", + "dev": true, + "license": "WTFPL", + "dependencies": { + "check-error": "^1.0.2" + }, + "peerDependencies": { + "chai": ">= 2.1.2 < 5" + } + }, + "node_modules/chalk": { + "version": "4.1.2", + "dev": true, + "license": "MIT", + "dependencies": { + "ansi-styles": "^4.1.0", + "supports-color": "^7.1.0" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/chalk/chalk?sponsor=1" + } + }, + "node_modules/chalk/node_modules/supports-color": { + "version": "7.2.0", + "dev": true, + "license": "MIT", + "dependencies": { + "has-flag": "^4.0.0" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/check-error": { + "version": "1.0.2", + "dev": true, + "license": "MIT", + "engines": { + "node": "*" + } + }, + "node_modules/chokidar": { + "version": "3.5.3", + "dev": true, + "funding": [ + { + "type": "individual", + "url": "https://paulmillr.com/funding/" + } + ], + "license": "MIT", + "dependencies": { + "anymatch": "~3.1.2", + "braces": "~3.0.2", + "glob-parent": "~5.1.2", + "is-binary-path": "~2.1.0", + "is-glob": "~4.0.1", + "normalize-path": "~3.0.0", + "readdirp": "~3.6.0" + }, + "engines": { + "node": ">= 8.10.0" + }, + "optionalDependencies": { + "fsevents": "~2.3.2" + } + }, + "node_modules/cipher-base": { + "version": "1.0.4", + "license": "MIT", + "dependencies": { + "inherits": "^2.0.1", + "safe-buffer": "^5.0.1" + } + }, + "node_modules/cliui": { + "version": "8.0.1", + "license": "ISC", + "dependencies": { + "string-width": "^4.2.0", + "strip-ansi": "^6.0.1", + "wrap-ansi": "^7.0.0" + }, + "engines": { + "node": ">=12" + } + }, + "node_modules/color-convert": { + "version": "2.0.1", + "license": "MIT", + "dependencies": { + "color-name": "~1.1.4" + }, + "engines": { + "node": ">=7.0.0" + } + }, + "node_modules/color-name": { + "version": "1.1.4", + "license": "MIT" + }, + "node_modules/combined-stream": { + "version": "1.0.8", + "license": "MIT", + "dependencies": { + "delayed-stream": "~1.0.0" + }, + "engines": { + "node": ">= 0.8" + } + }, + "node_modules/commander": { + "version": "2.20.3", + "resolved": "https://registry.npmjs.org/commander/-/commander-2.20.3.tgz", + "integrity": "sha512-GpVkmM8vF2vQUkj2LvZmD35JxeJOLCwJ9cUkugyk2nuhbv3+mJvpLYYt+0+USMxE+oj+ey/lJEnhZw75x/OMcQ==" + }, + "node_modules/concat-map": { + "version": "0.0.1", + "license": "MIT" + }, + "node_modules/copyfiles": { + "version": "2.4.1", + "resolved": "https://registry.npmjs.org/copyfiles/-/copyfiles-2.4.1.tgz", + "integrity": "sha512-fereAvAvxDrQDOXybk3Qu3dPbOoKoysFMWtkY3mv5BsL8//OSZVL5DCLYqgRfY5cWirgRzlC+WSrxp6Bo3eNZg==", + "optional": true, + "dependencies": { + "glob": "^7.0.5", + "minimatch": "^3.0.3", + "mkdirp": "^1.0.4", + "noms": "0.0.0", + "through2": "^2.0.1", + "untildify": "^4.0.0", + "yargs": "^16.1.0" + }, + "bin": { + "copyfiles": "copyfiles", + "copyup": "copyfiles" + } + }, + "node_modules/copyfiles/node_modules/cliui": { + "version": "7.0.4", + "resolved": "https://registry.npmjs.org/cliui/-/cliui-7.0.4.tgz", + "integrity": "sha512-OcRE68cOsVMXp1Yvonl/fzkQOyjLSu/8bhPDfQt0e0/Eb283TKP20Fs2MqoPsr9SwA595rRCA+QMzYc9nBP+JQ==", + "optional": true, + "dependencies": { + "string-width": "^4.2.0", + "strip-ansi": "^6.0.0", + "wrap-ansi": "^7.0.0" + } + }, + "node_modules/copyfiles/node_modules/mkdirp": { + "version": "1.0.4", + "resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-1.0.4.tgz", + "integrity": "sha512-vVqVZQyf3WLx2Shd0qJ9xuvqgAyKPLAiqITEtqW0oIUjzo3PePDd6fW9iFz30ef7Ysp/oiWqbhszeGWW2T6Gzw==", + "optional": true, + "bin": { + "mkdirp": "bin/cmd.js" + }, + "engines": { + "node": ">=10" + } + }, + "node_modules/copyfiles/node_modules/yargs": { + "version": "16.2.0", + "resolved": "https://registry.npmjs.org/yargs/-/yargs-16.2.0.tgz", + "integrity": "sha512-D1mvvtDG0L5ft/jGWkLpG1+m0eQxOfaBvTNELraWj22wSVUMWxZUvYgJYcKh6jGGIkJFhH4IZPQhR4TKpc8mBw==", + "optional": true, + "dependencies": { + "cliui": "^7.0.2", + "escalade": "^3.1.1", + "get-caller-file": "^2.0.5", + "require-directory": "^2.1.1", + "string-width": "^4.2.0", + "y18n": "^5.0.5", + "yargs-parser": "^20.2.2" + }, + "engines": { + "node": ">=10" + } + }, + "node_modules/core-util-is": { + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/core-util-is/-/core-util-is-1.0.3.tgz", + "integrity": "sha512-ZQBvi1DcpJ4GDqanjucZ2Hj3wEO5pZDS89BWbkcrvdxksJorwUDDZamX9ldFkp9aw2lmBDLgkObEA4DWNJ9FYQ==", + "optional": true + }, + "node_modules/cosmjs-types": { + "version": "0.7.2", + "resolved": "https://registry.npmjs.org/cosmjs-types/-/cosmjs-types-0.7.2.tgz", + "integrity": "sha512-vf2uLyktjr/XVAgEq0DjMxeAWh1yYREe7AMHDKd7EiHVqxBPCaBS+qEEQUkXbR9ndnckqr1sUG8BQhazh4X5lA==", + "optional": true, + "dependencies": { + "long": "^4.0.0", + "protobufjs": "~6.11.2" + } + }, + "node_modules/crc-32": { + "version": "1.2.2", + "resolved": "https://registry.npmjs.org/crc-32/-/crc-32-1.2.2.tgz", + "integrity": "sha512-ROmzCKrTnOwybPcJApAA6WBWij23HVfGVNKqqrZpuyZOHqK2CwHSvpGuyt/UNNvaIjEd8X5IFGp4Mh+Ie1IHJQ==", + "optional": true, + "bin": { + "crc32": "bin/crc32.njs" + }, + "engines": { + "node": ">=0.8" + } + }, + "node_modules/create-hash": { + "version": "1.2.0", + "license": "MIT", + "dependencies": { + "cipher-base": "^1.0.1", + "inherits": "^2.0.1", + "md5.js": "^1.3.4", + "ripemd160": "^2.0.1", + "sha.js": "^2.4.0" + } + }, + "node_modules/create-hmac": { + "version": "1.1.7", + "license": "MIT", + "dependencies": { + "cipher-base": "^1.0.3", + "create-hash": "^1.1.0", + "inherits": "^2.0.1", + "ripemd160": "^2.0.0", + "safe-buffer": "^5.0.1", + "sha.js": "^2.4.8" + } + }, + "node_modules/cross-fetch": { + "version": "3.1.5", + "license": "MIT", + "dependencies": { + "node-fetch": "2.6.7" + } + }, + "node_modules/cross-fetch/node_modules/node-fetch": { + "version": "2.6.7", + "license": "MIT", + "dependencies": { + "whatwg-url": "^5.0.0" + }, + "engines": { + "node": "4.x || >=6.0.0" + }, + "peerDependencies": { + "encoding": "^0.1.0" + }, + "peerDependenciesMeta": { + "encoding": { + "optional": true + } + } + }, + "node_modules/crypto-addr-codec": { + "version": "0.1.7", + "license": "MIT", + "dependencies": { + "base-x": "^3.0.8", + "big-integer": "1.6.36", + "blakejs": "^1.1.0", + "bs58": "^4.0.1", + "ripemd160-min": "0.0.6", + "safe-buffer": "^5.2.0", + "sha3": "^2.1.1" + } + }, + "node_modules/crypto-hash": { + "version": "1.3.0", + "license": "MIT", + "engines": { + "node": ">=8" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/debug": { + "version": "4.3.4", + "license": "MIT", + "dependencies": { + "ms": "2.1.2" + }, + "engines": { + "node": ">=6.0" + }, + "peerDependenciesMeta": { + "supports-color": { + "optional": true + } + } + }, + "node_modules/debug/node_modules/ms": { + "version": "2.1.2", + "license": "MIT" + }, + "node_modules/decamelize": { + "version": "4.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/decimal.js": { + "version": "10.4.3", + "license": "MIT" + }, + "node_modules/deep-eql": { + "version": "4.1.3", + "dev": true, + "license": "MIT", + "dependencies": { + "type-detect": "^4.0.0" + }, + "engines": { + "node": ">=6" + } + }, + "node_modules/define-data-property": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/define-data-property/-/define-data-property-1.1.1.tgz", + "integrity": "sha512-E7uGkTzkk1d0ByLeSc6ZsFS79Axg+m1P/VsgYsxHgiuc3tFSj+MjMIwe90FC4lOAZzNBdY7kkO2P2wKdsQ1vgQ==", + "optional": true, + "dependencies": { + "get-intrinsic": "^1.2.1", + "gopd": "^1.0.1", + "has-property-descriptors": "^1.0.0" + }, + "engines": { + "node": ">= 0.4" + } + }, + "node_modules/define-properties": { + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/define-properties/-/define-properties-1.2.1.tgz", + "integrity": "sha512-8QmQKqEASLd5nx0U1B1okLElbUuuttJ/AnYmRXbbbGDWh6uS208EjD4Xqq/I9wK7u0v6O08XhTWnt5XtEbR6Dg==", + "optional": true, + "dependencies": { + "define-data-property": "^1.0.1", + "has-property-descriptors": "^1.0.0", + "object-keys": "^1.1.1" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/delay": { + "version": "5.0.0", + "license": "MIT", + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/delayed-stream": { + "version": "1.0.0", + "license": "MIT", + "engines": { + "node": ">=0.4.0" + } + }, + "node_modules/depd": { + "version": "2.0.0", + "license": "MIT", + "engines": { + "node": ">= 0.8" + } + }, + "node_modules/diff": { + "version": "5.0.0", + "dev": true, + "license": "BSD-3-Clause", + "engines": { + "node": ">=0.3.1" + } + }, + "node_modules/dot-case": { + "version": "3.0.4", + "license": "MIT", + "dependencies": { + "no-case": "^3.0.4", + "tslib": "^2.0.3" + } + }, + "node_modules/drbg.js": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/drbg.js/-/drbg.js-1.0.1.tgz", + "integrity": "sha512-F4wZ06PvqxYLFEZKkFxTDcns9oFNk34hvmJSEwdzsxVQ8YI5YaxtACgQatkYgv2VI2CFkUd2Y+xosPQnHv809g==", + "optional": true, + "dependencies": { + "browserify-aes": "^1.0.6", + "create-hash": "^1.1.2", + "create-hmac": "^1.1.4" + }, + "engines": { + "node": ">=0.10" + } + }, + "node_modules/eccrypto": { + "version": "1.1.6", + "resolved": "https://registry.npmjs.org/eccrypto/-/eccrypto-1.1.6.tgz", + "integrity": "sha512-d78ivVEzu7Tn0ZphUUaL43+jVPKTMPFGtmgtz1D0LrFn7cY3K8CdrvibuLz2AAkHBLKZtR8DMbB2ukRYFk987A==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "acorn": "7.1.1", + "elliptic": "6.5.4", + "es6-promise": "4.2.8", + "nan": "2.14.0" + }, + "optionalDependencies": { + "secp256k1": "3.7.1" + } + }, + "node_modules/eccrypto/node_modules/bn.js": { + "version": "4.12.0", + "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.12.0.tgz", + "integrity": "sha512-c98Bf3tPniI+scsdk237ku1Dc3ujXQTSgyiPUDEOe7tRkhrqridvh8klBv0HCEso1OLOYcHuCv/cS6DNxKH+ZA==", + "optional": true + }, + "node_modules/eccrypto/node_modules/nan": { + "version": "2.14.0", + "resolved": "https://registry.npmjs.org/nan/-/nan-2.14.0.tgz", + "integrity": "sha512-INOFj37C7k3AfaNTtX8RhsTw7qRy7eLET14cROi9+5HAVbbHuIWUHEauBv5qT4Av2tWasiTY1Jw6puUNqRJXQg==", + "optional": true + }, + "node_modules/eccrypto/node_modules/secp256k1": { + "version": "3.7.1", + "resolved": "https://registry.npmjs.org/secp256k1/-/secp256k1-3.7.1.tgz", + "integrity": "sha512-1cf8sbnRreXrQFdH6qsg2H71Xw91fCCS9Yp021GnUNJzWJS/py96fS4lHbnTnouLp08Xj6jBoBB6V78Tdbdu5g==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "bindings": "^1.5.0", + "bip66": "^1.1.5", + "bn.js": "^4.11.8", + "create-hash": "^1.2.0", + "drbg.js": "^1.0.1", + "elliptic": "^6.4.1", + "nan": "^2.14.0", + "safe-buffer": "^5.1.2" + }, + "engines": { + "node": ">=4.0.0" + } + }, + "node_modules/elliptic": { + "version": "6.5.4", + "license": "MIT", + "dependencies": { + "bn.js": "^4.11.9", + "brorand": "^1.1.0", + "hash.js": "^1.0.0", + "hmac-drbg": "^1.0.1", + "inherits": "^2.0.4", + "minimalistic-assert": "^1.0.1", + "minimalistic-crypto-utils": "^1.0.1" + } + }, + "node_modules/elliptic/node_modules/bn.js": { + "version": "4.12.0", + "license": "MIT" + }, + "node_modules/emoji-regex": { + "version": "8.0.0", + "license": "MIT" + }, + "node_modules/error-polyfill": { + "version": "0.1.3", + "license": "MIT", + "dependencies": { + "capability": "^0.2.5", + "o3": "^1.0.3", + "u3": "^0.1.1" + } + }, + "node_modules/es6-promise": { + "version": "4.2.8", + "license": "MIT" + }, + "node_modules/es6-promisify": { + "version": "5.0.0", + "license": "MIT", + "dependencies": { + "es6-promise": "^4.0.3" + } + }, + "node_modules/escalade": { + "version": "3.1.1", + "license": "MIT", + "engines": { + "node": ">=6" + } + }, + "node_modules/escape-string-regexp": { + "version": "1.0.5", + "resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz", + "integrity": "sha512-vbRorB5FUQWvla16U8R/qgaFIya2qGzwDrNmCZuYKrbdSUMG6I1ZCGQRefkRVhuOkIGVne7BQ35DSfo1qvJqFg==", + "optional": true, + "engines": { + "node": ">=0.8.0" + } + }, + "node_modules/eth-crypto": { + "version": "2.6.0", + "resolved": "https://registry.npmjs.org/eth-crypto/-/eth-crypto-2.6.0.tgz", + "integrity": "sha512-GCX4ffFYRUGgnuWR5qxcZIRQJ1KEqPFiyXU9yVy7s6dtXIMlUXZQ2h+5ID6rFaOHWbpJbjfkC6YdhwtwRYCnug==", + "optional": true, + "dependencies": { + "@babel/runtime": "7.20.13", + "@ethereumjs/tx": "3.5.2", + "@types/bn.js": "5.1.1", + "eccrypto": "1.1.6", + "ethereumjs-util": "7.1.5", + "ethers": "5.7.2", + "secp256k1": "5.0.0" + }, + "funding": { + "url": "https://github.com/sponsors/pubkey" + } + }, + "node_modules/eth-crypto/node_modules/@babel/runtime": { + "version": "7.20.13", + "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.20.13.tgz", + "integrity": "sha512-gt3PKXs0DBoL9xCvOIIZ2NEqAGZqHjAnmVbfQtB620V0uReIQutpel14KcneZuer7UioY8ALKZ7iocavvzTNFA==", + "optional": true, + "dependencies": { + "regenerator-runtime": "^0.13.11" + }, + "engines": { + "node": ">=6.9.0" + } + }, + "node_modules/eth-crypto/node_modules/node-addon-api": { + "version": "5.1.0", + "resolved": "https://registry.npmjs.org/node-addon-api/-/node-addon-api-5.1.0.tgz", + "integrity": "sha512-eh0GgfEkpnoWDq+VY8OyvYhFEzBk6jIYbRKdIlyTiAXIVJ8PyBaKb0rp7oDtoddbdoHWhq8wwr+XZ81F1rpNdA==", + "optional": true + }, + "node_modules/eth-crypto/node_modules/secp256k1": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/secp256k1/-/secp256k1-5.0.0.tgz", + "integrity": "sha512-TKWX8xvoGHrxVdqbYeZM9w+izTF4b9z3NhSaDkdn81btvuh+ivbIMGT/zQvDtTFWhRlThpoz6LEYTr7n8A5GcA==", + "hasInstallScript": true, + "optional": true, + "dependencies": { + "elliptic": "^6.5.4", + "node-addon-api": "^5.0.0", + "node-gyp-build": "^4.2.0" + }, + "engines": { + "node": ">=14.0.0" + } + }, + "node_modules/ethereum-cryptography": { + "version": "0.1.3", + "license": "MIT", + "dependencies": { + "@types/pbkdf2": "^3.0.0", + "@types/secp256k1": "^4.0.1", + "blakejs": "^1.1.0", + "browserify-aes": "^1.2.0", + "bs58check": "^2.1.2", + "create-hash": "^1.2.0", + "create-hmac": "^1.1.7", + "hash.js": "^1.1.7", + "keccak": "^3.0.0", + "pbkdf2": "^3.0.17", + "randombytes": "^2.1.0", + "safe-buffer": "^5.1.2", + "scrypt-js": "^3.0.0", + "secp256k1": "^4.0.1", + "setimmediate": "^1.0.5" + } + }, + "node_modules/ethereumjs-abi": { + "version": "0.6.8", + "resolved": "https://registry.npmjs.org/ethereumjs-abi/-/ethereumjs-abi-0.6.8.tgz", + "integrity": "sha512-Tx0r/iXI6r+lRsdvkFDlut0N08jWMnKRZ6Gkq+Nmw75lZe4e6o3EkSnkaBP5NF6+m5PTGAr9JP43N3LyeoglsA==", + "optional": true, + "dependencies": { + "bn.js": "^4.11.8", + "ethereumjs-util": "^6.0.0" + } + }, + "node_modules/ethereumjs-abi/node_modules/@types/bn.js": { + "version": "4.11.6", + "resolved": "https://registry.npmjs.org/@types/bn.js/-/bn.js-4.11.6.tgz", + "integrity": "sha512-pqr857jrp2kPuO9uRjZ3PwnJTjoQy+fcdxvBTvHm6dkmEL9q+hDD/2j/0ELOBPtPnS8LjCX0gI9nbl8lVkadpg==", + "optional": true, + "dependencies": { + "@types/node": "*" + } + }, + "node_modules/ethereumjs-abi/node_modules/bn.js": { + "version": "4.12.0", + "resolved": "https://registry.npmjs.org/bn.js/-/bn.js-4.12.0.tgz", + "integrity": "sha512-c98Bf3tPniI+scsdk237ku1Dc3ujXQTSgyiPUDEOe7tRkhrqridvh8klBv0HCEso1OLOYcHuCv/cS6DNxKH+ZA==", + "optional": true + }, + "node_modules/ethereumjs-abi/node_modules/ethereumjs-util": { + "version": "6.2.1", + "resolved": "https://registry.npmjs.org/ethereumjs-util/-/ethereumjs-util-6.2.1.tgz", + "integrity": "sha512-W2Ktez4L01Vexijrm5EB6w7dg4n/TgpoYU4avuT5T3Vmnw/eCRtiBrJfQYS/DCSvDIOLn2k57GcHdeBcgVxAqw==", + "optional": true, + "dependencies": { + "@types/bn.js": "^4.11.3", + "bn.js": "^4.11.0", + "create-hash": "^1.1.2", + "elliptic": "^6.5.2", + "ethereum-cryptography": "^0.1.3", + "ethjs-util": "0.1.6", + "rlp": "^2.2.3" + } + }, + "node_modules/ethereumjs-util": { + "version": "7.1.5", + "license": "MPL-2.0", + "dependencies": { + "@types/bn.js": "^5.1.0", + "bn.js": "^5.1.2", + "create-hash": "^1.1.2", + "ethereum-cryptography": "^0.1.3", + "rlp": "^2.2.4" + }, + "engines": { + "node": ">=10.0.0" + } + }, + "node_modules/ethers": { + "version": "5.7.2", + "funding": [ + { + "type": "individual", + "url": "https://gitcoin.co/grants/13/ethersjs-complete-simple-and-tiny-2" + }, + { + "type": "individual", + "url": "https://www.buymeacoffee.com/ricmoo" + } + ], + "license": "MIT", + "dependencies": { + "@ethersproject/abi": "5.7.0", + "@ethersproject/abstract-provider": "5.7.0", + "@ethersproject/abstract-signer": "5.7.0", + "@ethersproject/address": "5.7.0", + "@ethersproject/base64": "5.7.0", + "@ethersproject/basex": "5.7.0", + "@ethersproject/bignumber": "5.7.0", + "@ethersproject/bytes": "5.7.0", + "@ethersproject/constants": "5.7.0", + "@ethersproject/contracts": "5.7.0", + "@ethersproject/hash": "5.7.0", + "@ethersproject/hdnode": "5.7.0", + "@ethersproject/json-wallets": "5.7.0", + "@ethersproject/keccak256": "5.7.0", + "@ethersproject/logger": "5.7.0", + "@ethersproject/networks": "5.7.1", + "@ethersproject/pbkdf2": "5.7.0", + "@ethersproject/properties": "5.7.0", + "@ethersproject/providers": "5.7.2", + "@ethersproject/random": "5.7.0", + "@ethersproject/rlp": "5.7.0", + "@ethersproject/sha2": "5.7.0", + "@ethersproject/signing-key": "5.7.0", + "@ethersproject/solidity": "5.7.0", + "@ethersproject/strings": "5.7.0", + "@ethersproject/transactions": "5.7.0", + "@ethersproject/units": "5.7.0", + "@ethersproject/wallet": "5.7.0", + "@ethersproject/web": "5.7.1", + "@ethersproject/wordlists": "5.7.0" + } + }, + "node_modules/ethjs-util": { + "version": "0.1.6", + "resolved": "https://registry.npmjs.org/ethjs-util/-/ethjs-util-0.1.6.tgz", + "integrity": "sha512-CUnVOQq7gSpDHZVVrQW8ExxUETWrnrvXYvYz55wOU8Uj4VCgw56XC2B/fVqQN+f7gmrnRHSLVnFAwsCuNwji8w==", + "optional": true, + "dependencies": { + "is-hex-prefixed": "1.0.0", + "strip-hex-prefix": "1.0.0" + }, + "engines": { + "node": ">=6.5.0", + "npm": ">=3" + } + }, + "node_modules/eventemitter3": { + "version": "4.0.7", + "license": "MIT" + }, + "node_modules/evp_bytestokey": { + "version": "1.0.3", + "license": "MIT", + "dependencies": { + "md5.js": "^1.3.4", + "safe-buffer": "^5.1.1" + } + }, + "node_modules/eyes": { + "version": "0.1.8", + "engines": { + "node": "> 0.1.90" + } + }, + "node_modules/fast-stable-stringify": { + "version": "1.0.0", + "license": "MIT" + }, + "node_modules/file-uri-to-path": { + "version": "1.0.0", + "license": "MIT" + }, + "node_modules/fill-range": { + "version": "7.0.1", + "dev": true, + "license": "MIT", + "dependencies": { + "to-regex-range": "^5.0.1" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/find-up": { + "version": "5.0.0", + "dev": true, + "license": "MIT", + "dependencies": { + "locate-path": "^6.0.0", + "path-exists": "^4.0.0" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/flat": { + "version": "5.0.2", + "dev": true, + "license": "BSD-3-Clause", + "bin": { + "flat": "cli.js" + } + }, + "node_modules/follow-redirects": { + "version": "1.15.2", + "funding": [ + { + "type": "individual", + "url": "https://github.com/sponsors/RubenVerborgh" + } + ], + "license": "MIT", + "engines": { + "node": ">=4.0" + }, + "peerDependenciesMeta": { + "debug": { + "optional": true + } + } + }, + "node_modules/form-data": { + "version": "4.0.0", + "license": "MIT", + "dependencies": { + "asynckit": "^0.4.0", + "combined-stream": "^1.0.8", + "mime-types": "^2.1.12" + }, + "engines": { + "node": ">= 6" + } + }, + "node_modules/fs.realpath": { + "version": "1.0.0", + "license": "ISC" + }, + "node_modules/function-bind": { + "version": "1.1.2", + "resolved": "https://registry.npmjs.org/function-bind/-/function-bind-1.1.2.tgz", + "integrity": "sha512-7XHNxH7qX9xG5mIwxkhumTox/MIRNcOgDrxWsMt2pAr23WHp6MrRlN7FBSFpCpr+oVO0F744iUgR82nJMfG2SA==", + "optional": true, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/get-caller-file": { + "version": "2.0.5", + "license": "ISC", + "engines": { + "node": "6.* || 8.* || >= 10.*" + } + }, + "node_modules/get-func-name": { + "version": "2.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": "*" + } + }, + "node_modules/get-intrinsic": { + "version": "1.2.2", + "resolved": "https://registry.npmjs.org/get-intrinsic/-/get-intrinsic-1.2.2.tgz", + "integrity": "sha512-0gSo4ml/0j98Y3lngkFEot/zhiCeWsbYIlZ+uZOVgzLyLaUw7wxUL+nCTP0XJvJg1AXulJRI3UJi8GsbDuxdGA==", + "optional": true, + "dependencies": { + "function-bind": "^1.1.2", + "has-proto": "^1.0.1", + "has-symbols": "^1.0.3", + "hasown": "^2.0.0" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/glob": { + "version": "7.2.3", + "license": "ISC", + "dependencies": { + "fs.realpath": "^1.0.0", + "inflight": "^1.0.4", + "inherits": "2", + "minimatch": "^3.1.1", + "once": "^1.3.0", + "path-is-absolute": "^1.0.0" + }, + "engines": { + "node": "*" + }, + "funding": { + "url": "https://github.com/sponsors/isaacs" + } + }, + "node_modules/glob-parent": { + "version": "5.1.2", + "dev": true, + "license": "ISC", + "dependencies": { + "is-glob": "^4.0.1" + }, + "engines": { + "node": ">= 6" + } + }, + "node_modules/globalthis": { + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/globalthis/-/globalthis-1.0.3.tgz", + "integrity": "sha512-sFdI5LyBiNTHjRd7cGPWapiHWMOXKyuBNX/cWJ3NfzrZQVa8GI/8cofCl74AOVqq9W5kNmguTIzJ/1s2gyI9wA==", + "optional": true, + "dependencies": { + "define-properties": "^1.1.3" + }, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/google-protobuf": { + "version": "3.21.2", + "license": "(BSD-3-Clause AND Apache-2.0)" + }, + "node_modules/gopd": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/gopd/-/gopd-1.0.1.tgz", + "integrity": "sha512-d65bNlIadxvpb/A2abVdlqKqV563juRnZ1Wtk6s1sIR8uNsXR70xqIzVqxVf1eTqDunwT2MkczEeaezCKTZhwA==", + "optional": true, + "dependencies": { + "get-intrinsic": "^1.1.3" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/graphql": { + "version": "16.8.1", + "resolved": "https://registry.npmjs.org/graphql/-/graphql-16.8.1.tgz", + "integrity": "sha512-59LZHPdGZVh695Ud9lRzPBVTtlX9ZCV150Er2W43ro37wVof0ctenSaskPPjN7lVTIN8mSZt8PHUNKZuNQUuxw==", + "optional": true, + "engines": { + "node": "^12.22.0 || ^14.16.0 || ^16.0.0 || >=17.0.0" + } + }, + "node_modules/graphql-tag": { + "version": "2.12.6", + "resolved": "https://registry.npmjs.org/graphql-tag/-/graphql-tag-2.12.6.tgz", + "integrity": "sha512-FdSNcu2QQcWnM2VNvSCCDCVS5PpPqpzgFT8+GXzqJuoDd0CBncxCY278u4mhRO7tMgo2JjgJA5aZ+nWSQ/Z+xg==", + "optional": true, + "dependencies": { + "tslib": "^2.1.0" + }, + "engines": { + "node": ">=10" + }, + "peerDependencies": { + "graphql": "^0.9.0 || ^0.10.0 || ^0.11.0 || ^0.12.0 || ^0.13.0 || ^14.0.0 || ^15.0.0 || ^16.0.0" + } + }, + "node_modules/has-flag": { + "version": "4.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, + "node_modules/has-property-descriptors": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/has-property-descriptors/-/has-property-descriptors-1.0.1.tgz", + "integrity": "sha512-VsX8eaIewvas0xnvinAe9bw4WfIeODpGYikiWYLH+dma0Jw6KHYqWiWfhQlgOVK8D6PvjubK5Uc4P0iIhIcNVg==", + "optional": true, + "dependencies": { + "get-intrinsic": "^1.2.2" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/has-proto": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/has-proto/-/has-proto-1.0.1.tgz", + "integrity": "sha512-7qE+iP+O+bgF9clE5+UoBFzE65mlBiVj3tKCrlNQ0Ogwm0BjpT/gK4SlLYDMybDh5I3TCTKnPPa0oMG7JDYrhg==", + "optional": true, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/has-symbols": { + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/has-symbols/-/has-symbols-1.0.3.tgz", + "integrity": "sha512-l3LCuF6MgDNwTDKkdYGEihYjt5pRPbEg46rtlmnSPlUbgmB8LOIrKJbYYFBSbnPaJexMKtiPO8hmeRjRz2Td+A==", + "optional": true, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/hash-base": { + "version": "3.1.0", + "license": "MIT", + "dependencies": { + "inherits": "^2.0.4", + "readable-stream": "^3.6.0", + "safe-buffer": "^5.2.0" + }, + "engines": { + "node": ">=4" + } + }, + "node_modules/hash.js": { + "version": "1.1.7", + "license": "MIT", + "dependencies": { + "inherits": "^2.0.3", + "minimalistic-assert": "^1.0.1" + } + }, + "node_modules/hasown": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/hasown/-/hasown-2.0.0.tgz", + "integrity": "sha512-vUptKVTpIJhcczKBbgnS+RtcuYMB8+oNzPK2/Hp3hanz8JmpATdmmgLgSaadVREkDm+e2giHwY3ZRkyjSIDDFA==", + "optional": true, + "dependencies": { + "function-bind": "^1.1.2" + }, + "engines": { + "node": ">= 0.4" + } + }, + "node_modules/he": { + "version": "1.2.0", + "dev": true, + "license": "MIT", + "bin": { + "he": "bin/he" + } + }, + "node_modules/hi-base32": { + "version": "0.5.1", + "resolved": "https://registry.npmjs.org/hi-base32/-/hi-base32-0.5.1.tgz", + "integrity": "sha512-EmBBpvdYh/4XxsnUybsPag6VikPYnN30td+vQk+GI3qpahVEG9+gTkG0aXVxTjBqQ5T6ijbWIu77O+C5WFWsnA==" + }, + "node_modules/hmac-drbg": { + "version": "1.0.1", + "license": "MIT", + "dependencies": { + "hash.js": "^1.0.3", + "minimalistic-assert": "^1.0.0", + "minimalistic-crypto-utils": "^1.0.1" + } + }, + "node_modules/hoist-non-react-statics": { + "version": "3.3.2", + "resolved": "https://registry.npmjs.org/hoist-non-react-statics/-/hoist-non-react-statics-3.3.2.tgz", + "integrity": "sha512-/gGivxi8JPKWNm/W0jSmzcMPpfpPLc3dY/6GxhX2hQ9iGj3aDfklV4ET7NjKpSinLpJ5vafa9iiGIEZg10SfBw==", + "optional": true, + "dependencies": { + "react-is": "^16.7.0" + } + }, + "node_modules/http-errors": { + "version": "1.8.1", + "license": "MIT", + "dependencies": { + "depd": "~1.1.2", + "inherits": "2.0.4", + "setprototypeof": "1.2.0", + "statuses": ">= 1.5.0 < 2", + "toidentifier": "1.0.1" + }, + "engines": { + "node": ">= 0.6" + } + }, + "node_modules/http-errors/node_modules/depd": { + "version": "1.1.2", + "license": "MIT", + "engines": { + "node": ">= 0.6" + } + }, + "node_modules/http-status-codes": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/http-status-codes/-/http-status-codes-2.3.0.tgz", + "integrity": "sha512-RJ8XvFvpPM/Dmc5SV+dC4y5PCeOhT3x1Hq0NU3rjGeg5a/CqlhZ7uudknPwZFz4aeAXDcbAyaeP7GAo9lvngtA==", + "optional": true + }, + "node_modules/humanize-ms": { + "version": "1.2.1", + "license": "MIT", + "dependencies": { + "ms": "^2.0.0" + } + }, + "node_modules/ieee754": { + "version": "1.2.1", + "funding": [ + { + "type": "github", + "url": "https://github.com/sponsors/feross" + }, + { + "type": "patreon", + "url": "https://www.patreon.com/feross" + }, + { + "type": "consulting", + "url": "https://feross.org/support" + } + ], + "license": "BSD-3-Clause" + }, + "node_modules/inflight": { + "version": "1.0.6", + "license": "ISC", + "dependencies": { + "once": "^1.3.0", + "wrappy": "1" + } + }, + "node_modules/inherits": { + "version": "2.0.4", + "license": "ISC" + }, + "node_modules/interpret": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/interpret/-/interpret-1.4.0.tgz", + "integrity": "sha512-agE4QfB2Lkp9uICn7BAqoscw4SZP9kTE2hxiFI3jBPmXJfdqiahTbUuKGsMoN2GtqL9AxhYioAcVvgsb1HvRbA==", + "optional": true, + "engines": { + "node": ">= 0.10" + } + }, + "node_modules/is-binary-path": { + "version": "2.1.0", + "dev": true, + "license": "MIT", + "dependencies": { + "binary-extensions": "^2.0.0" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/is-core-module": { + "version": "2.13.1", + "resolved": "https://registry.npmjs.org/is-core-module/-/is-core-module-2.13.1.tgz", + "integrity": "sha512-hHrIjvZsftOsvKSn2TRYl63zvxsgE0K+0mYMoH6gD4omR5IWB2KynivBQczo3+wF1cCkjzvptnI9Q0sPU66ilw==", + "optional": true, + "dependencies": { + "hasown": "^2.0.0" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/is-extglob": { + "version": "2.1.1", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/is-fullwidth-code-point": { + "version": "3.0.0", + "license": "MIT", + "engines": { + "node": ">=8" + } + }, + "node_modules/is-glob": { + "version": "4.0.3", + "dev": true, + "license": "MIT", + "dependencies": { + "is-extglob": "^2.1.1" + }, + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/is-hex-prefixed": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/is-hex-prefixed/-/is-hex-prefixed-1.0.0.tgz", + "integrity": "sha512-WvtOiug1VFrE9v1Cydwm+FnXd3+w9GaeVUss5W4v/SLy3UW00vP+6iNF2SdnfiBoLy4bTqVdkftNGTUeOFVsbA==", + "optional": true, + "engines": { + "node": ">=6.5.0", + "npm": ">=3" + } + }, + "node_modules/is-number": { + "version": "7.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=0.12.0" + } + }, + "node_modules/is-plain-obj": { + "version": "2.1.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, + "node_modules/is-unicode-supported": { + "version": "0.1.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/isarray": { + "version": "0.0.1", + "resolved": "https://registry.npmjs.org/isarray/-/isarray-0.0.1.tgz", + "integrity": "sha512-D2S+3GLxWH+uhrNEcoh/fnmYeP8E8/zHl644d/jdA0g2uyXvy3sb0qxotE+ne0LtccHknQzWwZEzhak7oJ0COQ==", + "optional": true + }, + "node_modules/isomorphic-ws": { + "version": "4.0.1", + "license": "MIT", + "peerDependencies": { + "ws": "*" + } + }, + "node_modules/jayson": { + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/jayson/-/jayson-4.1.0.tgz", + "integrity": "sha512-R6JlbyLN53Mjku329XoRT2zJAE6ZgOQ8f91ucYdMCD4nkGCF9kZSrcGXpHIU4jeKj58zUZke2p+cdQchU7Ly7A==", + "dependencies": { + "@types/connect": "^3.4.33", + "@types/node": "^12.12.54", + "@types/ws": "^7.4.4", + "commander": "^2.20.3", + "delay": "^5.0.0", + "es6-promisify": "^5.0.0", + "eyes": "^0.1.8", + "isomorphic-ws": "^4.0.1", + "json-stringify-safe": "^5.0.1", + "JSONStream": "^1.3.5", + "uuid": "^8.3.2", + "ws": "^7.4.5" + }, + "bin": { + "jayson": "bin/jayson.js" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/jayson/node_modules/@types/node": { + "version": "12.20.55", + "resolved": "https://registry.npmjs.org/@types/node/-/node-12.20.55.tgz", + "integrity": "sha512-J8xLz7q2OFulZ2cyGTLE1TbbZcjpno7FaN6zdJNrgAdrJ+DZzh/uFR6YrTb4C+nXakvud8Q4+rbhoIWlYQbUFQ==" + }, + "node_modules/js-base64": { + "version": "3.7.5", + "license": "BSD-3-Clause" + }, + "node_modules/js-sha256": { + "version": "0.9.0", + "license": "MIT" + }, + "node_modules/js-sha3": { + "version": "0.8.0", + "license": "MIT" + }, + "node_modules/js-sha512": { + "version": "0.8.0", + "resolved": "https://registry.npmjs.org/js-sha512/-/js-sha512-0.8.0.tgz", + "integrity": "sha512-PWsmefG6Jkodqt+ePTvBZCSMFgN7Clckjd0O7su3I0+BW2QWUTJNzjktHsztGLhncP2h8mcF9V9Y2Ha59pAViQ==" + }, + "node_modules/js-tokens": { + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz", + "integrity": "sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ==", + "optional": true + }, + "node_modules/js-yaml": { + "version": "4.1.0", + "dev": true, + "license": "MIT", + "dependencies": { + "argparse": "^2.0.1" + }, + "bin": { + "js-yaml": "bin/js-yaml.js" + } + }, + "node_modules/jscrypto": { + "version": "1.0.3", + "license": "MIT", + "bin": { + "jscrypto": "bin/cli.js" + } + }, + "node_modules/json-bigint": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/json-bigint/-/json-bigint-1.0.0.tgz", + "integrity": "sha512-SiPv/8VpZuWbvLSMtTDU8hEfrZWg/mH/nV/b4o0CYbSxu1UIQPLdwKOCIyLQX+VIPO5vrLX3i8qtqFyhdPSUSQ==", + "dependencies": { + "bignumber.js": "^9.0.0" + } + }, + "node_modules/json-stringify-safe": { + "version": "5.0.1", + "license": "ISC" + }, + "node_modules/json5": { + "version": "1.0.2", + "dev": true, + "license": "MIT", + "optional": true, + "dependencies": { + "minimist": "^1.2.0" + }, + "bin": { + "json5": "lib/cli.js" + } + }, + "node_modules/jsonparse": { + "version": "1.3.1", + "engines": [ + "node >= 0.2.0" + ], + "license": "MIT" + }, + "node_modules/jsonschema": { + "version": "1.4.1", + "resolved": "https://registry.npmjs.org/jsonschema/-/jsonschema-1.4.1.tgz", + "integrity": "sha512-S6cATIPVv1z0IlxdN+zUk5EPjkGCdnhN4wVSBlvoUO1tOLJootbo9CquNJmbIh4yikWHiUedhRYrNPn1arpEmQ==", + "optional": true, + "engines": { + "node": "*" + } + }, + "node_modules/JSONStream": { + "version": "1.3.5", + "license": "(MIT OR Apache-2.0)", + "dependencies": { + "jsonparse": "^1.2.0", + "through": ">=2.2.7 <3" + }, + "bin": { + "JSONStream": "bin.js" + }, + "engines": { + "node": "*" + } + }, + "node_modules/keccak": { + "version": "3.0.3", + "hasInstallScript": true, + "license": "MIT", + "dependencies": { + "node-addon-api": "^2.0.0", + "node-gyp-build": "^4.2.0", + "readable-stream": "^3.6.0" + }, + "engines": { + "node": ">=10.0.0" + } + }, + "node_modules/keccak256": { + "version": "1.0.6", + "resolved": "https://registry.npmjs.org/keccak256/-/keccak256-1.0.6.tgz", + "integrity": "sha512-8GLiM01PkdJVGUhR1e6M/AvWnSqYS0HaERI+K/QtStGDGlSTx2B1zTqZk4Zlqu5TxHJNTxWAdP9Y+WI50OApUw==", + "optional": true, + "dependencies": { + "bn.js": "^5.2.0", + "buffer": "^6.0.3", + "keccak": "^3.0.2" + } + }, + "node_modules/libsodium": { + "version": "0.7.13", + "resolved": "https://registry.npmjs.org/libsodium/-/libsodium-0.7.13.tgz", + "integrity": "sha512-mK8ju0fnrKXXfleL53vtp9xiPq5hKM0zbDQtcxQIsSmxNgSxqCj6R7Hl9PkrNe2j29T4yoDaF7DJLK9/i5iWUw==", + "optional": true + }, + "node_modules/libsodium-wrappers": { + "version": "0.7.13", + "resolved": "https://registry.npmjs.org/libsodium-wrappers/-/libsodium-wrappers-0.7.13.tgz", + "integrity": "sha512-kasvDsEi/r1fMzKouIDv7B8I6vNmknXwGiYodErGuESoFTohGSKZplFtVxZqHaoQ217AynyIFgnOVRitpHs0Qw==", + "optional": true, + "dependencies": { + "libsodium": "^0.7.13" + } + }, + "node_modules/link-module-alias": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/link-module-alias/-/link-module-alias-1.2.0.tgz", + "integrity": "sha512-ahPjXepbSVKbahTB6LxR//VHm8HPfI+QQygCH+E82spBY4HR5VPJTvlhKBc9F7muVxnS6C1rRfoPOXAbWO/fyw==", + "optional": true, + "dependencies": { + "chalk": "^2.4.1" + }, + "bin": { + "link-module-alias": "index.js" + }, + "engines": { + "node": "> 8.0.0" + } + }, + "node_modules/link-module-alias/node_modules/ansi-styles": { + "version": "3.2.1", + "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-3.2.1.tgz", + "integrity": "sha512-VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA==", + "optional": true, + "dependencies": { + "color-convert": "^1.9.0" + }, + "engines": { + "node": ">=4" + } + }, + "node_modules/link-module-alias/node_modules/chalk": { + "version": "2.4.2", + "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", + "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", + "optional": true, + "dependencies": { + "ansi-styles": "^3.2.1", + "escape-string-regexp": "^1.0.5", + "supports-color": "^5.3.0" + }, + "engines": { + "node": ">=4" + } + }, + "node_modules/link-module-alias/node_modules/color-convert": { + "version": "1.9.3", + "resolved": "https://registry.npmjs.org/color-convert/-/color-convert-1.9.3.tgz", + "integrity": "sha512-QfAUtd+vFdAtFQcC8CCyYt1fYWxSqAiK2cSD6zDB8N3cpsEBAvRxp9zOGg6G/SHHJYAT88/az/IuDGALsNVbGg==", + "optional": true, + "dependencies": { + "color-name": "1.1.3" + } + }, + "node_modules/link-module-alias/node_modules/color-name": { + "version": "1.1.3", + "resolved": "https://registry.npmjs.org/color-name/-/color-name-1.1.3.tgz", + "integrity": "sha512-72fSenhMw2HZMTVHeCA9KCmpEIbzWiQsjN+BHcBbS9vr1mtt+vJjPdksIBNUmKAW8TFUDPJK5SUU3QhE9NEXDw==", + "optional": true + }, + "node_modules/link-module-alias/node_modules/has-flag": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-3.0.0.tgz", + "integrity": "sha512-sKJf1+ceQBr4SMkvQnBDNDtf4TXpVhVGateu0t918bl30FnbE2m4vNLX+VWe/dpjlb+HugGYzW7uQXH98HPEYw==", + "optional": true, + "engines": { + "node": ">=4" + } + }, + "node_modules/link-module-alias/node_modules/supports-color": { + "version": "5.5.0", + "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-5.5.0.tgz", + "integrity": "sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow==", + "optional": true, + "dependencies": { + "has-flag": "^3.0.0" + }, + "engines": { + "node": ">=4" + } + }, + "node_modules/locate-path": { + "version": "6.0.0", + "dev": true, + "license": "MIT", + "dependencies": { + "p-locate": "^5.0.0" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/lodash": { + "version": "4.17.21", + "license": "MIT", + "optional": true + }, + "node_modules/lodash.values": { + "version": "4.3.0", + "resolved": "https://registry.npmjs.org/lodash.values/-/lodash.values-4.3.0.tgz", + "integrity": "sha512-r0RwvdCv8id9TUblb/O7rYPwVy6lerCbcawrfdo9iC/1t1wsNMJknO79WNBgwkH0hIeJ08jmvvESbFpNb4jH0Q==", + "optional": true + }, + "node_modules/log-symbols": { + "version": "4.1.0", + "dev": true, + "license": "MIT", + "dependencies": { + "chalk": "^4.1.0", + "is-unicode-supported": "^0.1.0" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/long": { + "version": "4.0.0", + "license": "Apache-2.0" + }, + "node_modules/loose-envify": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/loose-envify/-/loose-envify-1.4.0.tgz", + "integrity": "sha512-lyuxPGr/Wfhrlem2CL/UcnUc1zcqKAImBDzukY7Y5F/yQiNdko6+fRLevlw1HgMySw7f611UIY408EtxRSoK3Q==", + "optional": true, + "dependencies": { + "js-tokens": "^3.0.0 || ^4.0.0" + }, + "bin": { + "loose-envify": "cli.js" + } + }, + "node_modules/loupe": { + "version": "2.3.6", + "dev": true, + "license": "MIT", + "dependencies": { + "get-func-name": "^2.0.0" + } + }, + "node_modules/lower-case": { + "version": "2.0.2", + "license": "MIT", + "dependencies": { + "tslib": "^2.0.3" + } + }, + "node_modules/make-error": { + "version": "1.3.6", + "dev": true, + "license": "ISC" + }, + "node_modules/map-obj": { + "version": "4.3.0", + "resolved": "https://registry.npmjs.org/map-obj/-/map-obj-4.3.0.tgz", + "integrity": "sha512-hdN1wVrZbb29eBGiGjJbeP8JbKjq1urkHJ/LIP/NY48MZ1QVXUsQBV1G1zvYFHn1XE06cwjBsOI2K3Ulnj1YXQ==", + "optional": true, + "engines": { + "node": ">=8" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/md5.js": { + "version": "1.3.5", + "license": "MIT", + "dependencies": { + "hash-base": "^3.0.0", + "inherits": "^2.0.1", + "safe-buffer": "^5.1.2" + } + }, + "node_modules/mime-db": { + "version": "1.52.0", + "license": "MIT", + "engines": { + "node": ">= 0.6" + } + }, + "node_modules/mime-types": { + "version": "2.1.35", + "license": "MIT", + "dependencies": { + "mime-db": "1.52.0" + }, + "engines": { + "node": ">= 0.6" + } + }, + "node_modules/minimalistic-assert": { + "version": "1.0.1", + "license": "ISC" + }, + "node_modules/minimalistic-crypto-utils": { + "version": "1.0.1", + "license": "MIT" + }, + "node_modules/minimatch": { + "version": "3.1.2", + "license": "ISC", + "dependencies": { + "brace-expansion": "^1.1.7" + }, + "engines": { + "node": "*" + } + }, + "node_modules/minimist": { + "version": "1.2.8", + "devOptional": true, + "license": "MIT", + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/mkdirp": { + "version": "0.5.6", + "dev": true, + "license": "MIT", + "dependencies": { + "minimist": "^1.2.6" + }, + "bin": { + "mkdirp": "bin/cmd.js" + } + }, + "node_modules/mocha": { + "version": "10.2.0", + "dev": true, + "license": "MIT", + "dependencies": { + "ansi-colors": "4.1.1", + "browser-stdout": "1.3.1", + "chokidar": "3.5.3", + "debug": "4.3.4", + "diff": "5.0.0", + "escape-string-regexp": "4.0.0", + "find-up": "5.0.0", + "glob": "7.2.0", + "he": "1.2.0", + "js-yaml": "4.1.0", + "log-symbols": "4.1.0", + "minimatch": "5.0.1", + "ms": "2.1.3", + "nanoid": "3.3.3", + "serialize-javascript": "6.0.0", + "strip-json-comments": "3.1.1", + "supports-color": "8.1.1", + "workerpool": "6.2.1", + "yargs": "16.2.0", + "yargs-parser": "20.2.4", + "yargs-unparser": "2.0.0" + }, + "bin": { + "_mocha": "bin/_mocha", + "mocha": "bin/mocha.js" + }, + "engines": { + "node": ">= 14.0.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/mochajs" + } + }, + "node_modules/mocha/node_modules/brace-expansion": { + "version": "2.0.1", + "dev": true, + "license": "MIT", + "dependencies": { + "balanced-match": "^1.0.0" + } + }, + "node_modules/mocha/node_modules/cliui": { + "version": "7.0.4", + "dev": true, + "license": "ISC", + "dependencies": { + "string-width": "^4.2.0", + "strip-ansi": "^6.0.0", + "wrap-ansi": "^7.0.0" + } + }, + "node_modules/mocha/node_modules/escape-string-regexp": { + "version": "4.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/mocha/node_modules/glob": { + "version": "7.2.0", + "dev": true, + "license": "ISC", + "dependencies": { + "fs.realpath": "^1.0.0", + "inflight": "^1.0.4", + "inherits": "2", + "minimatch": "^3.0.4", + "once": "^1.3.0", + "path-is-absolute": "^1.0.0" + }, + "engines": { + "node": "*" + }, + "funding": { + "url": "https://github.com/sponsors/isaacs" + } + }, + "node_modules/mocha/node_modules/glob/node_modules/brace-expansion": { + "version": "1.1.11", + "dev": true, + "license": "MIT", + "dependencies": { + "balanced-match": "^1.0.0", + "concat-map": "0.0.1" + } + }, + "node_modules/mocha/node_modules/glob/node_modules/minimatch": { + "version": "3.1.2", + "dev": true, + "license": "ISC", + "dependencies": { + "brace-expansion": "^1.1.7" + }, + "engines": { + "node": "*" + } + }, + "node_modules/mocha/node_modules/minimatch": { + "version": "5.0.1", + "dev": true, + "license": "ISC", + "dependencies": { + "brace-expansion": "^2.0.1" + }, + "engines": { + "node": ">=10" + } + }, + "node_modules/mocha/node_modules/yargs": { + "version": "16.2.0", + "dev": true, + "license": "MIT", + "dependencies": { + "cliui": "^7.0.2", + "escalade": "^3.1.1", + "get-caller-file": "^2.0.5", + "require-directory": "^2.1.1", + "string-width": "^4.2.0", + "y18n": "^5.0.5", + "yargs-parser": "^20.2.2" + }, + "engines": { + "node": ">=10" + } + }, + "node_modules/mocha/node_modules/yargs/node_modules/yargs-parser": { + "version": "20.2.9", + "dev": true, + "license": "ISC", + "engines": { + "node": ">=10" + } + }, + "node_modules/ms": { + "version": "2.1.3", + "license": "MIT" + }, + "node_modules/mustache": { + "version": "4.2.0", + "license": "MIT", + "bin": { + "mustache": "bin/mustache" + } + }, + "node_modules/nan": { + "version": "2.17.0", + "license": "MIT" + }, + "node_modules/nanoid": { + "version": "3.3.3", + "dev": true, + "license": "MIT", + "bin": { + "nanoid": "bin/nanoid.cjs" + }, + "engines": { + "node": "^10 || ^12 || ^13.7 || ^14 || >=15.0.1" + } + }, + "node_modules/near-api-js": { + "version": "1.1.0", + "license": "(MIT AND Apache-2.0)", + "dependencies": { + "bn.js": "5.2.1", + "borsh": "^0.7.0", + "bs58": "^4.0.0", + "depd": "^2.0.0", + "error-polyfill": "^0.1.3", + "http-errors": "^1.7.2", + "js-sha256": "^0.9.0", + "mustache": "^4.0.0", + "node-fetch": "^2.6.1", + "text-encoding-utf-8": "^1.0.2", + "tweetnacl": "^1.0.1" + } + }, + "node_modules/no-case": { + "version": "3.0.4", + "license": "MIT", + "dependencies": { + "lower-case": "^2.0.2", + "tslib": "^2.0.3" + } + }, + "node_modules/node-addon-api": { + "version": "2.0.2", + "license": "MIT" + }, + "node_modules/node-fetch": { + "version": "2.7.0", + "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.7.0.tgz", + "integrity": "sha512-c4FRfUm/dbcWZ7U+1Wq0AwCyFL+3nt2bEw05wfxSz+DWpWsitgmSgYmy2dQdWyKC1694ELPqMs/YzUSNozLt8A==", + "dependencies": { + "whatwg-url": "^5.0.0" + }, + "engines": { + "node": "4.x || >=6.0.0" + }, + "peerDependencies": { + "encoding": "^0.1.0" + }, + "peerDependenciesMeta": { + "encoding": { + "optional": true + } + } + }, + "node_modules/node-gyp-build": { + "version": "4.6.0", + "license": "MIT", + "bin": { + "node-gyp-build": "bin.js", + "node-gyp-build-optional": "optional.js", + "node-gyp-build-test": "build-test.js" + } + }, + "node_modules/noms": { + "version": "0.0.0", + "resolved": "https://registry.npmjs.org/noms/-/noms-0.0.0.tgz", + "integrity": "sha512-lNDU9VJaOPxUmXcLb+HQFeUgQQPtMI24Gt6hgfuMHRJgMRHMF/qZ4HJD3GDru4sSw9IQl2jPjAYnQrdIeLbwow==", + "optional": true, + "dependencies": { + "inherits": "^2.0.1", + "readable-stream": "~1.0.31" + } + }, + "node_modules/noms/node_modules/readable-stream": { + "version": "1.0.34", + "resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-1.0.34.tgz", + "integrity": "sha512-ok1qVCJuRkNmvebYikljxJA/UEsKwLl2nI1OmaqAu4/UE+h0wKCHok4XkL/gvi39OacXvw59RJUOFUkDib2rHg==", + "optional": true, + "dependencies": { + "core-util-is": "~1.0.0", + "inherits": "~2.0.1", + "isarray": "0.0.1", + "string_decoder": "~0.10.x" + } + }, + "node_modules/noms/node_modules/string_decoder": { + "version": "0.10.31", + "resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-0.10.31.tgz", + "integrity": "sha512-ev2QzSzWPYmy9GuqfIVildA4OdcGLeFZQrq5ys6RtiuF+RQQiZWr8TZNyAcuVXyQRYfEO+MsoB/1BuQVhOJuoQ==", + "optional": true + }, + "node_modules/normalize-path": { + "version": "3.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/o3": { + "version": "1.0.3", + "license": "MIT", + "dependencies": { + "capability": "^0.2.5" + } + }, + "node_modules/object-assign": { + "version": "4.1.1", + "resolved": "https://registry.npmjs.org/object-assign/-/object-assign-4.1.1.tgz", + "integrity": "sha512-rJgTQnkUnH1sFw8yT6VSU3zD3sWmu6sZhIseY8VX+GRu3P6F7Fu+JNDoXfklElbLJSnc3FUQHVe4cU5hj+BcUg==", + "optional": true, + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/object-keys": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/object-keys/-/object-keys-1.1.1.tgz", + "integrity": "sha512-NuAESUOUMrlIXOfHKzD6bpPu3tYt3xvjNdRIQ+FeT0lNb4K8WR70CaDxhuNguS2XG+GjkyMwOzsN5ZktImfhLA==", + "optional": true, + "engines": { + "node": ">= 0.4" + } + }, + "node_modules/once": { + "version": "1.4.0", + "license": "ISC", + "dependencies": { + "wrappy": "1" + } + }, + "node_modules/optimism": { + "version": "0.17.5", + "resolved": "https://registry.npmjs.org/optimism/-/optimism-0.17.5.tgz", + "integrity": "sha512-TEcp8ZwK1RczmvMnvktxHSF2tKgMWjJ71xEFGX5ApLh67VsMSTy1ZUlipJw8W+KaqgOmQ+4pqwkeivY89j+4Vw==", + "optional": true, + "dependencies": { + "@wry/context": "^0.7.0", + "@wry/trie": "^0.4.3", + "tslib": "^2.3.0" + } + }, + "node_modules/p-limit": { + "version": "3.1.0", + "dev": true, + "license": "MIT", + "dependencies": { + "yocto-queue": "^0.1.0" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/p-locate": { + "version": "5.0.0", + "dev": true, + "license": "MIT", + "dependencies": { + "p-limit": "^3.0.2" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/pako": { + "version": "2.1.0", + "license": "(MIT AND Zlib)" + }, + "node_modules/path-exists": { + "version": "4.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + } + }, + "node_modules/path-is-absolute": { + "version": "1.0.1", + "license": "MIT", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/path-parse": { + "version": "1.0.7", + "resolved": "https://registry.npmjs.org/path-parse/-/path-parse-1.0.7.tgz", + "integrity": "sha512-LDJzPVEEEPR+y48z93A0Ed0yXb8pAByGWo/k5YYdYgpY2/2EsOsksJrq7lOHxryrVOn1ejG6oAp8ahvOIQD8sw==", + "optional": true + }, + "node_modules/pathval": { + "version": "1.1.1", + "dev": true, + "license": "MIT", + "engines": { + "node": "*" + } + }, + "node_modules/pbkdf2": { + "version": "3.1.2", + "license": "MIT", + "dependencies": { + "create-hash": "^1.1.2", + "create-hmac": "^1.1.4", + "ripemd160": "^2.0.1", + "safe-buffer": "^5.0.1", + "sha.js": "^2.4.8" + }, + "engines": { + "node": ">=0.12" + } + }, + "node_modules/picomatch": { + "version": "2.3.1", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8.6" + }, + "funding": { + "url": "https://github.com/sponsors/jonschlinkert" + } + }, + "node_modules/process-nextick-args": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/process-nextick-args/-/process-nextick-args-2.0.1.tgz", + "integrity": "sha512-3ouUOpQhtgrbOa17J7+uxOTpITYWaGP7/AhoR3+A+/1e9skrzelGi/dXzEYyvbxubEF6Wn2ypscTKiKJFFn1ag==", + "optional": true + }, + "node_modules/prop-types": { + "version": "15.8.1", + "resolved": "https://registry.npmjs.org/prop-types/-/prop-types-15.8.1.tgz", + "integrity": "sha512-oj87CgZICdulUohogVAR7AjlC0327U4el4L6eAvOqCeudMDVU0NThNaV+b9Df4dXgSP1gXMTnPdhfe/2qDH5cg==", + "optional": true, + "dependencies": { + "loose-envify": "^1.4.0", + "object-assign": "^4.1.1", + "react-is": "^16.13.1" + } + }, + "node_modules/protobufjs": { + "version": "6.11.3", + "hasInstallScript": true, + "license": "BSD-3-Clause", + "dependencies": { + "@protobufjs/aspromise": "^1.1.2", + "@protobufjs/base64": "^1.1.2", + "@protobufjs/codegen": "^2.0.4", + "@protobufjs/eventemitter": "^1.1.0", + "@protobufjs/fetch": "^1.1.0", + "@protobufjs/float": "^1.0.2", + "@protobufjs/inquire": "^1.1.0", + "@protobufjs/path": "^1.1.2", + "@protobufjs/pool": "^1.1.0", + "@protobufjs/utf8": "^1.1.0", + "@types/long": "^4.0.1", + "@types/node": ">=13.7.0", + "long": "^4.0.0" + }, + "bin": { + "pbjs": "bin/pbjs", + "pbts": "bin/pbts" + } + }, + "node_modules/randombytes": { + "version": "2.1.0", + "license": "MIT", + "dependencies": { + "safe-buffer": "^5.1.0" + } + }, + "node_modules/react-is": { + "version": "16.13.1", + "resolved": "https://registry.npmjs.org/react-is/-/react-is-16.13.1.tgz", + "integrity": "sha512-24e6ynE2H+OKt4kqsOvNd8kBpV65zoxbA4BVsEOB3ARVWQki/DHzaUoC5KuON/BiccDaCCTZBuOcfZs70kR8bQ==", + "optional": true + }, + "node_modules/readable-stream": { + "version": "3.6.2", + "license": "MIT", + "dependencies": { + "inherits": "^2.0.3", + "string_decoder": "^1.1.1", + "util-deprecate": "^1.0.1" + }, + "engines": { + "node": ">= 6" + } + }, + "node_modules/readdirp": { + "version": "3.6.0", + "dev": true, + "license": "MIT", + "dependencies": { + "picomatch": "^2.2.1" + }, + "engines": { + "node": ">=8.10.0" + } + }, + "node_modules/readonly-date": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/readonly-date/-/readonly-date-1.0.0.tgz", + "integrity": "sha512-tMKIV7hlk0h4mO3JTmmVuIlJVXjKk3Sep9Bf5OH0O+758ruuVkUy2J9SttDLm91IEX/WHlXPSpxMGjPj4beMIQ==", + "optional": true + }, + "node_modules/rechoir": { + "version": "0.6.2", + "resolved": "https://registry.npmjs.org/rechoir/-/rechoir-0.6.2.tgz", + "integrity": "sha512-HFM8rkZ+i3zrV+4LQjwQ0W+ez98pApMGM3HUrN04j3CqzPOzl9nmP15Y8YXNm8QHGv/eacOVEjqhmWpkRV0NAw==", + "optional": true, + "dependencies": { + "resolve": "^1.1.6" + }, + "engines": { + "node": ">= 0.10" + } + }, + "node_modules/regenerator-runtime": { + "version": "0.13.11", + "license": "MIT", + "optional": true + }, + "node_modules/require-directory": { + "version": "2.1.1", + "license": "MIT", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/resolve": { + "version": "1.22.8", + "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.22.8.tgz", + "integrity": "sha512-oKWePCxqpd6FlLvGV1VU0x7bkPmmCNolxzjMf4NczoDnQcIWrAF+cPtZn5i6n+RfD2d9i0tzpKnG6Yk168yIyw==", + "optional": true, + "dependencies": { + "is-core-module": "^2.13.0", + "path-parse": "^1.0.7", + "supports-preserve-symlinks-flag": "^1.0.0" + }, + "bin": { + "resolve": "bin/resolve" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/response-iterator": { + "version": "0.2.6", + "resolved": "https://registry.npmjs.org/response-iterator/-/response-iterator-0.2.6.tgz", + "integrity": "sha512-pVzEEzrsg23Sh053rmDUvLSkGXluZio0qu8VT6ukrYuvtjVfCbDZH9d6PGXb8HZfzdNZt8feXv/jvUzlhRgLnw==", + "optional": true, + "engines": { + "node": ">=0.8" + } + }, + "node_modules/rimraf": { + "version": "3.0.2", + "license": "ISC", + "dependencies": { + "glob": "^7.1.3" + }, + "bin": { + "rimraf": "bin.js" + }, + "funding": { + "url": "https://github.com/sponsors/isaacs" + } + }, + "node_modules/ripemd160": { + "version": "2.0.2", + "license": "MIT", + "dependencies": { + "hash-base": "^3.0.0", + "inherits": "^2.0.1" + } + }, + "node_modules/ripemd160-min": { + "version": "0.0.6", + "engines": { + "node": ">=8" + } + }, + "node_modules/rlp": { + "version": "2.2.7", + "license": "MPL-2.0", + "dependencies": { + "bn.js": "^5.2.0" + }, + "bin": { + "rlp": "bin/rlp" + } + }, + "node_modules/rpc-websockets": { + "version": "7.5.1", + "license": "LGPL-3.0-only", + "dependencies": { + "@babel/runtime": "^7.17.2", + "eventemitter3": "^4.0.7", + "uuid": "^8.3.2", + "ws": "^8.5.0" + }, + "funding": { + "type": "paypal", + "url": "https://paypal.me/kozjak" + }, + "optionalDependencies": { + "bufferutil": "^4.0.1", + "utf-8-validate": "^5.0.2" + } + }, + "node_modules/rpc-websockets/node_modules/ws": { + "version": "8.13.0", + "license": "MIT", + "engines": { + "node": ">=10.0.0" + }, + "peerDependencies": { + "bufferutil": "^4.0.1", + "utf-8-validate": ">=5.0.2" + }, + "peerDependenciesMeta": { + "bufferutil": { + "optional": true + }, + "utf-8-validate": { + "optional": true + } + } + }, + "node_modules/rxjs": { + "version": "7.8.0", + "license": "Apache-2.0", + "dependencies": { + "tslib": "^2.1.0" + } + }, + "node_modules/safe-buffer": { + "version": "5.2.1", + "funding": [ + { + "type": "github", + "url": "https://github.com/sponsors/feross" + }, + { + "type": "patreon", + "url": "https://www.patreon.com/feross" + }, + { + "type": "consulting", + "url": "https://feross.org/support" + } + ], + "license": "MIT" + }, + "node_modules/scrypt-js": { + "version": "3.0.1", + "license": "MIT" + }, + "node_modules/secp256k1": { + "version": "4.0.3", + "hasInstallScript": true, + "license": "MIT", + "dependencies": { + "elliptic": "^6.5.4", + "node-addon-api": "^2.0.0", + "node-gyp-build": "^4.2.0" + }, + "engines": { + "node": ">=10.0.0" + } + }, + "node_modules/serialize-javascript": { + "version": "6.0.0", + "dev": true, + "license": "BSD-3-Clause", + "dependencies": { + "randombytes": "^2.1.0" + } + }, + "node_modules/setimmediate": { + "version": "1.0.5", + "license": "MIT" + }, + "node_modules/setprototypeof": { + "version": "1.2.0", + "license": "ISC" + }, + "node_modules/sha.js": { + "version": "2.4.11", + "license": "(MIT AND BSD-3-Clause)", + "dependencies": { + "inherits": "^2.0.1", + "safe-buffer": "^5.0.1" + }, + "bin": { + "sha.js": "bin.js" + } + }, + "node_modules/sha3": { + "version": "2.1.4", + "license": "MIT", + "dependencies": { + "buffer": "6.0.3" + } + }, + "node_modules/shelljs": { + "version": "0.8.5", + "resolved": "https://registry.npmjs.org/shelljs/-/shelljs-0.8.5.tgz", + "integrity": "sha512-TiwcRcrkhHvbrZbnRcFYMLl30Dfov3HKqzp5tO5b4pt6G/SezKcYhmDg15zXVBswHmctSAQKznqNW2LO5tTDow==", + "optional": true, + "dependencies": { + "glob": "^7.0.0", + "interpret": "^1.0.0", + "rechoir": "^0.6.2" + }, + "bin": { + "shjs": "bin/shjs" + }, + "engines": { + "node": ">=4" + } + }, + "node_modules/shx": { + "version": "0.3.4", + "resolved": "https://registry.npmjs.org/shx/-/shx-0.3.4.tgz", + "integrity": "sha512-N6A9MLVqjxZYcVn8hLmtneQWIJtp8IKzMP4eMnx+nqkvXoqinUPCbUFLp2UcWTEIUONhlk0ewxr/jaVGlc+J+g==", + "optional": true, + "dependencies": { + "minimist": "^1.2.3", + "shelljs": "^0.8.5" + }, + "bin": { + "shx": "lib/cli.js" + }, + "engines": { + "node": ">=6" + } + }, + "node_modules/snake-case": { + "version": "3.0.4", + "license": "MIT", + "dependencies": { + "dot-case": "^3.0.4", + "tslib": "^2.0.3" + } + }, + "node_modules/snakecase-keys": { + "version": "5.5.0", + "resolved": "https://registry.npmjs.org/snakecase-keys/-/snakecase-keys-5.5.0.tgz", + "integrity": "sha512-r3kRtnoPu3FxGJ3fny6PKNnU3pteb29o6qAa0ugzhSseKNWRkw1dw8nIjXMyyKaU9vQxxVIE62Mb3bKbdrgpiw==", + "optional": true, + "dependencies": { + "map-obj": "^4.1.0", + "snake-case": "^3.0.4", + "type-fest": "^3.12.0" + }, + "engines": { + "node": ">=12" + } + }, + "node_modules/source-map": { + "version": "0.6.1", + "dev": true, + "license": "BSD-3-Clause", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/source-map-support": { + "version": "0.5.21", + "dev": true, + "license": "MIT", + "dependencies": { + "buffer-from": "^1.0.0", + "source-map": "^0.6.0" + } + }, + "node_modules/statuses": { + "version": "1.5.0", + "license": "MIT", + "engines": { + "node": ">= 0.6" + } + }, + "node_modules/store2": { + "version": "2.14.2", + "resolved": "https://registry.npmjs.org/store2/-/store2-2.14.2.tgz", + "integrity": "sha512-siT1RiqlfQnGqgT/YzXVUNsom9S0H1OX+dpdGN1xkyYATo4I6sep5NmsRD/40s3IIOvlCq6akxkqG82urIZW1w==", + "optional": true + }, + "node_modules/string_decoder": { + "version": "1.3.0", + "license": "MIT", + "dependencies": { + "safe-buffer": "~5.2.0" + } + }, + "node_modules/string-width": { + "version": "4.2.3", + "license": "MIT", + "dependencies": { + "emoji-regex": "^8.0.0", + "is-fullwidth-code-point": "^3.0.0", + "strip-ansi": "^6.0.1" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/strip-ansi": { + "version": "6.0.1", + "license": "MIT", + "dependencies": { + "ansi-regex": "^5.0.1" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/strip-bom": { + "version": "3.0.0", + "dev": true, + "license": "MIT", + "optional": true, + "engines": { + "node": ">=4" + } + }, + "node_modules/strip-hex-prefix": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/strip-hex-prefix/-/strip-hex-prefix-1.0.0.tgz", + "integrity": "sha512-q8d4ue7JGEiVcypji1bALTos+0pWtyGlivAWyPuTkHzuTCJqrK9sWxYQZUq6Nq3cuyv3bm734IhHvHtGGURU6A==", + "optional": true, + "dependencies": { + "is-hex-prefixed": "1.0.0" + }, + "engines": { + "node": ">=6.5.0", + "npm": ">=3" + } + }, + "node_modules/strip-json-comments": { + "version": "3.1.1", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=8" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/superstruct": { + "version": "0.15.5", + "license": "MIT" + }, + "node_modules/supports-color": { + "version": "8.1.1", + "dev": true, + "license": "MIT", + "dependencies": { + "has-flag": "^4.0.0" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/chalk/supports-color?sponsor=1" + } + }, + "node_modules/supports-preserve-symlinks-flag": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/supports-preserve-symlinks-flag/-/supports-preserve-symlinks-flag-1.0.0.tgz", + "integrity": "sha512-ot0WnXS9fgdkgIcePe6RHNk1WA8+muPa6cSjeR3V8K27q9BB1rTE3R1p7Hv0z1ZyAc8s6Vvv8DIyWf681MAt0w==", + "optional": true, + "engines": { + "node": ">= 0.4" + }, + "funding": { + "url": "https://github.com/sponsors/ljharb" + } + }, + "node_modules/symbol-observable": { + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/symbol-observable/-/symbol-observable-4.0.0.tgz", + "integrity": "sha512-b19dMThMV4HVFynSAM1++gBHAbk2Tc/osgLIBZMKsyqh34jb2e8Os7T6ZW/Bt3pJFdBTd2JwAnAAEQV7rSNvcQ==", + "optional": true, + "engines": { + "node": ">=0.10" + } + }, + "node_modules/text-encoding-utf-8": { + "version": "1.0.2" + }, + "node_modules/through": { + "version": "2.3.8", + "license": "MIT" + }, + "node_modules/through2": { + "version": "2.0.5", + "resolved": "https://registry.npmjs.org/through2/-/through2-2.0.5.tgz", + "integrity": "sha512-/mrRod8xqpA+IHSLyGCQ2s8SPHiCDEeQJSep1jqLYeEUClOFG2Qsh+4FU6G9VeqpZnGW/Su8LQGc4YKni5rYSQ==", + "optional": true, + "dependencies": { + "readable-stream": "~2.3.6", + "xtend": "~4.0.1" + } + }, + "node_modules/through2/node_modules/isarray": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/isarray/-/isarray-1.0.0.tgz", + "integrity": "sha512-VLghIWNM6ELQzo7zwmcg0NmTVyWKYjvIeM83yjp0wRDTmUnrM678fQbcKBo6n2CJEF0szoG//ytg+TKla89ALQ==", + "optional": true + }, + "node_modules/through2/node_modules/readable-stream": { + "version": "2.3.8", + "resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-2.3.8.tgz", + "integrity": "sha512-8p0AUk4XODgIewSi0l8Epjs+EVnWiK7NoDIEGU0HhE7+ZyY8D1IMY7odu5lRrFXGg71L15KG8QrPmum45RTtdA==", + "optional": true, + "dependencies": { + "core-util-is": "~1.0.0", + "inherits": "~2.0.3", + "isarray": "~1.0.0", + "process-nextick-args": "~2.0.0", + "safe-buffer": "~5.1.1", + "string_decoder": "~1.1.1", + "util-deprecate": "~1.0.1" + } + }, + "node_modules/through2/node_modules/safe-buffer": { + "version": "5.1.2", + "resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.1.2.tgz", + "integrity": "sha512-Gd2UZBJDkXlY7GbJxfsE8/nvKkUEU1G38c1siN6QP6a9PT9MmHB8GnpscSmMJSoF8LOIrt8ud/wPtojys4G6+g==", + "optional": true + }, + "node_modules/through2/node_modules/string_decoder": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/string_decoder/-/string_decoder-1.1.1.tgz", + "integrity": "sha512-n/ShnvDi6FHbbVfviro+WojiFzv+s8MPMHBczVePfUpDJLwoLT0ht1l4YwBCbi8pJAveEEdnkHyPyTP/mzRfwg==", + "optional": true, + "dependencies": { + "safe-buffer": "~5.1.0" + } + }, + "node_modules/tiny-secp256k1": { + "version": "1.1.6", + "hasInstallScript": true, + "license": "MIT", + "dependencies": { + "bindings": "^1.3.0", + "bn.js": "^4.11.8", + "create-hmac": "^1.1.7", + "elliptic": "^6.4.0", + "nan": "^2.13.2" + }, + "engines": { + "node": ">=6.0.0" + } + }, + "node_modules/tiny-secp256k1/node_modules/bn.js": { + "version": "4.12.0", + "license": "MIT" + }, + "node_modules/tmp": { + "version": "0.2.1", + "license": "MIT", + "dependencies": { + "rimraf": "^3.0.0" + }, + "engines": { + "node": ">=8.17.0" + } + }, + "node_modules/to-regex-range": { + "version": "5.0.1", + "dev": true, + "license": "MIT", + "dependencies": { + "is-number": "^7.0.0" + }, + "engines": { + "node": ">=8.0" + } + }, + "node_modules/toidentifier": { + "version": "1.0.1", + "license": "MIT", + "engines": { + "node": ">=0.6" + } + }, + "node_modules/toml": { + "version": "3.0.0", + "license": "MIT" + }, + "node_modules/tr46": { + "version": "0.0.3", + "license": "MIT" + }, + "node_modules/ts-invariant": { + "version": "0.10.3", + "resolved": "https://registry.npmjs.org/ts-invariant/-/ts-invariant-0.10.3.tgz", + "integrity": "sha512-uivwYcQaxAucv1CzRp2n/QdYPo4ILf9VXgH19zEIjFx2EJufV16P0JtJVpYHy89DItG6Kwj2oIUjrcK5au+4tQ==", + "optional": true, + "dependencies": { + "tslib": "^2.1.0" + }, + "engines": { + "node": ">=8" + } + }, + "node_modules/ts-mocha": { + "version": "10.0.0", + "dev": true, + "license": "MIT", + "dependencies": { + "ts-node": "7.0.1" + }, + "bin": { + "ts-mocha": "bin/ts-mocha" + }, + "engines": { + "node": ">= 6.X.X" + }, + "optionalDependencies": { + "tsconfig-paths": "^3.5.0" + }, + "peerDependencies": { + "mocha": "^3.X.X || ^4.X.X || ^5.X.X || ^6.X.X || ^7.X.X || ^8.X.X || ^9.X.X || ^10.X.X" + } + }, + "node_modules/ts-node": { + "version": "7.0.1", + "dev": true, + "license": "MIT", + "dependencies": { + "arrify": "^1.0.0", + "buffer-from": "^1.1.0", + "diff": "^3.1.0", + "make-error": "^1.1.1", + "minimist": "^1.2.0", + "mkdirp": "^0.5.1", + "source-map-support": "^0.5.6", + "yn": "^2.0.0" + }, + "bin": { + "ts-node": "dist/bin.js" + }, + "engines": { + "node": ">=4.2.0" + } + }, + "node_modules/ts-node/node_modules/diff": { + "version": "3.5.0", + "dev": true, + "license": "BSD-3-Clause", + "engines": { + "node": ">=0.3.1" + } + }, + "node_modules/ts-results": { + "version": "3.3.0", + "resolved": "https://registry.npmjs.org/ts-results/-/ts-results-3.3.0.tgz", + "integrity": "sha512-FWqxGX2NHp5oCyaMd96o2y2uMQmSu8Dey6kvyuFdRJ2AzfmWo3kWa4UsPlCGlfQ/qu03m09ZZtppMoY8EMHuiA==", + "dev": true + }, + "node_modules/tsconfig-paths": { + "version": "3.14.2", + "dev": true, + "license": "MIT", + "optional": true, + "dependencies": { + "@types/json5": "^0.0.29", + "json5": "^1.0.2", + "minimist": "^1.2.6", + "strip-bom": "^3.0.0" + } + }, + "node_modules/tslib": { + "version": "2.5.0", + "license": "0BSD" + }, + "node_modules/tweetnacl": { + "version": "1.0.3", + "license": "Unlicense" + }, + "node_modules/tweetnacl-util": { + "version": "0.15.1", + "resolved": "https://registry.npmjs.org/tweetnacl-util/-/tweetnacl-util-0.15.1.tgz", + "integrity": "sha512-RKJBIj8lySrShN4w6i/BonWp2Z/uxwC3h4y7xsRrpP59ZboCd0GpEVsOnMDYLMmKBpYhb5TgHzZXy7wTfYFBRw==", + "optional": true + }, + "node_modules/type-detect": { + "version": "4.0.8", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=4" + } + }, + "node_modules/type-fest": { + "version": "3.13.1", + "resolved": "https://registry.npmjs.org/type-fest/-/type-fest-3.13.1.tgz", + "integrity": "sha512-tLq3bSNx+xSpwvAJnzrK0Ep5CLNWjvFTOp71URMaAEWBfRb9nnJiBoUe0tF8bI4ZFO3omgBR6NvnbzVUT3Ly4g==", + "optional": true, + "engines": { + "node": ">=14.16" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/typeforce": { + "version": "1.18.0", + "license": "MIT" + }, + "node_modules/typescript": { + "version": "4.9.5", + "dev": true, + "license": "Apache-2.0", + "bin": { + "tsc": "bin/tsc", + "tsserver": "bin/tsserver" + }, + "engines": { + "node": ">=4.2.0" + } + }, + "node_modules/u3": { + "version": "0.1.1", + "license": "MIT" + }, + "node_modules/untildify": { + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/untildify/-/untildify-4.0.0.tgz", + "integrity": "sha512-KK8xQ1mkzZeg9inewmFVDNkg3l5LUhoq9kN6iWYB/CC9YMG8HA+c1Q8HwDe6dEX7kErrEVNVBO3fWsVq5iDgtw==", + "optional": true, + "engines": { + "node": ">=8" + } + }, + "node_modules/utf-8-validate": { + "version": "5.0.10", + "hasInstallScript": true, + "license": "MIT", + "dependencies": { + "node-gyp-build": "^4.3.0" + }, + "engines": { + "node": ">=6.14.2" + } + }, + "node_modules/util-deprecate": { + "version": "1.0.2", + "license": "MIT" + }, + "node_modules/uuid": { + "version": "8.3.2", + "license": "MIT", + "bin": { + "uuid": "dist/bin/uuid" + } + }, + "node_modules/vlq": { + "version": "2.0.4", + "resolved": "https://registry.npmjs.org/vlq/-/vlq-2.0.4.tgz", + "integrity": "sha512-aodjPa2wPQFkra1G8CzJBTHXhgk3EVSwxSWXNPr1fgdFLUb8kvLV1iEb6rFgasIsjP82HWI6dsb5Io26DDnasA==" + }, + "node_modules/webidl-conversions": { + "version": "3.0.1", + "license": "BSD-2-Clause" + }, + "node_modules/whatwg-url": { + "version": "5.0.0", + "license": "MIT", + "dependencies": { + "tr46": "~0.0.3", + "webidl-conversions": "^3.0.0" + } + }, + "node_modules/wif": { + "version": "2.0.6", + "license": "MIT", + "dependencies": { + "bs58check": "<3.0.0" + } + }, + "node_modules/workerpool": { + "version": "6.2.1", + "dev": true, + "license": "Apache-2.0" + }, + "node_modules/wrap-ansi": { + "version": "7.0.0", + "license": "MIT", + "dependencies": { + "ansi-styles": "^4.0.0", + "string-width": "^4.1.0", + "strip-ansi": "^6.0.0" + }, + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/chalk/wrap-ansi?sponsor=1" + } + }, + "node_modules/wrappy": { + "version": "1.0.2", + "license": "ISC" + }, + "node_modules/ws": { + "version": "7.5.9", + "license": "MIT", + "engines": { + "node": ">=8.3.0" + }, + "peerDependencies": { + "bufferutil": "^4.0.1", + "utf-8-validate": "^5.0.2" + }, + "peerDependenciesMeta": { + "bufferutil": { + "optional": true + }, + "utf-8-validate": { + "optional": true + } + } + }, + "node_modules/xstream": { + "version": "11.14.0", + "resolved": "https://registry.npmjs.org/xstream/-/xstream-11.14.0.tgz", + "integrity": "sha512-1bLb+kKKtKPbgTK6i/BaoAn03g47PpFstlbe1BA+y3pNS/LfvcaghS5BFf9+EE1J+KwSQsEpfJvFN5GqFtiNmw==", + "optional": true, + "dependencies": { + "globalthis": "^1.0.1", + "symbol-observable": "^2.0.3" + } + }, + "node_modules/xstream/node_modules/symbol-observable": { + "version": "2.0.3", + "resolved": "https://registry.npmjs.org/symbol-observable/-/symbol-observable-2.0.3.tgz", + "integrity": "sha512-sQV7phh2WCYAn81oAkakC5qjq2Ml0g8ozqz03wOGnx9dDlG1de6yrF+0RAzSJD8fPUow3PTSMf2SAbOGxb93BA==", + "optional": true, + "engines": { + "node": ">=0.10" + } + }, + "node_modules/xtend": { + "version": "4.0.2", + "resolved": "https://registry.npmjs.org/xtend/-/xtend-4.0.2.tgz", + "integrity": "sha512-LKYU1iAXJXUgAXn9URjiu+MWhyUXHsvfp7mcuYm9dSUKK0/CjtrUwFAxD82/mCWbtLsGjFIad0wIsod4zrTAEQ==", + "optional": true, + "engines": { + "node": ">=0.4" + } + }, + "node_modules/y18n": { + "version": "5.0.8", + "license": "ISC", + "engines": { + "node": ">=10" + } + }, + "node_modules/yargs": { + "version": "17.7.2", + "license": "MIT", + "dependencies": { + "cliui": "^8.0.1", + "escalade": "^3.1.1", + "get-caller-file": "^2.0.5", + "require-directory": "^2.1.1", + "string-width": "^4.2.3", + "y18n": "^5.0.5", + "yargs-parser": "^21.1.1" + }, + "engines": { + "node": ">=12" + } + }, + "node_modules/yargs-parser": { + "version": "20.2.4", + "devOptional": true, + "license": "ISC", + "engines": { + "node": ">=10" + } + }, + "node_modules/yargs-unparser": { + "version": "2.0.0", + "dev": true, + "license": "MIT", + "dependencies": { + "camelcase": "^6.0.0", + "decamelize": "^4.0.0", + "flat": "^5.0.2", + "is-plain-obj": "^2.1.0" + }, + "engines": { + "node": ">=10" + } + }, + "node_modules/yargs/node_modules/yargs-parser": { + "version": "21.1.1", + "license": "ISC", + "engines": { + "node": ">=12" + } + }, + "node_modules/yn": { + "version": "2.0.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=4" + } + }, + "node_modules/yocto-queue": { + "version": "0.1.0", + "dev": true, + "license": "MIT", + "engines": { + "node": ">=10" + }, + "funding": { + "url": "https://github.com/sponsors/sindresorhus" + } + }, + "node_modules/zen-observable": { + "version": "0.8.15", + "resolved": "https://registry.npmjs.org/zen-observable/-/zen-observable-0.8.15.tgz", + "integrity": "sha512-PQ2PC7R9rslx84ndNBZB/Dkv8V8fZEpk83RLgXtYd0fwUgEjseMn1Dgajh2x6S8QbZAFa9p2qVCEuYZNgve0dQ==", + "optional": true + }, + "node_modules/zen-observable-ts": { + "version": "1.2.5", + "resolved": "https://registry.npmjs.org/zen-observable-ts/-/zen-observable-ts-1.2.5.tgz", + "integrity": "sha512-QZWQekv6iB72Naeake9hS1KxHlotfRpe+WGNbNx5/ta+R3DNjVO2bswf63gXlWDcs+EMd7XY8HfVQyP1X6T4Zg==", + "optional": true, + "dependencies": { + "zen-observable": "0.8.15" + } + } + } +} diff --git a/solana/package.json b/solana/package.json new file mode 100644 index 00000000..2ce7214a --- /dev/null +++ b/solana/package.json @@ -0,0 +1,32 @@ +{ + "scripts": { + "lint:fix": "prettier */*.js \"*/**/*{.js,.ts}\" -w", + "lint": "prettier */*.js \"*/**/*{.js,.ts}\" --check", + "initialize": "npx ts-node ts/scripts/initialize.ts", + "register-contracts": "npx ts-node ts/scripts/register_foreign_contracts.ts", + "register-tokens": "npx ts-node ts/scripts/register_tokens.ts", + "set-relayer-fees": "npx ts-node ts/scripts/set_relayer_fees.ts" + }, + "dependencies": { + "@certusone/wormhole-sdk": "^0.10.5", + "@coral-xyz/anchor": "^0.29.0", + "@solana/spl-token": "^0.3.9", + "@solana/web3.js": "^1.87.6", + "ethers": "^5.7.2", + "yargs": "^17.7.2" + }, + "devDependencies": { + "@types/bn.js": "^5.1.0", + "@types/chai": "^4.3.4", + "@types/chai-as-promised": "^7.1.5", + "@types/mocha": "^10.0.1", + "@types/node": "^18.14.5", + "@types/yargs": "^17.0.24", + "chai": "^4.3.7", + "chai-as-promised": "^7.1.1", + "mocha": "^10.0.0", + "ts-mocha": "^10.0.0", + "ts-results": "^3.3.0", + "typescript": "^4.3.5" + } +} diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml new file mode 100644 index 00000000..7287d512 --- /dev/null +++ b/solana/programs/token-router/Cargo.toml @@ -0,0 +1,29 @@ +[package] +name = "token-router" +version = "0.0.0" +description = "Example Token Router Program" +edition = "2021" + +[lib] +crate-type = ["cdylib", "lib"] + +[features] +default = ["testnet", "no-idl"] +no-entrypoint = [] +no-idl = [] +no-log-ix-name = [] +cpi = ["no-entrypoint"] +testnet = ["wormhole-cctp-program/testnet"] +integration-test = ["testnet"] + +[dependencies] +wormhole-cctp-program.workspace = true +anchor-lang.workspace = true +anchor-spl.workspace = true +solana-program.workspace = true +hex.workspace = true +ruint.workspace = true +cfg-if.workspace = true + +[dev-dependencies] +hex-literal.workspace = true \ No newline at end of file diff --git a/solana/programs/token-router/README.md b/solana/programs/token-router/README.md new file mode 100644 index 00000000..e69de29b diff --git a/solana/programs/token-router/Xargo.toml b/solana/programs/token-router/Xargo.toml new file mode 100644 index 00000000..475fb71e --- /dev/null +++ b/solana/programs/token-router/Xargo.toml @@ -0,0 +1,2 @@ +[target.bpfel-unknown-unknown.dependencies.std] +features = [] diff --git a/solana/programs/token-router/src/constants.rs b/solana/programs/token-router/src/constants.rs new file mode 100644 index 00000000..4e0b9492 --- /dev/null +++ b/solana/programs/token-router/src/constants.rs @@ -0,0 +1,10 @@ +use anchor_lang::prelude::constant; + +/// Swap rate precision. This value should NEVER change, unless other Token +/// Bridge Relayer contracts are deployed with a different precision. +#[constant] +pub const NATIVE_SWAP_RATE_PRECISION: u128 = u128::pow(10, 8); + +/// Seed for custody token account. +#[constant] +pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs new file mode 100644 index 00000000..291cd808 --- /dev/null +++ b/solana/programs/token-router/src/error.rs @@ -0,0 +1,164 @@ +use anchor_lang::prelude::error_code; + +#[error_code] +pub enum TokenRouterError { + #[msg("AssistantZeroPubkey")] + AssistantZeroPubkey = 0x100, + + #[msg("FeeRecipientZeroPubkey")] + FeeRecipientZeroPubkey = 0x102, + + /// Only the program's owner is permitted. + #[msg("OwnerOnly")] + OwnerOnly = 0x200, + + #[msg("InvalidNewOwner")] + InvalidNewOwner = 0x202, + + /// Specified key is already the program's owner. + #[msg("AlreadyOwner")] + AlreadyOwner = 0x204, + + #[msg("NoTransferOwnershipRequest")] + NoTransferOwnershipRequest = 0x206, + + #[msg("InvalidNewAssistant")] + InvalidNewAssistant = 0x208, + + #[msg("InvalidNewFeeRecipient")] + InvalidNewFeeRecipient = 0x20a, + + #[msg("InvalidChain")] + InvalidChain = 0x20c, + + #[msg("OutboundTransfersPaused")] + /// Outbound transfers are paused. + OutboundTransfersPaused, + + #[msg("OwnerOrAssistantOnly")] + // Only the program's owner or assistant is permitted. + OwnerOrAssistantOnly, + + #[msg("NotPendingOwner")] + /// Only the program's pending owner is permitted. + NotPendingOwner, + + #[msg("AlreadyTheFeeRecipient")] + /// Specified key is already the program's fee recipient. + AlreadyTheFeeRecipient, + + #[msg("BumpNotFound")] + /// Bump not found in `bumps` map. + BumpNotFound, + + #[msg("FailedToMakeImmutable")] + /// Failed to make program immutable. + FailedToMakeImmutable, + + #[msg("InvalidEndpoint")] + /// Specified foreign contract has a bad chain ID or zero address. + InvalidEndpoint, + + #[msg("ChainNotAllowed")] + ChainNotAllowed, + + #[msg("ZeroBridgeAmount")] + /// Nothing to transfer if amount is zero. + ZeroBridgeAmount, + + #[msg("InvalidToNativeAmount")] + /// Must be strictly zero or nonzero when normalized. + InvalidToNativeAmount, + + #[msg("NativeMintRequired")] + /// Must be the native mint. + NativeMintRequired, + + #[msg("SwapsNotAllowedForNativeMint")] + /// Swaps are not allowed for the native mint. + SwapsNotAllowedForNativeMint, + + #[msg("InvalidTokenBridgeConfig")] + /// Specified Token Bridge config PDA is wrong. + InvalidTokenBridgeConfig, + + #[msg("InvalidTokenBridgeAuthoritySigner")] + /// Specified Token Bridge authority signer PDA is wrong. + InvalidTokenBridgeAuthoritySigner, + + #[msg("InvalidTokenBridgeCustodySigner")] + /// Specified Token Bridge custody signer PDA is wrong. + InvalidTokenBridgeCustodySigner, + + #[msg("InvalidTokenBridgeEmitter")] + /// Specified Token Bridge emitter PDA is wrong. + InvalidTokenBridgeEmitter, + + #[msg("InvalidTokenBridgeSequence")] + /// Specified Token Bridge sequence PDA is wrong. + InvalidTokenBridgeSequence, + + #[msg("InvalidRecipient")] + /// Specified recipient has a bad chain ID or zero address. + InvalidRecipient, + + #[msg("InvalidTransferToChain")] + /// Deserialized token chain is invalid. + InvalidTransferToChain, + + #[msg("InvalidTransferTokenChain")] + /// Deserialized recipient chain is invalid. + InvalidTransferTokenChain, + + #[msg("InvalidPrecision")] + /// Relayer fee and swap rate precision must be nonzero. + InvalidPrecision, + + #[msg("InvalidTransferToAddress")] + /// Deserialized recipient must be this program or the redeemer PDA. + InvalidTransferToAddress, + + #[msg("AlreadyRedeemed")] + /// Token Bridge program's transfer is already redeemed. + AlreadyRedeemed, + + #[msg("InvalidTokenBridgeForeignEndpoint")] + /// Token Bridge program's foreign endpoint disagrees with registered one. + InvalidTokenBridgeForeignEndpoint, + + #[msg("InvalidTokenBridgeMintAuthority")] + /// Specified Token Bridge mint authority PDA is wrong. + InvalidTokenBridgeMintAuthority, + + #[msg("InvalidPublicKey")] + /// Pubkey is the default. + InvalidPublicKey, + + #[msg("ZeroSwapRate")] + /// Swap rate is zero. + ZeroSwapRate, + + #[msg("TokenNotRegistered")] + /// Token is not registered. + TokenNotRegistered, + + #[msg("ChainNotRegistered")] + /// Foreign contract not registered for specified chain. + ChainNotRegistered, + + #[msg("TokenAlreadyRegistered")] + /// Token is already registered. + TokenAlreadyRegistered, + + #[msg("TokenFeeCalculationError")] + /// Token fee overflow. + FeeCalculationError, + + #[msg("InvalidSwapCalculation")] + /// Swap calculation overflow. + InvalidSwapCalculation, + + #[msg("InsufficientFunds")] + /// Insufficient funds for outbound transfer. + InsufficientFunds, +} diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs new file mode 100644 index 00000000..b71ea844 --- /dev/null +++ b/solana/programs/token-router/src/lib.rs @@ -0,0 +1,191 @@ +#![doc = include_str!("../README.md")] +#![allow(clippy::result_large_err)] + +pub mod constants; + +pub mod error; + +pub mod messages; + +mod processor; +pub(crate) use processor::*; + +pub mod state; + +use anchor_lang::prelude::*; + +cfg_if::cfg_if! { + if #[cfg(feature = "mainnet")] { + // Placeholder. + declare_id!("TokenRouter11111111111111111111111111111111"); + } else if #[cfg(feature = "testnet")] { + // Placeholder. + declare_id!("TokenRouter11111111111111111111111111111111"); + } +} + +#[program] +pub mod token_router { + use super::*; + + /// This instruction is be used to generate your program's config. + /// And for convenience, we will store Wormhole-related PDAs in the + /// config so we can verify these accounts with a simple == constraint. + pub fn initialize(ctx: Context) -> Result<()> { + processor::initialize(ctx) + } + + // /// This instruction is used to transfer native tokens from Solana to a + // /// foreign blockchain. The user can optionally specify a + // /// `to_native_token_amount` to swap some of the tokens for the native + // /// asset on the target chain. For a fee, an off-chain relayer will redeem + // /// the transfer on the target chain. If the user is transferring native + // /// SOL, the contract will automatically wrap the lamports into a WSOL. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `TransferNativeWithRelay` context + // /// * `amount` - Amount of tokens to send + // /// * `to_native_token_amount`: + // /// - Amount of tokens to swap for native assets on the target chain + // /// * `recipient_chain` - Chain ID of the target chain + // /// * `recipient_address` - Address of the target wallet on the target chain + // /// * `batch_id` - Nonce of Wormhole message + // /// * `wrap_native` - Whether to wrap native SOL + // pub fn transfer_tokens_with_relay( + // ctx: Context, + // args: TransferTokensWithRelayArgs, + // ) -> Result<()> { + // processor::transfer_tokens_with_relay(ctx, args) + // } + + // Admin. + + /// This instruction sets the `pending_owner` field in the `OwnerConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can submit an + /// ownership transfer request. + pub fn submit_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::submit_ownership_transfer_request(ctx) + } + + /// This instruction confirms that the `pending_owner` is the signer of + /// the transaction and updates the `owner` field in the `SenderConfig`, + /// `RedeemerConfig`, and `OwnerConfig` accounts. + pub fn confirm_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::confirm_ownership_transfer_request(ctx) + } + + /// This instruction cancels the ownership transfer request by setting + /// the `pending_owner` field in the `OwnerConfig` account to `None`. + /// This instruction is owner-only, meaning that only the owner of the + /// program (defined in the [Config] account) can cancel an ownership + /// transfer request. + pub fn cancel_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::cancel_ownership_transfer_request(ctx) + } + + /// This instruction updates the `assistant` field in the `OwnerConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can update the + /// assistant. + pub fn update_owner_assistant(ctx: Context) -> Result<()> { + processor::update_owner_assistant(ctx) + } + + pub fn add_router_endpoint( + ctx: Context, + args: AddRouterEndpointArgs, + ) -> Result<()> { + processor::add_router_endpoint(ctx, args) + } + + /// This instruction updates the `paused` boolean in the `SenderConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can pause outbound + /// transfers. + /// + /// # Arguments + /// + /// * `ctx` - `SetPause` context + /// * `paused` - Boolean indicating whether outbound transfers are paused. + pub fn set_pause(ctx: Context, paused: bool) -> Result<()> { + processor::set_pause(ctx, paused) + } + + // /// This instruction is used to transfer wrapped tokens from Solana to a + // /// foreign blockchain. The user can optionally specify a + // /// `to_native_token_amount` to swap some of the tokens for the native + // /// assets on the target chain. For a fee, an off-chain relayer will redeem + // /// the transfer on the target chain. This instruction should only be called + // /// when the user is transferring a wrapped token. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `TransferWrappedWithRelay` context + // /// * `amount` - Amount of tokens to send + // /// * `to_native_token_amount`: + // /// - Amount of tokens to swap for native assets on the target chain + // /// * `recipient_chain` - Chain ID of the target chain + // /// * `recipient_address` - Address of the target wallet on the target chain + // /// * `batch_id` - Nonce of Wormhole message + // pub fn transfer_wrapped_tokens_with_relay( + // ctx: Context, + // amount: u64, + // to_native_token_amount: u64, + // recipient_chain: u16, + // recipient_address: [u8; 32], + // batch_id: u32, + // ) -> Result<()> { + // processor::transfer_wrapped_tokens_with_relay( + // ctx, + // amount, + // to_native_token_amount, + // recipient_chain, + // recipient_address, + // batch_id, + // ) + // } + + // /// This instruction is used to redeem token transfers from foreign emitters. + // /// It takes custody of the released native tokens and sends the tokens to the + // /// encoded `recipient`. It pays the `fee_recipient` in the token + // /// denomination. If requested by the user, it will perform a swap with the + // /// off-chain relayer to provide the user with lamports. If the token + // /// being transferred is WSOL, the contract will unwrap the WSOL and send + // /// the lamports to the recipient and pay the relayer in lamports. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `CompleteNativeWithRelay` context + // /// * `vaa_hash` - Hash of the VAA that triggered the transfer + // pub fn complete_native_transfer_with_relay( + // ctx: Context, + // _vaa_hash: [u8; 32], + // ) -> Result<()> { + // processor::complete_native_transfer_with_relay(ctx, _vaa_hash) + // } + + // /// This instruction is used to redeem token transfers from foreign emitters. + // /// It takes custody of the minted wrapped tokens and sends the tokens to the + // /// encoded `recipient`. It pays the `fee_recipient` in the wrapped-token + // /// denomination. If requested by the user, it will perform a swap with the + // /// off-chain relayer to provide the user with lamports. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `CompleteWrappedWithRelay` context + // /// * `vaa_hash` - Hash of the VAA that triggered the transfer + // pub fn complete_wrapped_transfer_with_relay( + // ctx: Context, + // _vaa_hash: [u8; 32], + // ) -> Result<()> { + // processor::complete_wrapped_transfer_with_relay(ctx, _vaa_hash) + // } +} diff --git a/solana/programs/token-router/src/messages.rs b/solana/programs/token-router/src/messages.rs new file mode 100644 index 00000000..c32ad5be --- /dev/null +++ b/solana/programs/token-router/src/messages.rs @@ -0,0 +1,89 @@ +//! Messages relevant to the Token Router across all networks. These messages are serialized and +//! then published via the Wormhole CCTP program. + +use ruint::aliases::U256; +use wormhole_cctp_program::sdk::io::{Readable, TypePrefixedPayload, Writeable}; + +#[derive(Debug, Clone, PartialEq, Eq)] +pub struct TransferTokensWithRelay { + pub target_relayer_fee: U256, + pub to_native_token_amount: U256, + pub target_recipient_wallet: [u8; 32], +} + +impl Readable for TransferTokensWithRelay { + const SIZE: Option = Some(32 + 32 + 32); + + fn read(reader: &mut R) -> std::io::Result + where + Self: Sized, + R: std::io::Read, + { + Ok(Self { + target_relayer_fee: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, + to_native_token_amount: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, + target_recipient_wallet: Readable::read(reader)?, + }) + } +} + +impl Writeable for TransferTokensWithRelay { + fn written_size(&self) -> usize { + ::SIZE.unwrap() + } + + fn write(&self, writer: &mut W) -> std::io::Result<()> + where + Self: Sized, + W: std::io::Write, + { + self.target_relayer_fee.to_be_bytes::<32>().write(writer)?; + self.to_native_token_amount + .to_be_bytes::<32>() + .write(writer)?; + self.target_recipient_wallet.write(writer)?; + Ok(()) + } +} + +impl TypePrefixedPayload for TransferTokensWithRelay { + const TYPE: Option = Some(1); +} + +#[cfg(test)] +mod test { + use hex_literal::hex; + + use super::*; + + #[test] + fn transfer_tokens_with_relay() { + let msg = TransferTokensWithRelay { + target_relayer_fee: U256::from(69u64), + to_native_token_amount: U256::from(420u64), + target_recipient_wallet: hex!( + "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" + ), + }; + + let mut bytes = Vec::with_capacity(msg.payload_written_size()); + msg.write_typed(&mut bytes).unwrap(); + assert_eq!(bytes.len(), msg.payload_written_size()); + assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + + let mut cursor = std::io::Cursor::new(&mut bytes); + let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); + assert_eq!(recovered, msg); + } + + #[test] + fn invalid_message_type() { + let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + + let mut cursor = std::io::Cursor::new(&mut bytes); + let err = TransferTokensWithRelay::read_typed(&mut cursor) + .err() + .unwrap(); + matches!(err.kind(), std::io::ErrorKind::InvalidData); + } +} diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs new file mode 100644 index 00000000..63c14599 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs @@ -0,0 +1,71 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use wormhole_cctp_program::sdk as wormhole_cctp; + +#[derive(Accounts)] +#[instruction(chain: u16)] +pub struct AddRouterEndpoint<'info> { + #[account( + mut, + constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + #[account( + init_if_needed, + payer = owner_or_assistant, + space = 8 + RouterEndpoint::INIT_SPACE, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &chain.to_be_bytes() + ], + bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + system_program: Program<'info, System>, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct AddRouterEndpointArgs { + pub chain: u16, + pub address: [u8; 32], +} + +#[access_control(check_constraints(&args))] +pub fn add_router_endpoint( + ctx: Context, + args: AddRouterEndpointArgs, +) -> Result<()> { + let AddRouterEndpointArgs { chain, address } = args; + + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { + bump: ctx.bumps["router_endpoint"], + chain, + address, + }); + + // Done. + Ok(()) +} + +fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { + require!( + args.chain != 0 && args.chain != wormhole_cctp::SOLANA_CHAIN, + TokenRouterError::ChainNotAllowed + ); + + require!(args.address != [0; 32], TokenRouterError::InvalidEndpoint); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs new file mode 100644 index 00000000..a0815b5c --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -0,0 +1,78 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; +use solana_program::bpf_loader_upgradeable; + +#[derive(Accounts)] +pub struct Initialize<'info> { + /// Owner of the program, who presumably deployed this program. + #[account(mut)] + owner: Signer<'info>, + + #[account( + init, + payer = owner, + space = 8 + Custodian::INIT_SPACE, + seeds = [Custodian::SEED_PREFIX], + bump, + )] + /// Sender Config account, which saves program data useful for other + /// instructions, specifically for outbound transfers. Also saves the payer + /// of the [`initialize`](crate::initialize) instruction as the program's + /// owner. + custodian: Account<'info, Custodian>, + + /// CHECK: This account must not be the zero pubkey. + #[account( + owner = Pubkey::default(), + constraint = owner_assistant.key() != Pubkey::default() @ TokenRouterError::AssistantZeroPubkey + )] + owner_assistant: AccountInfo<'info>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + /// + /// NOTE: Set upgrade authority is scary because any public key can be used to set as the + /// authority. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, + + system_program: Program<'info, System>, +} + +pub fn initialize(ctx: Context) -> Result<()> { + let owner = ctx.accounts.owner.key(); + ctx.accounts.custodian.set_inner(Custodian { + bump: ctx.bumps["custodian"], + paused: false, + paused_set_by: owner, + owner, + pending_owner: None, + owner_assistant: ctx.accounts.owner_assistant.key(), + }); + + #[cfg(not(feature = "integration-test"))] + { + // Make the program immutable. + solana_program::program::invoke( + &bpf_loader_upgradeable::set_upgrade_authority( + &crate::ID, + &ctx.accounts.owner.key(), + None, + ), + &ctx.accounts.to_account_infos(), + )?; + } + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/mod.rs b/solana/programs/token-router/src/processor/admin/mod.rs new file mode 100644 index 00000000..dea764f6 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/mod.rs @@ -0,0 +1,29 @@ +mod add_router_endpoint; +pub use add_router_endpoint::*; + +mod initialize; +pub use initialize::*; + +mod ownership_transfer_request; +pub use ownership_transfer_request::*; + +mod set_pause; +pub use set_pause::*; + +mod update; +pub use update::*; + +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +pub(self) fn require_owner_or_assistant( + custodian: &Custodian, + caller: &AccountInfo, +) -> Result { + require!( + *caller.key == custodian.owner || *caller.key == custodian.owner_assistant, + TokenRouterError::OwnerOrAssistantOnly + ); + + Ok(true) +} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs new file mode 100644 index 00000000..711f6410 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -0,0 +1,25 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct CancelOwnershipTransferRequest<'info> { + owner: Signer<'info>, + + /// Custodian, which can only be modified by the configured owner. + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + has_one = owner @ TokenRouterError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, +} + +pub fn cancel_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + ctx.accounts.custodian.pending_owner = None; + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs new file mode 100644 index 00000000..faad5568 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -0,0 +1,29 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct ConfirmOwnershipTransferRequest<'info> { + /// Must be the pending owner of the program set in the [`OwnerConfig`] + /// account. + pending_owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = custodian.pending_owner.is_some() @ TokenRouterError::NoTransferOwnershipRequest, + constraint = custodian.pending_owner.unwrap() == pending_owner.key() @ TokenRouterError::NotPendingOwner, + )] + custodian: Account<'info, Custodian>, +} + +pub fn confirm_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + let custodian = &mut ctx.accounts.custodian; + custodian.owner = ctx.accounts.pending_owner.key(); + custodian.pending_owner = None; + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs new file mode 100644 index 00000000..c33a7ba7 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs @@ -0,0 +1,8 @@ +mod cancel; +pub use cancel::*; + +mod confirm; +pub use confirm::*; + +mod submit; +pub use submit::*; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs new file mode 100644 index 00000000..d2521e43 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -0,0 +1,34 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct SubmitOwnershipTransferRequest<'info> { + owner: Signer<'info>, + + /// Custodian, which can only be modified by the configured owner. + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + has_one = owner @ TokenRouterError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + /// New Owner. + /// + /// CHECK: Must be neither zero pubkey nor current owner. + #[account( + constraint = new_owner.key() != Pubkey::default() @ TokenRouterError::InvalidNewOwner, + constraint = new_owner.key() != owner.key() @ TokenRouterError::AlreadyOwner + )] + new_owner: AccountInfo<'info>, +} + +pub fn submit_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + ctx.accounts.custodian.pending_owner = Some(ctx.accounts.new_owner.key()); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs new file mode 100644 index 00000000..9770fda8 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/set_pause.rs @@ -0,0 +1,26 @@ +use crate::state::Custodian; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct SetPause<'info> { + owner_or_assistant: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + )] + /// Sender Config account. This program requires that the `owner` specified + /// in the context equals the pubkey specified in this account. Mutable. + custodian: Account<'info, Custodian>, +} + +pub fn set_pause(ctx: Context, paused: bool) -> Result<()> { + let custodian = &mut ctx.accounts.custodian; + custodian.paused = paused; + custodian.paused_set_by = ctx.accounts.owner_or_assistant.key(); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/update/mod.rs b/solana/programs/token-router/src/processor/admin/update/mod.rs new file mode 100644 index 00000000..656c9345 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/update/mod.rs @@ -0,0 +1,2 @@ +mod owner_assistant; +pub use owner_assistant::*; diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs new file mode 100644 index 00000000..d7ac2604 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -0,0 +1,31 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct UpdateOwnerAssistant<'info> { + /// Owner of the program set in the [`OwnerConfig`] account. + owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + has_one = owner @ TokenRouterError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + /// New Assistant. + /// + /// CHECK: Must be neither zero pubkey nor current owner assistant. + #[account( + constraint = new_owner_assistant.key() != Pubkey::default() @ TokenRouterError::InvalidNewAssistant, + )] + new_owner_assistant: AccountInfo<'info>, +} + +pub fn update_owner_assistant(ctx: Context) -> Result<()> { + ctx.accounts.custodian.owner_assistant = ctx.accounts.new_owner_assistant.key(); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/complete_transfer_with_relay.rs b/solana/programs/token-router/src/processor/complete_transfer_with_relay.rs new file mode 100644 index 00000000..8a8eb5a7 --- /dev/null +++ b/solana/programs/token-router/src/processor/complete_transfer_with_relay.rs @@ -0,0 +1,223 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, RegisteredAsset, RegisteredContract}, +}; +use anchor_lang::{ + prelude::*, + system_program::{self, Transfer}, +}; +use anchor_spl::token; +use wormhole_cctp_program::sdk as wormhole_cctp; + +#[derive(Accounts)] +#[instruction(vaa_hash: [u8; 32])] +pub struct CompleteNativeWithRelay<'info> { + #[account(mut)] + payer: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump + )] + custodian: Account<'info, Custodian>, + + /// CHECK: We will be performing zero-copy deserialization in the instruction handler. + #[account(owner = wormhole_cctp::core_bridge::id())] + vaa: AccountInfo<'info>, + + /// CHECK: This account is needed to create the temporary custody token account. + #[account(address = registered_asset.mint)] + mint: AccountInfo<'info>, + + /// Fee recipient's token account. Must be an associated token account. Mutable. + #[account( + mut, + associated_token::mint = registered_asset.mint, + associated_token::authority = custodian.fee_recipient + )] + fee_recipient_token: Account<'info, token::TokenAccount>, + + /// Recipient associated token account. The recipient authority check + /// is necessary to ensure that the recipient is the intended recipient + /// of the bridged tokens. Mutable. + #[account( + mut, + associated_token::mint = registered_asset.mint, + associated_token::authority = recipient + )] + recipient_token: Account<'info, token::TokenAccount>, + + /// Foreign Contract account. The registered contract specified in this + /// account must agree with the target address for the Token Bridge's token + /// transfer. Read-only. + #[account( + seeds = [ + RegisteredContract::SEED_PREFIX, + &try_vaa(&vaa, |vaa| vaa.try_emitter_chain())?.to_be_bytes() + ], + bump = registered_contract.bump, + constraint = try_vaa(&vaa, |vaa| vaa.try_emitter_address())? == registered_contract.address @ TokenRouterError::InvalidEndpoint + )] + registered_contract: Account<'info, RegisteredContract>, + + #[account( + seeds = [ + RegisteredAsset::SEED_PREFIX, + registered_asset.mint.as_ref() + ], + bump = registered_asset.bump, + )] + // Registered token account for the specified mint. This account stores + // information about the token. Read-only. + registered_asset: Account<'info, RegisteredAsset>, + + #[account(mut)] + /// CHECK: recipient may differ from payer if a relayer paid for this + /// transaction. This instruction verifies that the recipient key + /// passed in this context matches the intended recipient in the vaa. + recipient: AccountInfo<'info>, + + /// Program's temporary token account. This account is created before the + /// instruction is invoked to temporarily take custody of the payer's + /// tokens. When the tokens are finally bridged in, the tokens will be + /// transferred to the destination token accounts. This account will have + /// zero balance and can be closed. + #[account( + init, + payer = payer, + token::mint = mint, + token::authority = custodian, + seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + #[account( + mut, + constraint = worm_cctp_claim.data_is_empty() @ TokenRouterError::AlreadyRedeemed + )] + worm_cctp_claim: AccountInfo<'info>, + + system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, + wormhole_cctp_program: Program<'info, wormhole_cctp::WormholeCctp>, +} + +pub fn complete_native_transfer_with_relay( + ctx: Context, + _vaa_hash: [u8; 32], +) -> Result<()> { + // The intended recipient must agree with the recipient account. + let TokenBridgeRelayerMessage::TransferWithRelay { + target_relayer_fee, + to_native_token_amount, + recipient, + } = *ctx.accounts.vaa.message().data(); + require!( + ctx.accounts.recipient.key() == Pubkey::from(recipient), + TokenRouterError::InvalidRecipient + ); + + // These seeds are used to: + // 1. Redeem Token Bridge program's + // complete_transfer_native_with_payload. + // 2. Transfer tokens to relayer if it exists. + // 3. Transfer remaining tokens to recipient. + // 4. Close tmp_token_account. + let config_seeds = &[ + RedeemerConfig::SEED_PREFIX.as_ref(), + &[ctx.accounts.config.bump], + ]; + + // Redeem the token transfer to the tmp_token_account. + token_bridge::complete_transfer_native_with_payload(CpiContext::new_with_signer( + ctx.accounts.token_bridge_program.to_account_info(), + token_bridge::CompleteTransferNativeWithPayload { + payer: ctx.accounts.payer.to_account_info(), + config: ctx.accounts.token_bridge_config.to_account_info(), + vaa: ctx.accounts.vaa.to_account_info(), + claim: ctx.accounts.token_bridge_claim.to_account_info(), + foreign_endpoint: ctx.accounts.token_bridge_foreign_endpoint.to_account_info(), + to: ctx.accounts.tmp_token_account.to_account_info(), + redeemer: ctx.accounts.config.to_account_info(), + custody: ctx.accounts.token_bridge_custody.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + custody_signer: ctx.accounts.token_bridge_custody_signer.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + wormhole_program: ctx.accounts.wormhole_program.to_account_info(), + }, + &[config_seeds], + ))?; + + // Denormalize the transfer amount and target relayer fee encoded in + // the VAA. + let amount = token_bridge::denormalize_amount( + ctx.accounts.vaa.data().amount(), + ctx.accounts.mint.decimals, + ); + let denormalized_relayer_fee = + token_bridge::denormalize_amount(target_relayer_fee, ctx.accounts.mint.decimals); + + // Check to see if the transfer is for wrapped SOL. If it is, + // unwrap and transfer the SOL to the recipient and relayer. + // Since we are unwrapping the SOL, this contract will not + // perform a swap with the off-chain relayer. + if ctx.accounts.mint.key() == spl_token::native_mint::ID { + // Transfer all lamports to the payer. + anchor_spl::token::close_account(CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::CloseAccount { + account: ctx.accounts.tmp_token_account.to_account_info(), + destination: ctx.accounts.payer.to_account_info(), + authority: ctx.accounts.config.to_account_info(), + }, + &[config_seeds], + ))?; + + // If the payer is a relayer, we need to send the expected lamports + // to the recipient, less the relayer fee. + if ctx.accounts.payer.key() != ctx.accounts.recipient.key() { + system_program::transfer( + CpiContext::new( + ctx.accounts.system_program.to_account_info(), + Transfer { + from: ctx.accounts.payer.to_account_info(), + to: ctx.accounts.recipient.to_account_info(), + }, + ), + amount - denormalized_relayer_fee, + ) + } else { + Ok(()) + } + } else { + redeem_token( + RedeemToken { + payer: &ctx.accounts.payer, + config: &ctx.accounts.config, + fee_recipient_token_account: &ctx.accounts.fee_recipient_token_account, + mint: &ctx.accounts.mint, + recipient_token_account: &ctx.accounts.recipient_token_account, + recipient: &ctx.accounts.recipient, + registered_asset: &ctx.accounts.registered_asset, + native_registered_token: &ctx.accounts.native_registered_token, + tmp_token_account: &ctx.accounts.tmp_token_account, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + }, + amount, + denormalized_relayer_fee, + to_native_token_amount, + ) + } +} + +fn try_vaa(vaa_acc_info: &AccountInfo, func: F) -> Result +where + T: std::fmt::Debug, + F: FnOnce(wormhole_cctp::VaaAccount) -> Result, +{ + wormhole_cctp::VaaAccount::load(vaa_acc_info).and_then(func) +} diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs new file mode 100644 index 00000000..b8719d68 --- /dev/null +++ b/solana/programs/token-router/src/processor/mod.rs @@ -0,0 +1,8 @@ +mod admin; +pub use admin::*; + +// mod complete_transfer_with_relay; +// pub use complete_transfer_with_relay::*; + +// mod transfer_tokens_with_relay; +// pub use transfer_tokens_with_relay::*; diff --git a/solana/programs/token-router/src/processor/old_inbound/mod.rs b/solana/programs/token-router/src/processor/old_inbound/mod.rs new file mode 100644 index 00000000..2137598f --- /dev/null +++ b/solana/programs/token-router/src/processor/old_inbound/mod.rs @@ -0,0 +1,150 @@ +mod native; +mod wrapped; + +pub use native::*; +pub use wrapped::*; + +use crate::{ + error::TokenRouterError, + state::{RedeemerConfig, RegisteredAsset}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token::{Mint, Token, TokenAccount}; +use wormhole_anchor_sdk::token_bridge; + +pub struct RedeemToken<'ctx, 'info> { + payer: &'ctx Signer<'info>, + config: &'ctx Account<'info, RedeemerConfig>, + fee_recipient_token_account: &'ctx Account<'info, TokenAccount>, + mint: &'ctx Account<'info, Mint>, + recipient_token_account: &'ctx Account<'info, TokenAccount>, + recipient: &'ctx AccountInfo<'info>, + registered_asset: &'ctx Account<'info, RegisteredAsset>, + native_registered_token: &'ctx Account<'info, RegisteredAsset>, + tmp_token_account: &'ctx Account<'info, TokenAccount>, + token_program: &'ctx Program<'info, Token>, + system_program: &'ctx Program<'info, System>, +} + +pub fn redeem_token( + redeem_token: RedeemToken, + amount: u64, + denormalized_relayer_fee: u64, + to_native_token_amount: u64, +) -> Result<()> { + let RedeemToken { + payer, + config, + fee_recipient_token_account, + mint, + recipient_token_account, + recipient, + registered_asset, + native_registered_token, + tmp_token_account, + token_program, + system_program, + } = redeem_token; + + let config_seeds = &[RedeemerConfig::SEED_PREFIX.as_ref(), &[config.bump]]; + + // Handle self redemptions. If the payer is the recipient, we should + // send the entire transfer amount. + if payer.key() == recipient.key() { + // Transfer tokens from tmp_token_account to recipient. + anchor_spl::token::transfer( + CpiContext::new_with_signer( + token_program.to_account_info(), + anchor_spl::token::Transfer { + from: tmp_token_account.to_account_info(), + to: recipient_token_account.to_account_info(), + authority: config.to_account_info(), + }, + &[&config_seeds[..]], + ), + amount, + )?; + } else { + // Denormalize the to_native_token_amount. + let denormalized_to_native_token_amount = + token_bridge::denormalize_amount(to_native_token_amount, mint.decimals); + + // Calculate the amount of SOL that should be sent to the + // recipient. + let (token_amount_in, native_amount_out) = registered_asset + .calculate_native_swap_amounts( + mint.decimals, + native_registered_token.swap_rate, + denormalized_to_native_token_amount, + ) + .ok_or(TokenRouterError::InvalidSwapCalculation)?; + + // Transfer lamports from the payer to the recipient if the + // native_amount_out is nonzero. + if native_amount_out > 0 { + anchor_lang::system_program::transfer( + CpiContext::new( + system_program.to_account_info(), + anchor_lang::system_program::Transfer { + from: payer.to_account_info(), + to: recipient.to_account_info(), + }, + ), + native_amount_out, + )?; + + msg!( + "Swap executed successfully, recipient: {}, relayer: {}, token: {}, tokenAmount: {}, nativeAmount: {}", + recipient.key(), + payer.key(), + mint.key(), + token_amount_in, + native_amount_out + ); + } + + // Calculate the amount for the fee recipient. + let amount_for_fee_recipient = token_amount_in + denormalized_relayer_fee; + + // Transfer tokens from tmp_token_account to the fee recipient. + if amount_for_fee_recipient > 0 { + anchor_spl::token::transfer( + CpiContext::new_with_signer( + token_program.to_account_info(), + anchor_spl::token::Transfer { + from: tmp_token_account.to_account_info(), + to: fee_recipient_token_account.to_account_info(), + authority: config.to_account_info(), + }, + &[&config_seeds[..]], + ), + amount_for_fee_recipient, + )?; + } + + // Transfer tokens from tmp_token_account to recipient. + anchor_spl::token::transfer( + CpiContext::new_with_signer( + token_program.to_account_info(), + anchor_spl::token::Transfer { + from: tmp_token_account.to_account_info(), + to: recipient_token_account.to_account_info(), + authority: config.to_account_info(), + }, + &[&config_seeds[..]], + ), + amount - amount_for_fee_recipient, + )?; + } + + // Finish instruction by closing tmp_token_account. + anchor_spl::token::close_account(CpiContext::new_with_signer( + token_program.to_account_info(), + anchor_spl::token::CloseAccount { + account: tmp_token_account.to_account_info(), + destination: payer.to_account_info(), + authority: config.to_account_info(), + }, + &[&config_seeds[..]], + )) +} diff --git a/solana/programs/token-router/src/processor/old_inbound/native.rs b/solana/programs/token-router/src/processor/old_inbound/native.rs new file mode 100644 index 00000000..757b40ab --- /dev/null +++ b/solana/programs/token-router/src/processor/old_inbound/native.rs @@ -0,0 +1,278 @@ +use crate::{ + constants::SEED_PREFIX_TMP, + error::TokenRouterError, + message::TokenBridgeRelayerMessage, + state::{ForeignContract, RedeemerConfig, RegisteredAsset}, + token::{spl_token, Mint, Token, TokenAccount}, + PostedTokenBridgeRelayerMessage, +}; +use anchor_lang::{ + prelude::*, + system_program::{self, Transfer}, +}; +use wormhole_anchor_sdk::{token_bridge, wormhole}; + +use super::{redeem_token, RedeemToken}; + +#[derive(Accounts)] +#[instruction(vaa_hash: [u8; 32])] +pub struct CompleteNativeWithRelay<'info> { + #[account(mut)] + /// Payer will pay Wormhole fee to transfer tokens and create temporary + /// token account. + pub payer: Signer<'info>, + + #[account( + seeds = [RedeemerConfig::SEED_PREFIX], + bump = config.bump + )] + /// Redeemer Config account. Acts as the Token Bridge redeemer, which signs + /// for the complete transfer instruction. Read-only. + pub config: Box>, + + #[account( + mut, + associated_token::mint = mint, + associated_token::authority = config.fee_recipient + )] + /// Fee recipient's token account. Must be an associated token account. Mutable. + pub fee_recipient_token_account: Box>, + + #[account( + seeds = [ + ForeignContract::SEED_PREFIX, + &vaa.emitter_chain().to_be_bytes()[..] + ], + bump, + constraint = foreign_contract.verify(&vaa) @ TokenRouterError::InvalidEndpoint + )] + /// Foreign Contract account. The registered contract specified in this + /// account must agree with the target address for the Token Bridge's token + /// transfer. Read-only. + pub foreign_contract: Box>, + + #[account( + address = vaa.data().mint() + )] + /// Mint info. This is the SPL token that will be bridged over from the + /// foreign contract. This must match the token address specified in the + /// signed Wormhole message. Read-only. + pub mint: Box>, + + #[account( + mut, + associated_token::mint = mint, + associated_token::authority = recipient + )] + /// Recipient associated token account. The recipient authority check + /// is necessary to ensure that the recipient is the intended recipient + /// of the bridged tokens. Mutable. + pub recipient_token_account: Box>, + + #[account(mut)] + /// CHECK: recipient may differ from payer if a relayer paid for this + /// transaction. This instruction verifies that the recipient key + /// passed in this context matches the intended recipient in the vaa. + pub recipient: AccountInfo<'info>, + + #[account( + seeds = [RegisteredAsset::SEED_PREFIX, mint.key().as_ref()], + bump + )] + // Registered token account for the specified mint. This account stores + // information about the token. Read-only. + pub registered_asset: Box>, + + #[account( + seeds = [RegisteredAsset::SEED_PREFIX, spl_token::native_mint::ID.as_ref()], + bump, + )] + // Registered token account for the native mint. This account stores + // information about the token and is used for the swap rate. Read-only. + pub native_registered_token: Box>, + + #[account( + init, + payer = payer, + seeds = [ + SEED_PREFIX_TMP, + mint.key().as_ref(), + ], + bump, + token::mint = mint, + token::authority = config + )] + /// Program's temporary token account. This account is created before the + /// instruction is invoked to temporarily take custody of the payer's + /// tokens. When the tokens are finally bridged in, the tokens will be + /// transferred to the destination token accounts. This account will have + /// zero balance and can be closed. + pub tmp_token_account: Box>, + + /// CHECK: Token Bridge config. Read-only. + pub token_bridge_config: UncheckedAccount<'info>, + + #[account( + seeds = [ + wormhole::SEED_PREFIX_POSTED_VAA, + &vaa_hash + ], + bump, + seeds::program = wormhole_program, + constraint = vaa.data().to() == crate::ID @ TokenRouterError::InvalidTransferToAddress, + constraint = vaa.data().to_chain() == wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferToChain, + constraint = vaa.data().token_chain() == wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferTokenChain + )] + /// Verified Wormhole message account. The Wormhole program verified + /// signatures and posted the account data here. Read-only. + pub vaa: Box>, + + #[account( + mut, + constraint = token_bridge_claim.data_is_empty() @ TokenRouterError::AlreadyRedeemed + )] + /// CHECK: Token Bridge claim account. It stores a boolean, whose value + /// is true if the bridged assets have been claimed. If the transfer has + /// not been redeemed, this account will not exist yet. + /// + /// NOTE: The Token Bridge program's claim account is only initialized when + /// a transfer is redeemed (and the boolean value `true` is written as + /// its data). + /// + /// The Token Bridge program will automatically fail if this transfer + /// is redeemed again. But we choose to short-circuit the failure as the + /// first evaluation of this instruction. + pub token_bridge_claim: AccountInfo<'info>, + + /// CHECK: Token Bridge foreign endpoint. This account should really be one + /// endpoint per chain, but the PDA allows for multiple endpoints for each + /// chain! We store the proper endpoint for the emitter chain. + pub token_bridge_foreign_endpoint: UncheckedAccount<'info>, + + /// CHECK: Token Bridge custody. This is the Token Bridge program's token + /// account that holds this mint's balance. + #[account(mut)] + pub token_bridge_custody: UncheckedAccount<'info>, + + /// CHECK: Token Bridge custody signer. Read-only. + pub token_bridge_custody_signer: UncheckedAccount<'info>, + + pub wormhole_program: Program<'info, wormhole::program::Wormhole>, + pub token_bridge_program: Program<'info, token_bridge::program::TokenBridge>, + pub system_program: Program<'info, System>, + pub token_program: Program<'info, Token>, + + /// CHECK: Token Bridge program needs rent sysvar. + pub rent: UncheckedAccount<'info>, +} + +pub fn complete_native_transfer_with_relay( + ctx: Context, + _vaa_hash: [u8; 32], +) -> Result<()> { + // The intended recipient must agree with the recipient account. + let TokenBridgeRelayerMessage::TransferWithRelay { + target_relayer_fee, + to_native_token_amount, + recipient, + } = *ctx.accounts.vaa.message().data(); + require!( + ctx.accounts.recipient.key() == Pubkey::from(recipient), + TokenRouterError::InvalidRecipient + ); + + // These seeds are used to: + // 1. Redeem Token Bridge program's + // complete_transfer_native_with_payload. + // 2. Transfer tokens to relayer if it exists. + // 3. Transfer remaining tokens to recipient. + // 4. Close tmp_token_account. + let config_seeds = &[ + RedeemerConfig::SEED_PREFIX.as_ref(), + &[ctx.accounts.config.bump], + ]; + + // Redeem the token transfer to the tmp_token_account. + token_bridge::complete_transfer_native_with_payload(CpiContext::new_with_signer( + ctx.accounts.token_bridge_program.to_account_info(), + token_bridge::CompleteTransferNativeWithPayload { + payer: ctx.accounts.payer.to_account_info(), + config: ctx.accounts.token_bridge_config.to_account_info(), + vaa: ctx.accounts.vaa.to_account_info(), + claim: ctx.accounts.token_bridge_claim.to_account_info(), + foreign_endpoint: ctx.accounts.token_bridge_foreign_endpoint.to_account_info(), + to: ctx.accounts.tmp_token_account.to_account_info(), + redeemer: ctx.accounts.config.to_account_info(), + custody: ctx.accounts.token_bridge_custody.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + custody_signer: ctx.accounts.token_bridge_custody_signer.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + wormhole_program: ctx.accounts.wormhole_program.to_account_info(), + }, + &[config_seeds], + ))?; + + // Denormalize the transfer amount and target relayer fee encoded in + // the VAA. + let amount = token_bridge::denormalize_amount( + ctx.accounts.vaa.data().amount(), + ctx.accounts.mint.decimals, + ); + let denormalized_relayer_fee = + token_bridge::denormalize_amount(target_relayer_fee, ctx.accounts.mint.decimals); + + // Check to see if the transfer is for wrapped SOL. If it is, + // unwrap and transfer the SOL to the recipient and relayer. + // Since we are unwrapping the SOL, this contract will not + // perform a swap with the off-chain relayer. + if ctx.accounts.mint.key() == spl_token::native_mint::ID { + // Transfer all lamports to the payer. + anchor_spl::token::close_account(CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::CloseAccount { + account: ctx.accounts.tmp_token_account.to_account_info(), + destination: ctx.accounts.payer.to_account_info(), + authority: ctx.accounts.config.to_account_info(), + }, + &[config_seeds], + ))?; + + // If the payer is a relayer, we need to send the expected lamports + // to the recipient, less the relayer fee. + if ctx.accounts.payer.key() != ctx.accounts.recipient.key() { + system_program::transfer( + CpiContext::new( + ctx.accounts.system_program.to_account_info(), + Transfer { + from: ctx.accounts.payer.to_account_info(), + to: ctx.accounts.recipient.to_account_info(), + }, + ), + amount - denormalized_relayer_fee, + ) + } else { + Ok(()) + } + } else { + redeem_token( + RedeemToken { + payer: &ctx.accounts.payer, + config: &ctx.accounts.config, + fee_recipient_token_account: &ctx.accounts.fee_recipient_token_account, + mint: &ctx.accounts.mint, + recipient_token_account: &ctx.accounts.recipient_token_account, + recipient: &ctx.accounts.recipient, + registered_asset: &ctx.accounts.registered_asset, + native_registered_token: &ctx.accounts.native_registered_token, + tmp_token_account: &ctx.accounts.tmp_token_account, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + }, + amount, + denormalized_relayer_fee, + to_native_token_amount, + ) + } +} diff --git a/solana/programs/token-router/src/processor/old_inbound/wrapped.rs b/solana/programs/token-router/src/processor/old_inbound/wrapped.rs new file mode 100644 index 00000000..0de8bb45 --- /dev/null +++ b/solana/programs/token-router/src/processor/old_inbound/wrapped.rs @@ -0,0 +1,225 @@ +use crate::{ + constants::SEED_PREFIX_TMP, + error::TokenRouterError, + message::TokenBridgeRelayerMessage, + state::{ForeignContract, RedeemerConfig, RegisteredAsset}, + token::{spl_token, Token, TokenAccount}, + PostedTokenBridgeRelayerMessage, +}; +use anchor_lang::prelude::*; +use anchor_spl::token::Mint; +use wormhole_anchor_sdk::{token_bridge, wormhole}; + +use super::{redeem_token, RedeemToken}; + +#[derive(Accounts)] +#[instruction(vaa_hash: [u8; 32])] +pub struct CompleteWrappedWithRelay<'info> { + #[account(mut)] + /// Payer will pay Wormhole fee to transfer tokens and create temporary + /// token account. + pub payer: Signer<'info>, + + #[account( + seeds = [RedeemerConfig::SEED_PREFIX], + bump + )] + /// Redeemer Config account. Acts as the Token Bridge redeemer, which signs + /// for the complete transfer instruction. Read-only. + pub config: Box>, + + #[account( + mut, + associated_token::mint = token_bridge_wrapped_mint, + associated_token::authority = config.fee_recipient + )] + /// Fee recipient's token account. Must be an associated token account. Mutable. + pub fee_recipient_token_account: Box>, + + #[account( + seeds = [ + ForeignContract::SEED_PREFIX, + &vaa.emitter_chain().to_be_bytes()[..] + ], + bump, + constraint = foreign_contract.verify(&vaa) @ TokenRouterError::InvalidEndpoint + )] + /// Foreign Contract account. The registered contract specified in this + /// account must agree with the target address for the Token Bridge's token + /// transfer. Read-only. + pub foreign_contract: Box>, + + #[account(mut)] + /// Token Bridge wrapped mint info. This is the SPL token that will be + /// bridged from the foreign contract. The wrapped mint PDA must agree + /// with the native token's metadata in the wormhole message. Mutable. + pub token_bridge_wrapped_mint: Box>, + + #[account( + mut, + associated_token::mint = token_bridge_wrapped_mint, + associated_token::authority = recipient + )] + /// Recipient associated token account. The recipient authority check + /// is necessary to ensure that the recipient is the intended recipient + /// of the bridged tokens. Mutable. + pub recipient_token_account: Box>, + + #[account(mut)] + /// CHECK: recipient may differ from payer if a relayer paid for this + /// transaction. This instruction verifies that the recipient key + /// passed in this context matches the intended recipient in the vaa. + pub recipient: AccountInfo<'info>, + + #[account( + seeds = [RegisteredAsset::SEED_PREFIX, token_bridge_wrapped_mint.key().as_ref()], + bump + )] + // Registered token account for the specified mint. This account stores + // information about the token. Read-only. + pub registered_asset: Box>, + + #[account( + seeds = [RegisteredAsset::SEED_PREFIX, spl_token::native_mint::ID.as_ref()], + bump + )] + // Registered token account for the native mint. This account stores + // information about the token and is used for the swap rate. Read-only. + pub native_registered_token: Box>, + + #[account( + init, + payer = payer, + seeds = [ + SEED_PREFIX_TMP, + token_bridge_wrapped_mint.key().as_ref(), + ], + bump, + token::mint = token_bridge_wrapped_mint, + token::authority = config + )] + /// Program's temporary token account. This account is created before the + /// instruction is invoked to temporarily take custody of the payer's + /// tokens. When the tokens are finally bridged in, the tokens will be + /// transferred to the destination token accounts. This account will have + /// zero balance and can be closed. + pub tmp_token_account: Box>, + + /// CHECK: Token Bridge program's wrapped metadata, which stores info + /// about the token from its native chain: + /// * Wormhole Chain ID + /// * Token's native contract address + /// * Token's native decimals + pub token_bridge_wrapped_meta: UncheckedAccount<'info>, + + /// CHECK: Token Bridge config. Read-only. + pub token_bridge_config: UncheckedAccount<'info>, + + #[account( + seeds = [ + wormhole::SEED_PREFIX_POSTED_VAA, + &vaa_hash + ], + bump, + seeds::program = wormhole_program, + constraint = vaa.data().to() == crate::ID @ TokenRouterError::InvalidTransferToAddress, + constraint = vaa.data().to_chain() == wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferToChain, + constraint = vaa.data().token_chain() != wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferTokenChain + )] + /// Verified Wormhole message account. The Wormhole program verified + /// signatures and posted the account data here. Read-only. + pub vaa: Box>, + + #[account( + mut, + constraint = token_bridge_claim.data_is_empty() @ TokenRouterError::AlreadyRedeemed + )] + /// CHECK: Token Bridge claim account. It stores a boolean, whose value + /// is true if the bridged assets have been claimed. If the transfer has + /// not been redeemed, this account will not exist yet. + /// + /// NOTE: The Token Bridge program's claim account is only initialized when + /// a transfer is redeemed (and the boolean value `true` is written as + /// its data). + /// + /// The Token Bridge program will automatically fail if this transfer + /// is redeemed again. But we choose to short-circuit the failure as the + /// first evaluation of this instruction. + pub token_bridge_claim: AccountInfo<'info>, + + /// CHECK: Token Bridge foreign endpoint. This account should really be one + /// endpoint per chain, but the PDA allows for multiple endpoints for each + /// chain! We store the proper endpoint for the emitter chain. + pub token_bridge_foreign_endpoint: UncheckedAccount<'info>, + + /// CHECK: Token Bridge custody signer. Read-only. + pub token_bridge_mint_authority: UncheckedAccount<'info>, + + pub wormhole_program: Program<'info, wormhole::program::Wormhole>, + pub token_bridge_program: Program<'info, token_bridge::program::TokenBridge>, + pub system_program: Program<'info, System>, + pub token_program: Program<'info, Token>, + + /// CHECK: Token Bridge program needs rent sysvar. + pub rent: UncheckedAccount<'info>, +} + +pub fn complete_wrapped_transfer_with_relay( + ctx: Context, + _vaa_hash: [u8; 32], +) -> Result<()> { + // The intended recipient must agree with the recipient account. + let TokenBridgeRelayerMessage::TransferWithRelay { + target_relayer_fee, + to_native_token_amount, + recipient, + } = *ctx.accounts.vaa.message().data(); + require!( + ctx.accounts.recipient.key() == Pubkey::from(recipient), + TokenRouterError::InvalidRecipient + ); + + // Redeem the token transfer to the tmp_token_account. + token_bridge::complete_transfer_wrapped_with_payload(CpiContext::new_with_signer( + ctx.accounts.token_bridge_program.to_account_info(), + token_bridge::CompleteTransferWrappedWithPayload { + payer: ctx.accounts.payer.to_account_info(), + config: ctx.accounts.token_bridge_config.to_account_info(), + vaa: ctx.accounts.vaa.to_account_info(), + claim: ctx.accounts.token_bridge_claim.to_account_info(), + foreign_endpoint: ctx.accounts.token_bridge_foreign_endpoint.to_account_info(), + to: ctx.accounts.tmp_token_account.to_account_info(), + redeemer: ctx.accounts.config.to_account_info(), + wrapped_mint: ctx.accounts.token_bridge_wrapped_mint.to_account_info(), + wrapped_metadata: ctx.accounts.token_bridge_wrapped_meta.to_account_info(), + mint_authority: ctx.accounts.token_bridge_mint_authority.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + wormhole_program: ctx.accounts.wormhole_program.to_account_info(), + }, + &[&[ + RedeemerConfig::SEED_PREFIX.as_ref(), + &[ctx.accounts.config.bump], + ]], + ))?; + + redeem_token( + RedeemToken { + payer: &ctx.accounts.payer, + config: &ctx.accounts.config, + fee_recipient_token_account: &ctx.accounts.fee_recipient_token_account, + mint: &ctx.accounts.token_bridge_wrapped_mint, + recipient_token_account: &ctx.accounts.recipient_token_account, + recipient: &ctx.accounts.recipient, + registered_asset: &ctx.accounts.registered_asset, + native_registered_token: &ctx.accounts.native_registered_token, + tmp_token_account: &ctx.accounts.tmp_token_account, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + }, + ctx.accounts.vaa.data().amount(), + target_relayer_fee, + to_native_token_amount, + ) +} diff --git a/solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs b/solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs new file mode 100644 index 00000000..abeaba97 --- /dev/null +++ b/solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs @@ -0,0 +1,291 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, PayerSequence, RegisteredContract}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use ruint::aliases::U256; +use wormhole_cctp_program::sdk::{ + self as wormhole_cctp, cctp_message_transmitter, cctp_token_messenger_minter, core_bridge, + io::TypePrefixedPayload, +}; + +const MESSAGE_SEED_PREFIX: &[u8] = b"msg"; + +#[derive(Accounts)] +pub struct TransferTokensWithRelay<'info> { + /// Payer will pay Wormhole fee to transfer tokens and create temporary + /// token account. + #[account(mut)] + payer: Signer<'info>, + + /// Sender Config account. Acts as the signer for the Token Bridge token + /// transfer. Read-only. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump, + constraint = !custodian.paused @ TokenRouterError::OutboundTransfersPaused + )] + custodian: Account<'info, Custodian>, + + /// Used to keep track of payer's sequence number. + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + + /// Foreign Contract account. Send tokens to the contract specified in this + /// account. Funnily enough, the Token Bridge program does not have any + /// requirements for outbound transfers for the recipient chain to be + /// registered. This account provides extra protection against sending + /// tokens to an unregistered Wormhole chain ID. Read-only. + #[account( + seeds = [ + RegisteredContract::SEED_PREFIX, + ®istered_contract.chain.to_be_bytes() + ], + bump = registered_contract.bump, + constraint = registered_contract.relayer_fee(&mint.key()).is_some() @ TokenRouterError::TokenNotRegistered, + )] + registered_contract: Account<'info, RegisteredContract>, + + /// CHECK: TODO + #[account(mut)] + mint: AccountInfo<'info>, + + /// Payer's associated token account. We may want to make this a generic + /// token account in the future. + /// + /// CHECK: Wormhole CCTP checks that the token mint is the same as the mint provided in its + /// account context. Transfer authority must be set to the payer. + #[account(mut)] + from_token: AccountInfo<'info>, + + /// CHECK: Wormhole Message. Token Bridge program writes info about the + /// tokens transferred in this account for our program. Mutable. + #[account( + mut, + seeds = [ + MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + &payer_sequence.to_be_bytes() + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// NOTE: This account needs to be boxed because without it we hit stack overflow. + #[account( + init, + payer = payer, + token::mint = mint, + token::authority = custodian, + seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump, + )] + custody_token: Box>, + + /// CHECK: TODO + worm_cctp_custodian: UncheckedAccount<'info>, + + /// CHECK: TODO + #[account(mut)] + worm_cctp_custody_token: UncheckedAccount<'info>, + + /// CHECK: TODO + worm_cctp_registered_emitter: UncheckedAccount<'info>, + + /// CHECK: TODO + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: TODO + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: TODO + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + /// CHECK: TODO + cctp_token_messenger_minter_sender_authority: UncheckedAccount<'info>, + + /// CHECK: TODO + #[account(mut)] + cctp_message_transmitter_config: UncheckedAccount<'info>, + + /// CHECK: TODO + cctp_token_messenger: UncheckedAccount<'info>, + + /// CHECK: TODO + cctp_remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK: TODO + cctp_token_minter: UncheckedAccount<'info>, + + /// CHECK: TODO + #[account(mut)] + cctp_local_token: AccountInfo<'info>, + + system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, + wormhole_cctp_program: Program<'info, wormhole_cctp::WormholeCctp>, + core_bridge_program: Program<'info, core_bridge::CoreBridge>, + cctp_token_messenger_minter_program: + Program<'info, cctp_token_messenger_minter::TokenMessengerMinter>, + cctp_message_transmitter_program: Program<'info, cctp_message_transmitter::MessageTransmitter>, + + /// CHECK: Clock sysvar. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Rent sysvar. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct TransferTokensWithRelayArgs { + pub amount: u64, + pub to_native_token_amount: u64, + pub target_recipient_wallet: [u8; 32], +} + +pub fn transfer_tokens_with_relay( + ctx: Context, + args: TransferTokensWithRelayArgs, +) -> Result<()> { + let TransferTokensWithRelayArgs { + amount, + to_native_token_amount, + target_recipient_wallet, + } = args; + require!( + target_recipient_wallet != [0; 32], + TokenRouterError::InvalidRecipient + ); + + // This operation is safe to unwrap because we checked that the relayer fee + // exists in the account context. + let relayer_fee = ctx + .accounts + .registered_contract + .relayer_fee(&ctx.accounts.mint.key()) + .unwrap(); + + // Confirm that the amount specified is at least the relayer fee plus the + // amount desired for native currency. This also implicitly checks that the + // amount is non-zero. + require!( + amount > relayer_fee + to_native_token_amount, + TokenRouterError::ZeroBridgeAmount + ); + + // These seeds are used to: + // 1. Sign the Sender Config's token account to delegate approval + // of truncated_amount. + // 2. Sign Token Bridge program's transfer_native instruction. + // 3. Close tmp_token_account. + let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.from_token.to_account_info(), + to: ctx.accounts.custody_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + amount, + )?; + + let msg = crate::messages::TransferTokensWithRelay { + target_relayer_fee: U256::from(relayer_fee), + to_native_token_amount: U256::from(to_native_token_amount), + target_recipient_wallet, + }; + + let mut payload = Vec::with_capacity(msg.payload_written_size()); + let mut writer = std::io::Cursor::new(&mut payload); + msg.write_typed(&mut writer).unwrap(); + + // Holy accounts, Batman! + wormhole_cctp::transfer_tokens_with_payload( + CpiContext::new_with_signer( + ctx.accounts.wormhole_cctp_program.to_account_info(), + wormhole_cctp::TransferTokensWithPayload { + payer: ctx.accounts.payer.to_account_info(), + custodian: ctx.accounts.worm_cctp_custodian.to_account_info(), + burn_source_authority: ctx.accounts.custodian.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + burn_source: ctx.accounts.custody_token.to_account_info(), + custody_token: ctx.accounts.worm_cctp_custody_token.to_account_info(), + registered_emitter: ctx.accounts.worm_cctp_registered_emitter.to_account_info(), + core_bridge_config: ctx.accounts.core_bridge_config.to_account_info(), + core_message: ctx.accounts.core_message.to_account_info(), + core_emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + core_fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + token_messenger_minter_sender_authority: ctx + .accounts + .cctp_token_messenger_minter_sender_authority + .to_account_info(), + message_transmitter_config: ctx + .accounts + .cctp_message_transmitter_config + .to_account_info(), + token_messenger: ctx.accounts.cctp_token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.cctp_remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.cctp_token_minter.to_account_info(), + local_token: ctx.accounts.cctp_local_token.to_account_info(), + core_bridge_program: ctx.accounts.core_bridge_program.to_account_info(), + token_messenger_minter_program: ctx + .accounts + .cctp_token_messenger_minter_program + .to_account_info(), + message_transmitter_program: ctx + .accounts + .cctp_message_transmitter_program + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + custodian_seeds, + &[ + MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + &ctx.accounts.payer_sequence.take_and_uptick().to_be_bytes(), + &[ctx.bumps["core_message"]], + ], + ], + ), + wormhole_cctp::TransferTokensWithPayloadArgs { + amount, + mint_recipient: ctx.accounts.registered_contract.address, + nonce: 0, + payload, + }, + )?; + + // Finally close the custody token account. + token::close_account(CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::CloseAccount { + account: ctx.accounts.custody_token.to_account_info(), + destination: ctx.accounts.payer.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + )) +} diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs new file mode 100644 index 00000000..9cd95382 --- /dev/null +++ b/solana/programs/token-router/src/state/custodian.rs @@ -0,0 +1,29 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(Debug, InitSpace)] +pub struct Custodian { + pub bump: u8, + + /// Boolean indicating whether outbound transfers are paused. + pub paused: bool, + + /// Program's owner. + pub owner: Pubkey, + pub pending_owner: Option, + + /// Program's assistant. Can be used to update the relayer fee and swap rate. + pub owner_assistant: Pubkey, + + /// Indicate who last set the `paused` value. When the program is first initialized, this is set + /// to the `owner`. + pub paused_set_by: Pubkey, +} + +impl Custodian { + pub const SEED_PREFIX: &'static [u8] = b"custodian"; + + pub fn is_authorized(&self, key: &Pubkey) -> bool { + self.owner == *key || self.owner_assistant == *key + } +} diff --git a/solana/programs/token-router/src/state/mod.rs b/solana/programs/token-router/src/state/mod.rs new file mode 100644 index 00000000..2d82dc57 --- /dev/null +++ b/solana/programs/token-router/src/state/mod.rs @@ -0,0 +1,8 @@ +mod custodian; +pub use custodian::*; + +mod payer_sequence; +pub use payer_sequence::*; + +mod router_endpoint; +pub use router_endpoint::*; diff --git a/solana/programs/token-router/src/state/payer_sequence.rs b/solana/programs/token-router/src/state/payer_sequence.rs new file mode 100644 index 00000000..94fe84b0 --- /dev/null +++ b/solana/programs/token-router/src/state/payer_sequence.rs @@ -0,0 +1,27 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(InitSpace)] +pub struct PayerSequence { + pub value: u64, +} + +impl PayerSequence { + pub const SEED_PREFIX: &'static [u8] = b"seq"; + + pub fn take_and_uptick(&mut self) -> u64 { + let seq = self.value; + + self.value += 1; + + seq + } +} + +impl std::ops::Deref for PayerSequence { + type Target = u64; + + fn deref(&self) -> &Self::Target { + &self.value + } +} diff --git a/solana/programs/token-router/src/state/router_endpoint.rs b/solana/programs/token-router/src/state/router_endpoint.rs new file mode 100644 index 00000000..c44eeeae --- /dev/null +++ b/solana/programs/token-router/src/state/router_endpoint.rs @@ -0,0 +1,18 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(Debug, InitSpace)] +/// Foreign emitter account data. +pub struct RouterEndpoint { + pub bump: u8, + + /// Emitter chain. Cannot equal `1` (Solana's Chain ID). + pub chain: u16, + + /// Emitter address. Cannot be zero address. + pub address: [u8; 32], +} + +impl RouterEndpoint { + pub const SEED_PREFIX: &'static [u8] = b"endpoint"; +} diff --git a/solana/ts/scripts/confirm_ownership_transfer_request.ts b/solana/ts/scripts/confirm_ownership_transfer_request.ts new file mode 100644 index 00000000..a3728973 --- /dev/null +++ b/solana/ts/scripts/confirm_ownership_transfer_request.ts @@ -0,0 +1,57 @@ +import { Keypair, Connection } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "New Owner Keypair", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv) { + return { + newOwnerKeyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function confirmOwnershipTransferRequest(connection: Connection, payer: Keypair) { + // Create the submit ownership transfer request transaction. + const confirmOwnershipTransferRequestIx = await tokenBridgeRelayer.confirmOwnershipTransferIx( + connection, + TOKEN_ROUTER_PID, + payer.publicKey + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, confirmOwnershipTransferRequestIx, payer); + + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { newOwnerKeyPair } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(newOwnerKeyPair)); + + // Confirm ownership transfer request. + await confirmOwnershipTransferRequest(connection, payer); +} + +main(); diff --git a/solana/ts/scripts/create_ata.ts b/solana/ts/scripts/create_ata.ts new file mode 100644 index 00000000..57216e56 --- /dev/null +++ b/solana/ts/scripts/create_ata.ts @@ -0,0 +1,52 @@ +import {Keypair, Connection, PublicKey} from "@solana/web3.js"; +import {getOrCreateAssociatedTokenAccount} from "@solana/spl-token"; +import {RPC} from "./helpers/consts"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + mint: { + alias: "m", + describe: "Mint", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "mint" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + mint: new PublicKey(argv.mint), + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const {keyPair, mint} = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Create associated token account. + const tx = await getOrCreateAssociatedTokenAccount( + connection, + payer, + mint, + payer.publicKey + ); + + console.log("ATA", tx); +} + +main(); diff --git a/solana/ts/scripts/deregister_token.ts b/solana/ts/scripts/deregister_token.ts new file mode 100644 index 00000000..3a0587e7 --- /dev/null +++ b/solana/ts/scripts/deregister_token.ts @@ -0,0 +1,64 @@ +import { Keypair, Connection, PublicKey } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + mint: { + alias: "m", + describe: "Mint", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "mint" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + mint: new PublicKey(argv.mint), + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function deregister_token(connection: Connection, payer: Keypair, mint: PublicKey) { + // Create the deregister token instruction. + const deregisterTokenIx = await tokenBridgeRelayer.createDeregisterTokenInstruction( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + mint + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, deregisterTokenIx, payer); + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, mint } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Deregister token. + await deregister_token(connection, payer, mint); +} + +main(); diff --git a/solana/ts/scripts/helpers/consts.ts b/solana/ts/scripts/helpers/consts.ts new file mode 100644 index 00000000..c39c5439 --- /dev/null +++ b/solana/ts/scripts/helpers/consts.ts @@ -0,0 +1,11 @@ +// rpc +export const RPC = process.env.RPC!; + +// program IDs +export const TOKEN_ROUTER_PID = process.env.TOKEN_ROUTER_PID!; +export const CORE_BRIDGE_PID = process.env.CORE_BRIDGE_PID!; +export const TOKEN_BRIDGE_PID = process.env.TOKEN_BRIDGE_PID!; + +// Init values +export const FEE_RECIPIENT = process.env.FEE_RECIPIENT!; +export const ASSISTANT = process.env.ASSISTANT!; diff --git a/solana/ts/scripts/helpers/utils.ts b/solana/ts/scripts/helpers/utils.ts new file mode 100644 index 00000000..198e24d0 --- /dev/null +++ b/solana/ts/scripts/helpers/utils.ts @@ -0,0 +1,104 @@ +import { + Connection, + TransactionInstruction, + sendAndConfirmTransaction, + Transaction, + Signer, + ComputeBudgetProgram, + ConfirmOptions, + PublicKeyInitData, + PublicKey, +} from "@solana/web3.js"; +import {deriveWrappedMintKey} from "@certusone/wormhole-sdk/lib/cjs/solana/tokenBridge"; +import { + postVaaSolanaWithRetry, + NodeWallet, +} from "@certusone/wormhole-sdk/lib/cjs/solana"; +import { + CHAIN_ID_SOLANA, + ChainId, + ParsedTokenTransferVaa, +} from "@certusone/wormhole-sdk"; +import {getOrCreateAssociatedTokenAccount} from "@solana/spl-token"; + +export class SendIxError extends Error { + logs: string; + + constructor(originalError: Error & {logs?: string[]}) { + // The newlines don't actually show up correctly in chai's assertion error, but at least + // we have all the information and can just replace '\n' with a newline manually to see + // what's happening without having to change the code. + const logs = originalError.logs?.join("\n") || "error had no logs"; + super(originalError.message + "\nlogs:\n" + logs); + this.stack = originalError.stack; + this.logs = logs; + } +} + +export const sendAndConfirmIx = async ( + connection: Connection, + ix: TransactionInstruction | Promise, + signer: Signer, + computeUnits?: number, + options?: ConfirmOptions +) => { + let [signers, units] = (() => { + if (signer) return [[signer], computeUnits]; + + return [Array.isArray(signer) ? signer : [signer], computeUnits]; + })(); + + if (options === undefined) { + options = {}; + } + options.maxRetries = 10; + + const tx = new Transaction().add(await ix); + if (units) tx.add(ComputeBudgetProgram.setComputeUnitLimit({units})); + try { + return await sendAndConfirmTransaction(connection, tx, signers, options); + } catch (error: any) { + console.log(error); + throw new SendIxError(error); + } +}; + +export async function postVaaOnSolana( + connection: Connection, + payer: Signer, + coreBridge: PublicKeyInitData, + signedMsg: Buffer +) { + const wallet = NodeWallet.fromSecretKey(payer.secretKey); + await postVaaSolanaWithRetry( + connection, + wallet.signTransaction, + coreBridge, + wallet.key(), + signedMsg + ); +} + +export async function createATAForRecipient( + connection: Connection, + payer: Signer, + tokenBridgeProgramId: PublicKeyInitData, + recipient: PublicKey, + tokenChain: ChainId, + tokenAddress: Buffer +) { + // Get the mint. + let mint; + if (tokenChain === CHAIN_ID_SOLANA) { + mint = new PublicKey(tokenAddress); + } else { + mint = deriveWrappedMintKey(tokenBridgeProgramId, tokenChain, tokenAddress); + } + + // Get or create the ATA. + try { + await getOrCreateAssociatedTokenAccount(connection, payer, mint, recipient); + } catch (error: any) { + throw new Error("Failed to create ATA: " + (error?.stack || error)); + } +} diff --git a/solana/ts/scripts/initialize.ts b/solana/ts/scripts/initialize.ts new file mode 100644 index 00000000..94e473e5 --- /dev/null +++ b/solana/ts/scripts/initialize.ts @@ -0,0 +1,69 @@ +import { Keypair, Connection } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { + RPC, + TOKEN_ROUTER_PID, + TOKEN_BRIDGE_PID, + CORE_BRIDGE_PID, + FEE_RECIPIENT, + ASSISTANT, +} from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + }; + } else { + throw Error("Invalid arguments"); + } +} + +// This function processes the initialize transaction for the token bridge relayer. +async function initialize(connection: Connection, payer: Keypair) { + // Create the initialization instruction. + const createInitializeIx = await tokenBridgeRelayer.initializeIx( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + TOKEN_BRIDGE_PID, + CORE_BRIDGE_PID, + FEE_RECIPIENT, + ASSISTANT + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, createInitializeIx, payer); + + if (tx !== undefined) { + console.log("Transaction signature:", tx); + } else { + console.log("Transaction failed"); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Create state. + await initialize(connection, payer); +} + +main(); diff --git a/solana/ts/scripts/register_foreign_contracts.ts b/solana/ts/scripts/register_foreign_contracts.ts new file mode 100644 index 00000000..949c373f --- /dev/null +++ b/solana/ts/scripts/register_foreign_contracts.ts @@ -0,0 +1,134 @@ +import { Keypair, Connection } from "@solana/web3.js"; +import { ChainId } from "@certusone/wormhole-sdk"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID, TOKEN_BRIDGE_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import { BN } from "@coral-xyz/anchor"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + network: { + alias: "n", + describe: "Network", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "network" in argv) { + const network = argv.network; + if (network !== "mainnet" && network !== "testnet") { + throw Error("Invalid network"); + } + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + network: network, + }; + } else { + throw Error("Invalid arguments"); + } +} + +function validateContractAddress(address: string) { + if (address.length != 64 || address.substring(0, 2) == "0x") { + throw Error("Invalid contract address"); + } +} + +async function register_foreign_contract( + connection: Connection, + payer: Keypair, + foreignContract: ForeignContract[] +) { + for (const contract of foreignContract) { + // Validate contract addresses. + validateContractAddress(contract.relayerAddress); + validateContractAddress(contract.tokenBridgeAddress); + + // TODO: check current registration before creating instruction. + + // Create registration transaction. + const registerForeignContractIx = + await tokenBridgeRelayer.createRegisterForeignContractInstruction( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + TOKEN_BRIDGE_PID, + contract.chain, + Buffer.from(contract.relayerAddress, "hex"), + "0x" + contract.tokenBridgeAddress, + contract.relayerFee + ); + + console.log("\n Registering foreign contract:"); + console.log(contract); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, registerForeignContractIx, payer); + + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } + } +} + +interface ForeignContract { + chain: ChainId; + relayerAddress: string; + tokenBridgeAddress: string; + relayerFee: BN; +} + +function createConfig(contracts: any, fees: any): ForeignContract[] { + let config = [] as ForeignContract[]; + + for (let key of Object.keys(contracts)) { + let member = { + chain: Number(key) as ChainId, + relayerAddress: contracts[key]["relayer"], + tokenBridgeAddress: contracts[key]["tokenBridge"], + relayerFee: new BN(fees[key]), + }; + config.push(member); + } + + return config; +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, network } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Read in config file. + const deploymentConfig = JSON.parse( + fs.readFileSync(`${__dirname}/../../cfg/${network}Config.json`, "utf8") + ); + + // Convert to Config type. + const config = createConfig( + deploymentConfig["deployedContracts"], + deploymentConfig["relayerFeesInUsd"] + ); + if (config.length == undefined) { + throw Error("Deployed contracts not found"); + } + + // Register foreign contracts. + await register_foreign_contract(connection, payer, config); +} + +main(); diff --git a/solana/ts/scripts/register_tokens.ts b/solana/ts/scripts/register_tokens.ts new file mode 100644 index 00000000..733d3d2b --- /dev/null +++ b/solana/ts/scripts/register_tokens.ts @@ -0,0 +1,110 @@ +import { Keypair, Connection, PublicKey } from "@solana/web3.js"; +import { BN } from "@coral-xyz/anchor"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + network: { + alias: "n", + describe: "Network", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "network" in argv) { + const network = argv.network; + if (network !== "mainnet" && network !== "testnet") { + throw Error("Invalid network"); + } + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + network: network, + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function register_tokens(connection: Connection, payer: Keypair, tokens: TokenConfig[]) { + for (const tokenConfig of tokens) { + // Create registration transaction. + const registerTokenIx = await tokenBridgeRelayer.createRegisterTokenInstruction( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + new PublicKey(tokenConfig.mint), + new BN(tokenConfig.swapRate), + new BN(tokenConfig.maxNativeSwapAmount) + ); + + console.log("\n", tokenConfig); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, registerTokenIx, payer); + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } + } +} + +interface TokenConfig { + symbol: string; + mint: string; + swapRate: string; + maxNativeSwapAmount: string; +} + +function createConfig(object: any) { + let config = [] as TokenConfig[]; + + for (const info of object) { + let member: TokenConfig = { + symbol: info.symbol as string, + mint: info.mint as string, + swapRate: info.swapRate as string, + maxNativeSwapAmount: info.maxNativeSwapAmount as string, + }; + + config.push(member); + } + + return config; +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, network } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Read in config file. + const deploymentConfig = JSON.parse( + fs.readFileSync(`${__dirname}/../../cfg/${network}Config.json`, "utf8") + ); + + // Convert to Config type. + const config = createConfig(deploymentConfig["acceptedTokensList"]); + if (config.length == undefined) { + throw Error("Tokens list not found"); + } + + // Register tokens. + await register_tokens(connection, payer, config); +} + +main(); diff --git a/solana/ts/scripts/set_pause_for_transfer.ts b/solana/ts/scripts/set_pause_for_transfer.ts new file mode 100644 index 00000000..bdb71cee --- /dev/null +++ b/solana/ts/scripts/set_pause_for_transfer.ts @@ -0,0 +1,65 @@ +import { Keypair, Connection } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + pause: { + alias: "p", + describe: "Pause for transfer", + require: true, + boolean: true, + }, + }).argv; + + if ("keyPair" in argv && "pause" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + pause: argv.pause, + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function setPauseForTransfers(connection: Connection, payer: Keypair, pause: boolean) { + // Create the set pause for transfers transaction. + const setPauseIx = await tokenBridgeRelayer.setPauseForTransfersIx( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + pause + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, setPauseIx, payer); + + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, pause } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Set pause for transfers. + await setPauseForTransfers(connection, payer, pause); +} + +main(); diff --git a/solana/ts/scripts/set_relayer_fees.ts b/solana/ts/scripts/set_relayer_fees.ts new file mode 100644 index 00000000..80e2a352 --- /dev/null +++ b/solana/ts/scripts/set_relayer_fees.ts @@ -0,0 +1,102 @@ +import { Keypair, Connection } from "@solana/web3.js"; +import { ChainId } from "@certusone/wormhole-sdk"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import { BN } from "@coral-xyz/anchor"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + network: { + alias: "n", + describe: "Network", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "network" in argv) { + const network = argv.network; + if (network !== "mainnet" && network !== "testnet") { + throw Error("Invalid network"); + } + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + network: network, + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function set_relayer_fees(connection: Connection, payer: Keypair, relayerFees: RelayerFee[]) { + for (const target of relayerFees) { + // Create registration transaction. + const createSetRelayerFeeIx = await tokenBridgeRelayer.updateRelayerFeeIx( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + target.chain, + new BN(target.fee) + ); + + console.log(`\n Setting relayer fee, chain: ${target.chain}, fee: ${target.fee}`); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, createSetRelayerFeeIx, payer); + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } + } +} + +interface RelayerFee { + chain: ChainId; + fee: string; +} + +function createConfig(object: any) { + let config = [] as RelayerFee[]; + + for (let key of Object.keys(object)) { + let member = { chain: Number(key) as ChainId, fee: object[key] }; + config.push(member); + } + + return config; +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, network } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Read in config file. + const deploymentConfig = JSON.parse( + fs.readFileSync(`${__dirname}/../../cfg/${network}Config.json`, "utf8") + ); + + // Convert to Config type. + const config = createConfig(deploymentConfig["relayerFeesInUsd"]); + if (config.length == undefined) { + throw Error("Relayer fees not found"); + } + + // Set the relayer fees. + await set_relayer_fees(connection, payer, config); +} + +main(); diff --git a/solana/ts/scripts/submit_ownership_transfer_request.ts b/solana/ts/scripts/submit_ownership_transfer_request.ts new file mode 100644 index 00000000..cd187aaa --- /dev/null +++ b/solana/ts/scripts/submit_ownership_transfer_request.ts @@ -0,0 +1,70 @@ +import { Keypair, Connection } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; +import { PublicKey } from "@metaplex-foundation/js"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + newOwner: { + alias: "p", + describe: "New owner public key", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "newOwner" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + newOwner: new PublicKey(argv.newOwner), + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function submitOwnershipTransferRequest( + connection: Connection, + payer: Keypair, + newOwner: PublicKey +) { + // Create the submit ownership transfer request transaction. + const submitOwnershipTransferRequestIx = await tokenBridgeRelayer.submitOwnershipTransferIx( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + newOwner + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, submitOwnershipTransferRequestIx, payer); + + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, newOwner } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Submit ownership transfer request. + await submitOwnershipTransferRequest(connection, payer, newOwner); +} + +main(); diff --git a/solana/ts/scripts/test/complete_transfer_with_relay.ts b/solana/ts/scripts/test/complete_transfer_with_relay.ts new file mode 100644 index 00000000..b2a06789 --- /dev/null +++ b/solana/ts/scripts/test/complete_transfer_with_relay.ts @@ -0,0 +1,161 @@ +import { Keypair, Connection, PublicKey } from "@solana/web3.js"; +import { + ChainId, + parseVaa, + parseTransferPayload, + CHAIN_ID_SOLANA, + getIsTransferCompletedSolana, +} from "@certusone/wormhole-sdk"; +import * as tokenBridgeRelayer from "../../src"; +import { + RPC, + TOKEN_BRIDGE_PID, + TOKEN_ROUTER_PID, + CORE_BRIDGE_PID, + FEE_RECIPIENT, +} from "../helpers/consts"; +import { sendAndConfirmIx, postVaaOnSolana, createATAForRecipient } from "../helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +// Token Bridge Relayer program ID. +const PROGRAM_ID = new PublicKey(TOKEN_ROUTER_PID); +const PROGRAM_ID_HEX = Buffer.from(PROGRAM_ID.toBytes()).toString("hex"); + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + vaa: { + alias: "vaa", + describe: "VAA to submit", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "vaa" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + vaa: argv.vaa, + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function relay(connection: Connection, payer: Keypair, vaa: string) { + // Convert VAA string to buffer. + const signedVaa = Buffer.from(vaa, "hex"); + + // Check to see if the VAA has been redeemed already. + const isRedeemed = await getIsTransferCompletedSolana( + new PublicKey(TOKEN_BRIDGE_PID), + signedVaa, + connection + ); + if (isRedeemed) { + console.log("VAA has already been redeemed"); + return; + } + + // Parse the VAA. + const parsedVaa = parseVaa(signedVaa); + + // Make sure it's a payload 3. + const payloadType = parsedVaa.payload.readUint8(0); + if (payloadType != 3) { + console.log("Not a payload 3"); + return; + } + + // Parse the payload. + const transferPayload = parseTransferPayload(parsedVaa.payload); + + // Confirm that the destination is the relayer contract. + if (transferPayload.targetAddress != PROGRAM_ID_HEX) { + console.log("Destination is not the relayer contract"); + return; + } + + // Confirm that the sender is a registered relayer contract. + const registeredForeignContract = await tokenBridgeRelayer.getForeignContractData( + connection, + TOKEN_ROUTER_PID, + parsedVaa.emitterChain as ChainId + ); + if (registeredForeignContract.address.toString("hex") !== transferPayload.fromAddress) { + console.log("Sender is not a registered relayer contract"); + return; + } + + // Post the VAA on chain. + try { + await postVaaOnSolana(connection, payer, new PublicKey(CORE_BRIDGE_PID), signedVaa); + } catch (e) { + console.log(e); + } + + // Parse the recipient address from the additional payload. + const recipientInPayload = parsedVaa.payload.subarray(198, 230); + const recipient = new PublicKey(recipientInPayload); + + // Create the associated token account for the recipient if it doesn't exist. + await createATAForRecipient( + connection, + payer, + new PublicKey(TOKEN_BRIDGE_PID), + recipient, + transferPayload.originChain as ChainId, + Buffer.from(transferPayload.originAddress, "hex") + ); + + // See if the token being transferred is native to Solana. + const isNative = transferPayload.originChain == CHAIN_ID_SOLANA; + + // Create the redemption instruction. There are two different instructions + // depending on whether the token is native or not. + const completeTransferIx = await (isNative + ? tokenBridgeRelayer.createCompleteNativeTransferWithRelayInstruction + : tokenBridgeRelayer.createCompleteWrappedTransferWithRelayInstruction)( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + new PublicKey(FEE_RECIPIENT), + TOKEN_BRIDGE_PID, + CORE_BRIDGE_PID, + signedVaa, + recipient + ); + + // Send the transaction. + const tx = await sendAndConfirmIx( + connection, + completeTransferIx, + payer, + 250000 // compute units + ); + if (tx === undefined) { + console.log("Transaction failed."); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, vaa } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Relay VAA. + await relay(connection, payer, vaa); +} + +main(); diff --git a/solana/ts/scripts/test/transfer_tokens_with_relay.ts b/solana/ts/scripts/test/transfer_tokens_with_relay.ts new file mode 100644 index 00000000..6494c205 --- /dev/null +++ b/solana/ts/scripts/test/transfer_tokens_with_relay.ts @@ -0,0 +1,122 @@ +import { Keypair, Connection, PublicKey } from "@solana/web3.js"; +import { ChainId } from "@certusone/wormhole-sdk"; +import * as tokenBridgeRelayer from "../../src"; +import { RPC, TOKEN_BRIDGE_PID, TOKEN_ROUTER_PID, CORE_BRIDGE_PID } from "../helpers/consts"; +import { sendAndConfirmIx } from "../helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function transfer_native( + connection: Connection, + payer: Keypair, + mint: PublicKey, + params: SendTokensParams +) { + // Create registration transaction. + const transferIx = await tokenBridgeRelayer.createTransferNativeTokensWithRelayInstruction( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + TOKEN_BRIDGE_PID, + CORE_BRIDGE_PID, + mint, + params + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, transferIx, payer, 250000); + if (tx === undefined) { + console.log("Transaction failed:", tx); + } else { + console.log("Transaction successful:", tx); + } +} + +async function transfer_wrapped( + connection: Connection, + payer: Keypair, + mint: PublicKey, + params: SendTokensParams +) { + // Create registration transaction. + const transferIx = await tokenBridgeRelayer.createTransferWrappedTokensWithRelayInstruction( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + TOKEN_ROUTER_PID, + CORE_BRIDGE_PID, + mint, + params + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, transferIx, payer, 250000); + if (tx === undefined) { + console.log("Transaction failed:", tx); + } else { + console.log("Transaction successful:", tx); + } +} + +export interface SendTokensParams { + amount: number; + toNativeTokenAmount: number; + recipientAddress: Buffer; + recipientChain: ChainId; + batchId: number; + wrapNative: boolean; +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Add transfer params here. + const sendParams: SendTokensParams = { + amount: 10000000, + toNativeTokenAmount: 0, + recipientAddress: Buffer.from( + "0000000000000000000000003278E0aE2bc9EC8754b67928e0F5ff8f99CE5934", + "hex" + ), + recipientChain: 6, // avax + batchId: 0, + wrapNative: true, + }; + + // Token mint. + const isWrapped = false; + const mint = new PublicKey("So11111111111111111111111111111111111111112"); + + // Do the transfer. + if (isWrapped) { + await transfer_native(connection, payer, mint, sendParams); + } else { + await transfer_native(connection, payer, mint, sendParams); + } +} + +main(); diff --git a/solana/ts/scripts/update_fee_assistant.ts b/solana/ts/scripts/update_fee_assistant.ts new file mode 100644 index 00000000..c9ae6c82 --- /dev/null +++ b/solana/ts/scripts/update_fee_assistant.ts @@ -0,0 +1,68 @@ +import { Keypair, Connection, PublicKey } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + newFeeRecipient: { + alias: "n", + describe: "New Fee Recipient", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "newFeeRecipient" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + newFeeRecipient: new PublicKey(argv.newFeeRecipient), + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function update_fee_recipient( + connection: Connection, + payer: Keypair, + newFeeRecipient: PublicKey +) { + // Create the instruction. + const updateFeeRecipientIx = await tokenBridgeRelayer.updateFeeRecipientIx( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + newFeeRecipient + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, updateFeeRecipientIx, payer); + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, newFeeRecipient } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Update the fee recipient. + await update_fee_recipient(connection, payer, newFeeRecipient); +} + +main(); diff --git a/solana/ts/scripts/update_owner_assistant.ts b/solana/ts/scripts/update_owner_assistant.ts new file mode 100644 index 00000000..12176aed --- /dev/null +++ b/solana/ts/scripts/update_owner_assistant.ts @@ -0,0 +1,68 @@ +import { Keypair, Connection, PublicKey } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "Signer Keypair", + require: true, + string: true, + }, + newAssistant: { + alias: "n", + describe: "New Owner Assistant", + require: true, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "newAssistant" in argv) { + return { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + newAssistant: new PublicKey(argv.newAssistant), + }; + } else { + throw Error("Invalid arguments"); + } +} + +async function update_owner_assistant( + connection: Connection, + payer: Keypair, + newAssistant: PublicKey +) { + // Create the instruction. + const deregisterTokenIx = await tokenBridgeRelayer.createUpdateAssistantInstruction( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + newAssistant + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, deregisterTokenIx, payer); + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const { keyPair, newAssistant } = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); + + // Update the owner assistant. + await update_owner_assistant(connection, payer, newAssistant); +} + +main(); diff --git a/solana/ts/scripts/update_token_info.ts b/solana/ts/scripts/update_token_info.ts new file mode 100644 index 00000000..79d22ec1 --- /dev/null +++ b/solana/ts/scripts/update_token_info.ts @@ -0,0 +1,134 @@ +import { Keypair, Connection } from "@solana/web3.js"; +import * as tokenBridgeRelayer from "../src"; +import { BN } from "@project-serum/anchor"; +import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; +import { sendAndConfirmIx } from "./helpers/utils"; +import yargs from "yargs"; +import * as fs from "fs"; +import { PublicKey } from "@metaplex-foundation/js"; + +interface Args { + keyPair: Uint8Array; + mint: PublicKey; + swapRate: BN | undefined; + maxNativeSwapAmount: BN | undefined; +} + +export function getArgs() { + const argv = yargs.options({ + keyPair: { + alias: "k", + describe: "New Owner Keypair", + require: true, + string: true, + }, + mint: { + alias: "m", + describe: "Mint", + require: true, + string: true, + }, + swapRate: { + alias: "s", + describe: "Swap rate", + require: false, + string: true, + }, + maxNativeSwapAmount: { + alias: "n", + describe: "Max native swap amount", + require: false, + string: true, + }, + }).argv; + + if ("keyPair" in argv && "mint" in argv) { + const args: Args = { + keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), + mint: new PublicKey(argv.mint), + swapRate: undefined, + maxNativeSwapAmount: undefined, + }; + + if ("swapRate" in argv) { + args.swapRate = new BN(Number(argv.swapRate)); + } + + if ("maxNativeSwapAmount" in argv) { + args.maxNativeSwapAmount = new BN(Number(argv.maxNativeSwapAmount)); + } + + return args; + } else { + throw Error("Invalid arguments"); + } +} + +async function updateMaxNativeSwapAmount( + connection: Connection, + payer: Keypair, + mint: PublicKey, + maxNativeSwapAmount: BN +) { + // Create the instruction. + const updateMaxNativeSwapAmountIx = await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + mint, + maxNativeSwapAmount + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, updateMaxNativeSwapAmountIx, payer); + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function updateSwapRate( + connection: Connection, + payer: Keypair, + mint: PublicKey, + swapRate: BN +) { + // Create the instruction. + const updateSwapRateIx = await tokenBridgeRelayer.createUpdateSwapRateInstruction( + connection, + TOKEN_ROUTER_PID, + payer.publicKey, + mint, + swapRate + ); + + // Send the transaction. + const tx = await sendAndConfirmIx(connection, updateSwapRateIx, payer); + if (tx === undefined) { + console.log("Transaction failed"); + } else { + console.log("Transaction successful:", tx); + } +} + +async function main() { + // Set up provider. + const connection = new Connection(RPC, "confirmed"); + + // Owner wallet. + const args = getArgs(); + const payer = Keypair.fromSecretKey(Uint8Array.from(args.keyPair)); + + // Update the swap rate. + if (args.swapRate !== undefined) { + await updateSwapRate(connection, payer, args.mint, args.swapRate); + } + + // Update the max native swap amount. + if (args.maxNativeSwapAmount !== undefined) { + await updateMaxNativeSwapAmount(connection, payer, args.mint, args.maxNativeSwapAmount); + } +} + +main(); diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts new file mode 100644 index 00000000..9842276e --- /dev/null +++ b/solana/ts/src/index.ts @@ -0,0 +1,323 @@ +export * from "./state"; + +import { ChainId } from "@certusone/wormhole-sdk"; +import { BN, Program } from "@coral-xyz/anchor"; +import * as splToken from "@solana/spl-token"; +import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; +import IDL from "../../target/idl/token_router.json"; +import { TokenRouter } from "../../target/types/token_router"; +import { Custodian, PayerSequence, RouterEndpoint } from "./state"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "./utils"; +import { WormholeCctpProgram } from "./wormholeCctp"; + +export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; + +export type ProgramId = (typeof PROGRAM_IDS)[number]; + +export type TransferTokensWithRelayArgs = { + amount: BN; + toNativeTokenAmount: BN; + targetChain: ChainId; + targetRecipientWallet: Array; +}; + +export type AddRouterEndpointArgs = { + chain: ChainId; + address: Array; +}; + +export type RegisterContractArgs = { + chain: ChainId; + address: Array; +}; + +export type RegisterAssetArgs = { + chain: ChainId; + relayerFee: BN; + nativeSwapRate: BN; + maxNativeSwapAmount: BN; +}; + +export type UpdateRelayerFeeArgs = { + chain: ChainId; + relayerFee: BN; +}; + +export class TokenRouterProgram { + private _programId: ProgramId; + + program: Program; + + // TODO: fix this + constructor(connection: Connection, programId?: ProgramId) { + this._programId = programId ?? testnet(); + this.program = new Program(IDL as any, new PublicKey(this._programId), { + connection, + }); + } + + get ID(): PublicKey { + return this.program.programId; + } + + wormholeCctpProgram(): WormholeCctpProgram { + switch (this._programId) { + case testnet(): { + return new WormholeCctpProgram( + this.program.provider.connection, + "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + custodianAddress(): PublicKey { + return Custodian.address(this.ID); + } + + async fetchCustodian(addr: PublicKey): Promise { + return this.program.account.custodian.fetch(addr); + } + + custodyTokenAccountAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; + } + + payerSequenceAddress(payer: PublicKey): PublicKey { + return PayerSequence.address(this.ID, payer); + } + + async fetchPayerSequence(addr: PublicKey): Promise { + return this.program.account.payerSequence + .fetch(addr) + .then((acct) => acct.value) + .catch((_) => new BN(0)); + } + + routerEndpointAddress(chain: ChainId): PublicKey { + return RouterEndpoint.address(this.ID, chain); + } + + async fetchRouterEndpoint(addr: PublicKey): Promise { + return this.program.account.routerEndpoint.fetch(addr); + } + + // async transferTokensWithRelayIx( + // accounts: { + // payer: PublicKey; + // fromToken: PublicKey; + // mint?: PublicKey; + // custodian?: PublicKey; + // registeredContract?: PublicKey; + // }, + // args: TransferTokensWithRelayArgs + // ): Promise { + // const connection = this.program.provider.connection; + + // const { + // payer, + // fromToken, + // mint: inputMint, + // custodian: inputCustodian, + // registeredContract: inputRegisteredContract, + // } = accounts; + // const { amount, toNativeTokenAmount, targetChain, targetRecipientWallet } = args; + // const mint = await (async () => { + // if (inputMint === undefined) { + // return splToken.getAccount(connection, fromToken).then((acct) => acct.mint); + // } else { + // return inputMint; + // } + // })(); + + // // Fetch the signer sequence. + // const payerSequence = this.payerSequenceAddress(payer); + // const [coreMessage] = await this.program.account.payerSequence + // .fetch(payerSequence) + // .then((acct) => acct.value) + // .catch(() => new BN(0)) + // .then((seq) => + // PublicKey.findProgramAddressSync( + // [Buffer.from("msg"), payer.toBuffer(), seq.toBuffer("be", 8)], + // this.ID + // ) + // ); + + // const wormholeCctp = this.wormholeCctpProgram(); + // const { + // custodian: wormCctpCustodian, + // custodyToken: wormCctpCustodyToken, + // registeredEmitter: wormCctpRegisteredEmitter, + // coreBridgeConfig, + // coreEmitterSequence, + // coreFeeCollector, + // tokenMessengerMinterSenderAuthority: cctpTokenMessengerMinterSenderAuthority, + // messageTransmitterConfig: cctpMessageTransmitterConfig, + // tokenMessenger: cctpTokenMessenger, + // remoteTokenMessenger: cctpRemoteTokenMessenger, + // tokenMinter: cctpTokenMinter, + // localToken: cctpLocalToken, + // tokenProgram, + // coreBridgeProgram, + // tokenMessengerMinterProgram: cctpTokenMessengerMinterProgram, + // messageTransmitterProgram: cctpMessageTransmitterProgram, + // } = await wormholeCctp.transferTokensWithPayloadAccounts(mint, targetChain); + + // return this.program.methods + // .transferTokensWithRelay({ amount, toNativeTokenAmount, targetRecipientWallet }) + // .accounts({ + // payer, + // custodian: inputCustodian ?? this.custodianAddress(), + // payerSequence, + // registeredContract: + // inputRegisteredContract ?? this.registeredContractAddress(targetChain), + // mint, + // fromToken, + // coreMessage, + // custodyToken: this.custodyTokenAccountAddress(), + // wormCctpCustodian, + // wormCctpCustodyToken, + // wormCctpRegisteredEmitter, + // coreBridgeConfig, + // coreEmitterSequence, + // coreFeeCollector, + // cctpTokenMessengerMinterSenderAuthority, + // cctpMessageTransmitterConfig, + // cctpTokenMessenger, + // cctpRemoteTokenMessenger, + // cctpTokenMinter, + // cctpLocalToken, + // tokenProgram, + // wormholeCctpProgram: wormholeCctp.ID, + // coreBridgeProgram, + // cctpTokenMessengerMinterProgram, + // cctpMessageTransmitterProgram, + // }) + // .instruction(); + // } + + async initializeIx(accounts: { + owner: PublicKey; + ownerAssistant: PublicKey; + }): Promise { + const { owner, ownerAssistant } = accounts; + return this.program.methods + .initialize() + .accounts({ + owner, + custodian: this.custodianAddress(), + ownerAssistant, + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + }) + .instruction(); + } + + async setPauseIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + }, + paused: boolean + ): Promise { + const { ownerOrAssistant, custodian: inputCustodian } = accounts; + return this.program.methods + .setPause(paused) + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + }) + .instruction(); + } + + async submitOwnershipTransferIx(accounts: { + owner: PublicKey; + newOwner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { owner, newOwner, custodian: inputCustodian } = accounts; + return this.program.methods + .submitOwnershipTransferRequest() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + newOwner, + }) + .instruction(); + } + + async confirmOwnershipTransferIx(accounts: { + pendingOwner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { pendingOwner, custodian: inputCustodian } = accounts; + return this.program.methods + .confirmOwnershipTransferRequest() + .accounts({ + pendingOwner, + custodian: inputCustodian ?? this.custodianAddress(), + }) + .instruction(); + } + + async cancelOwnershipTransferIx(accounts: { + owner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { owner, custodian: inputCustodian } = accounts; + return this.program.methods + .cancelOwnershipTransferRequest() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + }) + .instruction(); + } + + async addRouterEndpointIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + }, + args: AddRouterEndpointArgs + ): Promise { + const { + ownerOrAssistant, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + } = accounts; + const { chain } = args; + return this.program.methods + .addRouterEndpoint(args) + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + }) + .instruction(); + } + + async updateOwnerAssistantIx(accounts: { + owner: PublicKey; + newOwnerAssistant: PublicKey; + custodian?: PublicKey; + }) { + const { owner, newOwnerAssistant, custodian: inputCustodian } = accounts; + return this.program.methods + .updateOwnerAssistant() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + newOwnerAssistant, + }) + .instruction(); + } +} + +export function testnet(): ProgramId { + return "TokenRouter11111111111111111111111111111111"; +} diff --git a/solana/ts/src/instructions/completeNativeTransferWithRelay.ts b/solana/ts/src/instructions/completeNativeTransferWithRelay.ts new file mode 100644 index 00000000..fc429d6b --- /dev/null +++ b/solana/ts/src/instructions/completeNativeTransferWithRelay.ts @@ -0,0 +1,121 @@ +import { + Connection, + PublicKey, + PublicKeyInitData, + SystemProgram, + SYSVAR_RENT_PUBKEY, + TransactionInstruction, +} from "@solana/web3.js"; +import { CompleteTransferNativeWithPayloadCpiAccounts } from "@certusone/wormhole-sdk/lib/cjs/solana"; +import { createTokenBridgeRelayerProgramInterface } from "../program"; +import { + deriveForeignContractKey, + deriveTmpTokenAccountKey, + deriveRedeemerConfigKey, + deriveRegisteredTokenKey, +} from "../state"; +import { + deriveClaimKey, + derivePostedVaaKey, +} from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; +import { getAssociatedTokenAddressSync, NATIVE_MINT, TOKEN_PROGRAM_ID } from "@solana/spl-token"; +import { + isBytes, + ParsedTokenTransferVaa, + parseTokenTransferVaa, + SignedVaa, + ChainId, +} from "@certusone/wormhole-sdk"; +import { + deriveCustodyKey, + deriveCustodySignerKey, + deriveEndpointKey, + deriveRedeemerAccountKey, + deriveTokenBridgeConfigKey, +} from "@certusone/wormhole-sdk/lib/cjs/solana/tokenBridge"; + +export async function createCompleteNativeTransferWithRelayInstruction( + connection: Connection, + programId: PublicKeyInitData, + payer: PublicKeyInitData, + feeRecipient: PublicKey, + tokenBridgeProgramId: PublicKeyInitData, + wormholeProgramId: PublicKeyInitData, + wormholeMessage: SignedVaa | ParsedTokenTransferVaa, + recipient: PublicKey +): Promise { + const program = createTokenBridgeRelayerProgramInterface(connection, programId); + + const parsed = isBytes(wormholeMessage) + ? parseTokenTransferVaa(wormholeMessage) + : wormholeMessage; + + const mint = new PublicKey(parsed.tokenAddress); + + const tmpTokenAccount = deriveTmpTokenAccountKey(programId, mint); + const tokenBridgeAccounts = getCompleteTransferNativeWithPayloadCpiAccounts( + tokenBridgeProgramId, + wormholeProgramId, + payer, + parsed, + tmpTokenAccount + ); + const recipientTokenAccount = getAssociatedTokenAddressSync(mint, recipient); + const feeRecipientTokenAccount = getAssociatedTokenAddressSync(mint, feeRecipient); + + return program.methods + .completeNativeTransferWithRelay([...parsed.hash]) + .accounts({ + config: deriveRedeemerConfigKey(programId), + foreignContract: deriveForeignContractKey(programId, parsed.emitterChain as ChainId), + tmpTokenAccount, + registeredToken: deriveRegisteredTokenKey(programId, new PublicKey(mint)), + nativeRegisteredToken: deriveRegisteredTokenKey(programId, new PublicKey(NATIVE_MINT)), + recipientTokenAccount, + recipient, + feeRecipientTokenAccount, + tokenBridgeProgram: new PublicKey(tokenBridgeProgramId), + ...tokenBridgeAccounts, + }) + .instruction(); +} + +// Temporary +export function getCompleteTransferNativeWithPayloadCpiAccounts( + tokenBridgeProgramId: PublicKeyInitData, + wormholeProgramId: PublicKeyInitData, + payer: PublicKeyInitData, + vaa: SignedVaa | ParsedTokenTransferVaa, + toTokenAccount: PublicKeyInitData +): CompleteTransferNativeWithPayloadCpiAccounts { + const parsed = isBytes(vaa) ? parseTokenTransferVaa(vaa) : vaa; + const mint = new PublicKey(parsed.tokenAddress); + const cpiProgramId = new PublicKey(parsed.to); + + return { + payer: new PublicKey(payer), + tokenBridgeConfig: deriveTokenBridgeConfigKey(tokenBridgeProgramId), + vaa: derivePostedVaaKey(wormholeProgramId, parsed.hash), + tokenBridgeClaim: deriveClaimKey( + tokenBridgeProgramId, + parsed.emitterAddress, + parsed.emitterChain, + parsed.sequence + ), + tokenBridgeForeignEndpoint: deriveEndpointKey( + tokenBridgeProgramId, + parsed.emitterChain, + parsed.emitterAddress + ), + toTokenAccount: new PublicKey(toTokenAccount), + tokenBridgeRedeemer: deriveRedeemerAccountKey(cpiProgramId), + toFeesTokenAccount: new PublicKey(toTokenAccount), + tokenBridgeCustody: deriveCustodyKey(tokenBridgeProgramId, mint), + mint, + tokenBridgeCustodySigner: deriveCustodySignerKey(tokenBridgeProgramId), + rent: SYSVAR_RENT_PUBKEY, + systemProgram: SystemProgram.programId, + tokenProgram: TOKEN_PROGRAM_ID, + wormholeProgram: new PublicKey(wormholeProgramId), + }; +} diff --git a/solana/ts/src/instructions/index.ts b/solana/ts/src/instructions/index.ts new file mode 100644 index 00000000..f0d230e4 --- /dev/null +++ b/solana/ts/src/instructions/index.ts @@ -0,0 +1 @@ +// export * from "./completeNativeTransferWithRelay"; diff --git a/solana/ts/src/state/Custodian.ts b/solana/ts/src/state/Custodian.ts new file mode 100644 index 00000000..bd4db20a --- /dev/null +++ b/solana/ts/src/state/Custodian.ts @@ -0,0 +1,30 @@ +import { PublicKey } from "@solana/web3.js"; + +export class Custodian { + bump: number; + paused: boolean; + owner: PublicKey; + pendingOwner: PublicKey | null; + ownerAssistant: PublicKey; + pausedSetBy: PublicKey; + + constructor( + bump: number, + paused: boolean, + owner: PublicKey, + pendingOwner: PublicKey | null, + ownerAssistant: PublicKey, + pausedSetBy: PublicKey + ) { + this.bump = bump; + this.paused = paused; + this.owner = owner; + this.pendingOwner = pendingOwner; + this.ownerAssistant = ownerAssistant; + this.pausedSetBy = pausedSetBy; + } + + static address(programId: PublicKey) { + return PublicKey.findProgramAddressSync([Buffer.from("custodian")], programId)[0]; + } +} diff --git a/solana/ts/src/state/PayerSequence.ts b/solana/ts/src/state/PayerSequence.ts new file mode 100644 index 00000000..34e6a7d4 --- /dev/null +++ b/solana/ts/src/state/PayerSequence.ts @@ -0,0 +1,10 @@ +import { PublicKey } from "@solana/web3.js"; + +export class PayerSequence { + static address(programId: PublicKey, payer: PublicKey) { + return PublicKey.findProgramAddressSync( + [Buffer.from("seq"), payer.toBuffer()], + programId + )[0]; + } +} diff --git a/solana/ts/src/state/RouterEndpoint.ts b/solana/ts/src/state/RouterEndpoint.ts new file mode 100644 index 00000000..a9811b31 --- /dev/null +++ b/solana/ts/src/state/RouterEndpoint.ts @@ -0,0 +1,23 @@ +import { ChainId } from "@certusone/wormhole-sdk"; +import { PublicKey } from "@solana/web3.js"; + +export class RouterEndpoint { + bump: number; + chain: number; + address: Array; + + constructor(bump: number, chain: number, address: Array) { + this.bump = bump; + this.chain = chain; + this.address = address; + } + + static address(programId: PublicKey, chain: ChainId) { + const encodedChain = Buffer.alloc(2); + encodedChain.writeUInt16BE(chain); + return PublicKey.findProgramAddressSync( + [Buffer.from("endpoint"), encodedChain], + programId + )[0]; + } +} diff --git a/solana/ts/src/state/index.ts b/solana/ts/src/state/index.ts new file mode 100644 index 00000000..5112021e --- /dev/null +++ b/solana/ts/src/state/index.ts @@ -0,0 +1,14 @@ +export * from "./Custodian"; +export * from "./PayerSequence"; +export * from "./RouterEndpoint"; + +import { solana } from "@certusone/wormhole-sdk"; +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; + +export function deriveCoreMessageKey(programId: PublicKey, payer: PublicKey, sequence: BN) { + return solana.deriveAddress( + [Buffer.from("msg"), payer.toBuffer(), sequence.toBuffer()], + programId + ); +} diff --git a/solana/ts/src/utils.ts b/solana/ts/src/utils.ts new file mode 100644 index 00000000..6d5a24f0 --- /dev/null +++ b/solana/ts/src/utils.ts @@ -0,0 +1,12 @@ +import { PublicKey } from "@solana/web3.js"; + +export const BPF_LOADER_UPGRADEABLE_PROGRAM_ID = new PublicKey( + "BPFLoaderUpgradeab1e11111111111111111111111" +); + +export function getProgramData(programId: PublicKey) { + return PublicKey.findProgramAddressSync( + [programId.toBuffer()], + BPF_LOADER_UPGRADEABLE_PROGRAM_ID + )[0]; +} diff --git a/solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json b/solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json new file mode 100644 index 00000000..431e10b2 --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json @@ -0,0 +1,1099 @@ +{ + "version": "0.1.0", + "name": "message_transmitter", + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgramData", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "InitializeParams" + } + } + ] + }, + { + "name": "transferOwnership", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "TransferOwnershipParams" + } + } + ] + }, + { + "name": "acceptOwnership", + "accounts": [ + { + "name": "pendingOwner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AcceptOwnershipParams" + } + } + ] + }, + { + "name": "updatePauser", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdatePauserParams" + } + } + ] + }, + { + "name": "updateAttesterManager", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdateAttesterManagerParams" + } + } + ] + }, + { + "name": "pause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "PauseParams" + } + } + ] + }, + { + "name": "unpause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UnpauseParams" + } + } + ] + }, + { + "name": "setMaxMessageBodySize", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetMaxMessageBodySizeParams" + } + } + ] + }, + { + "name": "enableAttester", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "EnableAttesterParams" + } + } + ] + }, + { + "name": "disableAttester", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DisableAttesterParams" + } + } + ] + }, + { + "name": "setSignatureThreshold", + "accounts": [ + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetSignatureThresholdParams" + } + } + ] + }, + { + "name": "sendMessage", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SendMessageParams" + } + } + ], + "returns": "u64" + }, + { + "name": "sendMessageWithCaller", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SendMessageWithCallerParams" + } + } + ], + "returns": "u64" + }, + { + "name": "replaceMessage", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReplaceMessageParams" + } + } + ], + "returns": "u64" + }, + { + "name": "receiveMessage", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "caller", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "usedNonces", + "isMut": true, + "isSigner": false + }, + { + "name": "receiver", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReceiveMessageParams" + } + } + ] + } + ], + "accounts": [ + { + "name": "MessageTransmitter", + "docs": [ + "Main state of the MessageTransmitter program" + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "owner", + "type": "publicKey" + }, + { + "name": "pendingOwner", + "type": "publicKey" + }, + { + "name": "attesterManager", + "type": "publicKey" + }, + { + "name": "pauser", + "type": "publicKey" + }, + { + "name": "paused", + "type": "bool" + }, + { + "name": "localDomain", + "type": "u32" + }, + { + "name": "version", + "type": "u32" + }, + { + "name": "signatureThreshold", + "type": "u32" + }, + { + "name": "enabledAttesters", + "type": { + "vec": "publicKey" + } + }, + { + "name": "maxMessageBodySize", + "type": "u64" + }, + { + "name": "nextAvailableNonce", + "type": "u64" + }, + { + "name": "authorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "UsedNonces", + "docs": [ + "UsedNonces account holds an array of bits that indicate which nonces were already used", + "so they can't be resused to receive new messages. Array starts with the first_nonce and", + "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain." + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "firstNonce", + "type": "u64" + }, + { + "name": "usedNonces", + "type": { + "array": [ + "u64", + 100 + ] + } + } + ] + } + } + ], + "types": [ + { + "name": "AcceptOwnershipParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "DisableAttesterParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "attester", + "type": "publicKey" + } + ] + } + }, + { + "name": "EnableAttesterParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newAttester", + "type": "publicKey" + } + ] + } + }, + { + "name": "InitializeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "localDomain", + "type": "u32" + }, + { + "name": "attester", + "type": "publicKey" + }, + { + "name": "maxMessageBodySize", + "type": "u64" + }, + { + "name": "version", + "type": "u32" + } + ] + } + }, + { + "name": "PauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "ReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "message", + "type": "bytes" + }, + { + "name": "attestation", + "type": "bytes" + } + ] + } + }, + { + "name": "HandleReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "sender", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "ReplaceMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "originalMessage", + "type": "bytes" + }, + { + "name": "originalAttestation", + "type": "bytes" + }, + { + "name": "newMessageBody", + "type": "bytes" + }, + { + "name": "newDestinationCaller", + "type": "publicKey" + } + ] + } + }, + { + "name": "SendMessageWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "recipient", + "type": "publicKey" + }, + { + "name": "destinationCaller", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "SendMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "recipient", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "SetMaxMessageBodySizeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newMaxMessageBodySize", + "type": "u64" + } + ] + } + }, + { + "name": "SetSignatureThresholdParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newSignatureThreshold", + "type": "u32" + } + ] + } + }, + { + "name": "TransferOwnershipParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newOwner", + "type": "publicKey" + } + ] + } + }, + { + "name": "UnpauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UpdateAttesterManagerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newAttesterManager", + "type": "publicKey" + } + ] + } + }, + { + "name": "UpdatePauserParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newPauser", + "type": "publicKey" + } + ] + } + }, + { + "name": "MathError", + "type": { + "kind": "enum", + "variants": [ + { + "name": "MathOverflow" + }, + { + "name": "MathUnderflow" + }, + { + "name": "ErrorInDivision" + } + ] + } + } + ], + "events": [ + { + "name": "OwnershipTransferStarted", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "OwnershipTransferred", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "PauserChanged", + "fields": [ + { + "name": "newAddress", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "AttesterManagerUpdated", + "fields": [ + { + "name": "previousAttesterManager", + "type": "publicKey", + "index": false + }, + { + "name": "newAttesterManager", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MessageSent", + "fields": [ + { + "name": "message", + "type": "bytes", + "index": false + } + ] + }, + { + "name": "MessageReceived", + "fields": [ + { + "name": "caller", + "type": "publicKey", + "index": false + }, + { + "name": "sourceDomain", + "type": "u32", + "index": false + }, + { + "name": "nonce", + "type": "u64", + "index": false + }, + { + "name": "sender", + "type": "publicKey", + "index": false + }, + { + "name": "messageBody", + "type": "bytes", + "index": false + } + ] + }, + { + "name": "SignatureThresholdUpdated", + "fields": [ + { + "name": "oldSignatureThreshold", + "type": "u32", + "index": false + }, + { + "name": "newSignatureThreshold", + "type": "u32", + "index": false + } + ] + }, + { + "name": "AttesterEnabled", + "fields": [ + { + "name": "attester", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "AttesterDisabled", + "fields": [ + { + "name": "attester", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MaxMessageBodySizeUpdated", + "fields": [ + { + "name": "newMaxMessageBodySize", + "type": "u64", + "index": false + } + ] + }, + { + "name": "Pause", + "fields": [] + }, + { + "name": "Unpause", + "fields": [] + } + ], + "errors": [ + { + "code": 6000, + "name": "InvalidAuthority", + "msg": "Invalid authority" + }, + { + "code": 6001, + "name": "ProgramPaused", + "msg": "Instruction is not allowed at this time" + }, + { + "code": 6002, + "name": "InvalidMessageTransmitterState", + "msg": "Invalid message transmitter state" + }, + { + "code": 6003, + "name": "InvalidSignatureThreshold", + "msg": "Invalid signature threshold" + }, + { + "code": 6004, + "name": "SignatureThresholdAlreadySet", + "msg": "Signature threshold already set" + }, + { + "code": 6005, + "name": "InvalidOwner", + "msg": "Invalid owner" + }, + { + "code": 6006, + "name": "InvalidPauser", + "msg": "Invalid pauser" + }, + { + "code": 6007, + "name": "InvalidAttesterManager", + "msg": "Invalid attester manager" + }, + { + "code": 6008, + "name": "InvalidAttester", + "msg": "Invalid attester" + }, + { + "code": 6009, + "name": "AttesterAlreadyEnabled", + "msg": "Attester already enabled" + }, + { + "code": 6010, + "name": "TooFewEnabledAttesters", + "msg": "Too few enabled attesters" + }, + { + "code": 6011, + "name": "SignatureThresholdTooLow", + "msg": "Signature threshold is too low" + }, + { + "code": 6012, + "name": "AttesterAlreadyDisabled", + "msg": "Attester already disabled" + }, + { + "code": 6013, + "name": "MessageBodyLimitExceeded", + "msg": "Message body exceeds max size" + }, + { + "code": 6014, + "name": "InvalidDestinationCaller", + "msg": "Invalid destination caller" + }, + { + "code": 6015, + "name": "InvalidRecipient", + "msg": "Invalid message recipient" + }, + { + "code": 6016, + "name": "SenderNotPermitted", + "msg": "Sender is not permitted" + }, + { + "code": 6017, + "name": "InvalidSourceDomain", + "msg": "Invalid source domain" + }, + { + "code": 6018, + "name": "InvalidDestinationDomain", + "msg": "Invalid destination domain" + }, + { + "code": 6019, + "name": "InvalidMessageVersion", + "msg": "Invalid message version" + }, + { + "code": 6020, + "name": "InvalidUsedNoncesAccount", + "msg": "Invalid used nonces account" + }, + { + "code": 6021, + "name": "InvalidRecipientProgram", + "msg": "Invalid recipient program" + }, + { + "code": 6022, + "name": "InvalidNonce", + "msg": "Invalid nonce" + }, + { + "code": 6023, + "name": "NonceAlreadyUsed", + "msg": "Nonce already used" + }, + { + "code": 6024, + "name": "MessageTooShort", + "msg": "Message is too short" + }, + { + "code": 6025, + "name": "MalformedMessage", + "msg": "Malformed message" + }, + { + "code": 6026, + "name": "InvalidSignatureOrderOrDupe", + "msg": "Invalid signature order or dupe" + }, + { + "code": 6027, + "name": "InvalidAttesterSignature", + "msg": "Invalid attester signature" + }, + { + "code": 6028, + "name": "InvalidAttestationLength", + "msg": "Invalid attestation length" + }, + { + "code": 6029, + "name": "InvalidSignatureRecoveryId", + "msg": "Invalid signature recovery ID" + }, + { + "code": 6030, + "name": "InvalidSignatureSValue", + "msg": "Invalid signature S value" + }, + { + "code": 6031, + "name": "InvalidMessageHash", + "msg": "Invalid message hash" + } + ], + "metadata": { + "address": "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + } +} diff --git a/solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json b/solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json new file mode 100644 index 00000000..1f6faff0 --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json @@ -0,0 +1,1451 @@ +{ + "version": "0.1.0", + "name": "token_messenger_minter", + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgramData", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "InitializeParams" + } + } + ] + }, + { + "name": "transferOwnership", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "TransferOwnershipParams" + } + } + ] + }, + { + "name": "acceptOwnership", + "accounts": [ + { + "name": "pendingOwner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AcceptOwnershipParams" + } + } + ] + }, + { + "name": "addRemoteTokenMessenger", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AddRemoteTokenMessengerParams" + } + } + ] + }, + { + "name": "removeRemoteTokenMessenger", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "RemoveRemoteTokenMessengerParams" + } + } + ] + }, + { + "name": "depositForBurn", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "burnTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "burnTokenMint", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DepositForBurnParams" + } + } + ], + "returns": "u64" + }, + { + "name": "depositForBurnWithCaller", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "burnTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "burnTokenMint", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DepositForBurnWithCallerParams" + } + } + ], + "returns": "u64" + }, + { + "name": "replaceDepositForBurn", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReplaceDepositForBurnParams" + } + } + ], + "returns": "u64" + }, + { + "name": "handleReceiveMessage", + "accounts": [ + { + "name": "authorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": false, + "isSigner": false + }, + { + "name": "recipientTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "HandleReceiveMessageParams" + } + } + ] + }, + { + "name": "setTokenController", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetTokenControllerParams" + } + } + ] + }, + { + "name": "pause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "PauseParams" + } + } + ] + }, + { + "name": "unpause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UnpauseParams" + } + } + ] + }, + { + "name": "updatePauser", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdatePauserParams" + } + } + ] + }, + { + "name": "setMaxBurnAmountPerMessage", + "accounts": [ + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetMaxBurnAmountPerMessageParams" + } + } + ] + }, + { + "name": "addLocalToken", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "localTokenMint", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AddLocalTokenParams" + } + } + ] + }, + { + "name": "removeLocalToken", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "RemoveLocalTokenParams" + } + } + ] + }, + { + "name": "linkTokenPair", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "LinkTokenPairParams" + } + } + ] + }, + { + "name": "unlinkTokenPair", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UninkTokenPairParams" + } + } + ] + } + ], + "accounts": [ + { + "name": "TokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "owner", + "type": "publicKey" + }, + { + "name": "pendingOwner", + "type": "publicKey" + }, + { + "name": "localMessageTransmitter", + "type": "publicKey" + }, + { + "name": "messageBodyVersion", + "type": "u32" + }, + { + "name": "authorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "RemoteTokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": "publicKey" + } + ] + } + }, + { + "name": "TokenMinter", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + }, + { + "name": "pauser", + "type": "publicKey" + }, + { + "name": "paused", + "type": "bool" + }, + { + "name": "bump", + "type": "u8" + } + ] + } + }, + { + "name": "TokenPair", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "remoteToken", + "type": "publicKey" + }, + { + "name": "localToken", + "type": "publicKey" + }, + { + "name": "bump", + "type": "u8" + } + ] + } + }, + { + "name": "LocalToken", + "type": { + "kind": "struct", + "fields": [ + { + "name": "custody", + "type": "publicKey" + }, + { + "name": "mint", + "type": "publicKey" + }, + { + "name": "burnLimitPerMessage", + "type": "u64" + }, + { + "name": "messagesSent", + "type": "u64" + }, + { + "name": "messagesReceived", + "type": "u64" + }, + { + "name": "amountSent", + "type": "u64" + }, + { + "name": "amountReceived", + "type": "u64" + }, + { + "name": "bump", + "type": "u8" + }, + { + "name": "custodyBump", + "type": "u8" + } + ] + } + } + ], + "types": [ + { + "name": "AcceptOwnershipParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "AddRemoteTokenMessengerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": "publicKey" + } + ] + } + }, + { + "name": "DepositForBurnWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "mintRecipient", + "type": "publicKey" + }, + { + "name": "destinationCaller", + "type": "publicKey" + } + ] + } + }, + { + "name": "DepositForBurnParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "mintRecipient", + "type": "publicKey" + } + ] + } + }, + { + "name": "HandleReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "sender", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "InitializeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + }, + { + "name": "localMessageTransmitter", + "type": "publicKey" + }, + { + "name": "messageBodyVersion", + "type": "u32" + } + ] + } + }, + { + "name": "RemoveRemoteTokenMessengerParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "ReplaceDepositForBurnParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "originalMessage", + "type": "bytes" + }, + { + "name": "originalAttestation", + "type": "bytes" + }, + { + "name": "newDestinationCaller", + "type": "publicKey" + }, + { + "name": "newMintRecipient", + "type": "publicKey" + } + ] + } + }, + { + "name": "TransferOwnershipParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newOwner", + "type": "publicKey" + } + ] + } + }, + { + "name": "AddLocalTokenParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "LinkTokenPairParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "localToken", + "type": "publicKey" + }, + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "remoteToken", + "type": "publicKey" + } + ] + } + }, + { + "name": "PauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "RemoveLocalTokenParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "SetMaxBurnAmountPerMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "burnLimitPerMessage", + "type": "u64" + } + ] + } + }, + { + "name": "SetTokenControllerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + } + ] + } + }, + { + "name": "UninkTokenPairParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UnpauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UpdatePauserParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newPauser", + "type": "publicKey" + } + ] + } + }, + { + "name": "TokenMinterError", + "type": { + "kind": "enum", + "variants": [ + { + "name": "InvalidAuthority" + }, + { + "name": "InvalidTokenMinterState" + }, + { + "name": "ProgramPaused" + }, + { + "name": "InvalidTokenPairState" + }, + { + "name": "InvalidLocalTokenState" + }, + { + "name": "InvalidPauser" + }, + { + "name": "InvalidTokenController" + }, + { + "name": "BurnAmountExceeded" + } + ] + } + } + ], + "events": [ + { + "name": "OwnershipTransferStarted", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "OwnershipTransferred", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "DepositForBurn", + "fields": [ + { + "name": "nonce", + "type": "u64", + "index": false + }, + { + "name": "burnToken", + "type": "publicKey", + "index": false + }, + { + "name": "amount", + "type": "u64", + "index": false + }, + { + "name": "depositor", + "type": "publicKey", + "index": false + }, + { + "name": "mintRecipient", + "type": "publicKey", + "index": false + }, + { + "name": "destinationDomain", + "type": "u32", + "index": false + }, + { + "name": "destinationTokenMessenger", + "type": "publicKey", + "index": false + }, + { + "name": "destinationCaller", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MintAndWithdraw", + "fields": [ + { + "name": "mintRecipient", + "type": "publicKey", + "index": false + }, + { + "name": "amount", + "type": "u64", + "index": false + }, + { + "name": "mintToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "RemoteTokenMessengerAdded", + "fields": [ + { + "name": "domain", + "type": "u32", + "index": false + }, + { + "name": "tokenMessenger", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "RemoteTokenMessengerRemoved", + "fields": [ + { + "name": "domain", + "type": "u32", + "index": false + }, + { + "name": "tokenMessenger", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "SetTokenController", + "fields": [ + { + "name": "tokenController", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "PauserChanged", + "fields": [ + { + "name": "newAddress", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "SetBurnLimitPerMessage", + "fields": [ + { + "name": "token", + "type": "publicKey", + "index": false + }, + { + "name": "burnLimitPerMessage", + "type": "u64", + "index": false + } + ] + }, + { + "name": "LocalTokenAdded", + "fields": [ + { + "name": "custody", + "type": "publicKey", + "index": false + }, + { + "name": "mint", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "LocalTokenRemoved", + "fields": [ + { + "name": "custody", + "type": "publicKey", + "index": false + }, + { + "name": "mint", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "TokenPairLinked", + "fields": [ + { + "name": "localToken", + "type": "publicKey", + "index": false + }, + { + "name": "remoteDomain", + "type": "u32", + "index": false + }, + { + "name": "remoteToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "TokenPairUnlinked", + "fields": [ + { + "name": "localToken", + "type": "publicKey", + "index": false + }, + { + "name": "remoteDomain", + "type": "u32", + "index": false + }, + { + "name": "remoteToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "Pause", + "fields": [] + }, + { + "name": "Unpause", + "fields": [] + } + ], + "errors": [ + { + "code": 6000, + "name": "InvalidAuthority", + "msg": "Invalid authority" + }, + { + "code": 6001, + "name": "InvalidTokenMessengerState", + "msg": "Invalid token messenger state" + }, + { + "code": 6002, + "name": "InvalidTokenMessenger", + "msg": "Invalid token messenger" + }, + { + "code": 6003, + "name": "InvalidOwner", + "msg": "Invalid owner" + }, + { + "code": 6004, + "name": "MalformedMessage", + "msg": "Malformed message" + }, + { + "code": 6005, + "name": "InvalidMessageBodyVersion", + "msg": "Invalid message body version" + }, + { + "code": 6006, + "name": "InvalidAmount", + "msg": "Invalid amount" + }, + { + "code": 6007, + "name": "InvalidDestinationDomain", + "msg": "Invalid destination domain" + }, + { + "code": 6008, + "name": "InvalidDestinationCaller", + "msg": "Invalid destination caller" + }, + { + "code": 6009, + "name": "InvalidMintRecipient", + "msg": "Invalid mint recipient" + }, + { + "code": 6010, + "name": "InvalidSender", + "msg": "Invalid sender" + }, + { + "code": 6011, + "name": "InvalidTokenPair", + "msg": "Invalid token pair" + }, + { + "code": 6012, + "name": "InvalidTokenMint", + "msg": "Invalid token mint" + } + ], + "metadata": { + "address": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + } +} diff --git a/solana/ts/src/wormholeCctp/circle/index.ts b/solana/ts/src/wormholeCctp/circle/index.ts new file mode 100644 index 00000000..acd4e0c3 --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/index.ts @@ -0,0 +1,6 @@ +export { MessageTransmitterProgram } from "./messageTransmitter"; +export { CctpMessage, CctpTokenBurnMessage } from "./messages"; +export { + DEPOSIT_FOR_BURN_WITH_CALLER_IX_SELECTOR, + TokenMessengerMinterProgram, +} from "./tokenMessengerMinter"; diff --git a/solana/ts/src/wormholeCctp/circle/messageTransmitter/MessageTransmitterConfig.ts b/solana/ts/src/wormholeCctp/circle/messageTransmitter/MessageTransmitterConfig.ts new file mode 100644 index 00000000..e8b86ab2 --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/messageTransmitter/MessageTransmitterConfig.ts @@ -0,0 +1,48 @@ +import { PublicKey } from "@solana/web3.js"; + +export class MessageTransmitterConfig { + owner: PublicKey; + pendingOwner: PublicKey; + attesterManager: PublicKey; + pauser: PublicKey; + paused: boolean; + localDomain: number; + version: number; + signatureThreshold: number; + enabledAttesters: Array>; + maxMessageBodySize: bigint; + nextAvailableNonce: bigint; + authorityBump: number; + + constructor( + owner: PublicKey, + pendingOwner: PublicKey, + attesterManager: PublicKey, + pauser: PublicKey, + paused: boolean, + localDomain: number, + version: number, + signatureThreshold: number, + enabledAttesters: Array>, + maxMessageBodySize: bigint, + nextAvailableNonce: bigint, + authorityBump: number, + ) { + this.owner = owner; + this.pendingOwner = pendingOwner; + this.attesterManager = attesterManager; + this.pauser = pauser; + this.paused = paused; + this.localDomain = localDomain; + this.version = version; + this.signatureThreshold = signatureThreshold; + this.enabledAttesters = enabledAttesters; + this.maxMessageBodySize = maxMessageBodySize; + this.nextAvailableNonce = nextAvailableNonce; + this.authorityBump = authorityBump; + } + + static address(programId: PublicKey) { + return PublicKey.findProgramAddressSync([Buffer.from("message_transmitter")], programId)[0]; + } +} diff --git a/solana/ts/src/wormholeCctp/circle/messageTransmitter/UsedNonces.ts b/solana/ts/src/wormholeCctp/circle/messageTransmitter/UsedNonces.ts new file mode 100644 index 00000000..d3272d75 --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/messageTransmitter/UsedNonces.ts @@ -0,0 +1,17 @@ +import { PublicKey } from "@solana/web3.js"; + +export const MAX_NONCES = 6400n; + +export class UsedNonses { + static address(programId: PublicKey, remoteDomain: number, nonce: bigint) { + const firstNonce = ((nonce - 1n) / MAX_NONCES) * MAX_NONCES + 1n; + return PublicKey.findProgramAddressSync( + [ + Buffer.from("used_nonces"), + Buffer.from(remoteDomain.toString()), + Buffer.from(firstNonce.toString()), + ], + programId, + )[0]; + } +} diff --git a/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts b/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts new file mode 100644 index 00000000..82737e6c --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts @@ -0,0 +1,145 @@ +import { Program } from "@coral-xyz/anchor"; +import { TOKEN_PROGRAM_ID } from "@solana/spl-token"; +import { Connection, PublicKey } from "@solana/web3.js"; +import MessageTransmitterIdl from "../idl/message_transmitter.json"; +import { CctpTokenBurnMessage } from "../messages"; +import { TokenMessengerMinterProgram } from "../tokenMessengerMinter"; +import { MessageTransmitter } from "../types/message_transmitter"; +import { MessageTransmitterConfig } from "./MessageTransmitterConfig"; +import { UsedNonses } from "./UsedNonces"; + +export const PROGRAM_IDS = ["CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd"] as const; + +export type ProgramId = (typeof PROGRAM_IDS)[number]; + +export type ReceiveMessageAccounts = { + authority: PublicKey; + messageTransmitterConfig: PublicKey; + usedNonces: PublicKey; + tokenMessengerMinterProgram: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + tokenPair: PublicKey; + custodyToken: PublicKey; + tokenProgram: PublicKey; +}; + +export class MessageTransmitterProgram { + private _programId: ProgramId; + + program: Program; + + constructor(connection: Connection, programId?: ProgramId) { + this._programId = programId ?? testnet(); + this.program = new Program(MessageTransmitterIdl as any, new PublicKey(this._programId), { + connection, + }); + } + + get ID(): PublicKey { + return this.program.programId; + } + + messageTransmitterConfigAddress(): PublicKey { + return MessageTransmitterConfig.address(this.ID); + } + + async fetchMessageTransmitterConfig(addr: PublicKey): Promise { + const { + owner, + pendingOwner, + attesterManager, + pauser, + paused, + localDomain, + version, + signatureThreshold, + enabledAttesters, + maxMessageBodySize, + nextAvailableNonce, + authorityBump, + } = await this.program.account.messageTransmitter.fetch(addr); + + return new MessageTransmitterConfig( + owner, + pendingOwner, + attesterManager, + pauser, + paused, + localDomain, + version, + signatureThreshold, + enabledAttesters.map((addr) => Array.from(addr.toBuffer())), + BigInt(maxMessageBodySize.toString()), + BigInt(nextAvailableNonce.toString()), + authorityBump, + ); + } + + usedNoncesAddress(remoteDomain: number, nonce: bigint): PublicKey { + return UsedNonses.address(this.ID, remoteDomain, nonce); + } + + authorityAddress(): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("message_transmitter_authority")], + this.ID, + )[0]; + } + + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { + switch (this._programId) { + case testnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + ); + } + case mainnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + receiveMessageAccounts( + mint: PublicKey, + circleMessage: CctpTokenBurnMessage | Buffer, + ): ReceiveMessageAccounts { + const { + cctp: { sourceDomain, nonce }, + burnTokenAddress, + } = CctpTokenBurnMessage.from(circleMessage); + + const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); + return { + authority: this.authorityAddress(), + messageTransmitterConfig: this.messageTransmitterConfigAddress(), + usedNonces: this.usedNoncesAddress(sourceDomain, nonce), + tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, + tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), + remoteTokenMessenger: + tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceDomain), + tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), + localToken: tokenMessengerMinterProgram.localTokenAddress(mint), + tokenPair: tokenMessengerMinterProgram.tokenPairAddress(sourceDomain, burnTokenAddress), + custodyToken: tokenMessengerMinterProgram.custodyTokenAddress(mint), + tokenProgram: TOKEN_PROGRAM_ID, + }; + } +} + +export function mainnet(): ProgramId { + return "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd"; +} + +export function testnet(): ProgramId { + return "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd"; +} diff --git a/solana/ts/src/wormholeCctp/circle/messages.ts b/solana/ts/src/wormholeCctp/circle/messages.ts new file mode 100644 index 00000000..789844c6 --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/messages.ts @@ -0,0 +1,152 @@ +import { ethers } from "ethers"; + +export type Cctp = { + version: number; + sourceDomain: number; + targetDomain: number; + nonce: bigint; + sender: Array; + recipient: Array; + targetCaller: Array; +}; + +// Taken from https://developers.circle.com/stablecoins/docs/message-format. +export class CctpMessage { + cctp: Cctp; + message: Buffer; + + constructor(cctp: Cctp, message: Buffer) { + this.cctp = cctp; + this.message = message; + } + + static from(message: CctpMessage | Buffer): CctpMessage { + if (message instanceof CctpMessage) { + return message; + } else { + return CctpMessage.decode(message); + } + } + + static decode(buf: Readonly): CctpMessage { + const version = buf.readUInt32BE(0); + const sourceDomain = buf.readUInt32BE(4); + const targetDomain = buf.readUInt32BE(8); + const nonce = buf.readBigUInt64BE(12); + const sender = Array.from(buf.slice(20, 52)); + const recipient = Array.from(buf.slice(52, 84)); + const targetCaller = Array.from(buf.slice(84, 116)); + const message = buf.subarray(116); + + return new CctpMessage( + { + version, + sourceDomain, + targetDomain, + nonce, + sender, + recipient, + targetCaller, + }, + message, + ); + } + + encode(): Buffer { + const { cctp, message } = this; + return Buffer.concat([encodeCctp(cctp), message]); + } +} + +export class CctpTokenBurnMessage { + cctp: Cctp; + version: number; + burnTokenAddress: Array; + mintRecipient: Array; + amount: bigint; + sender: Array; + + constructor( + cctp: Cctp, + version: number, + burnTokenAddress: Array, + mintRecipient: Array, + amount: bigint, + sender: Array, + ) { + this.cctp = cctp; + this.version = version; + this.burnTokenAddress = burnTokenAddress; + this.mintRecipient = mintRecipient; + this.amount = amount; + this.sender = sender; + } + + static from(message: CctpTokenBurnMessage | Buffer): CctpTokenBurnMessage { + if (message instanceof CctpTokenBurnMessage) { + return message; + } else { + return CctpTokenBurnMessage.decode(message); + } + } + + static decode(buf: Readonly): CctpTokenBurnMessage { + const { cctp, message } = CctpMessage.decode(buf); + const version = message.readUInt32BE(0); + const burnTokenAddress = Array.from(message.subarray(4, 36)); + const mintRecipient = Array.from(message.subarray(36, 68)); + const amount = BigInt(ethers.BigNumber.from(message.subarray(68, 100)).toString()); + const sender = Array.from(message.subarray(100, 132)); + + return new CctpTokenBurnMessage( + cctp, + version, + burnTokenAddress, + mintRecipient, + amount, + sender, + ); + } + + encode(): Buffer { + const buf = Buffer.alloc(132); + + const { cctp, version, burnTokenAddress, mintRecipient, amount, sender } = this; + + let offset = 0; + offset = buf.writeUInt32BE(version, offset); + buf.set(burnTokenAddress, offset); + offset += 32; + buf.set(mintRecipient, offset); + offset += 32; + + // Special handling w/ uint256. This value will most likely encoded in < 32 bytes, so we + // jump ahead by 32 and subtract the length of the encoded value. + const encodedAmount = ethers.utils.arrayify(ethers.BigNumber.from(amount.toString())); + buf.set(encodedAmount, (offset += 32) - encodedAmount.length); + + buf.set(sender, offset); + offset += 32; + + return Buffer.concat([encodeCctp(cctp), buf]); + } +} + +function encodeCctp(cctp: Cctp): Buffer { + const buf = Buffer.alloc(116); + + const { version, sourceDomain, targetDomain, nonce, sender, recipient, targetCaller } = cctp; + + let offset = 0; + offset = buf.writeUInt32BE(version, offset); + offset = buf.writeUInt32BE(sourceDomain, offset); + offset = buf.writeUInt32BE(targetDomain, offset); + offset = buf.writeBigUInt64BE(nonce, offset); + buf.set(sender, offset); + offset += 32; + buf.set(recipient, offset); + offset += 32; + buf.set(targetCaller, offset); + + return buf; +} diff --git a/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/RemoteTokenMessenger.ts b/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/RemoteTokenMessenger.ts new file mode 100644 index 00000000..35066311 --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/RemoteTokenMessenger.ts @@ -0,0 +1,18 @@ +import { PublicKey } from "@solana/web3.js"; + +export class RemoteTokenMessenger { + domain: number; + tokenMessenger: Array; + + constructor(domain: number, tokenMessenger: Array) { + this.domain = domain; + this.tokenMessenger = tokenMessenger; + } + + static address(programId: PublicKey, remoteDomain: number) { + return PublicKey.findProgramAddressSync( + [Buffer.from("remote_token_messenger"), Buffer.from(remoteDomain.toString())], + programId, + )[0]; + } +} diff --git a/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts b/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts new file mode 100644 index 00000000..bc5405ff --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts @@ -0,0 +1,137 @@ +import { Program } from "@coral-xyz/anchor"; +import { TOKEN_PROGRAM_ID } from "@solana/spl-token"; +import { Connection, PublicKey } from "@solana/web3.js"; +import TokenMessengerMinterIdl from "../idl/token_messenger_minter.json"; +import { MessageTransmitterProgram } from "../messageTransmitter"; +import { TokenMessengerMinter } from "../types/token_messenger_minter"; +import { RemoteTokenMessenger } from "./RemoteTokenMessenger"; + +export const PROGRAM_IDS = ["CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3"] as const; + +export const DEPOSIT_FOR_BURN_WITH_CALLER_IX_SELECTOR = Uint8Array.from([ + 167, 222, 19, 114, 85, 21, 14, 118, +]); + +export type ProgramId = (typeof PROGRAM_IDS)[number]; + +export type DepositForBurnWithCallerAccounts = { + senderAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + messageTransmitterProgram: PublicKey; + tokenMessengerMinterProgram: PublicKey; + tokenProgram: PublicKey; +}; + +export class TokenMessengerMinterProgram { + private _programId: ProgramId; + + program: Program; + + constructor(connection: Connection, programId?: ProgramId) { + this._programId = programId ?? testnet(); + this.program = new Program(TokenMessengerMinterIdl as any, new PublicKey(this._programId), { + connection, + }); + } + + get ID(): PublicKey { + return this.program.programId; + } + + tokenMessengerAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("token_messenger")], this.ID)[0]; + } + + tokenMinterAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("token_minter")], this.ID)[0]; + } + + custodyTokenAddress(mint: PublicKey): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("custody"), mint.toBuffer()], + this.ID, + )[0]; + } + + tokenPairAddress(remoteDomain: number, remoteTokenAddress: Array): PublicKey { + return PublicKey.findProgramAddressSync( + [ + Buffer.from("token_pair"), + Buffer.from(remoteDomain.toString()), + Buffer.from(remoteTokenAddress), + ], + this.ID, + )[0]; + } + + remoteTokenMessengerAddress(remoteDomain: number): PublicKey { + return RemoteTokenMessenger.address(this.ID, remoteDomain); + } + + async fetchRemoteTokenMessenger(addr: PublicKey): Promise { + const { domain, tokenMessenger } = + await this.program.account.remoteTokenMessenger.fetch(addr); + return new RemoteTokenMessenger(domain, Array.from(tokenMessenger.toBuffer())); + } + + localTokenAddress(mint: PublicKey): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("local_token"), mint.toBuffer()], + this.ID, + )[0]; + } + + senderAuthority(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("sender_authority")], this.ID)[0]; + } + + messageTransmitterProgram(): MessageTransmitterProgram { + switch (this._programId) { + case testnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", + ); + } + case mainnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + depositForBurnWithCallerAccounts( + mint: PublicKey, + remoteDomain: number, + ): DepositForBurnWithCallerAccounts { + const messageTransmitterProgram = this.messageTransmitterProgram(); + return { + senderAuthority: this.senderAuthority(), + messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), + tokenMessenger: this.tokenMessengerAddress(), + remoteTokenMessenger: this.remoteTokenMessengerAddress(remoteDomain), + tokenMinter: this.tokenMinterAddress(), + localToken: this.localTokenAddress(mint), + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenMessengerMinterProgram: this.ID, + tokenProgram: TOKEN_PROGRAM_ID, + }; + } +} + +export function mainnet(): ProgramId { + return "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3"; +} + +export function testnet(): ProgramId { + return "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3"; +} diff --git a/solana/ts/src/wormholeCctp/circle/types/message_transmitter.ts b/solana/ts/src/wormholeCctp/circle/types/message_transmitter.ts new file mode 100644 index 00000000..464e36fa --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/types/message_transmitter.ts @@ -0,0 +1,2193 @@ +export type MessageTransmitter = { + "version": "0.1.0", + "name": "message_transmitter", + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgramData", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "InitializeParams" + } + } + ] + }, + { + "name": "transferOwnership", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "TransferOwnershipParams" + } + } + ] + }, + { + "name": "acceptOwnership", + "accounts": [ + { + "name": "pendingOwner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AcceptOwnershipParams" + } + } + ] + }, + { + "name": "updatePauser", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdatePauserParams" + } + } + ] + }, + { + "name": "updateAttesterManager", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdateAttesterManagerParams" + } + } + ] + }, + { + "name": "pause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "PauseParams" + } + } + ] + }, + { + "name": "unpause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UnpauseParams" + } + } + ] + }, + { + "name": "setMaxMessageBodySize", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetMaxMessageBodySizeParams" + } + } + ] + }, + { + "name": "enableAttester", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "EnableAttesterParams" + } + } + ] + }, + { + "name": "disableAttester", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DisableAttesterParams" + } + } + ] + }, + { + "name": "setSignatureThreshold", + "accounts": [ + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetSignatureThresholdParams" + } + } + ] + }, + { + "name": "sendMessage", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SendMessageParams" + } + } + ], + "returns": "u64" + }, + { + "name": "sendMessageWithCaller", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SendMessageWithCallerParams" + } + } + ], + "returns": "u64" + }, + { + "name": "replaceMessage", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReplaceMessageParams" + } + } + ], + "returns": "u64" + }, + { + "name": "receiveMessage", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "caller", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "usedNonces", + "isMut": true, + "isSigner": false + }, + { + "name": "receiver", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReceiveMessageParams" + } + } + ] + } + ], + "accounts": [ + { + "name": "messageTransmitter", + "docs": [ + "Main state of the MessageTransmitter program" + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "owner", + "type": "publicKey" + }, + { + "name": "pendingOwner", + "type": "publicKey" + }, + { + "name": "attesterManager", + "type": "publicKey" + }, + { + "name": "pauser", + "type": "publicKey" + }, + { + "name": "paused", + "type": "bool" + }, + { + "name": "localDomain", + "type": "u32" + }, + { + "name": "version", + "type": "u32" + }, + { + "name": "signatureThreshold", + "type": "u32" + }, + { + "name": "enabledAttesters", + "type": { + "vec": "publicKey" + } + }, + { + "name": "maxMessageBodySize", + "type": "u64" + }, + { + "name": "nextAvailableNonce", + "type": "u64" + }, + { + "name": "authorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "usedNonces", + "docs": [ + "UsedNonces account holds an array of bits that indicate which nonces were already used", + "so they can't be resused to receive new messages. Array starts with the first_nonce and", + "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain." + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "firstNonce", + "type": "u64" + }, + { + "name": "usedNonces", + "type": { + "array": [ + "u64", + 100 + ] + } + } + ] + } + } + ], + "types": [ + { + "name": "AcceptOwnershipParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "DisableAttesterParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "attester", + "type": "publicKey" + } + ] + } + }, + { + "name": "EnableAttesterParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newAttester", + "type": "publicKey" + } + ] + } + }, + { + "name": "InitializeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "localDomain", + "type": "u32" + }, + { + "name": "attester", + "type": "publicKey" + }, + { + "name": "maxMessageBodySize", + "type": "u64" + }, + { + "name": "version", + "type": "u32" + } + ] + } + }, + { + "name": "PauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "ReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "message", + "type": "bytes" + }, + { + "name": "attestation", + "type": "bytes" + } + ] + } + }, + { + "name": "HandleReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "sender", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "ReplaceMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "originalMessage", + "type": "bytes" + }, + { + "name": "originalAttestation", + "type": "bytes" + }, + { + "name": "newMessageBody", + "type": "bytes" + }, + { + "name": "newDestinationCaller", + "type": "publicKey" + } + ] + } + }, + { + "name": "SendMessageWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "recipient", + "type": "publicKey" + }, + { + "name": "destinationCaller", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "SendMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "recipient", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "SetMaxMessageBodySizeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newMaxMessageBodySize", + "type": "u64" + } + ] + } + }, + { + "name": "SetSignatureThresholdParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newSignatureThreshold", + "type": "u32" + } + ] + } + }, + { + "name": "TransferOwnershipParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newOwner", + "type": "publicKey" + } + ] + } + }, + { + "name": "UnpauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UpdateAttesterManagerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newAttesterManager", + "type": "publicKey" + } + ] + } + }, + { + "name": "UpdatePauserParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newPauser", + "type": "publicKey" + } + ] + } + }, + { + "name": "MathError", + "type": { + "kind": "enum", + "variants": [ + { + "name": "MathOverflow" + }, + { + "name": "MathUnderflow" + }, + { + "name": "ErrorInDivision" + } + ] + } + } + ], + "events": [ + { + "name": "OwnershipTransferStarted", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "OwnershipTransferred", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "PauserChanged", + "fields": [ + { + "name": "newAddress", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "AttesterManagerUpdated", + "fields": [ + { + "name": "previousAttesterManager", + "type": "publicKey", + "index": false + }, + { + "name": "newAttesterManager", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MessageSent", + "fields": [ + { + "name": "message", + "type": "bytes", + "index": false + } + ] + }, + { + "name": "MessageReceived", + "fields": [ + { + "name": "caller", + "type": "publicKey", + "index": false + }, + { + "name": "sourceDomain", + "type": "u32", + "index": false + }, + { + "name": "nonce", + "type": "u64", + "index": false + }, + { + "name": "sender", + "type": "publicKey", + "index": false + }, + { + "name": "messageBody", + "type": "bytes", + "index": false + } + ] + }, + { + "name": "SignatureThresholdUpdated", + "fields": [ + { + "name": "oldSignatureThreshold", + "type": "u32", + "index": false + }, + { + "name": "newSignatureThreshold", + "type": "u32", + "index": false + } + ] + }, + { + "name": "AttesterEnabled", + "fields": [ + { + "name": "attester", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "AttesterDisabled", + "fields": [ + { + "name": "attester", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MaxMessageBodySizeUpdated", + "fields": [ + { + "name": "newMaxMessageBodySize", + "type": "u64", + "index": false + } + ] + }, + { + "name": "Pause", + "fields": [] + }, + { + "name": "Unpause", + "fields": [] + } + ], + "errors": [ + { + "code": 6000, + "name": "InvalidAuthority", + "msg": "Invalid authority" + }, + { + "code": 6001, + "name": "ProgramPaused", + "msg": "Instruction is not allowed at this time" + }, + { + "code": 6002, + "name": "InvalidMessageTransmitterState", + "msg": "Invalid message transmitter state" + }, + { + "code": 6003, + "name": "InvalidSignatureThreshold", + "msg": "Invalid signature threshold" + }, + { + "code": 6004, + "name": "SignatureThresholdAlreadySet", + "msg": "Signature threshold already set" + }, + { + "code": 6005, + "name": "InvalidOwner", + "msg": "Invalid owner" + }, + { + "code": 6006, + "name": "InvalidPauser", + "msg": "Invalid pauser" + }, + { + "code": 6007, + "name": "InvalidAttesterManager", + "msg": "Invalid attester manager" + }, + { + "code": 6008, + "name": "InvalidAttester", + "msg": "Invalid attester" + }, + { + "code": 6009, + "name": "AttesterAlreadyEnabled", + "msg": "Attester already enabled" + }, + { + "code": 6010, + "name": "TooFewEnabledAttesters", + "msg": "Too few enabled attesters" + }, + { + "code": 6011, + "name": "SignatureThresholdTooLow", + "msg": "Signature threshold is too low" + }, + { + "code": 6012, + "name": "AttesterAlreadyDisabled", + "msg": "Attester already disabled" + }, + { + "code": 6013, + "name": "MessageBodyLimitExceeded", + "msg": "Message body exceeds max size" + }, + { + "code": 6014, + "name": "InvalidDestinationCaller", + "msg": "Invalid destination caller" + }, + { + "code": 6015, + "name": "InvalidRecipient", + "msg": "Invalid message recipient" + }, + { + "code": 6016, + "name": "SenderNotPermitted", + "msg": "Sender is not permitted" + }, + { + "code": 6017, + "name": "InvalidSourceDomain", + "msg": "Invalid source domain" + }, + { + "code": 6018, + "name": "InvalidDestinationDomain", + "msg": "Invalid destination domain" + }, + { + "code": 6019, + "name": "InvalidMessageVersion", + "msg": "Invalid message version" + }, + { + "code": 6020, + "name": "InvalidUsedNoncesAccount", + "msg": "Invalid used nonces account" + }, + { + "code": 6021, + "name": "InvalidRecipientProgram", + "msg": "Invalid recipient program" + }, + { + "code": 6022, + "name": "InvalidNonce", + "msg": "Invalid nonce" + }, + { + "code": 6023, + "name": "NonceAlreadyUsed", + "msg": "Nonce already used" + }, + { + "code": 6024, + "name": "MessageTooShort", + "msg": "Message is too short" + }, + { + "code": 6025, + "name": "MalformedMessage", + "msg": "Malformed message" + }, + { + "code": 6026, + "name": "InvalidSignatureOrderOrDupe", + "msg": "Invalid signature order or dupe" + }, + { + "code": 6027, + "name": "InvalidAttesterSignature", + "msg": "Invalid attester signature" + }, + { + "code": 6028, + "name": "InvalidAttestationLength", + "msg": "Invalid attestation length" + }, + { + "code": 6029, + "name": "InvalidSignatureRecoveryId", + "msg": "Invalid signature recovery ID" + }, + { + "code": 6030, + "name": "InvalidSignatureSValue", + "msg": "Invalid signature S value" + }, + { + "code": 6031, + "name": "InvalidMessageHash", + "msg": "Invalid message hash" + } + ] +}; + +export const IDL: MessageTransmitter = { + "version": "0.1.0", + "name": "message_transmitter", + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgramData", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "InitializeParams" + } + } + ] + }, + { + "name": "transferOwnership", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "TransferOwnershipParams" + } + } + ] + }, + { + "name": "acceptOwnership", + "accounts": [ + { + "name": "pendingOwner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AcceptOwnershipParams" + } + } + ] + }, + { + "name": "updatePauser", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdatePauserParams" + } + } + ] + }, + { + "name": "updateAttesterManager", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdateAttesterManagerParams" + } + } + ] + }, + { + "name": "pause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "PauseParams" + } + } + ] + }, + { + "name": "unpause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UnpauseParams" + } + } + ] + }, + { + "name": "setMaxMessageBodySize", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetMaxMessageBodySizeParams" + } + } + ] + }, + { + "name": "enableAttester", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "EnableAttesterParams" + } + } + ] + }, + { + "name": "disableAttester", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DisableAttesterParams" + } + } + ] + }, + { + "name": "setSignatureThreshold", + "accounts": [ + { + "name": "attesterManager", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetSignatureThresholdParams" + } + } + ] + }, + { + "name": "sendMessage", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SendMessageParams" + } + } + ], + "returns": "u64" + }, + { + "name": "sendMessageWithCaller", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SendMessageWithCallerParams" + } + } + ], + "returns": "u64" + }, + { + "name": "replaceMessage", + "accounts": [ + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "senderProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReplaceMessageParams" + } + } + ], + "returns": "u64" + }, + { + "name": "receiveMessage", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "caller", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "usedNonces", + "isMut": true, + "isSigner": false + }, + { + "name": "receiver", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReceiveMessageParams" + } + } + ] + } + ], + "accounts": [ + { + "name": "messageTransmitter", + "docs": [ + "Main state of the MessageTransmitter program" + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "owner", + "type": "publicKey" + }, + { + "name": "pendingOwner", + "type": "publicKey" + }, + { + "name": "attesterManager", + "type": "publicKey" + }, + { + "name": "pauser", + "type": "publicKey" + }, + { + "name": "paused", + "type": "bool" + }, + { + "name": "localDomain", + "type": "u32" + }, + { + "name": "version", + "type": "u32" + }, + { + "name": "signatureThreshold", + "type": "u32" + }, + { + "name": "enabledAttesters", + "type": { + "vec": "publicKey" + } + }, + { + "name": "maxMessageBodySize", + "type": "u64" + }, + { + "name": "nextAvailableNonce", + "type": "u64" + }, + { + "name": "authorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "usedNonces", + "docs": [ + "UsedNonces account holds an array of bits that indicate which nonces were already used", + "so they can't be resused to receive new messages. Array starts with the first_nonce and", + "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain." + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "firstNonce", + "type": "u64" + }, + { + "name": "usedNonces", + "type": { + "array": [ + "u64", + 100 + ] + } + } + ] + } + } + ], + "types": [ + { + "name": "AcceptOwnershipParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "DisableAttesterParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "attester", + "type": "publicKey" + } + ] + } + }, + { + "name": "EnableAttesterParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newAttester", + "type": "publicKey" + } + ] + } + }, + { + "name": "InitializeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "localDomain", + "type": "u32" + }, + { + "name": "attester", + "type": "publicKey" + }, + { + "name": "maxMessageBodySize", + "type": "u64" + }, + { + "name": "version", + "type": "u32" + } + ] + } + }, + { + "name": "PauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "ReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "message", + "type": "bytes" + }, + { + "name": "attestation", + "type": "bytes" + } + ] + } + }, + { + "name": "HandleReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "sender", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "ReplaceMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "originalMessage", + "type": "bytes" + }, + { + "name": "originalAttestation", + "type": "bytes" + }, + { + "name": "newMessageBody", + "type": "bytes" + }, + { + "name": "newDestinationCaller", + "type": "publicKey" + } + ] + } + }, + { + "name": "SendMessageWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "recipient", + "type": "publicKey" + }, + { + "name": "destinationCaller", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "SendMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "recipient", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "SetMaxMessageBodySizeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newMaxMessageBodySize", + "type": "u64" + } + ] + } + }, + { + "name": "SetSignatureThresholdParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newSignatureThreshold", + "type": "u32" + } + ] + } + }, + { + "name": "TransferOwnershipParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newOwner", + "type": "publicKey" + } + ] + } + }, + { + "name": "UnpauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UpdateAttesterManagerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newAttesterManager", + "type": "publicKey" + } + ] + } + }, + { + "name": "UpdatePauserParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newPauser", + "type": "publicKey" + } + ] + } + }, + { + "name": "MathError", + "type": { + "kind": "enum", + "variants": [ + { + "name": "MathOverflow" + }, + { + "name": "MathUnderflow" + }, + { + "name": "ErrorInDivision" + } + ] + } + } + ], + "events": [ + { + "name": "OwnershipTransferStarted", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "OwnershipTransferred", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "PauserChanged", + "fields": [ + { + "name": "newAddress", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "AttesterManagerUpdated", + "fields": [ + { + "name": "previousAttesterManager", + "type": "publicKey", + "index": false + }, + { + "name": "newAttesterManager", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MessageSent", + "fields": [ + { + "name": "message", + "type": "bytes", + "index": false + } + ] + }, + { + "name": "MessageReceived", + "fields": [ + { + "name": "caller", + "type": "publicKey", + "index": false + }, + { + "name": "sourceDomain", + "type": "u32", + "index": false + }, + { + "name": "nonce", + "type": "u64", + "index": false + }, + { + "name": "sender", + "type": "publicKey", + "index": false + }, + { + "name": "messageBody", + "type": "bytes", + "index": false + } + ] + }, + { + "name": "SignatureThresholdUpdated", + "fields": [ + { + "name": "oldSignatureThreshold", + "type": "u32", + "index": false + }, + { + "name": "newSignatureThreshold", + "type": "u32", + "index": false + } + ] + }, + { + "name": "AttesterEnabled", + "fields": [ + { + "name": "attester", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "AttesterDisabled", + "fields": [ + { + "name": "attester", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MaxMessageBodySizeUpdated", + "fields": [ + { + "name": "newMaxMessageBodySize", + "type": "u64", + "index": false + } + ] + }, + { + "name": "Pause", + "fields": [] + }, + { + "name": "Unpause", + "fields": [] + } + ], + "errors": [ + { + "code": 6000, + "name": "InvalidAuthority", + "msg": "Invalid authority" + }, + { + "code": 6001, + "name": "ProgramPaused", + "msg": "Instruction is not allowed at this time" + }, + { + "code": 6002, + "name": "InvalidMessageTransmitterState", + "msg": "Invalid message transmitter state" + }, + { + "code": 6003, + "name": "InvalidSignatureThreshold", + "msg": "Invalid signature threshold" + }, + { + "code": 6004, + "name": "SignatureThresholdAlreadySet", + "msg": "Signature threshold already set" + }, + { + "code": 6005, + "name": "InvalidOwner", + "msg": "Invalid owner" + }, + { + "code": 6006, + "name": "InvalidPauser", + "msg": "Invalid pauser" + }, + { + "code": 6007, + "name": "InvalidAttesterManager", + "msg": "Invalid attester manager" + }, + { + "code": 6008, + "name": "InvalidAttester", + "msg": "Invalid attester" + }, + { + "code": 6009, + "name": "AttesterAlreadyEnabled", + "msg": "Attester already enabled" + }, + { + "code": 6010, + "name": "TooFewEnabledAttesters", + "msg": "Too few enabled attesters" + }, + { + "code": 6011, + "name": "SignatureThresholdTooLow", + "msg": "Signature threshold is too low" + }, + { + "code": 6012, + "name": "AttesterAlreadyDisabled", + "msg": "Attester already disabled" + }, + { + "code": 6013, + "name": "MessageBodyLimitExceeded", + "msg": "Message body exceeds max size" + }, + { + "code": 6014, + "name": "InvalidDestinationCaller", + "msg": "Invalid destination caller" + }, + { + "code": 6015, + "name": "InvalidRecipient", + "msg": "Invalid message recipient" + }, + { + "code": 6016, + "name": "SenderNotPermitted", + "msg": "Sender is not permitted" + }, + { + "code": 6017, + "name": "InvalidSourceDomain", + "msg": "Invalid source domain" + }, + { + "code": 6018, + "name": "InvalidDestinationDomain", + "msg": "Invalid destination domain" + }, + { + "code": 6019, + "name": "InvalidMessageVersion", + "msg": "Invalid message version" + }, + { + "code": 6020, + "name": "InvalidUsedNoncesAccount", + "msg": "Invalid used nonces account" + }, + { + "code": 6021, + "name": "InvalidRecipientProgram", + "msg": "Invalid recipient program" + }, + { + "code": 6022, + "name": "InvalidNonce", + "msg": "Invalid nonce" + }, + { + "code": 6023, + "name": "NonceAlreadyUsed", + "msg": "Nonce already used" + }, + { + "code": 6024, + "name": "MessageTooShort", + "msg": "Message is too short" + }, + { + "code": 6025, + "name": "MalformedMessage", + "msg": "Malformed message" + }, + { + "code": 6026, + "name": "InvalidSignatureOrderOrDupe", + "msg": "Invalid signature order or dupe" + }, + { + "code": 6027, + "name": "InvalidAttesterSignature", + "msg": "Invalid attester signature" + }, + { + "code": 6028, + "name": "InvalidAttestationLength", + "msg": "Invalid attestation length" + }, + { + "code": 6029, + "name": "InvalidSignatureRecoveryId", + "msg": "Invalid signature recovery ID" + }, + { + "code": 6030, + "name": "InvalidSignatureSValue", + "msg": "Invalid signature S value" + }, + { + "code": 6031, + "name": "InvalidMessageHash", + "msg": "Invalid message hash" + } + ] +}; diff --git a/solana/ts/src/wormholeCctp/circle/types/token_messenger_minter.ts b/solana/ts/src/wormholeCctp/circle/types/token_messenger_minter.ts new file mode 100644 index 00000000..3ca7a4bf --- /dev/null +++ b/solana/ts/src/wormholeCctp/circle/types/token_messenger_minter.ts @@ -0,0 +1,2897 @@ +export type TokenMessengerMinter = { + "version": "0.1.0", + "name": "token_messenger_minter", + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgramData", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "InitializeParams" + } + } + ] + }, + { + "name": "transferOwnership", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "TransferOwnershipParams" + } + } + ] + }, + { + "name": "acceptOwnership", + "accounts": [ + { + "name": "pendingOwner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AcceptOwnershipParams" + } + } + ] + }, + { + "name": "addRemoteTokenMessenger", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AddRemoteTokenMessengerParams" + } + } + ] + }, + { + "name": "removeRemoteTokenMessenger", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "RemoveRemoteTokenMessengerParams" + } + } + ] + }, + { + "name": "depositForBurn", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "burnTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "burnTokenMint", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DepositForBurnParams" + } + } + ], + "returns": "u64" + }, + { + "name": "depositForBurnWithCaller", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "burnTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "burnTokenMint", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DepositForBurnWithCallerParams" + } + } + ], + "returns": "u64" + }, + { + "name": "replaceDepositForBurn", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReplaceDepositForBurnParams" + } + } + ], + "returns": "u64" + }, + { + "name": "handleReceiveMessage", + "accounts": [ + { + "name": "authorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": false, + "isSigner": false + }, + { + "name": "recipientTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "HandleReceiveMessageParams" + } + } + ] + }, + { + "name": "setTokenController", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetTokenControllerParams" + } + } + ] + }, + { + "name": "pause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "PauseParams" + } + } + ] + }, + { + "name": "unpause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UnpauseParams" + } + } + ] + }, + { + "name": "updatePauser", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdatePauserParams" + } + } + ] + }, + { + "name": "setMaxBurnAmountPerMessage", + "accounts": [ + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetMaxBurnAmountPerMessageParams" + } + } + ] + }, + { + "name": "addLocalToken", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "localTokenMint", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AddLocalTokenParams" + } + } + ] + }, + { + "name": "removeLocalToken", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "RemoveLocalTokenParams" + } + } + ] + }, + { + "name": "linkTokenPair", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "LinkTokenPairParams" + } + } + ] + }, + { + "name": "unlinkTokenPair", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UninkTokenPairParams" + } + } + ] + } + ], + "accounts": [ + { + "name": "tokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "owner", + "type": "publicKey" + }, + { + "name": "pendingOwner", + "type": "publicKey" + }, + { + "name": "localMessageTransmitter", + "type": "publicKey" + }, + { + "name": "messageBodyVersion", + "type": "u32" + }, + { + "name": "authorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "remoteTokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": "publicKey" + } + ] + } + }, + { + "name": "tokenMinter", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + }, + { + "name": "pauser", + "type": "publicKey" + }, + { + "name": "paused", + "type": "bool" + }, + { + "name": "bump", + "type": "u8" + } + ] + } + }, + { + "name": "tokenPair", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "remoteToken", + "type": "publicKey" + }, + { + "name": "localToken", + "type": "publicKey" + }, + { + "name": "bump", + "type": "u8" + } + ] + } + }, + { + "name": "localToken", + "type": { + "kind": "struct", + "fields": [ + { + "name": "custody", + "type": "publicKey" + }, + { + "name": "mint", + "type": "publicKey" + }, + { + "name": "burnLimitPerMessage", + "type": "u64" + }, + { + "name": "messagesSent", + "type": "u64" + }, + { + "name": "messagesReceived", + "type": "u64" + }, + { + "name": "amountSent", + "type": "u64" + }, + { + "name": "amountReceived", + "type": "u64" + }, + { + "name": "bump", + "type": "u8" + }, + { + "name": "custodyBump", + "type": "u8" + } + ] + } + } + ], + "types": [ + { + "name": "AcceptOwnershipParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "AddRemoteTokenMessengerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": "publicKey" + } + ] + } + }, + { + "name": "DepositForBurnWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "mintRecipient", + "type": "publicKey" + }, + { + "name": "destinationCaller", + "type": "publicKey" + } + ] + } + }, + { + "name": "DepositForBurnParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "mintRecipient", + "type": "publicKey" + } + ] + } + }, + { + "name": "HandleReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "sender", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "InitializeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + }, + { + "name": "localMessageTransmitter", + "type": "publicKey" + }, + { + "name": "messageBodyVersion", + "type": "u32" + } + ] + } + }, + { + "name": "RemoveRemoteTokenMessengerParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "ReplaceDepositForBurnParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "originalMessage", + "type": "bytes" + }, + { + "name": "originalAttestation", + "type": "bytes" + }, + { + "name": "newDestinationCaller", + "type": "publicKey" + }, + { + "name": "newMintRecipient", + "type": "publicKey" + } + ] + } + }, + { + "name": "TransferOwnershipParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newOwner", + "type": "publicKey" + } + ] + } + }, + { + "name": "AddLocalTokenParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "LinkTokenPairParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "localToken", + "type": "publicKey" + }, + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "remoteToken", + "type": "publicKey" + } + ] + } + }, + { + "name": "PauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "RemoveLocalTokenParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "SetMaxBurnAmountPerMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "burnLimitPerMessage", + "type": "u64" + } + ] + } + }, + { + "name": "SetTokenControllerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + } + ] + } + }, + { + "name": "UninkTokenPairParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UnpauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UpdatePauserParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newPauser", + "type": "publicKey" + } + ] + } + }, + { + "name": "TokenMinterError", + "type": { + "kind": "enum", + "variants": [ + { + "name": "InvalidAuthority" + }, + { + "name": "InvalidTokenMinterState" + }, + { + "name": "ProgramPaused" + }, + { + "name": "InvalidTokenPairState" + }, + { + "name": "InvalidLocalTokenState" + }, + { + "name": "InvalidPauser" + }, + { + "name": "InvalidTokenController" + }, + { + "name": "BurnAmountExceeded" + } + ] + } + } + ], + "events": [ + { + "name": "OwnershipTransferStarted", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "OwnershipTransferred", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "DepositForBurn", + "fields": [ + { + "name": "nonce", + "type": "u64", + "index": false + }, + { + "name": "burnToken", + "type": "publicKey", + "index": false + }, + { + "name": "amount", + "type": "u64", + "index": false + }, + { + "name": "depositor", + "type": "publicKey", + "index": false + }, + { + "name": "mintRecipient", + "type": "publicKey", + "index": false + }, + { + "name": "destinationDomain", + "type": "u32", + "index": false + }, + { + "name": "destinationTokenMessenger", + "type": "publicKey", + "index": false + }, + { + "name": "destinationCaller", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MintAndWithdraw", + "fields": [ + { + "name": "mintRecipient", + "type": "publicKey", + "index": false + }, + { + "name": "amount", + "type": "u64", + "index": false + }, + { + "name": "mintToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "RemoteTokenMessengerAdded", + "fields": [ + { + "name": "domain", + "type": "u32", + "index": false + }, + { + "name": "tokenMessenger", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "RemoteTokenMessengerRemoved", + "fields": [ + { + "name": "domain", + "type": "u32", + "index": false + }, + { + "name": "tokenMessenger", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "SetTokenController", + "fields": [ + { + "name": "tokenController", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "PauserChanged", + "fields": [ + { + "name": "newAddress", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "SetBurnLimitPerMessage", + "fields": [ + { + "name": "token", + "type": "publicKey", + "index": false + }, + { + "name": "burnLimitPerMessage", + "type": "u64", + "index": false + } + ] + }, + { + "name": "LocalTokenAdded", + "fields": [ + { + "name": "custody", + "type": "publicKey", + "index": false + }, + { + "name": "mint", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "LocalTokenRemoved", + "fields": [ + { + "name": "custody", + "type": "publicKey", + "index": false + }, + { + "name": "mint", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "TokenPairLinked", + "fields": [ + { + "name": "localToken", + "type": "publicKey", + "index": false + }, + { + "name": "remoteDomain", + "type": "u32", + "index": false + }, + { + "name": "remoteToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "TokenPairUnlinked", + "fields": [ + { + "name": "localToken", + "type": "publicKey", + "index": false + }, + { + "name": "remoteDomain", + "type": "u32", + "index": false + }, + { + "name": "remoteToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "Pause", + "fields": [] + }, + { + "name": "Unpause", + "fields": [] + } + ], + "errors": [ + { + "code": 6000, + "name": "InvalidAuthority", + "msg": "Invalid authority" + }, + { + "code": 6001, + "name": "InvalidTokenMessengerState", + "msg": "Invalid token messenger state" + }, + { + "code": 6002, + "name": "InvalidTokenMessenger", + "msg": "Invalid token messenger" + }, + { + "code": 6003, + "name": "InvalidOwner", + "msg": "Invalid owner" + }, + { + "code": 6004, + "name": "MalformedMessage", + "msg": "Malformed message" + }, + { + "code": 6005, + "name": "InvalidMessageBodyVersion", + "msg": "Invalid message body version" + }, + { + "code": 6006, + "name": "InvalidAmount", + "msg": "Invalid amount" + }, + { + "code": 6007, + "name": "InvalidDestinationDomain", + "msg": "Invalid destination domain" + }, + { + "code": 6008, + "name": "InvalidDestinationCaller", + "msg": "Invalid destination caller" + }, + { + "code": 6009, + "name": "InvalidMintRecipient", + "msg": "Invalid mint recipient" + }, + { + "code": 6010, + "name": "InvalidSender", + "msg": "Invalid sender" + }, + { + "code": 6011, + "name": "InvalidTokenPair", + "msg": "Invalid token pair" + }, + { + "code": 6012, + "name": "InvalidTokenMint", + "msg": "Invalid token mint" + } + ] +}; + +export const IDL: TokenMessengerMinter = { + "version": "0.1.0", + "name": "token_messenger_minter", + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": true + }, + { + "name": "authorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgramData", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "InitializeParams" + } + } + ] + }, + { + "name": "transferOwnership", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "TransferOwnershipParams" + } + } + ] + }, + { + "name": "acceptOwnership", + "accounts": [ + { + "name": "pendingOwner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AcceptOwnershipParams" + } + } + ] + }, + { + "name": "addRemoteTokenMessenger", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AddRemoteTokenMessengerParams" + } + } + ] + }, + { + "name": "removeRemoteTokenMessenger", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "RemoveRemoteTokenMessengerParams" + } + } + ] + }, + { + "name": "depositForBurn", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "burnTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "burnTokenMint", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DepositForBurnParams" + } + } + ], + "returns": "u64" + }, + { + "name": "depositForBurnWithCaller", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "burnTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "burnTokenMint", + "isMut": true, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "DepositForBurnWithCallerParams" + } + } + ], + "returns": "u64" + }, + { + "name": "replaceDepositForBurn", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "senderAuthorityPda", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "ReplaceDepositForBurnParams" + } + } + ], + "returns": "u64" + }, + { + "name": "handleReceiveMessage", + "accounts": [ + { + "name": "authorityPda", + "isMut": false, + "isSigner": true + }, + { + "name": "messageTransmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": false, + "isSigner": false + }, + { + "name": "recipientTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "HandleReceiveMessageParams" + } + } + ] + }, + { + "name": "setTokenController", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetTokenControllerParams" + } + } + ] + }, + { + "name": "pause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "PauseParams" + } + } + ] + }, + { + "name": "unpause", + "accounts": [ + { + "name": "pauser", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UnpauseParams" + } + } + ] + }, + { + "name": "updatePauser", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMinter", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UpdatePauserParams" + } + } + ] + }, + { + "name": "setMaxBurnAmountPerMessage", + "accounts": [ + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "SetMaxBurnAmountPerMessageParams" + } + } + ] + }, + { + "name": "addLocalToken", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "localTokenMint", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "AddLocalTokenParams" + } + } + ] + }, + { + "name": "removeLocalToken", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false + }, + { + "name": "custodyTokenAccount", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "RemoveLocalTokenParams" + } + } + ] + }, + { + "name": "linkTokenPair", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": true, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "LinkTokenPairParams" + } + } + ] + }, + { + "name": "unlinkTokenPair", + "accounts": [ + { + "name": "payee", + "isMut": true, + "isSigner": true + }, + { + "name": "tokenController", + "isMut": false, + "isSigner": true + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenPair", + "isMut": true, + "isSigner": false + } + ], + "args": [ + { + "name": "params", + "type": { + "defined": "UninkTokenPairParams" + } + } + ] + } + ], + "accounts": [ + { + "name": "tokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "owner", + "type": "publicKey" + }, + { + "name": "pendingOwner", + "type": "publicKey" + }, + { + "name": "localMessageTransmitter", + "type": "publicKey" + }, + { + "name": "messageBodyVersion", + "type": "u32" + }, + { + "name": "authorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "remoteTokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": "publicKey" + } + ] + } + }, + { + "name": "tokenMinter", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + }, + { + "name": "pauser", + "type": "publicKey" + }, + { + "name": "paused", + "type": "bool" + }, + { + "name": "bump", + "type": "u8" + } + ] + } + }, + { + "name": "tokenPair", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "remoteToken", + "type": "publicKey" + }, + { + "name": "localToken", + "type": "publicKey" + }, + { + "name": "bump", + "type": "u8" + } + ] + } + }, + { + "name": "localToken", + "type": { + "kind": "struct", + "fields": [ + { + "name": "custody", + "type": "publicKey" + }, + { + "name": "mint", + "type": "publicKey" + }, + { + "name": "burnLimitPerMessage", + "type": "u64" + }, + { + "name": "messagesSent", + "type": "u64" + }, + { + "name": "messagesReceived", + "type": "u64" + }, + { + "name": "amountSent", + "type": "u64" + }, + { + "name": "amountReceived", + "type": "u64" + }, + { + "name": "bump", + "type": "u8" + }, + { + "name": "custodyBump", + "type": "u8" + } + ] + } + } + ], + "types": [ + { + "name": "AcceptOwnershipParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "AddRemoteTokenMessengerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": "publicKey" + } + ] + } + }, + { + "name": "DepositForBurnWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "mintRecipient", + "type": "publicKey" + }, + { + "name": "destinationCaller", + "type": "publicKey" + } + ] + } + }, + { + "name": "DepositForBurnParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "destinationDomain", + "type": "u32" + }, + { + "name": "mintRecipient", + "type": "publicKey" + } + ] + } + }, + { + "name": "HandleReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "sender", + "type": "publicKey" + }, + { + "name": "messageBody", + "type": "bytes" + } + ] + } + }, + { + "name": "InitializeParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + }, + { + "name": "localMessageTransmitter", + "type": "publicKey" + }, + { + "name": "messageBodyVersion", + "type": "u32" + } + ] + } + }, + { + "name": "RemoveRemoteTokenMessengerParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "ReplaceDepositForBurnParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "originalMessage", + "type": "bytes" + }, + { + "name": "originalAttestation", + "type": "bytes" + }, + { + "name": "newDestinationCaller", + "type": "publicKey" + }, + { + "name": "newMintRecipient", + "type": "publicKey" + } + ] + } + }, + { + "name": "TransferOwnershipParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newOwner", + "type": "publicKey" + } + ] + } + }, + { + "name": "AddLocalTokenParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "LinkTokenPairParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "localToken", + "type": "publicKey" + }, + { + "name": "remoteDomain", + "type": "u32" + }, + { + "name": "remoteToken", + "type": "publicKey" + } + ] + } + }, + { + "name": "PauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "RemoveLocalTokenParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "SetMaxBurnAmountPerMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "burnLimitPerMessage", + "type": "u64" + } + ] + } + }, + { + "name": "SetTokenControllerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "tokenController", + "type": "publicKey" + } + ] + } + }, + { + "name": "UninkTokenPairParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UnpauseParams", + "type": { + "kind": "struct", + "fields": [] + } + }, + { + "name": "UpdatePauserParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "newPauser", + "type": "publicKey" + } + ] + } + }, + { + "name": "TokenMinterError", + "type": { + "kind": "enum", + "variants": [ + { + "name": "InvalidAuthority" + }, + { + "name": "InvalidTokenMinterState" + }, + { + "name": "ProgramPaused" + }, + { + "name": "InvalidTokenPairState" + }, + { + "name": "InvalidLocalTokenState" + }, + { + "name": "InvalidPauser" + }, + { + "name": "InvalidTokenController" + }, + { + "name": "BurnAmountExceeded" + } + ] + } + } + ], + "events": [ + { + "name": "OwnershipTransferStarted", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "OwnershipTransferred", + "fields": [ + { + "name": "previousOwner", + "type": "publicKey", + "index": false + }, + { + "name": "newOwner", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "DepositForBurn", + "fields": [ + { + "name": "nonce", + "type": "u64", + "index": false + }, + { + "name": "burnToken", + "type": "publicKey", + "index": false + }, + { + "name": "amount", + "type": "u64", + "index": false + }, + { + "name": "depositor", + "type": "publicKey", + "index": false + }, + { + "name": "mintRecipient", + "type": "publicKey", + "index": false + }, + { + "name": "destinationDomain", + "type": "u32", + "index": false + }, + { + "name": "destinationTokenMessenger", + "type": "publicKey", + "index": false + }, + { + "name": "destinationCaller", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "MintAndWithdraw", + "fields": [ + { + "name": "mintRecipient", + "type": "publicKey", + "index": false + }, + { + "name": "amount", + "type": "u64", + "index": false + }, + { + "name": "mintToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "RemoteTokenMessengerAdded", + "fields": [ + { + "name": "domain", + "type": "u32", + "index": false + }, + { + "name": "tokenMessenger", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "RemoteTokenMessengerRemoved", + "fields": [ + { + "name": "domain", + "type": "u32", + "index": false + }, + { + "name": "tokenMessenger", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "SetTokenController", + "fields": [ + { + "name": "tokenController", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "PauserChanged", + "fields": [ + { + "name": "newAddress", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "SetBurnLimitPerMessage", + "fields": [ + { + "name": "token", + "type": "publicKey", + "index": false + }, + { + "name": "burnLimitPerMessage", + "type": "u64", + "index": false + } + ] + }, + { + "name": "LocalTokenAdded", + "fields": [ + { + "name": "custody", + "type": "publicKey", + "index": false + }, + { + "name": "mint", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "LocalTokenRemoved", + "fields": [ + { + "name": "custody", + "type": "publicKey", + "index": false + }, + { + "name": "mint", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "TokenPairLinked", + "fields": [ + { + "name": "localToken", + "type": "publicKey", + "index": false + }, + { + "name": "remoteDomain", + "type": "u32", + "index": false + }, + { + "name": "remoteToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "TokenPairUnlinked", + "fields": [ + { + "name": "localToken", + "type": "publicKey", + "index": false + }, + { + "name": "remoteDomain", + "type": "u32", + "index": false + }, + { + "name": "remoteToken", + "type": "publicKey", + "index": false + } + ] + }, + { + "name": "Pause", + "fields": [] + }, + { + "name": "Unpause", + "fields": [] + } + ], + "errors": [ + { + "code": 6000, + "name": "InvalidAuthority", + "msg": "Invalid authority" + }, + { + "code": 6001, + "name": "InvalidTokenMessengerState", + "msg": "Invalid token messenger state" + }, + { + "code": 6002, + "name": "InvalidTokenMessenger", + "msg": "Invalid token messenger" + }, + { + "code": 6003, + "name": "InvalidOwner", + "msg": "Invalid owner" + }, + { + "code": 6004, + "name": "MalformedMessage", + "msg": "Malformed message" + }, + { + "code": 6005, + "name": "InvalidMessageBodyVersion", + "msg": "Invalid message body version" + }, + { + "code": 6006, + "name": "InvalidAmount", + "msg": "Invalid amount" + }, + { + "code": 6007, + "name": "InvalidDestinationDomain", + "msg": "Invalid destination domain" + }, + { + "code": 6008, + "name": "InvalidDestinationCaller", + "msg": "Invalid destination caller" + }, + { + "code": 6009, + "name": "InvalidMintRecipient", + "msg": "Invalid mint recipient" + }, + { + "code": 6010, + "name": "InvalidSender", + "msg": "Invalid sender" + }, + { + "code": 6011, + "name": "InvalidTokenPair", + "msg": "Invalid token pair" + }, + { + "code": 6012, + "name": "InvalidTokenMint", + "msg": "Invalid token mint" + } + ] +}; diff --git a/solana/ts/src/wormholeCctp/consts.ts b/solana/ts/src/wormholeCctp/consts.ts new file mode 100644 index 00000000..20254f8f --- /dev/null +++ b/solana/ts/src/wormholeCctp/consts.ts @@ -0,0 +1,5 @@ +import { PublicKey } from "@solana/web3.js"; + +export const BPF_LOADER_UPGRADEABLE_ID = new PublicKey( + "BPFLoaderUpgradeab1e11111111111111111111111" +); diff --git a/solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json b/solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json new file mode 100644 index 00000000..66803fe7 --- /dev/null +++ b/solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json @@ -0,0 +1,916 @@ +{ + "version": "0.0.0-alpha.8", + "name": "wormhole_cctp_solana", + "constants": [ + { + "name": "UPGRADE_SEED_PREFIX", + "type": "bytes", + "value": "[117, 112, 103, 114, 97, 100, 101]" + }, + { + "name": "CUSTODY_TOKEN_SEED_PREFIX", + "type": "bytes", + "value": "[99, 117, 115, 116, 111, 100, 121]" + } + ], + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "deployer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "upgrade this program's executable. We verify this PDA address here out of convenience to get", + "the PDA bump seed to invoke the upgrade." + ] + }, + { + "name": "programData", + "isMut": true, + "isSigner": false + }, + { + "name": "bpfLoaderUpgradeableProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "BPF Loader Upgradeable program.", + "", + "program." + ] + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + }, + { + "name": "transferTokensWithPayload", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true, + "docs": [ + "Owner of the token account, which will have its funds burned by Circle's Token Messenger", + "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", + "message CPI call." + ] + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false, + "docs": [ + "This program's Wormhole (Core Bridge) emitter authority.", + "" + ] + }, + { + "name": "sender", + "isMut": false, + "isSigner": true, + "docs": [ + "Signer acting as the authority to invoke this instruction. This pubkey address will be", + "encoded as the sender address.", + "", + "NOTE: Unlike Token Bridge, the sender address cannot be a program ID (where this could have", + "acted as a program's authority to send tokens). We implemented it this way because we want", + "to keep the same authority for both burning and minting. For programs, this poses a problem", + "because the program itself cannot be the owner of a token account; its PDA acts as the", + "owner. And because the mint recipient (in our case the mint redeemer) must be the owner of", + "the token account when these tokens are minted, we cannot use a program ID as this", + "authority." + ] + }, + { + "name": "mint", + "isMut": true, + "isSigner": false, + "docs": [ + "Payer Token Account's mint. This mint should be the same one as the one encoded in the", + "source (payer) token account.", + "", + "Messenger Minter program's job to validate this mint. But we will check that this mint", + "address matches the one encoded in the local token account." + ] + }, + { + "name": "srcToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Account. Circle's Token Messenger Minter will burn the configured amount from", + "this account.", + "", + "NOTE: This account will be managed by the sender authority. It is required that the token", + "account owner delegate authority to the sender authority prior to executing this", + "instruction." + ] + }, + { + "name": "custodyToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole CCTP custody token account. This account will be closed at the end of this", + "instruction. It just acts as a conduit to allow this program to be the transfer initiator in", + "the Circle message." + ] + }, + { + "name": "registeredEmitter", + "isMut": false, + "isSigner": false, + "docs": [ + "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", + "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", + "seeds::program = Wormhole CCTP program." + ] + }, + { + "name": "coreBridgeConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge config. Seeds = \\[\"Bridge\"\\], seeds::program = Core Bridge program.", + "", + "instruction handler." + ] + }, + { + "name": "coreMessage", + "isMut": true, + "isSigner": true + }, + { + "name": "coreEmitterSequence", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge emitter sequence. Seeds = \\[\"Sequence\"\\], seeds::program =Core Bridge", + "program.", + "", + "instruction handler." + ] + }, + { + "name": "coreFeeCollector", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge fee collector. Seeds = \\[\"fee_collector\"\\], seeds::program =", + "core_bridge_program. This account should be passed in as Some(fee_collector) if there is a", + "message fee.", + "", + "instruction handler." + ] + }, + { + "name": "tokenMessengerMinterSenderAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's sender authority. Seeds = \\[\"sender_authority\"\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "messageTransmitterConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", + "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", + "", + "Messenger Minter program burns the tokens. See the account loader in the instruction", + "handler." + ] + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Remote Token Messenger account. Seeds =", + "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "coreBridgeProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "clock", + "isMut": false, + "isSigner": false + }, + { + "name": "rent", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "TransferTokensWithPayloadArgs" + } + } + ] + }, + { + "name": "redeemTokensWithPayload", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true, + "docs": [ + "Owner of the token account, which will have its funds burned by Circle's Token Messenger", + "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", + "message CPI call." + ] + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false, + "docs": [ + "This program's Wormhole (Core Bridge) emitter authority.", + "" + ] + }, + { + "name": "vaa", + "isMut": false, + "isSigner": false + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge::claim_vaa) is called." + ] + }, + { + "name": "redeemer", + "isMut": false, + "isSigner": true, + "docs": [ + "Redeemer, who owns the token account that will receive the minted tokens.", + "", + "program requires that this recipient be a signer so an integrator has control over when he", + "receives his tokens." + ] + }, + { + "name": "redeemerToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Account. Circle's Token Messenger Minter will burn the configured amount from", + "this account.", + "", + "NOTE: This account is the encoded mint recipient in the Circle message. This program", + "adds a constraint that the redeemer must own this account." + ] + }, + { + "name": "registeredEmitter", + "isMut": false, + "isSigner": false, + "docs": [ + "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", + "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", + "seeds::program = Wormhole CCTP program." + ] + }, + { + "name": "messageTransmitterAuthority", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", + "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", + "", + "Messenger Minter program burns the tokens. See the account loader in the instruction", + "handler." + ] + }, + { + "name": "usedNonces", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Remote Token Messenger account. Seeds =", + "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", + "seeds::program = token_messenger_minter_program.", + "", + "The Token Messenger Minter program needs this account. We do not perform any checks", + "in this instruction handler." + ] + }, + { + "name": "tokenPair", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterCustodyToken", + "isMut": true, + "isSigner": false, + "docs": [ + "recipients. This account is topped off by \"pre-minters\"." + ] + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "RedeemTokensWithPayloadArgs" + } + } + ] + }, + { + "name": "registerEmitterAndDomain", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + }, + { + "name": "vaa", + "isMut": true, + "isSigner": false + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge::claim_vaa) is called." + ] + }, + { + "name": "registeredEmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + }, + { + "name": "upgradeContract", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + }, + { + "name": "vaa", + "isMut": false, + "isSigner": false, + "docs": [ + "instruction handler, which also checks this account discriminator (so there is no need to", + "check PDA seeds here)." + ] + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge_sdk::cpi::claim_vaa) is called." + ] + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "upgrade this program's executable. We verify this PDA address here out of convenience to get", + "the PDA bump seed to invoke the upgrade." + ] + }, + { + "name": "spill", + "isMut": true, + "isSigner": false + }, + { + "name": "buffer", + "isMut": true, + "isSigner": false, + "docs": [ + "against the one encoded in the governance VAA." + ] + }, + { + "name": "programData", + "isMut": true, + "isSigner": false + }, + { + "name": "thisProgram", + "isMut": true, + "isSigner": false + }, + { + "name": "rent", + "isMut": false, + "isSigner": false + }, + { + "name": "clock", + "isMut": false, + "isSigner": false + }, + { + "name": "bpfLoaderUpgradeableProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + } + ], + "accounts": [ + { + "name": "Custodian", + "docs": [ + "Emitter config account. This account is used to perform the following:", + "1. It is the emitter authority for the Core Bridge program.", + "2. It acts as the custody token account owner for token transfers." + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "bump", + "type": "u8" + }, + { + "name": "upgradeAuthorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "RegisteredEmitter", + "type": { + "kind": "struct", + "fields": [ + { + "name": "bump", + "type": "u8" + }, + { + "name": "cctpDomain", + "type": "u32" + }, + { + "name": "chain", + "type": "u16" + }, + { + "name": "address", + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + } + ], + "types": [ + { + "name": "RedeemTokensWithPayloadArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "encodedCctpMessage", + "type": "bytes" + }, + { + "name": "cctpAttestation", + "type": "bytes" + } + ] + } + }, + { + "name": "TransferTokensWithPayloadArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "mintRecipient", + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "nonce", + "type": "u32" + }, + { + "name": "payload", + "type": "bytes" + } + ] + } + }, + { + "name": "ReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "message", + "type": "bytes" + }, + { + "name": "attestation", + "type": "bytes" + } + ] + } + }, + { + "name": "DepositForBurnWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "docs": [ + "Transfer amount." + ], + "type": "u64" + }, + { + "name": "destinationDomain", + "docs": [ + "Circle domain value of the token to be transferred." + ], + "type": "u32" + }, + { + "name": "mintRecipient", + "docs": [ + "Recipient of assets on target network.", + "", + "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", + "weird because this address is one for another network. We are making it a 32-byte fixed", + "array instead." + ], + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "destinationCaller", + "docs": [ + "Expected caller on target network.", + "", + "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", + "weird because this address is one for another network. We are making it a 32-byte fixed", + "array instead." + ], + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + }, + { + "name": "RemoteTokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + } + ], + "errors": [ + { + "code": 6002, + "name": "CannotParseMessage", + "msg": "CannotParseMessage" + }, + { + "code": 6003, + "name": "InvalidGovernanceEmitter", + "msg": "InvalidGovernanceEmitter" + }, + { + "code": 6004, + "name": "InvalidGovernanceVaa", + "msg": "InvalidGovernanceVaa" + }, + { + "code": 6005, + "name": "InvalidGovernanceAction", + "msg": "InvalidGovernanceAction" + }, + { + "code": 6006, + "name": "InvalidWormholeFinality", + "msg": "InvalidWormholeFinality" + }, + { + "code": 6007, + "name": "GovernanceForAnotherChain", + "msg": "GovernanceForAnotherChain" + }, + { + "code": 6008, + "name": "ImplementationMismatch", + "msg": "ImplementationMismatch" + }, + { + "code": 6009, + "name": "InvalidForeignChain", + "msg": "InvalidForeignChain" + }, + { + "code": 6010, + "name": "InvalidForeignEmitter", + "msg": "InvalidForeignEmitter" + }, + { + "code": 6011, + "name": "InvalidCctpDomain", + "msg": "InvalidCctpDomain" + }, + { + "code": 6012, + "name": "InvalidProgramSender", + "msg": "InvalidProgramSender" + }, + { + "code": 6013, + "name": "ZeroAmount", + "msg": "ZeroAmount" + }, + { + "code": 6014, + "name": "InvalidMintRecipient", + "msg": "InvalidMintRecipient" + }, + { + "code": 6015, + "name": "ExecutableDisallowed", + "msg": "ExecutableDisallowed" + }, + { + "code": 6016, + "name": "InvalidEmitter", + "msg": "InvalidEmitter" + }, + { + "code": 6017, + "name": "InvalidWormholeCctpMessage", + "msg": "InvalidWormholeCctpMessage" + }, + { + "code": 6018, + "name": "InvalidRegisteredEmitterCctpDomain", + "msg": "InvalidRegisteredEmitterCctpDomain" + }, + { + "code": 6019, + "name": "TargetDomainNotSolana", + "msg": "TargetDomainNotSolana" + }, + { + "code": 6020, + "name": "SourceCctpDomainMismatch", + "msg": "SourceCctpDomainMismatch" + }, + { + "code": 6021, + "name": "TargetCctpDomainMismatch", + "msg": "TargetCctpDomainMismatch" + }, + { + "code": 6022, + "name": "CctpNonceMismatch", + "msg": "CctpNonceMismatch" + }, + { + "code": 6023, + "name": "InvalidCctpMessage", + "msg": "InvalidCctpMessage" + }, + { + "code": 6024, + "name": "RedeemerTokenMismatch", + "msg": "RedeemerTokenMismatch" + } + ], + "metadata": { + "address": "Wormho1eCirc1e1ntegration111111111111111111" + } +} \ No newline at end of file diff --git a/solana/ts/src/wormholeCctp/index.ts b/solana/ts/src/wormholeCctp/index.ts new file mode 100644 index 00000000..b3f2a713 --- /dev/null +++ b/solana/ts/src/wormholeCctp/index.ts @@ -0,0 +1,700 @@ +export * from "./circle"; +export * from "./consts"; +export * from "./messages"; +export * from "./state"; +export * from "./wormhole"; + +import { BN, EventParser, Program, utils as anchorUtils } from "@coral-xyz/anchor"; +import * as splToken from "@solana/spl-token"; +import { + AddressLookupTableAccount, + Connection, + PublicKey, + SYSVAR_CLOCK_PUBKEY, + SYSVAR_RENT_PUBKEY, + SystemProgram, + TransactionInstruction, + VersionedTransactionResponse, +} from "@solana/web3.js"; +import { + CctpMessage, + CctpTokenBurnMessage, + MessageTransmitterProgram, + TokenMessengerMinterProgram, +} from "./circle"; +import { BPF_LOADER_UPGRADEABLE_ID } from "./consts"; +import WormholeCctpSolanaIdl from "./idl/wormhole_cctp_solana.json"; +import { DepositWithPayload } from "./messages"; +import { Custodian, RegisteredEmitter } from "./state"; +import { WormholeCctpSolana } from "./types/wormhole_cctp_solana"; +import { Claim, VaaAccount } from "./wormhole"; + +export const PROGRAM_IDS = [ + "Wormho1eCirc1e1ntegration111111111111111111", // mainnet placeholder + "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", // testnet +] as const; + +export type ProgramId = (typeof PROGRAM_IDS)[number]; + +export type TransferTokensWithPayloadArgs = { + amount: bigint; + targetChain: number; + mintRecipient: Array; + nonce: number; + payload: Buffer; +}; + +export type PublishMessageAccounts = { + coreBridgeConfig: PublicKey; + coreEmitterSequence: PublicKey; + coreFeeCollector: PublicKey; + coreBridgeProgram: PublicKey; +}; + +export type WormholeCctpCommonAccounts = PublishMessageAccounts & { + wormholeCctpProgram: PublicKey; + systemProgram: PublicKey; + rent: PublicKey; + custodian: PublicKey; + custodyToken: PublicKey; + tokenMessenger: PublicKey; + tokenMinter: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; + mint?: PublicKey; + localToken?: PublicKey; + tokenMessengerMinterCustodyToken?: PublicKey; +}; + +export type TransferTokensWithPayloadAccounts = PublishMessageAccounts & { + custodian: PublicKey; + custodyToken: PublicKey; + registeredEmitter: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + coreBridgeProgram: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; +}; + +export type RedeemTokensWithPayloadAccounts = { + custodian: PublicKey; + claim: PublicKey; + redeemer: PublicKey; + redeemerToken: PublicKey; + registeredEmitter: PublicKey; + messageTransmitterAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + usedNonces: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + tokenPair: PublicKey; + tokenMessengerMinterCustodyToken: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; +}; + +export type SolanaWormholeCctpTxData = { + coreMessageAccount: PublicKey; + coreMessageSequence: bigint; + encodedCctpMessage: Buffer; +}; + +export class WormholeCctpProgram { + private _programId: ProgramId; + + program: Program; + + constructor(connection: Connection, programId?: ProgramId) { + this._programId = programId ?? testnet(); + this.program = new Program(WormholeCctpSolanaIdl as any, new PublicKey(this._programId), { + connection, + }); + } + + get ID(): PublicKey { + return this.program.programId; + } + + upgradeAuthorityAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("upgrade")], this.ID)[0]; + } + + programDataAddress(): PublicKey { + return PublicKey.findProgramAddressSync([this.ID.toBuffer()], BPF_LOADER_UPGRADEABLE_ID)[0]; + } + + custodianAddress(): PublicKey { + return Custodian.address(this.ID); + } + + async fetchCustodian(addr: PublicKey): Promise { + const { bump, upgradeAuthorityBump } = await this.program.account.custodian.fetch(addr); + return new Custodian(bump, upgradeAuthorityBump); + } + + registeredEmitterAddress(chain: number): PublicKey { + return RegisteredEmitter.address(this.ID, chain); + } + + async fetchRegisteredEmitter(addr: PublicKey): Promise { + const { + bump, + chain: registeredChain, + cctpDomain, + address, + } = await this.program.account.registeredEmitter.fetch(addr); + return new RegisteredEmitter(bump, cctpDomain, registeredChain, address); + } + + custodyTokenAccountAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; + } + + commonAccounts(mint?: PublicKey): WormholeCctpCommonAccounts { + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + + const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); + const messageTransmitterProgram = this.messageTransmitterProgram(); + + const [localToken, tokenMessengerMinterCustodyToken] = (() => { + if (mint === undefined) { + return [undefined]; + } else { + return [ + tokenMessengerMinterProgram.localTokenAddress(mint), + tokenMessengerMinterProgram.custodyTokenAddress(mint), + ]; + } + })(); + + return { + wormholeCctpProgram: this.ID, + systemProgram: SystemProgram.programId, + rent: SYSVAR_RENT_PUBKEY, + custodian, + custodyToken: this.custodyTokenAccountAddress(), + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), + tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), + tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), + tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, + messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), + messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + mint, + localToken, + tokenMessengerMinterCustodyToken, + }; + } + + async initializeIx(deployer: PublicKey): Promise { + return this.program.methods + .initialize() + .accounts({ + deployer, + custodian: this.custodianAddress(), + upgradeAuthority: this.upgradeAuthorityAddress(), + programData: this.programDataAddress(), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_ID, + }) + .instruction(); + } + + async registerEmitterAndDomainIx(accounts: { + payer: PublicKey; + vaa: PublicKey; + remoteTokenMessenger?: PublicKey; + }): Promise { + const { payer, vaa, remoteTokenMessenger: inputRemoteTokenMessenger } = accounts; + + const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); + + // Determine claim PDA. + const { chain, address, sequence } = vaaAcct.emitterInfo(); + const claim = Claim.address(this.ID, address, chain, sequence); + + const payload = vaaAcct.payload(); + const registeredEmitter = this.registeredEmitterAddress(payload.readUInt16BE(35)); + const remoteTokenMessenger = (() => { + if (payload.length >= 73) { + const cctpDomain = payload.readUInt32BE(69); + return this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); + } else if (inputRemoteTokenMessenger !== undefined) { + return inputRemoteTokenMessenger; + } else { + throw new Error("remoteTokenMessenger must be provided"); + } + })(); + + return this.program.methods + .registerEmitterAndDomain() + .accounts({ + payer, + custodian: this.custodianAddress(), + vaa, + claim, + registeredEmitter, + remoteTokenMessenger, + }) + .instruction(); + } + + async upgradeContractIx(accounts: { + payer: PublicKey; + vaa: PublicKey; + buffer?: PublicKey; + }): Promise { + const { payer, vaa, buffer: inputBuffer } = accounts; + + const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); + + // Determine claim PDA. + const { chain, address, sequence } = vaaAcct.emitterInfo(); + const claim = Claim.address(this.ID, address, chain, sequence); + + const payload = vaaAcct.payload(); + + return this.program.methods + .upgradeContract() + .accounts({ + payer, + custodian: this.custodianAddress(), + vaa, + claim, + upgradeAuthority: this.upgradeAuthorityAddress(), + spill: payer, + buffer: inputBuffer ?? new PublicKey(payload.subarray(-32)), + programData: this.programDataAddress(), + thisProgram: this.ID, + rent: SYSVAR_RENT_PUBKEY, + clock: SYSVAR_CLOCK_PUBKEY, + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_ID, + }) + .instruction(); + } + + async transferTokensWithPayloadAccounts( + mint: PublicKey, + targetChain: number + ): Promise { + const registeredEmitter = this.registeredEmitterAddress(targetChain); + const remoteDomain = await this.fetchRegisteredEmitter(registeredEmitter).then( + (acct) => acct.cctpDomain + ); + + const { + senderAuthority: tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + messageTransmitterProgram, + tokenMessengerMinterProgram, + tokenProgram, + } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); + + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + + return { + custodian, + custodyToken: this.custodyTokenAccountAddress(), + registeredEmitter, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }; + } + + async transferTokensWithPayloadIx( + accounts: { + payer: PublicKey; + sender: PublicKey; + mint: PublicKey; + srcToken: PublicKey; + coreMessage: PublicKey; + }, + args: TransferTokensWithPayloadArgs + ): Promise { + let { payer, sender, mint, srcToken, coreMessage } = accounts; + + const { amount, targetChain, mintRecipient, nonce, payload } = args; + + const { + custodian, + custodyToken, + registeredEmitter, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + } = await this.transferTokensWithPayloadAccounts(mint, targetChain); + + return this.program.methods + .transferTokensWithPayload({ + amount: new BN(amount.toString()), + mintRecipient, + nonce, + payload, + }) + .accounts({ + payer, + custodian, + sender, + mint, + srcToken, + custodyToken, + registeredEmitter, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }) + .instruction(); + } + + async redeemTokensWithPayloadAccounts( + vaa: PublicKey, + circleMessage: CctpTokenBurnMessage | Buffer + ): Promise { + const msg = CctpTokenBurnMessage.from(circleMessage); + const redeemerToken = new PublicKey(msg.mintRecipient); + const [mint, redeemer] = await splToken + .getAccount(this.program.provider.connection, redeemerToken) + .then((token) => [token.mint, token.owner]); + + // Determine claim PDA. + const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); + const { chain, address, sequence } = vaaAcct.emitterInfo(); + const claim = Claim.address(this.ID, address, chain, sequence); + + const messageTransmitterProgram = this.messageTransmitterProgram(); + const { + authority: messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessengerMinterProgram, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + custodyToken: tokenMessengerMinterCustodyToken, + tokenProgram, + } = messageTransmitterProgram.receiveMessageAccounts(mint, msg); + + return { + custodian: this.custodianAddress(), + claim, + redeemer, + redeemerToken, + registeredEmitter: this.registeredEmitterAddress(chain), + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenProgram, + }; + } + + async redeemTokensWithPayloadIx( + accounts: { + payer: PublicKey; + vaa: PublicKey; + }, + args: { + encodedCctpMessage: Buffer; + cctpAttestation: Buffer; + } + ): Promise { + const { payer, vaa } = accounts; + + const { encodedCctpMessage } = args; + + const { + custodian, + claim, + redeemer, + redeemerToken, + registeredEmitter, + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + } = await this.redeemTokensWithPayloadAccounts(vaa, encodedCctpMessage); + + return this.program.methods + .redeemTokensWithPayload(args) + .accounts({ + payer, + custodian, + vaa, + claim, + redeemer, + redeemerToken, + registeredEmitter, + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }) + .instruction(); + } + + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { + switch (this._programId) { + case testnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + case mainnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + messageTransmitterProgram(): MessageTransmitterProgram { + switch (this._programId) { + case testnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + case mainnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { + const coreBridgeProgram = this.coreBridgeProgramId(); + + return { + coreBridgeConfig: PublicKey.findProgramAddressSync( + [Buffer.from("Bridge")], + coreBridgeProgram + )[0], + coreEmitterSequence: PublicKey.findProgramAddressSync( + [Buffer.from("Sequence"), emitter.toBuffer()], + coreBridgeProgram + )[0], + coreFeeCollector: PublicKey.findProgramAddressSync( + [Buffer.from("fee_collector")], + coreBridgeProgram + )[0], + coreBridgeProgram, + }; + } + + coreBridgeProgramId(): PublicKey { + switch (this._programId) { + case testnet(): { + return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); + } + case mainnet(): { + return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); + } + default: { + throw new Error("unsupported network"); + } + } + } + + async parseTransactionReceipt( + txReceipt: VersionedTransactionResponse, + addressLookupTableAccounts?: AddressLookupTableAccount[] + ): Promise { + if (txReceipt.meta === null) { + throw new Error("meta not found in tx"); + } + + const txMeta = txReceipt.meta; + if (txMeta.logMessages === undefined || txMeta.logMessages === null) { + throw new Error("logMessages not found in tx"); + } + + const txLogMessages = txMeta.logMessages; + + // Decode message field from MessageSent event. + const messageTransmitterProgram = this.messageTransmitterProgram(); + const parser = new EventParser( + messageTransmitterProgram.ID, + messageTransmitterProgram.program.coder + ); + + // Map these puppies based on nonce. + const encodedCctpMessages = new Map(); + for (const parsed of parser.parseLogs(txLogMessages, false)) { + const msg = parsed.data.message as Buffer; + encodedCctpMessages.set(CctpMessage.decode(msg).cctp.nonce, msg); + } + + const fetchedKeys = txReceipt.transaction.message.getAccountKeys({ + addressLookupTableAccounts, + }); + const accountKeys = fetchedKeys.staticAccountKeys; + if (fetchedKeys.accountKeysFromLookups !== undefined) { + accountKeys.push( + ...fetchedKeys.accountKeysFromLookups.writable, + ...fetchedKeys.accountKeysFromLookups.readonly + ); + } + + const coreBridgeProgramIndex = accountKeys.findIndex((key) => + key.equals(this.coreBridgeProgramId()) + ); + const tokenMessengerMinterProgramIndex = accountKeys.findIndex((key) => + key.equals(this.tokenMessengerMinterProgram().ID) + ); + const messageTransmitterProgramIndex = accountKeys.findIndex((key) => + key.equals(this.messageTransmitterProgram().ID) + ); + if ( + coreBridgeProgramIndex == -1 && + tokenMessengerMinterProgramIndex == -1 && + messageTransmitterProgramIndex == -1 + ) { + return []; + } + + if (txMeta.innerInstructions === undefined || txMeta.innerInstructions === null) { + throw new Error("innerInstructions not found in tx"); + } + const txInnerInstructions = txMeta.innerInstructions; + + const custodian = this.custodianAddress(); + const postedMessageKeys: PublicKey[] = []; + for (const innerIx of txInnerInstructions) { + // Traverse instructions to find messages posted by the Wormhole CCTP program. + for (const ixInfo of innerIx.instructions) { + if ( + ixInfo.programIdIndex == coreBridgeProgramIndex && + anchorUtils.bytes.bs58.decode(ixInfo.data)[0] == 1 && + accountKeys[ixInfo.accounts[2]].equals(custodian) + ) { + postedMessageKeys.push(accountKeys[ixInfo.accounts[1]]); + } + } + } + + return this.program.provider.connection + .getMultipleAccountsInfo(postedMessageKeys) + .then((infos) => + infos.map((info, i) => { + if (info === null) { + throw new Error("message info is null"); + } + const payload = info.data.subarray(95); + const nonce = DepositWithPayload.decode(payload).deposit.cctpNonce; + const encodedCctpMessage = encodedCctpMessages.get(nonce); + if (encodedCctpMessage === undefined) { + throw new Error( + `cannot find CCTP message with nonce ${nonce} in tx receipt` + ); + } + + return { + coreMessageAccount: postedMessageKeys[i], + coreMessageSequence: info.data.readBigUInt64LE(49), + encodedCctpMessage, + }; + }) + ); + } +} + +export function mainnet(): ProgramId { + return "Wormho1eCirc1e1ntegration111111111111111111"; +} + +export function testnet(): ProgramId { + return "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW"; +} diff --git a/solana/ts/src/wormholeCctp/messages.ts b/solana/ts/src/wormholeCctp/messages.ts new file mode 100644 index 00000000..f012df96 --- /dev/null +++ b/solana/ts/src/wormholeCctp/messages.ts @@ -0,0 +1,89 @@ +import { ethers } from "ethers"; + +export type Deposit = { + tokenAddress: Array; + amount: bigint; + sourceCctpDomain: number; + targetCctpDomain: number; + cctpNonce: bigint; + sender: Array; + mintRecipient: Array; + payloadLen: number; +}; + +export class DepositWithPayload { + deposit: Deposit; + payload: Buffer; + + constructor(deposit: Deposit, payload: Buffer) { + this.deposit = deposit; + this.payload = payload; + } + + static decode(buf: Buffer): DepositWithPayload { + if (buf.readUInt8(0) != 1) { + throw new Error("Invalid Wormhole CCTP deposit message"); + } + buf = buf.subarray(1); + + const tokenAddress = Array.from(buf.subarray(0, 32)); + const amount = BigInt(ethers.BigNumber.from(buf.subarray(32, 64)).toString()); + const sourceCctpDomain = buf.readUInt32BE(64); + const targetCctpDomain = buf.readUInt32BE(68); + const cctpNonce = buf.readBigUint64BE(72); + const sender = Array.from(buf.subarray(80, 112)); + const mintRecipient = Array.from(buf.subarray(112, 144)); + const payloadLen = buf.readUInt16BE(144); + const payload = buf.subarray(146, 146 + payloadLen); + + return new DepositWithPayload( + { + tokenAddress, + amount, + sourceCctpDomain, + targetCctpDomain, + cctpNonce, + sender, + mintRecipient, + payloadLen, + }, + payload + ); + } + + encode(): Buffer { + const buf = Buffer.alloc(146); + + const { deposit, payload } = this; + const { + tokenAddress, + amount, + sourceCctpDomain, + targetCctpDomain, + cctpNonce, + sender, + mintRecipient, + payloadLen, + } = deposit; + + let offset = 0; + buf.set(tokenAddress, offset); + offset += 32; + + // Special handling w/ uint256. This value will most likely encoded in < 32 bytes, so we + // jump ahead by 32 and subtract the length of the encoded value. + const encodedAmount = ethers.utils.arrayify(ethers.BigNumber.from(amount.toString())); + buf.set(encodedAmount, (offset += 32) - encodedAmount.length); + + offset = buf.writeUInt32BE(sourceCctpDomain, offset); + offset = buf.writeUInt32BE(targetCctpDomain, offset); + offset = buf.writeBigUInt64BE(cctpNonce, offset); + buf.set(sender, offset); + offset += 32; + buf.set(mintRecipient, offset); + offset += 32; + offset = buf.writeUInt16BE(payloadLen, offset); + + return Buffer.concat([Buffer.alloc(1, 1), buf, payload]); + } +} diff --git a/solana/ts/src/wormholeCctp/state/Custodian.ts b/solana/ts/src/wormholeCctp/state/Custodian.ts new file mode 100644 index 00000000..87978732 --- /dev/null +++ b/solana/ts/src/wormholeCctp/state/Custodian.ts @@ -0,0 +1,15 @@ +import { PublicKey } from "@solana/web3.js"; + +export class Custodian { + bump: number; + upgradeAuthorityBump: number; + + constructor(bump: number, upgradeAuthorityBump: number) { + this.bump = bump; + this.upgradeAuthorityBump = upgradeAuthorityBump; + } + + static address(programId: PublicKey): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("emitter")], programId)[0]; + } +} diff --git a/solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts b/solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts new file mode 100644 index 00000000..ff26a470 --- /dev/null +++ b/solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts @@ -0,0 +1,24 @@ +import { PublicKey } from "@solana/web3.js"; + +export class RegisteredEmitter { + bump: number; + cctpDomain: number; + chain: number; + address: Array; + + constructor(bump: number, cctpDomain: number, chain: number, address: Array) { + this.bump = bump; + this.cctpDomain = cctpDomain; + this.chain = chain; + this.address = address; + } + + static address(programId: PublicKey, chain: number): PublicKey { + const encodedChain = Buffer.alloc(2); + encodedChain.writeUInt16BE(chain, 0); + return PublicKey.findProgramAddressSync( + [Buffer.from("registered_emitter"), encodedChain], + programId, + )[0]; + } +} diff --git a/solana/ts/src/wormholeCctp/state/index.ts b/solana/ts/src/wormholeCctp/state/index.ts new file mode 100644 index 00000000..ee7ed898 --- /dev/null +++ b/solana/ts/src/wormholeCctp/state/index.ts @@ -0,0 +1,2 @@ +export * from "./Custodian"; +export * from "./RegisteredEmitter"; diff --git a/solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts b/solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts new file mode 100644 index 00000000..2ef6dd8b --- /dev/null +++ b/solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts @@ -0,0 +1,1827 @@ +export type WormholeCctpSolana = { + "version": "0.0.0-alpha.8", + "name": "wormhole_cctp_solana", + "constants": [ + { + "name": "UPGRADE_SEED_PREFIX", + "type": "bytes", + "value": "[117, 112, 103, 114, 97, 100, 101]" + }, + { + "name": "CUSTODY_TOKEN_SEED_PREFIX", + "type": "bytes", + "value": "[99, 117, 115, 116, 111, 100, 121]" + } + ], + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "deployer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "upgrade this program's executable. We verify this PDA address here out of convenience to get", + "the PDA bump seed to invoke the upgrade." + ] + }, + { + "name": "programData", + "isMut": true, + "isSigner": false + }, + { + "name": "bpfLoaderUpgradeableProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "BPF Loader Upgradeable program.", + "", + "program." + ] + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + }, + { + "name": "transferTokensWithPayload", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true, + "docs": [ + "Owner of the token account, which will have its funds burned by Circle's Token Messenger", + "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", + "message CPI call." + ] + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false, + "docs": [ + "This program's Wormhole (Core Bridge) emitter authority.", + "" + ] + }, + { + "name": "sender", + "isMut": false, + "isSigner": true, + "docs": [ + "Signer acting as the authority to invoke this instruction. This pubkey address will be", + "encoded as the sender address.", + "", + "NOTE: Unlike Token Bridge, the sender address cannot be a program ID (where this could have", + "acted as a program's authority to send tokens). We implemented it this way because we want", + "to keep the same authority for both burning and minting. For programs, this poses a problem", + "because the program itself cannot be the owner of a token account; its PDA acts as the", + "owner. And because the mint recipient (in our case the mint redeemer) must be the owner of", + "the token account when these tokens are minted, we cannot use a program ID as this", + "authority." + ] + }, + { + "name": "mint", + "isMut": true, + "isSigner": false, + "docs": [ + "Payer Token Account's mint. This mint should be the same one as the one encoded in the", + "source (payer) token account.", + "", + "Messenger Minter program's job to validate this mint. But we will check that this mint", + "address matches the one encoded in the local token account." + ] + }, + { + "name": "srcToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Account. Circle's Token Messenger Minter will burn the configured amount from", + "this account.", + "", + "NOTE: This account will be managed by the sender authority. It is required that the token", + "account owner delegate authority to the sender authority prior to executing this", + "instruction." + ] + }, + { + "name": "custodyToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole CCTP custody token account. This account will be closed at the end of this", + "instruction. It just acts as a conduit to allow this program to be the transfer initiator in", + "the Circle message." + ] + }, + { + "name": "registeredEmitter", + "isMut": false, + "isSigner": false, + "docs": [ + "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", + "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", + "seeds::program = Wormhole CCTP program." + ] + }, + { + "name": "coreBridgeConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge config. Seeds = \\[\"Bridge\"\\], seeds::program = Core Bridge program.", + "", + "instruction handler." + ] + }, + { + "name": "coreMessage", + "isMut": true, + "isSigner": true + }, + { + "name": "coreEmitterSequence", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge emitter sequence. Seeds = \\[\"Sequence\"\\], seeds::program =Core Bridge", + "program.", + "", + "instruction handler." + ] + }, + { + "name": "coreFeeCollector", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge fee collector. Seeds = \\[\"fee_collector\"\\], seeds::program =", + "core_bridge_program. This account should be passed in as Some(fee_collector) if there is a", + "message fee.", + "", + "instruction handler." + ] + }, + { + "name": "tokenMessengerMinterSenderAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's sender authority. Seeds = \\[\"sender_authority\"\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "messageTransmitterConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", + "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", + "", + "Messenger Minter program burns the tokens. See the account loader in the instruction", + "handler." + ] + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Remote Token Messenger account. Seeds =", + "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "coreBridgeProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "clock", + "isMut": false, + "isSigner": false + }, + { + "name": "rent", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "TransferTokensWithPayloadArgs" + } + } + ] + }, + { + "name": "redeemTokensWithPayload", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true, + "docs": [ + "Owner of the token account, which will have its funds burned by Circle's Token Messenger", + "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", + "message CPI call." + ] + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false, + "docs": [ + "This program's Wormhole (Core Bridge) emitter authority.", + "" + ] + }, + { + "name": "vaa", + "isMut": false, + "isSigner": false + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge::claim_vaa) is called." + ] + }, + { + "name": "redeemer", + "isMut": false, + "isSigner": true, + "docs": [ + "Redeemer, who owns the token account that will receive the minted tokens.", + "", + "program requires that this recipient be a signer so an integrator has control over when he", + "receives his tokens." + ] + }, + { + "name": "redeemerToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Account. Circle's Token Messenger Minter will burn the configured amount from", + "this account.", + "", + "NOTE: This account is the encoded mint recipient in the Circle message. This program", + "adds a constraint that the redeemer must own this account." + ] + }, + { + "name": "registeredEmitter", + "isMut": false, + "isSigner": false, + "docs": [ + "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", + "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", + "seeds::program = Wormhole CCTP program." + ] + }, + { + "name": "messageTransmitterAuthority", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", + "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", + "", + "Messenger Minter program burns the tokens. See the account loader in the instruction", + "handler." + ] + }, + { + "name": "usedNonces", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Remote Token Messenger account. Seeds =", + "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", + "seeds::program = token_messenger_minter_program.", + "", + "The Token Messenger Minter program needs this account. We do not perform any checks", + "in this instruction handler." + ] + }, + { + "name": "tokenPair", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterCustodyToken", + "isMut": true, + "isSigner": false, + "docs": [ + "recipients. This account is topped off by \"pre-minters\"." + ] + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "RedeemTokensWithPayloadArgs" + } + } + ] + }, + { + "name": "registerEmitterAndDomain", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + }, + { + "name": "vaa", + "isMut": true, + "isSigner": false + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge::claim_vaa) is called." + ] + }, + { + "name": "registeredEmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + }, + { + "name": "upgradeContract", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + }, + { + "name": "vaa", + "isMut": false, + "isSigner": false, + "docs": [ + "instruction handler, which also checks this account discriminator (so there is no need to", + "check PDA seeds here)." + ] + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge_sdk::cpi::claim_vaa) is called." + ] + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "upgrade this program's executable. We verify this PDA address here out of convenience to get", + "the PDA bump seed to invoke the upgrade." + ] + }, + { + "name": "spill", + "isMut": true, + "isSigner": false + }, + { + "name": "buffer", + "isMut": true, + "isSigner": false, + "docs": [ + "against the one encoded in the governance VAA." + ] + }, + { + "name": "programData", + "isMut": true, + "isSigner": false + }, + { + "name": "thisProgram", + "isMut": true, + "isSigner": false + }, + { + "name": "rent", + "isMut": false, + "isSigner": false + }, + { + "name": "clock", + "isMut": false, + "isSigner": false + }, + { + "name": "bpfLoaderUpgradeableProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + } + ], + "accounts": [ + { + "name": "custodian", + "docs": [ + "Emitter config account. This account is used to perform the following:", + "1. It is the emitter authority for the Core Bridge program.", + "2. It acts as the custody token account owner for token transfers." + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "bump", + "type": "u8" + }, + { + "name": "upgradeAuthorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "registeredEmitter", + "type": { + "kind": "struct", + "fields": [ + { + "name": "bump", + "type": "u8" + }, + { + "name": "cctpDomain", + "type": "u32" + }, + { + "name": "chain", + "type": "u16" + }, + { + "name": "address", + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + } + ], + "types": [ + { + "name": "RedeemTokensWithPayloadArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "encodedCctpMessage", + "type": "bytes" + }, + { + "name": "cctpAttestation", + "type": "bytes" + } + ] + } + }, + { + "name": "TransferTokensWithPayloadArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "mintRecipient", + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "nonce", + "type": "u32" + }, + { + "name": "payload", + "type": "bytes" + } + ] + } + }, + { + "name": "ReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "message", + "type": "bytes" + }, + { + "name": "attestation", + "type": "bytes" + } + ] + } + }, + { + "name": "DepositForBurnWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "docs": [ + "Transfer amount." + ], + "type": "u64" + }, + { + "name": "destinationDomain", + "docs": [ + "Circle domain value of the token to be transferred." + ], + "type": "u32" + }, + { + "name": "mintRecipient", + "docs": [ + "Recipient of assets on target network.", + "", + "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", + "weird because this address is one for another network. We are making it a 32-byte fixed", + "array instead." + ], + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "destinationCaller", + "docs": [ + "Expected caller on target network.", + "", + "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", + "weird because this address is one for another network. We are making it a 32-byte fixed", + "array instead." + ], + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + }, + { + "name": "RemoteTokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + } + ], + "errors": [ + { + "code": 6002, + "name": "CannotParseMessage", + "msg": "CannotParseMessage" + }, + { + "code": 6003, + "name": "InvalidGovernanceEmitter", + "msg": "InvalidGovernanceEmitter" + }, + { + "code": 6004, + "name": "InvalidGovernanceVaa", + "msg": "InvalidGovernanceVaa" + }, + { + "code": 6005, + "name": "InvalidGovernanceAction", + "msg": "InvalidGovernanceAction" + }, + { + "code": 6006, + "name": "InvalidWormholeFinality", + "msg": "InvalidWormholeFinality" + }, + { + "code": 6007, + "name": "GovernanceForAnotherChain", + "msg": "GovernanceForAnotherChain" + }, + { + "code": 6008, + "name": "ImplementationMismatch", + "msg": "ImplementationMismatch" + }, + { + "code": 6009, + "name": "InvalidForeignChain", + "msg": "InvalidForeignChain" + }, + { + "code": 6010, + "name": "InvalidForeignEmitter", + "msg": "InvalidForeignEmitter" + }, + { + "code": 6011, + "name": "InvalidCctpDomain", + "msg": "InvalidCctpDomain" + }, + { + "code": 6012, + "name": "InvalidProgramSender", + "msg": "InvalidProgramSender" + }, + { + "code": 6013, + "name": "ZeroAmount", + "msg": "ZeroAmount" + }, + { + "code": 6014, + "name": "InvalidMintRecipient", + "msg": "InvalidMintRecipient" + }, + { + "code": 6015, + "name": "ExecutableDisallowed", + "msg": "ExecutableDisallowed" + }, + { + "code": 6016, + "name": "InvalidEmitter", + "msg": "InvalidEmitter" + }, + { + "code": 6017, + "name": "InvalidWormholeCctpMessage", + "msg": "InvalidWormholeCctpMessage" + }, + { + "code": 6018, + "name": "InvalidRegisteredEmitterCctpDomain", + "msg": "InvalidRegisteredEmitterCctpDomain" + }, + { + "code": 6019, + "name": "TargetDomainNotSolana", + "msg": "TargetDomainNotSolana" + }, + { + "code": 6020, + "name": "SourceCctpDomainMismatch", + "msg": "SourceCctpDomainMismatch" + }, + { + "code": 6021, + "name": "TargetCctpDomainMismatch", + "msg": "TargetCctpDomainMismatch" + }, + { + "code": 6022, + "name": "CctpNonceMismatch", + "msg": "CctpNonceMismatch" + }, + { + "code": 6023, + "name": "InvalidCctpMessage", + "msg": "InvalidCctpMessage" + }, + { + "code": 6024, + "name": "RedeemerTokenMismatch", + "msg": "RedeemerTokenMismatch" + } + ] +}; + +export const IDL: WormholeCctpSolana = { + "version": "0.0.0-alpha.8", + "name": "wormhole_cctp_solana", + "constants": [ + { + "name": "UPGRADE_SEED_PREFIX", + "type": "bytes", + "value": "[117, 112, 103, 114, 97, 100, 101]" + }, + { + "name": "CUSTODY_TOKEN_SEED_PREFIX", + "type": "bytes", + "value": "[99, 117, 115, 116, 111, 100, 121]" + } + ], + "instructions": [ + { + "name": "initialize", + "accounts": [ + { + "name": "deployer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "upgrade this program's executable. We verify this PDA address here out of convenience to get", + "the PDA bump seed to invoke the upgrade." + ] + }, + { + "name": "programData", + "isMut": true, + "isSigner": false + }, + { + "name": "bpfLoaderUpgradeableProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "BPF Loader Upgradeable program.", + "", + "program." + ] + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + }, + { + "name": "transferTokensWithPayload", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true, + "docs": [ + "Owner of the token account, which will have its funds burned by Circle's Token Messenger", + "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", + "message CPI call." + ] + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false, + "docs": [ + "This program's Wormhole (Core Bridge) emitter authority.", + "" + ] + }, + { + "name": "sender", + "isMut": false, + "isSigner": true, + "docs": [ + "Signer acting as the authority to invoke this instruction. This pubkey address will be", + "encoded as the sender address.", + "", + "NOTE: Unlike Token Bridge, the sender address cannot be a program ID (where this could have", + "acted as a program's authority to send tokens). We implemented it this way because we want", + "to keep the same authority for both burning and minting. For programs, this poses a problem", + "because the program itself cannot be the owner of a token account; its PDA acts as the", + "owner. And because the mint recipient (in our case the mint redeemer) must be the owner of", + "the token account when these tokens are minted, we cannot use a program ID as this", + "authority." + ] + }, + { + "name": "mint", + "isMut": true, + "isSigner": false, + "docs": [ + "Payer Token Account's mint. This mint should be the same one as the one encoded in the", + "source (payer) token account.", + "", + "Messenger Minter program's job to validate this mint. But we will check that this mint", + "address matches the one encoded in the local token account." + ] + }, + { + "name": "srcToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Account. Circle's Token Messenger Minter will burn the configured amount from", + "this account.", + "", + "NOTE: This account will be managed by the sender authority. It is required that the token", + "account owner delegate authority to the sender authority prior to executing this", + "instruction." + ] + }, + { + "name": "custodyToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole CCTP custody token account. This account will be closed at the end of this", + "instruction. It just acts as a conduit to allow this program to be the transfer initiator in", + "the Circle message." + ] + }, + { + "name": "registeredEmitter", + "isMut": false, + "isSigner": false, + "docs": [ + "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", + "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", + "seeds::program = Wormhole CCTP program." + ] + }, + { + "name": "coreBridgeConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge config. Seeds = \\[\"Bridge\"\\], seeds::program = Core Bridge program.", + "", + "instruction handler." + ] + }, + { + "name": "coreMessage", + "isMut": true, + "isSigner": true + }, + { + "name": "coreEmitterSequence", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge emitter sequence. Seeds = \\[\"Sequence\"\\], seeds::program =Core Bridge", + "program.", + "", + "instruction handler." + ] + }, + { + "name": "coreFeeCollector", + "isMut": true, + "isSigner": false, + "docs": [ + "Wormhole Core Bridge fee collector. Seeds = \\[\"fee_collector\"\\], seeds::program =", + "core_bridge_program. This account should be passed in as Some(fee_collector) if there is a", + "message fee.", + "", + "instruction handler." + ] + }, + { + "name": "tokenMessengerMinterSenderAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's sender authority. Seeds = \\[\"sender_authority\"\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "messageTransmitterConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", + "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", + "", + "Messenger Minter program burns the tokens. See the account loader in the instruction", + "handler." + ] + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Remote Token Messenger account. Seeds =", + "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "coreBridgeProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "clock", + "isMut": false, + "isSigner": false + }, + { + "name": "rent", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "TransferTokensWithPayloadArgs" + } + } + ] + }, + { + "name": "redeemTokensWithPayload", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true, + "docs": [ + "Owner of the token account, which will have its funds burned by Circle's Token Messenger", + "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", + "message CPI call." + ] + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false, + "docs": [ + "This program's Wormhole (Core Bridge) emitter authority.", + "" + ] + }, + { + "name": "vaa", + "isMut": false, + "isSigner": false + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge::claim_vaa) is called." + ] + }, + { + "name": "redeemer", + "isMut": false, + "isSigner": true, + "docs": [ + "Redeemer, who owns the token account that will receive the minted tokens.", + "", + "program requires that this recipient be a signer so an integrator has control over when he", + "receives his tokens." + ] + }, + { + "name": "redeemerToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Account. Circle's Token Messenger Minter will burn the configured amount from", + "this account.", + "", + "NOTE: This account is the encoded mint recipient in the Circle message. This program", + "adds a constraint that the redeemer must own this account." + ] + }, + { + "name": "registeredEmitter", + "isMut": false, + "isSigner": false, + "docs": [ + "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", + "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", + "seeds::program = Wormhole CCTP program." + ] + }, + { + "name": "messageTransmitterAuthority", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterConfig", + "isMut": true, + "isSigner": false, + "docs": [ + "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", + "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", + "", + "Messenger Minter program burns the tokens. See the account loader in the instruction", + "handler." + ] + }, + { + "name": "usedNonces", + "isMut": true, + "isSigner": false + }, + { + "name": "tokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Remote Token Messenger account. Seeds =", + "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", + "token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "tokenMinter", + "isMut": false, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", + "seeds::program = token_messenger_minter_program.", + "", + "in this instruction handler." + ] + }, + { + "name": "localToken", + "isMut": true, + "isSigner": false, + "docs": [ + "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", + "seeds::program = token_messenger_minter_program.", + "", + "The Token Messenger Minter program needs this account. We do not perform any checks", + "in this instruction handler." + ] + }, + { + "name": "tokenPair", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenMessengerMinterCustodyToken", + "isMut": true, + "isSigner": false, + "docs": [ + "recipients. This account is topped off by \"pre-minters\"." + ] + }, + { + "name": "tokenMessengerMinterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "messageTransmitterProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "RedeemTokensWithPayloadArgs" + } + } + ] + }, + { + "name": "registerEmitterAndDomain", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + }, + { + "name": "vaa", + "isMut": true, + "isSigner": false + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge::claim_vaa) is called." + ] + }, + { + "name": "registeredEmitter", + "isMut": true, + "isSigner": false + }, + { + "name": "remoteTokenMessenger", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + }, + { + "name": "upgradeContract", + "accounts": [ + { + "name": "payer", + "isMut": true, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + }, + { + "name": "vaa", + "isMut": false, + "isSigner": false, + "docs": [ + "instruction handler, which also checks this account discriminator (so there is no need to", + "check PDA seeds here)." + ] + }, + { + "name": "claim", + "isMut": true, + "isSigner": false, + "docs": [ + "[claim_vaa](core_bridge_sdk::cpi::claim_vaa) is called." + ] + }, + { + "name": "upgradeAuthority", + "isMut": false, + "isSigner": false, + "docs": [ + "upgrade this program's executable. We verify this PDA address here out of convenience to get", + "the PDA bump seed to invoke the upgrade." + ] + }, + { + "name": "spill", + "isMut": true, + "isSigner": false + }, + { + "name": "buffer", + "isMut": true, + "isSigner": false, + "docs": [ + "against the one encoded in the governance VAA." + ] + }, + { + "name": "programData", + "isMut": true, + "isSigner": false + }, + { + "name": "thisProgram", + "isMut": true, + "isSigner": false + }, + { + "name": "rent", + "isMut": false, + "isSigner": false + }, + { + "name": "clock", + "isMut": false, + "isSigner": false + }, + { + "name": "bpfLoaderUpgradeableProgram", + "isMut": false, + "isSigner": false + }, + { + "name": "systemProgram", + "isMut": false, + "isSigner": false + } + ], + "args": [] + } + ], + "accounts": [ + { + "name": "custodian", + "docs": [ + "Emitter config account. This account is used to perform the following:", + "1. It is the emitter authority for the Core Bridge program.", + "2. It acts as the custody token account owner for token transfers." + ], + "type": { + "kind": "struct", + "fields": [ + { + "name": "bump", + "type": "u8" + }, + { + "name": "upgradeAuthorityBump", + "type": "u8" + } + ] + } + }, + { + "name": "registeredEmitter", + "type": { + "kind": "struct", + "fields": [ + { + "name": "bump", + "type": "u8" + }, + { + "name": "cctpDomain", + "type": "u32" + }, + { + "name": "chain", + "type": "u16" + }, + { + "name": "address", + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + } + ], + "types": [ + { + "name": "RedeemTokensWithPayloadArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "encodedCctpMessage", + "type": "bytes" + }, + { + "name": "cctpAttestation", + "type": "bytes" + } + ] + } + }, + { + "name": "TransferTokensWithPayloadArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "type": "u64" + }, + { + "name": "mintRecipient", + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "nonce", + "type": "u32" + }, + { + "name": "payload", + "type": "bytes" + } + ] + } + }, + { + "name": "ReceiveMessageParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "message", + "type": "bytes" + }, + { + "name": "attestation", + "type": "bytes" + } + ] + } + }, + { + "name": "DepositForBurnWithCallerParams", + "type": { + "kind": "struct", + "fields": [ + { + "name": "amount", + "docs": [ + "Transfer amount." + ], + "type": "u64" + }, + { + "name": "destinationDomain", + "docs": [ + "Circle domain value of the token to be transferred." + ], + "type": "u32" + }, + { + "name": "mintRecipient", + "docs": [ + "Recipient of assets on target network.", + "", + "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", + "weird because this address is one for another network. We are making it a 32-byte fixed", + "array instead." + ], + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "destinationCaller", + "docs": [ + "Expected caller on target network.", + "", + "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", + "weird because this address is one for another network. We are making it a 32-byte fixed", + "array instead." + ], + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + }, + { + "name": "RemoteTokenMessenger", + "type": { + "kind": "struct", + "fields": [ + { + "name": "domain", + "type": "u32" + }, + { + "name": "tokenMessenger", + "type": { + "array": [ + "u8", + 32 + ] + } + } + ] + } + } + ], + "errors": [ + { + "code": 6002, + "name": "CannotParseMessage", + "msg": "CannotParseMessage" + }, + { + "code": 6003, + "name": "InvalidGovernanceEmitter", + "msg": "InvalidGovernanceEmitter" + }, + { + "code": 6004, + "name": "InvalidGovernanceVaa", + "msg": "InvalidGovernanceVaa" + }, + { + "code": 6005, + "name": "InvalidGovernanceAction", + "msg": "InvalidGovernanceAction" + }, + { + "code": 6006, + "name": "InvalidWormholeFinality", + "msg": "InvalidWormholeFinality" + }, + { + "code": 6007, + "name": "GovernanceForAnotherChain", + "msg": "GovernanceForAnotherChain" + }, + { + "code": 6008, + "name": "ImplementationMismatch", + "msg": "ImplementationMismatch" + }, + { + "code": 6009, + "name": "InvalidForeignChain", + "msg": "InvalidForeignChain" + }, + { + "code": 6010, + "name": "InvalidForeignEmitter", + "msg": "InvalidForeignEmitter" + }, + { + "code": 6011, + "name": "InvalidCctpDomain", + "msg": "InvalidCctpDomain" + }, + { + "code": 6012, + "name": "InvalidProgramSender", + "msg": "InvalidProgramSender" + }, + { + "code": 6013, + "name": "ZeroAmount", + "msg": "ZeroAmount" + }, + { + "code": 6014, + "name": "InvalidMintRecipient", + "msg": "InvalidMintRecipient" + }, + { + "code": 6015, + "name": "ExecutableDisallowed", + "msg": "ExecutableDisallowed" + }, + { + "code": 6016, + "name": "InvalidEmitter", + "msg": "InvalidEmitter" + }, + { + "code": 6017, + "name": "InvalidWormholeCctpMessage", + "msg": "InvalidWormholeCctpMessage" + }, + { + "code": 6018, + "name": "InvalidRegisteredEmitterCctpDomain", + "msg": "InvalidRegisteredEmitterCctpDomain" + }, + { + "code": 6019, + "name": "TargetDomainNotSolana", + "msg": "TargetDomainNotSolana" + }, + { + "code": 6020, + "name": "SourceCctpDomainMismatch", + "msg": "SourceCctpDomainMismatch" + }, + { + "code": 6021, + "name": "TargetCctpDomainMismatch", + "msg": "TargetCctpDomainMismatch" + }, + { + "code": 6022, + "name": "CctpNonceMismatch", + "msg": "CctpNonceMismatch" + }, + { + "code": 6023, + "name": "InvalidCctpMessage", + "msg": "InvalidCctpMessage" + }, + { + "code": 6024, + "name": "RedeemerTokenMismatch", + "msg": "RedeemerTokenMismatch" + } + ] +}; diff --git a/solana/ts/src/wormholeCctp/wormhole/index.ts b/solana/ts/src/wormholeCctp/wormhole/index.ts new file mode 100644 index 00000000..d087e3aa --- /dev/null +++ b/solana/ts/src/wormholeCctp/wormhole/index.ts @@ -0,0 +1,150 @@ +import { parseVaa } from "@certusone/wormhole-sdk"; +import { Connection, PublicKey } from "@solana/web3.js"; + +export type EncodedVaa = { + status: number; + writeAuthority: PublicKey; + version: number; + buf: Buffer; +}; + +export type PostedVaaV1 = { + consistencyLevel: number; + timestamp: number; + signatureSet: PublicKey; + guardianSetIndex: number; + nonce: number; + sequence: bigint; + emitterChain: number; + emitterAddress: Array; + payload: Buffer; +}; + +export type EmitterInfo = { + chain: number; + address: Array; + sequence: bigint; +}; + +export class VaaAccount { + private _encodedVaa?: EncodedVaa; + private _postedVaaV1?: PostedVaaV1; + + static async fetch(connection: Connection, addr: PublicKey): Promise { + const data = await connection.getAccountInfo(addr).then((acct) => acct.data); + if (data.subarray(0, 8).equals(Uint8Array.from([226, 101, 163, 4, 133, 160, 84, 245]))) { + const status = data[8]; + const writeAuthority = new PublicKey(data.subarray(9, 41)); + const version = data[41]; + const bufLen = data.readUInt32LE(42); + const buf = data.subarray(46, 46 + bufLen); + + return new VaaAccount({ encodedVaa: { status, writeAuthority, version, buf } }); + } else if (data.subarray(0, 4).equals(Uint8Array.from([118, 97, 97, 1]))) { + const consistencyLevel = data[4]; + const timestamp = data.readUInt32LE(5); + const signatureSet = new PublicKey(data.subarray(9, 41)); + const guardianSetIndex = data.readUInt32LE(41); + const nonce = data.readUInt32LE(45); + const sequence = data.readBigUInt64LE(49); + const emitterChain = data.readUInt16LE(57); + const emitterAddress = Array.from(data.subarray(59, 91)); + const payloadLen = data.readUInt32LE(91); + const payload = data.subarray(95, 95 + payloadLen); + + return new VaaAccount({ + postedVaaV1: { + consistencyLevel, + timestamp, + signatureSet, + guardianSetIndex, + nonce, + sequence, + emitterChain, + emitterAddress, + payload, + }, + }); + } else { + throw new Error("invalid VAA account data"); + } + } + + emitterInfo(): EmitterInfo { + if (this._encodedVaa !== undefined) { + const parsed = parseVaa(this._encodedVaa.buf); + return { + chain: parsed.emitterChain, + address: Array.from(parsed.emitterAddress), + sequence: parsed.sequence, + }; + } else { + const { emitterChain: chain, emitterAddress: address, sequence } = this._postedVaaV1; + return { + chain, + address, + sequence, + }; + } + } + + payload(): Buffer { + if (this._encodedVaa !== undefined) { + return parseVaa(this._encodedVaa.buf).payload; + } else { + return this._postedVaaV1.payload; + } + } + + get encodedVaa(): EncodedVaa { + if (this._encodedVaa === undefined) { + throw new Error("VaaAccount does not have encodedVaa"); + } + return this._encodedVaa; + } + + get postedVaaV1(): PostedVaaV1 { + if (this._postedVaaV1 === undefined) { + throw new Error("VaaAccount does not have postedVaaV1"); + } + return this._postedVaaV1; + } + + private constructor(data: { encodedVaa?: EncodedVaa; postedVaaV1?: PostedVaaV1 }) { + const { encodedVaa, postedVaaV1 } = data; + if (encodedVaa !== undefined && postedVaaV1 !== undefined) { + throw new Error("VaaAccount cannot have both encodedVaa and postedVaaV1"); + } + + this._encodedVaa = encodedVaa; + this._postedVaaV1 = postedVaaV1; + } +} + +export class Claim { + static address( + programId: PublicKey, + address: Array, + chain: number, + sequence: bigint, + prefix?: Buffer, + ): PublicKey { + const chainBuf = Buffer.alloc(2); + chainBuf.writeUInt16BE(chain); + + const sequenceBuf = Buffer.alloc(8); + sequenceBuf.writeBigUInt64BE(sequence); + + if (prefix !== undefined) { + return PublicKey.findProgramAddressSync( + [prefix, Buffer.from(address), chainBuf, sequenceBuf], + new PublicKey(programId), + )[0]; + } else { + return PublicKey.findProgramAddressSync( + [Buffer.from(address), chainBuf, sequenceBuf], + new PublicKey(programId), + )[0]; + } + } +} diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/01__tokenRouter.ts new file mode 100644 index 00000000..e2801d4f --- /dev/null +++ b/solana/ts/tests/01__tokenRouter.ts @@ -0,0 +1,1958 @@ +import { CHAINS, ChainId } from "@certusone/wormhole-sdk"; +import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; +import { use as chaiUse, expect } from "chai"; +import chaiAsPromised from "chai-as-promised"; +import { Custodian, RouterEndpoint, TokenRouterProgram } from "../src"; +import { LOCALHOST, PAYER_KEYPAIR, expectIxErr, expectIxOk } from "./helpers"; + +chaiUse(chaiAsPromised); + +describe("Token Router", function () { + const connection = new Connection(LOCALHOST, "processed"); + // payer is also the recipient in all tests + const payer = PAYER_KEYPAIR; + const relayer = Keypair.generate(); + const owner = Keypair.generate(); + const ownerAssistant = Keypair.generate(); + + const foreignChain = CHAINS.ethereum; + const invalidChain = (foreignChain + 1) as ChainId; + const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); + const tokenRouter = new TokenRouterProgram(connection); + + describe("Admin", function () { + describe("Initialize", function () { + const createInitializeIx = (opts?: { ownerAssistant?: PublicKey }) => + tokenRouter.initializeIx({ + owner: payer.publicKey, + ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, + }); + + it("Cannot Initialize With Default Owner Assistant", async function () { + await expectIxErr( + connection, + [await createInitializeIx({ ownerAssistant: PublicKey.default })], + [payer], + "AssistantZeroPubkey" + ); + }); + + it("Finally Initialize Program", async function () { + await expectIxOk(connection, [await createInitializeIx()], [payer]); + + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + const expectedCustodianData = { + bump: 253, + paused: false, + owner: payer.publicKey, + pendingOwner: null, + ownerAssistant: ownerAssistant.publicKey, + pausedSetBy: payer.publicKey, + } as Custodian; + expect(custodianData).to.eql(expectedCustodianData); + }); + + it("Cannot Call Instruction Again: initialize", async function () { + await expectIxErr( + connection, + [ + await createInitializeIx({ + ownerAssistant: ownerAssistant.publicKey, + }), + ], + [payer], + "already in use" + ); + }); + }); + + describe("Ownership Transfer Request", async function () { + // Create the submit ownership transfer instruction, which will be used + // to set the pending owner to the `relayer` key. + const createSubmitOwnershipTransferIx = (opts?: { + sender?: PublicKey; + newOwner?: PublicKey; + }) => + tokenRouter.submitOwnershipTransferIx({ + owner: opts?.sender ?? owner.publicKey, + newOwner: opts?.newOwner ?? relayer.publicKey, + }); + + // Create the confirm ownership transfer instruction, which will be used + // to set the new owner to the `relayer` key. + const createConfirmOwnershipTransferIx = (opts?: { sender?: PublicKey }) => + tokenRouter.confirmOwnershipTransferIx({ + pendingOwner: opts?.sender ?? relayer.publicKey, + }); + + // Instruction to cancel an ownership transfer request. + const createCancelOwnershipTransferIx = (opts?: { sender?: PublicKey }) => + tokenRouter.cancelOwnershipTransferIx({ + owner: opts?.sender ?? owner.publicKey, + }); + + it("Submit Ownership Transfer Request as Deployer (Payer)", async function () { + await expectIxOk( + connection, + [ + await createSubmitOwnershipTransferIx({ + sender: payer.publicKey, + newOwner: owner.publicKey, + }), + ], + [payer] + ); + + // Confirm that the pending owner variable is set in the owner config. + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + + expect(custodianData.pendingOwner).deep.equals(owner.publicKey); + }); + + it("Confirm Ownership Transfer Request as Pending Owner", async function () { + await expectIxOk( + connection, + [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], + [payer, owner] + ); + + // Confirm that the owner config reflects the current ownership status. + { + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + expect(custodianData.owner).deep.equals(owner.publicKey); + expect(custodianData.pendingOwner).deep.equals(null); + } + }); + + it("Cannot Submit Ownership Transfer Request (New Owner == Address(0))", async function () { + await expectIxErr( + connection, + [ + await createSubmitOwnershipTransferIx({ + newOwner: PublicKey.default, + }), + ], + [payer, owner], + "InvalidNewOwner" + ); + }); + + it("Cannot Submit Ownership Transfer Request (New Owner == Owner)", async function () { + await expectIxErr( + connection, + [ + await createSubmitOwnershipTransferIx({ + newOwner: owner.publicKey, + }), + ], + [payer, owner], + "AlreadyOwner" + ); + }); + + it("Cannot Submit Ownership Transfer Request as Non-Owner", async function () { + await expectIxErr( + connection, + [ + await createSubmitOwnershipTransferIx({ + sender: ownerAssistant.publicKey, + }), + ], + [payer, ownerAssistant], + "OwnerOnly" + ); + }); + + it("Submit Ownership Transfer Request as Owner", async function () { + await expectIxOk( + connection, + [await createSubmitOwnershipTransferIx()], + [payer, owner] + ); + + // Confirm that the pending owner variable is set in the owner config. + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); + }); + + it("Cannot Confirm Ownership Transfer Request as Non Pending Owner", async function () { + await expectIxErr( + connection, + [ + await createConfirmOwnershipTransferIx({ + sender: ownerAssistant.publicKey, + }), + ], + [payer, ownerAssistant], + "NotPendingOwner" + ); + }); + + it("Confirm Ownership Transfer Request as Pending Owner", async function () { + await expectIxOk( + connection, + [await createConfirmOwnershipTransferIx()], + [payer, relayer] + ); + + // Confirm that the owner config reflects the current ownership status. + { + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + expect(custodianData.owner).deep.equals(relayer.publicKey); + expect(custodianData.pendingOwner).deep.equals(null); + } + + // Set the owner back to the payer key. + await expectIxOk( + connection, + [ + await createSubmitOwnershipTransferIx({ + sender: relayer.publicKey, + newOwner: owner.publicKey, + }), + ], + [payer, relayer] + ); + + await expectIxOk( + connection, + [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], + [payer, owner] + ); + + // Confirm that the payer is the owner again. + { + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + expect(custodianData.owner).deep.equals(owner.publicKey); + expect(custodianData.pendingOwner).deep.equals(null); + } + }); + + it("Cannot Cancel Ownership Request as Non-Owner", async function () { + // First, submit the ownership transfer request. + await expectIxOk( + connection, + [await createSubmitOwnershipTransferIx()], + [payer, owner] + ); + + // Confirm that the pending owner variable is set in the owner config. + { + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); + } + + // Confirm that the cancel ownership transfer request fails. + await expectIxErr( + connection, + [await createCancelOwnershipTransferIx({ sender: ownerAssistant.publicKey })], + [payer, ownerAssistant], + "OwnerOnly" + ); + }); + + it("Cancel Ownership Request as Owner", async function () { + await expectIxOk( + connection, + [await createCancelOwnershipTransferIx()], + [payer, owner] + ); + + // Confirm the pending owner field was reset. + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + expect(custodianData.pendingOwner).deep.equals(null); + }); + }); + + describe("Update Owner Assistant", async function () { + // Create the update owner assistant instruction. + const createUpdateOwnerAssistantIx = (opts?: { + sender?: PublicKey; + newAssistant?: PublicKey; + }) => + tokenRouter.updateOwnerAssistantIx({ + owner: opts?.sender ?? owner.publicKey, + newOwnerAssistant: opts?.newAssistant ?? relayer.publicKey, + }); + + it("Cannot Update Assistant (New Assistant == Address(0))", async function () { + await expectIxErr( + connection, + [await createUpdateOwnerAssistantIx({ newAssistant: PublicKey.default })], + [payer, owner], + "InvalidNewAssistant" + ); + }); + + it("Cannot Update Assistant as Non-Owner", async function () { + await expectIxErr( + connection, + [await createUpdateOwnerAssistantIx({ sender: ownerAssistant.publicKey })], + [payer, ownerAssistant], + "OwnerOnly" + ); + }); + + it("Update Assistant as Owner", async function () { + await expectIxOk( + connection, + [await createUpdateOwnerAssistantIx()], + [payer, owner] + ); + + // Confirm the assistant field was updated. + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); + expect(custodianData.ownerAssistant).deep.equals(relayer.publicKey); + + // Set the assistant back to the assistant key. + await expectIxOk( + connection, + [ + await createUpdateOwnerAssistantIx({ + newAssistant: ownerAssistant.publicKey, + }), + ], + [payer, owner] + ); + }); + }); + + describe("Add Router Endpoint", function () { + const createAddRouterEndpointIx = (opts?: { + sender?: PublicKey; + contractAddress?: Array; + }) => + tokenRouter.addRouterEndpointIx( + { + ownerOrAssistant: opts?.sender ?? owner.publicKey, + }, + { + chain: foreignChain, + address: opts?.contractAddress ?? routerEndpointAddress, + } + ); + + before("Transfer Lamports to Owner and Owner Assistant", async function () { + await expectIxOk( + connection, + [ + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: owner.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: ownerAssistant.publicKey, + lamports: 1000000000, + }), + ], + [payer] + ); + }); + + it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { + await expectIxErr( + connection, + [await createAddRouterEndpointIx({ sender: payer.publicKey })], + [payer], + "OwnerOrAssistantOnly" + ); + }); + + [CHAINS.unset, CHAINS.solana].forEach((chain) => + it(`Cannot Register Chain ID == ${chain}`, async function () { + await expectIxErr( + connection, + [ + await tokenRouter.addRouterEndpointIx( + { ownerOrAssistant: owner.publicKey }, + { chain, address: routerEndpointAddress } + ), + ], + [owner], + "ChainNotAllowed" + ); + }) + ); + + it("Cannot Register Zero Address", async function () { + await expectIxErr( + connection, + [ + await createAddRouterEndpointIx({ + contractAddress: new Array(32).fill(0), + }), + ], + [owner], + "InvalidEndpoint" + ); + }); + + it(`Add Router Endpoint as Owner Assistant`, async function () { + const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); + await expectIxOk( + connection, + [ + await createAddRouterEndpointIx({ + sender: ownerAssistant.publicKey, + contractAddress, + }), + ], + [ownerAssistant] + ); + + const routerEndpointData = await tokenRouter.fetchRouterEndpoint( + tokenRouter.routerEndpointAddress(foreignChain) + ); + const expectedRouterEndpointData = { + bump: 255, + chain: foreignChain, + address: contractAddress, + } as RouterEndpoint; + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + + it(`Update Router Endpoint as Owner`, async function () { + await expectIxOk( + connection, + [ + await createAddRouterEndpointIx({ + contractAddress: routerEndpointAddress, + }), + ], + [owner] + ); + + const routerEndpointData = await tokenRouter.fetchRouterEndpoint( + tokenRouter.routerEndpointAddress(foreignChain) + ); + const expectedRouterEndpointData = { + bump: 255, + chain: foreignChain, + address: routerEndpointAddress, + } as RouterEndpoint; + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + }); + + describe("Set Pause", async function () { + const createSetPauseIx = (opts?: { sender?: PublicKey; paused?: boolean }) => + tokenRouter.setPauseIx( + { + ownerOrAssistant: opts?.sender ?? owner.publicKey, + }, + opts?.paused ?? true + ); + + it("Cannot Set Pause for Transfers as Non-Owner", async function () { + await expectIxErr( + connection, + [await createSetPauseIx({ sender: payer.publicKey })], + [payer], + "OwnerOrAssistantOnly" + ); + }); + + it("Set Paused == true as Owner Assistant", async function () { + const paused = true; + await expectIxOk( + connection, + [await createSetPauseIx({ sender: ownerAssistant.publicKey, paused })], + [ownerAssistant] + ); + + const [actualPaused, pausedSetBy] = await tokenRouter + .fetchCustodian(tokenRouter.custodianAddress()) + .then((data) => [data.paused, data.pausedSetBy]); + expect(actualPaused).equals(paused); + expect(pausedSetBy).eql(ownerAssistant.publicKey); + }); + + it("Set Paused == false as Owner", async function () { + const paused = false; + await expectIxOk(connection, [await createSetPauseIx({ paused })], [owner]); + + const [actualPaused, pausedSetBy] = await tokenRouter + .fetchCustodian(tokenRouter.custodianAddress()) + .then((data) => [data.paused, data.pausedSetBy]); + expect(actualPaused).equals(paused); + expect(pausedSetBy).eql(owner.publicKey); + }); + }); + }); + + // describe.skip("Transfer Tokens with Relay", function () { + // const sendAmount = new BN(420_000_000); // 420.0 USDC + // const toNativeAmount = new BN(100_000_000); // 50.0 USDC + // const targetRecipientWallet = Array.from(Buffer.alloc(32, "1337beef", "hex")); + + // const createTransferTokensWithRelayIx = (opts?: { + // sender?: PublicKey; + // fromToken?: PublicKey; + // amount?: BN; + // toNativeTokenAmount?: BN; + // targetRecipientWallet?: Array; + // targetChain?: ChainId; + // }) => + // tokenRouter.transferTokensWithRelayIx( + // { + // payer: opts?.sender ?? payer.publicKey, + // fromToken: + // opts?.fromToken ?? + // splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, payer.publicKey), + // }, + // { + // amount: opts?.amount ?? sendAmount, + // toNativeTokenAmount: opts?.toNativeTokenAmount ?? toNativeAmount, + // targetRecipientWallet: opts?.targetRecipientWallet ?? targetRecipientWallet, + // targetChain: opts?.targetChain ?? foreignChain, + // } + // ); + + // before("Set Default Parameters Before Tests", async () => { + // // Set default params. + // // await expectIxOk( + // // connection, + // // [ + // // await tokenRouter.updateRelayerFeeIx( + // // { + // // ownerOrAssistant: owner.publicKey, + // // mint: USDC_MINT_ADDRESS, + // // }, + // // { + // // chain: foreignChain, + // // relayerFee: DEFAULT_RELAYER_FEE, + // // } + // // ), + // // await tokenRouter.updateNativeSwapRateIx( + // // { + // // ownerOrAssistant: owner.publicKey, + // // mint: USDC_MINT_ADDRESS, + // // }, + // // DEFAULT_SWAP_RATE + // // ), + // // await tokenRouter.updateMaxNativeSwapAmountIx( + // // { + // // owner: owner.publicKey, + // // mint: USDC_MINT_ADDRESS, + // // }, + // // DEFAULT_MAX_NATIVE_SWAP_AMOUNT + // // ), + // // ], + // // [owner] + // // ); + // }); + + // it.skip("Cannot Transfer When Paused", async function () { + // // TODO + // }); + + // it.skip("Cannot Transfer Unregistered Asset", async function () { + // // TODO + // }); + + // it.skip("Cannot Transfer Amount Less Than Sum of Relayer Fee and To Native Token Amount", async function () { + // // TODO + // }); + + // it.skip("Cannot Transfer To Unregistered Foreign Contract", async function () { + // // TODO + // }); + + // it.skip("Cannot Transfer To Zero Address", async function () { + // // TODO + // }); + + // it.skip("Cannot Transfer without Delegating Authority to Custodian", async function () { + // // TODO + // }); + + // it("Transfer Tokens With Relay", async function () { + // const payerToken = splToken.getAssociatedTokenAddressSync( + // USDC_MINT_ADDRESS, + // payer.publicKey + // ); + // const balanceBefore = await splToken + // .getAccount(connection, payerToken) + // .then((token) => token.amount); + + // const delegateIx = splToken.createSetAuthorityInstruction( + // payerToken, + // payer.publicKey, + // splToken.AuthorityType.AccountOwner, + // tokenRouter.custodianAddress() + // ); + + // await expectIxOk( + // connection, + // [delegateIx, await createTransferTokensWithRelayIx()], + // [payer] + // ); + + // // TODO: check message + + // const balanceAfter = await splToken + // .getAccount(connection, payerToken) + // .then((token) => token.amount); + // expect(balanceAfter).to.eql(balanceBefore - BigInt(sendAmount.toString())); + // }); + // }); + + // describe("Transfer Tokens With Relay Business Logic", function () { + // // Test parameters. The following tests rely on these parameters, + // // and changing them may cause the tests to fail. + // const batchId = 0; + // const sendAmount = 420000000000; // we are sending once + // const recipientAddress = Buffer.alloc(32, "1337beef", "hex"); + // const initialRelayerFee = 100000000; // $1.00 + // const maxNativeSwapAmount = 50000000000; // 50 SOL + + // const getWormholeSequence = async () => + // ( + // await wormhole.getProgramSequenceTracker(connection, TOKEN_BRIDGE_PID, CORE_BRIDGE_PID) + // ).value(); + + // const verifyTmpTokenAccountDoesNotExist = async (mint: PublicKey) => { + // const tmpTokenAccountKey = tokenBridgeRelayer.deriveTmpTokenAccountKey( + // TOKEN_ROUTER_PID, + // mint + // ); + // await expect(getAccount(connection, tmpTokenAccountKey)).to.be.rejected; + // }; + + // fetchTestTokens().forEach(([isNative, decimals, tokenAddress, mint, swapRate]) => { + // describe(getDescription(decimals, isNative, mint), function () { + // // Target contract swap amount. + // const toNativeTokenAmount = 10000000000; + + // // ATAs. + // const recipientTokenAccount = getAssociatedTokenAddressSync(mint, payer.publicKey); + // const feeRecipientTokenAccount = getAssociatedTokenAddressSync( + // mint, + // feeRecipient.publicKey + // ); + // const relayerTokenAccount = getAssociatedTokenAddressSync(mint, relayer.publicKey); + + // describe(`Transfer Tokens With Payload`, function () { + // const createSendTokensWithPayloadIx = (opts?: { + // sender?: PublicKey; + // amount?: number; + // toNativeTokenAmount?: number; + // recipientAddress?: Buffer; + // recipientChain?: ChainId; + // wrapNative?: boolean; + // }) => + // (isNative + // ? tokenBridgeRelayer.createTransferNativeTokensWithRelayInstruction + // : tokenBridgeRelayer.createTransferWrappedTokensWithRelayInstruction)( + // connection, + // TOKEN_ROUTER_PID, + // opts?.sender ?? payer.publicKey, + // TOKEN_BRIDGE_PID, + // CORE_BRIDGE_PID, + // mint, + // { + // amount: opts?.amount ?? sendAmount, + // toNativeTokenAmount: opts?.toNativeTokenAmount ?? toNativeTokenAmount, + // recipientAddress: opts?.recipientAddress ?? recipientAddress, + // recipientChain: opts?.recipientChain ?? foreignChain, + // batchId: batchId, + // wrapNative: opts?.wrapNative ?? mint === NATIVE_MINT ? true : false, + // } + // ); + + // it("Set the Swap Rate", async function () { + // // Set the swap rate. + // const createUpdateSwapRateIx = await tokenBridgeRelayer.createUpdateSwapRateInstruction( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint, + // new BN(swapRate) + // ); + // await expectIxToSucceed(createUpdateSwapRateIx); + // }); + + // it("Set the Max Native Swap Amount", async function () { + // // Set the max native swap amount. + // const createUpdateMaxNativeSwapAmountIx = + // await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint, + // mint === NATIVE_MINT ? new BN(0) : new BN(maxNativeSwapAmount) + // ); + // await expectIxToSucceed(createUpdateMaxNativeSwapAmountIx); + // }); + + // it("Set the Initial Relayer Fee", async function () { + // // Set the initial relayer fee. + // const createUpdateRelayerFeeIx = + // await tokenBridgeRelayer.updateRelayerFeeIx( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // foreignChain, + // new BN(initialRelayerFee) + // ); + // await expectIxToSucceed(createUpdateRelayerFeeIx); + // }); + + // it("Cannot Transfer When Paused", async function () { + // // Pause transfers. + // const createSetPauseForTransfersIx = + // await tokenBridgeRelayer.setPauseForTransfersIx( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // true + // ); + // await expectIxToSucceed(createSetPauseForTransfersIx); + + // // Attempt to do the transfer. + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx(), + // "OutboundTransfersPaused" + // ); + + // // Unpause transfers. + // const createSetPauseForTransfersIx2 = + // await tokenBridgeRelayer.setPauseForTransfersIx( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // false + // ); + // await expectIxToSucceed(createSetPauseForTransfersIx2); + // }); + + // it("Cannot Transfer Unregistered Token", async function () { + // // Deregister the token. + // await expectIxToSucceed( + // await tokenBridgeRelayer.createDeregisterTokenInstruction( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint + // ) + // ); + + // // Attempt to do the transfer. + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx(), + // "AccountNotInitialized" + // ); + + // // Register the token again. + // await expectIxToSucceed( + // await tokenBridgeRelayer.createRegisterTokenInstruction( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint, + // new BN(swapRate), + // new BN(0) // set the max native to zero, this won't affect subsequent tests + // ) + // ); + // }); + + // if (isNative && decimals > 8) + // it("Cannot Transfer Amount Less Than Bridgeable", async function () { + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx({ amount: 1 }), + // "ZeroBridgeAmount" + // ); + // }); + + // if (isNative && decimals > 8) + // it("Cannot Set To Native Token Amount Less Than Bridgeable", async function () { + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx({ + // toNativeTokenAmount: 1, + // }), + // "InvalidToNativeAmount" + // ); + // }); + + // it("Cannot Transfer Amount Less Than Sum of Relayer Fee and To Native Token Amount", async function () { + // // Calculate the relayer fee in terms of the token. + // const relayerFee = tokenBridgeTransform( + // await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, + // decimals, + // mint + // ), + // decimals + // ); + + // // Calculate the transfer amount. + // const insufficientAmount = relayerFee + toNativeTokenAmount - 1; + + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx({ + // amount: insufficientAmount, + // }), + // "InsufficientFunds" + // ); + // }); + + // it("Cannot Transfer To Unregistered Foreign Contract", async function () { + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx({ + // recipientChain: invalidChain, + // }), + // "AccountNotInitialized" + // ); + // }); + + // [CHAINS.unset, CHAINS.solana].forEach((recipientChain) => + // it(`Cannot Transfer To Chain ID == ${recipientChain}`, async function () { + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx({ recipientChain }), + // "AnchorError caused by account: foreign_contract. Error Code: AccountNotInitialized" + // ); + // }) + // ); + + // it("Cannot Transfer To Zero Address", async function () { + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx({ + // recipientAddress: Buffer.alloc(32), + // }), + // "InvalidRecipient" + // ); + // }); + + // if (mint !== NATIVE_MINT && isNative) + // it("Cannot Wrap Non-Native Token", async function () { + // await expectIxToFailWithError( + // await createSendTokensWithPayloadIx({ + // wrapNative: true, + // }), + // "NativeMintRequired" + // ); + // }); + + // for (const toNativeAmount of [toNativeTokenAmount, 0]) { + // it(`Transfer with Relay (To Native Amount == ${toNativeAmount})`, async function () { + // const sequence = await tokenBridgeRelayer.getSignerSequenceData( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey + // ); + + // // Fetch the balance before the transfer. + // const balanceBefore = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + + // // Attempt to send the transfer. + // await expectIxToSucceed( + // createSendTokensWithPayloadIx({ + // toNativeTokenAmount: toNativeAmount, + // }), + // 250_000 + // ); + + // // Fetch the balance after the transfer. + // const balanceAfter = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + + // // Calculate the balance change and confirm it matches the expected. If + // // wrap is true, then the balance should decrease by the amount sent + // // plus the amount of lamports used to pay for the transaction. + // if (mint === NATIVE_MINT) { + // expect(balanceBefore - balanceAfter).gte( + // tokenBridgeTransform(Number(sendAmount), decimals) + // ); + // } else { + // expect(balanceBefore - balanceAfter).equals( + // tokenBridgeTransform(Number(sendAmount), decimals) + // ); + // } + + // // Normalize the to native token amount. + // const expectedToNativeAmount = tokenBridgeNormalizeAmount(toNativeAmount, decimals); + + // // Calculate the expected target relayer fee and normalize it. + // const expectedFee = tokenBridgeNormalizeAmount( + // await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, + // decimals, + // mint + // ), + // decimals + // ); + + // // Normalize the transfer amount and verify that it's correct. + // const expectedAmount = tokenBridgeNormalizeAmount(sendAmount, decimals); + + // // Parse the token bridge relayer payload and validate the encoded + // // values. + // await verifyRelayerMessage( + // connection, + // payer.publicKey, + // BigInt(sequence.toString()), + // expectedAmount, + // expectedFee, + // expectedToNativeAmount, + // recipientAddress + // ); + + // await verifyTmpTokenAccountDoesNotExist(mint); + // }); + // } + // }); + + // describe("Complete Transfer with Relay", function () { + // // Test parameters. The following tests rely on these values + // // and could fail if they are changed. + // const feeEpsilon = 10000000; + // const receiveAmount = sendAmount / 6; + // const toNativeTokenAmount = 10000000000; + // expect(toNativeTokenAmount).lt(receiveAmount); + + // // Replay protection place holder. + // let replayVAA: Buffer; + + // const createRedeemTransferWithPayloadIx = ( + // sender: PublicKey, + // signedMsg: Buffer, + // recipient: PublicKey + // ) => + // (isNative + // ? tokenBridgeRelayer.createCompleteNativeTransferWithRelayInstruction + // : tokenBridgeRelayer.createCompleteWrappedTransferWithRelayInstruction)( + // connection, + // TOKEN_ROUTER_PID, + // sender, + // feeRecipient.publicKey, + // TOKEN_BRIDGE_PID, + // CORE_BRIDGE_PID, + // signedMsg, + // recipient + // ); + + // it("Cannot Redeem From Unregistered Foreign Contract", async function () { + // // Create the encoded transfer with relay payload. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // 0, // relayer fee + // 0, // to native token amount + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const bogusMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // unregisteredContractAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Post the Wormhole message. + // await postSignedMsgAsVaaOnSolana(bogusMsg); + + // // Attempt to redeem the transfer. + // await expectIxToFailWithError( + // await createRedeemTransferWithPayloadIx(payer.publicKey, bogusMsg, payer.publicKey), + // "InvalidEndpoint" + // ); + // }); + + // it("Cannot Redeem Unregistered Token", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Deregister the token. + // await expectIxToSucceed( + // await tokenBridgeRelayer.createDeregisterTokenInstruction( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint + // ) + // ); + + // // Create the encoded transfer with relay payload. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(relayerFee, decimals), + // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, payer)).to.be.fulfilled; + + // // Attempt to redeem the transfer. + // await expectIxToFailWithError( + // await createRedeemTransferWithPayloadIx(payer.publicKey, signedMsg, payer.publicKey), + // "AccountNotInitialized" + // ); + + // // Register the token again. + // await expectIxToSucceed( + // await tokenBridgeRelayer.createRegisterTokenInstruction( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint, + // new BN(swapRate), + // mint === NATIVE_MINT ? new BN(0) : new BN(maxNativeSwapAmount) + // ) + // ); + // }); + + // it("Cannot Redeem Invalid Recipient", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Encode a different recipient in the payload. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(relayerFee, decimals), + // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), + // relayer.publicKey.toBuffer().toString("hex") // encode the relayer instead of recipient + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, payer)).to.be.fulfilled; + + // // Attempt to redeem the transfer with a different recipient. + // await expectIxToFailWithError( + // await createRedeemTransferWithPayloadIx(payer.publicKey, signedMsg, payer.publicKey), + // "InvalidRecipient" + // ); + // }); + + // it("Self Redeem", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Create the encoded transfer with relay payload. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(relayerFee, decimals), + // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, payer)).to.be.fulfilled; + + // // Fetch the balance before the transfer. + // const balanceBefore = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + + // // Complete the transfer. + // await expectIxToSucceed( + // createRedeemTransferWithPayloadIx(payer.publicKey, signedMsg, payer.publicKey), + // payer + // ); + + // // Fetch the balance after the transfer. + // const balanceAfter = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + + // // Calculate the balance change and confirm it matches the expected. If + // // wrap is true, then the balance should decrease by the amount sent + // // plus the amount of lamports used to pay for the transaction. + // if (mint === NATIVE_MINT) { + // expect(balanceAfter - balanceBefore - receiveAmount).lte( + // tokenBridgeTransform(feeEpsilon, decimals) + // ); + // } else { + // expect(balanceAfter - balanceBefore).equals( + // tokenBridgeTransform(Number(receiveAmount), decimals) + // ); + // } + + // await verifyTmpTokenAccountDoesNotExist(mint); + // }); + + // it("With Relayer (With Swap)", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Create the encoded transfer with relay payload. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(relayerFee, decimals), + // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; + + // // Fetch the token balances before the transfer. + // const recipientTokenBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceBefore = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances before the transfer. + // const recipientLamportBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceBefore = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Complete the transfer. + // await expectIxToSucceed( + // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), + // relayer, + // 250_000 + // ); + + // // Fetch the token balances after the transfer. + // const recipientTokenBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceAfter = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances after the transfer. + // const recipientLamportBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceAfter = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Denormalize the transfer amount and relayer fee. + // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); + // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); + + // // Confirm the balance changes. + // if (mint === NATIVE_MINT) { + // // Confirm lamport changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // tokenBridgeTransform(Number(receiveAmount) - denormalizedRelayerFee, decimals) + // ); + + // // Confirm lamport changes for the relayer. + // expect(relayerLamportBalanceAfter - relayerLamportBalanceBefore).gte( + // denormalizedRelayerFee - feeEpsilon + // ); + // } else { + // // Calculate the expected token swap amounts. + // const [expectedSwapAmountIn, expectedSwapAmountOut] = await calculateSwapAmounts( + // connection, + // program.programId, + // decimals, + // mint, + // toNativeTokenAmount + // ); + + // // Confirm token changes for the recipient. + // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( + // denormalizedReceiveAmount - expectedSwapAmountIn - denormalizedRelayerFee + // ); + + // // Confirm token changes for fee recipient. + // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( + // expectedSwapAmountIn + denormalizedRelayerFee + // ); + + // // Confirm lamports changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // expectedSwapAmountOut + // ); + + // // Confirm lamports changes for the relayer. + // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter) + // .gte(expectedSwapAmountOut) + // .lte(expectedSwapAmountOut + feeEpsilon); + // } + + // await verifyTmpTokenAccountDoesNotExist(mint); + // }); + + // it("With Relayer (With Max Swap Limit Reached)", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Create the encoded transfer with relay payload. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(relayerFee, decimals), + // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Update the max native swap amount if the toNativeTokenAmount is + // // not enough to cap the swap quantity. + // { + // // Compute the max native swap amount in token terms. + // const [maxNativeSwapAmountInTokens, _, __] = await getSwapInputs( + // connection, + // program.programId, + // decimals, + // mint + // ); + + // if (toNativeTokenAmount <= maxNativeSwapAmountInTokens) { + // // Reduce the max native swap amount to half of the + // // to native token amount equivalent. + // const newMaxNativeSwapAmount = + // maxNativeSwapAmount * (toNativeTokenAmount / maxNativeSwapAmountInTokens / 2); + + // await expectIxToSucceed( + // await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint, + // new BN(newMaxNativeSwapAmount) + // ) + // ); + // } + // } + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; + + // // Fetch the token balances before the transfer. + // const recipientTokenBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceBefore = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances before the transfer. + // const recipientLamportBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceBefore = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Complete the transfer. + // await expectIxToSucceed( + // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), + // relayer, + // 250_000 + // ); + + // // Fetch the token balances after the transfer. + // const recipientTokenBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceAfter = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances after the transfer. + // const recipientLamportBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceAfter = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Denormalize the transfer amount and relayer fee. + // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); + // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); + + // // Confirm the balance changes. + // if (mint === NATIVE_MINT) { + // // Confirm lamport changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // tokenBridgeTransform(Number(receiveAmount) - denormalizedRelayerFee, decimals) + // ); + + // // Confirm lamport changes for the relayer. + // expect(relayerLamportBalanceAfter - relayerLamportBalanceBefore).gte( + // denormalizedRelayerFee - feeEpsilon + // ); + // } else { + // // Calculate the expected token swap amounts. + // const [expectedSwapAmountIn, expectedSwapAmountOut] = await calculateSwapAmounts( + // connection, + // program.programId, + // decimals, + // mint, + // toNativeTokenAmount + // ); + + // // Confirm that the expectedSwapAmountIn is less than the + // // original to native token amount. + // expect(expectedSwapAmountIn).lt(toNativeTokenAmount); + + // // Confirm token changes for the recipient. + // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( + // denormalizedReceiveAmount - expectedSwapAmountIn - denormalizedRelayerFee + // ); + + // // Confirm token changes for fee recipient. + // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( + // expectedSwapAmountIn + denormalizedRelayerFee + // ); + + // // Confirm lamports changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // expectedSwapAmountOut + // ); + + // // Confirm lamports changes for the relayer. + // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter) + // .gte(expectedSwapAmountOut) + // .lte(expectedSwapAmountOut + feeEpsilon); + // } + + // // Set the max native swap amount back to the initial value. + // await expectIxToSucceed( + // await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( + // connection, + // TOKEN_ROUTER_PID, + // payer.publicKey, + // mint, + // mint === NATIVE_MINT ? new BN(0) : new BN(maxNativeSwapAmount) + // ) + // ); + + // await verifyTmpTokenAccountDoesNotExist(mint); + // }); + + // it("With Relayer (With Swap No Fee)", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Create the encoded transfer with relay payload. Set the + // // target relayer fee to zero for this test. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(0, decimals), + // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; + + // // Fetch the token balances before the transfer. + // const recipientTokenBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceBefore = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances before the transfer. + // const recipientLamportBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceBefore = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Complete the transfer. + // await expectIxToSucceed( + // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), + // relayer, + // 250_000 + // ); + + // // Fetch the token balances after the transfer. + // const recipientTokenBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceAfter = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances after the transfer. + // const recipientLamportBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceAfter = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Denormalize the transfer amount and relayer fee. + // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); + // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); + + // // Confirm the balance changes. + // if (mint === NATIVE_MINT) { + // // Confirm lamport changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // tokenBridgeTransform(Number(receiveAmount), decimals) + // ); + + // // Confirm lamport changes for the relayer. + // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); + // } else { + // // Calculate the expected token swap amounts. + // const [expectedSwapAmountIn, expectedSwapAmountOut] = await calculateSwapAmounts( + // connection, + // program.programId, + // decimals, + // mint, + // toNativeTokenAmount + // ); + + // // Confirm token changes for the recipient. + // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( + // denormalizedReceiveAmount - expectedSwapAmountIn + // ); + + // // Confirm token changes for fee recipient. + // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( + // expectedSwapAmountIn + // ); + + // // Confirm lamports changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // expectedSwapAmountOut + // ); + + // // Confirm lamports changes for the relayer. + // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter) + // .gte(expectedSwapAmountOut) + // .lte(expectedSwapAmountOut + feeEpsilon); + // } + + // await verifyTmpTokenAccountDoesNotExist(mint); + // }); + + // it("With Relayer (No Fee and No Swap)", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Create the encoded transfer with relay payload. Set the + // // to native token amount and relayer fee to zero for this test. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(0, decimals), + // tokenBridgeNormalizeAmount(0, decimals), + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; + + // // Fetch the token balances before the transfer. + // const recipientTokenBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceBefore = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances before the transfer. + // const recipientLamportBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceBefore = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Complete the transfer. + // await expectIxToSucceed( + // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), + // relayer + // ); + + // // Fetch the token balances after the transfer. + // const recipientTokenBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceAfter = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances after the transfer. + // const recipientLamportBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceAfter = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Denormalize the transfer amount and relayer fee. + // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); + + // // Confirm the balance changes. + // if (mint === NATIVE_MINT) { + // // Confirm lamport changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // tokenBridgeTransform(Number(receiveAmount), decimals) + // ); + + // // Confirm lamport changes for the relayer. + // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); + // } else { + // // Confirm token changes for the recipient. + // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( + // denormalizedReceiveAmount + // ); + + // // Confirm token changes for fee recipient. + // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals(0); + + // // Confirm lamports changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals(0); + + // // Confirm lamports changes for the relayer. + // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); + // } + + // await verifyTmpTokenAccountDoesNotExist(mint); + // }); + + // it("With Relayer (No Swap With Fee)", async function () { + // // Define inbound transfer parameters. Calculate the fee + // // using the foreignChain to simulate calculating the + // // target relayer fee. This contract won't allow us to set + // // a relayer fee for the Solana chain ID. + // const relayerFee = await calculateRelayerFee( + // connection, + // program.programId, + // foreignChain, // placeholder + // decimals, + // mint + // ); + + // // Create the encoded transfer with relay payload. Set the + // // to native token amount to zero for this test. + // const transferWithRelayPayload = createTransferWithRelayPayload( + // tokenBridgeNormalizeAmount(relayerFee, decimals), + // tokenBridgeNormalizeAmount(0, decimals), + // payer.publicKey.toBuffer().toString("hex") + // ); + + // // Create the token bridge message. + // const signedMsg = guardianSign( + // foreignTokenBridge.publishTransferTokensWithPayload( + // tokenAddress, + // isNative ? CHAINS.solana : foreignChain, // tokenChain + // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), + // CHAINS.solana, // recipientChain + // TOKEN_ROUTER_PID.toBuffer().toString("hex"), + // routerEndpointAddress, + // Buffer.from(transferWithRelayPayload.substring(2), "hex"), + // batchId + // ) + // ); + // replayVAA = signedMsg; + + // // Post the Wormhole message. + // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; + + // // Fetch the token balances before the transfer. + // const recipientTokenBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceBefore = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances before the transfer. + // const recipientLamportBalanceBefore = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceBefore = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Complete the transfer. + // await expectIxToSucceed( + // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), + // relayer + // ); + + // // Fetch the token balances after the transfer. + // const recipientTokenBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // mint === NATIVE_MINT, + // recipientTokenAccount + // ); + // const feeRecipientTokenBalanceAfter = await getBalance( + // connection, + // feeRecipient.publicKey, + // mint === NATIVE_MINT, + // feeRecipientTokenAccount + // ); + + // // Fetch the lamport balances after the transfer. + // const recipientLamportBalanceAfter = await getBalance( + // connection, + // payer.publicKey, + // true, + // recipientTokenAccount + // ); + // const relayerLamportBalanceAfter = await getBalance( + // connection, + // relayer.publicKey, + // true, + // relayerTokenAccount + // ); + + // // Denormalize the transfer amount and relayer fee. + // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); + // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); + + // // Confirm the balance changes. + // if (mint === NATIVE_MINT) { + // // Confirm lamport changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( + // tokenBridgeTransform(Number(receiveAmount) - denormalizedRelayerFee, decimals) + // ); + + // // Confirm lamport changes for the relayer. + // expect(relayerLamportBalanceAfter - relayerLamportBalanceBefore).gte( + // denormalizedRelayerFee - feeEpsilon + // ); + // } else { + // // Confirm token changes for the recipient. + // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( + // denormalizedReceiveAmount - denormalizedRelayerFee + // ); + + // // Confirm token changes for fee recipient. + // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( + // denormalizedRelayerFee + // ); + + // // Confirm lamports changes for the recipient. + // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals(0); + + // // Confirm lamports changes for the relayer. + // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); + // } + + // await verifyTmpTokenAccountDoesNotExist(mint); + // }); + + // it("Cannot Redeem Again", async function () { + // await expectIxToFailWithError( + // await createRedeemTransferWithPayloadIx( + // relayer.publicKey, + // replayVAA, + // payer.publicKey + // ), + // "AlreadyRedeemed", + // relayer + // ); + // }); + // }); + // }); + // }); + // }); +}); diff --git a/solana/ts/tests/accounts/core_bridge/config.json b/solana/ts/tests/accounts/core_bridge/config.json new file mode 100644 index 00000000..cb2b8051 --- /dev/null +++ b/solana/ts/tests/accounts/core_bridge/config.json @@ -0,0 +1,14 @@ +{ + "pubkey": "6bi4JGDoRwUs9TYBuvoA7dUVyikTJDrJsJU1ew6KVLiu", + "account": { + "lamports": 1057920, + "data": [ + "AAAAAMbrG4wAAAAAgFEBAAoAAAAAAAAA", + "base64" + ], + "owner": "3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 24 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/core_bridge/fee_collector.json b/solana/ts/tests/accounts/core_bridge/fee_collector.json new file mode 100644 index 00000000..1de7027c --- /dev/null +++ b/solana/ts/tests/accounts/core_bridge/fee_collector.json @@ -0,0 +1,14 @@ +{ + "pubkey": "7s3a1ycs16d6SNDumaRtjcoyMaTDZPavzgsmS3uUZYWX", + "account": { + "lamports": 2350640070, + "data": [ + "", + "base64" + ], + "owner": "11111111111111111111111111111111", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 0 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/core_bridge/guardian_set_0.json b/solana/ts/tests/accounts/core_bridge/guardian_set_0.json new file mode 100644 index 00000000..0eb26977 --- /dev/null +++ b/solana/ts/tests/accounts/core_bridge/guardian_set_0.json @@ -0,0 +1,14 @@ +{ + "pubkey": "dxZtypiKT5D9LYzdPxjvSZER9MgYfeRVU5qpMTMTRs4", + "account": { + "lamports": 21141440, + "data": [ + "AAAAAAEAAAC++kKdV80Yt/ik2RotqatK8F0PvkPJm2EAAAAA", + "base64" + ], + "owner": "3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 36 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/message_transmitter/message_transmitter_config.json b/solana/ts/tests/accounts/message_transmitter/message_transmitter_config.json new file mode 100644 index 00000000..0e3e2489 --- /dev/null +++ b/solana/ts/tests/accounts/message_transmitter/message_transmitter_config.json @@ -0,0 +1,14 @@ +{ + "pubkey": "BWrwSWjbikT3H7qHAkUEbLmwDQoB4ZDJ4wcSEhSPTZCu", + "account": { + "lamports": 2519520, + "data": [ + "Ryi0jhPLI/wfOQgPIIpMNon4r0rVMO7Sy1fUtUxQmdUxE51OObvhOoDFz5C0iApooK3hQfndo8m3eRHbcLcd6T35aIm/9s3sgMXPkLSICmigreFB+d2jybd5Edtwtx3pPfloib/2zeyAxc+QtIgKaKCt4UH53aPJt3kR23C3Hek9+WiJv/bN7AAFAAAAAAAAAAEAAAABAAAAAAAAAAAAAAAAAAAAvvpCnVfNGLf4pNkaLamrSvBdD77QBwAAAAAAACYAAAAAAAAA/w==", + "base64" + ], + "owner": "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 234 + } +} diff --git a/solana/ts/tests/accounts/token_messenger_minter/ethereum_remote_token_messenger.json b/solana/ts/tests/accounts/token_messenger_minter/ethereum_remote_token_messenger.json new file mode 100644 index 00000000..e662dd6c --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/ethereum_remote_token_messenger.json @@ -0,0 +1,14 @@ +{ + "pubkey": "Hazwi3jFQtLKc2ughi7HFXPkpDeso7DQaMR9Ks4afh3j", + "account": { + "lamports": 1197120, + "data": [ + "aXOuIl/pivwAAAAAAAAAAAAAAAAAAAAA0MPaWPVTWBQrjT4GwcMMXGEU7+g=", + "base64" + ], + "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 44 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/token_messenger_minter/misconfigured_remote_token_messenger.json b/solana/ts/tests/accounts/token_messenger_minter/misconfigured_remote_token_messenger.json new file mode 100644 index 00000000..88e7d81b --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/misconfigured_remote_token_messenger.json @@ -0,0 +1,14 @@ +{ + "pubkey": "BWyFzH6LsnmDAaDWbGsriQ9SiiKq1CF6pbH4Ye3kzSBV", + "account": { + "lamports": 1197120, + "data": [ + "aXOuIl/pivwAAAAAAAAAAAAAAAAAAAAA0MPaWPVTWBQrjT4GwcMMXGEU7+g=", + "base64" + ], + "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 44 + } +} diff --git a/solana/ts/tests/accounts/token_messenger_minter/token_messenger.json b/solana/ts/tests/accounts/token_messenger_minter/token_messenger.json new file mode 100644 index 00000000..62200a35 --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/token_messenger.json @@ -0,0 +1,14 @@ +{ + "pubkey": "Afgq3BHEfCE7d78D2XE9Bfyu2ieDqvE24xX8KDwreBms", + "account": { + "lamports": 1649520, + "data": [ + "ogTyNJPz3WCAxc+QtIgKaKCt4UH53aPJt3kR23C3Hek9+WiJv/bN7B85CA8gikw2ifivStUw7tLLV9S1TFCZ1TETnU45u+E6pl/JidtfXUJ1nzpUYFjvzc3AvzwYmActjrRd0dgFCM4AAAAA/Q==", + "base64" + ], + "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 109 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/token_messenger_minter/token_minter.json b/solana/ts/tests/accounts/token_messenger_minter/token_minter.json new file mode 100644 index 00000000..bca4334b --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/token_minter.json @@ -0,0 +1,14 @@ +{ + "pubkey": "DBD8hAwLDRQkTsu6EqviaYNGKPnsAMmQonxf7AH8ZcFY", + "account": { + "lamports": 1405920, + "data": [ + "eoVUPzmfq86Axc+QtIgKaKCt4UH53aPJt3kR23C3Hek9+WiJv/bN7IDFz5C0iApooK3hQfndo8m3eRHbcLcd6T35aIm/9s3sAP0=", + "base64" + ], + "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 74 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/token_messenger_minter/usdc_custody_token.json b/solana/ts/tests/accounts/token_messenger_minter/usdc_custody_token.json new file mode 100644 index 00000000..a2bd6a39 --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/usdc_custody_token.json @@ -0,0 +1,14 @@ +{ + "pubkey": "AEfKU8wHGtYgsXpymQ6e1cGHJJeKqCj95pw82iyRUKEs", + "account": { + "lamports": 2039280, + "data": [ + "O0Qss5EhV/E6kz0BNCgtAytf/s0Botvxt3kGCN8ALqe06cUFm0yAK1JhEHKELuHdBTqROz8nrg0RaRNBnQEQ50g9+D6VVAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", + "base64" + ], + "owner": "TokenkegQfeZyiNwAJbNbGKPFXCWuBvf9Ss623VQ5DA", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 165 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json b/solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json new file mode 100644 index 00000000..850c6045 --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json @@ -0,0 +1,14 @@ +{ + "pubkey": "4xt9P42CcMHXAgvemTnzineHp6owfGUcrg1xD9V7mdk1", + "account": { + "lamports": 1684320, + "data": [ + "n4M6qsFUgLaJOQ9DWBY8Pr5GkgAm5md6yYsX7D3P0LYdBflhsqtwJDtELLORIVfxOpM9ATQoLQMrX/7NAaLb8bd5BgjfAC6nABCl1OgAAAAyAAAAAAAAAIYAAAAAAAAAjaVmAQAAAAAhU6gjdg8AAP//", + "base64" + ], + "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 114 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/token_messenger_minter/usdc_token_pair.json b/solana/ts/tests/accounts/token_messenger_minter/usdc_token_pair.json new file mode 100644 index 00000000..85c015b9 --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/usdc_token_pair.json @@ -0,0 +1,14 @@ +{ + "pubkey": "ADcG1d7znq6wR73BJgEh7dR4vTJcETLLyfXMNZjJVwk4", + "account": { + "lamports": 1426800, + "data": [ + "EdYtsOWVxUcAAAAAAAAAAAAAAAAAAAAAB4Zcboe59wJVN34CSs5mMMHqo38649Wj+M9UXZAg4cVbgkofjwh29UJBwfc8LZK10/cIjv4=", + "base64" + ], + "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 77 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/usdc_mint.json b/solana/ts/tests/accounts/usdc_mint.json new file mode 100644 index 00000000..d07d6482 --- /dev/null +++ b/solana/ts/tests/accounts/usdc_mint.json @@ -0,0 +1,14 @@ +{ + "pubkey": "4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU", + "account": { + "lamports": 14801671630, + "data": [ + "AQAAAAwaWIb+EJPfn8Q4wpb59ydbdxi2vA4VbY0zbFjwg5ltAICAaSIj9QAGAQEAAACoBjP/Bn2I36XUNXv0TibOzM8IZmiBA8a6YJ+kTBjSCA==", + "base64" + ], + "owner": "TokenkegQfeZyiNwAJbNbGKPFXCWuBvf9Ss623VQ5DA", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 82 + } +} diff --git a/solana/ts/tests/accounts/usdc_payer_token.json b/solana/ts/tests/accounts/usdc_payer_token.json new file mode 100644 index 00000000..fc1109c7 --- /dev/null +++ b/solana/ts/tests/accounts/usdc_payer_token.json @@ -0,0 +1,14 @@ +{ + "pubkey": "6s9vuDVXZsJY1Qp29cFxKgbSmpTH2QWnrjZzPHWmFXCz", + "account": { + "lamports": 2039280, + "data": [ + "O0Qss5EhV/E6kz0BNCgtAytf/s0Botvxt3kGCN8ALqcMGliG/hCT35/EOMKW+fcnW3cYtrwOFW2NM2xY8IOZbQC0AoadfgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", + "base64" + ], + "owner": "TokenkegQfeZyiNwAJbNbGKPFXCWuBvf9Ss623VQ5DA", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 165 + } +} diff --git a/solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json b/solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json new file mode 100644 index 00000000..e7850334 --- /dev/null +++ b/solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json @@ -0,0 +1,14 @@ +{ + "pubkey": "EaSe23XdXyWsKzmrRkwdpdUEWy4AnU5YZ8SSjQJnpji", + "account": { + "lamports": 1218000, + "data": [ + "hNl7+WI2j+j/AQAAAAYAAAAAAAAAAAAAAAAAWPTBdEnJBmWJHELhTTSq56JqRy4=", + "base64" + ], + "owner": "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 47 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/wormhole_cctp/custodian.json b/solana/ts/tests/accounts/wormhole_cctp/custodian.json new file mode 100644 index 00000000..97685263 --- /dev/null +++ b/solana/ts/tests/accounts/wormhole_cctp/custodian.json @@ -0,0 +1,14 @@ +{ + "pubkey": "2LtnJESn3gEmte4pEBjnTjWX4Npb8esKKPeyWTN6cJP9", + "account": { + "lamports": 960480, + "data": [ + "hOSLuHDkbPD/+w==", + "base64" + ], + "owner": "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 10 + } +} \ No newline at end of file diff --git a/solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json b/solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json new file mode 100644 index 00000000..315066a9 --- /dev/null +++ b/solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json @@ -0,0 +1,14 @@ +{ + "pubkey": "ERX9PQpfrY7rBJJwA62gY5dMeKmxtMRztwMcxdLJ7Eg8", + "account": { + "lamports": 1218000, + "data": [ + "hNl7+WI2j+j/AAAAAAIAAAAAAAAAAAAAAAAACmkUZxazohYiKH76FgdCTGYwaaQ=", + "base64" + ], + "owner": "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 47 + } +} \ No newline at end of file diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts new file mode 100644 index 00000000..788c82c7 --- /dev/null +++ b/solana/ts/tests/helpers/consts.ts @@ -0,0 +1,27 @@ +import { PublicKey, Keypair } from "@solana/web3.js"; +import { CONTRACTS } from "@certusone/wormhole-sdk"; +import { MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; + +export const SWAP_RATE_PRECISION = 10 ** 8; + +export const WORMHOLE_CONTRACTS = CONTRACTS.MAINNET; +export const CORE_BRIDGE_PID = new PublicKey(WORMHOLE_CONTRACTS.solana.core); + +export const TOKEN_ROUTER_PID = new PublicKey("TokenRouter11111111111111111111111111111111"); + +export const LOCALHOST = "http://localhost:8899"; + +export const PAYER_KEYPAIR = Keypair.fromSecretKey( + Buffer.from( + "7037e963e55b4455cf3f0a2e670031fa16bd1ea79d921a94af9bd46856b6b9c00c1a5886fe1093df9fc438c296f9f7275b7718b6bc0e156d8d336c58f083996d", + "hex" + ) +); + +export const GOVERNANCE_EMITTER_ADDRESS = new PublicKey("11111111111111111111111111111115"); + +export const MOCK_GUARDIANS = new MockGuardians(0, [ + "cfb12303a19cde580bb4dd771639b0d26bc68353645571a8cff516ab2ee113a0", +]); + +export const USDC_MINT_ADDRESS = new PublicKey("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); diff --git a/solana/ts/tests/helpers/index.ts b/solana/ts/tests/helpers/index.ts new file mode 100644 index 00000000..a64a0fde --- /dev/null +++ b/solana/ts/tests/helpers/index.ts @@ -0,0 +1,2 @@ +export * from "./consts"; +export * from "./utils"; diff --git a/solana/ts/tests/helpers/utils.ts b/solana/ts/tests/helpers/utils.ts new file mode 100644 index 00000000..009f31c1 --- /dev/null +++ b/solana/ts/tests/helpers/utils.ts @@ -0,0 +1,212 @@ +import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; +import { + AddressLookupTableAccount, + ConfirmOptions, + Connection, + Keypair, + PublicKey, + Signer, + TransactionInstruction, + TransactionMessage, + VersionedTransaction, +} from "@solana/web3.js"; +import { expect } from "chai"; +import { execSync } from "child_process"; +import { Err, Ok } from "ts-results"; +import { CORE_BRIDGE_PID } from "./consts"; +import { BN } from "@coral-xyz/anchor"; + +export function expectDeepEqual(a: T, b: T) { + expect(JSON.stringify(a)).to.equal(JSON.stringify(b)); +} + +async function confirmLatest(connection: Connection, signature: string) { + return connection.getLatestBlockhash().then(({ blockhash, lastValidBlockHeight }) => + connection.confirmTransaction( + { + blockhash, + lastValidBlockHeight, + signature, + }, + "confirmed" + ) + ); +} + +export async function expectIxOk( + connection: Connection, + instructions: TransactionInstruction[], + signers: Signer[], + options: { + addressLookupTableAccounts?: AddressLookupTableAccount[]; + confirmOptions?: ConfirmOptions; + } = {} +) { + const { addressLookupTableAccounts, confirmOptions } = options; + return debugSendAndConfirmTransaction(connection, instructions, signers, { + addressLookupTableAccounts, + logError: true, + confirmOptions, + }).then((result) => result.unwrap()); +} + +export async function expectIxErr( + connection: Connection, + instructions: TransactionInstruction[], + signers: Signer[], + expectedError: string, + options: { + addressLookupTableAccounts?: AddressLookupTableAccount[]; + confirmOptions?: ConfirmOptions; + } = {} +) { + const { addressLookupTableAccounts, confirmOptions } = options; + const errorMsg = await debugSendAndConfirmTransaction(connection, instructions, signers, { + addressLookupTableAccounts, + logError: false, + confirmOptions, + }).then((result) => { + if (result.err) { + return result.toString(); + } else { + throw new Error("Expected transaction to fail"); + } + }); + try { + expect(errorMsg).includes(expectedError); + } catch (err) { + console.log(errorMsg); + throw err; + } +} + +export async function expectIxOkDetails( + connection: Connection, + ixs: TransactionInstruction[], + signers: Signer[], + options: { + addressLookupTableAccounts?: AddressLookupTableAccount[]; + confirmOptions?: ConfirmOptions; + } = {} +) { + const txSig = await expectIxOk(connection, ixs, signers, options); + await confirmLatest(connection, txSig); + return connection.getTransaction(txSig, { + commitment: "confirmed", + maxSupportedTransactionVersion: 0, + }); +} + +async function debugSendAndConfirmTransaction( + connection: Connection, + instructions: TransactionInstruction[], + signers: Signer[], + options: { + addressLookupTableAccounts?: AddressLookupTableAccount[]; + logError?: boolean; + confirmOptions?: ConfirmOptions; + } = {} +) { + const { logError, confirmOptions, addressLookupTableAccounts } = options; + + const latestBlockhash = await connection.getLatestBlockhash(); + + const messageV0 = new TransactionMessage({ + payerKey: signers[0].publicKey, + recentBlockhash: latestBlockhash.blockhash, + instructions, + }).compileToV0Message(addressLookupTableAccounts); + + const tx = new VersionedTransaction(messageV0); + + // sign your transaction with the required `Signers` + tx.sign(signers); + + return connection + .sendTransaction(tx, confirmOptions) + .then(async (signature) => { + await connection.confirmTransaction( + { + signature, + ...latestBlockhash, + }, + confirmOptions === undefined ? "confirmed" : confirmOptions.commitment + ); + return new Ok(signature); + }) + .catch((err) => { + if (logError) { + console.log(err); + } + if (err.logs !== undefined) { + const logs: string[] = err.logs; + return new Err(logs.join("\n")); + } else { + return new Err(err.message); + } + }); +} + +export async function postVaa( + connection: Connection, + payer: Keypair, + vaaBuf: Buffer, + coreBridgeAddress?: PublicKey +) { + await postVaaSolana( + connection, + new wormSolana.NodeWallet(payer).signTransaction, + coreBridgeAddress ?? CORE_BRIDGE_PID, + payer.publicKey, + vaaBuf + ); +} + +export function loadProgramBpf(artifactPath: string, bufferAuthority: PublicKey): PublicKey { + // Write keypair to temporary file. + const keypath = `${__dirname}/../keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json`; + + // Invoke BPF Loader Upgradeable `write-buffer` instruction. + const buffer = (() => { + const output = execSync(`solana -u l -k ${keypath} program write-buffer ${artifactPath}`); + const pubkeyStr = output.toString().match(/^.{8}([A-Za-z0-9]+)/); + if (pubkeyStr === null) { + throw new Error("Could not parse pubkey from output"); + } + return new PublicKey(pubkeyStr); + })(); + + // Invoke BPF Loader Upgradeable `set-buffer-authority` instruction. + execSync( + `solana -k ${keypath} program set-buffer-authority ${buffer.toString()} --new-buffer-authority ${bufferAuthority.toString()} -u localhost` + ); + + // Return the pubkey for the buffer (our new program implementation). + return buffer; +} + +export function getRandomInt(min: number, max: number) { + min = Math.ceil(min); + max = Math.floor(max); + + // The maximum is exclusive and the minimum is inclusive. + return Math.floor(Math.random() * (max - min) + min); +} + +export function getRandomBN(numBytes: number, range?: { min: BN; max: BN }) { + const base = new BN(getRandomInt(1, 256)).pow(new BN(getRandomInt(1, numBytes))).subn(1); + if (range === undefined) { + return new BN(base.toArray("le", numBytes), undefined, "le"); + } else { + const absMax = new BN(256).pow(new BN(numBytes)).subn(1); + const { min, max } = range; + if (max.sub(min).lten(0)) { + throw new Error("max must be greater than min"); + } else if (max.gt(absMax)) { + throw new Error(`max must be less than 256 ** ${numBytes}`); + } + + const result = min.mul(absMax).add(max.sub(min).mul(base)).div(absMax); + return new BN(result.toArray("le", numBytes), undefined, "le"); + } +} diff --git a/solana/ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json b/solana/ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json new file mode 100644 index 00000000..3e28fb44 --- /dev/null +++ b/solana/ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json @@ -0,0 +1 @@ +[112,55,233,99,229,91,68,85,207,63,10,46,103,0,49,250,22,189,30,167,157,146,26,148,175,155,212,104,86,182,185,192,12,26,88,134,254,16,147,223,159,196,56,194,150,249,247,39,91,119,24,182,188,14,21,109,141,51,108,88,240,131,153,109] \ No newline at end of file diff --git a/solana/tsconfig.json b/solana/tsconfig.json new file mode 100644 index 00000000..308cf8a5 --- /dev/null +++ b/solana/tsconfig.json @@ -0,0 +1,12 @@ +{ + "compilerOptions": { + "types": ["mocha", "chai"], + "typeRoots": ["./node_modules/@types"], + "lib": ["es2020"], + "module": "commonjs", + "target": "es2020", + "strict": true, + "resolveJsonModule": true, + "esModuleInterop": true + } +} From 0b06ea71cd5e70aaba124bc6f26966095c6f4057 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 8 Jan 2024 16:41:11 -0600 Subject: [PATCH 002/126] solana: add matching engine program --- solana/Anchor.toml | 6 +- solana/Cargo.lock | 45 +-- solana/Cargo.toml | 6 +- solana/Makefile | 6 +- .../Cargo.toml | 8 +- .../README.md | 0 .../Xargo.toml | 0 .../programs/matching-engine/src/constants.rs | 13 + solana/programs/matching-engine/src/error.rs | 50 +++ solana/programs/matching-engine/src/lib.rs | 46 +++ .../processor/admin/add_router_endpoint.rs | 9 +- .../src/processor/admin/initialize.rs | 50 ++- .../src/processor/admin/mod.rs | 13 +- .../processor/admin/update_fee_recipient.rs | 44 +++ .../matching-engine/src/processor/mod.rs | 2 + .../matching-engine/src/state/custodian.rs | 50 +++ .../src/state/mod.rs | 0 .../src/state/payer_sequence.rs | 0 .../src/state/router_endpoint.rs | 0 solana/programs/token-router/src/constants.rs | 10 - solana/programs/token-router/src/error.rs | 164 ---------- solana/programs/token-router/src/lib.rs | 191 ------------ solana/programs/token-router/src/messages.rs | 89 ------ .../ownership_transfer_request/cancel.rs | 25 -- .../ownership_transfer_request/confirm.rs | 29 -- .../admin/ownership_transfer_request/mod.rs | 8 - .../ownership_transfer_request/submit.rs | 34 -- .../src/processor/admin/set_pause.rs | 26 -- .../src/processor/admin/update/mod.rs | 2 - .../processor/admin/update/owner_assistant.rs | 31 -- .../processor/complete_transfer_with_relay.rs | 223 -------------- .../token-router/src/processor/mod.rs | 8 - .../src/processor/old_inbound/mod.rs | 150 --------- .../src/processor/old_inbound/native.rs | 278 ----------------- .../src/processor/old_inbound/wrapped.rs | 225 -------------- .../processor/transfer_tokens_with_relay.rs | 291 ------------------ .../token-router/src/state/custodian.rs | 29 -- 37 files changed, 286 insertions(+), 1875 deletions(-) rename solana/programs/{token-router => matching-engine}/Cargo.toml (71%) rename solana/programs/{token-router => matching-engine}/README.md (100%) rename solana/programs/{token-router => matching-engine}/Xargo.toml (100%) create mode 100644 solana/programs/matching-engine/src/constants.rs create mode 100644 solana/programs/matching-engine/src/error.rs create mode 100644 solana/programs/matching-engine/src/lib.rs rename solana/programs/{token-router => matching-engine}/src/processor/admin/add_router_endpoint.rs (84%) rename solana/programs/{token-router => matching-engine}/src/processor/admin/initialize.rs (59%) rename solana/programs/{token-router => matching-engine}/src/processor/admin/mod.rs (59%) create mode 100644 solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs create mode 100644 solana/programs/matching-engine/src/processor/mod.rs create mode 100644 solana/programs/matching-engine/src/state/custodian.rs rename solana/programs/{token-router => matching-engine}/src/state/mod.rs (100%) rename solana/programs/{token-router => matching-engine}/src/state/payer_sequence.rs (100%) rename solana/programs/{token-router => matching-engine}/src/state/router_endpoint.rs (100%) delete mode 100644 solana/programs/token-router/src/constants.rs delete mode 100644 solana/programs/token-router/src/error.rs delete mode 100644 solana/programs/token-router/src/lib.rs delete mode 100644 solana/programs/token-router/src/messages.rs delete mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs delete mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs delete mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs delete mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs delete mode 100644 solana/programs/token-router/src/processor/admin/set_pause.rs delete mode 100644 solana/programs/token-router/src/processor/admin/update/mod.rs delete mode 100644 solana/programs/token-router/src/processor/admin/update/owner_assistant.rs delete mode 100644 solana/programs/token-router/src/processor/complete_transfer_with_relay.rs delete mode 100644 solana/programs/token-router/src/processor/mod.rs delete mode 100644 solana/programs/token-router/src/processor/old_inbound/mod.rs delete mode 100644 solana/programs/token-router/src/processor/old_inbound/native.rs delete mode 100644 solana/programs/token-router/src/processor/old_inbound/wrapped.rs delete mode 100644 solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs delete mode 100644 solana/programs/token-router/src/state/custodian.rs diff --git a/solana/Anchor.toml b/solana/Anchor.toml index 5f847a7f..d3bf7dde 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -8,11 +8,11 @@ skip-lint = false [workspace] members = [ - "programs/token-router" + "programs/matching-engine" ] [programs.localnet] -token_router = "TokenRouter11111111111111111111111111111111" +matching_engine = "MatchingEngine11111111111111111111111111111" [registry] url = "https://api.apr.dev" @@ -22,7 +22,7 @@ cluster = "Localnet" wallet = "ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json" [scripts] -test = "npx ts-mocha -p ./tsconfig.json -t 1000000 ts/tests/[0-9]*.ts" +test = "npx ts-mocha -p ./tsconfig.json -t 1000000 ts/tests/[2-9]*.ts" [test] startup_wait = 16000 diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 147b74d2..dd3c762f 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1192,6 +1192,20 @@ version = "0.4.20" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "b5e6163cb8c49088c2c36f57875e58ccd8c87c7427f7fbd50ea6710b2f3f2e8f" +[[package]] +name = "matching-engine" +version = "0.0.0" +dependencies = [ + "anchor-lang", + "anchor-spl", + "cfg-if", + "hex", + "hex-literal", + "ruint", + "solana-program", + "wormhole-cctp-solana", +] + [[package]] name = "memchr" version = "2.6.4" @@ -2123,20 +2137,6 @@ version = "0.1.1" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "1f3ccbac311fea05f86f61904b462b55fb3df8837a366dfc601a0161d0532f20" -[[package]] -name = "token-router" -version = "0.0.0" -dependencies = [ - "anchor-lang", - "anchor-spl", - "cfg-if", - "hex", - "hex-literal", - "ruint", - "solana-program", - "wormhole-cctp-solana", -] - [[package]] name = "toml" version = "0.5.11" @@ -2391,9 +2391,9 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.0.0-alpha.12" +version = "0.0.1-alpha.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5c68dee99fb7bba33193d5ddebda340b6c7d07fc94de9891abecfa61c8814ad7" +checksum = "8f7b206512564544ef2fb96f63603de0312d9c8969e1ea16308dee557a426ed2" dependencies = [ "anchor-lang", "anchor-spl", @@ -2402,14 +2402,15 @@ dependencies = [ "ruint", "solana-program", "wormhole-core-bridge-solana", + "wormhole-io", "wormhole-raw-vaas", ] [[package]] name = "wormhole-core-bridge-solana" -version = "0.0.1-alpha.3" +version = "0.0.1-alpha.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "22222ab2f60cd584afb647a98c53242a772d850d0b1b2b0792b0aa5d59ab8d95" +checksum = "67e09e0f43aad69344d16abbd9304870bd8aa2d88cc974417aa8be6463e8552c" dependencies = [ "anchor-lang", "cfg-if", @@ -2422,15 +2423,15 @@ dependencies = [ [[package]] name = "wormhole-io" -version = "0.1.0" +version = "0.1.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "6926b6a0b383df50bbb0d0b11378b6d0cf4f606e8386fb624472b7f9a90e830f" +checksum = "4965f46f7a99debe3c2cf9337c6e3eb7068da348aecf074a3e35686937f25c65" [[package]] name = "wormhole-raw-vaas" -version = "0.0.1-alpha.2" +version = "0.1.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1cb59754ad91d99c0e3d7d159fffcbb4087c18a1c13b1b2a945775635ef9bd03" +checksum = "70807fcb111008fb8db7c5818907940f5b0b3da80d2b42f9b2ce6d3e040a8f03" dependencies = [ "ruint", "ruint-macro", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 4c843dd7..28e4ca1b 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -3,10 +3,8 @@ members = [ "programs/*" ] -[workspace.dependencies.wormhole-cctp-program] -package = "wormhole-cctp-solana" -version = "0.0.0-alpha.12" -features = ["cpi"] +[workspace.dependencies.wormhole-cctp-solana] +version = "0.0.1-alpha.1" default-features = false [workspace.dependencies.anchor-lang] diff --git a/solana/Makefile b/solana/Makefile index 3f8fcdee..844b2344 100644 --- a/solana/Makefile +++ b/solana/Makefile @@ -22,15 +22,15 @@ node_modules: build: $(out_$(NETWORK)) $(out_$(NETWORK)): ifdef out_$(NETWORK) - anchor build -p token_router --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features + anchor build -p matching_engine --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features mkdir -p $(out_$(NETWORK)) cp target/deploy/*.so $(out_$(NETWORK))/ endif test: node_modules cargo test --all-features - anchor build -p token_router --arch sbf -- --features testnet - mkdir -p ts/tests/artifacts && cp target/deploy/token_router.so ts/tests/artifacts/testnet_token_router.so + anchor build -p matching_engine --arch sbf -- --features testnet + mkdir -p ts/tests/artifacts && cp target/deploy/matching_engine.so ts/tests/artifacts/testnet_matching_engine.so anchor build --arch sbf -- --features integration-test anchor test --skip-build diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/matching-engine/Cargo.toml similarity index 71% rename from solana/programs/token-router/Cargo.toml rename to solana/programs/matching-engine/Cargo.toml index 7287d512..a812c4b4 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -1,7 +1,7 @@ [package] -name = "token-router" +name = "matching-engine" version = "0.0.0" -description = "Example Token Router Program" +description = "Example Matching Engine Program" edition = "2021" [lib] @@ -13,11 +13,11 @@ no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["wormhole-cctp-program/testnet"] +testnet = ["wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] -wormhole-cctp-program.workspace = true +wormhole-cctp-solana = { workspace = true, features = ["cpi"] } anchor-lang.workspace = true anchor-spl.workspace = true solana-program.workspace = true diff --git a/solana/programs/token-router/README.md b/solana/programs/matching-engine/README.md similarity index 100% rename from solana/programs/token-router/README.md rename to solana/programs/matching-engine/README.md diff --git a/solana/programs/token-router/Xargo.toml b/solana/programs/matching-engine/Xargo.toml similarity index 100% rename from solana/programs/token-router/Xargo.toml rename to solana/programs/matching-engine/Xargo.toml diff --git a/solana/programs/matching-engine/src/constants.rs b/solana/programs/matching-engine/src/constants.rs new file mode 100644 index 00000000..596e02b6 --- /dev/null +++ b/solana/programs/matching-engine/src/constants.rs @@ -0,0 +1,13 @@ +use anchor_lang::prelude::constant; + +/// Seed for custody token account. +#[constant] +pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; + +/// Nonce for outbound messages. +#[constant] +pub const NONCE: u32 = 0; + +/// Fee precison max. +#[constant] +pub const FEE_PRECISION_MAX: u32 = 1_000_000; \ No newline at end of file diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs new file mode 100644 index 00000000..e0dec13e --- /dev/null +++ b/solana/programs/matching-engine/src/error.rs @@ -0,0 +1,50 @@ +use anchor_lang::prelude::error_code; + +#[error_code] +pub enum MatchingEngineError { + #[msg("AssistantZeroPubkey")] + AssistantZeroPubkey = 0x100, + + #[msg("FeeRecipientZeroPubkey")] + FeeRecipientZeroPubkey = 0x101, + + /// Only the program's owner is permitted. + #[msg("OwnerOnly")] + OwnerOnly = 0x200, + + #[msg("InvalidNewAssistant")] + InvalidNewAssistant = 0x208, + + #[msg("InvalidNewFeeRecipient")] + InvalidNewFeeRecipient = 0x20a, + + #[msg("InvalidChain")] + InvalidChain = 0x20c, + + #[msg("OwnerOrAssistantOnly")] + // Only the program's owner or assistant is permitted. + OwnerOrAssistantOnly, + + #[msg("ChainNotAllowed")] + ChainNotAllowed, + + #[msg("InvalidEndpoint")] + /// Specified foreign contract has a bad chain ID or zero address. + InvalidEndpoint, + + #[msg("AlreadyTheFeeRecipient")] + /// The specified account is already the fee recipient. + AlreadyTheFeeRecipient, + + #[msg("InvalidAuctionDuration")] + /// The auction duration is zero. + InvalidAuctionDuration, + + #[msg("InvalidAuctionGracePeriod")] + /// The auction grace period is less than the `auction_duration`. + InvalidAuctionGracePeriod, + + #[msg("ValueLargerThanMaxPrecision")] + /// The value is larger than the maximum precision constant. + ValueLargerThanMaxPrecision, +} diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs new file mode 100644 index 00000000..08c8002f --- /dev/null +++ b/solana/programs/matching-engine/src/lib.rs @@ -0,0 +1,46 @@ +#![doc = include_str!("../README.md")] +#![allow(clippy::result_large_err)] + +pub mod constants; + +pub mod error; + +mod processor; +pub(crate) use processor::*; + +pub mod state; +use crate::state::AuctionConfig; + +use anchor_lang::prelude::*; + +cfg_if::cfg_if! { + if #[cfg(feature = "mainnet")] { + // Placeholder. + declare_id!("MatchingEngine11111111111111111111111111111"); + } else if #[cfg(feature = "testnet")] { + // Placeholder. + declare_id!("MatchingEngine11111111111111111111111111111"); + } +} + +#[program] +pub mod matching_engine { + use super::*; + + /// This instruction is be used to generate your program's config. + /// And for convenience, we will store Wormhole-related PDAs in the + /// config so we can verify these accounts with a simple == constraint. + pub fn initialize( + ctx: Context, + auction_config: AuctionConfig, + ) -> Result<()> { + processor::initialize(ctx, auction_config) + } + + pub fn add_router_endpoint( + ctx: Context, + args: AddRouterEndpointArgs, + ) -> Result<()> { + processor::add_router_endpoint(ctx, args) + } +} diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs similarity index 84% rename from solana/programs/token-router/src/processor/admin/add_router_endpoint.rs rename to solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs index 63c14599..28750e46 100644 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs @@ -1,9 +1,8 @@ use crate::{ - error::TokenRouterError, + error::MatchingEngineError, state::{Custodian, RouterEndpoint}, }; use anchor_lang::prelude::*; -use wormhole_cctp_program::sdk as wormhole_cctp; #[derive(Accounts)] #[instruction(chain: u16)] @@ -60,11 +59,11 @@ pub fn add_router_endpoint( fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { require!( - args.chain != 0 && args.chain != wormhole_cctp::SOLANA_CHAIN, - TokenRouterError::ChainNotAllowed + args.chain != 0 && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + MatchingEngineError::ChainNotAllowed ); - require!(args.address != [0; 32], TokenRouterError::InvalidEndpoint); + require!(args.address != [0; 32], MatchingEngineError::InvalidEndpoint); // Done. Ok(()) diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs similarity index 59% rename from solana/programs/token-router/src/processor/admin/initialize.rs rename to solana/programs/matching-engine/src/processor/admin/initialize.rs index a0815b5c..73f8efba 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -1,7 +1,9 @@ -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::MatchingEngineError, state::{Custodian, AuctionConfig}}; +use crate::constants::FEE_PRECISION_MAX; use anchor_lang::prelude::*; use solana_program::bpf_loader_upgradeable; + #[derive(Accounts)] pub struct Initialize<'info> { /// Owner of the program, who presumably deployed this program. @@ -15,19 +17,24 @@ pub struct Initialize<'info> { seeds = [Custodian::SEED_PREFIX], bump, )] - /// Sender Config account, which saves program data useful for other - /// instructions, specifically for outbound transfers. Also saves the payer - /// of the [`initialize`](crate::initialize) instruction as the program's - /// owner. + /// Custodian account, which saves program data useful for other + /// instructions. custodian: Account<'info, Custodian>, /// CHECK: This account must not be the zero pubkey. #[account( owner = Pubkey::default(), - constraint = owner_assistant.key() != Pubkey::default() @ TokenRouterError::AssistantZeroPubkey + constraint = owner_assistant.key() != Pubkey::default() @ MatchingEngineError::AssistantZeroPubkey )] owner_assistant: AccountInfo<'info>, + /// CHECK: This account must not be the zero pubkey. + #[account( + owner = Pubkey::default(), + constraint = fee_recipient.key() != Pubkey::default() @ MatchingEngineError::FeeRecipientZeroPubkey + )] + fee_recipient: AccountInfo<'info>, + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the /// upgrade authority. We check this PDA address just in case there is another program that this /// deployer has deployed. @@ -49,15 +56,19 @@ pub struct Initialize<'info> { system_program: Program<'info, System>, } -pub fn initialize(ctx: Context) -> Result<()> { - let owner = ctx.accounts.owner.key(); +#[access_control(check_constraints(&config))] +pub fn initialize( + ctx: Context, + config: AuctionConfig, +) -> Result<()> { + let owner: Pubkey = ctx.accounts.owner.key(); ctx.accounts.custodian.set_inner(Custodian { bump: ctx.bumps["custodian"], - paused: false, - paused_set_by: owner, owner, pending_owner: None, owner_assistant: ctx.accounts.owner_assistant.key(), + fee_recipient: ctx.accounts.fee_recipient.key(), + auction_config: config }); #[cfg(not(feature = "integration-test"))] @@ -76,3 +87,22 @@ pub fn initialize(ctx: Context) -> Result<()> { // Done. Ok(()) } + +fn check_constraints(config: &AuctionConfig) -> Result<()> { + require!(config.auction_duration > 0, MatchingEngineError::InvalidAuctionDuration); + require!( + config.auction_grace_period > config.auction_duration, + MatchingEngineError::InvalidAuctionGracePeriod + ); + require!( + config.user_penalty_reward_bps <= FEE_PRECISION_MAX, + MatchingEngineError::ValueLargerThanMaxPrecision + ); + require!( + config.initial_penalty_bps <= FEE_PRECISION_MAX, + MatchingEngineError::ValueLargerThanMaxPrecision + ); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/mod.rs b/solana/programs/matching-engine/src/processor/admin/mod.rs similarity index 59% rename from solana/programs/token-router/src/processor/admin/mod.rs rename to solana/programs/matching-engine/src/processor/admin/mod.rs index dea764f6..c2c6e7cb 100644 --- a/solana/programs/token-router/src/processor/admin/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/mod.rs @@ -4,16 +4,7 @@ pub use add_router_endpoint::*; mod initialize; pub use initialize::*; -mod ownership_transfer_request; -pub use ownership_transfer_request::*; - -mod set_pause; -pub use set_pause::*; - -mod update; -pub use update::*; - -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; pub(self) fn require_owner_or_assistant( @@ -22,7 +13,7 @@ pub(self) fn require_owner_or_assistant( ) -> Result { require!( *caller.key == custodian.owner || *caller.key == custodian.owner_assistant, - TokenRouterError::OwnerOrAssistantOnly + MatchingEngineError::OwnerOrAssistantOnly ); Ok(true) diff --git a/solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs b/solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs new file mode 100644 index 00000000..ed877b44 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs @@ -0,0 +1,44 @@ +use crate::{ + error::MatchingEngineError, + state::Custodian, +}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct UpdateFeeRecipient<'info> { + #[account( + mut, + constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + system_program: Program<'info, System>, +} + +pub fn update_fee_recipient( + ctx: Context, + new_fee_recipient: Pubkey, +) -> Result<()> { + require_keys_neq!( + new_fee_recipient, + Pubkey::default(), + MatchingEngineError::FeeRecipientZeroPubkey + ); + require_keys_neq!( + new_fee_recipient, + ctx.accounts.custodian.fee_recipient, + TokenBridgeRelayerError::AlreadyTheFeeRecipient + ); + + // Update the fee_recipient key. + let custodian = &mut ctx.accounts.custodian; + custodian.fee_recipient = new_fee_recipient; + + Ok(()) +} \ No newline at end of file diff --git a/solana/programs/matching-engine/src/processor/mod.rs b/solana/programs/matching-engine/src/processor/mod.rs new file mode 100644 index 00000000..34989d94 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/mod.rs @@ -0,0 +1,2 @@ +mod admin; +pub use admin::*; \ No newline at end of file diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs new file mode 100644 index 00000000..b4c414ae --- /dev/null +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -0,0 +1,50 @@ +use anchor_lang::prelude::*; + +#[derive(AnchorSerialize, AnchorDeserialize, Clone, Debug, InitSpace)] +pub struct AuctionConfig { + // The percentage of the penalty that is awarded to the user when the auction is completed. + pub user_penalty_reward_bps: u32, + + // The initial penalty percentage that is incurred once the grace period is over. + pub initial_penalty_bps: u32, + + // The duration of the auction in blocks. About 500ms on Solana. + pub auction_duration: u16, + + /** + * The grace period of the auction in blocks. This is the number of blocks the highest bidder + * has to execute the fast order before incurring a penalty. About 15 seconds on Avalanche. + * This value INCLUDES the `_auctionDuration`. + */ + pub auction_grace_period: u16, + + // The `securityDeposit` decays over the `penaltyBlocks` blocks period. + pub auction_penalty_blocks: u16, +} + +#[account] +#[derive(Debug, InitSpace)] +pub struct Custodian { + pub bump: u8, + + /// Program's owner. + pub owner: Pubkey, + pub pending_owner: Option, + + /// Program's assistant. + pub owner_assistant: Pubkey, + + // Recipient of `SlowOrderResponse` relay fees. + pub fee_recipient: Pubkey, + + /// Auction config. + pub auction_config: AuctionConfig, +} + +impl Custodian { + pub const SEED_PREFIX: &'static [u8] = b"custodian"; + + pub fn is_authorized(&self, key: &Pubkey) -> bool { + self.owner == *key || self.owner_assistant == *key + } +} diff --git a/solana/programs/token-router/src/state/mod.rs b/solana/programs/matching-engine/src/state/mod.rs similarity index 100% rename from solana/programs/token-router/src/state/mod.rs rename to solana/programs/matching-engine/src/state/mod.rs diff --git a/solana/programs/token-router/src/state/payer_sequence.rs b/solana/programs/matching-engine/src/state/payer_sequence.rs similarity index 100% rename from solana/programs/token-router/src/state/payer_sequence.rs rename to solana/programs/matching-engine/src/state/payer_sequence.rs diff --git a/solana/programs/token-router/src/state/router_endpoint.rs b/solana/programs/matching-engine/src/state/router_endpoint.rs similarity index 100% rename from solana/programs/token-router/src/state/router_endpoint.rs rename to solana/programs/matching-engine/src/state/router_endpoint.rs diff --git a/solana/programs/token-router/src/constants.rs b/solana/programs/token-router/src/constants.rs deleted file mode 100644 index 4e0b9492..00000000 --- a/solana/programs/token-router/src/constants.rs +++ /dev/null @@ -1,10 +0,0 @@ -use anchor_lang::prelude::constant; - -/// Swap rate precision. This value should NEVER change, unless other Token -/// Bridge Relayer contracts are deployed with a different precision. -#[constant] -pub const NATIVE_SWAP_RATE_PRECISION: u128 = u128::pow(10, 8); - -/// Seed for custody token account. -#[constant] -pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs deleted file mode 100644 index 291cd808..00000000 --- a/solana/programs/token-router/src/error.rs +++ /dev/null @@ -1,164 +0,0 @@ -use anchor_lang::prelude::error_code; - -#[error_code] -pub enum TokenRouterError { - #[msg("AssistantZeroPubkey")] - AssistantZeroPubkey = 0x100, - - #[msg("FeeRecipientZeroPubkey")] - FeeRecipientZeroPubkey = 0x102, - - /// Only the program's owner is permitted. - #[msg("OwnerOnly")] - OwnerOnly = 0x200, - - #[msg("InvalidNewOwner")] - InvalidNewOwner = 0x202, - - /// Specified key is already the program's owner. - #[msg("AlreadyOwner")] - AlreadyOwner = 0x204, - - #[msg("NoTransferOwnershipRequest")] - NoTransferOwnershipRequest = 0x206, - - #[msg("InvalidNewAssistant")] - InvalidNewAssistant = 0x208, - - #[msg("InvalidNewFeeRecipient")] - InvalidNewFeeRecipient = 0x20a, - - #[msg("InvalidChain")] - InvalidChain = 0x20c, - - #[msg("OutboundTransfersPaused")] - /// Outbound transfers are paused. - OutboundTransfersPaused, - - #[msg("OwnerOrAssistantOnly")] - // Only the program's owner or assistant is permitted. - OwnerOrAssistantOnly, - - #[msg("NotPendingOwner")] - /// Only the program's pending owner is permitted. - NotPendingOwner, - - #[msg("AlreadyTheFeeRecipient")] - /// Specified key is already the program's fee recipient. - AlreadyTheFeeRecipient, - - #[msg("BumpNotFound")] - /// Bump not found in `bumps` map. - BumpNotFound, - - #[msg("FailedToMakeImmutable")] - /// Failed to make program immutable. - FailedToMakeImmutable, - - #[msg("InvalidEndpoint")] - /// Specified foreign contract has a bad chain ID or zero address. - InvalidEndpoint, - - #[msg("ChainNotAllowed")] - ChainNotAllowed, - - #[msg("ZeroBridgeAmount")] - /// Nothing to transfer if amount is zero. - ZeroBridgeAmount, - - #[msg("InvalidToNativeAmount")] - /// Must be strictly zero or nonzero when normalized. - InvalidToNativeAmount, - - #[msg("NativeMintRequired")] - /// Must be the native mint. - NativeMintRequired, - - #[msg("SwapsNotAllowedForNativeMint")] - /// Swaps are not allowed for the native mint. - SwapsNotAllowedForNativeMint, - - #[msg("InvalidTokenBridgeConfig")] - /// Specified Token Bridge config PDA is wrong. - InvalidTokenBridgeConfig, - - #[msg("InvalidTokenBridgeAuthoritySigner")] - /// Specified Token Bridge authority signer PDA is wrong. - InvalidTokenBridgeAuthoritySigner, - - #[msg("InvalidTokenBridgeCustodySigner")] - /// Specified Token Bridge custody signer PDA is wrong. - InvalidTokenBridgeCustodySigner, - - #[msg("InvalidTokenBridgeEmitter")] - /// Specified Token Bridge emitter PDA is wrong. - InvalidTokenBridgeEmitter, - - #[msg("InvalidTokenBridgeSequence")] - /// Specified Token Bridge sequence PDA is wrong. - InvalidTokenBridgeSequence, - - #[msg("InvalidRecipient")] - /// Specified recipient has a bad chain ID or zero address. - InvalidRecipient, - - #[msg("InvalidTransferToChain")] - /// Deserialized token chain is invalid. - InvalidTransferToChain, - - #[msg("InvalidTransferTokenChain")] - /// Deserialized recipient chain is invalid. - InvalidTransferTokenChain, - - #[msg("InvalidPrecision")] - /// Relayer fee and swap rate precision must be nonzero. - InvalidPrecision, - - #[msg("InvalidTransferToAddress")] - /// Deserialized recipient must be this program or the redeemer PDA. - InvalidTransferToAddress, - - #[msg("AlreadyRedeemed")] - /// Token Bridge program's transfer is already redeemed. - AlreadyRedeemed, - - #[msg("InvalidTokenBridgeForeignEndpoint")] - /// Token Bridge program's foreign endpoint disagrees with registered one. - InvalidTokenBridgeForeignEndpoint, - - #[msg("InvalidTokenBridgeMintAuthority")] - /// Specified Token Bridge mint authority PDA is wrong. - InvalidTokenBridgeMintAuthority, - - #[msg("InvalidPublicKey")] - /// Pubkey is the default. - InvalidPublicKey, - - #[msg("ZeroSwapRate")] - /// Swap rate is zero. - ZeroSwapRate, - - #[msg("TokenNotRegistered")] - /// Token is not registered. - TokenNotRegistered, - - #[msg("ChainNotRegistered")] - /// Foreign contract not registered for specified chain. - ChainNotRegistered, - - #[msg("TokenAlreadyRegistered")] - /// Token is already registered. - TokenAlreadyRegistered, - - #[msg("TokenFeeCalculationError")] - /// Token fee overflow. - FeeCalculationError, - - #[msg("InvalidSwapCalculation")] - /// Swap calculation overflow. - InvalidSwapCalculation, - - #[msg("InsufficientFunds")] - /// Insufficient funds for outbound transfer. - InsufficientFunds, -} diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs deleted file mode 100644 index b71ea844..00000000 --- a/solana/programs/token-router/src/lib.rs +++ /dev/null @@ -1,191 +0,0 @@ -#![doc = include_str!("../README.md")] -#![allow(clippy::result_large_err)] - -pub mod constants; - -pub mod error; - -pub mod messages; - -mod processor; -pub(crate) use processor::*; - -pub mod state; - -use anchor_lang::prelude::*; - -cfg_if::cfg_if! { - if #[cfg(feature = "mainnet")] { - // Placeholder. - declare_id!("TokenRouter11111111111111111111111111111111"); - } else if #[cfg(feature = "testnet")] { - // Placeholder. - declare_id!("TokenRouter11111111111111111111111111111111"); - } -} - -#[program] -pub mod token_router { - use super::*; - - /// This instruction is be used to generate your program's config. - /// And for convenience, we will store Wormhole-related PDAs in the - /// config so we can verify these accounts with a simple == constraint. - pub fn initialize(ctx: Context) -> Result<()> { - processor::initialize(ctx) - } - - // /// This instruction is used to transfer native tokens from Solana to a - // /// foreign blockchain. The user can optionally specify a - // /// `to_native_token_amount` to swap some of the tokens for the native - // /// asset on the target chain. For a fee, an off-chain relayer will redeem - // /// the transfer on the target chain. If the user is transferring native - // /// SOL, the contract will automatically wrap the lamports into a WSOL. - // /// - // /// # Arguments - // /// - // /// * `ctx` - `TransferNativeWithRelay` context - // /// * `amount` - Amount of tokens to send - // /// * `to_native_token_amount`: - // /// - Amount of tokens to swap for native assets on the target chain - // /// * `recipient_chain` - Chain ID of the target chain - // /// * `recipient_address` - Address of the target wallet on the target chain - // /// * `batch_id` - Nonce of Wormhole message - // /// * `wrap_native` - Whether to wrap native SOL - // pub fn transfer_tokens_with_relay( - // ctx: Context, - // args: TransferTokensWithRelayArgs, - // ) -> Result<()> { - // processor::transfer_tokens_with_relay(ctx, args) - // } - - // Admin. - - /// This instruction sets the `pending_owner` field in the `OwnerConfig` - /// account. This instruction is owner-only, meaning that only the owner - /// of the program (defined in the [Config] account) can submit an - /// ownership transfer request. - pub fn submit_ownership_transfer_request( - ctx: Context, - ) -> Result<()> { - processor::submit_ownership_transfer_request(ctx) - } - - /// This instruction confirms that the `pending_owner` is the signer of - /// the transaction and updates the `owner` field in the `SenderConfig`, - /// `RedeemerConfig`, and `OwnerConfig` accounts. - pub fn confirm_ownership_transfer_request( - ctx: Context, - ) -> Result<()> { - processor::confirm_ownership_transfer_request(ctx) - } - - /// This instruction cancels the ownership transfer request by setting - /// the `pending_owner` field in the `OwnerConfig` account to `None`. - /// This instruction is owner-only, meaning that only the owner of the - /// program (defined in the [Config] account) can cancel an ownership - /// transfer request. - pub fn cancel_ownership_transfer_request( - ctx: Context, - ) -> Result<()> { - processor::cancel_ownership_transfer_request(ctx) - } - - /// This instruction updates the `assistant` field in the `OwnerConfig` - /// account. This instruction is owner-only, meaning that only the owner - /// of the program (defined in the [Config] account) can update the - /// assistant. - pub fn update_owner_assistant(ctx: Context) -> Result<()> { - processor::update_owner_assistant(ctx) - } - - pub fn add_router_endpoint( - ctx: Context, - args: AddRouterEndpointArgs, - ) -> Result<()> { - processor::add_router_endpoint(ctx, args) - } - - /// This instruction updates the `paused` boolean in the `SenderConfig` - /// account. This instruction is owner-only, meaning that only the owner - /// of the program (defined in the [Config] account) can pause outbound - /// transfers. - /// - /// # Arguments - /// - /// * `ctx` - `SetPause` context - /// * `paused` - Boolean indicating whether outbound transfers are paused. - pub fn set_pause(ctx: Context, paused: bool) -> Result<()> { - processor::set_pause(ctx, paused) - } - - // /// This instruction is used to transfer wrapped tokens from Solana to a - // /// foreign blockchain. The user can optionally specify a - // /// `to_native_token_amount` to swap some of the tokens for the native - // /// assets on the target chain. For a fee, an off-chain relayer will redeem - // /// the transfer on the target chain. This instruction should only be called - // /// when the user is transferring a wrapped token. - // /// - // /// # Arguments - // /// - // /// * `ctx` - `TransferWrappedWithRelay` context - // /// * `amount` - Amount of tokens to send - // /// * `to_native_token_amount`: - // /// - Amount of tokens to swap for native assets on the target chain - // /// * `recipient_chain` - Chain ID of the target chain - // /// * `recipient_address` - Address of the target wallet on the target chain - // /// * `batch_id` - Nonce of Wormhole message - // pub fn transfer_wrapped_tokens_with_relay( - // ctx: Context, - // amount: u64, - // to_native_token_amount: u64, - // recipient_chain: u16, - // recipient_address: [u8; 32], - // batch_id: u32, - // ) -> Result<()> { - // processor::transfer_wrapped_tokens_with_relay( - // ctx, - // amount, - // to_native_token_amount, - // recipient_chain, - // recipient_address, - // batch_id, - // ) - // } - - // /// This instruction is used to redeem token transfers from foreign emitters. - // /// It takes custody of the released native tokens and sends the tokens to the - // /// encoded `recipient`. It pays the `fee_recipient` in the token - // /// denomination. If requested by the user, it will perform a swap with the - // /// off-chain relayer to provide the user with lamports. If the token - // /// being transferred is WSOL, the contract will unwrap the WSOL and send - // /// the lamports to the recipient and pay the relayer in lamports. - // /// - // /// # Arguments - // /// - // /// * `ctx` - `CompleteNativeWithRelay` context - // /// * `vaa_hash` - Hash of the VAA that triggered the transfer - // pub fn complete_native_transfer_with_relay( - // ctx: Context, - // _vaa_hash: [u8; 32], - // ) -> Result<()> { - // processor::complete_native_transfer_with_relay(ctx, _vaa_hash) - // } - - // /// This instruction is used to redeem token transfers from foreign emitters. - // /// It takes custody of the minted wrapped tokens and sends the tokens to the - // /// encoded `recipient`. It pays the `fee_recipient` in the wrapped-token - // /// denomination. If requested by the user, it will perform a swap with the - // /// off-chain relayer to provide the user with lamports. - // /// - // /// # Arguments - // /// - // /// * `ctx` - `CompleteWrappedWithRelay` context - // /// * `vaa_hash` - Hash of the VAA that triggered the transfer - // pub fn complete_wrapped_transfer_with_relay( - // ctx: Context, - // _vaa_hash: [u8; 32], - // ) -> Result<()> { - // processor::complete_wrapped_transfer_with_relay(ctx, _vaa_hash) - // } -} diff --git a/solana/programs/token-router/src/messages.rs b/solana/programs/token-router/src/messages.rs deleted file mode 100644 index c32ad5be..00000000 --- a/solana/programs/token-router/src/messages.rs +++ /dev/null @@ -1,89 +0,0 @@ -//! Messages relevant to the Token Router across all networks. These messages are serialized and -//! then published via the Wormhole CCTP program. - -use ruint::aliases::U256; -use wormhole_cctp_program::sdk::io::{Readable, TypePrefixedPayload, Writeable}; - -#[derive(Debug, Clone, PartialEq, Eq)] -pub struct TransferTokensWithRelay { - pub target_relayer_fee: U256, - pub to_native_token_amount: U256, - pub target_recipient_wallet: [u8; 32], -} - -impl Readable for TransferTokensWithRelay { - const SIZE: Option = Some(32 + 32 + 32); - - fn read(reader: &mut R) -> std::io::Result - where - Self: Sized, - R: std::io::Read, - { - Ok(Self { - target_relayer_fee: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, - to_native_token_amount: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, - target_recipient_wallet: Readable::read(reader)?, - }) - } -} - -impl Writeable for TransferTokensWithRelay { - fn written_size(&self) -> usize { - ::SIZE.unwrap() - } - - fn write(&self, writer: &mut W) -> std::io::Result<()> - where - Self: Sized, - W: std::io::Write, - { - self.target_relayer_fee.to_be_bytes::<32>().write(writer)?; - self.to_native_token_amount - .to_be_bytes::<32>() - .write(writer)?; - self.target_recipient_wallet.write(writer)?; - Ok(()) - } -} - -impl TypePrefixedPayload for TransferTokensWithRelay { - const TYPE: Option = Some(1); -} - -#[cfg(test)] -mod test { - use hex_literal::hex; - - use super::*; - - #[test] - fn transfer_tokens_with_relay() { - let msg = TransferTokensWithRelay { - target_relayer_fee: U256::from(69u64), - to_native_token_amount: U256::from(420u64), - target_recipient_wallet: hex!( - "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" - ), - }; - - let mut bytes = Vec::with_capacity(msg.payload_written_size()); - msg.write_typed(&mut bytes).unwrap(); - assert_eq!(bytes.len(), msg.payload_written_size()); - assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); - - let mut cursor = std::io::Cursor::new(&mut bytes); - let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); - assert_eq!(recovered, msg); - } - - #[test] - fn invalid_message_type() { - let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); - - let mut cursor = std::io::Cursor::new(&mut bytes); - let err = TransferTokensWithRelay::read_typed(&mut cursor) - .err() - .unwrap(); - matches!(err.kind(), std::io::ErrorKind::InvalidData); - } -} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs deleted file mode 100644 index 711f6410..00000000 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs +++ /dev/null @@ -1,25 +0,0 @@ -use crate::{error::TokenRouterError, state::Custodian}; -use anchor_lang::prelude::*; - -#[derive(Accounts)] -pub struct CancelOwnershipTransferRequest<'info> { - owner: Signer<'info>, - - /// Custodian, which can only be modified by the configured owner. - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - has_one = owner @ TokenRouterError::OwnerOnly, - )] - custodian: Account<'info, Custodian>, -} - -pub fn cancel_ownership_transfer_request( - ctx: Context, -) -> Result<()> { - ctx.accounts.custodian.pending_owner = None; - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs deleted file mode 100644 index faad5568..00000000 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ /dev/null @@ -1,29 +0,0 @@ -use crate::{error::TokenRouterError, state::Custodian}; -use anchor_lang::prelude::*; - -#[derive(Accounts)] -pub struct ConfirmOwnershipTransferRequest<'info> { - /// Must be the pending owner of the program set in the [`OwnerConfig`] - /// account. - pending_owner: Signer<'info>, - - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - constraint = custodian.pending_owner.is_some() @ TokenRouterError::NoTransferOwnershipRequest, - constraint = custodian.pending_owner.unwrap() == pending_owner.key() @ TokenRouterError::NotPendingOwner, - )] - custodian: Account<'info, Custodian>, -} - -pub fn confirm_ownership_transfer_request( - ctx: Context, -) -> Result<()> { - let custodian = &mut ctx.accounts.custodian; - custodian.owner = ctx.accounts.pending_owner.key(); - custodian.pending_owner = None; - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs deleted file mode 100644 index c33a7ba7..00000000 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs +++ /dev/null @@ -1,8 +0,0 @@ -mod cancel; -pub use cancel::*; - -mod confirm; -pub use confirm::*; - -mod submit; -pub use submit::*; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs deleted file mode 100644 index d2521e43..00000000 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs +++ /dev/null @@ -1,34 +0,0 @@ -use crate::{error::TokenRouterError, state::Custodian}; -use anchor_lang::prelude::*; - -#[derive(Accounts)] -pub struct SubmitOwnershipTransferRequest<'info> { - owner: Signer<'info>, - - /// Custodian, which can only be modified by the configured owner. - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - has_one = owner @ TokenRouterError::OwnerOnly, - )] - custodian: Account<'info, Custodian>, - - /// New Owner. - /// - /// CHECK: Must be neither zero pubkey nor current owner. - #[account( - constraint = new_owner.key() != Pubkey::default() @ TokenRouterError::InvalidNewOwner, - constraint = new_owner.key() != owner.key() @ TokenRouterError::AlreadyOwner - )] - new_owner: AccountInfo<'info>, -} - -pub fn submit_ownership_transfer_request( - ctx: Context, -) -> Result<()> { - ctx.accounts.custodian.pending_owner = Some(ctx.accounts.new_owner.key()); - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs deleted file mode 100644 index 9770fda8..00000000 --- a/solana/programs/token-router/src/processor/admin/set_pause.rs +++ /dev/null @@ -1,26 +0,0 @@ -use crate::state::Custodian; -use anchor_lang::prelude::*; - -#[derive(Accounts)] -pub struct SetPause<'info> { - owner_or_assistant: Signer<'info>, - - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, - )] - /// Sender Config account. This program requires that the `owner` specified - /// in the context equals the pubkey specified in this account. Mutable. - custodian: Account<'info, Custodian>, -} - -pub fn set_pause(ctx: Context, paused: bool) -> Result<()> { - let custodian = &mut ctx.accounts.custodian; - custodian.paused = paused; - custodian.paused_set_by = ctx.accounts.owner_or_assistant.key(); - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/admin/update/mod.rs b/solana/programs/token-router/src/processor/admin/update/mod.rs deleted file mode 100644 index 656c9345..00000000 --- a/solana/programs/token-router/src/processor/admin/update/mod.rs +++ /dev/null @@ -1,2 +0,0 @@ -mod owner_assistant; -pub use owner_assistant::*; diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs deleted file mode 100644 index d7ac2604..00000000 --- a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs +++ /dev/null @@ -1,31 +0,0 @@ -use crate::{error::TokenRouterError, state::Custodian}; -use anchor_lang::prelude::*; - -#[derive(Accounts)] -pub struct UpdateOwnerAssistant<'info> { - /// Owner of the program set in the [`OwnerConfig`] account. - owner: Signer<'info>, - - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - has_one = owner @ TokenRouterError::OwnerOnly, - )] - custodian: Account<'info, Custodian>, - - /// New Assistant. - /// - /// CHECK: Must be neither zero pubkey nor current owner assistant. - #[account( - constraint = new_owner_assistant.key() != Pubkey::default() @ TokenRouterError::InvalidNewAssistant, - )] - new_owner_assistant: AccountInfo<'info>, -} - -pub fn update_owner_assistant(ctx: Context) -> Result<()> { - ctx.accounts.custodian.owner_assistant = ctx.accounts.new_owner_assistant.key(); - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/complete_transfer_with_relay.rs b/solana/programs/token-router/src/processor/complete_transfer_with_relay.rs deleted file mode 100644 index 8a8eb5a7..00000000 --- a/solana/programs/token-router/src/processor/complete_transfer_with_relay.rs +++ /dev/null @@ -1,223 +0,0 @@ -use crate::{ - error::TokenRouterError, - state::{Custodian, RegisteredAsset, RegisteredContract}, -}; -use anchor_lang::{ - prelude::*, - system_program::{self, Transfer}, -}; -use anchor_spl::token; -use wormhole_cctp_program::sdk as wormhole_cctp; - -#[derive(Accounts)] -#[instruction(vaa_hash: [u8; 32])] -pub struct CompleteNativeWithRelay<'info> { - #[account(mut)] - payer: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump - )] - custodian: Account<'info, Custodian>, - - /// CHECK: We will be performing zero-copy deserialization in the instruction handler. - #[account(owner = wormhole_cctp::core_bridge::id())] - vaa: AccountInfo<'info>, - - /// CHECK: This account is needed to create the temporary custody token account. - #[account(address = registered_asset.mint)] - mint: AccountInfo<'info>, - - /// Fee recipient's token account. Must be an associated token account. Mutable. - #[account( - mut, - associated_token::mint = registered_asset.mint, - associated_token::authority = custodian.fee_recipient - )] - fee_recipient_token: Account<'info, token::TokenAccount>, - - /// Recipient associated token account. The recipient authority check - /// is necessary to ensure that the recipient is the intended recipient - /// of the bridged tokens. Mutable. - #[account( - mut, - associated_token::mint = registered_asset.mint, - associated_token::authority = recipient - )] - recipient_token: Account<'info, token::TokenAccount>, - - /// Foreign Contract account. The registered contract specified in this - /// account must agree with the target address for the Token Bridge's token - /// transfer. Read-only. - #[account( - seeds = [ - RegisteredContract::SEED_PREFIX, - &try_vaa(&vaa, |vaa| vaa.try_emitter_chain())?.to_be_bytes() - ], - bump = registered_contract.bump, - constraint = try_vaa(&vaa, |vaa| vaa.try_emitter_address())? == registered_contract.address @ TokenRouterError::InvalidEndpoint - )] - registered_contract: Account<'info, RegisteredContract>, - - #[account( - seeds = [ - RegisteredAsset::SEED_PREFIX, - registered_asset.mint.as_ref() - ], - bump = registered_asset.bump, - )] - // Registered token account for the specified mint. This account stores - // information about the token. Read-only. - registered_asset: Account<'info, RegisteredAsset>, - - #[account(mut)] - /// CHECK: recipient may differ from payer if a relayer paid for this - /// transaction. This instruction verifies that the recipient key - /// passed in this context matches the intended recipient in the vaa. - recipient: AccountInfo<'info>, - - /// Program's temporary token account. This account is created before the - /// instruction is invoked to temporarily take custody of the payer's - /// tokens. When the tokens are finally bridged in, the tokens will be - /// transferred to the destination token accounts. This account will have - /// zero balance and can be closed. - #[account( - init, - payer = payer, - token::mint = mint, - token::authority = custodian, - seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump, - )] - custody_token: Account<'info, token::TokenAccount>, - - #[account( - mut, - constraint = worm_cctp_claim.data_is_empty() @ TokenRouterError::AlreadyRedeemed - )] - worm_cctp_claim: AccountInfo<'info>, - - system_program: Program<'info, System>, - token_program: Program<'info, token::Token>, - wormhole_cctp_program: Program<'info, wormhole_cctp::WormholeCctp>, -} - -pub fn complete_native_transfer_with_relay( - ctx: Context, - _vaa_hash: [u8; 32], -) -> Result<()> { - // The intended recipient must agree with the recipient account. - let TokenBridgeRelayerMessage::TransferWithRelay { - target_relayer_fee, - to_native_token_amount, - recipient, - } = *ctx.accounts.vaa.message().data(); - require!( - ctx.accounts.recipient.key() == Pubkey::from(recipient), - TokenRouterError::InvalidRecipient - ); - - // These seeds are used to: - // 1. Redeem Token Bridge program's - // complete_transfer_native_with_payload. - // 2. Transfer tokens to relayer if it exists. - // 3. Transfer remaining tokens to recipient. - // 4. Close tmp_token_account. - let config_seeds = &[ - RedeemerConfig::SEED_PREFIX.as_ref(), - &[ctx.accounts.config.bump], - ]; - - // Redeem the token transfer to the tmp_token_account. - token_bridge::complete_transfer_native_with_payload(CpiContext::new_with_signer( - ctx.accounts.token_bridge_program.to_account_info(), - token_bridge::CompleteTransferNativeWithPayload { - payer: ctx.accounts.payer.to_account_info(), - config: ctx.accounts.token_bridge_config.to_account_info(), - vaa: ctx.accounts.vaa.to_account_info(), - claim: ctx.accounts.token_bridge_claim.to_account_info(), - foreign_endpoint: ctx.accounts.token_bridge_foreign_endpoint.to_account_info(), - to: ctx.accounts.tmp_token_account.to_account_info(), - redeemer: ctx.accounts.config.to_account_info(), - custody: ctx.accounts.token_bridge_custody.to_account_info(), - mint: ctx.accounts.mint.to_account_info(), - custody_signer: ctx.accounts.token_bridge_custody_signer.to_account_info(), - rent: ctx.accounts.rent.to_account_info(), - system_program: ctx.accounts.system_program.to_account_info(), - token_program: ctx.accounts.token_program.to_account_info(), - wormhole_program: ctx.accounts.wormhole_program.to_account_info(), - }, - &[config_seeds], - ))?; - - // Denormalize the transfer amount and target relayer fee encoded in - // the VAA. - let amount = token_bridge::denormalize_amount( - ctx.accounts.vaa.data().amount(), - ctx.accounts.mint.decimals, - ); - let denormalized_relayer_fee = - token_bridge::denormalize_amount(target_relayer_fee, ctx.accounts.mint.decimals); - - // Check to see if the transfer is for wrapped SOL. If it is, - // unwrap and transfer the SOL to the recipient and relayer. - // Since we are unwrapping the SOL, this contract will not - // perform a swap with the off-chain relayer. - if ctx.accounts.mint.key() == spl_token::native_mint::ID { - // Transfer all lamports to the payer. - anchor_spl::token::close_account(CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - anchor_spl::token::CloseAccount { - account: ctx.accounts.tmp_token_account.to_account_info(), - destination: ctx.accounts.payer.to_account_info(), - authority: ctx.accounts.config.to_account_info(), - }, - &[config_seeds], - ))?; - - // If the payer is a relayer, we need to send the expected lamports - // to the recipient, less the relayer fee. - if ctx.accounts.payer.key() != ctx.accounts.recipient.key() { - system_program::transfer( - CpiContext::new( - ctx.accounts.system_program.to_account_info(), - Transfer { - from: ctx.accounts.payer.to_account_info(), - to: ctx.accounts.recipient.to_account_info(), - }, - ), - amount - denormalized_relayer_fee, - ) - } else { - Ok(()) - } - } else { - redeem_token( - RedeemToken { - payer: &ctx.accounts.payer, - config: &ctx.accounts.config, - fee_recipient_token_account: &ctx.accounts.fee_recipient_token_account, - mint: &ctx.accounts.mint, - recipient_token_account: &ctx.accounts.recipient_token_account, - recipient: &ctx.accounts.recipient, - registered_asset: &ctx.accounts.registered_asset, - native_registered_token: &ctx.accounts.native_registered_token, - tmp_token_account: &ctx.accounts.tmp_token_account, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - }, - amount, - denormalized_relayer_fee, - to_native_token_amount, - ) - } -} - -fn try_vaa(vaa_acc_info: &AccountInfo, func: F) -> Result -where - T: std::fmt::Debug, - F: FnOnce(wormhole_cctp::VaaAccount) -> Result, -{ - wormhole_cctp::VaaAccount::load(vaa_acc_info).and_then(func) -} diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs deleted file mode 100644 index b8719d68..00000000 --- a/solana/programs/token-router/src/processor/mod.rs +++ /dev/null @@ -1,8 +0,0 @@ -mod admin; -pub use admin::*; - -// mod complete_transfer_with_relay; -// pub use complete_transfer_with_relay::*; - -// mod transfer_tokens_with_relay; -// pub use transfer_tokens_with_relay::*; diff --git a/solana/programs/token-router/src/processor/old_inbound/mod.rs b/solana/programs/token-router/src/processor/old_inbound/mod.rs deleted file mode 100644 index 2137598f..00000000 --- a/solana/programs/token-router/src/processor/old_inbound/mod.rs +++ /dev/null @@ -1,150 +0,0 @@ -mod native; -mod wrapped; - -pub use native::*; -pub use wrapped::*; - -use crate::{ - error::TokenRouterError, - state::{RedeemerConfig, RegisteredAsset}, -}; -use anchor_lang::prelude::*; -use anchor_spl::token::{Mint, Token, TokenAccount}; -use wormhole_anchor_sdk::token_bridge; - -pub struct RedeemToken<'ctx, 'info> { - payer: &'ctx Signer<'info>, - config: &'ctx Account<'info, RedeemerConfig>, - fee_recipient_token_account: &'ctx Account<'info, TokenAccount>, - mint: &'ctx Account<'info, Mint>, - recipient_token_account: &'ctx Account<'info, TokenAccount>, - recipient: &'ctx AccountInfo<'info>, - registered_asset: &'ctx Account<'info, RegisteredAsset>, - native_registered_token: &'ctx Account<'info, RegisteredAsset>, - tmp_token_account: &'ctx Account<'info, TokenAccount>, - token_program: &'ctx Program<'info, Token>, - system_program: &'ctx Program<'info, System>, -} - -pub fn redeem_token( - redeem_token: RedeemToken, - amount: u64, - denormalized_relayer_fee: u64, - to_native_token_amount: u64, -) -> Result<()> { - let RedeemToken { - payer, - config, - fee_recipient_token_account, - mint, - recipient_token_account, - recipient, - registered_asset, - native_registered_token, - tmp_token_account, - token_program, - system_program, - } = redeem_token; - - let config_seeds = &[RedeemerConfig::SEED_PREFIX.as_ref(), &[config.bump]]; - - // Handle self redemptions. If the payer is the recipient, we should - // send the entire transfer amount. - if payer.key() == recipient.key() { - // Transfer tokens from tmp_token_account to recipient. - anchor_spl::token::transfer( - CpiContext::new_with_signer( - token_program.to_account_info(), - anchor_spl::token::Transfer { - from: tmp_token_account.to_account_info(), - to: recipient_token_account.to_account_info(), - authority: config.to_account_info(), - }, - &[&config_seeds[..]], - ), - amount, - )?; - } else { - // Denormalize the to_native_token_amount. - let denormalized_to_native_token_amount = - token_bridge::denormalize_amount(to_native_token_amount, mint.decimals); - - // Calculate the amount of SOL that should be sent to the - // recipient. - let (token_amount_in, native_amount_out) = registered_asset - .calculate_native_swap_amounts( - mint.decimals, - native_registered_token.swap_rate, - denormalized_to_native_token_amount, - ) - .ok_or(TokenRouterError::InvalidSwapCalculation)?; - - // Transfer lamports from the payer to the recipient if the - // native_amount_out is nonzero. - if native_amount_out > 0 { - anchor_lang::system_program::transfer( - CpiContext::new( - system_program.to_account_info(), - anchor_lang::system_program::Transfer { - from: payer.to_account_info(), - to: recipient.to_account_info(), - }, - ), - native_amount_out, - )?; - - msg!( - "Swap executed successfully, recipient: {}, relayer: {}, token: {}, tokenAmount: {}, nativeAmount: {}", - recipient.key(), - payer.key(), - mint.key(), - token_amount_in, - native_amount_out - ); - } - - // Calculate the amount for the fee recipient. - let amount_for_fee_recipient = token_amount_in + denormalized_relayer_fee; - - // Transfer tokens from tmp_token_account to the fee recipient. - if amount_for_fee_recipient > 0 { - anchor_spl::token::transfer( - CpiContext::new_with_signer( - token_program.to_account_info(), - anchor_spl::token::Transfer { - from: tmp_token_account.to_account_info(), - to: fee_recipient_token_account.to_account_info(), - authority: config.to_account_info(), - }, - &[&config_seeds[..]], - ), - amount_for_fee_recipient, - )?; - } - - // Transfer tokens from tmp_token_account to recipient. - anchor_spl::token::transfer( - CpiContext::new_with_signer( - token_program.to_account_info(), - anchor_spl::token::Transfer { - from: tmp_token_account.to_account_info(), - to: recipient_token_account.to_account_info(), - authority: config.to_account_info(), - }, - &[&config_seeds[..]], - ), - amount - amount_for_fee_recipient, - )?; - } - - // Finish instruction by closing tmp_token_account. - anchor_spl::token::close_account(CpiContext::new_with_signer( - token_program.to_account_info(), - anchor_spl::token::CloseAccount { - account: tmp_token_account.to_account_info(), - destination: payer.to_account_info(), - authority: config.to_account_info(), - }, - &[&config_seeds[..]], - )) -} diff --git a/solana/programs/token-router/src/processor/old_inbound/native.rs b/solana/programs/token-router/src/processor/old_inbound/native.rs deleted file mode 100644 index 757b40ab..00000000 --- a/solana/programs/token-router/src/processor/old_inbound/native.rs +++ /dev/null @@ -1,278 +0,0 @@ -use crate::{ - constants::SEED_PREFIX_TMP, - error::TokenRouterError, - message::TokenBridgeRelayerMessage, - state::{ForeignContract, RedeemerConfig, RegisteredAsset}, - token::{spl_token, Mint, Token, TokenAccount}, - PostedTokenBridgeRelayerMessage, -}; -use anchor_lang::{ - prelude::*, - system_program::{self, Transfer}, -}; -use wormhole_anchor_sdk::{token_bridge, wormhole}; - -use super::{redeem_token, RedeemToken}; - -#[derive(Accounts)] -#[instruction(vaa_hash: [u8; 32])] -pub struct CompleteNativeWithRelay<'info> { - #[account(mut)] - /// Payer will pay Wormhole fee to transfer tokens and create temporary - /// token account. - pub payer: Signer<'info>, - - #[account( - seeds = [RedeemerConfig::SEED_PREFIX], - bump = config.bump - )] - /// Redeemer Config account. Acts as the Token Bridge redeemer, which signs - /// for the complete transfer instruction. Read-only. - pub config: Box>, - - #[account( - mut, - associated_token::mint = mint, - associated_token::authority = config.fee_recipient - )] - /// Fee recipient's token account. Must be an associated token account. Mutable. - pub fee_recipient_token_account: Box>, - - #[account( - seeds = [ - ForeignContract::SEED_PREFIX, - &vaa.emitter_chain().to_be_bytes()[..] - ], - bump, - constraint = foreign_contract.verify(&vaa) @ TokenRouterError::InvalidEndpoint - )] - /// Foreign Contract account. The registered contract specified in this - /// account must agree with the target address for the Token Bridge's token - /// transfer. Read-only. - pub foreign_contract: Box>, - - #[account( - address = vaa.data().mint() - )] - /// Mint info. This is the SPL token that will be bridged over from the - /// foreign contract. This must match the token address specified in the - /// signed Wormhole message. Read-only. - pub mint: Box>, - - #[account( - mut, - associated_token::mint = mint, - associated_token::authority = recipient - )] - /// Recipient associated token account. The recipient authority check - /// is necessary to ensure that the recipient is the intended recipient - /// of the bridged tokens. Mutable. - pub recipient_token_account: Box>, - - #[account(mut)] - /// CHECK: recipient may differ from payer if a relayer paid for this - /// transaction. This instruction verifies that the recipient key - /// passed in this context matches the intended recipient in the vaa. - pub recipient: AccountInfo<'info>, - - #[account( - seeds = [RegisteredAsset::SEED_PREFIX, mint.key().as_ref()], - bump - )] - // Registered token account for the specified mint. This account stores - // information about the token. Read-only. - pub registered_asset: Box>, - - #[account( - seeds = [RegisteredAsset::SEED_PREFIX, spl_token::native_mint::ID.as_ref()], - bump, - )] - // Registered token account for the native mint. This account stores - // information about the token and is used for the swap rate. Read-only. - pub native_registered_token: Box>, - - #[account( - init, - payer = payer, - seeds = [ - SEED_PREFIX_TMP, - mint.key().as_ref(), - ], - bump, - token::mint = mint, - token::authority = config - )] - /// Program's temporary token account. This account is created before the - /// instruction is invoked to temporarily take custody of the payer's - /// tokens. When the tokens are finally bridged in, the tokens will be - /// transferred to the destination token accounts. This account will have - /// zero balance and can be closed. - pub tmp_token_account: Box>, - - /// CHECK: Token Bridge config. Read-only. - pub token_bridge_config: UncheckedAccount<'info>, - - #[account( - seeds = [ - wormhole::SEED_PREFIX_POSTED_VAA, - &vaa_hash - ], - bump, - seeds::program = wormhole_program, - constraint = vaa.data().to() == crate::ID @ TokenRouterError::InvalidTransferToAddress, - constraint = vaa.data().to_chain() == wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferToChain, - constraint = vaa.data().token_chain() == wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferTokenChain - )] - /// Verified Wormhole message account. The Wormhole program verified - /// signatures and posted the account data here. Read-only. - pub vaa: Box>, - - #[account( - mut, - constraint = token_bridge_claim.data_is_empty() @ TokenRouterError::AlreadyRedeemed - )] - /// CHECK: Token Bridge claim account. It stores a boolean, whose value - /// is true if the bridged assets have been claimed. If the transfer has - /// not been redeemed, this account will not exist yet. - /// - /// NOTE: The Token Bridge program's claim account is only initialized when - /// a transfer is redeemed (and the boolean value `true` is written as - /// its data). - /// - /// The Token Bridge program will automatically fail if this transfer - /// is redeemed again. But we choose to short-circuit the failure as the - /// first evaluation of this instruction. - pub token_bridge_claim: AccountInfo<'info>, - - /// CHECK: Token Bridge foreign endpoint. This account should really be one - /// endpoint per chain, but the PDA allows for multiple endpoints for each - /// chain! We store the proper endpoint for the emitter chain. - pub token_bridge_foreign_endpoint: UncheckedAccount<'info>, - - /// CHECK: Token Bridge custody. This is the Token Bridge program's token - /// account that holds this mint's balance. - #[account(mut)] - pub token_bridge_custody: UncheckedAccount<'info>, - - /// CHECK: Token Bridge custody signer. Read-only. - pub token_bridge_custody_signer: UncheckedAccount<'info>, - - pub wormhole_program: Program<'info, wormhole::program::Wormhole>, - pub token_bridge_program: Program<'info, token_bridge::program::TokenBridge>, - pub system_program: Program<'info, System>, - pub token_program: Program<'info, Token>, - - /// CHECK: Token Bridge program needs rent sysvar. - pub rent: UncheckedAccount<'info>, -} - -pub fn complete_native_transfer_with_relay( - ctx: Context, - _vaa_hash: [u8; 32], -) -> Result<()> { - // The intended recipient must agree with the recipient account. - let TokenBridgeRelayerMessage::TransferWithRelay { - target_relayer_fee, - to_native_token_amount, - recipient, - } = *ctx.accounts.vaa.message().data(); - require!( - ctx.accounts.recipient.key() == Pubkey::from(recipient), - TokenRouterError::InvalidRecipient - ); - - // These seeds are used to: - // 1. Redeem Token Bridge program's - // complete_transfer_native_with_payload. - // 2. Transfer tokens to relayer if it exists. - // 3. Transfer remaining tokens to recipient. - // 4. Close tmp_token_account. - let config_seeds = &[ - RedeemerConfig::SEED_PREFIX.as_ref(), - &[ctx.accounts.config.bump], - ]; - - // Redeem the token transfer to the tmp_token_account. - token_bridge::complete_transfer_native_with_payload(CpiContext::new_with_signer( - ctx.accounts.token_bridge_program.to_account_info(), - token_bridge::CompleteTransferNativeWithPayload { - payer: ctx.accounts.payer.to_account_info(), - config: ctx.accounts.token_bridge_config.to_account_info(), - vaa: ctx.accounts.vaa.to_account_info(), - claim: ctx.accounts.token_bridge_claim.to_account_info(), - foreign_endpoint: ctx.accounts.token_bridge_foreign_endpoint.to_account_info(), - to: ctx.accounts.tmp_token_account.to_account_info(), - redeemer: ctx.accounts.config.to_account_info(), - custody: ctx.accounts.token_bridge_custody.to_account_info(), - mint: ctx.accounts.mint.to_account_info(), - custody_signer: ctx.accounts.token_bridge_custody_signer.to_account_info(), - rent: ctx.accounts.rent.to_account_info(), - system_program: ctx.accounts.system_program.to_account_info(), - token_program: ctx.accounts.token_program.to_account_info(), - wormhole_program: ctx.accounts.wormhole_program.to_account_info(), - }, - &[config_seeds], - ))?; - - // Denormalize the transfer amount and target relayer fee encoded in - // the VAA. - let amount = token_bridge::denormalize_amount( - ctx.accounts.vaa.data().amount(), - ctx.accounts.mint.decimals, - ); - let denormalized_relayer_fee = - token_bridge::denormalize_amount(target_relayer_fee, ctx.accounts.mint.decimals); - - // Check to see if the transfer is for wrapped SOL. If it is, - // unwrap and transfer the SOL to the recipient and relayer. - // Since we are unwrapping the SOL, this contract will not - // perform a swap with the off-chain relayer. - if ctx.accounts.mint.key() == spl_token::native_mint::ID { - // Transfer all lamports to the payer. - anchor_spl::token::close_account(CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - anchor_spl::token::CloseAccount { - account: ctx.accounts.tmp_token_account.to_account_info(), - destination: ctx.accounts.payer.to_account_info(), - authority: ctx.accounts.config.to_account_info(), - }, - &[config_seeds], - ))?; - - // If the payer is a relayer, we need to send the expected lamports - // to the recipient, less the relayer fee. - if ctx.accounts.payer.key() != ctx.accounts.recipient.key() { - system_program::transfer( - CpiContext::new( - ctx.accounts.system_program.to_account_info(), - Transfer { - from: ctx.accounts.payer.to_account_info(), - to: ctx.accounts.recipient.to_account_info(), - }, - ), - amount - denormalized_relayer_fee, - ) - } else { - Ok(()) - } - } else { - redeem_token( - RedeemToken { - payer: &ctx.accounts.payer, - config: &ctx.accounts.config, - fee_recipient_token_account: &ctx.accounts.fee_recipient_token_account, - mint: &ctx.accounts.mint, - recipient_token_account: &ctx.accounts.recipient_token_account, - recipient: &ctx.accounts.recipient, - registered_asset: &ctx.accounts.registered_asset, - native_registered_token: &ctx.accounts.native_registered_token, - tmp_token_account: &ctx.accounts.tmp_token_account, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - }, - amount, - denormalized_relayer_fee, - to_native_token_amount, - ) - } -} diff --git a/solana/programs/token-router/src/processor/old_inbound/wrapped.rs b/solana/programs/token-router/src/processor/old_inbound/wrapped.rs deleted file mode 100644 index 0de8bb45..00000000 --- a/solana/programs/token-router/src/processor/old_inbound/wrapped.rs +++ /dev/null @@ -1,225 +0,0 @@ -use crate::{ - constants::SEED_PREFIX_TMP, - error::TokenRouterError, - message::TokenBridgeRelayerMessage, - state::{ForeignContract, RedeemerConfig, RegisteredAsset}, - token::{spl_token, Token, TokenAccount}, - PostedTokenBridgeRelayerMessage, -}; -use anchor_lang::prelude::*; -use anchor_spl::token::Mint; -use wormhole_anchor_sdk::{token_bridge, wormhole}; - -use super::{redeem_token, RedeemToken}; - -#[derive(Accounts)] -#[instruction(vaa_hash: [u8; 32])] -pub struct CompleteWrappedWithRelay<'info> { - #[account(mut)] - /// Payer will pay Wormhole fee to transfer tokens and create temporary - /// token account. - pub payer: Signer<'info>, - - #[account( - seeds = [RedeemerConfig::SEED_PREFIX], - bump - )] - /// Redeemer Config account. Acts as the Token Bridge redeemer, which signs - /// for the complete transfer instruction. Read-only. - pub config: Box>, - - #[account( - mut, - associated_token::mint = token_bridge_wrapped_mint, - associated_token::authority = config.fee_recipient - )] - /// Fee recipient's token account. Must be an associated token account. Mutable. - pub fee_recipient_token_account: Box>, - - #[account( - seeds = [ - ForeignContract::SEED_PREFIX, - &vaa.emitter_chain().to_be_bytes()[..] - ], - bump, - constraint = foreign_contract.verify(&vaa) @ TokenRouterError::InvalidEndpoint - )] - /// Foreign Contract account. The registered contract specified in this - /// account must agree with the target address for the Token Bridge's token - /// transfer. Read-only. - pub foreign_contract: Box>, - - #[account(mut)] - /// Token Bridge wrapped mint info. This is the SPL token that will be - /// bridged from the foreign contract. The wrapped mint PDA must agree - /// with the native token's metadata in the wormhole message. Mutable. - pub token_bridge_wrapped_mint: Box>, - - #[account( - mut, - associated_token::mint = token_bridge_wrapped_mint, - associated_token::authority = recipient - )] - /// Recipient associated token account. The recipient authority check - /// is necessary to ensure that the recipient is the intended recipient - /// of the bridged tokens. Mutable. - pub recipient_token_account: Box>, - - #[account(mut)] - /// CHECK: recipient may differ from payer if a relayer paid for this - /// transaction. This instruction verifies that the recipient key - /// passed in this context matches the intended recipient in the vaa. - pub recipient: AccountInfo<'info>, - - #[account( - seeds = [RegisteredAsset::SEED_PREFIX, token_bridge_wrapped_mint.key().as_ref()], - bump - )] - // Registered token account for the specified mint. This account stores - // information about the token. Read-only. - pub registered_asset: Box>, - - #[account( - seeds = [RegisteredAsset::SEED_PREFIX, spl_token::native_mint::ID.as_ref()], - bump - )] - // Registered token account for the native mint. This account stores - // information about the token and is used for the swap rate. Read-only. - pub native_registered_token: Box>, - - #[account( - init, - payer = payer, - seeds = [ - SEED_PREFIX_TMP, - token_bridge_wrapped_mint.key().as_ref(), - ], - bump, - token::mint = token_bridge_wrapped_mint, - token::authority = config - )] - /// Program's temporary token account. This account is created before the - /// instruction is invoked to temporarily take custody of the payer's - /// tokens. When the tokens are finally bridged in, the tokens will be - /// transferred to the destination token accounts. This account will have - /// zero balance and can be closed. - pub tmp_token_account: Box>, - - /// CHECK: Token Bridge program's wrapped metadata, which stores info - /// about the token from its native chain: - /// * Wormhole Chain ID - /// * Token's native contract address - /// * Token's native decimals - pub token_bridge_wrapped_meta: UncheckedAccount<'info>, - - /// CHECK: Token Bridge config. Read-only. - pub token_bridge_config: UncheckedAccount<'info>, - - #[account( - seeds = [ - wormhole::SEED_PREFIX_POSTED_VAA, - &vaa_hash - ], - bump, - seeds::program = wormhole_program, - constraint = vaa.data().to() == crate::ID @ TokenRouterError::InvalidTransferToAddress, - constraint = vaa.data().to_chain() == wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferToChain, - constraint = vaa.data().token_chain() != wormhole::CHAIN_ID_SOLANA @ TokenRouterError::InvalidTransferTokenChain - )] - /// Verified Wormhole message account. The Wormhole program verified - /// signatures and posted the account data here. Read-only. - pub vaa: Box>, - - #[account( - mut, - constraint = token_bridge_claim.data_is_empty() @ TokenRouterError::AlreadyRedeemed - )] - /// CHECK: Token Bridge claim account. It stores a boolean, whose value - /// is true if the bridged assets have been claimed. If the transfer has - /// not been redeemed, this account will not exist yet. - /// - /// NOTE: The Token Bridge program's claim account is only initialized when - /// a transfer is redeemed (and the boolean value `true` is written as - /// its data). - /// - /// The Token Bridge program will automatically fail if this transfer - /// is redeemed again. But we choose to short-circuit the failure as the - /// first evaluation of this instruction. - pub token_bridge_claim: AccountInfo<'info>, - - /// CHECK: Token Bridge foreign endpoint. This account should really be one - /// endpoint per chain, but the PDA allows for multiple endpoints for each - /// chain! We store the proper endpoint for the emitter chain. - pub token_bridge_foreign_endpoint: UncheckedAccount<'info>, - - /// CHECK: Token Bridge custody signer. Read-only. - pub token_bridge_mint_authority: UncheckedAccount<'info>, - - pub wormhole_program: Program<'info, wormhole::program::Wormhole>, - pub token_bridge_program: Program<'info, token_bridge::program::TokenBridge>, - pub system_program: Program<'info, System>, - pub token_program: Program<'info, Token>, - - /// CHECK: Token Bridge program needs rent sysvar. - pub rent: UncheckedAccount<'info>, -} - -pub fn complete_wrapped_transfer_with_relay( - ctx: Context, - _vaa_hash: [u8; 32], -) -> Result<()> { - // The intended recipient must agree with the recipient account. - let TokenBridgeRelayerMessage::TransferWithRelay { - target_relayer_fee, - to_native_token_amount, - recipient, - } = *ctx.accounts.vaa.message().data(); - require!( - ctx.accounts.recipient.key() == Pubkey::from(recipient), - TokenRouterError::InvalidRecipient - ); - - // Redeem the token transfer to the tmp_token_account. - token_bridge::complete_transfer_wrapped_with_payload(CpiContext::new_with_signer( - ctx.accounts.token_bridge_program.to_account_info(), - token_bridge::CompleteTransferWrappedWithPayload { - payer: ctx.accounts.payer.to_account_info(), - config: ctx.accounts.token_bridge_config.to_account_info(), - vaa: ctx.accounts.vaa.to_account_info(), - claim: ctx.accounts.token_bridge_claim.to_account_info(), - foreign_endpoint: ctx.accounts.token_bridge_foreign_endpoint.to_account_info(), - to: ctx.accounts.tmp_token_account.to_account_info(), - redeemer: ctx.accounts.config.to_account_info(), - wrapped_mint: ctx.accounts.token_bridge_wrapped_mint.to_account_info(), - wrapped_metadata: ctx.accounts.token_bridge_wrapped_meta.to_account_info(), - mint_authority: ctx.accounts.token_bridge_mint_authority.to_account_info(), - rent: ctx.accounts.rent.to_account_info(), - system_program: ctx.accounts.system_program.to_account_info(), - token_program: ctx.accounts.token_program.to_account_info(), - wormhole_program: ctx.accounts.wormhole_program.to_account_info(), - }, - &[&[ - RedeemerConfig::SEED_PREFIX.as_ref(), - &[ctx.accounts.config.bump], - ]], - ))?; - - redeem_token( - RedeemToken { - payer: &ctx.accounts.payer, - config: &ctx.accounts.config, - fee_recipient_token_account: &ctx.accounts.fee_recipient_token_account, - mint: &ctx.accounts.token_bridge_wrapped_mint, - recipient_token_account: &ctx.accounts.recipient_token_account, - recipient: &ctx.accounts.recipient, - registered_asset: &ctx.accounts.registered_asset, - native_registered_token: &ctx.accounts.native_registered_token, - tmp_token_account: &ctx.accounts.tmp_token_account, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - }, - ctx.accounts.vaa.data().amount(), - target_relayer_fee, - to_native_token_amount, - ) -} diff --git a/solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs b/solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs deleted file mode 100644 index abeaba97..00000000 --- a/solana/programs/token-router/src/processor/transfer_tokens_with_relay.rs +++ /dev/null @@ -1,291 +0,0 @@ -use crate::{ - error::TokenRouterError, - state::{Custodian, PayerSequence, RegisteredContract}, -}; -use anchor_lang::prelude::*; -use anchor_spl::token; -use ruint::aliases::U256; -use wormhole_cctp_program::sdk::{ - self as wormhole_cctp, cctp_message_transmitter, cctp_token_messenger_minter, core_bridge, - io::TypePrefixedPayload, -}; - -const MESSAGE_SEED_PREFIX: &[u8] = b"msg"; - -#[derive(Accounts)] -pub struct TransferTokensWithRelay<'info> { - /// Payer will pay Wormhole fee to transfer tokens and create temporary - /// token account. - #[account(mut)] - payer: Signer<'info>, - - /// Sender Config account. Acts as the signer for the Token Bridge token - /// transfer. Read-only. - #[account( - seeds = [Custodian::SEED_PREFIX], - bump, - constraint = !custodian.paused @ TokenRouterError::OutboundTransfersPaused - )] - custodian: Account<'info, Custodian>, - - /// Used to keep track of payer's sequence number. - #[account( - init_if_needed, - payer = payer, - space = 8 + PayerSequence::INIT_SPACE, - seeds = [ - PayerSequence::SEED_PREFIX, - payer.key().as_ref() - ], - bump, - )] - payer_sequence: Account<'info, PayerSequence>, - - /// Foreign Contract account. Send tokens to the contract specified in this - /// account. Funnily enough, the Token Bridge program does not have any - /// requirements for outbound transfers for the recipient chain to be - /// registered. This account provides extra protection against sending - /// tokens to an unregistered Wormhole chain ID. Read-only. - #[account( - seeds = [ - RegisteredContract::SEED_PREFIX, - ®istered_contract.chain.to_be_bytes() - ], - bump = registered_contract.bump, - constraint = registered_contract.relayer_fee(&mint.key()).is_some() @ TokenRouterError::TokenNotRegistered, - )] - registered_contract: Account<'info, RegisteredContract>, - - /// CHECK: TODO - #[account(mut)] - mint: AccountInfo<'info>, - - /// Payer's associated token account. We may want to make this a generic - /// token account in the future. - /// - /// CHECK: Wormhole CCTP checks that the token mint is the same as the mint provided in its - /// account context. Transfer authority must be set to the payer. - #[account(mut)] - from_token: AccountInfo<'info>, - - /// CHECK: Wormhole Message. Token Bridge program writes info about the - /// tokens transferred in this account for our program. Mutable. - #[account( - mut, - seeds = [ - MESSAGE_SEED_PREFIX, - payer.key().as_ref(), - &payer_sequence.to_be_bytes() - ], - bump, - )] - core_message: AccountInfo<'info>, - - /// NOTE: This account needs to be boxed because without it we hit stack overflow. - #[account( - init, - payer = payer, - token::mint = mint, - token::authority = custodian, - seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump, - )] - custody_token: Box>, - - /// CHECK: TODO - worm_cctp_custodian: UncheckedAccount<'info>, - - /// CHECK: TODO - #[account(mut)] - worm_cctp_custody_token: UncheckedAccount<'info>, - - /// CHECK: TODO - worm_cctp_registered_emitter: UncheckedAccount<'info>, - - /// CHECK: TODO - #[account(mut)] - core_bridge_config: UncheckedAccount<'info>, - - /// CHECK: TODO - #[account(mut)] - core_emitter_sequence: UncheckedAccount<'info>, - - /// CHECK: TODO - #[account(mut)] - core_fee_collector: UncheckedAccount<'info>, - - /// CHECK: TODO - cctp_token_messenger_minter_sender_authority: UncheckedAccount<'info>, - - /// CHECK: TODO - #[account(mut)] - cctp_message_transmitter_config: UncheckedAccount<'info>, - - /// CHECK: TODO - cctp_token_messenger: UncheckedAccount<'info>, - - /// CHECK: TODO - cctp_remote_token_messenger: UncheckedAccount<'info>, - - /// CHECK: TODO - cctp_token_minter: UncheckedAccount<'info>, - - /// CHECK: TODO - #[account(mut)] - cctp_local_token: AccountInfo<'info>, - - system_program: Program<'info, System>, - token_program: Program<'info, token::Token>, - wormhole_cctp_program: Program<'info, wormhole_cctp::WormholeCctp>, - core_bridge_program: Program<'info, core_bridge::CoreBridge>, - cctp_token_messenger_minter_program: - Program<'info, cctp_token_messenger_minter::TokenMessengerMinter>, - cctp_message_transmitter_program: Program<'info, cctp_message_transmitter::MessageTransmitter>, - - /// CHECK: Clock sysvar. - #[account(address = solana_program::sysvar::clock::id())] - clock: AccountInfo<'info>, - - /// CHECK: Rent sysvar. - #[account(address = solana_program::sysvar::rent::id())] - rent: AccountInfo<'info>, -} - -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct TransferTokensWithRelayArgs { - pub amount: u64, - pub to_native_token_amount: u64, - pub target_recipient_wallet: [u8; 32], -} - -pub fn transfer_tokens_with_relay( - ctx: Context, - args: TransferTokensWithRelayArgs, -) -> Result<()> { - let TransferTokensWithRelayArgs { - amount, - to_native_token_amount, - target_recipient_wallet, - } = args; - require!( - target_recipient_wallet != [0; 32], - TokenRouterError::InvalidRecipient - ); - - // This operation is safe to unwrap because we checked that the relayer fee - // exists in the account context. - let relayer_fee = ctx - .accounts - .registered_contract - .relayer_fee(&ctx.accounts.mint.key()) - .unwrap(); - - // Confirm that the amount specified is at least the relayer fee plus the - // amount desired for native currency. This also implicitly checks that the - // amount is non-zero. - require!( - amount > relayer_fee + to_native_token_amount, - TokenRouterError::ZeroBridgeAmount - ); - - // These seeds are used to: - // 1. Sign the Sender Config's token account to delegate approval - // of truncated_amount. - // 2. Sign Token Bridge program's transfer_native instruction. - // 3. Close tmp_token_account. - let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; - - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.from_token.to_account_info(), - to: ctx.accounts.custody_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - amount, - )?; - - let msg = crate::messages::TransferTokensWithRelay { - target_relayer_fee: U256::from(relayer_fee), - to_native_token_amount: U256::from(to_native_token_amount), - target_recipient_wallet, - }; - - let mut payload = Vec::with_capacity(msg.payload_written_size()); - let mut writer = std::io::Cursor::new(&mut payload); - msg.write_typed(&mut writer).unwrap(); - - // Holy accounts, Batman! - wormhole_cctp::transfer_tokens_with_payload( - CpiContext::new_with_signer( - ctx.accounts.wormhole_cctp_program.to_account_info(), - wormhole_cctp::TransferTokensWithPayload { - payer: ctx.accounts.payer.to_account_info(), - custodian: ctx.accounts.worm_cctp_custodian.to_account_info(), - burn_source_authority: ctx.accounts.custodian.to_account_info(), - mint: ctx.accounts.mint.to_account_info(), - burn_source: ctx.accounts.custody_token.to_account_info(), - custody_token: ctx.accounts.worm_cctp_custody_token.to_account_info(), - registered_emitter: ctx.accounts.worm_cctp_registered_emitter.to_account_info(), - core_bridge_config: ctx.accounts.core_bridge_config.to_account_info(), - core_message: ctx.accounts.core_message.to_account_info(), - core_emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), - core_fee_collector: ctx.accounts.core_fee_collector.to_account_info(), - token_messenger_minter_sender_authority: ctx - .accounts - .cctp_token_messenger_minter_sender_authority - .to_account_info(), - message_transmitter_config: ctx - .accounts - .cctp_message_transmitter_config - .to_account_info(), - token_messenger: ctx.accounts.cctp_token_messenger.to_account_info(), - remote_token_messenger: ctx.accounts.cctp_remote_token_messenger.to_account_info(), - token_minter: ctx.accounts.cctp_token_minter.to_account_info(), - local_token: ctx.accounts.cctp_local_token.to_account_info(), - core_bridge_program: ctx.accounts.core_bridge_program.to_account_info(), - token_messenger_minter_program: ctx - .accounts - .cctp_token_messenger_minter_program - .to_account_info(), - message_transmitter_program: ctx - .accounts - .cctp_message_transmitter_program - .to_account_info(), - token_program: ctx.accounts.token_program.to_account_info(), - system_program: ctx.accounts.system_program.to_account_info(), - clock: ctx.accounts.clock.to_account_info(), - rent: ctx.accounts.rent.to_account_info(), - }, - &[ - custodian_seeds, - &[ - MESSAGE_SEED_PREFIX, - ctx.accounts.payer.key().as_ref(), - &ctx.accounts.payer_sequence.take_and_uptick().to_be_bytes(), - &[ctx.bumps["core_message"]], - ], - ], - ), - wormhole_cctp::TransferTokensWithPayloadArgs { - amount, - mint_recipient: ctx.accounts.registered_contract.address, - nonce: 0, - payload, - }, - )?; - - // Finally close the custody token account. - token::close_account(CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::CloseAccount { - account: ctx.accounts.custody_token.to_account_info(), - destination: ctx.accounts.payer.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - )) -} diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs deleted file mode 100644 index 9cd95382..00000000 --- a/solana/programs/token-router/src/state/custodian.rs +++ /dev/null @@ -1,29 +0,0 @@ -use anchor_lang::prelude::*; - -#[account] -#[derive(Debug, InitSpace)] -pub struct Custodian { - pub bump: u8, - - /// Boolean indicating whether outbound transfers are paused. - pub paused: bool, - - /// Program's owner. - pub owner: Pubkey, - pub pending_owner: Option, - - /// Program's assistant. Can be used to update the relayer fee and swap rate. - pub owner_assistant: Pubkey, - - /// Indicate who last set the `paused` value. When the program is first initialized, this is set - /// to the `owner`. - pub paused_set_by: Pubkey, -} - -impl Custodian { - pub const SEED_PREFIX: &'static [u8] = b"custodian"; - - pub fn is_authorized(&self, key: &Pubkey) -> bool { - self.owner == *key || self.owner_assistant == *key - } -} From 3ea972f36fad9ba535ac1950b8f499d14d606f4e Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 8 Jan 2024 17:26:57 -0600 Subject: [PATCH 003/126] solana: fix Cargo.lock; add back token_router --- solana/Anchor.toml | 4 +- solana/Cargo.lock | 220 +++++++++--------- solana/Cargo.toml | 6 + solana/Makefile | 3 + solana/programs/matching-engine/Cargo.toml | 5 + .../processor/admin/add_router_endpoint.rs | 10 +- solana/programs/token-router/Cargo.toml | 34 +++ solana/programs/token-router/README.md | 0 solana/programs/token-router/src/constants.rs | 10 + solana/programs/token-router/src/error.rs | 168 +++++++++++++ solana/programs/token-router/src/lib.rs | 191 +++++++++++++++ solana/programs/token-router/src/messages.rs | 89 +++++++ .../processor/admin/add_router_endpoint.rs | 117 ++++++++++ .../src/processor/admin/initialize.rs | 78 +++++++ .../token-router/src/processor/admin/mod.rs | 29 +++ .../ownership_transfer_request/cancel.rs | 25 ++ .../ownership_transfer_request/confirm.rs | 29 +++ .../admin/ownership_transfer_request/mod.rs | 8 + .../ownership_transfer_request/submit.rs | 34 +++ .../src/processor/admin/set_pause.rs | 26 +++ .../src/processor/admin/update/mod.rs | 2 + .../processor/admin/update/owner_assistant.rs | 31 +++ .../processor/admin/update_fee_recipient.rs | 44 ++++ .../token-router/src/processor/mod.rs | 2 + .../token-router/src/state/custodian.rs | 29 +++ solana/programs/token-router/src/state/mod.rs | 8 + .../token-router/src/state/payer_sequence.rs | 27 +++ .../token-router/src/state/router_endpoint.rs | 22 ++ solana/ts/src/index.ts | 74 +++++- solana/ts/src/state/RouterEndpoint.ts | 4 +- solana/ts/tests/01__tokenRouter.ts | 7 +- 31 files changed, 1224 insertions(+), 112 deletions(-) create mode 100644 solana/programs/token-router/Cargo.toml create mode 100644 solana/programs/token-router/README.md create mode 100644 solana/programs/token-router/src/constants.rs create mode 100644 solana/programs/token-router/src/error.rs create mode 100644 solana/programs/token-router/src/lib.rs create mode 100644 solana/programs/token-router/src/messages.rs create mode 100644 solana/programs/token-router/src/processor/admin/add_router_endpoint.rs create mode 100644 solana/programs/token-router/src/processor/admin/initialize.rs create mode 100644 solana/programs/token-router/src/processor/admin/mod.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs create mode 100644 solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs create mode 100644 solana/programs/token-router/src/processor/admin/set_pause.rs create mode 100644 solana/programs/token-router/src/processor/admin/update/mod.rs create mode 100644 solana/programs/token-router/src/processor/admin/update/owner_assistant.rs create mode 100644 solana/programs/token-router/src/processor/admin/update_fee_recipient.rs create mode 100644 solana/programs/token-router/src/processor/mod.rs create mode 100644 solana/programs/token-router/src/state/custodian.rs create mode 100644 solana/programs/token-router/src/state/mod.rs create mode 100644 solana/programs/token-router/src/state/payer_sequence.rs create mode 100644 solana/programs/token-router/src/state/router_endpoint.rs diff --git a/solana/Anchor.toml b/solana/Anchor.toml index d3bf7dde..2394d4f5 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -8,10 +8,12 @@ skip-lint = false [workspace] members = [ + "programs/token-router", "programs/matching-engine" ] [programs.localnet] +token_router = "TokenRouter11111111111111111111111111111111" matching_engine = "MatchingEngine11111111111111111111111111111" [registry] @@ -22,7 +24,7 @@ cluster = "Localnet" wallet = "ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json" [scripts] -test = "npx ts-mocha -p ./tsconfig.json -t 1000000 ts/tests/[2-9]*.ts" +test = "npx ts-mocha -p ./tsconfig.json -t 1000000 ts/tests/[0-9]*.ts" [test] startup_wait = 16000 diff --git a/solana/Cargo.lock b/solana/Cargo.lock index dd3c762f..32a35059 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -230,9 +230,9 @@ dependencies = [ [[package]] name = "anyhow" -version = "1.0.75" +version = "1.0.79" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "a4668cab20f66d8d020e1fbc0ebe47217433c1b6c8f2040faf858554e394ace6" +checksum = "080e9890a082662b09c1ad45f567faeeb47f22b5fb23895fbe1e651e718e25ca" [[package]] name = "ark-bn254" @@ -406,9 +406,9 @@ checksum = "9e1b586273c5702936fe7b7d6896644d8be71e6314cfe09d3167c95f712589e8" [[package]] name = "base64" -version = "0.21.5" +version = "0.21.6" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "35636a1494ede3b646cc98f74f8e62c773a38a659ebc777a2cf26b9b74171df9" +checksum = "c79fed4cdb43e993fcdadc7e58a09fd0e3e649c4436fa11da71c9f1f3ee7feb9" [[package]] name = "bincode" @@ -611,7 +611,7 @@ checksum = "965ab7eb5f8f97d2a083c799f3a1b994fc397b2fe2da5d1da1626ce15a39f2b1" dependencies = [ "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] @@ -682,45 +682,37 @@ checksum = "f7144d30dcf0fafbce74250a3963025d8d52177934239851c917d29f1df280c2" [[package]] name = "cpufeatures" -version = "0.2.11" +version = "0.2.12" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ce420fe07aecd3e67c5f910618fe65e94158f6dcc0adf44e00d69ce2bdfe0fd0" +checksum = "53fe5e26ff1b7aef8bca9c6080520cfb8d9333c7568e1829cef191a9723e5504" dependencies = [ "libc", ] [[package]] name = "crossbeam-deque" -version = "0.8.3" +version = "0.8.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ce6fd6f855243022dcecf8702fef0c297d4338e226845fe067f6341ad9fa0cef" +checksum = "613f8cc01fe9cf1a3eb3d7f488fd2fa8388403e97039e2f73692932e291a770d" dependencies = [ - "cfg-if", "crossbeam-epoch", "crossbeam-utils", ] [[package]] name = "crossbeam-epoch" -version = "0.9.15" +version = "0.9.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ae211234986c545741a7dc064309f67ee1e5ad243d0e48335adc0484d960bcc7" +checksum = "5b82ac4a3c2ca9c3460964f020e1402edd5753411d7737aa39c3714ad1b5420e" dependencies = [ - "autocfg", - "cfg-if", "crossbeam-utils", - "memoffset", - "scopeguard", ] [[package]] name = "crossbeam-utils" -version = "0.8.16" +version = "0.8.19" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5a22b2d63d4d1dc0b7f1b6b2747dd0088008a9be28b6ddf0b1e7d335e3037294" -dependencies = [ - "cfg-if", -] +checksum = "248e3bacc7dc6baa3b21e405ee045c3047101a49145e7e9eca583ab4c2ca5345" [[package]] name = "crunchy" @@ -792,7 +784,7 @@ dependencies = [ "proc-macro2", "quote", "strsim", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] @@ -803,7 +795,7 @@ checksum = "836a9bbc7ad63342d6d6e7b815ccab164bc77a2d95d84bc3117a8c0d5c98e2d5" dependencies = [ "darling_core", "quote", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] @@ -972,9 +964,9 @@ dependencies = [ [[package]] name = "hashbrown" -version = "0.14.2" +version = "0.14.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f93e7192158dbcda357bdec5fb5788eebf8bbac027f3f33e719d29135ae84156" +checksum = "290f1a1d9242c78d09ce40a5e87e7554ee637af1351968159f4952f028f75604" [[package]] name = "heck" @@ -1071,7 +1063,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "d530e1a18b1cb4c484e6e34556a0d948706958449fca0cab753d649f2bce3d1f" dependencies = [ "equivalent", - "hashbrown 0.14.2", + "hashbrown 0.14.3", ] [[package]] @@ -1085,9 +1077,9 @@ dependencies = [ [[package]] name = "itoa" -version = "1.0.9" +version = "1.0.10" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "af150ab688ff2122fcef229be89cb50dd66af9e01a4ff320cc137eecc9bacc38" +checksum = "b1a46d1a171d865aa5f83f92695765caa047a9b4cbae2cbf37dbd613a793fd4c" [[package]] name = "jobserver" @@ -1100,9 +1092,9 @@ dependencies = [ [[package]] name = "js-sys" -version = "0.3.65" +version = "0.3.66" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "54c0c35952f67de54bb584e9fd912b3023117cbafc0a77d8f3dee1fb5f572fe8" +checksum = "cee9c64da59eae3b50095c18d3e74f8b73c0b86d2792824ff01bbce68ba229ca" dependencies = [ "wasm-bindgen", ] @@ -1124,9 +1116,9 @@ checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646" [[package]] name = "libc" -version = "0.2.150" +version = "0.2.152" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "89d92a4743f9a61002fae18374ed11e7973f530cb3a3255fb354818118b2203c" +checksum = "13e3bf6590cbc649f4d1a3eefc9d5d6eb746f5200ffb04e5e142700b8faa56e7" [[package]] name = "libsecp256k1" @@ -1196,6 +1188,7 @@ checksum = "b5e6163cb8c49088c2c36f57875e58ccd8c87c7427f7fbd50ea6710b2f3f2e8f" name = "matching-engine" version = "0.0.0" dependencies = [ + "ahash 0.8.6", "anchor-lang", "anchor-spl", "cfg-if", @@ -1204,13 +1197,14 @@ dependencies = [ "ruint", "solana-program", "wormhole-cctp-solana", + "wormhole-io", ] [[package]] name = "memchr" -version = "2.6.4" +version = "2.7.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f665ee40bc4a3c5590afb1e9677db74a508659dfd71e126420da8274909a0167" +checksum = "523dc4f511e55ab87b694dc30d0f820d60906ef06413f93d4d7a1385599cc149" [[package]] name = "memmap2" @@ -1322,14 +1316,14 @@ dependencies = [ "proc-macro-crate 1.3.1", "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] name = "once_cell" -version = "1.18.0" +version = "1.19.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "dd8b5dd2ae5ed71462c540258bedcb51965123ad7e7ccf4b9a8cafaa4a63576d" +checksum = "3fdb12b2476b595f9358c5161aa467c2438859caa136dec86c26fdd2efe17b92" [[package]] name = "opaque-debug" @@ -1386,9 +1380,9 @@ dependencies = [ [[package]] name = "percent-encoding" -version = "2.3.0" +version = "2.3.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9b2a4787296e9989611394c33f193f676704af1686e70b8f8033ab5ba9a35a94" +checksum = "e3148f5046208a5d56bcfc03053e3ca6334e51da8dfb19b6cdc8b306fae3283e" [[package]] name = "polyval" @@ -1429,9 +1423,9 @@ dependencies = [ [[package]] name = "proc-macro2" -version = "1.0.69" +version = "1.0.76" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "134c189feb4956b20f6f547d2cf727d4c0fe06722b20a0eec87ed445a97f92da" +checksum = "95fc56cda0b5c3325f5fbbd7ff9fda9e02bb00bb3dac51252d2f1bfa1cb8cc8c" dependencies = [ "unicode-ident", ] @@ -1447,9 +1441,9 @@ dependencies = [ [[package]] name = "quote" -version = "1.0.33" +version = "1.0.35" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5267fca4496028628a95160fc423a33e8b2e6af8a5302579e322e4b520293cae" +checksum = "291ec9ab5efd934aaf503a6466c5d5251535d108ee747472c3977cc5acc868ef" dependencies = [ "proc-macro2", ] @@ -1630,9 +1624,9 @@ checksum = "7ffc183a10b4478d04cbbbfc96d0873219d962dd5accaff2ffbd4ceb7df837f4" [[package]] name = "ryu" -version = "1.0.15" +version = "1.0.16" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1ad4cc8da4ef723ed60bced201181d83791ad433213d8c24efffda1eec85d741" +checksum = "f98d2aa92eebf49b69786be48e4477826b256916e84a57ff2a4f21923b48eb4c" [[package]] name = "scopeguard" @@ -1642,44 +1636,44 @@ checksum = "94143f37725109f92c262ed2cf5e59bce7498c01bcc1502d7b9afe439a4e9f49" [[package]] name = "semver" -version = "1.0.20" +version = "1.0.21" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "836fa6a3e1e547f9a2c4040802ec865b5d85f4014efe00555d7090a3dcaa1090" +checksum = "b97ed7a9823b74f99c7742f5336af7be5ecd3eeafcb1507d1fa93347b1d589b0" [[package]] name = "serde" -version = "1.0.193" +version = "1.0.195" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "25dd9975e68d0cb5aa1120c288333fc98731bd1dd12f561e468ea4728c042b89" +checksum = "63261df402c67811e9ac6def069e4786148c4563f4b50fd4bf30aa370d626b02" dependencies = [ "serde_derive", ] [[package]] name = "serde_bytes" -version = "0.11.12" +version = "0.11.14" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ab33ec92f677585af6d88c65593ae2375adde54efdbf16d597f2cbc7a6d368ff" +checksum = "8b8497c313fd43ab992087548117643f6fcd935cbf36f176ffda0aacf9591734" dependencies = [ "serde", ] [[package]] name = "serde_derive" -version = "1.0.193" +version = "1.0.195" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "43576ca501357b9b071ac53cdc7da8ef0cbd9493d8df094cd821777ea6e894d3" +checksum = "46fe8f8603d81ba86327b23a2e9cdf49e1255fb94a4c5f297f6ee0547178ea2c" dependencies = [ "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] name = "serde_json" -version = "1.0.108" +version = "1.0.111" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3d1c7e3eac408d115102c4c24ad393e0821bb3a5df4d506a80f85f7a742a526b" +checksum = "176e46fa42316f18edd598015a5166857fc835ec732f5215eac6b7bdbf0a84f4" dependencies = [ "itoa", "ryu", @@ -1705,7 +1699,7 @@ dependencies = [ "darling", "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] @@ -1778,9 +1772,9 @@ checksum = "4dccd0940a2dcdf68d092b8cbab7dc0ad8fa938bf95787e1b916b0e3d0e8e970" [[package]] name = "solana-frozen-abi" -version = "1.16.20" +version = "1.16.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7e77bfd59ad4e64c0f06fbcbe16d58f3a40bdbcc050fb78fc7134a55a5c290b9" +checksum = "d229588852b514378c88ea74ef6fb93c5575758d2aa3a6a300872ccf5be51772" dependencies = [ "ahash 0.8.6", "blake3", @@ -1811,21 +1805,21 @@ dependencies = [ [[package]] name = "solana-frozen-abi-macro" -version = "1.16.20" +version = "1.16.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "992b866b9f0510fd3c290afe6a37109ae8d15b74fa24e3fb6d164be2971ee94f" +checksum = "ad75a8290906967a9737c76bb5cc9769cee2097a6a6fbda08017562454ead020" dependencies = [ "proc-macro2", "quote", "rustc_version", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] name = "solana-logger" -version = "1.16.20" +version = "1.16.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0278658cd4fb5405932452bf20f7df496ce8b9e9cf66a7d1c621bbe3b01fe297" +checksum = "f4896bca227a92b31c7be15f524850aba3255d94dcb837a4097daba723a84757" dependencies = [ "env_logger", "lazy_static", @@ -1834,16 +1828,16 @@ dependencies = [ [[package]] name = "solana-program" -version = "1.16.20" +version = "1.16.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "aa5ac2110c5b927d6114b2d4f32af7f749fde0e6fd8f34777407ce89d66630be" +checksum = "de52673b07eda66299b6ff858c54f3d08bdf4addc5c56969f0a94a09bb63f853" dependencies = [ "ark-bn254", "ark-ec", "ark-ff", "ark-serialize", "array-bytes", - "base64 0.21.5", + "base64 0.21.6", "bincode", "bitflags", "blake3", @@ -1889,12 +1883,12 @@ dependencies = [ [[package]] name = "solana-sdk" -version = "1.16.20" +version = "1.16.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "dbe17a1ce6082979e7beffb7cadd7051e29d873594622a11a7d0a4c2dd4b7934" +checksum = "96d5e51b30ff694f1353755b0e1672bc01a6b72ad12353fac4e53957a2a1f783" dependencies = [ "assert_matches", - "base64 0.21.5", + "base64 0.21.6", "bincode", "bitflags", "borsh 0.10.3", @@ -1942,25 +1936,25 @@ dependencies = [ [[package]] name = "solana-sdk-macro" -version = "1.16.20" +version = "1.16.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9fe4363d2503a75325ec94aa18b063574edb3454d38840e01c5af477b3b0689d" +checksum = "d5c5ae1f2b5e7dec7dcab0199a642e1900b981c156547942156c5c4fbcc3eafa" dependencies = [ "bs58 0.4.0", "proc-macro2", "quote", "rustversion", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] name = "solana-zk-token-sdk" -version = "1.16.20" +version = "1.16.24" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "e0c83eec033c30c95938905374292fb8a3559dd3dfb36d715624e5f8f41b078e" +checksum = "d66b682b70d18374f8619a1e61ec461d481d5ee7dc2057d53d7370176f41027c" dependencies = [ "aes-gcm-siv", - "base64 0.21.5", + "base64 0.21.6", "bincode", "bytemuck", "byteorder", @@ -2065,9 +2059,9 @@ dependencies = [ [[package]] name = "syn" -version = "2.0.39" +version = "2.0.48" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "23e78b90f2fcf45d3e842032ce32e3f2d1545ba6636271dcbf24fa306d87be7a" +checksum = "0f3531638e407dfc0814761abb7c00a5b54992b849452a0646b7f65c9f770f3f" dependencies = [ "proc-macro2", "quote", @@ -2085,22 +2079,22 @@ dependencies = [ [[package]] name = "thiserror" -version = "1.0.50" +version = "1.0.56" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f9a7210f5c9a7156bb50aa36aed4c95afb51df0df00713949448cf9e97d382d2" +checksum = "d54378c645627613241d077a3a79db965db602882668f9136ac42af9ecb730ad" dependencies = [ "thiserror-impl", ] [[package]] name = "thiserror-impl" -version = "1.0.50" +version = "1.0.56" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "266b2e40bc00e5a6c09c3584011e08b06f123c00362c92b975ba9843aaaa14b8" +checksum = "fa0faa943b50f3db30a20aa7e265dbc66076993efed8463e8de414e5d06d3471" dependencies = [ "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] @@ -2137,6 +2131,22 @@ version = "0.1.1" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "1f3ccbac311fea05f86f61904b462b55fb3df8837a366dfc601a0161d0532f20" +[[package]] +name = "token-router" +version = "0.0.0" +dependencies = [ + "ahash 0.8.6", + "anchor-lang", + "anchor-spl", + "cfg-if", + "hex", + "hex-literal", + "ruint", + "solana-program", + "wormhole-cctp-solana", + "wormhole-io", +] + [[package]] name = "toml" version = "0.5.11" @@ -2230,9 +2240,9 @@ checksum = "9c8d87e72b64a3b4db28d11ce29237c246188f4f51057d65a7eab63b7987e423" [[package]] name = "wasm-bindgen" -version = "0.2.88" +version = "0.2.89" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7daec296f25a1bae309c0cd5c29c4b260e510e6d813c286b19eaadf409d40fce" +checksum = "0ed0d4f68a3015cc185aff4db9506a015f4b96f95303897bfa23f846db54064e" dependencies = [ "cfg-if", "wasm-bindgen-macro", @@ -2240,24 +2250,24 @@ dependencies = [ [[package]] name = "wasm-bindgen-backend" -version = "0.2.88" +version = "0.2.89" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "e397f4664c0e4e428e8313a469aaa58310d302159845980fd23b0f22a847f217" +checksum = "1b56f625e64f3a1084ded111c4d5f477df9f8c92df113852fa5a374dbda78826" dependencies = [ "bumpalo", "log", "once_cell", "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", "wasm-bindgen-shared", ] [[package]] name = "wasm-bindgen-macro" -version = "0.2.88" +version = "0.2.89" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5961017b3b08ad5f3fe39f1e79877f8ee7c23c5e5fd5eb80de95abc41f1f16b2" +checksum = "0162dbf37223cd2afce98f3d0785506dcb8d266223983e4b5b525859e6e182b2" dependencies = [ "quote", "wasm-bindgen-macro-support", @@ -2265,28 +2275,28 @@ dependencies = [ [[package]] name = "wasm-bindgen-macro-support" -version = "0.2.88" +version = "0.2.89" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c5353b8dab669f5e10f5bd76df26a9360c748f054f862ff5f3f8aae0c7fb3907" +checksum = "f0eb82fcb7930ae6219a7ecfd55b217f5f0893484b7a13022ebb2b2bf20b5283" dependencies = [ "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", "wasm-bindgen-backend", "wasm-bindgen-shared", ] [[package]] name = "wasm-bindgen-shared" -version = "0.2.88" +version = "0.2.89" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0d046c5d029ba91a1ed14da14dca44b68bf2f124cfbaf741c54151fdb3e0750b" +checksum = "7ab9b36309365056cd639da3134bf87fa8f3d86008abf99e612384a6eecd459f" [[package]] name = "web-sys" -version = "0.3.65" +version = "0.3.66" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5db499c5f66323272151db0e666cd34f78617522fb0c1604d31a27c50c206a85" +checksum = "50c24a44ec86bb68fbecd1b3efed7e85ea5621b39b35ef2766b66cd984f8010f" dependencies = [ "js-sys", "wasm-bindgen", @@ -2382,9 +2392,9 @@ checksum = "ed94fce61571a4006852b7389a063ab983c02eb1bb37b47f8272ce92d06d9538" [[package]] name = "winnow" -version = "0.5.19" +version = "0.5.33" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "829846f3e3db426d4cee4510841b71a8e58aa2a76b1132579487ae430ccd9c7b" +checksum = "b7520bbdec7211caa7c4e682eb1fbe07abe20cee6756b6e00f537c82c11816aa" dependencies = [ "memchr", ] @@ -2439,22 +2449,22 @@ dependencies = [ [[package]] name = "zerocopy" -version = "0.7.26" +version = "0.7.32" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "e97e415490559a91254a2979b4829267a57d2fcd741a98eee8b722fb57289aa0" +checksum = "74d4d3961e53fa4c9a25a8637fc2bfaf2595b3d3ae34875568a5cf64787716be" dependencies = [ "zerocopy-derive", ] [[package]] name = "zerocopy-derive" -version = "0.7.26" +version = "0.7.32" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "dd7e48ccf166952882ca8bd778a43502c64f33bf94c12ebe2a7f08e5a0f6689f" +checksum = "9ce1b18ccd8e73a9321186f97e46f9f04b778851177567b1975109d26a08d2a6" dependencies = [ "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", ] [[package]] @@ -2474,5 +2484,5 @@ checksum = "ce36e65b0d2999d2aafac989fb249189a141aee1f53c612c1f37d72631959f69" dependencies = [ "proc-macro2", "quote", - "syn 2.0.39", + "syn 2.0.48", ] diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 28e4ca1b..7f75b69f 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -2,6 +2,7 @@ members = [ "programs/*" ] +resolver = "2" [workspace.dependencies.wormhole-cctp-solana] version = "0.0.1-alpha.1" @@ -12,6 +13,7 @@ version = "0.28.0" features = ["derive", "init-if-needed"] [workspace.dependencies] +wormhole-io = "0.1.1" anchor-spl = "0.28.0" solana-program = "1.16.16" hex = "0.4.3" @@ -19,6 +21,10 @@ ruint = "1.9.0" cfg-if = "1.0" hex-literal = "0.4.1" +### https://github.com/coral-xyz/anchor/issues/2755 +### This dependency must be added for each program. +ahash = "=0.8.6" + [profile.release.build-override] opt-level = 3 incremental = false diff --git a/solana/Makefile b/solana/Makefile index 844b2344..afb8948e 100644 --- a/solana/Makefile +++ b/solana/Makefile @@ -22,6 +22,7 @@ node_modules: build: $(out_$(NETWORK)) $(out_$(NETWORK)): ifdef out_$(NETWORK) + anchor build -p token_router --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features anchor build -p matching_engine --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features mkdir -p $(out_$(NETWORK)) cp target/deploy/*.so $(out_$(NETWORK))/ @@ -29,6 +30,8 @@ endif test: node_modules cargo test --all-features + anchor build -p token_router --arch sbf -- --features testnet + mkdir -p ts/tests/artifacts && cp target/deploy/token_router.so ts/tests/artifacts/testnet_token_router.so anchor build -p matching_engine --arch sbf -- --features testnet mkdir -p ts/tests/artifacts && cp target/deploy/matching_engine.so ts/tests/artifacts/testnet_matching_engine.so anchor build --arch sbf -- --features integration-test diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index a812c4b4..3d493e47 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -18,12 +18,17 @@ integration-test = ["testnet"] [dependencies] wormhole-cctp-solana = { workspace = true, features = ["cpi"] } +wormhole-io.workspace = true + anchor-lang.workspace = true anchor-spl.workspace = true solana-program.workspace = true + hex.workspace = true ruint.workspace = true cfg-if.workspace = true +ahash.workspace = true + [dev-dependencies] hex-literal.workspace = true \ No newline at end of file diff --git a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs index 28750e46..eb067856 100644 --- a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs @@ -31,6 +31,8 @@ pub struct AddRouterEndpoint<'info> { )] router_endpoint: Account<'info, RouterEndpoint>, + remote_token_messenger: Option>, + system_program: Program<'info, System>, } @@ -59,11 +61,15 @@ pub fn add_router_endpoint( fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { require!( - args.chain != 0 && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + args.chain != 0 + && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, MatchingEngineError::ChainNotAllowed ); - require!(args.address != [0; 32], MatchingEngineError::InvalidEndpoint); + require!( + args.address != [0; 32], + MatchingEngineError::InvalidEndpoint + ); // Done. Ok(()) diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml new file mode 100644 index 00000000..a05d3542 --- /dev/null +++ b/solana/programs/token-router/Cargo.toml @@ -0,0 +1,34 @@ +[package] +name = "token-router" +version = "0.0.0" +description = "Example Token Router Program" +edition = "2021" + +[lib] +crate-type = ["cdylib", "lib"] + +[features] +default = ["testnet", "no-idl"] +no-entrypoint = [] +no-idl = [] +no-log-ix-name = [] +cpi = ["no-entrypoint"] +testnet = ["wormhole-cctp-solana/testnet"] +integration-test = ["testnet"] + +[dependencies] +wormhole-cctp-solana = { workspace = true, features = ["cpi"] } +wormhole-io.workspace = true + +anchor-lang.workspace = true +anchor-spl.workspace = true +solana-program.workspace = true + +hex.workspace = true +ruint.workspace = true +cfg-if.workspace = true + +ahash.workspace = true + +[dev-dependencies] +hex-literal.workspace = true \ No newline at end of file diff --git a/solana/programs/token-router/README.md b/solana/programs/token-router/README.md new file mode 100644 index 00000000..e69de29b diff --git a/solana/programs/token-router/src/constants.rs b/solana/programs/token-router/src/constants.rs new file mode 100644 index 00000000..4e0b9492 --- /dev/null +++ b/solana/programs/token-router/src/constants.rs @@ -0,0 +1,10 @@ +use anchor_lang::prelude::constant; + +/// Swap rate precision. This value should NEVER change, unless other Token +/// Bridge Relayer contracts are deployed with a different precision. +#[constant] +pub const NATIVE_SWAP_RATE_PRECISION: u128 = u128::pow(10, 8); + +/// Seed for custody token account. +#[constant] +pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs new file mode 100644 index 00000000..74f0ca60 --- /dev/null +++ b/solana/programs/token-router/src/error.rs @@ -0,0 +1,168 @@ +#[anchor_lang::prelude::error_code] +pub enum TokenRouterError { + #[msg("AssistantZeroPubkey")] + AssistantZeroPubkey = 0x100, + + #[msg("FeeRecipientZeroPubkey")] + FeeRecipientZeroPubkey = 0x102, + + /// Only the program's owner is permitted. + #[msg("OwnerOnly")] + OwnerOnly = 0x200, + + #[msg("InvalidNewOwner")] + InvalidNewOwner = 0x202, + + /// Specified key is already the program's owner. + #[msg("AlreadyOwner")] + AlreadyOwner = 0x204, + + #[msg("NoTransferOwnershipRequest")] + NoTransferOwnershipRequest = 0x206, + + #[msg("InvalidNewAssistant")] + InvalidNewAssistant = 0x208, + + #[msg("InvalidNewFeeRecipient")] + InvalidNewFeeRecipient = 0x20a, + + #[msg("InvalidChain")] + InvalidChain = 0x20c, + + #[msg("CctpRemoteTokenMessengerRequired")] + CctpRemoteTokenMessengerRequired, + + #[msg("InvalidCctpEndpoint")] + InvalidCctpEndpoint, + + #[msg("OutboundTransfersPaused")] + /// Outbound transfers are paused. + OutboundTransfersPaused, + + #[msg("OwnerOrAssistantOnly")] + // Only the program's owner or assistant is permitted. + OwnerOrAssistantOnly, + + #[msg("NotPendingOwner")] + /// Only the program's pending owner is permitted. + NotPendingOwner, + + #[msg("AlreadyTheFeeRecipient")] + /// Specified key is already the program's fee recipient. + AlreadyTheFeeRecipient, + + #[msg("BumpNotFound")] + /// Bump not found in `bumps` map. + BumpNotFound, + + #[msg("FailedToMakeImmutable")] + /// Failed to make program immutable. + FailedToMakeImmutable, + + #[msg("InvalidEndpoint")] + /// Specified foreign contract has a bad chain ID or zero address. + InvalidEndpoint, + + #[msg("ChainNotAllowed")] + ChainNotAllowed, + + #[msg("ZeroBridgeAmount")] + /// Nothing to transfer if amount is zero. + ZeroBridgeAmount, + + #[msg("InvalidToNativeAmount")] + /// Must be strictly zero or nonzero when normalized. + InvalidToNativeAmount, + + #[msg("NativeMintRequired")] + /// Must be the native mint. + NativeMintRequired, + + #[msg("SwapsNotAllowedForNativeMint")] + /// Swaps are not allowed for the native mint. + SwapsNotAllowedForNativeMint, + + #[msg("InvalidTokenBridgeConfig")] + /// Specified Token Bridge config PDA is wrong. + InvalidTokenBridgeConfig, + + #[msg("InvalidTokenBridgeAuthoritySigner")] + /// Specified Token Bridge authority signer PDA is wrong. + InvalidTokenBridgeAuthoritySigner, + + #[msg("InvalidTokenBridgeCustodySigner")] + /// Specified Token Bridge custody signer PDA is wrong. + InvalidTokenBridgeCustodySigner, + + #[msg("InvalidTokenBridgeEmitter")] + /// Specified Token Bridge emitter PDA is wrong. + InvalidTokenBridgeEmitter, + + #[msg("InvalidTokenBridgeSequence")] + /// Specified Token Bridge sequence PDA is wrong. + InvalidTokenBridgeSequence, + + #[msg("InvalidRecipient")] + /// Specified recipient has a bad chain ID or zero address. + InvalidRecipient, + + #[msg("InvalidTransferToChain")] + /// Deserialized token chain is invalid. + InvalidTransferToChain, + + #[msg("InvalidTransferTokenChain")] + /// Deserialized recipient chain is invalid. + InvalidTransferTokenChain, + + #[msg("InvalidPrecision")] + /// Relayer fee and swap rate precision must be nonzero. + InvalidPrecision, + + #[msg("InvalidTransferToAddress")] + /// Deserialized recipient must be this program or the redeemer PDA. + InvalidTransferToAddress, + + #[msg("AlreadyRedeemed")] + /// Token Bridge program's transfer is already redeemed. + AlreadyRedeemed, + + #[msg("InvalidTokenBridgeForeignEndpoint")] + /// Token Bridge program's foreign endpoint disagrees with registered one. + InvalidTokenBridgeForeignEndpoint, + + #[msg("InvalidTokenBridgeMintAuthority")] + /// Specified Token Bridge mint authority PDA is wrong. + InvalidTokenBridgeMintAuthority, + + #[msg("InvalidPublicKey")] + /// Pubkey is the default. + InvalidPublicKey, + + #[msg("ZeroSwapRate")] + /// Swap rate is zero. + ZeroSwapRate, + + #[msg("TokenNotRegistered")] + /// Token is not registered. + TokenNotRegistered, + + #[msg("ChainNotRegistered")] + /// Foreign contract not registered for specified chain. + ChainNotRegistered, + + #[msg("TokenAlreadyRegistered")] + /// Token is already registered. + TokenAlreadyRegistered, + + #[msg("TokenFeeCalculationError")] + /// Token fee overflow. + FeeCalculationError, + + #[msg("InvalidSwapCalculation")] + /// Swap calculation overflow. + InvalidSwapCalculation, + + #[msg("InsufficientFunds")] + /// Insufficient funds for outbound transfer. + InsufficientFunds, +} diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs new file mode 100644 index 00000000..b71ea844 --- /dev/null +++ b/solana/programs/token-router/src/lib.rs @@ -0,0 +1,191 @@ +#![doc = include_str!("../README.md")] +#![allow(clippy::result_large_err)] + +pub mod constants; + +pub mod error; + +pub mod messages; + +mod processor; +pub(crate) use processor::*; + +pub mod state; + +use anchor_lang::prelude::*; + +cfg_if::cfg_if! { + if #[cfg(feature = "mainnet")] { + // Placeholder. + declare_id!("TokenRouter11111111111111111111111111111111"); + } else if #[cfg(feature = "testnet")] { + // Placeholder. + declare_id!("TokenRouter11111111111111111111111111111111"); + } +} + +#[program] +pub mod token_router { + use super::*; + + /// This instruction is be used to generate your program's config. + /// And for convenience, we will store Wormhole-related PDAs in the + /// config so we can verify these accounts with a simple == constraint. + pub fn initialize(ctx: Context) -> Result<()> { + processor::initialize(ctx) + } + + // /// This instruction is used to transfer native tokens from Solana to a + // /// foreign blockchain. The user can optionally specify a + // /// `to_native_token_amount` to swap some of the tokens for the native + // /// asset on the target chain. For a fee, an off-chain relayer will redeem + // /// the transfer on the target chain. If the user is transferring native + // /// SOL, the contract will automatically wrap the lamports into a WSOL. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `TransferNativeWithRelay` context + // /// * `amount` - Amount of tokens to send + // /// * `to_native_token_amount`: + // /// - Amount of tokens to swap for native assets on the target chain + // /// * `recipient_chain` - Chain ID of the target chain + // /// * `recipient_address` - Address of the target wallet on the target chain + // /// * `batch_id` - Nonce of Wormhole message + // /// * `wrap_native` - Whether to wrap native SOL + // pub fn transfer_tokens_with_relay( + // ctx: Context, + // args: TransferTokensWithRelayArgs, + // ) -> Result<()> { + // processor::transfer_tokens_with_relay(ctx, args) + // } + + // Admin. + + /// This instruction sets the `pending_owner` field in the `OwnerConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can submit an + /// ownership transfer request. + pub fn submit_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::submit_ownership_transfer_request(ctx) + } + + /// This instruction confirms that the `pending_owner` is the signer of + /// the transaction and updates the `owner` field in the `SenderConfig`, + /// `RedeemerConfig`, and `OwnerConfig` accounts. + pub fn confirm_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::confirm_ownership_transfer_request(ctx) + } + + /// This instruction cancels the ownership transfer request by setting + /// the `pending_owner` field in the `OwnerConfig` account to `None`. + /// This instruction is owner-only, meaning that only the owner of the + /// program (defined in the [Config] account) can cancel an ownership + /// transfer request. + pub fn cancel_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::cancel_ownership_transfer_request(ctx) + } + + /// This instruction updates the `assistant` field in the `OwnerConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can update the + /// assistant. + pub fn update_owner_assistant(ctx: Context) -> Result<()> { + processor::update_owner_assistant(ctx) + } + + pub fn add_router_endpoint( + ctx: Context, + args: AddRouterEndpointArgs, + ) -> Result<()> { + processor::add_router_endpoint(ctx, args) + } + + /// This instruction updates the `paused` boolean in the `SenderConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can pause outbound + /// transfers. + /// + /// # Arguments + /// + /// * `ctx` - `SetPause` context + /// * `paused` - Boolean indicating whether outbound transfers are paused. + pub fn set_pause(ctx: Context, paused: bool) -> Result<()> { + processor::set_pause(ctx, paused) + } + + // /// This instruction is used to transfer wrapped tokens from Solana to a + // /// foreign blockchain. The user can optionally specify a + // /// `to_native_token_amount` to swap some of the tokens for the native + // /// assets on the target chain. For a fee, an off-chain relayer will redeem + // /// the transfer on the target chain. This instruction should only be called + // /// when the user is transferring a wrapped token. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `TransferWrappedWithRelay` context + // /// * `amount` - Amount of tokens to send + // /// * `to_native_token_amount`: + // /// - Amount of tokens to swap for native assets on the target chain + // /// * `recipient_chain` - Chain ID of the target chain + // /// * `recipient_address` - Address of the target wallet on the target chain + // /// * `batch_id` - Nonce of Wormhole message + // pub fn transfer_wrapped_tokens_with_relay( + // ctx: Context, + // amount: u64, + // to_native_token_amount: u64, + // recipient_chain: u16, + // recipient_address: [u8; 32], + // batch_id: u32, + // ) -> Result<()> { + // processor::transfer_wrapped_tokens_with_relay( + // ctx, + // amount, + // to_native_token_amount, + // recipient_chain, + // recipient_address, + // batch_id, + // ) + // } + + // /// This instruction is used to redeem token transfers from foreign emitters. + // /// It takes custody of the released native tokens and sends the tokens to the + // /// encoded `recipient`. It pays the `fee_recipient` in the token + // /// denomination. If requested by the user, it will perform a swap with the + // /// off-chain relayer to provide the user with lamports. If the token + // /// being transferred is WSOL, the contract will unwrap the WSOL and send + // /// the lamports to the recipient and pay the relayer in lamports. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `CompleteNativeWithRelay` context + // /// * `vaa_hash` - Hash of the VAA that triggered the transfer + // pub fn complete_native_transfer_with_relay( + // ctx: Context, + // _vaa_hash: [u8; 32], + // ) -> Result<()> { + // processor::complete_native_transfer_with_relay(ctx, _vaa_hash) + // } + + // /// This instruction is used to redeem token transfers from foreign emitters. + // /// It takes custody of the minted wrapped tokens and sends the tokens to the + // /// encoded `recipient`. It pays the `fee_recipient` in the wrapped-token + // /// denomination. If requested by the user, it will perform a swap with the + // /// off-chain relayer to provide the user with lamports. + // /// + // /// # Arguments + // /// + // /// * `ctx` - `CompleteWrappedWithRelay` context + // /// * `vaa_hash` - Hash of the VAA that triggered the transfer + // pub fn complete_wrapped_transfer_with_relay( + // ctx: Context, + // _vaa_hash: [u8; 32], + // ) -> Result<()> { + // processor::complete_wrapped_transfer_with_relay(ctx, _vaa_hash) + // } +} diff --git a/solana/programs/token-router/src/messages.rs b/solana/programs/token-router/src/messages.rs new file mode 100644 index 00000000..d8e3cde3 --- /dev/null +++ b/solana/programs/token-router/src/messages.rs @@ -0,0 +1,89 @@ +//! Messages relevant to the Token Router across all networks. These messages are serialized and +//! then published via the Wormhole CCTP program. + +use ruint::aliases::U256; +use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; + +#[derive(Debug, Clone, PartialEq, Eq)] +pub struct TransferTokensWithRelay { + pub target_relayer_fee: U256, + pub to_native_token_amount: U256, + pub target_recipient_wallet: [u8; 32], +} + +impl Readable for TransferTokensWithRelay { + const SIZE: Option = Some(32 + 32 + 32); + + fn read(reader: &mut R) -> std::io::Result + where + Self: Sized, + R: std::io::Read, + { + Ok(Self { + target_relayer_fee: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, + to_native_token_amount: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, + target_recipient_wallet: Readable::read(reader)?, + }) + } +} + +impl Writeable for TransferTokensWithRelay { + fn written_size(&self) -> usize { + ::SIZE.unwrap() + } + + fn write(&self, writer: &mut W) -> std::io::Result<()> + where + Self: Sized, + W: std::io::Write, + { + self.target_relayer_fee.to_be_bytes::<32>().write(writer)?; + self.to_native_token_amount + .to_be_bytes::<32>() + .write(writer)?; + self.target_recipient_wallet.write(writer)?; + Ok(()) + } +} + +impl TypePrefixedPayload for TransferTokensWithRelay { + const TYPE: Option = Some(1); +} + +#[cfg(test)] +mod test { + use hex_literal::hex; + + use super::*; + + #[test] + fn transfer_tokens_with_relay() { + let msg = TransferTokensWithRelay { + target_relayer_fee: U256::from(69u64), + to_native_token_amount: U256::from(420u64), + target_recipient_wallet: hex!( + "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" + ), + }; + + let mut bytes = Vec::with_capacity(msg.payload_written_size()); + msg.write_typed(&mut bytes).unwrap(); + assert_eq!(bytes.len(), msg.payload_written_size()); + assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + + let mut cursor = std::io::Cursor::new(&mut bytes); + let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); + assert_eq!(recovered, msg); + } + + #[test] + fn invalid_message_type() { + let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + + let mut cursor = std::io::Cursor::new(&mut bytes); + let err = TransferTokensWithRelay::read_typed(&mut cursor) + .err() + .unwrap(); + matches!(err.kind(), std::io::ErrorKind::InvalidData); + } +} diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs new file mode 100644 index 00000000..5470d765 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs @@ -0,0 +1,117 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use wormhole_cctp_solana::{ + cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, + utils::ExternalAccount, +}; + +#[derive(Accounts)] +#[instruction(chain: u16)] +pub struct AddRouterEndpoint<'info> { + #[account( + mut, + constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + #[account( + init_if_needed, + payer = owner_or_assistant, + space = 8 + RouterEndpoint::INIT_SPACE, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &chain.to_be_bytes() + ], + bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + remote_token_messenger: Option>, + + system_program: Program<'info, System>, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct AddRouterEndpointArgs { + pub chain: u16, + pub address: [u8; 32], + pub cctp_domain: Option, +} + +#[access_control(check_constraints(&ctx, &args))] +pub fn add_router_endpoint( + ctx: Context, + args: AddRouterEndpointArgs, +) -> Result<()> { + let AddRouterEndpointArgs { + chain, + address, + cctp_domain, + } = args; + + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { + bump: ctx.bumps["router_endpoint"], + chain, + address, + cctp_domain, + }); + + // Done. + Ok(()) +} + +fn check_constraints(ctx: &Context, args: &AddRouterEndpointArgs) -> Result<()> { + require!( + args.chain != 0 + && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + TokenRouterError::ChainNotAllowed + ); + + require!(args.address != [0; 32], TokenRouterError::InvalidEndpoint); + + // If the endpoint is a CCTP endpoint, check that there is a CCTP remote token messenger + // corresponding to the specified CCTP domain. + if let Some(cctp_domain) = args.cctp_domain { + let acc_info = ctx + .accounts + .remote_token_messenger + .as_ref() + .ok_or(TokenRouterError::CctpRemoteTokenMessengerRequired)?; + + // Check that the account derives to the expected. + let (expected_key, _) = Pubkey::find_program_address( + &[ + RemoteTokenMessenger::SEED_PREFIX, + cctp_domain.to_string().as_ref(), + ], + &token_messenger_minter_program::id(), + ); + require_keys_eq!(acc_info.key(), expected_key, ErrorCode::ConstraintSeeds); + + // Now that we re-derived the remote token messenger account using the provided CCTP domain, + // deserialize and double-check that the domain in the account matches the provided one + // (which is what we would have done in the account context, but this account is optional so + // we have to check it here in access control). + let mut acc_data: &[_] = &acc_info.try_borrow_data()?; + let expected_cctp_domain = + ExternalAccount::::try_deserialize(&mut acc_data) + .map(|messenger| messenger.domain)?; + require_eq!( + cctp_domain, + expected_cctp_domain, + TokenRouterError::InvalidCctpEndpoint + ); + } + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs new file mode 100644 index 00000000..a0815b5c --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -0,0 +1,78 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; +use solana_program::bpf_loader_upgradeable; + +#[derive(Accounts)] +pub struct Initialize<'info> { + /// Owner of the program, who presumably deployed this program. + #[account(mut)] + owner: Signer<'info>, + + #[account( + init, + payer = owner, + space = 8 + Custodian::INIT_SPACE, + seeds = [Custodian::SEED_PREFIX], + bump, + )] + /// Sender Config account, which saves program data useful for other + /// instructions, specifically for outbound transfers. Also saves the payer + /// of the [`initialize`](crate::initialize) instruction as the program's + /// owner. + custodian: Account<'info, Custodian>, + + /// CHECK: This account must not be the zero pubkey. + #[account( + owner = Pubkey::default(), + constraint = owner_assistant.key() != Pubkey::default() @ TokenRouterError::AssistantZeroPubkey + )] + owner_assistant: AccountInfo<'info>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + /// + /// NOTE: Set upgrade authority is scary because any public key can be used to set as the + /// authority. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, + + system_program: Program<'info, System>, +} + +pub fn initialize(ctx: Context) -> Result<()> { + let owner = ctx.accounts.owner.key(); + ctx.accounts.custodian.set_inner(Custodian { + bump: ctx.bumps["custodian"], + paused: false, + paused_set_by: owner, + owner, + pending_owner: None, + owner_assistant: ctx.accounts.owner_assistant.key(), + }); + + #[cfg(not(feature = "integration-test"))] + { + // Make the program immutable. + solana_program::program::invoke( + &bpf_loader_upgradeable::set_upgrade_authority( + &crate::ID, + &ctx.accounts.owner.key(), + None, + ), + &ctx.accounts.to_account_infos(), + )?; + } + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/mod.rs b/solana/programs/token-router/src/processor/admin/mod.rs new file mode 100644 index 00000000..dea764f6 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/mod.rs @@ -0,0 +1,29 @@ +mod add_router_endpoint; +pub use add_router_endpoint::*; + +mod initialize; +pub use initialize::*; + +mod ownership_transfer_request; +pub use ownership_transfer_request::*; + +mod set_pause; +pub use set_pause::*; + +mod update; +pub use update::*; + +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +pub(self) fn require_owner_or_assistant( + custodian: &Custodian, + caller: &AccountInfo, +) -> Result { + require!( + *caller.key == custodian.owner || *caller.key == custodian.owner_assistant, + TokenRouterError::OwnerOrAssistantOnly + ); + + Ok(true) +} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs new file mode 100644 index 00000000..711f6410 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -0,0 +1,25 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct CancelOwnershipTransferRequest<'info> { + owner: Signer<'info>, + + /// Custodian, which can only be modified by the configured owner. + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + has_one = owner @ TokenRouterError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, +} + +pub fn cancel_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + ctx.accounts.custodian.pending_owner = None; + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs new file mode 100644 index 00000000..faad5568 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -0,0 +1,29 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct ConfirmOwnershipTransferRequest<'info> { + /// Must be the pending owner of the program set in the [`OwnerConfig`] + /// account. + pending_owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = custodian.pending_owner.is_some() @ TokenRouterError::NoTransferOwnershipRequest, + constraint = custodian.pending_owner.unwrap() == pending_owner.key() @ TokenRouterError::NotPendingOwner, + )] + custodian: Account<'info, Custodian>, +} + +pub fn confirm_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + let custodian = &mut ctx.accounts.custodian; + custodian.owner = ctx.accounts.pending_owner.key(); + custodian.pending_owner = None; + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs new file mode 100644 index 00000000..c33a7ba7 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/mod.rs @@ -0,0 +1,8 @@ +mod cancel; +pub use cancel::*; + +mod confirm; +pub use confirm::*; + +mod submit; +pub use submit::*; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs new file mode 100644 index 00000000..d2521e43 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -0,0 +1,34 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct SubmitOwnershipTransferRequest<'info> { + owner: Signer<'info>, + + /// Custodian, which can only be modified by the configured owner. + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + has_one = owner @ TokenRouterError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + /// New Owner. + /// + /// CHECK: Must be neither zero pubkey nor current owner. + #[account( + constraint = new_owner.key() != Pubkey::default() @ TokenRouterError::InvalidNewOwner, + constraint = new_owner.key() != owner.key() @ TokenRouterError::AlreadyOwner + )] + new_owner: AccountInfo<'info>, +} + +pub fn submit_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + ctx.accounts.custodian.pending_owner = Some(ctx.accounts.new_owner.key()); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs new file mode 100644 index 00000000..9770fda8 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/set_pause.rs @@ -0,0 +1,26 @@ +use crate::state::Custodian; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct SetPause<'info> { + owner_or_assistant: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + )] + /// Sender Config account. This program requires that the `owner` specified + /// in the context equals the pubkey specified in this account. Mutable. + custodian: Account<'info, Custodian>, +} + +pub fn set_pause(ctx: Context, paused: bool) -> Result<()> { + let custodian = &mut ctx.accounts.custodian; + custodian.paused = paused; + custodian.paused_set_by = ctx.accounts.owner_or_assistant.key(); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/update/mod.rs b/solana/programs/token-router/src/processor/admin/update/mod.rs new file mode 100644 index 00000000..656c9345 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/update/mod.rs @@ -0,0 +1,2 @@ +mod owner_assistant; +pub use owner_assistant::*; diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs new file mode 100644 index 00000000..d7ac2604 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -0,0 +1,31 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct UpdateOwnerAssistant<'info> { + /// Owner of the program set in the [`OwnerConfig`] account. + owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + has_one = owner @ TokenRouterError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + /// New Assistant. + /// + /// CHECK: Must be neither zero pubkey nor current owner assistant. + #[account( + constraint = new_owner_assistant.key() != Pubkey::default() @ TokenRouterError::InvalidNewAssistant, + )] + new_owner_assistant: AccountInfo<'info>, +} + +pub fn update_owner_assistant(ctx: Context) -> Result<()> { + ctx.accounts.custodian.owner_assistant = ctx.accounts.new_owner_assistant.key(); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/update_fee_recipient.rs b/solana/programs/token-router/src/processor/admin/update_fee_recipient.rs new file mode 100644 index 00000000..ed877b44 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/update_fee_recipient.rs @@ -0,0 +1,44 @@ +use crate::{ + error::MatchingEngineError, + state::Custodian, +}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct UpdateFeeRecipient<'info> { + #[account( + mut, + constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + system_program: Program<'info, System>, +} + +pub fn update_fee_recipient( + ctx: Context, + new_fee_recipient: Pubkey, +) -> Result<()> { + require_keys_neq!( + new_fee_recipient, + Pubkey::default(), + MatchingEngineError::FeeRecipientZeroPubkey + ); + require_keys_neq!( + new_fee_recipient, + ctx.accounts.custodian.fee_recipient, + TokenBridgeRelayerError::AlreadyTheFeeRecipient + ); + + // Update the fee_recipient key. + let custodian = &mut ctx.accounts.custodian; + custodian.fee_recipient = new_fee_recipient; + + Ok(()) +} \ No newline at end of file diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs new file mode 100644 index 00000000..34989d94 --- /dev/null +++ b/solana/programs/token-router/src/processor/mod.rs @@ -0,0 +1,2 @@ +mod admin; +pub use admin::*; \ No newline at end of file diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs new file mode 100644 index 00000000..9cd95382 --- /dev/null +++ b/solana/programs/token-router/src/state/custodian.rs @@ -0,0 +1,29 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(Debug, InitSpace)] +pub struct Custodian { + pub bump: u8, + + /// Boolean indicating whether outbound transfers are paused. + pub paused: bool, + + /// Program's owner. + pub owner: Pubkey, + pub pending_owner: Option, + + /// Program's assistant. Can be used to update the relayer fee and swap rate. + pub owner_assistant: Pubkey, + + /// Indicate who last set the `paused` value. When the program is first initialized, this is set + /// to the `owner`. + pub paused_set_by: Pubkey, +} + +impl Custodian { + pub const SEED_PREFIX: &'static [u8] = b"custodian"; + + pub fn is_authorized(&self, key: &Pubkey) -> bool { + self.owner == *key || self.owner_assistant == *key + } +} diff --git a/solana/programs/token-router/src/state/mod.rs b/solana/programs/token-router/src/state/mod.rs new file mode 100644 index 00000000..2d82dc57 --- /dev/null +++ b/solana/programs/token-router/src/state/mod.rs @@ -0,0 +1,8 @@ +mod custodian; +pub use custodian::*; + +mod payer_sequence; +pub use payer_sequence::*; + +mod router_endpoint; +pub use router_endpoint::*; diff --git a/solana/programs/token-router/src/state/payer_sequence.rs b/solana/programs/token-router/src/state/payer_sequence.rs new file mode 100644 index 00000000..94fe84b0 --- /dev/null +++ b/solana/programs/token-router/src/state/payer_sequence.rs @@ -0,0 +1,27 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(InitSpace)] +pub struct PayerSequence { + pub value: u64, +} + +impl PayerSequence { + pub const SEED_PREFIX: &'static [u8] = b"seq"; + + pub fn take_and_uptick(&mut self) -> u64 { + let seq = self.value; + + self.value += 1; + + seq + } +} + +impl std::ops::Deref for PayerSequence { + type Target = u64; + + fn deref(&self) -> &Self::Target { + &self.value + } +} diff --git a/solana/programs/token-router/src/state/router_endpoint.rs b/solana/programs/token-router/src/state/router_endpoint.rs new file mode 100644 index 00000000..90873f47 --- /dev/null +++ b/solana/programs/token-router/src/state/router_endpoint.rs @@ -0,0 +1,22 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(Debug, InitSpace)] +/// Foreign emitter account data. +pub struct RouterEndpoint { + pub bump: u8, + + /// Emitter chain. Cannot equal `1` (Solana's Chain ID). + pub chain: u16, + + /// Emitter address. Cannot be zero address. + pub address: [u8; 32], + + /// CCTP domain, which is how CCTP registers identifies foreign networks. If there is no CCTP + /// for a given foreign network, this field is `None`. + pub cctp_domain: Option, +} + +impl RouterEndpoint { + pub const SEED_PREFIX: &'static [u8] = b"endpoint"; +} diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index 9842276e..61ce3f94 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -8,7 +8,11 @@ import IDL from "../../target/idl/token_router.json"; import { TokenRouter } from "../../target/types/token_router"; import { Custodian, PayerSequence, RouterEndpoint } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "./utils"; -import { WormholeCctpProgram } from "./wormholeCctp"; +import { + MessageTransmitterProgram, + TokenMessengerMinterProgram, + WormholeCctpProgram, +} from "./wormholeCctp"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; @@ -24,6 +28,7 @@ export type TransferTokensWithRelayArgs = { export type AddRouterEndpointArgs = { chain: ChainId; address: Array; + cctpDomain: number | null; }; export type RegisterContractArgs = { @@ -282,6 +287,7 @@ export class TokenRouterProgram { ownerOrAssistant: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; + remoteTokenMessenger?: PublicKey; }, args: AddRouterEndpointArgs ): Promise { @@ -289,14 +295,20 @@ export class TokenRouterProgram { ownerOrAssistant, custodian: inputCustodian, routerEndpoint: inputRouterEndpoint, + remoteTokenMessenger: inputRemoteTokenMessenger, } = accounts; - const { chain } = args; + const { chain, cctpDomain } = args; + const derivedRemoteTokenMessenger = + cctpDomain === null + ? null + : this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); return this.program.methods .addRouterEndpoint(args) .accounts({ ownerOrAssistant, custodian: inputCustodian ?? this.custodianAddress(), routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + remoteTokenMessenger: inputRemoteTokenMessenger ?? derivedRemoteTokenMessenger, }) .instruction(); } @@ -316,8 +328,66 @@ export class TokenRouterProgram { }) .instruction(); } + + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { + switch (this._programId) { + case testnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + case mainnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + messageTransmitterProgram(): MessageTransmitterProgram { + switch (this._programId) { + case testnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + case mainnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + coreBridgeProgramId(): PublicKey { + switch (this._programId) { + case testnet(): { + return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); + } + case mainnet(): { + return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); + } + default: { + throw new Error("unsupported network"); + } + } + } } export function testnet(): ProgramId { return "TokenRouter11111111111111111111111111111111"; } + +export function mainnet(): ProgramId { + return "TokenRouter11111111111111111111111111111111"; +} diff --git a/solana/ts/src/state/RouterEndpoint.ts b/solana/ts/src/state/RouterEndpoint.ts index a9811b31..eeee10bd 100644 --- a/solana/ts/src/state/RouterEndpoint.ts +++ b/solana/ts/src/state/RouterEndpoint.ts @@ -5,11 +5,13 @@ export class RouterEndpoint { bump: number; chain: number; address: Array; + cctpDomain: number | null; - constructor(bump: number, chain: number, address: Array) { + constructor(bump: number, chain: number, address: Array, cctpDomain: number | null) { this.bump = bump; this.chain = chain; this.address = address; + this.cctpDomain = cctpDomain; } static address(programId: PublicKey, chain: ChainId) { diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/01__tokenRouter.ts index e2801d4f..5f1a1113 100644 --- a/solana/ts/tests/01__tokenRouter.ts +++ b/solana/ts/tests/01__tokenRouter.ts @@ -18,6 +18,7 @@ describe("Token Router", function () { const foreignChain = CHAINS.ethereum; const invalidChain = (foreignChain + 1) as ChainId; const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const foreignCctpDomain = 0; const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); const tokenRouter = new TokenRouterProgram(connection); @@ -340,6 +341,7 @@ describe("Token Router", function () { const createAddRouterEndpointIx = (opts?: { sender?: PublicKey; contractAddress?: Array; + cctpDomain?: number | null; }) => tokenRouter.addRouterEndpointIx( { @@ -348,6 +350,7 @@ describe("Token Router", function () { { chain: foreignChain, address: opts?.contractAddress ?? routerEndpointAddress, + cctpDomain: opts?.cctpDomain ?? foreignCctpDomain, } ); @@ -386,7 +389,7 @@ describe("Token Router", function () { [ await tokenRouter.addRouterEndpointIx( { ownerOrAssistant: owner.publicKey }, - { chain, address: routerEndpointAddress } + { chain, address: routerEndpointAddress, cctpDomain: null } ), ], [owner], @@ -428,6 +431,7 @@ describe("Token Router", function () { bump: 255, chain: foreignChain, address: contractAddress, + cctpDomain: foreignCctpDomain, } as RouterEndpoint; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); @@ -450,6 +454,7 @@ describe("Token Router", function () { bump: 255, chain: foreignChain, address: routerEndpointAddress, + cctpDomain: foreignCctpDomain, } as RouterEndpoint; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); From 4d8050032baa9ff4c2e38dfb5fa3716863a39559 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 8 Jan 2024 17:34:55 -0600 Subject: [PATCH 004/126] solana: fix workspace --- solana/Cargo.toml | 8 ++++++++ solana/programs/matching-engine/Cargo.toml | 8 ++++++-- solana/programs/token-router/Cargo.toml | 8 ++++++-- 3 files changed, 20 insertions(+), 4 deletions(-) diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 7f75b69f..b967c9dc 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -4,6 +4,14 @@ members = [ ] resolver = "2" +[workspace.package] +edition = "2021" +version = "0.0.0" +authors = ["Wormhole Contributors"] +license = "Apache-2.0" +homepage = "https://wormhole.com" +repository = "https://github.com/wormhole-foundation/example-liquidity-layer" + [workspace.dependencies.wormhole-cctp-solana] version = "0.0.1-alpha.1" default-features = false diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index 3d493e47..61b3f4d9 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -1,8 +1,12 @@ [package] name = "matching-engine" -version = "0.0.0" description = "Example Matching Engine Program" -edition = "2021" +version.workspace = true +edition.workspace = true +authors.workspace = true +license.workspace = true +homepage.workspace = true +repository.workspace = true [lib] crate-type = ["cdylib", "lib"] diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index a05d3542..c209fcfd 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -1,8 +1,12 @@ [package] name = "token-router" -version = "0.0.0" description = "Example Token Router Program" -edition = "2021" +version.workspace = true +edition.workspace = true +authors.workspace = true +license.workspace = true +homepage.workspace = true +repository.workspace = true [lib] crate-type = ["cdylib", "lib"] From a91c81a3162df2c656fd1c8e93b021c3ba5ccd94 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 9 Jan 2024 09:20:02 -0600 Subject: [PATCH 005/126] solana: add intitialize tests for matching engine --- solana/programs/matching-engine/src/error.rs | 8 +- .../src/processor/admin/initialize.rs | 4 +- solana/ts/src/matching_engine/index.ts | 130 ++++++++++++++ .../ts/src/matching_engine/state/Custodian.ts | 38 ++++ solana/ts/src/matching_engine/state/index.ts | 1 + solana/ts/tests/02__matchingEngine.ts | 166 ++++++++++++++++++ 6 files changed, 343 insertions(+), 4 deletions(-) create mode 100644 solana/ts/src/matching_engine/index.ts create mode 100644 solana/ts/src/matching_engine/state/Custodian.ts create mode 100644 solana/ts/src/matching_engine/state/index.ts create mode 100644 solana/ts/tests/02__matchingEngine.ts diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index e0dec13e..61426166 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -44,7 +44,11 @@ pub enum MatchingEngineError { /// The auction grace period is less than the `auction_duration`. InvalidAuctionGracePeriod, - #[msg("ValueLargerThanMaxPrecision")] + #[msg("UserPenaltyTooLarge")] /// The value is larger than the maximum precision constant. - ValueLargerThanMaxPrecision, + UserPenaltyTooLarge, + + #[msg("InitialPenaltyTooLarge")] + /// The value is larger than the maximum precision constant. + InitialPenaltyTooLarge, } diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 73f8efba..06216f40 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -96,11 +96,11 @@ fn check_constraints(config: &AuctionConfig) -> Result<()> { ); require!( config.user_penalty_reward_bps <= FEE_PRECISION_MAX, - MatchingEngineError::ValueLargerThanMaxPrecision + MatchingEngineError::UserPenaltyTooLarge ); require!( config.initial_penalty_bps <= FEE_PRECISION_MAX, - MatchingEngineError::ValueLargerThanMaxPrecision + MatchingEngineError::InitialPenaltyTooLarge ); // Done. diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts new file mode 100644 index 00000000..47a72a57 --- /dev/null +++ b/solana/ts/src/matching_engine/index.ts @@ -0,0 +1,130 @@ +export * from "./state/"; + +import { ChainId } from "@certusone/wormhole-sdk"; +import { BN, Program } from "@coral-xyz/anchor"; +import * as splToken from "@solana/spl-token"; +import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; +import IDL from "../../../target/idl/matching_engine.json"; +import { MatchingEngine } from "../../../target/types/matching_engine"; +import { AuctionConfig, Custodian } from "./state"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; +import { WormholeCctpProgram } from "../wormholeCctp"; + +export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; + +export type ProgramId = (typeof PROGRAM_IDS)[number]; + +export type AddRouterEndpointArgs = { + chain: ChainId; + address: Array; +}; + +export class MatchingEngineProgram { + private _programId: ProgramId; + + program: Program; + + // TODO: fix this + constructor(connection: Connection, programId?: ProgramId) { + this._programId = programId ?? testnet(); + this.program = new Program(IDL as any, new PublicKey(this._programId), { + connection, + }); + } + + get ID(): PublicKey { + return this.program.programId; + } + + wormholeCctpProgram(): WormholeCctpProgram { + switch (this._programId) { + case testnet(): { + return new WormholeCctpProgram( + this.program.provider.connection, + "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + custodianAddress(): PublicKey { + return Custodian.address(this.ID); + } + + async fetchCustodian(addr: PublicKey): Promise { + return this.program.account.custodian.fetch(addr); + } + + custodyTokenAccountAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; + } + + async fetchPayerSequence(addr: PublicKey): Promise { + return this.program.account.payerSequence + .fetch(addr) + .then((acct) => acct.value) + .catch((_) => new BN(0)); + } + + // routerEndpointAddress(chain: ChainId): PublicKey { + // return RouterEndpoint.address(this.ID, chain); + // } + + // async fetchRouterEndpoint(addr: PublicKey): Promise { + // return this.program.account.routerEndpoint.fetch(addr); + // } + + async initializeIx( + auctionConfig: AuctionConfig, + accounts: { + owner: PublicKey; + ownerAssistant: PublicKey; + feeRecipient: PublicKey; + } + ): Promise { + const { owner, ownerAssistant, feeRecipient } = accounts; + + return this.program.methods + .initialize(auctionConfig) + .accounts({ + owner, + custodian: this.custodianAddress(), + ownerAssistant, + feeRecipient, + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + }) + .instruction(); + } + + // async addRouterEndpointIx( + // accounts: { + // ownerOrAssistant: PublicKey; + // custodian?: PublicKey; + // routerEndpoint?: PublicKey; + // }, + // args: AddRouterEndpointArgs + // ): Promise { + // const { + // ownerOrAssistant, + // custodian: inputCustodian, + // routerEndpoint: inputRouterEndpoint, + // } = accounts; + // const { chain } = args; + // return this.program.methods + // .addRouterEndpoint(args) + // .accounts({ + // ownerOrAssistant, + // custodian: inputCustodian ?? this.custodianAddress(), + // routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + // }) + // .instruction(); + // } +} + +export function testnet(): ProgramId { + return "MatchingEngine11111111111111111111111111111"; +} diff --git a/solana/ts/src/matching_engine/state/Custodian.ts b/solana/ts/src/matching_engine/state/Custodian.ts new file mode 100644 index 00000000..a003aba6 --- /dev/null +++ b/solana/ts/src/matching_engine/state/Custodian.ts @@ -0,0 +1,38 @@ +import { PublicKey } from "@solana/web3.js"; + +export interface AuctionConfig { + userPenaltyRewardBps: number; + initialPenaltyBps: number; + auctionDuration: number; + auctionGracePeriod: number; + auctionPenaltyBlocks: number; +} + +export class Custodian { + bump: number; + owner: PublicKey; + pendingOwner: PublicKey | null; + ownerAssistant: PublicKey; + feeRecipient: PublicKey; + auctionConfig: AuctionConfig; + + constructor( + bump: number, + owner: PublicKey, + pendingOwner: PublicKey | null, + ownerAssistant: PublicKey, + feeRecipient: PublicKey, + auctionConfig: AuctionConfig + ) { + this.bump = bump; + this.owner = owner; + this.pendingOwner = pendingOwner; + this.ownerAssistant = ownerAssistant; + this.feeRecipient = feeRecipient; + this.auctionConfig = auctionConfig; + } + + static address(programId: PublicKey) { + return PublicKey.findProgramAddressSync([Buffer.from("custodian")], programId)[0]; + } +} diff --git a/solana/ts/src/matching_engine/state/index.ts b/solana/ts/src/matching_engine/state/index.ts new file mode 100644 index 00000000..1c5edd43 --- /dev/null +++ b/solana/ts/src/matching_engine/state/index.ts @@ -0,0 +1 @@ +export * from "./Custodian"; diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts new file mode 100644 index 00000000..5e655600 --- /dev/null +++ b/solana/ts/tests/02__matchingEngine.ts @@ -0,0 +1,166 @@ +import { CHAINS, ChainId } from "@certusone/wormhole-sdk"; +import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; +import { use as chaiUse, expect } from "chai"; +import chaiAsPromised from "chai-as-promised"; +import { AuctionConfig, Custodian, MatchingEngineProgram } from "../src/matching_engine"; +import { LOCALHOST, PAYER_KEYPAIR, expectIxErr, expectIxOk } from "./helpers"; + +chaiUse(chaiAsPromised); + +describe("Matching Engine", function () { + const connection = new Connection(LOCALHOST, "processed"); + // payer is also the recipient in all tests + const payer = PAYER_KEYPAIR; + const owner = Keypair.generate(); + const ownerAssistant = Keypair.generate(); + const feeRecipient = Keypair.generate(); + + const foreignChain = CHAINS.ethereum; + const invalidChain = (foreignChain + 1) as ChainId; + const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const engine = new MatchingEngineProgram(connection); + + describe("Admin", function () { + describe("Initialize", function () { + const auctionConfig: AuctionConfig = { + userPenaltyRewardBps: 250000, + initialPenaltyBps: 250000, + auctionDuration: 10, + auctionGracePeriod: 30, + auctionPenaltyBlocks: 60, + }; + + const createInitializeIx = (opts?: { + ownerAssistant?: PublicKey; + feeRecipient?: PublicKey; + }) => + engine.initializeIx(auctionConfig, { + owner: payer.publicKey, + ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, + feeRecipient: opts?.feeRecipient ?? feeRecipient.publicKey, + }); + + it("Cannot Initialize With Default Owner Assistant", async function () { + await expectIxErr( + connection, + [ + await createInitializeIx({ + ownerAssistant: PublicKey.default, + }), + ], + [payer], + "AssistantZeroPubkey" + ); + }); + + it("Cannot Initialize With Default Fee Recipient", async function () { + await expectIxErr( + connection, + [ + await createInitializeIx({ + feeRecipient: PublicKey.default, + }), + ], + [payer], + "FeeRecipientZeroPubkey" + ); + }); + + it("Cannot Initialize With Invalid Auction Duration", async function () { + const newAuctionConfig = { ...auctionConfig } as AuctionConfig; + newAuctionConfig.auctionDuration = 0; + + await expectIxErr( + connection, + [ + await engine.initializeIx(newAuctionConfig, { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient: feeRecipient.publicKey, + }), + ], + [payer], + "InvalidAuctionDuration" + ); + }); + + it("Cannot Initialize With Invalid Auction Grace Period", async function () { + const newAuctionConfig = { ...auctionConfig } as AuctionConfig; + newAuctionConfig.auctionGracePeriod = auctionConfig.auctionDuration - 1; + + await expectIxErr( + connection, + [ + await engine.initializeIx(newAuctionConfig, { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient: feeRecipient.publicKey, + }), + ], + [payer], + "InvalidAuctionGracePeriod" + ); + }); + + it("Cannot Initialize With Invalid User Penalty", async function () { + const newAuctionConfig = { ...auctionConfig } as AuctionConfig; + newAuctionConfig.userPenaltyRewardBps = 4294967295; + + await expectIxErr( + connection, + [ + await engine.initializeIx(newAuctionConfig, { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient: feeRecipient.publicKey, + }), + ], + [payer], + "UserPenaltyTooLarge" + ); + }); + + it("Cannot Initialize With Invalid Initial Penalty", async function () { + const newAuctionConfig = { ...auctionConfig } as AuctionConfig; + newAuctionConfig.initialPenaltyBps = 4294967295; + + await expectIxErr( + connection, + [ + await engine.initializeIx(newAuctionConfig, { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient: feeRecipient.publicKey, + }), + ], + [payer], + "InitialPenaltyTooLarge" + ); + }); + + it("Finally Initialize Program", async function () { + await expectIxOk(connection, [await createInitializeIx()], [payer]); + + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + const expectedCustodianData = { + bump: 255, + owner: payer.publicKey, + pendingOwner: null, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient: feeRecipient.publicKey, + auctionConfig: auctionConfig, + } as Custodian; + expect(custodianData).to.eql(expectedCustodianData); + }); + + it("Cannot Call Instruction Again: initialize", async function () { + await expectIxErr( + connection, + [await createInitializeIx({})], + [payer], + "already in use" + ); + }); + }); + }); +}); From 44be4c6dcde470d764411f3210af210cf989017f Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 9 Jan 2024 10:20:07 -0600 Subject: [PATCH 006/126] solana: add foreign endpoint registration and tests --- .../processor/admin/add_router_endpoint.rs | 5 +- solana/ts/src/matching_engine/index.ts | 60 +++---- .../matching_engine/state/RouterEndpoint.ts | 23 +++ solana/ts/src/matching_engine/state/index.ts | 1 + solana/ts/tests/02__matchingEngine.ts | 161 +++++++++++++++--- 5 files changed, 197 insertions(+), 53 deletions(-) create mode 100644 solana/ts/src/matching_engine/state/RouterEndpoint.ts diff --git a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs index eb067856..6d39bad4 100644 --- a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs @@ -31,8 +31,6 @@ pub struct AddRouterEndpoint<'info> { )] router_endpoint: Account<'info, RouterEndpoint>, - remote_token_messenger: Option>, - system_program: Program<'info, System>, } @@ -61,8 +59,7 @@ pub fn add_router_endpoint( fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { require!( - args.chain != 0 - && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + args.chain != 0, MatchingEngineError::ChainNotAllowed ); diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index 47a72a57..b791b973 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -6,7 +6,7 @@ import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; import IDL from "../../../target/idl/matching_engine.json"; import { MatchingEngine } from "../../../target/types/matching_engine"; -import { AuctionConfig, Custodian } from "./state"; +import { AuctionConfig, Custodian, RouterEndpoint } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { WormholeCctpProgram } from "../wormholeCctp"; @@ -69,13 +69,13 @@ export class MatchingEngineProgram { .catch((_) => new BN(0)); } - // routerEndpointAddress(chain: ChainId): PublicKey { - // return RouterEndpoint.address(this.ID, chain); - // } + routerEndpointAddress(chain: ChainId): PublicKey { + return RouterEndpoint.address(this.ID, chain); + } - // async fetchRouterEndpoint(addr: PublicKey): Promise { - // return this.program.account.routerEndpoint.fetch(addr); - // } + async fetchRouterEndpoint(addr: PublicKey): Promise { + return this.program.account.routerEndpoint.fetch(addr); + } async initializeIx( auctionConfig: AuctionConfig, @@ -100,29 +100,29 @@ export class MatchingEngineProgram { .instruction(); } - // async addRouterEndpointIx( - // accounts: { - // ownerOrAssistant: PublicKey; - // custodian?: PublicKey; - // routerEndpoint?: PublicKey; - // }, - // args: AddRouterEndpointArgs - // ): Promise { - // const { - // ownerOrAssistant, - // custodian: inputCustodian, - // routerEndpoint: inputRouterEndpoint, - // } = accounts; - // const { chain } = args; - // return this.program.methods - // .addRouterEndpoint(args) - // .accounts({ - // ownerOrAssistant, - // custodian: inputCustodian ?? this.custodianAddress(), - // routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), - // }) - // .instruction(); - // } + async addRouterEndpointIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + }, + args: AddRouterEndpointArgs + ): Promise { + const { + ownerOrAssistant, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + } = accounts; + const { chain } = args; + return this.program.methods + .addRouterEndpoint(args) + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + }) + .instruction(); + } } export function testnet(): ProgramId { diff --git a/solana/ts/src/matching_engine/state/RouterEndpoint.ts b/solana/ts/src/matching_engine/state/RouterEndpoint.ts new file mode 100644 index 00000000..a9811b31 --- /dev/null +++ b/solana/ts/src/matching_engine/state/RouterEndpoint.ts @@ -0,0 +1,23 @@ +import { ChainId } from "@certusone/wormhole-sdk"; +import { PublicKey } from "@solana/web3.js"; + +export class RouterEndpoint { + bump: number; + chain: number; + address: Array; + + constructor(bump: number, chain: number, address: Array) { + this.bump = bump; + this.chain = chain; + this.address = address; + } + + static address(programId: PublicKey, chain: ChainId) { + const encodedChain = Buffer.alloc(2); + encodedChain.writeUInt16BE(chain); + return PublicKey.findProgramAddressSync( + [Buffer.from("endpoint"), encodedChain], + programId + )[0]; + } +} diff --git a/solana/ts/src/matching_engine/state/index.ts b/solana/ts/src/matching_engine/state/index.ts index 1c5edd43..71b00f2d 100644 --- a/solana/ts/src/matching_engine/state/index.ts +++ b/solana/ts/src/matching_engine/state/index.ts @@ -1 +1,2 @@ export * from "./Custodian"; +export * from "./RouterEndpoint"; diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index 5e655600..c3ad9d7c 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -2,21 +2,25 @@ import { CHAINS, ChainId } from "@certusone/wormhole-sdk"; import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; -import { AuctionConfig, Custodian, MatchingEngineProgram } from "../src/matching_engine"; +import { + AuctionConfig, + Custodian, + RouterEndpoint, + MatchingEngineProgram, +} from "../src/matching_engine"; import { LOCALHOST, PAYER_KEYPAIR, expectIxErr, expectIxOk } from "./helpers"; chaiUse(chaiAsPromised); describe("Matching Engine", function () { const connection = new Connection(LOCALHOST, "processed"); - // payer is also the recipient in all tests - const payer = PAYER_KEYPAIR; - const owner = Keypair.generate(); + // owner is also the recipient in all tests + const owner = PAYER_KEYPAIR; const ownerAssistant = Keypair.generate(); + const robber = Keypair.generate(); const feeRecipient = Keypair.generate(); const foreignChain = CHAINS.ethereum; - const invalidChain = (foreignChain + 1) as ChainId; const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const engine = new MatchingEngineProgram(connection); @@ -35,7 +39,7 @@ describe("Matching Engine", function () { feeRecipient?: PublicKey; }) => engine.initializeIx(auctionConfig, { - owner: payer.publicKey, + owner: owner.publicKey, ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, feeRecipient: opts?.feeRecipient ?? feeRecipient.publicKey, }); @@ -48,7 +52,7 @@ describe("Matching Engine", function () { ownerAssistant: PublicKey.default, }), ], - [payer], + [owner], "AssistantZeroPubkey" ); }); @@ -61,7 +65,7 @@ describe("Matching Engine", function () { feeRecipient: PublicKey.default, }), ], - [payer], + [owner], "FeeRecipientZeroPubkey" ); }); @@ -74,12 +78,12 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: payer.publicKey, + owner: owner.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [payer], + [owner], "InvalidAuctionDuration" ); }); @@ -92,12 +96,12 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: payer.publicKey, + owner: owner.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [payer], + [owner], "InvalidAuctionGracePeriod" ); }); @@ -110,12 +114,12 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: payer.publicKey, + owner: owner.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [payer], + [owner], "UserPenaltyTooLarge" ); }); @@ -128,23 +132,23 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: payer.publicKey, + owner: owner.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [payer], + [owner], "InitialPenaltyTooLarge" ); }); it("Finally Initialize Program", async function () { - await expectIxOk(connection, [await createInitializeIx()], [payer]); + await expectIxOk(connection, [await createInitializeIx()], [owner]); const custodianData = await engine.fetchCustodian(engine.custodianAddress()); const expectedCustodianData = { bump: 255, - owner: payer.publicKey, + owner: owner.publicKey, pendingOwner: null, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, @@ -157,10 +161,129 @@ describe("Matching Engine", function () { await expectIxErr( connection, [await createInitializeIx({})], - [payer], + [owner], "already in use" ); }); }); + + describe("Add Router Endpoint", function () { + const createAddRouterEndpointIx = (opts?: { + sender?: PublicKey; + contractAddress?: Array; + }) => + engine.addRouterEndpointIx( + { + ownerOrAssistant: opts?.sender ?? owner.publicKey, + }, + { + chain: foreignChain, + address: opts?.contractAddress ?? routerEndpointAddress, + } + ); + + before("Transfer Lamports to Owner, Owner Assistant and Robber", async function () { + await expectIxOk( + connection, + [ + SystemProgram.transfer({ + fromPubkey: owner.publicKey, + toPubkey: ownerAssistant.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: owner.publicKey, + toPubkey: robber.publicKey, + lamports: 1000000000, + }), + ], + [owner] + ); + }); + + it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { + await expectIxErr( + connection, + [await createAddRouterEndpointIx({ sender: robber.publicKey })], + [robber], + "OwnerOrAssistantOnly" + ); + }); + + it("Cannot Register Chain ID == 0", async function () { + const chain = 0; + + await expectIxErr( + connection, + [ + await engine.addRouterEndpointIx( + { ownerOrAssistant: owner.publicKey }, + { chain, address: routerEndpointAddress } + ), + ], + [owner], + "ChainNotAllowed" + ); + }); + + it("Cannot Register Zero Address", async function () { + await expectIxErr( + connection, + [ + await createAddRouterEndpointIx({ + contractAddress: new Array(32).fill(0), + }), + ], + [owner], + "InvalidEndpoint" + ); + }); + + it(`Add Router Endpoint as Owner Assistant`, async function () { + const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); + await expectIxOk( + connection, + [ + await createAddRouterEndpointIx({ + sender: ownerAssistant.publicKey, + contractAddress, + }), + ], + [ownerAssistant] + ); + + const routerEndpointData = await engine.fetchRouterEndpoint( + engine.routerEndpointAddress(foreignChain) + ); + const expectedRouterEndpointData = { + bump: 255, + chain: foreignChain, + address: contractAddress, + } as RouterEndpoint; + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + + it(`Update Router Endpoint as Owner`, async function () { + await expectIxOk( + connection, + [ + await createAddRouterEndpointIx({ + contractAddress: routerEndpointAddress, + }), + ], + [owner] + ); + + const routerEndpointData = await engine.fetchRouterEndpoint( + engine.routerEndpointAddress(foreignChain) + ); + const expectedRouterEndpointData = { + bump: 255, + chain: foreignChain, + address: routerEndpointAddress, + } as RouterEndpoint; + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + }); }); }); From af320480b3d2eb200e91a190ec458435a05e91da Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 10:30:36 -0600 Subject: [PATCH 007/126] solana: add ownable-tools; remove idl --- solana/Cargo.lock | 8 + solana/Cargo.toml | 11 +- solana/modules/ownable-tools/Cargo.toml | 17 + solana/modules/ownable-tools/src/lib.rs | 27 + .../ownable-tools/src/utils/assistant.rs | 23 + solana/modules/ownable-tools/src/utils/mod.rs | 6 + .../ownable-tools/src/utils/ownable.rs | 16 + .../ownable-tools/src/utils/pending_owner.rs | 51 + solana/programs/matching-engine/Cargo.toml | 2 +- solana/programs/token-router/Cargo.toml | 4 +- .../processor/admin/add_router_endpoint.rs | 7 +- .../token-router/src/processor/admin/mod.rs | 15 - .../ownership_transfer_request/cancel.rs | 4 +- .../ownership_transfer_request/confirm.rs | 7 +- .../ownership_transfer_request/submit.rs | 5 +- .../src/processor/admin/set_pause.rs | 5 +- .../processor/admin/update/owner_assistant.rs | 8 +- .../token-router/src/state/custodian.rs | 45 +- solana/ts/src/index.ts | 5 +- .../circle/idl/message_transmitter.json | 1099 ------------- .../circle/idl/token_messenger_minter.json | 1451 ----------------- .../circle/messageTransmitter/index.ts | 15 +- .../circle/tokenMessengerMinter/index.ts | 22 +- .../idl/wormhole_cctp_solana.json | 916 ----------- solana/ts/src/wormholeCctp/index.ts | 5 +- solana/tsconfig.json | 1 - 26 files changed, 238 insertions(+), 3537 deletions(-) create mode 100644 solana/modules/ownable-tools/Cargo.toml create mode 100644 solana/modules/ownable-tools/src/lib.rs create mode 100644 solana/modules/ownable-tools/src/utils/assistant.rs create mode 100644 solana/modules/ownable-tools/src/utils/mod.rs create mode 100644 solana/modules/ownable-tools/src/utils/ownable.rs create mode 100644 solana/modules/ownable-tools/src/utils/pending_owner.rs delete mode 100644 solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json delete mode 100644 solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json delete mode 100644 solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 32a35059..08205904 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1331,6 +1331,13 @@ version = "0.3.0" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "624a8340c38c1b80fd549087862da4ba43e08858af025b236e509b6649fc13d5" +[[package]] +name = "ownable-tools" +version = "0.0.0" +dependencies = [ + "anchor-lang", +] + [[package]] name = "parking_lot" version = "0.12.1" @@ -2141,6 +2148,7 @@ dependencies = [ "cfg-if", "hex", "hex-literal", + "ownable-tools", "ruint", "solana-program", "wormhole-cctp-solana", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index b967c9dc..0b7f5151 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -1,5 +1,6 @@ [workspace] members = [ + "modules/*", "programs/*" ] resolver = "2" @@ -16,12 +17,9 @@ repository = "https://github.com/wormhole-foundation/example-liquidity-layer" version = "0.0.1-alpha.1" default-features = false -[workspace.dependencies.anchor-lang] -version = "0.28.0" -features = ["derive", "init-if-needed"] - [workspace.dependencies] wormhole-io = "0.1.1" +anchor-lang = "0.28.0" anchor-spl = "0.28.0" solana-program = "1.16.16" hex = "0.4.3" @@ -29,6 +27,11 @@ ruint = "1.9.0" cfg-if = "1.0" hex-literal = "0.4.1" +anyhow = "1.0" +thiserror = "1.0" + +ownable-tools = { path = "modules/ownable-tools"} + ### https://github.com/coral-xyz/anchor/issues/2755 ### This dependency must be added for each program. ahash = "=0.8.6" diff --git a/solana/modules/ownable-tools/Cargo.toml b/solana/modules/ownable-tools/Cargo.toml new file mode 100644 index 00000000..b259a684 --- /dev/null +++ b/solana/modules/ownable-tools/Cargo.toml @@ -0,0 +1,17 @@ +[package] +name = "ownable-tools" +edition.workspace = true +version.workspace = true +authors.workspace = true +license.workspace = true +homepage.workspace = true +repository.workspace = true + +# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html + +[features] +default = ["assistant"] +assistant = [] + +[dependencies] +anchor-lang.workspace = true \ No newline at end of file diff --git a/solana/modules/ownable-tools/src/lib.rs b/solana/modules/ownable-tools/src/lib.rs new file mode 100644 index 00000000..f564222c --- /dev/null +++ b/solana/modules/ownable-tools/src/lib.rs @@ -0,0 +1,27 @@ +pub mod utils; + +use anchor_lang::prelude::Pubkey; + +pub trait Ownable { + fn owner(&self) -> &Pubkey; + + fn owner_mut(&mut self) -> &mut Pubkey; +} + +pub trait PendingOwner: Ownable { + fn pending_owner(&self) -> &Option; + + fn pending_owner_mut(&mut self) -> &mut Option; +} + +pub trait OwnerAssistant: Ownable { + fn owner_assistant(&self) -> &Pubkey; + + fn owner_assistant_mut(&mut self) -> &mut Pubkey; +} + +#[cfg(test)] +mod tests { + // use super::*; + // TODO +} diff --git a/solana/modules/ownable-tools/src/utils/assistant.rs b/solana/modules/ownable-tools/src/utils/assistant.rs new file mode 100644 index 00000000..2d98b8b8 --- /dev/null +++ b/solana/modules/ownable-tools/src/utils/assistant.rs @@ -0,0 +1,23 @@ +use crate::OwnerAssistant; +use anchor_lang::prelude::*; + +pub fn only_owner_assistant(acct: &Account, owner_assistant: &Pubkey) -> bool +where + A: OwnerAssistant + Clone + AccountSerialize + AccountDeserialize, +{ + acct.owner_assistant() == owner_assistant +} + +pub fn only_authorized(acct: &Account, owner_or_assistant: &Pubkey) -> bool +where + A: OwnerAssistant + Clone + AccountSerialize + AccountDeserialize, +{ + acct.owner() == owner_or_assistant || acct.owner_assistant() == owner_or_assistant +} + +pub fn transfer_owner_assistant(acct: &mut Account, new_assistant: &Pubkey) +where + A: OwnerAssistant + Clone + AccountSerialize + AccountDeserialize, +{ + *acct.owner_assistant_mut() = *new_assistant; +} diff --git a/solana/modules/ownable-tools/src/utils/mod.rs b/solana/modules/ownable-tools/src/utils/mod.rs new file mode 100644 index 00000000..6799f7e6 --- /dev/null +++ b/solana/modules/ownable-tools/src/utils/mod.rs @@ -0,0 +1,6 @@ +#[cfg(feature = "assistant")] +pub mod assistant; + +pub mod ownable; + +pub mod pending_owner; diff --git a/solana/modules/ownable-tools/src/utils/ownable.rs b/solana/modules/ownable-tools/src/utils/ownable.rs new file mode 100644 index 00000000..856c70a7 --- /dev/null +++ b/solana/modules/ownable-tools/src/utils/ownable.rs @@ -0,0 +1,16 @@ +use crate::Ownable; +use anchor_lang::prelude::*; + +pub fn only_owner(acct: &Account, owner: &Pubkey) -> bool +where + A: Ownable + Clone + AccountSerialize + AccountDeserialize, +{ + *acct.owner() == *owner +} + +pub fn transfer_ownership(acct: &mut Account, new_owner: &Pubkey) +where + A: Ownable + Clone + AccountSerialize + AccountDeserialize, +{ + *acct.owner_mut() = *new_owner; +} diff --git a/solana/modules/ownable-tools/src/utils/pending_owner.rs b/solana/modules/ownable-tools/src/utils/pending_owner.rs new file mode 100644 index 00000000..de4638ab --- /dev/null +++ b/solana/modules/ownable-tools/src/utils/pending_owner.rs @@ -0,0 +1,51 @@ +use crate::PendingOwner; +use anchor_lang::prelude::*; + +pub fn only_pending_owner_unchecked(acct: &Account, pending_owner: &Pubkey) -> bool +where + A: PendingOwner + Clone + AccountSerialize + AccountDeserialize, +{ + acct.pending_owner().unwrap() == *pending_owner +} + +pub fn only_pending_owner(acct: &Account, pending_owner: &Pubkey) -> bool +where + A: PendingOwner + Clone + AccountSerialize + AccountDeserialize, +{ + let pending = acct.pending_owner(); + pending.is_some() && only_pending_owner_unchecked(acct, pending_owner) +} + +pub fn transfer_ownership(acct: &mut Account, new_owner: &Pubkey) +where + A: PendingOwner + Clone + AccountSerialize + AccountDeserialize, +{ + acct.pending_owner_mut().replace(*new_owner); +} + +pub fn accept_ownership_unchecked(acct: &mut Account) +where + A: PendingOwner + Clone + AccountSerialize + AccountDeserialize, +{ + *acct.owner_mut() = *acct.pending_owner().as_ref().unwrap(); + *acct.pending_owner_mut() = None; +} + +pub fn accept_ownership(acct: &mut Account) -> bool +where + A: PendingOwner + Clone + AccountSerialize + AccountDeserialize, +{ + if acct.pending_owner().is_some() { + accept_ownership_unchecked(acct); + true + } else { + false + } +} + +pub fn cancel_transfer_ownership(acct: &mut Account) +where + A: PendingOwner + Clone + AccountSerialize + AccountDeserialize, +{ + *acct.pending_owner_mut() = None; +} diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index 61b3f4d9..f6cd37e9 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -24,7 +24,7 @@ integration-test = ["testnet"] wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true -anchor-lang.workspace = true +anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true solana-program.workspace = true diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index c209fcfd..66e3b095 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -24,7 +24,7 @@ integration-test = ["testnet"] wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true -anchor-lang.workspace = true +anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true solana-program.workspace = true @@ -32,6 +32,8 @@ hex.workspace = true ruint.workspace = true cfg-if.workspace = true +ownable-tools.workspace = true + ahash.workspace = true [dev-dependencies] diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs index 5470d765..8e0e674a 100644 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs @@ -3,6 +3,7 @@ use crate::{ state::{Custodian, RouterEndpoint}, }; use anchor_lang::prelude::*; +use ownable_tools::utils::assistant::only_authorized; use wormhole_cctp_solana::{ cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, utils::ExternalAccount, @@ -11,15 +12,13 @@ use wormhole_cctp_solana::{ #[derive(Accounts)] #[instruction(chain: u16)] pub struct AddRouterEndpoint<'info> { - #[account( - mut, - constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, - )] + #[account(mut)] owner_or_assistant: Signer<'info>, #[account( seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, + constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ TokenRouterError::OwnerOrAssistantOnly, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/token-router/src/processor/admin/mod.rs b/solana/programs/token-router/src/processor/admin/mod.rs index dea764f6..ffb38665 100644 --- a/solana/programs/token-router/src/processor/admin/mod.rs +++ b/solana/programs/token-router/src/processor/admin/mod.rs @@ -12,18 +12,3 @@ pub use set_pause::*; mod update; pub use update::*; - -use crate::{error::TokenRouterError, state::Custodian}; -use anchor_lang::prelude::*; - -pub(self) fn require_owner_or_assistant( - custodian: &Custodian, - caller: &AccountInfo, -) -> Result { - require!( - *caller.key == custodian.owner || *caller.key == custodian.owner_assistant, - TokenRouterError::OwnerOrAssistantOnly - ); - - Ok(true) -} diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs index 711f6410..8a2a6763 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -10,7 +10,7 @@ pub struct CancelOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - has_one = owner @ TokenRouterError::OwnerOnly, + constraint = ownable_tools::utils::ownable::only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, } @@ -18,7 +18,7 @@ pub struct CancelOwnershipTransferRequest<'info> { pub fn cancel_ownership_transfer_request( ctx: Context, ) -> Result<()> { - ctx.accounts.custodian.pending_owner = None; + ownable_tools::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); // Done. Ok(()) diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs index faad5568..bc038c24 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,5 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; +use ownable_tools::utils::pending_owner; #[derive(Accounts)] pub struct ConfirmOwnershipTransferRequest<'info> { @@ -12,7 +13,7 @@ pub struct ConfirmOwnershipTransferRequest<'info> { seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, constraint = custodian.pending_owner.is_some() @ TokenRouterError::NoTransferOwnershipRequest, - constraint = custodian.pending_owner.unwrap() == pending_owner.key() @ TokenRouterError::NotPendingOwner, + constraint = pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) @ TokenRouterError::NotPendingOwner, )] custodian: Account<'info, Custodian>, } @@ -20,9 +21,7 @@ pub struct ConfirmOwnershipTransferRequest<'info> { pub fn confirm_ownership_transfer_request( ctx: Context, ) -> Result<()> { - let custodian = &mut ctx.accounts.custodian; - custodian.owner = ctx.accounts.pending_owner.key(); - custodian.pending_owner = None; + pending_owner::accept_ownership_unchecked(&mut ctx.accounts.custodian); // Done. Ok(()) diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs index d2521e43..39cc8546 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,5 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; +use ownable_tools::utils::{ownable, pending_owner}; #[derive(Accounts)] pub struct SubmitOwnershipTransferRequest<'info> { @@ -10,7 +11,7 @@ pub struct SubmitOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - has_one = owner @ TokenRouterError::OwnerOnly, + constraint = ownable::only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -27,7 +28,7 @@ pub struct SubmitOwnershipTransferRequest<'info> { pub fn submit_ownership_transfer_request( ctx: Context, ) -> Result<()> { - ctx.accounts.custodian.pending_owner = Some(ctx.accounts.new_owner.key()); + pending_owner::transfer_ownership(&mut ctx.accounts.custodian, &ctx.accounts.new_owner.key()); // Done. Ok(()) diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs index 9770fda8..6f99e0bc 100644 --- a/solana/programs/token-router/src/processor/admin/set_pause.rs +++ b/solana/programs/token-router/src/processor/admin/set_pause.rs @@ -1,5 +1,6 @@ -use crate::state::Custodian; +use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; +use ownable_tools::utils::assistant::only_authorized; #[derive(Accounts)] pub struct SetPause<'info> { @@ -9,7 +10,7 @@ pub struct SetPause<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ TokenRouterError::OwnerOrAssistantOnly, )] /// Sender Config account. This program requires that the `owner` specified /// in the context equals the pubkey specified in this account. Mutable. diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs index d7ac2604..22c8d85e 100644 --- a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -1,5 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; +use ownable_tools::utils::{assistant, ownable::only_owner}; #[derive(Accounts)] pub struct UpdateOwnerAssistant<'info> { @@ -10,7 +11,7 @@ pub struct UpdateOwnerAssistant<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - has_one = owner @ TokenRouterError::OwnerOnly, + constraint = only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -24,7 +25,10 @@ pub struct UpdateOwnerAssistant<'info> { } pub fn update_owner_assistant(ctx: Context) -> Result<()> { - ctx.accounts.custodian.owner_assistant = ctx.accounts.new_owner_assistant.key(); + assistant::transfer_owner_assistant( + &mut ctx.accounts.custodian, + &ctx.accounts.new_owner_assistant.key(), + ); // Done. Ok(()) diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs index 9cd95382..20a73b27 100644 --- a/solana/programs/token-router/src/state/custodian.rs +++ b/solana/programs/token-router/src/state/custodian.rs @@ -8,22 +8,51 @@ pub struct Custodian { /// Boolean indicating whether outbound transfers are paused. pub paused: bool, - /// Program's owner. + /// Indicate who last set the `paused` value. When the program is first initialized, this is set + /// to the `owner`. + pub paused_set_by: Pubkey, + pub owner: Pubkey, + pub pending_owner: Option, - /// Program's assistant. Can be used to update the relayer fee and swap rate. pub owner_assistant: Pubkey, - - /// Indicate who last set the `paused` value. When the program is first initialized, this is set - /// to the `owner`. - pub paused_set_by: Pubkey, } impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"custodian"; - pub fn is_authorized(&self, key: &Pubkey) -> bool { - self.owner == *key || self.owner_assistant == *key + // pub fn is_authorized(&self, owner_or_assistant: &Pubkey) -> bool { + // self.owner_config.is_admin(owner_or_assistant) + // } +} + +impl ownable_tools::Ownable for Custodian { + fn owner(&self) -> &Pubkey { + &self.owner + } + + fn owner_mut(&mut self) -> &mut Pubkey { + &mut self.owner + } +} + +impl ownable_tools::PendingOwner for Custodian { + fn pending_owner(&self) -> &Option { + &self.pending_owner + } + + fn pending_owner_mut(&mut self) -> &mut Option { + &mut self.pending_owner + } +} + +impl ownable_tools::OwnerAssistant for Custodian { + fn owner_assistant(&self) -> &Pubkey { + &self.owner_assistant + } + + fn owner_assistant_mut(&mut self) -> &mut Pubkey { + &mut self.owner_assistant } } diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index 61ce3f94..ff7e7823 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -4,8 +4,7 @@ import { ChainId } from "@certusone/wormhole-sdk"; import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; -import IDL from "../../target/idl/token_router.json"; -import { TokenRouter } from "../../target/types/token_router"; +import { IDL, TokenRouter } from "../../target/types/token_router"; import { Custodian, PayerSequence, RouterEndpoint } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "./utils"; import { @@ -56,7 +55,7 @@ export class TokenRouterProgram { // TODO: fix this constructor(connection: Connection, programId?: ProgramId) { this._programId = programId ?? testnet(); - this.program = new Program(IDL as any, new PublicKey(this._programId), { + this.program = new Program(IDL, new PublicKey(this._programId), { connection, }); } diff --git a/solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json b/solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json deleted file mode 100644 index 431e10b2..00000000 --- a/solana/ts/src/wormholeCctp/circle/idl/message_transmitter.json +++ /dev/null @@ -1,1099 +0,0 @@ -{ - "version": "0.1.0", - "name": "message_transmitter", - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgramData", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "InitializeParams" - } - } - ] - }, - { - "name": "transferOwnership", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "TransferOwnershipParams" - } - } - ] - }, - { - "name": "acceptOwnership", - "accounts": [ - { - "name": "pendingOwner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AcceptOwnershipParams" - } - } - ] - }, - { - "name": "updatePauser", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdatePauserParams" - } - } - ] - }, - { - "name": "updateAttesterManager", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdateAttesterManagerParams" - } - } - ] - }, - { - "name": "pause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "PauseParams" - } - } - ] - }, - { - "name": "unpause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UnpauseParams" - } - } - ] - }, - { - "name": "setMaxMessageBodySize", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetMaxMessageBodySizeParams" - } - } - ] - }, - { - "name": "enableAttester", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "EnableAttesterParams" - } - } - ] - }, - { - "name": "disableAttester", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DisableAttesterParams" - } - } - ] - }, - { - "name": "setSignatureThreshold", - "accounts": [ - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetSignatureThresholdParams" - } - } - ] - }, - { - "name": "sendMessage", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SendMessageParams" - } - } - ], - "returns": "u64" - }, - { - "name": "sendMessageWithCaller", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SendMessageWithCallerParams" - } - } - ], - "returns": "u64" - }, - { - "name": "replaceMessage", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReplaceMessageParams" - } - } - ], - "returns": "u64" - }, - { - "name": "receiveMessage", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "caller", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": false, - "isSigner": false - }, - { - "name": "usedNonces", - "isMut": true, - "isSigner": false - }, - { - "name": "receiver", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReceiveMessageParams" - } - } - ] - } - ], - "accounts": [ - { - "name": "MessageTransmitter", - "docs": [ - "Main state of the MessageTransmitter program" - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "owner", - "type": "publicKey" - }, - { - "name": "pendingOwner", - "type": "publicKey" - }, - { - "name": "attesterManager", - "type": "publicKey" - }, - { - "name": "pauser", - "type": "publicKey" - }, - { - "name": "paused", - "type": "bool" - }, - { - "name": "localDomain", - "type": "u32" - }, - { - "name": "version", - "type": "u32" - }, - { - "name": "signatureThreshold", - "type": "u32" - }, - { - "name": "enabledAttesters", - "type": { - "vec": "publicKey" - } - }, - { - "name": "maxMessageBodySize", - "type": "u64" - }, - { - "name": "nextAvailableNonce", - "type": "u64" - }, - { - "name": "authorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "UsedNonces", - "docs": [ - "UsedNonces account holds an array of bits that indicate which nonces were already used", - "so they can't be resused to receive new messages. Array starts with the first_nonce and", - "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain." - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "firstNonce", - "type": "u64" - }, - { - "name": "usedNonces", - "type": { - "array": [ - "u64", - 100 - ] - } - } - ] - } - } - ], - "types": [ - { - "name": "AcceptOwnershipParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "DisableAttesterParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "attester", - "type": "publicKey" - } - ] - } - }, - { - "name": "EnableAttesterParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newAttester", - "type": "publicKey" - } - ] - } - }, - { - "name": "InitializeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "localDomain", - "type": "u32" - }, - { - "name": "attester", - "type": "publicKey" - }, - { - "name": "maxMessageBodySize", - "type": "u64" - }, - { - "name": "version", - "type": "u32" - } - ] - } - }, - { - "name": "PauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "ReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "message", - "type": "bytes" - }, - { - "name": "attestation", - "type": "bytes" - } - ] - } - }, - { - "name": "HandleReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "sender", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "ReplaceMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "originalMessage", - "type": "bytes" - }, - { - "name": "originalAttestation", - "type": "bytes" - }, - { - "name": "newMessageBody", - "type": "bytes" - }, - { - "name": "newDestinationCaller", - "type": "publicKey" - } - ] - } - }, - { - "name": "SendMessageWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "recipient", - "type": "publicKey" - }, - { - "name": "destinationCaller", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "SendMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "recipient", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "SetMaxMessageBodySizeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newMaxMessageBodySize", - "type": "u64" - } - ] - } - }, - { - "name": "SetSignatureThresholdParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newSignatureThreshold", - "type": "u32" - } - ] - } - }, - { - "name": "TransferOwnershipParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newOwner", - "type": "publicKey" - } - ] - } - }, - { - "name": "UnpauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UpdateAttesterManagerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newAttesterManager", - "type": "publicKey" - } - ] - } - }, - { - "name": "UpdatePauserParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newPauser", - "type": "publicKey" - } - ] - } - }, - { - "name": "MathError", - "type": { - "kind": "enum", - "variants": [ - { - "name": "MathOverflow" - }, - { - "name": "MathUnderflow" - }, - { - "name": "ErrorInDivision" - } - ] - } - } - ], - "events": [ - { - "name": "OwnershipTransferStarted", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "OwnershipTransferred", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "PauserChanged", - "fields": [ - { - "name": "newAddress", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "AttesterManagerUpdated", - "fields": [ - { - "name": "previousAttesterManager", - "type": "publicKey", - "index": false - }, - { - "name": "newAttesterManager", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MessageSent", - "fields": [ - { - "name": "message", - "type": "bytes", - "index": false - } - ] - }, - { - "name": "MessageReceived", - "fields": [ - { - "name": "caller", - "type": "publicKey", - "index": false - }, - { - "name": "sourceDomain", - "type": "u32", - "index": false - }, - { - "name": "nonce", - "type": "u64", - "index": false - }, - { - "name": "sender", - "type": "publicKey", - "index": false - }, - { - "name": "messageBody", - "type": "bytes", - "index": false - } - ] - }, - { - "name": "SignatureThresholdUpdated", - "fields": [ - { - "name": "oldSignatureThreshold", - "type": "u32", - "index": false - }, - { - "name": "newSignatureThreshold", - "type": "u32", - "index": false - } - ] - }, - { - "name": "AttesterEnabled", - "fields": [ - { - "name": "attester", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "AttesterDisabled", - "fields": [ - { - "name": "attester", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MaxMessageBodySizeUpdated", - "fields": [ - { - "name": "newMaxMessageBodySize", - "type": "u64", - "index": false - } - ] - }, - { - "name": "Pause", - "fields": [] - }, - { - "name": "Unpause", - "fields": [] - } - ], - "errors": [ - { - "code": 6000, - "name": "InvalidAuthority", - "msg": "Invalid authority" - }, - { - "code": 6001, - "name": "ProgramPaused", - "msg": "Instruction is not allowed at this time" - }, - { - "code": 6002, - "name": "InvalidMessageTransmitterState", - "msg": "Invalid message transmitter state" - }, - { - "code": 6003, - "name": "InvalidSignatureThreshold", - "msg": "Invalid signature threshold" - }, - { - "code": 6004, - "name": "SignatureThresholdAlreadySet", - "msg": "Signature threshold already set" - }, - { - "code": 6005, - "name": "InvalidOwner", - "msg": "Invalid owner" - }, - { - "code": 6006, - "name": "InvalidPauser", - "msg": "Invalid pauser" - }, - { - "code": 6007, - "name": "InvalidAttesterManager", - "msg": "Invalid attester manager" - }, - { - "code": 6008, - "name": "InvalidAttester", - "msg": "Invalid attester" - }, - { - "code": 6009, - "name": "AttesterAlreadyEnabled", - "msg": "Attester already enabled" - }, - { - "code": 6010, - "name": "TooFewEnabledAttesters", - "msg": "Too few enabled attesters" - }, - { - "code": 6011, - "name": "SignatureThresholdTooLow", - "msg": "Signature threshold is too low" - }, - { - "code": 6012, - "name": "AttesterAlreadyDisabled", - "msg": "Attester already disabled" - }, - { - "code": 6013, - "name": "MessageBodyLimitExceeded", - "msg": "Message body exceeds max size" - }, - { - "code": 6014, - "name": "InvalidDestinationCaller", - "msg": "Invalid destination caller" - }, - { - "code": 6015, - "name": "InvalidRecipient", - "msg": "Invalid message recipient" - }, - { - "code": 6016, - "name": "SenderNotPermitted", - "msg": "Sender is not permitted" - }, - { - "code": 6017, - "name": "InvalidSourceDomain", - "msg": "Invalid source domain" - }, - { - "code": 6018, - "name": "InvalidDestinationDomain", - "msg": "Invalid destination domain" - }, - { - "code": 6019, - "name": "InvalidMessageVersion", - "msg": "Invalid message version" - }, - { - "code": 6020, - "name": "InvalidUsedNoncesAccount", - "msg": "Invalid used nonces account" - }, - { - "code": 6021, - "name": "InvalidRecipientProgram", - "msg": "Invalid recipient program" - }, - { - "code": 6022, - "name": "InvalidNonce", - "msg": "Invalid nonce" - }, - { - "code": 6023, - "name": "NonceAlreadyUsed", - "msg": "Nonce already used" - }, - { - "code": 6024, - "name": "MessageTooShort", - "msg": "Message is too short" - }, - { - "code": 6025, - "name": "MalformedMessage", - "msg": "Malformed message" - }, - { - "code": 6026, - "name": "InvalidSignatureOrderOrDupe", - "msg": "Invalid signature order or dupe" - }, - { - "code": 6027, - "name": "InvalidAttesterSignature", - "msg": "Invalid attester signature" - }, - { - "code": 6028, - "name": "InvalidAttestationLength", - "msg": "Invalid attestation length" - }, - { - "code": 6029, - "name": "InvalidSignatureRecoveryId", - "msg": "Invalid signature recovery ID" - }, - { - "code": 6030, - "name": "InvalidSignatureSValue", - "msg": "Invalid signature S value" - }, - { - "code": 6031, - "name": "InvalidMessageHash", - "msg": "Invalid message hash" - } - ], - "metadata": { - "address": "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" - } -} diff --git a/solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json b/solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json deleted file mode 100644 index 1f6faff0..00000000 --- a/solana/ts/src/wormholeCctp/circle/idl/token_messenger_minter.json +++ /dev/null @@ -1,1451 +0,0 @@ -{ - "version": "0.1.0", - "name": "token_messenger_minter", - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgramData", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "InitializeParams" - } - } - ] - }, - { - "name": "transferOwnership", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "TransferOwnershipParams" - } - } - ] - }, - { - "name": "acceptOwnership", - "accounts": [ - { - "name": "pendingOwner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AcceptOwnershipParams" - } - } - ] - }, - { - "name": "addRemoteTokenMessenger", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AddRemoteTokenMessengerParams" - } - } - ] - }, - { - "name": "removeRemoteTokenMessenger", - "accounts": [ - { - "name": "payee", - "isMut": true, - "isSigner": true - }, - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "RemoveRemoteTokenMessengerParams" - } - } - ] - }, - { - "name": "depositForBurn", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "burnTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "burnTokenMint", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DepositForBurnParams" - } - } - ], - "returns": "u64" - }, - { - "name": "depositForBurnWithCaller", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "burnTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "burnTokenMint", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DepositForBurnWithCallerParams" - } - } - ], - "returns": "u64" - }, - { - "name": "replaceDepositForBurn", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReplaceDepositForBurnParams" - } - } - ], - "returns": "u64" - }, - { - "name": "handleReceiveMessage", - "accounts": [ - { - "name": "authorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": false, - "isSigner": false - }, - { - "name": "recipientTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "HandleReceiveMessageParams" - } - } - ] - }, - { - "name": "setTokenController", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetTokenControllerParams" - } - } - ] - }, - { - "name": "pause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "PauseParams" - } - } - ] - }, - { - "name": "unpause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UnpauseParams" - } - } - ] - }, - { - "name": "updatePauser", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdatePauserParams" - } - } - ] - }, - { - "name": "setMaxBurnAmountPerMessage", - "accounts": [ - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetMaxBurnAmountPerMessageParams" - } - } - ] - }, - { - "name": "addLocalToken", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "localTokenMint", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AddLocalTokenParams" - } - } - ] - }, - { - "name": "removeLocalToken", - "accounts": [ - { - "name": "payee", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "RemoveLocalTokenParams" - } - } - ] - }, - { - "name": "linkTokenPair", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "LinkTokenPairParams" - } - } - ] - }, - { - "name": "unlinkTokenPair", - "accounts": [ - { - "name": "payee", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UninkTokenPairParams" - } - } - ] - } - ], - "accounts": [ - { - "name": "TokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "owner", - "type": "publicKey" - }, - { - "name": "pendingOwner", - "type": "publicKey" - }, - { - "name": "localMessageTransmitter", - "type": "publicKey" - }, - { - "name": "messageBodyVersion", - "type": "u32" - }, - { - "name": "authorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "RemoteTokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": "publicKey" - } - ] - } - }, - { - "name": "TokenMinter", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - }, - { - "name": "pauser", - "type": "publicKey" - }, - { - "name": "paused", - "type": "bool" - }, - { - "name": "bump", - "type": "u8" - } - ] - } - }, - { - "name": "TokenPair", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "remoteToken", - "type": "publicKey" - }, - { - "name": "localToken", - "type": "publicKey" - }, - { - "name": "bump", - "type": "u8" - } - ] - } - }, - { - "name": "LocalToken", - "type": { - "kind": "struct", - "fields": [ - { - "name": "custody", - "type": "publicKey" - }, - { - "name": "mint", - "type": "publicKey" - }, - { - "name": "burnLimitPerMessage", - "type": "u64" - }, - { - "name": "messagesSent", - "type": "u64" - }, - { - "name": "messagesReceived", - "type": "u64" - }, - { - "name": "amountSent", - "type": "u64" - }, - { - "name": "amountReceived", - "type": "u64" - }, - { - "name": "bump", - "type": "u8" - }, - { - "name": "custodyBump", - "type": "u8" - } - ] - } - } - ], - "types": [ - { - "name": "AcceptOwnershipParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "AddRemoteTokenMessengerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": "publicKey" - } - ] - } - }, - { - "name": "DepositForBurnWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "mintRecipient", - "type": "publicKey" - }, - { - "name": "destinationCaller", - "type": "publicKey" - } - ] - } - }, - { - "name": "DepositForBurnParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "mintRecipient", - "type": "publicKey" - } - ] - } - }, - { - "name": "HandleReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "sender", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "InitializeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - }, - { - "name": "localMessageTransmitter", - "type": "publicKey" - }, - { - "name": "messageBodyVersion", - "type": "u32" - } - ] - } - }, - { - "name": "RemoveRemoteTokenMessengerParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "ReplaceDepositForBurnParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "originalMessage", - "type": "bytes" - }, - { - "name": "originalAttestation", - "type": "bytes" - }, - { - "name": "newDestinationCaller", - "type": "publicKey" - }, - { - "name": "newMintRecipient", - "type": "publicKey" - } - ] - } - }, - { - "name": "TransferOwnershipParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newOwner", - "type": "publicKey" - } - ] - } - }, - { - "name": "AddLocalTokenParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "LinkTokenPairParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "localToken", - "type": "publicKey" - }, - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "remoteToken", - "type": "publicKey" - } - ] - } - }, - { - "name": "PauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "RemoveLocalTokenParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "SetMaxBurnAmountPerMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "burnLimitPerMessage", - "type": "u64" - } - ] - } - }, - { - "name": "SetTokenControllerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - } - ] - } - }, - { - "name": "UninkTokenPairParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UnpauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UpdatePauserParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newPauser", - "type": "publicKey" - } - ] - } - }, - { - "name": "TokenMinterError", - "type": { - "kind": "enum", - "variants": [ - { - "name": "InvalidAuthority" - }, - { - "name": "InvalidTokenMinterState" - }, - { - "name": "ProgramPaused" - }, - { - "name": "InvalidTokenPairState" - }, - { - "name": "InvalidLocalTokenState" - }, - { - "name": "InvalidPauser" - }, - { - "name": "InvalidTokenController" - }, - { - "name": "BurnAmountExceeded" - } - ] - } - } - ], - "events": [ - { - "name": "OwnershipTransferStarted", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "OwnershipTransferred", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "DepositForBurn", - "fields": [ - { - "name": "nonce", - "type": "u64", - "index": false - }, - { - "name": "burnToken", - "type": "publicKey", - "index": false - }, - { - "name": "amount", - "type": "u64", - "index": false - }, - { - "name": "depositor", - "type": "publicKey", - "index": false - }, - { - "name": "mintRecipient", - "type": "publicKey", - "index": false - }, - { - "name": "destinationDomain", - "type": "u32", - "index": false - }, - { - "name": "destinationTokenMessenger", - "type": "publicKey", - "index": false - }, - { - "name": "destinationCaller", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MintAndWithdraw", - "fields": [ - { - "name": "mintRecipient", - "type": "publicKey", - "index": false - }, - { - "name": "amount", - "type": "u64", - "index": false - }, - { - "name": "mintToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "RemoteTokenMessengerAdded", - "fields": [ - { - "name": "domain", - "type": "u32", - "index": false - }, - { - "name": "tokenMessenger", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "RemoteTokenMessengerRemoved", - "fields": [ - { - "name": "domain", - "type": "u32", - "index": false - }, - { - "name": "tokenMessenger", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "SetTokenController", - "fields": [ - { - "name": "tokenController", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "PauserChanged", - "fields": [ - { - "name": "newAddress", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "SetBurnLimitPerMessage", - "fields": [ - { - "name": "token", - "type": "publicKey", - "index": false - }, - { - "name": "burnLimitPerMessage", - "type": "u64", - "index": false - } - ] - }, - { - "name": "LocalTokenAdded", - "fields": [ - { - "name": "custody", - "type": "publicKey", - "index": false - }, - { - "name": "mint", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "LocalTokenRemoved", - "fields": [ - { - "name": "custody", - "type": "publicKey", - "index": false - }, - { - "name": "mint", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "TokenPairLinked", - "fields": [ - { - "name": "localToken", - "type": "publicKey", - "index": false - }, - { - "name": "remoteDomain", - "type": "u32", - "index": false - }, - { - "name": "remoteToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "TokenPairUnlinked", - "fields": [ - { - "name": "localToken", - "type": "publicKey", - "index": false - }, - { - "name": "remoteDomain", - "type": "u32", - "index": false - }, - { - "name": "remoteToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "Pause", - "fields": [] - }, - { - "name": "Unpause", - "fields": [] - } - ], - "errors": [ - { - "code": 6000, - "name": "InvalidAuthority", - "msg": "Invalid authority" - }, - { - "code": 6001, - "name": "InvalidTokenMessengerState", - "msg": "Invalid token messenger state" - }, - { - "code": 6002, - "name": "InvalidTokenMessenger", - "msg": "Invalid token messenger" - }, - { - "code": 6003, - "name": "InvalidOwner", - "msg": "Invalid owner" - }, - { - "code": 6004, - "name": "MalformedMessage", - "msg": "Malformed message" - }, - { - "code": 6005, - "name": "InvalidMessageBodyVersion", - "msg": "Invalid message body version" - }, - { - "code": 6006, - "name": "InvalidAmount", - "msg": "Invalid amount" - }, - { - "code": 6007, - "name": "InvalidDestinationDomain", - "msg": "Invalid destination domain" - }, - { - "code": 6008, - "name": "InvalidDestinationCaller", - "msg": "Invalid destination caller" - }, - { - "code": 6009, - "name": "InvalidMintRecipient", - "msg": "Invalid mint recipient" - }, - { - "code": 6010, - "name": "InvalidSender", - "msg": "Invalid sender" - }, - { - "code": 6011, - "name": "InvalidTokenPair", - "msg": "Invalid token pair" - }, - { - "code": 6012, - "name": "InvalidTokenMint", - "msg": "Invalid token mint" - } - ], - "metadata": { - "address": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" - } -} diff --git a/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts b/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts index 82737e6c..ef27e597 100644 --- a/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts +++ b/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts @@ -1,10 +1,9 @@ import { Program } from "@coral-xyz/anchor"; import { TOKEN_PROGRAM_ID } from "@solana/spl-token"; import { Connection, PublicKey } from "@solana/web3.js"; -import MessageTransmitterIdl from "../idl/message_transmitter.json"; import { CctpTokenBurnMessage } from "../messages"; import { TokenMessengerMinterProgram } from "../tokenMessengerMinter"; -import { MessageTransmitter } from "../types/message_transmitter"; +import { IDL, MessageTransmitter } from "../types/message_transmitter"; import { MessageTransmitterConfig } from "./MessageTransmitterConfig"; import { UsedNonses } from "./UsedNonces"; @@ -33,7 +32,7 @@ export class MessageTransmitterProgram { constructor(connection: Connection, programId?: ProgramId) { this._programId = programId ?? testnet(); - this.program = new Program(MessageTransmitterIdl as any, new PublicKey(this._programId), { + this.program = new Program(IDL, new PublicKey(this._programId), { connection, }); } @@ -74,7 +73,7 @@ export class MessageTransmitterProgram { enabledAttesters.map((addr) => Array.from(addr.toBuffer())), BigInt(maxMessageBodySize.toString()), BigInt(nextAvailableNonce.toString()), - authorityBump, + authorityBump ); } @@ -85,7 +84,7 @@ export class MessageTransmitterProgram { authorityAddress(): PublicKey { return PublicKey.findProgramAddressSync( [Buffer.from("message_transmitter_authority")], - this.ID, + this.ID )[0]; } @@ -94,13 +93,13 @@ export class MessageTransmitterProgram { case testnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" ); } case mainnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" ); } default: { @@ -111,7 +110,7 @@ export class MessageTransmitterProgram { receiveMessageAccounts( mint: PublicKey, - circleMessage: CctpTokenBurnMessage | Buffer, + circleMessage: CctpTokenBurnMessage | Buffer ): ReceiveMessageAccounts { const { cctp: { sourceDomain, nonce }, diff --git a/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts b/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts index bc5405ff..6f5957c3 100644 --- a/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts +++ b/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts @@ -1,9 +1,8 @@ import { Program } from "@coral-xyz/anchor"; import { TOKEN_PROGRAM_ID } from "@solana/spl-token"; import { Connection, PublicKey } from "@solana/web3.js"; -import TokenMessengerMinterIdl from "../idl/token_messenger_minter.json"; import { MessageTransmitterProgram } from "../messageTransmitter"; -import { TokenMessengerMinter } from "../types/token_messenger_minter"; +import { IDL, TokenMessengerMinter } from "../types/token_messenger_minter"; import { RemoteTokenMessenger } from "./RemoteTokenMessenger"; export const PROGRAM_IDS = ["CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3"] as const; @@ -33,7 +32,7 @@ export class TokenMessengerMinterProgram { constructor(connection: Connection, programId?: ProgramId) { this._programId = programId ?? testnet(); - this.program = new Program(TokenMessengerMinterIdl as any, new PublicKey(this._programId), { + this.program = new Program(IDL, new PublicKey(this._programId), { connection, }); } @@ -53,7 +52,7 @@ export class TokenMessengerMinterProgram { custodyTokenAddress(mint: PublicKey): PublicKey { return PublicKey.findProgramAddressSync( [Buffer.from("custody"), mint.toBuffer()], - this.ID, + this.ID )[0]; } @@ -64,7 +63,7 @@ export class TokenMessengerMinterProgram { Buffer.from(remoteDomain.toString()), Buffer.from(remoteTokenAddress), ], - this.ID, + this.ID )[0]; } @@ -73,15 +72,16 @@ export class TokenMessengerMinterProgram { } async fetchRemoteTokenMessenger(addr: PublicKey): Promise { - const { domain, tokenMessenger } = - await this.program.account.remoteTokenMessenger.fetch(addr); + const { domain, tokenMessenger } = await this.program.account.remoteTokenMessenger.fetch( + addr + ); return new RemoteTokenMessenger(domain, Array.from(tokenMessenger.toBuffer())); } localTokenAddress(mint: PublicKey): PublicKey { return PublicKey.findProgramAddressSync( [Buffer.from("local_token"), mint.toBuffer()], - this.ID, + this.ID )[0]; } @@ -94,13 +94,13 @@ export class TokenMessengerMinterProgram { case testnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" ); } case mainnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" ); } default: { @@ -111,7 +111,7 @@ export class TokenMessengerMinterProgram { depositForBurnWithCallerAccounts( mint: PublicKey, - remoteDomain: number, + remoteDomain: number ): DepositForBurnWithCallerAccounts { const messageTransmitterProgram = this.messageTransmitterProgram(); return { diff --git a/solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json b/solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json deleted file mode 100644 index 66803fe7..00000000 --- a/solana/ts/src/wormholeCctp/idl/wormhole_cctp_solana.json +++ /dev/null @@ -1,916 +0,0 @@ -{ - "version": "0.0.0-alpha.8", - "name": "wormhole_cctp_solana", - "constants": [ - { - "name": "UPGRADE_SEED_PREFIX", - "type": "bytes", - "value": "[117, 112, 103, 114, 97, 100, 101]" - }, - { - "name": "CUSTODY_TOKEN_SEED_PREFIX", - "type": "bytes", - "value": "[99, 117, 115, 116, 111, 100, 121]" - } - ], - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "deployer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "upgrade this program's executable. We verify this PDA address here out of convenience to get", - "the PDA bump seed to invoke the upgrade." - ] - }, - { - "name": "programData", - "isMut": true, - "isSigner": false - }, - { - "name": "bpfLoaderUpgradeableProgram", - "isMut": false, - "isSigner": false, - "docs": [ - "BPF Loader Upgradeable program.", - "", - "program." - ] - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - }, - { - "name": "transferTokensWithPayload", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true, - "docs": [ - "Owner of the token account, which will have its funds burned by Circle's Token Messenger", - "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", - "message CPI call." - ] - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] - }, - { - "name": "sender", - "isMut": false, - "isSigner": true, - "docs": [ - "Signer acting as the authority to invoke this instruction. This pubkey address will be", - "encoded as the sender address.", - "", - "NOTE: Unlike Token Bridge, the sender address cannot be a program ID (where this could have", - "acted as a program's authority to send tokens). We implemented it this way because we want", - "to keep the same authority for both burning and minting. For programs, this poses a problem", - "because the program itself cannot be the owner of a token account; its PDA acts as the", - "owner. And because the mint recipient (in our case the mint redeemer) must be the owner of", - "the token account when these tokens are minted, we cannot use a program ID as this", - "authority." - ] - }, - { - "name": "mint", - "isMut": true, - "isSigner": false, - "docs": [ - "Payer Token Account's mint. This mint should be the same one as the one encoded in the", - "source (payer) token account.", - "", - "Messenger Minter program's job to validate this mint. But we will check that this mint", - "address matches the one encoded in the local token account." - ] - }, - { - "name": "srcToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Account. Circle's Token Messenger Minter will burn the configured amount from", - "this account.", - "", - "NOTE: This account will be managed by the sender authority. It is required that the token", - "account owner delegate authority to the sender authority prior to executing this", - "instruction." - ] - }, - { - "name": "custodyToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole CCTP custody token account. This account will be closed at the end of this", - "instruction. It just acts as a conduit to allow this program to be the transfer initiator in", - "the Circle message." - ] - }, - { - "name": "registeredEmitter", - "isMut": false, - "isSigner": false, - "docs": [ - "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", - "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", - "seeds::program = Wormhole CCTP program." - ] - }, - { - "name": "coreBridgeConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge config. Seeds = \\[\"Bridge\"\\], seeds::program = Core Bridge program.", - "", - "instruction handler." - ] - }, - { - "name": "coreMessage", - "isMut": true, - "isSigner": true - }, - { - "name": "coreEmitterSequence", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge emitter sequence. Seeds = \\[\"Sequence\"\\], seeds::program =Core Bridge", - "program.", - "", - "instruction handler." - ] - }, - { - "name": "coreFeeCollector", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge fee collector. Seeds = \\[\"fee_collector\"\\], seeds::program =", - "core_bridge_program. This account should be passed in as Some(fee_collector) if there is a", - "message fee.", - "", - "instruction handler." - ] - }, - { - "name": "tokenMessengerMinterSenderAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's sender authority. Seeds = \\[\"sender_authority\"\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "messageTransmitterConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", - "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", - "", - "Messenger Minter program burns the tokens. See the account loader in the instruction", - "handler." - ] - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Remote Token Messenger account. Seeds =", - "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "coreBridgeProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "clock", - "isMut": false, - "isSigner": false - }, - { - "name": "rent", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "args", - "type": { - "defined": "TransferTokensWithPayloadArgs" - } - } - ] - }, - { - "name": "redeemTokensWithPayload", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true, - "docs": [ - "Owner of the token account, which will have its funds burned by Circle's Token Messenger", - "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", - "message CPI call." - ] - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] - }, - { - "name": "vaa", - "isMut": false, - "isSigner": false - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge::claim_vaa) is called." - ] - }, - { - "name": "redeemer", - "isMut": false, - "isSigner": true, - "docs": [ - "Redeemer, who owns the token account that will receive the minted tokens.", - "", - "program requires that this recipient be a signer so an integrator has control over when he", - "receives his tokens." - ] - }, - { - "name": "redeemerToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Account. Circle's Token Messenger Minter will burn the configured amount from", - "this account.", - "", - "NOTE: This account is the encoded mint recipient in the Circle message. This program", - "adds a constraint that the redeemer must own this account." - ] - }, - { - "name": "registeredEmitter", - "isMut": false, - "isSigner": false, - "docs": [ - "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", - "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", - "seeds::program = Wormhole CCTP program." - ] - }, - { - "name": "messageTransmitterAuthority", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", - "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", - "", - "Messenger Minter program burns the tokens. See the account loader in the instruction", - "handler." - ] - }, - { - "name": "usedNonces", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Remote Token Messenger account. Seeds =", - "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", - "seeds::program = token_messenger_minter_program.", - "", - "The Token Messenger Minter program needs this account. We do not perform any checks", - "in this instruction handler." - ] - }, - { - "name": "tokenPair", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterCustodyToken", - "isMut": true, - "isSigner": false, - "docs": [ - "recipients. This account is topped off by \"pre-minters\"." - ] - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "args", - "type": { - "defined": "RedeemTokensWithPayloadArgs" - } - } - ] - }, - { - "name": "registerEmitterAndDomain", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false - }, - { - "name": "vaa", - "isMut": true, - "isSigner": false - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge::claim_vaa) is called." - ] - }, - { - "name": "registeredEmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - }, - { - "name": "upgradeContract", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false - }, - { - "name": "vaa", - "isMut": false, - "isSigner": false, - "docs": [ - "instruction handler, which also checks this account discriminator (so there is no need to", - "check PDA seeds here)." - ] - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge_sdk::cpi::claim_vaa) is called." - ] - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "upgrade this program's executable. We verify this PDA address here out of convenience to get", - "the PDA bump seed to invoke the upgrade." - ] - }, - { - "name": "spill", - "isMut": true, - "isSigner": false - }, - { - "name": "buffer", - "isMut": true, - "isSigner": false, - "docs": [ - "against the one encoded in the governance VAA." - ] - }, - { - "name": "programData", - "isMut": true, - "isSigner": false - }, - { - "name": "thisProgram", - "isMut": true, - "isSigner": false - }, - { - "name": "rent", - "isMut": false, - "isSigner": false - }, - { - "name": "clock", - "isMut": false, - "isSigner": false - }, - { - "name": "bpfLoaderUpgradeableProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - } - ], - "accounts": [ - { - "name": "Custodian", - "docs": [ - "Emitter config account. This account is used to perform the following:", - "1. It is the emitter authority for the Core Bridge program.", - "2. It acts as the custody token account owner for token transfers." - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "bump", - "type": "u8" - }, - { - "name": "upgradeAuthorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "RegisteredEmitter", - "type": { - "kind": "struct", - "fields": [ - { - "name": "bump", - "type": "u8" - }, - { - "name": "cctpDomain", - "type": "u32" - }, - { - "name": "chain", - "type": "u16" - }, - { - "name": "address", - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - } - ], - "types": [ - { - "name": "RedeemTokensWithPayloadArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "encodedCctpMessage", - "type": "bytes" - }, - { - "name": "cctpAttestation", - "type": "bytes" - } - ] - } - }, - { - "name": "TransferTokensWithPayloadArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "mintRecipient", - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "nonce", - "type": "u32" - }, - { - "name": "payload", - "type": "bytes" - } - ] - } - }, - { - "name": "ReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "message", - "type": "bytes" - }, - { - "name": "attestation", - "type": "bytes" - } - ] - } - }, - { - "name": "DepositForBurnWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "docs": [ - "Transfer amount." - ], - "type": "u64" - }, - { - "name": "destinationDomain", - "docs": [ - "Circle domain value of the token to be transferred." - ], - "type": "u32" - }, - { - "name": "mintRecipient", - "docs": [ - "Recipient of assets on target network.", - "", - "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", - "weird because this address is one for another network. We are making it a 32-byte fixed", - "array instead." - ], - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "destinationCaller", - "docs": [ - "Expected caller on target network.", - "", - "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", - "weird because this address is one for another network. We are making it a 32-byte fixed", - "array instead." - ], - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - }, - { - "name": "RemoteTokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - } - ], - "errors": [ - { - "code": 6002, - "name": "CannotParseMessage", - "msg": "CannotParseMessage" - }, - { - "code": 6003, - "name": "InvalidGovernanceEmitter", - "msg": "InvalidGovernanceEmitter" - }, - { - "code": 6004, - "name": "InvalidGovernanceVaa", - "msg": "InvalidGovernanceVaa" - }, - { - "code": 6005, - "name": "InvalidGovernanceAction", - "msg": "InvalidGovernanceAction" - }, - { - "code": 6006, - "name": "InvalidWormholeFinality", - "msg": "InvalidWormholeFinality" - }, - { - "code": 6007, - "name": "GovernanceForAnotherChain", - "msg": "GovernanceForAnotherChain" - }, - { - "code": 6008, - "name": "ImplementationMismatch", - "msg": "ImplementationMismatch" - }, - { - "code": 6009, - "name": "InvalidForeignChain", - "msg": "InvalidForeignChain" - }, - { - "code": 6010, - "name": "InvalidForeignEmitter", - "msg": "InvalidForeignEmitter" - }, - { - "code": 6011, - "name": "InvalidCctpDomain", - "msg": "InvalidCctpDomain" - }, - { - "code": 6012, - "name": "InvalidProgramSender", - "msg": "InvalidProgramSender" - }, - { - "code": 6013, - "name": "ZeroAmount", - "msg": "ZeroAmount" - }, - { - "code": 6014, - "name": "InvalidMintRecipient", - "msg": "InvalidMintRecipient" - }, - { - "code": 6015, - "name": "ExecutableDisallowed", - "msg": "ExecutableDisallowed" - }, - { - "code": 6016, - "name": "InvalidEmitter", - "msg": "InvalidEmitter" - }, - { - "code": 6017, - "name": "InvalidWormholeCctpMessage", - "msg": "InvalidWormholeCctpMessage" - }, - { - "code": 6018, - "name": "InvalidRegisteredEmitterCctpDomain", - "msg": "InvalidRegisteredEmitterCctpDomain" - }, - { - "code": 6019, - "name": "TargetDomainNotSolana", - "msg": "TargetDomainNotSolana" - }, - { - "code": 6020, - "name": "SourceCctpDomainMismatch", - "msg": "SourceCctpDomainMismatch" - }, - { - "code": 6021, - "name": "TargetCctpDomainMismatch", - "msg": "TargetCctpDomainMismatch" - }, - { - "code": 6022, - "name": "CctpNonceMismatch", - "msg": "CctpNonceMismatch" - }, - { - "code": 6023, - "name": "InvalidCctpMessage", - "msg": "InvalidCctpMessage" - }, - { - "code": 6024, - "name": "RedeemerTokenMismatch", - "msg": "RedeemerTokenMismatch" - } - ], - "metadata": { - "address": "Wormho1eCirc1e1ntegration111111111111111111" - } -} \ No newline at end of file diff --git a/solana/ts/src/wormholeCctp/index.ts b/solana/ts/src/wormholeCctp/index.ts index b3f2a713..180076ac 100644 --- a/solana/ts/src/wormholeCctp/index.ts +++ b/solana/ts/src/wormholeCctp/index.ts @@ -23,10 +23,9 @@ import { TokenMessengerMinterProgram, } from "./circle"; import { BPF_LOADER_UPGRADEABLE_ID } from "./consts"; -import WormholeCctpSolanaIdl from "./idl/wormhole_cctp_solana.json"; import { DepositWithPayload } from "./messages"; import { Custodian, RegisteredEmitter } from "./state"; -import { WormholeCctpSolana } from "./types/wormhole_cctp_solana"; +import { IDL, WormholeCctpSolana } from "./types/wormhole_cctp_solana"; import { Claim, VaaAccount } from "./wormhole"; export const PROGRAM_IDS = [ @@ -119,7 +118,7 @@ export class WormholeCctpProgram { constructor(connection: Connection, programId?: ProgramId) { this._programId = programId ?? testnet(); - this.program = new Program(WormholeCctpSolanaIdl as any, new PublicKey(this._programId), { + this.program = new Program(IDL, new PublicKey(this._programId), { connection, }); } diff --git a/solana/tsconfig.json b/solana/tsconfig.json index 308cf8a5..eec5045d 100644 --- a/solana/tsconfig.json +++ b/solana/tsconfig.json @@ -6,7 +6,6 @@ "module": "commonjs", "target": "es2020", "strict": true, - "resolveJsonModule": true, "esModuleInterop": true } } From 0ce4ea217e675bb3d6e3ed03f6080899ad58a253 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 10:49:01 -0600 Subject: [PATCH 008/126] solana: add more admin --- solana/Cargo.lock | 1 + solana/programs/matching-engine/Cargo.toml | 2 + solana/programs/matching-engine/src/error.rs | 18 +++++-- solana/programs/matching-engine/src/lib.rs | 47 +++++++++++++++++-- .../processor/admin/add_router_endpoint.rs | 8 ++-- .../src/processor/admin/mod.rs | 17 ++----- .../ownership_transfer_request/cancel.rs | 25 ++++++++++ .../ownership_transfer_request/confirm.rs | 28 +++++++++++ .../admin/ownership_transfer_request/mod.rs | 8 ++++ .../ownership_transfer_request/submit.rs | 35 ++++++++++++++ .../processor/admin/update/fee_recipient.rs | 39 +++++++++++++++ .../src/processor/admin/update/mod.rs | 5 ++ .../processor/admin/update/owner_assistant.rs | 35 ++++++++++++++ .../processor/admin/update_fee_recipient.rs | 44 ----------------- .../matching-engine/src/state/custodian.rs | 30 ++++++++++++ solana/programs/token-router/Cargo.toml | 4 +- solana/programs/token-router/src/error.rs | 8 ++-- .../processor/admin/update/owner_assistant.rs | 2 +- .../processor/admin/update_fee_recipient.rs | 44 ----------------- 19 files changed, 280 insertions(+), 120 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/mod.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/update/mod.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs delete mode 100644 solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs delete mode 100644 solana/programs/token-router/src/processor/admin/update_fee_recipient.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 08205904..a2c36927 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1194,6 +1194,7 @@ dependencies = [ "cfg-if", "hex", "hex-literal", + "ownable-tools", "ruint", "solana-program", "wormhole-cctp-solana", diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index f6cd37e9..6d938fde 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -21,6 +21,8 @@ testnet = ["wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] +ownable-tools.workspace = true + wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 61426166..d831edf1 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -1,6 +1,4 @@ -use anchor_lang::prelude::error_code; - -#[error_code] +#[anchor_lang::prelude::error_code] pub enum MatchingEngineError { #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x100, @@ -12,6 +10,16 @@ pub enum MatchingEngineError { #[msg("OwnerOnly")] OwnerOnly = 0x200, + #[msg("InvalidNewOwner")] + InvalidNewOwner = 0x202, + + /// Specified key is already the program's owner. + #[msg("AlreadyOwner")] + AlreadyOwner = 0x204, + + #[msg("NoTransferOwnershipRequest")] + NoTransferOwnershipRequest = 0x206, + #[msg("InvalidNewAssistant")] InvalidNewAssistant = 0x208, @@ -21,6 +29,10 @@ pub enum MatchingEngineError { #[msg("InvalidChain")] InvalidChain = 0x20c, + /// Only the program's pending owner is permitted. + #[msg("NotPendingOwner")] + NotPendingOwner = 0x20e, + #[msg("OwnerOrAssistantOnly")] // Only the program's owner or assistant is permitted. OwnerOrAssistantOnly, diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 08c8002f..cea70f49 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -30,10 +30,7 @@ pub mod matching_engine { /// This instruction is be used to generate your program's config. /// And for convenience, we will store Wormhole-related PDAs in the /// config so we can verify these accounts with a simple == constraint. - pub fn initialize( - ctx: Context, - auction_config: AuctionConfig, - ) -> Result<()> { + pub fn initialize(ctx: Context, auction_config: AuctionConfig) -> Result<()> { processor::initialize(ctx, auction_config) } @@ -43,4 +40,46 @@ pub mod matching_engine { ) -> Result<()> { processor::add_router_endpoint(ctx, args) } + + /// This instruction sets the `pending_owner` field in the `OwnerConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can submit an + /// ownership transfer request. + pub fn submit_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::submit_ownership_transfer_request(ctx) + } + + /// This instruction confirms that the `pending_owner` is the signer of + /// the transaction and updates the `owner` field in the `SenderConfig`, + /// `RedeemerConfig`, and `OwnerConfig` accounts. + pub fn confirm_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::confirm_ownership_transfer_request(ctx) + } + + /// This instruction cancels the ownership transfer request by setting + /// the `pending_owner` field in the `OwnerConfig` account to `None`. + /// This instruction is owner-only, meaning that only the owner of the + /// program (defined in the [Config] account) can cancel an ownership + /// transfer request. + pub fn cancel_ownership_transfer_request( + ctx: Context, + ) -> Result<()> { + processor::cancel_ownership_transfer_request(ctx) + } + + /// This instruction updates the `assistant` field in the `OwnerConfig` + /// account. This instruction is owner-only, meaning that only the owner + /// of the program (defined in the [Config] account) can update the + /// assistant. + pub fn update_owner_assistant(ctx: Context) -> Result<()> { + processor::update_owner_assistant(ctx) + } + + pub fn update_fee_recipient(ctx: Context) -> Result<()> { + processor::update_fee_recipient(ctx) + } } diff --git a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs index 6d39bad4..f2410e78 100644 --- a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs @@ -3,13 +3,14 @@ use crate::{ state::{Custodian, RouterEndpoint}, }; use anchor_lang::prelude::*; +use ownable_tools::utils::assistant::only_authorized; #[derive(Accounts)] #[instruction(chain: u16)] pub struct AddRouterEndpoint<'info> { #[account( mut, - constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, + constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ MatchingEngineError::OwnerOrAssistantOnly, )] owner_or_assistant: Signer<'info>, @@ -58,10 +59,7 @@ pub fn add_router_endpoint( } fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { - require!( - args.chain != 0, - MatchingEngineError::ChainNotAllowed - ); + require!(args.chain != 0, MatchingEngineError::ChainNotAllowed); require!( args.address != [0; 32], diff --git a/solana/programs/matching-engine/src/processor/admin/mod.rs b/solana/programs/matching-engine/src/processor/admin/mod.rs index c2c6e7cb..7045e6da 100644 --- a/solana/programs/matching-engine/src/processor/admin/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/mod.rs @@ -4,17 +4,8 @@ pub use add_router_endpoint::*; mod initialize; pub use initialize::*; -use crate::{error::MatchingEngineError, state::Custodian}; -use anchor_lang::prelude::*; +mod ownership_transfer_request; +pub use ownership_transfer_request::*; -pub(self) fn require_owner_or_assistant( - custodian: &Custodian, - caller: &AccountInfo, -) -> Result { - require!( - *caller.key == custodian.owner || *caller.key == custodian.owner_assistant, - MatchingEngineError::OwnerOrAssistantOnly - ); - - Ok(true) -} +mod update; +pub use update::*; diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs new file mode 100644 index 00000000..16f3e6e4 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs @@ -0,0 +1,25 @@ +use crate::{error::MatchingEngineError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct CancelOwnershipTransferRequest<'info> { + owner: Signer<'info>, + + /// Custodian, which can only be modified by the configured owner. + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = ownable_tools::utils::ownable::only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, +} + +pub fn cancel_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + ownable_tools::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs new file mode 100644 index 00000000..9188bf23 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs @@ -0,0 +1,28 @@ +use crate::{error::MatchingEngineError, state::Custodian}; +use anchor_lang::prelude::*; +use ownable_tools::utils::pending_owner; + +#[derive(Accounts)] +pub struct ConfirmOwnershipTransferRequest<'info> { + /// Must be the pending owner of the program set in the [`OwnerConfig`] + /// account. + pending_owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = custodian.pending_owner.is_some() @ MatchingEngineError::NoTransferOwnershipRequest, + constraint = pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) @ MatchingEngineError::NotPendingOwner, + )] + custodian: Account<'info, Custodian>, +} + +pub fn confirm_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + pending_owner::accept_ownership_unchecked(&mut ctx.accounts.custodian); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/mod.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/mod.rs new file mode 100644 index 00000000..c33a7ba7 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/mod.rs @@ -0,0 +1,8 @@ +mod cancel; +pub use cancel::*; + +mod confirm; +pub use confirm::*; + +mod submit; +pub use submit::*; diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs new file mode 100644 index 00000000..b07a5966 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs @@ -0,0 +1,35 @@ +use crate::{error::MatchingEngineError, state::Custodian}; +use anchor_lang::prelude::*; +use ownable_tools::utils::{ownable, pending_owner}; + +#[derive(Accounts)] +pub struct SubmitOwnershipTransferRequest<'info> { + owner: Signer<'info>, + + /// Custodian, which can only be modified by the configured owner. + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = ownable::only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + /// New Owner. + /// + /// CHECK: Must be neither zero pubkey nor current owner. + #[account( + constraint = new_owner.key() != Pubkey::default() @ MatchingEngineError::InvalidNewOwner, + constraint = new_owner.key() != owner.key() @ MatchingEngineError::AlreadyOwner + )] + new_owner: AccountInfo<'info>, +} + +pub fn submit_ownership_transfer_request( + ctx: Context, +) -> Result<()> { + pending_owner::transfer_ownership(&mut ctx.accounts.custodian, &ctx.accounts.new_owner.key()); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs new file mode 100644 index 00000000..e4e635f4 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs @@ -0,0 +1,39 @@ +use crate::{error::MatchingEngineError, state::Custodian}; +use anchor_lang::prelude::*; +use ownable_tools::utils::assistant::only_authorized; + +#[derive(Accounts)] +pub struct UpdateFeeRecipient<'info> { + #[account( + mut, + constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ MatchingEngineError::OwnerOrAssistantOnly, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// New Fee Recipient. + /// + /// CHECK: Must not be zero pubkey. + #[account( + constraint = new_fee_recipient.key() != Pubkey::default() @ MatchingEngineError::FeeRecipientZeroPubkey, + )] + new_fee_recipient: AccountInfo<'info>, +} + +pub fn update_fee_recipient(ctx: Context) -> Result<()> { + // require_keys_neq!( + // new_fee_recipient, + // ctx.accounts.custodian.fee_recipient, + // MatchingEngineError::AlreadyTheFeeRecipient + // ); + + // Update the fee_recipient key. + ctx.accounts.custodian.fee_recipient = ctx.accounts.new_fee_recipient.key(); + + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/update/mod.rs b/solana/programs/matching-engine/src/processor/admin/update/mod.rs new file mode 100644 index 00000000..c97d7c9f --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/update/mod.rs @@ -0,0 +1,5 @@ +mod fee_recipient; +pub use fee_recipient::*; + +mod owner_assistant; +pub use owner_assistant::*; diff --git a/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs new file mode 100644 index 00000000..7e780764 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs @@ -0,0 +1,35 @@ +use crate::{error::MatchingEngineError, state::Custodian}; +use anchor_lang::prelude::*; +use ownable_tools::utils::{assistant, ownable::only_owner}; + +#[derive(Accounts)] +pub struct UpdateOwnerAssistant<'info> { + /// Owner of the program set in the [`OwnerConfig`] account. + owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + /// New Assistant. + /// + /// CHECK: Must not be zero pubkey. + #[account( + constraint = new_owner_assistant.key() != Pubkey::default() @ MatchingEngineError::InvalidNewAssistant, + )] + new_owner_assistant: AccountInfo<'info>, +} + +pub fn update_owner_assistant(ctx: Context) -> Result<()> { + assistant::transfer_owner_assistant( + &mut ctx.accounts.custodian, + &ctx.accounts.new_owner_assistant.key(), + ); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs b/solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs deleted file mode 100644 index ed877b44..00000000 --- a/solana/programs/matching-engine/src/processor/admin/update_fee_recipient.rs +++ /dev/null @@ -1,44 +0,0 @@ -use crate::{ - error::MatchingEngineError, - state::Custodian, -}; -use anchor_lang::prelude::*; - -#[derive(Accounts)] -pub struct UpdateFeeRecipient<'info> { - #[account( - mut, - constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, - )] - owner_or_assistant: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - )] - custodian: Account<'info, Custodian>, - - system_program: Program<'info, System>, -} - -pub fn update_fee_recipient( - ctx: Context, - new_fee_recipient: Pubkey, -) -> Result<()> { - require_keys_neq!( - new_fee_recipient, - Pubkey::default(), - MatchingEngineError::FeeRecipientZeroPubkey - ); - require_keys_neq!( - new_fee_recipient, - ctx.accounts.custodian.fee_recipient, - TokenBridgeRelayerError::AlreadyTheFeeRecipient - ); - - // Update the fee_recipient key. - let custodian = &mut ctx.accounts.custodian; - custodian.fee_recipient = new_fee_recipient; - - Ok(()) -} \ No newline at end of file diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index b4c414ae..dbb253c1 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -48,3 +48,33 @@ impl Custodian { self.owner == *key || self.owner_assistant == *key } } + +impl ownable_tools::Ownable for Custodian { + fn owner(&self) -> &Pubkey { + &self.owner + } + + fn owner_mut(&mut self) -> &mut Pubkey { + &mut self.owner + } +} + +impl ownable_tools::PendingOwner for Custodian { + fn pending_owner(&self) -> &Option { + &self.pending_owner + } + + fn pending_owner_mut(&mut self) -> &mut Option { + &mut self.pending_owner + } +} + +impl ownable_tools::OwnerAssistant for Custodian { + fn owner_assistant(&self) -> &Pubkey { + &self.owner_assistant + } + + fn owner_assistant_mut(&mut self) -> &mut Pubkey { + &mut self.owner_assistant + } +} diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index 66e3b095..0dfae352 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -21,6 +21,8 @@ testnet = ["wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] +ownable-tools.workspace = true + wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true @@ -32,8 +34,6 @@ hex.workspace = true ruint.workspace = true cfg-if.workspace = true -ownable-tools.workspace = true - ahash.workspace = true [dev-dependencies] diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 74f0ca60..172223fb 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -29,6 +29,10 @@ pub enum TokenRouterError { #[msg("InvalidChain")] InvalidChain = 0x20c, + /// Only the program's pending owner is permitted. + #[msg("NotPendingOwner")] + NotPendingOwner = 0x20e, + #[msg("CctpRemoteTokenMessengerRequired")] CctpRemoteTokenMessengerRequired, @@ -43,10 +47,6 @@ pub enum TokenRouterError { // Only the program's owner or assistant is permitted. OwnerOrAssistantOnly, - #[msg("NotPendingOwner")] - /// Only the program's pending owner is permitted. - NotPendingOwner, - #[msg("AlreadyTheFeeRecipient")] /// Specified key is already the program's fee recipient. AlreadyTheFeeRecipient, diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs index 22c8d85e..d0726ac0 100644 --- a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -17,7 +17,7 @@ pub struct UpdateOwnerAssistant<'info> { /// New Assistant. /// - /// CHECK: Must be neither zero pubkey nor current owner assistant. + /// CHECK: Must not be zero pubkey. #[account( constraint = new_owner_assistant.key() != Pubkey::default() @ TokenRouterError::InvalidNewAssistant, )] diff --git a/solana/programs/token-router/src/processor/admin/update_fee_recipient.rs b/solana/programs/token-router/src/processor/admin/update_fee_recipient.rs deleted file mode 100644 index ed877b44..00000000 --- a/solana/programs/token-router/src/processor/admin/update_fee_recipient.rs +++ /dev/null @@ -1,44 +0,0 @@ -use crate::{ - error::MatchingEngineError, - state::Custodian, -}; -use anchor_lang::prelude::*; - -#[derive(Accounts)] -pub struct UpdateFeeRecipient<'info> { - #[account( - mut, - constraint = super::require_owner_or_assistant(&custodian, &owner_or_assistant)?, - )] - owner_or_assistant: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - )] - custodian: Account<'info, Custodian>, - - system_program: Program<'info, System>, -} - -pub fn update_fee_recipient( - ctx: Context, - new_fee_recipient: Pubkey, -) -> Result<()> { - require_keys_neq!( - new_fee_recipient, - Pubkey::default(), - MatchingEngineError::FeeRecipientZeroPubkey - ); - require_keys_neq!( - new_fee_recipient, - ctx.accounts.custodian.fee_recipient, - TokenBridgeRelayerError::AlreadyTheFeeRecipient - ); - - // Update the fee_recipient key. - let custodian = &mut ctx.accounts.custodian; - custodian.fee_recipient = new_fee_recipient; - - Ok(()) -} \ No newline at end of file From e4f3f19f133f392abe4c72840263b36ef8deabc1 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 10:53:20 -0600 Subject: [PATCH 009/126] solana: fix comments --- solana/programs/token-router/src/state/custodian.rs | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs index 20a73b27..f3b6a73b 100644 --- a/solana/programs/token-router/src/state/custodian.rs +++ b/solana/programs/token-router/src/state/custodian.rs @@ -8,15 +8,16 @@ pub struct Custodian { /// Boolean indicating whether outbound transfers are paused. pub paused: bool, - /// Indicate who last set the `paused` value. When the program is first initialized, this is set - /// to the `owner`. - pub paused_set_by: Pubkey, - + /// Program's owner. pub owner: Pubkey, - pub pending_owner: Option, + /// Program's assistant. Can be used to update the relayer fee and swap rate. pub owner_assistant: Pubkey, + + /// Indicate who last set the `paused` value. When the program is first initialized, this is set + /// to the `owner`. + pub paused_set_by: Pubkey, } impl Custodian { From 7f83b6bc6403df37683ca2b2cee44b8e4a812b44 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 9 Jan 2024 11:32:57 -0600 Subject: [PATCH 010/126] solana: add remaining admin tests to matching engine --- solana/programs/matching-engine/src/error.rs | 4 - solana/programs/matching-engine/src/lib.rs | 16 - .../processor/admin/update/fee_recipient.rs | 7 +- solana/ts/src/matching_engine/index.ts | 77 +++- solana/ts/tests/02__matchingEngine.ts | 341 ++++++++++++++++-- 5 files changed, 394 insertions(+), 51 deletions(-) diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index d831edf1..def27cd0 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -44,10 +44,6 @@ pub enum MatchingEngineError { /// Specified foreign contract has a bad chain ID or zero address. InvalidEndpoint, - #[msg("AlreadyTheFeeRecipient")] - /// The specified account is already the fee recipient. - AlreadyTheFeeRecipient, - #[msg("InvalidAuctionDuration")] /// The auction duration is zero. InvalidAuctionDuration, diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index cea70f49..5f2e07be 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -41,40 +41,24 @@ pub mod matching_engine { processor::add_router_endpoint(ctx, args) } - /// This instruction sets the `pending_owner` field in the `OwnerConfig` - /// account. This instruction is owner-only, meaning that only the owner - /// of the program (defined in the [Config] account) can submit an - /// ownership transfer request. pub fn submit_ownership_transfer_request( ctx: Context, ) -> Result<()> { processor::submit_ownership_transfer_request(ctx) } - /// This instruction confirms that the `pending_owner` is the signer of - /// the transaction and updates the `owner` field in the `SenderConfig`, - /// `RedeemerConfig`, and `OwnerConfig` accounts. pub fn confirm_ownership_transfer_request( ctx: Context, ) -> Result<()> { processor::confirm_ownership_transfer_request(ctx) } - /// This instruction cancels the ownership transfer request by setting - /// the `pending_owner` field in the `OwnerConfig` account to `None`. - /// This instruction is owner-only, meaning that only the owner of the - /// program (defined in the [Config] account) can cancel an ownership - /// transfer request. pub fn cancel_ownership_transfer_request( ctx: Context, ) -> Result<()> { processor::cancel_ownership_transfer_request(ctx) } - /// This instruction updates the `assistant` field in the `OwnerConfig` - /// account. This instruction is owner-only, meaning that only the owner - /// of the program (defined in the [Config] account) can update the - /// assistant. pub fn update_owner_assistant(ctx: Context) -> Result<()> { processor::update_owner_assistant(ctx) } diff --git a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs index e4e635f4..b66863c9 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs @@ -11,6 +11,7 @@ pub struct UpdateFeeRecipient<'info> { owner_or_assistant: Signer<'info>, #[account( + mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, )] @@ -26,12 +27,6 @@ pub struct UpdateFeeRecipient<'info> { } pub fn update_fee_recipient(ctx: Context) -> Result<()> { - // require_keys_neq!( - // new_fee_recipient, - // ctx.accounts.custodian.fee_recipient, - // MatchingEngineError::AlreadyTheFeeRecipient - // ); - // Update the fee_recipient key. ctx.accounts.custodian.fee_recipient = ctx.accounts.new_fee_recipient.key(); diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index b791b973..5d030f73 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -24,7 +24,6 @@ export class MatchingEngineProgram { program: Program; - // TODO: fix this constructor(connection: Connection, programId?: ProgramId) { this._programId = programId ?? testnet(); this.program = new Program(IDL as any, new PublicKey(this._programId), { @@ -100,6 +99,66 @@ export class MatchingEngineProgram { .instruction(); } + async submitOwnershipTransferIx(accounts: { + owner: PublicKey; + newOwner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { owner, newOwner, custodian: inputCustodian } = accounts; + return this.program.methods + .submitOwnershipTransferRequest() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + newOwner, + }) + .instruction(); + } + + async confirmOwnershipTransferIx(accounts: { + pendingOwner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { pendingOwner, custodian: inputCustodian } = accounts; + return this.program.methods + .confirmOwnershipTransferRequest() + .accounts({ + pendingOwner, + custodian: inputCustodian ?? this.custodianAddress(), + }) + .instruction(); + } + + async cancelOwnershipTransferIx(accounts: { + owner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { owner, custodian: inputCustodian } = accounts; + return this.program.methods + .cancelOwnershipTransferRequest() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + }) + .instruction(); + } + + async updateOwnerAssistantIx(accounts: { + owner: PublicKey; + newOwnerAssistant: PublicKey; + custodian?: PublicKey; + }) { + const { owner, newOwnerAssistant, custodian: inputCustodian } = accounts; + return this.program.methods + .updateOwnerAssistant() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + newOwnerAssistant, + }) + .instruction(); + } + async addRouterEndpointIx( accounts: { ownerOrAssistant: PublicKey; @@ -123,6 +182,22 @@ export class MatchingEngineProgram { }) .instruction(); } + + async updateFeeRecipientIx(accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + newFeeRecipient: PublicKey; + }): Promise { + const { ownerOrAssistant, custodian: inputCustodian, newFeeRecipient } = accounts; + return this.program.methods + .updateFeeRecipient() + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + newFeeRecipient, + }) + .instruction(); + } } export function testnet(): ProgramId { diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index c3ad9d7c..c2103ee9 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -15,10 +15,12 @@ chaiUse(chaiAsPromised); describe("Matching Engine", function () { const connection = new Connection(LOCALHOST, "processed"); // owner is also the recipient in all tests - const owner = PAYER_KEYPAIR; + const payer = PAYER_KEYPAIR; + const owner = Keypair.generate(); + const relayer = Keypair.generate(); const ownerAssistant = Keypair.generate(); - const robber = Keypair.generate(); const feeRecipient = Keypair.generate(); + const newFeeRecipient = Keypair.generate(); const foreignChain = CHAINS.ethereum; const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); @@ -39,7 +41,7 @@ describe("Matching Engine", function () { feeRecipient?: PublicKey; }) => engine.initializeIx(auctionConfig, { - owner: owner.publicKey, + owner: payer.publicKey, ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, feeRecipient: opts?.feeRecipient ?? feeRecipient.publicKey, }); @@ -52,7 +54,7 @@ describe("Matching Engine", function () { ownerAssistant: PublicKey.default, }), ], - [owner], + [payer], "AssistantZeroPubkey" ); }); @@ -65,7 +67,7 @@ describe("Matching Engine", function () { feeRecipient: PublicKey.default, }), ], - [owner], + [payer], "FeeRecipientZeroPubkey" ); }); @@ -78,12 +80,12 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: owner.publicKey, + owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [owner], + [payer], "InvalidAuctionDuration" ); }); @@ -96,12 +98,12 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: owner.publicKey, + owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [owner], + [payer], "InvalidAuctionGracePeriod" ); }); @@ -114,12 +116,12 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: owner.publicKey, + owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [owner], + [payer], "UserPenaltyTooLarge" ); }); @@ -132,23 +134,23 @@ describe("Matching Engine", function () { connection, [ await engine.initializeIx(newAuctionConfig, { - owner: owner.publicKey, + owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, }), ], - [owner], + [payer], "InitialPenaltyTooLarge" ); }); it("Finally Initialize Program", async function () { - await expectIxOk(connection, [await createInitializeIx()], [owner]); + await expectIxOk(connection, [await createInitializeIx()], [payer]); const custodianData = await engine.fetchCustodian(engine.custodianAddress()); const expectedCustodianData = { bump: 255, - owner: owner.publicKey, + owner: payer.publicKey, pendingOwner: null, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, @@ -161,12 +163,263 @@ describe("Matching Engine", function () { await expectIxErr( connection, [await createInitializeIx({})], - [owner], + [payer], "already in use" ); }); }); + describe("Ownership Transfer Request", async function () { + // Create the submit ownership transfer instruction, which will be used + // to set the pending owner to the `relayer` key. + const createSubmitOwnershipTransferIx = (opts?: { + sender?: PublicKey; + newOwner?: PublicKey; + }) => + engine.submitOwnershipTransferIx({ + owner: opts?.sender ?? owner.publicKey, + newOwner: opts?.newOwner ?? relayer.publicKey, + }); + + // Create the confirm ownership transfer instruction, which will be used + // to set the new owner to the `relayer` key. + const createConfirmOwnershipTransferIx = (opts?: { sender?: PublicKey }) => + engine.confirmOwnershipTransferIx({ + pendingOwner: opts?.sender ?? relayer.publicKey, + }); + + // Instruction to cancel an ownership transfer request. + const createCancelOwnershipTransferIx = (opts?: { sender?: PublicKey }) => + engine.cancelOwnershipTransferIx({ + owner: opts?.sender ?? owner.publicKey, + }); + + it("Submit Ownership Transfer Request as Deployer (Payer)", async function () { + await expectIxOk( + connection, + [ + await createSubmitOwnershipTransferIx({ + sender: payer.publicKey, + newOwner: owner.publicKey, + }), + ], + [payer] + ); + + // Confirm that the pending owner variable is set in the owner config. + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + + expect(custodianData.pendingOwner).deep.equals(owner.publicKey); + }); + + it("Confirm Ownership Transfer Request as Pending Owner", async function () { + await expectIxOk( + connection, + [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], + [payer, owner] + ); + + // Confirm that the owner config reflects the current ownership status. + { + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.owner).deep.equals(owner.publicKey); + expect(custodianData.pendingOwner).deep.equals(null); + } + }); + + it("Cannot Submit Ownership Transfer Request (New Owner == Address(0))", async function () { + await expectIxErr( + connection, + [ + await createSubmitOwnershipTransferIx({ + newOwner: PublicKey.default, + }), + ], + [payer, owner], + "InvalidNewOwner" + ); + }); + + it("Cannot Submit Ownership Transfer Request (New Owner == Owner)", async function () { + await expectIxErr( + connection, + [ + await createSubmitOwnershipTransferIx({ + newOwner: owner.publicKey, + }), + ], + [payer, owner], + "AlreadyOwner" + ); + }); + + it("Cannot Submit Ownership Transfer Request as Non-Owner", async function () { + await expectIxErr( + connection, + [ + await createSubmitOwnershipTransferIx({ + sender: ownerAssistant.publicKey, + }), + ], + [payer, ownerAssistant], + "OwnerOnly" + ); + }); + + it("Submit Ownership Transfer Request as Owner", async function () { + await expectIxOk( + connection, + [await createSubmitOwnershipTransferIx()], + [payer, owner] + ); + + // Confirm that the pending owner variable is set in the owner config. + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); + }); + + it("Cannot Confirm Ownership Transfer Request as Non Pending Owner", async function () { + await expectIxErr( + connection, + [ + await createConfirmOwnershipTransferIx({ + sender: ownerAssistant.publicKey, + }), + ], + [payer, ownerAssistant], + "NotPendingOwner" + ); + }); + + it("Confirm Ownership Transfer Request as Pending Owner", async function () { + await expectIxOk( + connection, + [await createConfirmOwnershipTransferIx()], + [payer, relayer] + ); + + // Confirm that the owner config reflects the current ownership status. + { + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.owner).deep.equals(relayer.publicKey); + expect(custodianData.pendingOwner).deep.equals(null); + } + + // Set the owner back to the payer key. + await expectIxOk( + connection, + [ + await createSubmitOwnershipTransferIx({ + sender: relayer.publicKey, + newOwner: owner.publicKey, + }), + ], + [payer, relayer] + ); + + await expectIxOk( + connection, + [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], + [payer, owner] + ); + + // Confirm that the payer is the owner again. + { + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.owner).deep.equals(owner.publicKey); + expect(custodianData.pendingOwner).deep.equals(null); + } + }); + + it("Cannot Cancel Ownership Request as Non-Owner", async function () { + // First, submit the ownership transfer request. + await expectIxOk( + connection, + [await createSubmitOwnershipTransferIx()], + [payer, owner] + ); + + // Confirm that the pending owner variable is set in the owner config. + { + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); + } + + // Confirm that the cancel ownership transfer request fails. + await expectIxErr( + connection, + [await createCancelOwnershipTransferIx({ sender: ownerAssistant.publicKey })], + [payer, ownerAssistant], + "OwnerOnly" + ); + }); + + it("Cancel Ownership Request as Owner", async function () { + await expectIxOk( + connection, + [await createCancelOwnershipTransferIx()], + [payer, owner] + ); + + // Confirm the pending owner field was reset. + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.pendingOwner).deep.equals(null); + }); + }); + + describe("Update Owner Assistant", async function () { + // Create the update owner assistant instruction. + const createUpdateOwnerAssistantIx = (opts?: { + sender?: PublicKey; + newAssistant?: PublicKey; + }) => + engine.updateOwnerAssistantIx({ + owner: opts?.sender ?? owner.publicKey, + newOwnerAssistant: opts?.newAssistant ?? relayer.publicKey, + }); + + it("Cannot Update Assistant (New Assistant == Address(0))", async function () { + await expectIxErr( + connection, + [await createUpdateOwnerAssistantIx({ newAssistant: PublicKey.default })], + [payer, owner], + "InvalidNewAssistant" + ); + }); + + it("Cannot Update Assistant as Non-Owner", async function () { + await expectIxErr( + connection, + [await createUpdateOwnerAssistantIx({ sender: ownerAssistant.publicKey })], + [payer, ownerAssistant], + "OwnerOnly" + ); + }); + + it("Update Assistant as Owner", async function () { + await expectIxOk( + connection, + [await createUpdateOwnerAssistantIx()], + [payer, owner] + ); + + // Confirm the assistant field was updated. + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.ownerAssistant).deep.equals(relayer.publicKey); + + // Set the assistant back to the assistant key. + await expectIxOk( + connection, + [ + await createUpdateOwnerAssistantIx({ + newAssistant: ownerAssistant.publicKey, + }), + ], + [payer, owner] + ); + }); + }); + describe("Add Router Endpoint", function () { const createAddRouterEndpointIx = (opts?: { sender?: PublicKey; @@ -182,30 +435,30 @@ describe("Matching Engine", function () { } ); - before("Transfer Lamports to Owner, Owner Assistant and Robber", async function () { + before("Transfer Lamports to Owner and Owner Assistant", async function () { await expectIxOk( connection, [ SystemProgram.transfer({ - fromPubkey: owner.publicKey, - toPubkey: ownerAssistant.publicKey, + fromPubkey: payer.publicKey, + toPubkey: owner.publicKey, lamports: 1000000000, }), SystemProgram.transfer({ - fromPubkey: owner.publicKey, - toPubkey: robber.publicKey, + fromPubkey: payer.publicKey, + toPubkey: ownerAssistant.publicKey, lamports: 1000000000, }), ], - [owner] + [payer] ); }); it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { await expectIxErr( connection, - [await createAddRouterEndpointIx({ sender: robber.publicKey })], - [robber], + [await createAddRouterEndpointIx({ sender: payer.publicKey })], + [payer], "OwnerOrAssistantOnly" ); }); @@ -285,5 +538,45 @@ describe("Matching Engine", function () { expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); }); + + describe("Update Fee Recipient", async function () { + const createUpdateFeeRecipientIx = (opts?: { + sender?: PublicKey; + newFeeRecipient?: PublicKey; + }) => + engine.updateFeeRecipientIx({ + ownerOrAssistant: opts?.sender ?? owner.publicKey, + newFeeRecipient: opts?.newFeeRecipient ?? newFeeRecipient.publicKey, + }); + + it("Cannot Update Fee Recipient as Non-Owner and Non-Assistant", async function () { + await expectIxErr( + connection, + [await createUpdateFeeRecipientIx({ sender: payer.publicKey })], + [payer], + "OwnerOrAssistantOnly" + ); + }); + + it("Cannot Update Fee Recipient to Address(0)", async function () { + await expectIxErr( + connection, + [await createUpdateFeeRecipientIx({ newFeeRecipient: PublicKey.default })], + [owner], + "FeeRecipientZeroPubkey" + ); + }); + + it("Update Fee Recipient as Owner Assistant", async function () { + await expectIxOk( + connection, + [await createUpdateFeeRecipientIx({ sender: ownerAssistant.publicKey })], + [ownerAssistant] + ); + + const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + expect(custodianData.feeRecipient).deep.equals(newFeeRecipient.publicKey); + }); + }); }); }); From b34811d28027f56865675e65aaebb2e60cf1511e Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 14:22:52 -0600 Subject: [PATCH 011/126] solana: uptick wormhole-cctp-solana to 0.0.1-alpha.2 --- solana/Cargo.lock | 8 ++++---- solana/Cargo.toml | 2 +- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index a2c36927..73139ae9 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2410,9 +2410,9 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.0.1-alpha.1" +version = "0.0.1-alpha.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "8f7b206512564544ef2fb96f63603de0312d9c8969e1ea16308dee557a426ed2" +checksum = "ed46fab23137cc483e25fd9be674e80805f31140eae1f7b86030d6e22d9870dd" dependencies = [ "anchor-lang", "anchor-spl", @@ -2427,9 +2427,9 @@ dependencies = [ [[package]] name = "wormhole-core-bridge-solana" -version = "0.0.1-alpha.4" +version = "0.0.1-alpha.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "67e09e0f43aad69344d16abbd9304870bd8aa2d88cc974417aa8be6463e8552c" +checksum = "3e3aa8ef4ad0295b10cce873f2dbbed86ed504a0b095b3ed1d06733b3f976044" dependencies = [ "anchor-lang", "cfg-if", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 0b7f5151..a8187681 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -14,7 +14,7 @@ homepage = "https://wormhole.com" repository = "https://github.com/wormhole-foundation/example-liquidity-layer" [workspace.dependencies.wormhole-cctp-solana] -version = "0.0.1-alpha.1" +version = "0.0.1-alpha.2" default-features = false [workspace.dependencies] From 5b3d97e61049c63b15df5ec9e8e5025a4958e618 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 9 Jan 2024 15:01:10 -0600 Subject: [PATCH 012/126] solana: make matching-engine upgradeable --- .../programs/matching-engine/src/constants.rs | 4 ++ .../src/processor/admin/initialize.rs | 24 +++++++++--- .../src/processor/auction/mod.rs | 0 .../processor/auction/place_initial_offer.rs | 0 .../matching-engine/src/state/auction_data.rs | 38 +++++++++++++++++++ .../matching-engine/src/state/custodian.rs | 3 ++ solana/ts/src/matching_engine/index.ts | 5 +++ .../ts/src/matching_engine/state/Custodian.ts | 3 ++ solana/ts/tests/02__matchingEngine.ts | 1 + 9 files changed, 73 insertions(+), 5 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/auction/mod.rs create mode 100644 solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs create mode 100644 solana/programs/matching-engine/src/state/auction_data.rs diff --git a/solana/programs/matching-engine/src/constants.rs b/solana/programs/matching-engine/src/constants.rs index 596e02b6..2b0711d3 100644 --- a/solana/programs/matching-engine/src/constants.rs +++ b/solana/programs/matching-engine/src/constants.rs @@ -1,5 +1,9 @@ use anchor_lang::prelude::constant; +/// Seed for upgrade authority. +#[constant] +pub const UPGRADE_SEED_PREFIX: &[u8] = b"upgrade"; + /// Seed for custody token account. #[constant] pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 06216f40..3fe1a0ef 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -1,5 +1,5 @@ use crate::{error::MatchingEngineError, state::{Custodian, AuctionConfig}}; -use crate::constants::FEE_PRECISION_MAX; +use crate::{constants::FEE_PRECISION_MAX, constants::UPGRADE_SEED_PREFIX}; use anchor_lang::prelude::*; use solana_program::bpf_loader_upgradeable; @@ -35,6 +35,15 @@ pub struct Initialize<'info> { )] fee_recipient: AccountInfo<'info>, + /// CHECK: We need this upgrade authority to invoke the BPF Loader Upgradeable program to + /// upgrade this program's executable. We verify this PDA address here out of convenience to get + /// the PDA bump seed to invoke the upgrade. + #[account( + seeds = [UPGRADE_SEED_PREFIX], + bump, + )] + upgrade_authority: AccountInfo<'info>, + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the /// upgrade authority. We check this PDA address just in case there is another program that this /// deployer has deployed. @@ -64,6 +73,7 @@ pub fn initialize( let owner: Pubkey = ctx.accounts.owner.key(); ctx.accounts.custodian.set_inner(Custodian { bump: ctx.bumps["custodian"], + upgrade_authority_bump: ctx.bumps["upgrade_authority"], owner, pending_owner: None, owner_assistant: ctx.accounts.owner_assistant.key(), @@ -71,16 +81,20 @@ pub fn initialize( auction_config: config }); + // Finally set the upgrade authority to this program's upgrade PDA. #[cfg(not(feature = "integration-test"))] { - // Make the program immutable. - solana_program::program::invoke( - &bpf_loader_upgradeable::set_upgrade_authority( + solana_program::program::invoke_signed( + &bpf_loader_upgradeable::set_upgrade_authority_checked( &crate::ID, &ctx.accounts.owner.key(), - None, + &ctx.accounts.upgrade_authority.key(), ), &ctx.accounts.to_account_infos(), + &[&[ + UPGRADE_SEED_PREFIX, + &[ctx.accounts.custodian.upgrade_authority_bump], + ]], )?; } diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs new file mode 100644 index 00000000..e69de29b diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs new file mode 100644 index 00000000..e69de29b diff --git a/solana/programs/matching-engine/src/state/auction_data.rs b/solana/programs/matching-engine/src/state/auction_data.rs new file mode 100644 index 00000000..6f39dc51 --- /dev/null +++ b/solana/programs/matching-engine/src/state/auction_data.rs @@ -0,0 +1,38 @@ +use anchor_lang::prelude::*; + +pub enum AuctionStatus { + None, + Active, + Completed, +} + +#[account] +#[derive(Debug, InitSpace)] +pub struct Custodian { + pub bump: u8, + + /// Auction status. + pub status: AuctionStatus, + + /// The highest bidder of the auction. + pub highest_bidder: Pubkey, + + /// The initial bidder of the auction. + pub initial_bidder: Pubkey, + + /// The slot at which the auction started. + pub start_slot: u64, + + /// The amount of tokens to be sent to the user. + pub amount: u64, + + /// The additional deposit made by the highest bidder. + pub security_deposit: u64, + + /// The offer price of the auction. + pub offer_price: u64, +} + +impl Custodian { + pub const SEED_PREFIX: &'static [u8] = b"auction"; +} \ No newline at end of file diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index dbb253c1..6845b6c1 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -22,10 +22,13 @@ pub struct AuctionConfig { pub auction_penalty_blocks: u16, } +/// TODO: Whitelist USDC mint key. + #[account] #[derive(Debug, InitSpace)] pub struct Custodian { pub bump: u8, + pub upgrade_authority_bump: u8, /// Program's owner. pub owner: Pubkey, diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index 5d030f73..1726e609 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -49,6 +49,10 @@ export class MatchingEngineProgram { } } + upgradeAuthorityAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("upgrade")], this.ID)[0]; + } + custodianAddress(): PublicKey { return Custodian.address(this.ID); } @@ -93,6 +97,7 @@ export class MatchingEngineProgram { custodian: this.custodianAddress(), ownerAssistant, feeRecipient, + upgradeAuthority: this.upgradeAuthorityAddress(), programData: getProgramData(this.ID), bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) diff --git a/solana/ts/src/matching_engine/state/Custodian.ts b/solana/ts/src/matching_engine/state/Custodian.ts index a003aba6..e780cff4 100644 --- a/solana/ts/src/matching_engine/state/Custodian.ts +++ b/solana/ts/src/matching_engine/state/Custodian.ts @@ -10,6 +10,7 @@ export interface AuctionConfig { export class Custodian { bump: number; + upgradeAuthorityBump: number; owner: PublicKey; pendingOwner: PublicKey | null; ownerAssistant: PublicKey; @@ -18,6 +19,7 @@ export class Custodian { constructor( bump: number, + upgradeAuthorityBump: number, owner: PublicKey, pendingOwner: PublicKey | null, ownerAssistant: PublicKey, @@ -25,6 +27,7 @@ export class Custodian { auctionConfig: AuctionConfig ) { this.bump = bump; + this.upgradeAuthorityBump = upgradeAuthorityBump; this.owner = owner; this.pendingOwner = pendingOwner; this.ownerAssistant = ownerAssistant; diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index c2103ee9..c006dd8f 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -150,6 +150,7 @@ describe("Matching Engine", function () { const custodianData = await engine.fetchCustodian(engine.custodianAddress()); const expectedCustodianData = { bump: 255, + upgradeAuthorityBump: 253, owner: payer.publicKey, pendingOwner: null, ownerAssistant: ownerAssistant.publicKey, From a1faecd10acf703ddcc8e335840ecc377621a585 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 15:58:45 -0600 Subject: [PATCH 013/126] solana: add shared-consts; add usdc token acct --- solana/Cargo.lock | 9 +++++ solana/Cargo.toml | 3 +- solana/modules/shared-consts/Cargo.toml | 18 +++++++++ solana/modules/shared-consts/src/lib.rs | 1 + solana/modules/shared-consts/src/usdc.rs | 7 ++++ solana/programs/token-router/Cargo.toml | 3 +- .../src/processor/admin/initialize.rs | 38 ++++++------------- .../token-router/src/state/custodian.rs | 5 +-- solana/ts/src/index.ts | 7 ++-- solana/ts/src/state/Custodian.ts | 3 ++ solana/ts/tests/01__tokenRouter.ts | 17 ++++++++- 11 files changed, 73 insertions(+), 38 deletions(-) create mode 100644 solana/modules/shared-consts/Cargo.toml create mode 100644 solana/modules/shared-consts/src/lib.rs create mode 100644 solana/modules/shared-consts/src/usdc.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 73139ae9..2fe0de92 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1756,6 +1756,14 @@ dependencies = [ "keccak", ] +[[package]] +name = "shared-consts" +version = "0.0.0" +dependencies = [ + "anchor-lang", + "cfg-if", +] + [[package]] name = "signature" version = "1.6.4" @@ -2151,6 +2159,7 @@ dependencies = [ "hex-literal", "ownable-tools", "ruint", + "shared-consts", "solana-program", "wormhole-cctp-solana", "wormhole-io", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index a8187681..c55ceea6 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -30,7 +30,8 @@ hex-literal = "0.4.1" anyhow = "1.0" thiserror = "1.0" -ownable-tools = { path = "modules/ownable-tools"} +ownable-tools = { path = "modules/ownable-tools" } +shared-consts = { path = "modules/shared-consts" } ### https://github.com/coral-xyz/anchor/issues/2755 ### This dependency must be added for each program. diff --git a/solana/modules/shared-consts/Cargo.toml b/solana/modules/shared-consts/Cargo.toml new file mode 100644 index 00000000..9ad58cc5 --- /dev/null +++ b/solana/modules/shared-consts/Cargo.toml @@ -0,0 +1,18 @@ +[package] +name = "shared-consts" +edition.workspace = true +version.workspace = true +authors.workspace = true +license.workspace = true +homepage.workspace = true +repository.workspace = true + +# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html + +[features] +testnet = [] +mainnet = [] + +[dependencies] +anchor-lang.workspace = true +cfg-if.workspace = true \ No newline at end of file diff --git a/solana/modules/shared-consts/src/lib.rs b/solana/modules/shared-consts/src/lib.rs new file mode 100644 index 00000000..03c2adeb --- /dev/null +++ b/solana/modules/shared-consts/src/lib.rs @@ -0,0 +1 @@ +pub mod usdc; diff --git a/solana/modules/shared-consts/src/usdc.rs b/solana/modules/shared-consts/src/usdc.rs new file mode 100644 index 00000000..cf31bd39 --- /dev/null +++ b/solana/modules/shared-consts/src/usdc.rs @@ -0,0 +1,7 @@ +cfg_if::cfg_if! { + if #[cfg(feature = "mainnet")] { + anchor_lang::declare_id!("EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v"); + } else if #[cfg(feature = "testnet")] { + anchor_lang::declare_id!("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + } +} diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index 0dfae352..6b39d3f3 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -17,11 +17,12 @@ no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["wormhole-cctp-solana/testnet"] +testnet = ["shared-consts/testnet", "wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] ownable-tools.workspace = true +shared-consts.workspace = true wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index a0815b5c..4b0d76d7 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -1,6 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; -use solana_program::bpf_loader_upgradeable; +use anchor_spl::token; #[derive(Accounts)] pub struct Initialize<'info> { @@ -28,31 +28,28 @@ pub struct Initialize<'info> { )] owner_assistant: AccountInfo<'info>, - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - /// - /// NOTE: Set upgrade authority is scary because any public key can be used to set as the - /// authority. #[account( - mut, - seeds = [crate::ID.as_ref()], + init, + payer = owner, + seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], bump, - seeds::program = bpf_loader_upgradeable_program, + token::mint = mint, + token::authority = custodian )] - program_data: AccountInfo<'info>, + custody_token: Account<'info, token::TokenAccount>, - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, + #[account(address = shared_consts::usdc::id())] + mint: Account<'info, token::Mint>, system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, } pub fn initialize(ctx: Context) -> Result<()> { let owner = ctx.accounts.owner.key(); ctx.accounts.custodian.set_inner(Custodian { bump: ctx.bumps["custodian"], + custody_token_bump: ctx.bumps["custody_token"], paused: false, paused_set_by: owner, owner, @@ -60,19 +57,6 @@ pub fn initialize(ctx: Context) -> Result<()> { owner_assistant: ctx.accounts.owner_assistant.key(), }); - #[cfg(not(feature = "integration-test"))] - { - // Make the program immutable. - solana_program::program::invoke( - &bpf_loader_upgradeable::set_upgrade_authority( - &crate::ID, - &ctx.accounts.owner.key(), - None, - ), - &ctx.accounts.to_account_infos(), - )?; - } - // Done. Ok(()) } diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs index f3b6a73b..6d358612 100644 --- a/solana/programs/token-router/src/state/custodian.rs +++ b/solana/programs/token-router/src/state/custodian.rs @@ -4,6 +4,7 @@ use anchor_lang::prelude::*; #[derive(Debug, InitSpace)] pub struct Custodian { pub bump: u8, + pub custody_token_bump: u8, /// Boolean indicating whether outbound transfers are paused. pub paused: bool, @@ -22,10 +23,6 @@ pub struct Custodian { impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"custodian"; - - // pub fn is_authorized(&self, owner_or_assistant: &Pubkey) -> bool { - // self.owner_config.is_admin(owner_or_assistant) - // } } impl ownable_tools::Ownable for Custodian { diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index ff7e7823..c04eda4d 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -206,16 +206,17 @@ export class TokenRouterProgram { async initializeIx(accounts: { owner: PublicKey; ownerAssistant: PublicKey; + mint: PublicKey; }): Promise { - const { owner, ownerAssistant } = accounts; + const { owner, ownerAssistant, mint } = accounts; return this.program.methods .initialize() .accounts({ owner, custodian: this.custodianAddress(), ownerAssistant, - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + mint, + custodyToken: this.custodyTokenAccountAddress(), }) .instruction(); } diff --git a/solana/ts/src/state/Custodian.ts b/solana/ts/src/state/Custodian.ts index bd4db20a..adb59f90 100644 --- a/solana/ts/src/state/Custodian.ts +++ b/solana/ts/src/state/Custodian.ts @@ -2,6 +2,7 @@ import { PublicKey } from "@solana/web3.js"; export class Custodian { bump: number; + custodyTokenBump: number; paused: boolean; owner: PublicKey; pendingOwner: PublicKey | null; @@ -10,6 +11,7 @@ export class Custodian { constructor( bump: number, + custodyTokenBump: number, paused: boolean, owner: PublicKey, pendingOwner: PublicKey | null, @@ -17,6 +19,7 @@ export class Custodian { pausedSetBy: PublicKey ) { this.bump = bump; + this.custodyTokenBump = custodyTokenBump; this.paused = paused; this.owner = owner; this.pendingOwner = pendingOwner; diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/01__tokenRouter.ts index 5f1a1113..a1e94487 100644 --- a/solana/ts/tests/01__tokenRouter.ts +++ b/solana/ts/tests/01__tokenRouter.ts @@ -1,9 +1,10 @@ import { CHAINS, ChainId } from "@certusone/wormhole-sdk"; +import * as splToken from "@solana/spl-token"; import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { Custodian, RouterEndpoint, TokenRouterProgram } from "../src"; -import { LOCALHOST, PAYER_KEYPAIR, expectIxErr, expectIxOk } from "./helpers"; +import { LOCALHOST, PAYER_KEYPAIR, USDC_MINT_ADDRESS, expectIxErr, expectIxOk } from "./helpers"; chaiUse(chaiAsPromised); @@ -24,12 +25,17 @@ describe("Token Router", function () { describe("Admin", function () { describe("Initialize", function () { - const createInitializeIx = (opts?: { ownerAssistant?: PublicKey }) => + const createInitializeIx = (opts?: { ownerAssistant?: PublicKey; mint?: PublicKey }) => tokenRouter.initializeIx({ owner: payer.publicKey, ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, + mint: opts?.mint ?? USDC_MINT_ADDRESS, }); + it.skip("Cannot Initialize Without USDC Mint", async function () { + // TODO + }); + it("Cannot Initialize With Default Owner Assistant", async function () { await expectIxErr( connection, @@ -47,6 +53,7 @@ describe("Token Router", function () { ); const expectedCustodianData = { bump: 253, + custodyTokenBump: 254, paused: false, owner: payer.publicKey, pendingOwner: null, @@ -54,6 +61,12 @@ describe("Token Router", function () { pausedSetBy: payer.publicKey, } as Custodian; expect(custodianData).to.eql(expectedCustodianData); + + const custodyToken = await splToken.getAccount( + connection, + tokenRouter.custodyTokenAccountAddress() + ); + expect(custodyToken.amount).to.equal(0n); }); it("Cannot Call Instruction Again: initialize", async function () { From 810bd09bb50f90fc2ce068806e0b069085d9383a Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 9 Jan 2024 16:12:53 -0600 Subject: [PATCH 014/126] solana: remove upgradeability code from matching engine --- .../programs/matching-engine/src/constants.rs | 4 -- .../src/processor/admin/initialize.rs | 49 +------------------ .../matching-engine/src/state/custodian.rs | 1 - solana/ts/src/matching_engine/index.ts | 8 --- solana/ts/tests/02__matchingEngine.ts | 1 - 5 files changed, 2 insertions(+), 61 deletions(-) diff --git a/solana/programs/matching-engine/src/constants.rs b/solana/programs/matching-engine/src/constants.rs index 2b0711d3..596e02b6 100644 --- a/solana/programs/matching-engine/src/constants.rs +++ b/solana/programs/matching-engine/src/constants.rs @@ -1,9 +1,5 @@ use anchor_lang::prelude::constant; -/// Seed for upgrade authority. -#[constant] -pub const UPGRADE_SEED_PREFIX: &[u8] = b"upgrade"; - /// Seed for custody token account. #[constant] pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 3fe1a0ef..3c66d2c6 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -1,7 +1,7 @@ use crate::{error::MatchingEngineError, state::{Custodian, AuctionConfig}}; -use crate::{constants::FEE_PRECISION_MAX, constants::UPGRADE_SEED_PREFIX}; +use crate::constants::FEE_PRECISION_MAX; +use anchor_spl::token; use anchor_lang::prelude::*; -use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -35,33 +35,6 @@ pub struct Initialize<'info> { )] fee_recipient: AccountInfo<'info>, - /// CHECK: We need this upgrade authority to invoke the BPF Loader Upgradeable program to - /// upgrade this program's executable. We verify this PDA address here out of convenience to get - /// the PDA bump seed to invoke the upgrade. - #[account( - seeds = [UPGRADE_SEED_PREFIX], - bump, - )] - upgrade_authority: AccountInfo<'info>, - - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - /// - /// NOTE: Set upgrade authority is scary because any public key can be used to set as the - /// authority. - #[account( - mut, - seeds = [crate::ID.as_ref()], - bump, - seeds::program = bpf_loader_upgradeable_program, - )] - program_data: AccountInfo<'info>, - - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, - system_program: Program<'info, System>, } @@ -73,7 +46,6 @@ pub fn initialize( let owner: Pubkey = ctx.accounts.owner.key(); ctx.accounts.custodian.set_inner(Custodian { bump: ctx.bumps["custodian"], - upgrade_authority_bump: ctx.bumps["upgrade_authority"], owner, pending_owner: None, owner_assistant: ctx.accounts.owner_assistant.key(), @@ -81,23 +53,6 @@ pub fn initialize( auction_config: config }); - // Finally set the upgrade authority to this program's upgrade PDA. - #[cfg(not(feature = "integration-test"))] - { - solana_program::program::invoke_signed( - &bpf_loader_upgradeable::set_upgrade_authority_checked( - &crate::ID, - &ctx.accounts.owner.key(), - &ctx.accounts.upgrade_authority.key(), - ), - &ctx.accounts.to_account_infos(), - &[&[ - UPGRADE_SEED_PREFIX, - &[ctx.accounts.custodian.upgrade_authority_bump], - ]], - )?; - } - // Done. Ok(()) } diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index 6845b6c1..23e9b702 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -28,7 +28,6 @@ pub struct AuctionConfig { #[derive(Debug, InitSpace)] pub struct Custodian { pub bump: u8, - pub upgrade_authority_bump: u8, /// Program's owner. pub owner: Pubkey, diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index 1726e609..a4ef1dee 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -7,7 +7,6 @@ import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; import IDL from "../../../target/idl/matching_engine.json"; import { MatchingEngine } from "../../../target/types/matching_engine"; import { AuctionConfig, Custodian, RouterEndpoint } from "./state"; -import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { WormholeCctpProgram } from "../wormholeCctp"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -49,10 +48,6 @@ export class MatchingEngineProgram { } } - upgradeAuthorityAddress(): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("upgrade")], this.ID)[0]; - } - custodianAddress(): PublicKey { return Custodian.address(this.ID); } @@ -97,9 +92,6 @@ export class MatchingEngineProgram { custodian: this.custodianAddress(), ownerAssistant, feeRecipient, - upgradeAuthority: this.upgradeAuthorityAddress(), - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index c006dd8f..c2103ee9 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -150,7 +150,6 @@ describe("Matching Engine", function () { const custodianData = await engine.fetchCustodian(engine.custodianAddress()); const expectedCustodianData = { bump: 255, - upgradeAuthorityBump: 253, owner: payer.publicKey, pendingOwner: null, ownerAssistant: ownerAssistant.publicKey, From ad9ef274c859239870d77e6c8e194de05f861e1b Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 9 Jan 2024 16:28:53 -0600 Subject: [PATCH 015/126] solana: fix matching engine init instruction --- solana/Cargo.lock | 1 + solana/programs/matching-engine/Cargo.toml | 3 ++- .../src/processor/admin/initialize.rs | 15 +++++++++++++++ .../matching-engine/src/state/custodian.rs | 5 +---- solana/ts/src/matching_engine/index.ts | 5 ++++- solana/ts/src/matching_engine/state/Custodian.ts | 6 +++--- solana/ts/tests/02__matchingEngine.ts | 9 ++++++++- 7 files changed, 34 insertions(+), 10 deletions(-) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 2fe0de92..77bbb402 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1196,6 +1196,7 @@ dependencies = [ "hex-literal", "ownable-tools", "ruint", + "shared-consts", "solana-program", "wormhole-cctp-solana", "wormhole-io", diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index 6d938fde..cdb5d61f 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -17,11 +17,12 @@ no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["wormhole-cctp-solana/testnet"] +testnet = ["shared-consts/testnet", "wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] ownable-tools.workspace = true +shared-consts.workspace = true wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 3c66d2c6..4cd0ef1a 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -35,7 +35,21 @@ pub struct Initialize<'info> { )] fee_recipient: AccountInfo<'info>, + #[account( + init, + payer = owner, + seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump, + token::mint = mint, + token::authority = custodian + )] + custody_token: Account<'info, token::TokenAccount>, + + #[account(address = shared_consts::usdc::id())] + mint: Account<'info, token::Mint>, + system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, } #[access_control(check_constraints(&config))] @@ -46,6 +60,7 @@ pub fn initialize( let owner: Pubkey = ctx.accounts.owner.key(); ctx.accounts.custodian.set_inner(Custodian { bump: ctx.bumps["custodian"], + custody_token_bump: ctx.bumps["custody_token"], owner, pending_owner: None, owner_assistant: ctx.accounts.owner_assistant.key(), diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index 23e9b702..e788f00c 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -28,6 +28,7 @@ pub struct AuctionConfig { #[derive(Debug, InitSpace)] pub struct Custodian { pub bump: u8, + pub custody_token_bump: u8, /// Program's owner. pub owner: Pubkey, @@ -45,10 +46,6 @@ pub struct Custodian { impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"custodian"; - - pub fn is_authorized(&self, key: &Pubkey) -> bool { - self.owner == *key || self.owner_assistant == *key - } } impl ownable_tools::Ownable for Custodian { diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index a4ef1dee..35fd79e8 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -81,9 +81,10 @@ export class MatchingEngineProgram { owner: PublicKey; ownerAssistant: PublicKey; feeRecipient: PublicKey; + mint: PublicKey; } ): Promise { - const { owner, ownerAssistant, feeRecipient } = accounts; + const { owner, ownerAssistant, feeRecipient, mint } = accounts; return this.program.methods .initialize(auctionConfig) @@ -92,6 +93,8 @@ export class MatchingEngineProgram { custodian: this.custodianAddress(), ownerAssistant, feeRecipient, + custodyToken: this.custodyTokenAccountAddress(), + mint, }) .instruction(); } diff --git a/solana/ts/src/matching_engine/state/Custodian.ts b/solana/ts/src/matching_engine/state/Custodian.ts index e780cff4..4356430a 100644 --- a/solana/ts/src/matching_engine/state/Custodian.ts +++ b/solana/ts/src/matching_engine/state/Custodian.ts @@ -10,7 +10,7 @@ export interface AuctionConfig { export class Custodian { bump: number; - upgradeAuthorityBump: number; + custodyTokenBump: number; owner: PublicKey; pendingOwner: PublicKey | null; ownerAssistant: PublicKey; @@ -19,7 +19,7 @@ export class Custodian { constructor( bump: number, - upgradeAuthorityBump: number, + custodyTokenBump: number, owner: PublicKey, pendingOwner: PublicKey | null, ownerAssistant: PublicKey, @@ -27,7 +27,7 @@ export class Custodian { auctionConfig: AuctionConfig ) { this.bump = bump; - this.upgradeAuthorityBump = upgradeAuthorityBump; + this.custodyTokenBump = custodyTokenBump; this.owner = owner; this.pendingOwner = pendingOwner; this.ownerAssistant = ownerAssistant; diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index c2103ee9..9799d215 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -8,7 +8,7 @@ import { RouterEndpoint, MatchingEngineProgram, } from "../src/matching_engine"; -import { LOCALHOST, PAYER_KEYPAIR, expectIxErr, expectIxOk } from "./helpers"; +import { LOCALHOST, PAYER_KEYPAIR, expectIxErr, expectIxOk, USDC_MINT_ADDRESS } from "./helpers"; chaiUse(chaiAsPromised); @@ -39,11 +39,13 @@ describe("Matching Engine", function () { const createInitializeIx = (opts?: { ownerAssistant?: PublicKey; feeRecipient?: PublicKey; + mint?: PublicKey; }) => engine.initializeIx(auctionConfig, { owner: payer.publicKey, ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, feeRecipient: opts?.feeRecipient ?? feeRecipient.publicKey, + mint: opts?.mint ?? USDC_MINT_ADDRESS, }); it("Cannot Initialize With Default Owner Assistant", async function () { @@ -83,6 +85,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -101,6 +104,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -119,6 +123,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -137,6 +142,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -150,6 +156,7 @@ describe("Matching Engine", function () { const custodianData = await engine.fetchCustodian(engine.custodianAddress()); const expectedCustodianData = { bump: 255, + custodyTokenBump: 254, owner: payer.publicKey, pendingOwner: null, ownerAssistant: ownerAssistant.publicKey, From 1c0acefb8db1a443ee5f8af492c9e6096f38e412 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 16:48:19 -0600 Subject: [PATCH 016/126] solana: set upgrade authority --- solana/Cargo.lock | 1 + solana/modules/ownable-tools/Cargo.toml | 3 +- solana/modules/ownable-tools/src/cpi.rs | 30 ++++++++++++++++ solana/modules/ownable-tools/src/lib.rs | 2 ++ .../programs/matching-engine/src/constants.rs | 2 +- .../src/processor/admin/initialize.rs | 22 ++++++------ .../ownership_transfer_request/cancel.rs | 34 ++++++++++++++++++ .../ownership_transfer_request/confirm.rs | 35 ++++++++++++++++++ .../ownership_transfer_request/submit.rs | 36 +++++++++++++++++++ .../ownership_transfer_request/cancel.rs | 35 ++++++++++++++++++ .../ownership_transfer_request/confirm.rs | 35 ++++++++++++++++++ .../ownership_transfer_request/submit.rs | 36 +++++++++++++++++++ solana/ts/src/index.ts | 6 ++++ solana/ts/src/matching_engine/index.ts | 12 +++++-- 14 files changed, 274 insertions(+), 15 deletions(-) create mode 100644 solana/modules/ownable-tools/src/cpi.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 77bbb402..4abf0159 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1338,6 +1338,7 @@ name = "ownable-tools" version = "0.0.0" dependencies = [ "anchor-lang", + "solana-program", ] [[package]] diff --git a/solana/modules/ownable-tools/Cargo.toml b/solana/modules/ownable-tools/Cargo.toml index b259a684..75b968a0 100644 --- a/solana/modules/ownable-tools/Cargo.toml +++ b/solana/modules/ownable-tools/Cargo.toml @@ -14,4 +14,5 @@ default = ["assistant"] assistant = [] [dependencies] -anchor-lang.workspace = true \ No newline at end of file +anchor-lang.workspace = true +solana-program.workspace = true \ No newline at end of file diff --git a/solana/modules/ownable-tools/src/cpi.rs b/solana/modules/ownable-tools/src/cpi.rs new file mode 100644 index 00000000..30f3b56c --- /dev/null +++ b/solana/modules/ownable-tools/src/cpi.rs @@ -0,0 +1,30 @@ +use anchor_lang::prelude::*; +use solana_program::bpf_loader_upgradeable; + +#[derive(Accounts)] +pub struct SetUpgradeAuthorityChecked<'info> { + #[account(mut)] + pub program_data: AccountInfo<'info>, + + #[account(signer)] + pub current_authority: AccountInfo<'info>, + + #[account(signer)] + pub new_authority: AccountInfo<'info>, +} + +pub fn set_upgrade_authority_checked<'info>( + ctx: CpiContext<'_, '_, '_, 'info, SetUpgradeAuthorityChecked<'info>>, + program_id: Pubkey, +) -> Result<()> { + solana_program::program::invoke_signed( + &bpf_loader_upgradeable::set_upgrade_authority_checked( + &program_id, + &ctx.accounts.current_authority.key(), + &ctx.accounts.new_authority.key(), + ), + &ctx.to_account_infos(), + ctx.signer_seeds, + ) + .map_err(Into::into) +} diff --git a/solana/modules/ownable-tools/src/lib.rs b/solana/modules/ownable-tools/src/lib.rs index f564222c..42cd1114 100644 --- a/solana/modules/ownable-tools/src/lib.rs +++ b/solana/modules/ownable-tools/src/lib.rs @@ -1,3 +1,5 @@ +pub mod cpi; + pub mod utils; use anchor_lang::prelude::Pubkey; diff --git a/solana/programs/matching-engine/src/constants.rs b/solana/programs/matching-engine/src/constants.rs index 596e02b6..60f38161 100644 --- a/solana/programs/matching-engine/src/constants.rs +++ b/solana/programs/matching-engine/src/constants.rs @@ -10,4 +10,4 @@ pub const NONCE: u32 = 0; /// Fee precison max. #[constant] -pub const FEE_PRECISION_MAX: u32 = 1_000_000; \ No newline at end of file +pub const FEE_PRECISION_MAX: u32 = 1_000_000; diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 4cd0ef1a..61f80596 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -1,8 +1,10 @@ -use crate::{error::MatchingEngineError, state::{Custodian, AuctionConfig}}; use crate::constants::FEE_PRECISION_MAX; -use anchor_spl::token; +use crate::{ + error::MatchingEngineError, + state::{AuctionConfig, Custodian}, +}; use anchor_lang::prelude::*; - +use anchor_spl::token; #[derive(Accounts)] pub struct Initialize<'info> { @@ -52,11 +54,8 @@ pub struct Initialize<'info> { token_program: Program<'info, token::Token>, } -#[access_control(check_constraints(&config))] -pub fn initialize( - ctx: Context, - config: AuctionConfig, -) -> Result<()> { +#[access_control(check_constraints(&auction_config))] +pub fn initialize(ctx: Context, auction_config: AuctionConfig) -> Result<()> { let owner: Pubkey = ctx.accounts.owner.key(); ctx.accounts.custodian.set_inner(Custodian { bump: ctx.bumps["custodian"], @@ -65,7 +64,7 @@ pub fn initialize( pending_owner: None, owner_assistant: ctx.accounts.owner_assistant.key(), fee_recipient: ctx.accounts.fee_recipient.key(), - auction_config: config + auction_config, }); // Done. @@ -73,7 +72,10 @@ pub fn initialize( } fn check_constraints(config: &AuctionConfig) -> Result<()> { - require!(config.auction_duration > 0, MatchingEngineError::InvalidAuctionDuration); + require!( + config.auction_duration > 0, + MatchingEngineError::InvalidAuctionDuration + ); require!( config.auction_grace_period > config.auction_duration, MatchingEngineError::InvalidAuctionGracePeriod diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs index 16f3e6e4..89e96e90 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,5 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct CancelOwnershipTransferRequest<'info> { @@ -13,6 +14,21 @@ pub struct CancelOwnershipTransferRequest<'info> { constraint = ownable_tools::utils::ownable::only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, )] custodian: Account<'info, Custodian>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn cancel_ownership_transfer_request( @@ -20,6 +36,24 @@ pub fn cancel_ownership_transfer_request( ) -> Result<()> { ownable_tools::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); + // Finally set the upgrade authority back to the current owner. + #[cfg(not(feature = "integration-test"))] + { + ownable_tools::cpi::set_upgrade_authority_checked( + CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + ownable_tools::cpi::SetUpgradeAuthorityChecked { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.custodian.to_account_info(), + new_authority: ctx.accounts.owner.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + crate::ID, + )?; + } // Done. Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs index 9188bf23..0adf1485 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,6 +1,7 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; use ownable_tools::utils::pending_owner; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct ConfirmOwnershipTransferRequest<'info> { @@ -16,6 +17,21 @@ pub struct ConfirmOwnershipTransferRequest<'info> { constraint = pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) @ MatchingEngineError::NotPendingOwner, )] custodian: Account<'info, Custodian>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn confirm_ownership_transfer_request( @@ -23,6 +39,25 @@ pub fn confirm_ownership_transfer_request( ) -> Result<()> { pending_owner::accept_ownership_unchecked(&mut ctx.accounts.custodian); + // Finally set the upgrade authority to the pending owner (the new owner). + #[cfg(not(feature = "integration-test"))] + { + ownable_tools::cpi::set_upgrade_authority_checked( + CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + ownable_tools::cpi::SetUpgradeAuthorityChecked { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.custodian.to_account_info(), + new_authority: ctx.accounts.pending_owner.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + crate::ID, + )?; + } + // Done. Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs index b07a5966..cc06e623 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,6 +1,7 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; use ownable_tools::utils::{ownable, pending_owner}; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct SubmitOwnershipTransferRequest<'info> { @@ -23,6 +24,21 @@ pub struct SubmitOwnershipTransferRequest<'info> { constraint = new_owner.key() != owner.key() @ MatchingEngineError::AlreadyOwner )] new_owner: AccountInfo<'info>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn submit_ownership_transfer_request( @@ -30,6 +46,26 @@ pub fn submit_ownership_transfer_request( ) -> Result<()> { pending_owner::transfer_ownership(&mut ctx.accounts.custodian, &ctx.accounts.new_owner.key()); + // Set the upgrade authority to the custodian for now. It will be set to the new owner once the + // ownership transfer is confirmed. + #[cfg(not(feature = "integration-test"))] + { + ownable_tools::cpi::set_upgrade_authority_checked( + CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + ownable_tools::cpi::SetUpgradeAuthorityChecked { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.owner.to_account_info(), + new_authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + crate::ID, + )?; + } + // Done. Ok(()) } diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs index 8a2a6763..fe4896d8 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,5 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct CancelOwnershipTransferRequest<'info> { @@ -13,6 +14,21 @@ pub struct CancelOwnershipTransferRequest<'info> { constraint = ownable_tools::utils::ownable::only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn cancel_ownership_transfer_request( @@ -20,6 +36,25 @@ pub fn cancel_ownership_transfer_request( ) -> Result<()> { ownable_tools::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); + // Finally set the upgrade authority back to the current owner. + #[cfg(not(feature = "integration-test"))] + { + ownable_tools::cpi::set_upgrade_authority_checked( + CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + ownable_tools::cpi::SetUpgradeAuthorityChecked { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.custodian.to_account_info(), + new_authority: ctx.accounts.owner.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + crate::ID, + )?; + } + // Done. Ok(()) } diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs index bc038c24..bc4c5229 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,6 +1,7 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use ownable_tools::utils::pending_owner; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct ConfirmOwnershipTransferRequest<'info> { @@ -16,6 +17,21 @@ pub struct ConfirmOwnershipTransferRequest<'info> { constraint = pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) @ TokenRouterError::NotPendingOwner, )] custodian: Account<'info, Custodian>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn confirm_ownership_transfer_request( @@ -23,6 +39,25 @@ pub fn confirm_ownership_transfer_request( ) -> Result<()> { pending_owner::accept_ownership_unchecked(&mut ctx.accounts.custodian); + // Finally set the upgrade authority to the pending owner (the new owner). + #[cfg(not(feature = "integration-test"))] + { + ownable_tools::cpi::set_upgrade_authority_checked( + CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + ownable_tools::cpi::SetUpgradeAuthorityChecked { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.custodian.to_account_info(), + new_authority: ctx.accounts.pending_owner.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + crate::ID, + )?; + } + // Done. Ok(()) } diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs index 39cc8546..84e6dcfa 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,6 +1,7 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use ownable_tools::utils::{ownable, pending_owner}; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct SubmitOwnershipTransferRequest<'info> { @@ -23,6 +24,21 @@ pub struct SubmitOwnershipTransferRequest<'info> { constraint = new_owner.key() != owner.key() @ TokenRouterError::AlreadyOwner )] new_owner: AccountInfo<'info>, + + /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the + /// upgrade authority. We check this PDA address just in case there is another program that this + /// deployer has deployed. + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: AccountInfo<'info>, + + /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. + #[account(address = bpf_loader_upgradeable::id())] + bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn submit_ownership_transfer_request( @@ -30,6 +46,26 @@ pub fn submit_ownership_transfer_request( ) -> Result<()> { pending_owner::transfer_ownership(&mut ctx.accounts.custodian, &ctx.accounts.new_owner.key()); + // Set the upgrade authority to the custodian for now. It will be set to the new owner once the + // ownership transfer is confirmed. + #[cfg(not(feature = "integration-test"))] + { + ownable_tools::cpi::set_upgrade_authority_checked( + CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + ownable_tools::cpi::SetUpgradeAuthorityChecked { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.owner.to_account_info(), + new_authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + crate::ID, + )?; + } + // Done. Ok(()) } diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index c04eda4d..18c0d295 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -250,6 +250,8 @@ export class TokenRouterProgram { owner, custodian: inputCustodian ?? this.custodianAddress(), newOwner, + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -264,6 +266,8 @@ export class TokenRouterProgram { .accounts({ pendingOwner, custodian: inputCustodian ?? this.custodianAddress(), + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -278,6 +282,8 @@ export class TokenRouterProgram { .accounts({ owner, custodian: inputCustodian ?? this.custodianAddress(), + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index 35fd79e8..a0753f94 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -1,13 +1,13 @@ -export * from "./state/"; +export * from "./state"; import { ChainId } from "@certusone/wormhole-sdk"; import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; -import IDL from "../../../target/idl/matching_engine.json"; -import { MatchingEngine } from "../../../target/types/matching_engine"; +import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; import { AuctionConfig, Custodian, RouterEndpoint } from "./state"; import { WormholeCctpProgram } from "../wormholeCctp"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -111,6 +111,8 @@ export class MatchingEngineProgram { owner, custodian: inputCustodian ?? this.custodianAddress(), newOwner, + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -125,6 +127,8 @@ export class MatchingEngineProgram { .accounts({ pendingOwner, custodian: inputCustodian ?? this.custodianAddress(), + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -139,6 +143,8 @@ export class MatchingEngineProgram { .accounts({ owner, custodian: inputCustodian ?? this.custodianAddress(), + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } From 6b27a506c94eda9d491adb46d3af6ad22a2341df Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 20:06:00 -0600 Subject: [PATCH 017/126] solana: add matching-engine as dep --- solana/Cargo.lock | 1 + solana/Cargo.toml | 3 +++ solana/programs/token-router/Cargo.toml | 2 ++ 3 files changed, 6 insertions(+) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 4abf0159..c8660592 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2159,6 +2159,7 @@ dependencies = [ "cfg-if", "hex", "hex-literal", + "matching-engine", "ownable-tools", "ruint", "shared-consts", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index c55ceea6..4d20e061 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -13,6 +13,9 @@ license = "Apache-2.0" homepage = "https://wormhole.com" repository = "https://github.com/wormhole-foundation/example-liquidity-layer" +[workspace.dependencies.matching-engine] +path = "programs/matching-engine" + [workspace.dependencies.wormhole-cctp-solana] version = "0.0.1-alpha.2" default-features = false diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index 6b39d3f3..a59f4752 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -21,6 +21,8 @@ testnet = ["shared-consts/testnet", "wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] +matching-engine.workspace = true + ownable-tools.workspace = true shared-consts.workspace = true From 95ff0ebc24d97090353285a024855822a82659f5 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 9 Jan 2024 21:30:10 -0600 Subject: [PATCH 018/126] solana: add liquidity-layer-messages --- solana/Cargo.lock | 10 ++ solana/Cargo.toml | 1 + .../liquidity-layer-messages/Cargo.toml | 18 +++ .../liquidity-layer-messages/src/fast_fill.rs | 83 +++++++++++++ .../src/fast_market_order.rs | 117 ++++++++++++++++++ .../liquidity-layer-messages/src/fill.rs | 90 ++++++++++++++ .../liquidity-layer-messages/src/lib.rs | 14 +++ .../src/slow_order_response.rs | 79 ++++++++++++ .../liquidity-layer-messages/src/types.rs | 42 +++++++ solana/programs/token-router/Cargo.toml | 1 + solana/programs/token-router/src/lib.rs | 2 - solana/programs/token-router/src/messages.rs | 89 ------------- 12 files changed, 455 insertions(+), 91 deletions(-) create mode 100644 solana/modules/liquidity-layer-messages/Cargo.toml create mode 100644 solana/modules/liquidity-layer-messages/src/fast_fill.rs create mode 100644 solana/modules/liquidity-layer-messages/src/fast_market_order.rs create mode 100644 solana/modules/liquidity-layer-messages/src/fill.rs create mode 100644 solana/modules/liquidity-layer-messages/src/lib.rs create mode 100644 solana/modules/liquidity-layer-messages/src/slow_order_response.rs create mode 100644 solana/modules/liquidity-layer-messages/src/types.rs delete mode 100644 solana/programs/token-router/src/messages.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index c8660592..e6afdd7d 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1168,6 +1168,15 @@ dependencies = [ "libsecp256k1-core", ] +[[package]] +name = "liquidity-layer-messages" +version = "0.0.0" +dependencies = [ + "hex-literal", + "ruint", + "wormhole-io", +] + [[package]] name = "lock_api" version = "0.4.11" @@ -2159,6 +2168,7 @@ dependencies = [ "cfg-if", "hex", "hex-literal", + "liquidity-layer-messages", "matching-engine", "ownable-tools", "ruint", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 4d20e061..b1af7758 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -33,6 +33,7 @@ hex-literal = "0.4.1" anyhow = "1.0" thiserror = "1.0" +liquidity-layer-messages = { path = "modules/liquidity-layer-messages" } ownable-tools = { path = "modules/ownable-tools" } shared-consts = { path = "modules/shared-consts" } diff --git a/solana/modules/liquidity-layer-messages/Cargo.toml b/solana/modules/liquidity-layer-messages/Cargo.toml new file mode 100644 index 00000000..09fe3b30 --- /dev/null +++ b/solana/modules/liquidity-layer-messages/Cargo.toml @@ -0,0 +1,18 @@ +[package] +name = "liquidity-layer-messages" +edition.workspace = true +version.workspace = true +authors.workspace = true +license.workspace = true +homepage.workspace = true +repository.workspace = true + +# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html + +[dependencies] +wormhole-io.workspace = true + +ruint.workspace = true + +[dev-dependencies] +hex-literal.workspace = true \ No newline at end of file diff --git a/solana/modules/liquidity-layer-messages/src/fast_fill.rs b/solana/modules/liquidity-layer-messages/src/fast_fill.rs new file mode 100644 index 00000000..89e11d91 --- /dev/null +++ b/solana/modules/liquidity-layer-messages/src/fast_fill.rs @@ -0,0 +1,83 @@ +//! Fast Fill + +use crate::Fill; +use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; + +#[derive(Debug, Clone, PartialEq, Eq)] +pub struct FastFill { + pub fill: Fill, + pub amount: u128, +} + +impl Readable for FastFill { + const SIZE: Option = None; + + fn read(reader: &mut R) -> std::io::Result + where + Self: Sized, + R: std::io::Read, + { + Ok(Self { + fill: Readable::read(reader)?, + amount: Readable::read(reader)?, + }) + } +} + +impl Writeable for FastFill { + fn written_size(&self) -> usize { + self.fill.written_size() + 16 + } + + fn write(&self, writer: &mut W) -> std::io::Result<()> + where + Self: Sized, + W: std::io::Write, + { + self.fill.write(writer)?; + self.amount.write(writer)?; + Ok(()) + } +} + +impl TypePrefixedPayload for FastFill { + const TYPE: Option = Some(12); +} + +#[cfg(test)] +mod test { + // use hex_literal::hex; + + // use super::*; + + // #[test] + // fn transfer_tokens_with_relay() { + // let msg = TransferTokensWithRelay { + // target_relayer_fee: U256::from(69u64), + // to_native_token_amount: U256::from(420u64), + // target_recipient_wallet: hex!( + // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" + // ), + // }; + + // let mut bytes = Vec::with_capacity(msg.payload_written_size()); + // msg.write_typed(&mut bytes).unwrap(); + // assert_eq!(bytes.len(), msg.payload_written_size()); + // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); + // assert_eq!(recovered, msg); + // } + + // #[test] + // fn invalid_message_type() { + // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let err = TransferTokensWithRelay::read_typed(&mut cursor) + // .err() + // .unwrap(); + // matches!(err.kind(), std::io::ErrorKind::InvalidData); + // } +} diff --git a/solana/modules/liquidity-layer-messages/src/fast_market_order.rs b/solana/modules/liquidity-layer-messages/src/fast_market_order.rs new file mode 100644 index 00000000..6919cab2 --- /dev/null +++ b/solana/modules/liquidity-layer-messages/src/fast_market_order.rs @@ -0,0 +1,117 @@ +//! Fast Market Order + +use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; + +use crate::RedeemerMessage; + +#[derive(Debug, Clone, PartialEq, Eq)] +pub struct FastMarketOrder { + pub amount_in: u128, + pub min_amount_out: u128, + pub target_chain: u16, + pub destination_cctp_domain: u32, + pub redeemer: [u8; 32], + pub sender: [u8; 32], + pub refund_address: [u8; 32], + pub slow_sequence: u64, + pub slow_emitter: [u8; 32], + pub max_fee: u128, + pub init_auction_fee: u128, + pub deadline: u32, + pub redeemer_message: RedeemerMessage, +} + +impl Readable for FastMarketOrder { + const SIZE: Option = None; + + fn read(reader: &mut R) -> std::io::Result + where + Self: Sized, + R: std::io::Read, + { + Ok(Self { + amount_in: Readable::read(reader)?, + min_amount_out: Readable::read(reader)?, + target_chain: Readable::read(reader)?, + destination_cctp_domain: Readable::read(reader)?, + redeemer: Readable::read(reader)?, + sender: Readable::read(reader)?, + refund_address: Readable::read(reader)?, + slow_sequence: Readable::read(reader)?, + slow_emitter: Readable::read(reader)?, + max_fee: Readable::read(reader)?, + init_auction_fee: Readable::read(reader)?, + deadline: Readable::read(reader)?, + redeemer_message: Readable::read(reader)?, + }) + } +} + +impl Writeable for FastMarketOrder { + fn written_size(&self) -> usize { + 16 + 16 + 2 + 4 + 32 + 32 + 32 + 8 + 32 + 16 + 16 + 4 + self.redeemer_message.written_size() + } + + fn write(&self, writer: &mut W) -> std::io::Result<()> + where + Self: Sized, + W: std::io::Write, + { + self.amount_in.write(writer)?; + self.min_amount_out.write(writer)?; + self.target_chain.write(writer)?; + self.destination_cctp_domain.write(writer)?; + self.redeemer.write(writer)?; + self.sender.write(writer)?; + self.refund_address.write(writer)?; + self.slow_sequence.write(writer)?; + self.slow_emitter.write(writer)?; + self.max_fee.write(writer)?; + self.init_auction_fee.write(writer)?; + self.deadline.write(writer)?; + self.redeemer_message.write(writer)?; + Ok(()) + } +} + +impl TypePrefixedPayload for FastMarketOrder { + const TYPE: Option = Some(13); +} + +#[cfg(test)] +mod test { + // use hex_literal::hex; + + // use super::*; + + // #[test] + // fn transfer_tokens_with_relay() { + // let msg = TransferTokensWithRelay { + // target_relayer_fee: U256::from(69u64), + // to_native_token_amount: U256::from(420u64), + // target_recipient_wallet: hex!( + // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" + // ), + // }; + + // let mut bytes = Vec::with_capacity(msg.payload_written_size()); + // msg.write_typed(&mut bytes).unwrap(); + // assert_eq!(bytes.len(), msg.payload_written_size()); + // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); + // assert_eq!(recovered, msg); + // } + + // #[test] + // fn invalid_message_type() { + // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let err = TransferTokensWithRelay::read_typed(&mut cursor) + // .err() + // .unwrap(); + // matches!(err.kind(), std::io::ErrorKind::InvalidData); + // } +} diff --git a/solana/modules/liquidity-layer-messages/src/fill.rs b/solana/modules/liquidity-layer-messages/src/fill.rs new file mode 100644 index 00000000..c4d54cfc --- /dev/null +++ b/solana/modules/liquidity-layer-messages/src/fill.rs @@ -0,0 +1,90 @@ +//! Fill + +use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; + +use super::RedeemerMessage; + +#[derive(Debug, Clone, PartialEq, Eq)] +pub struct Fill { + pub source_chain: u16, + pub order_sender: [u8; 32], + pub redeemer: [u8; 32], + pub redeemer_message: RedeemerMessage, +} + +impl Readable for Fill { + const SIZE: Option = None; + + fn read(reader: &mut R) -> std::io::Result + where + Self: Sized, + R: std::io::Read, + { + Ok(Self { + source_chain: Readable::read(reader)?, + order_sender: Readable::read(reader)?, + redeemer: Readable::read(reader)?, + redeemer_message: Readable::read(reader)?, + }) + } +} + +impl Writeable for Fill { + fn written_size(&self) -> usize { + 2 + 32 + 32 + self.redeemer_message.written_size() + } + + fn write(&self, writer: &mut W) -> std::io::Result<()> + where + Self: Sized, + W: std::io::Write, + { + self.source_chain.write(writer)?; + self.order_sender.write(writer)?; + self.redeemer.write(writer)?; + self.redeemer_message.write(writer)?; + Ok(()) + } +} + +impl TypePrefixedPayload for Fill { + const TYPE: Option = Some(11); +} + +#[cfg(test)] +mod test { + // use hex_literal::hex; + + // use super::*; + + // #[test] + // fn transfer_tokens_with_relay() { + // let msg = TransferTokensWithRelay { + // target_relayer_fee: U256::from(69u64), + // to_native_token_amount: U256::from(420u64), + // target_recipient_wallet: hex!( + // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" + // ), + // }; + + // let mut bytes = Vec::with_capacity(msg.payload_written_size()); + // msg.write_typed(&mut bytes).unwrap(); + // assert_eq!(bytes.len(), msg.payload_written_size()); + // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); + // assert_eq!(recovered, msg); + // } + + // #[test] + // fn invalid_message_type() { + // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let err = TransferTokensWithRelay::read_typed(&mut cursor) + // .err() + // .unwrap(); + // matches!(err.kind(), std::io::ErrorKind::InvalidData); + // } +} diff --git a/solana/modules/liquidity-layer-messages/src/lib.rs b/solana/modules/liquidity-layer-messages/src/lib.rs new file mode 100644 index 00000000..fc963d46 --- /dev/null +++ b/solana/modules/liquidity-layer-messages/src/lib.rs @@ -0,0 +1,14 @@ +mod fast_fill; +pub use fast_fill::*; + +mod fast_market_order; +pub use fast_market_order::*; + +mod fill; +pub use fill::*; + +mod slow_order_response; +pub use slow_order_response::*; + +mod types; +pub use types::*; diff --git a/solana/modules/liquidity-layer-messages/src/slow_order_response.rs b/solana/modules/liquidity-layer-messages/src/slow_order_response.rs new file mode 100644 index 00000000..e3672ab8 --- /dev/null +++ b/solana/modules/liquidity-layer-messages/src/slow_order_response.rs @@ -0,0 +1,79 @@ +//! Slow Order Response + +use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; + +#[derive(Debug, Clone, PartialEq, Eq)] +pub struct SlowOrderResponse { + pub base_fee: u128, +} + +impl Readable for SlowOrderResponse { + const SIZE: Option = Some(16); + + fn read(reader: &mut R) -> std::io::Result + where + Self: Sized, + R: std::io::Read, + { + Ok(Self { + base_fee: Readable::read(reader)?, + }) + } +} + +impl Writeable for SlowOrderResponse { + fn written_size(&self) -> usize { + ::SIZE.unwrap() + } + + fn write(&self, writer: &mut W) -> std::io::Result<()> + where + Self: Sized, + W: std::io::Write, + { + self.base_fee.write(writer)?; + Ok(()) + } +} + +impl TypePrefixedPayload for SlowOrderResponse { + const TYPE: Option = Some(14); +} + +#[cfg(test)] +mod test { + // use hex_literal::hex; + + // use super::*; + + // #[test] + // fn transfer_tokens_with_relay() { + // let msg = TransferTokensWithRelay { + // target_relayer_fee: U256::from(69u64), + // to_native_token_amount: U256::from(420u64), + // target_recipient_wallet: hex!( + // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" + // ), + // }; + + // let mut bytes = Vec::with_capacity(msg.payload_written_size()); + // msg.write_typed(&mut bytes).unwrap(); + // assert_eq!(bytes.len(), msg.payload_written_size()); + // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); + // assert_eq!(recovered, msg); + // } + + // #[test] + // fn invalid_message_type() { + // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + + // let mut cursor = std::io::Cursor::new(&mut bytes); + // let err = TransferTokensWithRelay::read_typed(&mut cursor) + // .err() + // .unwrap(); + // matches!(err.kind(), std::io::ErrorKind::InvalidData); + // } +} diff --git a/solana/modules/liquidity-layer-messages/src/types.rs b/solana/modules/liquidity-layer-messages/src/types.rs new file mode 100644 index 00000000..a7ce3ac7 --- /dev/null +++ b/solana/modules/liquidity-layer-messages/src/types.rs @@ -0,0 +1,42 @@ +use wormhole_io::{Readable, Writeable}; + +#[derive(Debug, Clone, PartialEq, Eq)] +pub struct RedeemerMessage(Vec); + +impl From for Vec { + fn from(v: RedeemerMessage) -> Vec { + v.0 + } +} + +impl Readable for RedeemerMessage { + const SIZE: Option = None; + + fn read(reader: &mut R) -> std::io::Result + where + Self: Sized, + R: std::io::Read, + { + let msg_len = u32::read(reader)?; + let mut out = Vec::with_capacity(msg_len as usize); + reader.read_to_end(&mut out)?; + Ok(Self(out)) + } +} + +impl Writeable for RedeemerMessage { + fn written_size(&self) -> usize { + 4 + self.0.len() + } + + fn write(&self, writer: &mut W) -> std::io::Result<()> + where + Self: Sized, + W: std::io::Write, + { + // usize -> u32 is infallible here. + (self.0.len() as u32).write(writer)?; + writer.write_all(&self.0)?; + Ok(()) + } +} diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index a59f4752..8bc59ded 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -23,6 +23,7 @@ integration-test = ["testnet"] [dependencies] matching-engine.workspace = true +liquidity-layer-messages.workspace = true ownable-tools.workspace = true shared-consts.workspace = true diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index b71ea844..6f55a243 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -5,8 +5,6 @@ pub mod constants; pub mod error; -pub mod messages; - mod processor; pub(crate) use processor::*; diff --git a/solana/programs/token-router/src/messages.rs b/solana/programs/token-router/src/messages.rs deleted file mode 100644 index d8e3cde3..00000000 --- a/solana/programs/token-router/src/messages.rs +++ /dev/null @@ -1,89 +0,0 @@ -//! Messages relevant to the Token Router across all networks. These messages are serialized and -//! then published via the Wormhole CCTP program. - -use ruint::aliases::U256; -use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; - -#[derive(Debug, Clone, PartialEq, Eq)] -pub struct TransferTokensWithRelay { - pub target_relayer_fee: U256, - pub to_native_token_amount: U256, - pub target_recipient_wallet: [u8; 32], -} - -impl Readable for TransferTokensWithRelay { - const SIZE: Option = Some(32 + 32 + 32); - - fn read(reader: &mut R) -> std::io::Result - where - Self: Sized, - R: std::io::Read, - { - Ok(Self { - target_relayer_fee: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, - to_native_token_amount: <[u8; 32]>::read(reader).map(U256::from_be_bytes)?, - target_recipient_wallet: Readable::read(reader)?, - }) - } -} - -impl Writeable for TransferTokensWithRelay { - fn written_size(&self) -> usize { - ::SIZE.unwrap() - } - - fn write(&self, writer: &mut W) -> std::io::Result<()> - where - Self: Sized, - W: std::io::Write, - { - self.target_relayer_fee.to_be_bytes::<32>().write(writer)?; - self.to_native_token_amount - .to_be_bytes::<32>() - .write(writer)?; - self.target_recipient_wallet.write(writer)?; - Ok(()) - } -} - -impl TypePrefixedPayload for TransferTokensWithRelay { - const TYPE: Option = Some(1); -} - -#[cfg(test)] -mod test { - use hex_literal::hex; - - use super::*; - - #[test] - fn transfer_tokens_with_relay() { - let msg = TransferTokensWithRelay { - target_relayer_fee: U256::from(69u64), - to_native_token_amount: U256::from(420u64), - target_recipient_wallet: hex!( - "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" - ), - }; - - let mut bytes = Vec::with_capacity(msg.payload_written_size()); - msg.write_typed(&mut bytes).unwrap(); - assert_eq!(bytes.len(), msg.payload_written_size()); - assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); - - let mut cursor = std::io::Cursor::new(&mut bytes); - let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); - assert_eq!(recovered, msg); - } - - #[test] - fn invalid_message_type() { - let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); - - let mut cursor = std::io::Cursor::new(&mut bytes); - let err = TransferTokensWithRelay::read_typed(&mut cursor) - .err() - .unwrap(); - matches!(err.kind(), std::io::ErrorKind::InvalidData); - } -} From ea0fa22794a3231cd7c6f939a894bbb0ad910c3f Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 08:23:11 -0600 Subject: [PATCH 019/126] solana: add common --- solana/Cargo.lock | 30 ++++--------------- solana/Cargo.toml | 8 ++--- .../Cargo.toml | 10 ++++++- .../src => common/src/admin}/cpi.rs | 0 .../src/lib.rs => common/src/admin/mod.rs} | 0 .../src/admin}/utils/assistant.rs | 2 +- .../src => common/src/admin}/utils/mod.rs | 1 - .../src => common/src/admin}/utils/ownable.rs | 2 +- .../src/admin}/utils/pending_owner.rs | 2 +- .../lib.rs => common/src/constants/mod.rs} | 0 .../src => common/src/constants}/usdc.rs | 0 solana/modules/common/src/lib.rs | 7 +++++ .../src => common/src/messages}/fast_fill.rs | 2 +- .../src/messages}/fast_market_order.rs | 4 +-- .../src => common/src/messages}/fill.rs | 4 +-- .../src/lib.rs => common/src/messages/mod.rs} | 0 .../src/messages}/slow_order_response.rs | 0 .../src => common/src/messages}/types.rs | 0 solana/modules/ownable-tools/Cargo.toml | 18 ----------- solana/modules/shared-consts/Cargo.toml | 18 ----------- solana/programs/matching-engine/Cargo.toml | 7 ++--- .../processor/admin/add_router_endpoint.rs | 2 +- .../src/processor/admin/initialize.rs | 2 +- .../ownership_transfer_request/cancel.rs | 9 +++--- .../ownership_transfer_request/confirm.rs | 6 ++-- .../ownership_transfer_request/submit.rs | 13 ++++---- .../processor/admin/update/fee_recipient.rs | 2 +- .../processor/admin/update/owner_assistant.rs | 2 +- .../matching-engine/src/state/custodian.rs | 6 ++-- solana/programs/token-router/Cargo.toml | 9 ++---- .../processor/admin/add_router_endpoint.rs | 2 +- .../src/processor/admin/initialize.rs | 2 +- .../ownership_transfer_request/cancel.rs | 9 +++--- .../ownership_transfer_request/confirm.rs | 6 ++-- .../ownership_transfer_request/submit.rs | 13 ++++---- .../src/processor/admin/set_pause.rs | 2 +- .../processor/admin/update/owner_assistant.rs | 2 +- .../token-router/src/state/custodian.rs | 6 ++-- 38 files changed, 82 insertions(+), 126 deletions(-) rename solana/modules/{liquidity-layer-messages => common}/Cargo.toml (69%) rename solana/modules/{ownable-tools/src => common/src/admin}/cpi.rs (100%) rename solana/modules/{ownable-tools/src/lib.rs => common/src/admin/mod.rs} (100%) rename solana/modules/{ownable-tools/src => common/src/admin}/utils/assistant.rs (95%) rename solana/modules/{ownable-tools/src => common/src/admin}/utils/mod.rs (67%) rename solana/modules/{ownable-tools/src => common/src/admin}/utils/ownable.rs (93%) rename solana/modules/{ownable-tools/src => common/src/admin}/utils/pending_owner.rs (97%) rename solana/modules/{shared-consts/src/lib.rs => common/src/constants/mod.rs} (100%) rename solana/modules/{shared-consts/src => common/src/constants}/usdc.rs (100%) create mode 100644 solana/modules/common/src/lib.rs rename solana/modules/{liquidity-layer-messages/src => common/src/messages}/fast_fill.rs (98%) rename solana/modules/{liquidity-layer-messages/src => common/src/messages}/fast_market_order.rs (98%) rename solana/modules/{liquidity-layer-messages/src => common/src/messages}/fill.rs (97%) rename solana/modules/{liquidity-layer-messages/src/lib.rs => common/src/messages/mod.rs} (100%) rename solana/modules/{liquidity-layer-messages/src => common/src/messages}/slow_order_response.rs (100%) rename solana/modules/{liquidity-layer-messages/src => common/src/messages}/types.rs (100%) delete mode 100644 solana/modules/ownable-tools/Cargo.toml delete mode 100644 solana/modules/shared-consts/Cargo.toml diff --git a/solana/Cargo.lock b/solana/Cargo.lock index e6afdd7d..f8524f19 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1169,11 +1169,14 @@ dependencies = [ ] [[package]] -name = "liquidity-layer-messages" +name = "liquidity-layer-common-solana" version = "0.0.0" dependencies = [ + "anchor-lang", + "cfg-if", "hex-literal", "ruint", + "solana-program", "wormhole-io", ] @@ -1203,12 +1206,10 @@ dependencies = [ "cfg-if", "hex", "hex-literal", - "ownable-tools", + "liquidity-layer-common-solana", "ruint", - "shared-consts", "solana-program", "wormhole-cctp-solana", - "wormhole-io", ] [[package]] @@ -1342,14 +1343,6 @@ version = "0.3.0" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "624a8340c38c1b80fd549087862da4ba43e08858af025b236e509b6649fc13d5" -[[package]] -name = "ownable-tools" -version = "0.0.0" -dependencies = [ - "anchor-lang", - "solana-program", -] - [[package]] name = "parking_lot" version = "0.12.1" @@ -1767,14 +1760,6 @@ dependencies = [ "keccak", ] -[[package]] -name = "shared-consts" -version = "0.0.0" -dependencies = [ - "anchor-lang", - "cfg-if", -] - [[package]] name = "signature" version = "1.6.4" @@ -2168,14 +2153,11 @@ dependencies = [ "cfg-if", "hex", "hex-literal", - "liquidity-layer-messages", + "liquidity-layer-common-solana", "matching-engine", - "ownable-tools", "ruint", - "shared-consts", "solana-program", "wormhole-cctp-solana", - "wormhole-io", ] [[package]] diff --git a/solana/Cargo.toml b/solana/Cargo.toml index b1af7758..4bb19789 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -13,6 +13,10 @@ license = "Apache-2.0" homepage = "https://wormhole.com" repository = "https://github.com/wormhole-foundation/example-liquidity-layer" +[workspace.dependencies.common] +package = "liquidity-layer-common-solana" +path = "modules/common" + [workspace.dependencies.matching-engine] path = "programs/matching-engine" @@ -33,10 +37,6 @@ hex-literal = "0.4.1" anyhow = "1.0" thiserror = "1.0" -liquidity-layer-messages = { path = "modules/liquidity-layer-messages" } -ownable-tools = { path = "modules/ownable-tools" } -shared-consts = { path = "modules/shared-consts" } - ### https://github.com/coral-xyz/anchor/issues/2755 ### This dependency must be added for each program. ahash = "=0.8.6" diff --git a/solana/modules/liquidity-layer-messages/Cargo.toml b/solana/modules/common/Cargo.toml similarity index 69% rename from solana/modules/liquidity-layer-messages/Cargo.toml rename to solana/modules/common/Cargo.toml index 09fe3b30..8b6375e3 100644 --- a/solana/modules/liquidity-layer-messages/Cargo.toml +++ b/solana/modules/common/Cargo.toml @@ -1,5 +1,5 @@ [package] -name = "liquidity-layer-messages" +name = "liquidity-layer-common-solana" edition.workspace = true version.workspace = true authors.workspace = true @@ -9,9 +9,17 @@ repository.workspace = true # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html +[features] +testnet = [] +mainnet = [] + [dependencies] wormhole-io.workspace = true +anchor-lang.workspace = true +solana-program.workspace = true +cfg-if.workspace = true + ruint.workspace = true [dev-dependencies] diff --git a/solana/modules/ownable-tools/src/cpi.rs b/solana/modules/common/src/admin/cpi.rs similarity index 100% rename from solana/modules/ownable-tools/src/cpi.rs rename to solana/modules/common/src/admin/cpi.rs diff --git a/solana/modules/ownable-tools/src/lib.rs b/solana/modules/common/src/admin/mod.rs similarity index 100% rename from solana/modules/ownable-tools/src/lib.rs rename to solana/modules/common/src/admin/mod.rs diff --git a/solana/modules/ownable-tools/src/utils/assistant.rs b/solana/modules/common/src/admin/utils/assistant.rs similarity index 95% rename from solana/modules/ownable-tools/src/utils/assistant.rs rename to solana/modules/common/src/admin/utils/assistant.rs index 2d98b8b8..a3dcb2ef 100644 --- a/solana/modules/ownable-tools/src/utils/assistant.rs +++ b/solana/modules/common/src/admin/utils/assistant.rs @@ -1,4 +1,4 @@ -use crate::OwnerAssistant; +use crate::admin::OwnerAssistant; use anchor_lang::prelude::*; pub fn only_owner_assistant(acct: &Account, owner_assistant: &Pubkey) -> bool diff --git a/solana/modules/ownable-tools/src/utils/mod.rs b/solana/modules/common/src/admin/utils/mod.rs similarity index 67% rename from solana/modules/ownable-tools/src/utils/mod.rs rename to solana/modules/common/src/admin/utils/mod.rs index 6799f7e6..09738c98 100644 --- a/solana/modules/ownable-tools/src/utils/mod.rs +++ b/solana/modules/common/src/admin/utils/mod.rs @@ -1,4 +1,3 @@ -#[cfg(feature = "assistant")] pub mod assistant; pub mod ownable; diff --git a/solana/modules/ownable-tools/src/utils/ownable.rs b/solana/modules/common/src/admin/utils/ownable.rs similarity index 93% rename from solana/modules/ownable-tools/src/utils/ownable.rs rename to solana/modules/common/src/admin/utils/ownable.rs index 856c70a7..d88ed64c 100644 --- a/solana/modules/ownable-tools/src/utils/ownable.rs +++ b/solana/modules/common/src/admin/utils/ownable.rs @@ -1,4 +1,4 @@ -use crate::Ownable; +use crate::admin::Ownable; use anchor_lang::prelude::*; pub fn only_owner(acct: &Account, owner: &Pubkey) -> bool diff --git a/solana/modules/ownable-tools/src/utils/pending_owner.rs b/solana/modules/common/src/admin/utils/pending_owner.rs similarity index 97% rename from solana/modules/ownable-tools/src/utils/pending_owner.rs rename to solana/modules/common/src/admin/utils/pending_owner.rs index de4638ab..db90a997 100644 --- a/solana/modules/ownable-tools/src/utils/pending_owner.rs +++ b/solana/modules/common/src/admin/utils/pending_owner.rs @@ -1,4 +1,4 @@ -use crate::PendingOwner; +use crate::admin::PendingOwner; use anchor_lang::prelude::*; pub fn only_pending_owner_unchecked(acct: &Account, pending_owner: &Pubkey) -> bool diff --git a/solana/modules/shared-consts/src/lib.rs b/solana/modules/common/src/constants/mod.rs similarity index 100% rename from solana/modules/shared-consts/src/lib.rs rename to solana/modules/common/src/constants/mod.rs diff --git a/solana/modules/shared-consts/src/usdc.rs b/solana/modules/common/src/constants/usdc.rs similarity index 100% rename from solana/modules/shared-consts/src/usdc.rs rename to solana/modules/common/src/constants/usdc.rs diff --git a/solana/modules/common/src/lib.rs b/solana/modules/common/src/lib.rs new file mode 100644 index 00000000..7c13cb48 --- /dev/null +++ b/solana/modules/common/src/lib.rs @@ -0,0 +1,7 @@ +pub use wormhole_io; + +pub mod admin; + +pub mod constants; + +pub mod messages; diff --git a/solana/modules/liquidity-layer-messages/src/fast_fill.rs b/solana/modules/common/src/messages/fast_fill.rs similarity index 98% rename from solana/modules/liquidity-layer-messages/src/fast_fill.rs rename to solana/modules/common/src/messages/fast_fill.rs index 89e11d91..cc3979da 100644 --- a/solana/modules/liquidity-layer-messages/src/fast_fill.rs +++ b/solana/modules/common/src/messages/fast_fill.rs @@ -1,6 +1,6 @@ //! Fast Fill -use crate::Fill; +use crate::messages::Fill; use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; #[derive(Debug, Clone, PartialEq, Eq)] diff --git a/solana/modules/liquidity-layer-messages/src/fast_market_order.rs b/solana/modules/common/src/messages/fast_market_order.rs similarity index 98% rename from solana/modules/liquidity-layer-messages/src/fast_market_order.rs rename to solana/modules/common/src/messages/fast_market_order.rs index 6919cab2..c1fb13f6 100644 --- a/solana/modules/liquidity-layer-messages/src/fast_market_order.rs +++ b/solana/modules/common/src/messages/fast_market_order.rs @@ -2,8 +2,6 @@ use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; -use crate::RedeemerMessage; - #[derive(Debug, Clone, PartialEq, Eq)] pub struct FastMarketOrder { pub amount_in: u128, @@ -18,7 +16,7 @@ pub struct FastMarketOrder { pub max_fee: u128, pub init_auction_fee: u128, pub deadline: u32, - pub redeemer_message: RedeemerMessage, + pub redeemer_message: super::RedeemerMessage, } impl Readable for FastMarketOrder { diff --git a/solana/modules/liquidity-layer-messages/src/fill.rs b/solana/modules/common/src/messages/fill.rs similarity index 97% rename from solana/modules/liquidity-layer-messages/src/fill.rs rename to solana/modules/common/src/messages/fill.rs index c4d54cfc..bcdf66c5 100644 --- a/solana/modules/liquidity-layer-messages/src/fill.rs +++ b/solana/modules/common/src/messages/fill.rs @@ -2,14 +2,12 @@ use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; -use super::RedeemerMessage; - #[derive(Debug, Clone, PartialEq, Eq)] pub struct Fill { pub source_chain: u16, pub order_sender: [u8; 32], pub redeemer: [u8; 32], - pub redeemer_message: RedeemerMessage, + pub redeemer_message: super::RedeemerMessage, } impl Readable for Fill { diff --git a/solana/modules/liquidity-layer-messages/src/lib.rs b/solana/modules/common/src/messages/mod.rs similarity index 100% rename from solana/modules/liquidity-layer-messages/src/lib.rs rename to solana/modules/common/src/messages/mod.rs diff --git a/solana/modules/liquidity-layer-messages/src/slow_order_response.rs b/solana/modules/common/src/messages/slow_order_response.rs similarity index 100% rename from solana/modules/liquidity-layer-messages/src/slow_order_response.rs rename to solana/modules/common/src/messages/slow_order_response.rs diff --git a/solana/modules/liquidity-layer-messages/src/types.rs b/solana/modules/common/src/messages/types.rs similarity index 100% rename from solana/modules/liquidity-layer-messages/src/types.rs rename to solana/modules/common/src/messages/types.rs diff --git a/solana/modules/ownable-tools/Cargo.toml b/solana/modules/ownable-tools/Cargo.toml deleted file mode 100644 index 75b968a0..00000000 --- a/solana/modules/ownable-tools/Cargo.toml +++ /dev/null @@ -1,18 +0,0 @@ -[package] -name = "ownable-tools" -edition.workspace = true -version.workspace = true -authors.workspace = true -license.workspace = true -homepage.workspace = true -repository.workspace = true - -# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html - -[features] -default = ["assistant"] -assistant = [] - -[dependencies] -anchor-lang.workspace = true -solana-program.workspace = true \ No newline at end of file diff --git a/solana/modules/shared-consts/Cargo.toml b/solana/modules/shared-consts/Cargo.toml deleted file mode 100644 index 9ad58cc5..00000000 --- a/solana/modules/shared-consts/Cargo.toml +++ /dev/null @@ -1,18 +0,0 @@ -[package] -name = "shared-consts" -edition.workspace = true -version.workspace = true -authors.workspace = true -license.workspace = true -homepage.workspace = true -repository.workspace = true - -# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html - -[features] -testnet = [] -mainnet = [] - -[dependencies] -anchor-lang.workspace = true -cfg-if.workspace = true \ No newline at end of file diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index cdb5d61f..ecfda710 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -17,15 +17,12 @@ no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["shared-consts/testnet", "wormhole-cctp-solana/testnet"] +testnet = ["common/testnet", "wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] -ownable-tools.workspace = true -shared-consts.workspace = true - +common.workspace = true wormhole-cctp-solana = { workspace = true, features = ["cpi"] } -wormhole-io.workspace = true anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true diff --git a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs index f2410e78..ec5169a8 100644 --- a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs @@ -3,7 +3,7 @@ use crate::{ state::{Custodian, RouterEndpoint}, }; use anchor_lang::prelude::*; -use ownable_tools::utils::assistant::only_authorized; +use common::admin::utils::assistant::only_authorized; #[derive(Accounts)] #[instruction(chain: u16)] diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 61f80596..bd7785db 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -47,7 +47,7 @@ pub struct Initialize<'info> { )] custody_token: Account<'info, token::TokenAccount>, - #[account(address = shared_consts::usdc::id())] + #[account(address = common::constants::usdc::id())] mint: Account<'info, token::Mint>, system_program: Program<'info, System>, diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs index 89e96e90..12ab7e25 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,5 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; +use common::admin::utils::ownable::only_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -11,7 +12,7 @@ pub struct CancelOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = ownable_tools::utils::ownable::only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, + constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -34,17 +35,17 @@ pub struct CancelOwnershipTransferRequest<'info> { pub fn cancel_ownership_transfer_request( ctx: Context, ) -> Result<()> { - ownable_tools::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); + common::admin::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); // Finally set the upgrade authority back to the current owner. #[cfg(not(feature = "integration-test"))] { - ownable_tools::cpi::set_upgrade_authority_checked( + common::admin::cpi::set_upgrade_authority_checked( CpiContext::new_with_signer( ctx.accounts .bpf_loader_upgradeable_program .to_account_info(), - ownable_tools::cpi::SetUpgradeAuthorityChecked { + common::admin::cpi::SetUpgradeAuthorityChecked { program_data: ctx.accounts.program_data.to_account_info(), current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.owner.to_account_info(), diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs index 0adf1485..00e534e4 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,6 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::pending_owner; +use common::admin::utils::pending_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -42,12 +42,12 @@ pub fn confirm_ownership_transfer_request( // Finally set the upgrade authority to the pending owner (the new owner). #[cfg(not(feature = "integration-test"))] { - ownable_tools::cpi::set_upgrade_authority_checked( + common::admin::cpi::set_upgrade_authority_checked( CpiContext::new_with_signer( ctx.accounts .bpf_loader_upgradeable_program .to_account_info(), - ownable_tools::cpi::SetUpgradeAuthorityChecked { + common::admin::cpi::SetUpgradeAuthorityChecked { program_data: ctx.accounts.program_data.to_account_info(), current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.pending_owner.to_account_info(), diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs index cc06e623..92f26c5f 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,6 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::{ownable, pending_owner}; +use common::admin::utils::ownable::only_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -12,7 +12,7 @@ pub struct SubmitOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = ownable::only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, + constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -44,18 +44,21 @@ pub struct SubmitOwnershipTransferRequest<'info> { pub fn submit_ownership_transfer_request( ctx: Context, ) -> Result<()> { - pending_owner::transfer_ownership(&mut ctx.accounts.custodian, &ctx.accounts.new_owner.key()); + common::admin::utils::pending_owner::transfer_ownership( + &mut ctx.accounts.custodian, + &ctx.accounts.new_owner.key(), + ); // Set the upgrade authority to the custodian for now. It will be set to the new owner once the // ownership transfer is confirmed. #[cfg(not(feature = "integration-test"))] { - ownable_tools::cpi::set_upgrade_authority_checked( + common::admin::cpi::set_upgrade_authority_checked( CpiContext::new_with_signer( ctx.accounts .bpf_loader_upgradeable_program .to_account_info(), - ownable_tools::cpi::SetUpgradeAuthorityChecked { + common::admin::cpi::SetUpgradeAuthorityChecked { program_data: ctx.accounts.program_data.to_account_info(), current_authority: ctx.accounts.owner.to_account_info(), new_authority: ctx.accounts.custodian.to_account_info(), diff --git a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs index b66863c9..d6a44b18 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs @@ -1,6 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::assistant::only_authorized; +use common::admin::utils::assistant::only_authorized; #[derive(Accounts)] pub struct UpdateFeeRecipient<'info> { diff --git a/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs index 7e780764..27b8d690 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs @@ -1,6 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::{assistant, ownable::only_owner}; +use common::admin::utils::{assistant, ownable::only_owner}; #[derive(Accounts)] pub struct UpdateOwnerAssistant<'info> { diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index e788f00c..ec2521dd 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -48,7 +48,7 @@ impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"custodian"; } -impl ownable_tools::Ownable for Custodian { +impl common::admin::Ownable for Custodian { fn owner(&self) -> &Pubkey { &self.owner } @@ -58,7 +58,7 @@ impl ownable_tools::Ownable for Custodian { } } -impl ownable_tools::PendingOwner for Custodian { +impl common::admin::PendingOwner for Custodian { fn pending_owner(&self) -> &Option { &self.pending_owner } @@ -68,7 +68,7 @@ impl ownable_tools::PendingOwner for Custodian { } } -impl ownable_tools::OwnerAssistant for Custodian { +impl common::admin::OwnerAssistant for Custodian { fn owner_assistant(&self) -> &Pubkey { &self.owner_assistant } diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index 8bc59ded..537ece6c 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -17,18 +17,13 @@ no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["shared-consts/testnet", "wormhole-cctp-solana/testnet"] +testnet = ["common/testnet", "wormhole-cctp-solana/testnet"] integration-test = ["testnet"] [dependencies] +common.workspace = true matching-engine.workspace = true - -liquidity-layer-messages.workspace = true -ownable-tools.workspace = true -shared-consts.workspace = true - wormhole-cctp-solana = { workspace = true, features = ["cpi"] } -wormhole-io.workspace = true anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs index 8e0e674a..6f0f15ee 100644 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs @@ -3,7 +3,7 @@ use crate::{ state::{Custodian, RouterEndpoint}, }; use anchor_lang::prelude::*; -use ownable_tools::utils::assistant::only_authorized; +use common::admin::utils::assistant::only_authorized; use wormhole_cctp_solana::{ cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, utils::ExternalAccount, diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index 4b0d76d7..01fd60a1 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -38,7 +38,7 @@ pub struct Initialize<'info> { )] custody_token: Account<'info, token::TokenAccount>, - #[account(address = shared_consts::usdc::id())] + #[account(address = common::constants::usdc::id())] mint: Account<'info, token::Mint>, system_program: Program<'info, System>, diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs index fe4896d8..40dca434 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,5 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; +use common::admin::utils::ownable::only_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -11,7 +12,7 @@ pub struct CancelOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = ownable_tools::utils::ownable::only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, + constraint = only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -34,17 +35,17 @@ pub struct CancelOwnershipTransferRequest<'info> { pub fn cancel_ownership_transfer_request( ctx: Context, ) -> Result<()> { - ownable_tools::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); + common::admin::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); // Finally set the upgrade authority back to the current owner. #[cfg(not(feature = "integration-test"))] { - ownable_tools::cpi::set_upgrade_authority_checked( + common::admin::cpi::set_upgrade_authority_checked( CpiContext::new_with_signer( ctx.accounts .bpf_loader_upgradeable_program .to_account_info(), - ownable_tools::cpi::SetUpgradeAuthorityChecked { + common::admin::cpi::SetUpgradeAuthorityChecked { program_data: ctx.accounts.program_data.to_account_info(), current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.owner.to_account_info(), diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs index bc4c5229..d8247b33 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,6 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::pending_owner; +use common::admin::utils::pending_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -42,12 +42,12 @@ pub fn confirm_ownership_transfer_request( // Finally set the upgrade authority to the pending owner (the new owner). #[cfg(not(feature = "integration-test"))] { - ownable_tools::cpi::set_upgrade_authority_checked( + common::admin::cpi::set_upgrade_authority_checked( CpiContext::new_with_signer( ctx.accounts .bpf_loader_upgradeable_program .to_account_info(), - ownable_tools::cpi::SetUpgradeAuthorityChecked { + common::admin::cpi::SetUpgradeAuthorityChecked { program_data: ctx.accounts.program_data.to_account_info(), current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.pending_owner.to_account_info(), diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs index 84e6dcfa..04f8c2ba 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,6 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::{ownable, pending_owner}; +use common::admin::utils::ownable::only_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -12,7 +12,7 @@ pub struct SubmitOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = ownable::only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, + constraint = only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -44,18 +44,21 @@ pub struct SubmitOwnershipTransferRequest<'info> { pub fn submit_ownership_transfer_request( ctx: Context, ) -> Result<()> { - pending_owner::transfer_ownership(&mut ctx.accounts.custodian, &ctx.accounts.new_owner.key()); + common::admin::utils::pending_owner::transfer_ownership( + &mut ctx.accounts.custodian, + &ctx.accounts.new_owner.key(), + ); // Set the upgrade authority to the custodian for now. It will be set to the new owner once the // ownership transfer is confirmed. #[cfg(not(feature = "integration-test"))] { - ownable_tools::cpi::set_upgrade_authority_checked( + common::admin::cpi::set_upgrade_authority_checked( CpiContext::new_with_signer( ctx.accounts .bpf_loader_upgradeable_program .to_account_info(), - ownable_tools::cpi::SetUpgradeAuthorityChecked { + common::admin::cpi::SetUpgradeAuthorityChecked { program_data: ctx.accounts.program_data.to_account_info(), current_authority: ctx.accounts.owner.to_account_info(), new_authority: ctx.accounts.custodian.to_account_info(), diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs index 6f99e0bc..331a3fd9 100644 --- a/solana/programs/token-router/src/processor/admin/set_pause.rs +++ b/solana/programs/token-router/src/processor/admin/set_pause.rs @@ -1,6 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::assistant::only_authorized; +use common::admin::utils::assistant::only_authorized; #[derive(Accounts)] pub struct SetPause<'info> { diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs index d0726ac0..94b50b82 100644 --- a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -1,6 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; -use ownable_tools::utils::{assistant, ownable::only_owner}; +use common::admin::utils::{assistant, ownable::only_owner}; #[derive(Accounts)] pub struct UpdateOwnerAssistant<'info> { diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs index 6d358612..d84073c7 100644 --- a/solana/programs/token-router/src/state/custodian.rs +++ b/solana/programs/token-router/src/state/custodian.rs @@ -25,7 +25,7 @@ impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"custodian"; } -impl ownable_tools::Ownable for Custodian { +impl common::admin::Ownable for Custodian { fn owner(&self) -> &Pubkey { &self.owner } @@ -35,7 +35,7 @@ impl ownable_tools::Ownable for Custodian { } } -impl ownable_tools::PendingOwner for Custodian { +impl common::admin::PendingOwner for Custodian { fn pending_owner(&self) -> &Option { &self.pending_owner } @@ -45,7 +45,7 @@ impl ownable_tools::PendingOwner for Custodian { } } -impl ownable_tools::OwnerAssistant for Custodian { +impl common::admin::OwnerAssistant for Custodian { fn owner_assistant(&self) -> &Pubkey { &self.owner_assistant } From 2193c3e6100733dbae62a493b59fbcc04d3c30ce Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 10:23:34 -0600 Subject: [PATCH 020/126] solana: add raw deser --- solana/Cargo.lock | 5 +- solana/Cargo.toml | 5 + solana/modules/common/Cargo.toml | 1 + solana/modules/common/src/messages/mod.rs | 2 + solana/modules/common/src/messages/raw/mod.rs | 354 ++++++++++++++++++ 5 files changed, 365 insertions(+), 2 deletions(-) create mode 100644 solana/modules/common/src/messages/raw/mod.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index f8524f19..afb73aa3 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1178,6 +1178,7 @@ dependencies = [ "ruint", "solana-program", "wormhole-io", + "wormhole-raw-vaas", ] [[package]] @@ -2452,9 +2453,9 @@ checksum = "4965f46f7a99debe3c2cf9337c6e3eb7068da348aecf074a3e35686937f25c65" [[package]] name = "wormhole-raw-vaas" -version = "0.1.1" +version = "0.1.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "70807fcb111008fb8db7c5818907940f5b0b3da80d2b42f9b2ce6d3e040a8f03" +checksum = "dbdd52bdb8835e72e364a86efaa454b56cda359ae31d196e8429c4566ce025ca" dependencies = [ "ruint", "ruint-macro", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 4bb19789..c94bfedc 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -24,6 +24,11 @@ path = "programs/matching-engine" version = "0.0.1-alpha.2" default-features = false +[workspace.dependencies.wormhole-raw-vaas] +version = "0.1.2" +features = ["on-chain"] +default-features = false + [workspace.dependencies] wormhole-io = "0.1.1" anchor-lang = "0.28.0" diff --git a/solana/modules/common/Cargo.toml b/solana/modules/common/Cargo.toml index 8b6375e3..e627fdf3 100644 --- a/solana/modules/common/Cargo.toml +++ b/solana/modules/common/Cargo.toml @@ -15,6 +15,7 @@ mainnet = [] [dependencies] wormhole-io.workspace = true +wormhole-raw-vaas.workspace = true anchor-lang.workspace = true solana-program.workspace = true diff --git a/solana/modules/common/src/messages/mod.rs b/solana/modules/common/src/messages/mod.rs index fc963d46..71cc5bf7 100644 --- a/solana/modules/common/src/messages/mod.rs +++ b/solana/modules/common/src/messages/mod.rs @@ -7,6 +7,8 @@ pub use fast_market_order::*; mod fill; pub use fill::*; +pub mod raw; + mod slow_order_response; pub use slow_order_response::*; diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs new file mode 100644 index 00000000..4fc5f2b2 --- /dev/null +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -0,0 +1,354 @@ +use wormhole_raw_vaas::{cctp::Deposit, Payload}; + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct LiquidityLayerPayload<'a> { + span: &'a [u8], + + message: LiquidityLayerMessage<'a>, +} + +impl<'a> AsRef<[u8]> for LiquidityLayerPayload<'a> { + fn as_ref(&self) -> &[u8] { + self.span + } +} + +impl<'a> TryFrom> for LiquidityLayerPayload<'a> { + type Error = &'static str; + + fn try_from(payload: Payload<'a>) -> Result { + Self::parse(payload.into()) + } +} + +impl<'a> LiquidityLayerPayload<'a> { + pub fn span(&self) -> &[u8] { + self.span + } + + pub fn message(&self) -> LiquidityLayerMessage<'a> { + self.message + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.is_empty() { + return Err("LiquidityLayerPayload span too short. Need at least 1 byte"); + } + + let message = LiquidityLayerMessage::parse(span)?; + + Ok(Self { span, message }) + } +} + +/// The non-type-flag contents +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub enum LiquidityLayerMessage<'a> { + Deposit(Deposit<'a>), + Fill(Fill<'a>), + FastFill(FastFill<'a>), + FastMarketOrder(FastMarketOrder<'a>), + SlowOrderResponse(SlowOrderResponse<'a>), +} + +impl<'a> TryFrom> for LiquidityLayerMessage<'a> { + type Error = &'static str; + + fn try_from(payload: Payload<'a>) -> Result { + Self::parse(payload.into()) + } +} + +impl AsRef<[u8]> for LiquidityLayerMessage<'_> { + fn as_ref(&self) -> &[u8] { + match self { + Self::Deposit(inner) => inner.as_ref(), + Self::Fill(inner) => inner.as_ref(), + Self::FastFill(inner) => inner.as_ref(), + Self::FastMarketOrder(inner) => inner.as_ref(), + Self::SlowOrderResponse(inner) => inner.as_ref(), + } + } +} + +impl<'a> LiquidityLayerMessage<'a> { + pub fn span(&self) -> &[u8] { + self.as_ref() + } + + pub fn deposit(&self) -> Option<&Deposit> { + match self { + Self::Deposit(inner) => Some(inner), + _ => None, + } + } + + pub fn to_deposit_unchecked(self) -> Deposit<'a> { + match self { + Self::Deposit(inner) => inner, + _ => panic!("LiquidityLayerMessage is not Deposit"), + } + } + + pub fn fill(&self) -> Option<&Fill> { + match self { + Self::Fill(inner) => Some(inner), + _ => None, + } + } + + pub fn to_fill_unchecked(self) -> Fill<'a> { + match self { + Self::Fill(inner) => inner, + _ => panic!("LiquidityLayerMessage is not Fill"), + } + } + + pub fn fast_fill(&self) -> Option<&FastFill> { + match self { + Self::FastFill(inner) => Some(inner), + _ => None, + } + } + + pub fn to_fast_fill_unchecked(self) -> FastFill<'a> { + match self { + Self::FastFill(inner) => inner, + _ => panic!("LiquidityLayerMessage is not FastFill"), + } + } + + pub fn fast_market_order(&self) -> Option<&FastMarketOrder> { + match self { + Self::FastMarketOrder(inner) => Some(inner), + _ => None, + } + } + + pub fn to_fast_market_order_unchecked(self) -> FastMarketOrder<'a> { + match self { + Self::FastMarketOrder(inner) => inner, + _ => panic!("LiquidityLayerMessage is not FastMarketOrder"), + } + } + + pub fn slow_order_response(&self) -> Option<&SlowOrderResponse> { + match self { + Self::SlowOrderResponse(inner) => Some(inner), + _ => None, + } + } + + pub fn to_slow_order_response_unchecked(self) -> SlowOrderResponse<'a> { + match self { + Self::SlowOrderResponse(inner) => inner, + _ => panic!("LiquidityLayerMessage is not SlowOrderResponse"), + } + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.is_empty() { + return Err("LiquidityLayerMessage span too short. Need at least 1 byte"); + } + + match span[0] { + 1 => Ok(Self::Deposit(Deposit::parse(&span[1..])?)), + 11 => Ok(Self::Fill(Fill::parse(&span[1..])?)), + _ => Err("Unknown LiquidityLayerMessage type"), + } + } +} + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct Fill<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for Fill<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> Fill<'a> { + pub fn source_chain(&self) -> u16 { + u16::from_be_bytes(self.0[..2].try_into().unwrap()) + } + + pub fn order_sender(&self) -> [u8; 32] { + self.0[2..34].try_into().unwrap() + } + + pub fn redeemer(&self) -> [u8; 32] { + self.0[34..66].try_into().unwrap() + } + + pub fn redeemer_message_len(&self) -> u32 { + u32::from_be_bytes(self.0[66..70].try_into().unwrap()) + } + + pub fn redeemer_message(&self) -> &[u8] { + &self.0[70..] + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() < 70 { + return Err("Fill span too short. Need at least 70 bytes"); + } + + let fill = Self(span); + + // Check payload length vs actual payload. + if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { + return Err("Fill payload length mismatch"); + } + + Ok(fill) + } +} + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct FastFill<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for FastFill<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> FastFill<'a> { + pub fn fill(&'a self) -> Fill<'a> { + Fill::parse(&self.0[..70 + usize::try_from(self.redeemer_message_len()).unwrap()]).unwrap() + } + + pub fn amount(&self) -> u128 { + let len = usize::try_from(self.redeemer_message_len()).unwrap(); + u128::from_be_bytes(self.0[70 + len..86 + len].try_into().unwrap()) + } + + // TODO: remove this when encoding changes. + fn redeemer_message_len(&self) -> u32 { + u32::from_be_bytes(self.0[66..70].try_into().unwrap()) + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() < 86 { + return Err("FastFill span too short. Need at least 86 bytes"); + } + + let fast_fill = Self(span); + + // Check payload length vs actual payload. + let fill = fast_fill.fill(); + if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { + return Err("Fill payload length mismatch"); + } + + Ok(fast_fill) + } +} + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct FastMarketOrder<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for FastMarketOrder<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> FastMarketOrder<'a> { + pub fn amount_in(&self) -> u128 { + u128::from_be_bytes(self.0[..16].try_into().unwrap()) + } + + pub fn min_amount_out(&self) -> u128 { + u128::from_be_bytes(self.0[16..32].try_into().unwrap()) + } + + pub fn target_chain(&self) -> u16 { + u16::from_be_bytes(self.0[32..34].try_into().unwrap()) + } + + pub fn destination_cctp_domain(&self) -> u32 { + u32::from_be_bytes(self.0[34..38].try_into().unwrap()) + } + + pub fn redeemer(&self) -> [u8; 32] { + self.0[38..70].try_into().unwrap() + } + + pub fn sender(&self) -> [u8; 32] { + self.0[70..102].try_into().unwrap() + } + + pub fn refund_address(&self) -> [u8; 32] { + self.0[102..134].try_into().unwrap() + } + + pub fn slow_sequence(&self) -> u64 { + u64::from_be_bytes(self.0[134..142].try_into().unwrap()) + } + + pub fn slow_emitter(&self) -> [u8; 32] { + self.0[142..174].try_into().unwrap() + } + + pub fn max_fee(&self) -> u128 { + u128::from_be_bytes(self.0[174..190].try_into().unwrap()) + } + + pub fn init_auction_fee(&self) -> u128 { + u128::from_be_bytes(self.0[190..206].try_into().unwrap()) + } + + pub fn deadline(&self) -> u32 { + u32::from_be_bytes(self.0[206..210].try_into().unwrap()) + } + + pub fn redeemer_message_len(&self) -> u32 { + u32::from_be_bytes(self.0[210..214].try_into().unwrap()) + } + + pub fn redeemer_message(&self) -> &[u8] { + &self.0[214..] + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() < 214 { + return Err("FastMarketOrder span too short. Need at least 214 bytes"); + } + + let fast_market_order = Self(span); + + // Check payload length vs actual payload. + if fast_market_order.redeemer_message().len() + != fast_market_order.redeemer_message_len().try_into().unwrap() + { + return Err("FastMarketOrder payload length mismatch"); + } + + Ok(fast_market_order) + } +} + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct SlowOrderResponse<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for SlowOrderResponse<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> SlowOrderResponse<'a> { + pub fn base_fee(&self) -> u128 { + u128::from_be_bytes(self.0[..16].try_into().unwrap()) + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() != 16 { + return Err("SlowOrderResponse span too short. Need exactly 16 bytes"); + } + + Ok(Self(span)) + } +} From fb4671c1ae57ddcf2a30bd1a0b1cf8d25a02e1bf Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 10:29:22 -0600 Subject: [PATCH 021/126] solana: fix raw ll message; fix clippy --- solana/modules/common/src/admin/cpi.rs | 2 ++ solana/modules/common/src/messages/raw/mod.rs | 5 +++++ solana/programs/matching-engine/src/processor/mod.rs | 2 +- solana/programs/token-router/src/processor/mod.rs | 2 +- 4 files changed, 9 insertions(+), 2 deletions(-) diff --git a/solana/modules/common/src/admin/cpi.rs b/solana/modules/common/src/admin/cpi.rs index 30f3b56c..f88c0f22 100644 --- a/solana/modules/common/src/admin/cpi.rs +++ b/solana/modules/common/src/admin/cpi.rs @@ -1,3 +1,5 @@ +#![allow(clippy::result_large_err)] + use anchor_lang::prelude::*; use solana_program::bpf_loader_upgradeable; diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index 4fc5f2b2..c4b1021d 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -154,6 +154,11 @@ impl<'a> LiquidityLayerMessage<'a> { match span[0] { 1 => Ok(Self::Deposit(Deposit::parse(&span[1..])?)), 11 => Ok(Self::Fill(Fill::parse(&span[1..])?)), + 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), + 13 => Ok(Self::FastMarketOrder(FastMarketOrder::parse(&span[1..])?)), + 14 => Ok(Self::SlowOrderResponse(SlowOrderResponse::parse( + &span[1..], + )?)), _ => Err("Unknown LiquidityLayerMessage type"), } } diff --git a/solana/programs/matching-engine/src/processor/mod.rs b/solana/programs/matching-engine/src/processor/mod.rs index 34989d94..36e32332 100644 --- a/solana/programs/matching-engine/src/processor/mod.rs +++ b/solana/programs/matching-engine/src/processor/mod.rs @@ -1,2 +1,2 @@ mod admin; -pub use admin::*; \ No newline at end of file +pub use admin::*; diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs index 34989d94..36e32332 100644 --- a/solana/programs/token-router/src/processor/mod.rs +++ b/solana/programs/token-router/src/processor/mod.rs @@ -1,2 +1,2 @@ mod admin; -pub use admin::*; \ No newline at end of file +pub use admin::*; From 29e3a22b970e6849a741dd28c8b22c02eb4bc432 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 10 Jan 2024 11:26:41 -0600 Subject: [PATCH 022/126] solana: add place_initial_offer instruction --- solana/programs/matching-engine/src/lib.rs | 4 + .../src/processor/auction/mod.rs | 2 + .../processor/auction/place_initial_offer.rs | 32 ++++ .../matching-engine/src/processor/mod.rs | 3 + solana/ts/src/matching_engine/index.ts | 12 ++ solana/ts/tests/02__matchingEngine.ts | 53 ++++++- solana/ts/tests/helpers/consts.ts | 2 +- .../ts/tests/helpers/matching_engine_utils.ts | 142 ++++++++++++++++++ 8 files changed, 247 insertions(+), 3 deletions(-) create mode 100644 solana/ts/tests/helpers/matching_engine_utils.ts diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 5f2e07be..400fbd29 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -66,4 +66,8 @@ pub mod matching_engine { pub fn update_fee_recipient(ctx: Context) -> Result<()> { processor::update_fee_recipient(ctx) } + + pub fn place_initial_offer(ctx: Context) -> Result<()> { + processor::place_initial_offer(ctx) + } } diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index e69de29b..dae2c7fd 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -0,0 +1,2 @@ +mod place_initial_offer; +pub use place_initial_offer::*; \ No newline at end of file diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index e69de29b..668057ec 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -0,0 +1,32 @@ +use wormhole_cctp_solana::wormhole::core_bridge_program; +use anchor_lang::prelude::*; + +use crate::state::Custodian; + +#[derive(Accounts)] +pub struct PlaceInitialOffer<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + vaa: AccountInfo<'info>, + + system_program: Program<'info, System>, +} + +pub fn place_initial_offer(ctx: Context) -> Result<()> { + let vaa = core_bridge_program::VaaAccount::load(&ctx.accounts.vaa)?; + + Ok(()) +} \ No newline at end of file diff --git a/solana/programs/matching-engine/src/processor/mod.rs b/solana/programs/matching-engine/src/processor/mod.rs index 36e32332..6e373a13 100644 --- a/solana/programs/matching-engine/src/processor/mod.rs +++ b/solana/programs/matching-engine/src/processor/mod.rs @@ -1,2 +1,5 @@ mod admin; pub use admin::*; + +mod auction; +pub use auction::*; diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index a0753f94..904fbbf4 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -204,6 +204,18 @@ export class MatchingEngineProgram { }) .instruction(); } + + async placeInitialOfferIx(accounts: { payer: PublicKey; vaa: PublicKey }) { + const { payer, vaa } = accounts; + return this.program.methods + .placeInitialOffer() + .accounts({ + payer, + custodian: this.custodianAddress(), + vaa, + }) + .instruction(); + } } export function testnet(): ProgramId { diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index 9799d215..10345253 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -1,4 +1,4 @@ -import { CHAINS, ChainId } from "@certusone/wormhole-sdk"; +import { CHAINS } from "@certusone/wormhole-sdk"; import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; @@ -8,7 +8,16 @@ import { RouterEndpoint, MatchingEngineProgram, } from "../src/matching_engine"; -import { LOCALHOST, PAYER_KEYPAIR, expectIxErr, expectIxOk, USDC_MINT_ADDRESS } from "./helpers"; +import { + LOCALHOST, + PAYER_KEYPAIR, + expectIxErr, + expectIxOk, + USDC_MINT_ADDRESS, + MOCK_GUARDIANS, +} from "./helpers"; +import { FastMarketOrder, postFastTransferVaa } from "./helpers/matching_engine_utils"; +import { ethers } from "ethers"; chaiUse(chaiAsPromised); @@ -586,4 +595,44 @@ describe("Matching Engine", function () { }); }); }); + + describe("Business Logic", function () { + describe("Place Initial Offer", function () { + let wormholeSequence = 0n; + + const baseFastOrder: FastMarketOrder = { + amountIn: 1000000000000000000n, + minAmountOut: 1000000000000000000n, + targetChain: 1, + targetDomain: 5, + redeemer: Buffer.from("deadbeef", "hex"), + sender: Buffer.from("deadbeef", "hex"), + refundAddress: Buffer.from("deadbeef", "hex"), + slowSequence: 0n, + slowEmitter: Buffer.from("deadbeef", "hex"), + maxFee: 10000n, + initAuctionFee: 100n, + deadline: 0, + redeemerMessage: Buffer.from("All your base are belong to us."), + }; + + it("Place Initial Offer", async function () { + const vaa = await postFastTransferVaa( + connection, + payer, + MOCK_GUARDIANS, + wormholeSequence++, + baseFastOrder, + "0x" + Buffer.from(routerEndpointAddress).toString("hex") + ); + + const placeInitialOfferIx = engine.placeInitialOfferIx({ + payer: payer.publicKey, + vaa, + }); + + await expectIxOk(connection, [await placeInitialOfferIx], [payer]); + }); + }); + }); }); diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts index 788c82c7..e764e733 100644 --- a/solana/ts/tests/helpers/consts.ts +++ b/solana/ts/tests/helpers/consts.ts @@ -4,7 +4,7 @@ import { MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; export const SWAP_RATE_PRECISION = 10 ** 8; -export const WORMHOLE_CONTRACTS = CONTRACTS.MAINNET; +export const WORMHOLE_CONTRACTS = CONTRACTS.TESTNET; export const CORE_BRIDGE_PID = new PublicKey(WORMHOLE_CONTRACTS.solana.core); export const TOKEN_ROUTER_PID = new PublicKey("TokenRouter11111111111111111111111111111111"); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts new file mode 100644 index 00000000..4ff73b66 --- /dev/null +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -0,0 +1,142 @@ +import { coalesceChainId, parseVaa, tryNativeToHexString } from "@certusone/wormhole-sdk"; +import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; +import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; +import { Connection, Keypair, PublicKey } from "@solana/web3.js"; +import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; +import { WORMHOLE_CONTRACTS } from "../../tests/helpers"; +import { ethers } from "ethers"; + +export async function postVaa( + connection: Connection, + payer: Keypair, + vaaBuf: Buffer, + coreBridgeAddress?: PublicKey +) { + await postVaaSolana( + connection, + new wormSolana.NodeWallet(payer).signTransaction, + coreBridgeAddress ?? WORMHOLE_CONTRACTS.solana.core, + payer.publicKey, + vaaBuf + ); +} + +export interface FastMarketOrder { + amountIn: bigint; + minAmountOut: bigint; + targetChain: number; + targetDomain: number; + redeemer: Buffer; + sender: Buffer; + refundAddress: Buffer; + slowSequence: bigint; + slowEmitter: Buffer; + maxFee: bigint; + initAuctionFee: bigint; + deadline: number; + redeemerMessage: Buffer; +} + +export function encodeFastMarketOrder(order: FastMarketOrder): Buffer { + const buf = Buffer.alloc(214); + + let offset = 0; + + const amountIn = ethers.utils.arrayify(ethers.BigNumber.from(order.amountIn).toHexString()); + buf.set(amountIn, (offset += 16) - amountIn.length); + + const minAmountOut = ethers.utils.arrayify( + ethers.BigNumber.from(order.minAmountOut).toHexString() + ); + buf.set(minAmountOut, (offset += 16) - minAmountOut.length); + + offset = buf.writeUInt16BE(order.targetChain, offset); + offset = buf.writeUInt32BE(order.targetDomain, offset); + + buf.set(order.redeemer, offset); + offset += 32; + + buf.set(order.sender, offset); + offset += 32; + + buf.set(order.refundAddress, offset); + offset += 32; + + offset = buf.writeBigUInt64BE(order.slowSequence, offset); + + buf.set(order.slowEmitter, offset); + offset += 32; + + const maxFee = ethers.utils.arrayify(ethers.BigNumber.from(order.maxFee).toHexString()); + buf.set(maxFee, (offset += 16) - maxFee.length); + + const initAuctionfee = ethers.utils.arrayify( + ethers.BigNumber.from(order.initAuctionFee).toHexString() + ); + buf.set(initAuctionfee, (offset += 16) - initAuctionfee.length); + + offset = buf.writeUInt32BE(order.deadline, offset); + offset = buf.writeUInt32BE(order.redeemerMessage.length, offset); + + return Buffer.concat([Buffer.alloc(1, 13), buf, order.redeemerMessage]); +} + +function takePayloadId(buf: Buffer, expectedId: number): Buffer { + if (buf.readUInt8(0) != expectedId) { + throw new Error("Invalid payload ID"); + } + + return buf.subarray(1); +} + +export function decodeFastMarketOrder(buf: Buffer): FastMarketOrder { + let order = {} as FastMarketOrder; + + buf = takePayloadId(buf, 13); + + order.amountIn = BigInt(ethers.BigNumber.from(buf.subarray(0, 16)).toString()); + order.minAmountOut = BigInt(ethers.BigNumber.from(buf.subarray(16, 32)).toString()); + order.targetChain = buf.readUInt16BE(32); + order.targetDomain = buf.readUInt32BE(34); + order.redeemer = buf.subarray(38, 70); + order.sender = buf.subarray(70, 102); + order.refundAddress = buf.subarray(102, 134); + order.slowSequence = buf.readBigUint64BE(134); + order.slowEmitter = buf.subarray(142, 174); + order.maxFee = BigInt(ethers.BigNumber.from(buf.subarray(174, 190)).toString()); + order.initAuctionFee = BigInt(ethers.BigNumber.from(buf.subarray(190, 206)).toString()); + order.deadline = buf.readUInt32BE(206); + + const redeemerMsgLen = buf.readUInt32BE(210); + order.redeemerMessage = buf.subarray(214, 214 + redeemerMsgLen); + + return order; +} + +export async function postFastTransferVaa( + connection: Connection, + payer: Keypair, + guardians: MockGuardians, + sequence: bigint, + fastMessage: FastMarketOrder, + emitterAddress: string +) { + const chainName = "ethereum"; + const foreignEmitter = new MockEmitter( + tryNativeToHexString(emitterAddress, chainName), + coalesceChainId(chainName), + Number(sequence) + ); + + const published = foreignEmitter.publishMessage( + 0, // nonce, + encodeFastMarketOrder(fastMessage), + 200, // consistencyLevel + 12345678 // timestamp + ); + const vaaBuf = guardians.addSignatures(published, [0]); + + await postVaa(connection, payer, vaaBuf); + + return derivePostedVaaKey(WORMHOLE_CONTRACTS.solana.core, parseVaa(vaaBuf).hash); +} From 83b52234dbf7c2c65e95c4e62efc2fb30eece64d Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 12:27:31 -0600 Subject: [PATCH 023/126] solana: fix raw deser; add place_market_order --- solana/Cargo.lock | 4 +- solana/Cargo.toml | 2 +- solana/modules/common/src/constants/mod.rs | 2 + .../common/src/messages/fast_market_order.rs | 4 +- solana/modules/common/src/messages/fill.rs | 4 +- solana/modules/common/src/messages/mod.rs | 3 - .../common/src/messages/raw/deposit.rs | 251 +++++++++++++++++ solana/modules/common/src/messages/raw/mod.rs | 155 +---------- solana/modules/common/src/messages/types.rs | 42 --- solana/programs/token-router/src/error.rs | 169 ++---------- solana/programs/token-router/src/lib.rs | 9 + .../token-router/src/processor/mod.rs | 3 + .../src/processor/place_market_order/cctp.rs | 258 ++++++++++++++++++ .../src/processor/place_market_order/mod.rs | 2 + 14 files changed, 566 insertions(+), 342 deletions(-) create mode 100644 solana/modules/common/src/messages/raw/deposit.rs delete mode 100644 solana/modules/common/src/messages/types.rs create mode 100644 solana/programs/token-router/src/processor/place_market_order/cctp.rs create mode 100644 solana/programs/token-router/src/processor/place_market_order/mod.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index afb73aa3..55a358fb 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2447,9 +2447,9 @@ dependencies = [ [[package]] name = "wormhole-io" -version = "0.1.1" +version = "0.1.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "4965f46f7a99debe3c2cf9337c6e3eb7068da348aecf074a3e35686937f25c65" +checksum = "a08bfc5177a40f089539b640b29b7d4520aa3ce465733d10a68eb4e389f77162" [[package]] name = "wormhole-raw-vaas" diff --git a/solana/Cargo.toml b/solana/Cargo.toml index c94bfedc..9476d92b 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -30,7 +30,7 @@ features = ["on-chain"] default-features = false [workspace.dependencies] -wormhole-io = "0.1.1" +wormhole-io = "0.1.2" anchor-lang = "0.28.0" anchor-spl = "0.28.0" solana-program = "1.16.16" diff --git a/solana/modules/common/src/constants/mod.rs b/solana/modules/common/src/constants/mod.rs index 03c2adeb..39f06a71 100644 --- a/solana/modules/common/src/constants/mod.rs +++ b/solana/modules/common/src/constants/mod.rs @@ -1 +1,3 @@ pub mod usdc; + +pub const WORMHOLE_MESSAGE_NONCE: u32 = 0; diff --git a/solana/modules/common/src/messages/fast_market_order.rs b/solana/modules/common/src/messages/fast_market_order.rs index c1fb13f6..186fb2d3 100644 --- a/solana/modules/common/src/messages/fast_market_order.rs +++ b/solana/modules/common/src/messages/fast_market_order.rs @@ -1,6 +1,6 @@ //! Fast Market Order -use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; +use wormhole_io::{Readable, TypePrefixedPayload, Writeable, WriteableBytes}; #[derive(Debug, Clone, PartialEq, Eq)] pub struct FastMarketOrder { @@ -16,7 +16,7 @@ pub struct FastMarketOrder { pub max_fee: u128, pub init_auction_fee: u128, pub deadline: u32, - pub redeemer_message: super::RedeemerMessage, + pub redeemer_message: WriteableBytes, } impl Readable for FastMarketOrder { diff --git a/solana/modules/common/src/messages/fill.rs b/solana/modules/common/src/messages/fill.rs index bcdf66c5..1cbbfd93 100644 --- a/solana/modules/common/src/messages/fill.rs +++ b/solana/modules/common/src/messages/fill.rs @@ -1,13 +1,13 @@ //! Fill -use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; +use wormhole_io::{Readable, TypePrefixedPayload, Writeable, WriteableBytes}; #[derive(Debug, Clone, PartialEq, Eq)] pub struct Fill { pub source_chain: u16, pub order_sender: [u8; 32], pub redeemer: [u8; 32], - pub redeemer_message: super::RedeemerMessage, + pub redeemer_message: WriteableBytes, } impl Readable for Fill { diff --git a/solana/modules/common/src/messages/mod.rs b/solana/modules/common/src/messages/mod.rs index 71cc5bf7..4aec7c8a 100644 --- a/solana/modules/common/src/messages/mod.rs +++ b/solana/modules/common/src/messages/mod.rs @@ -11,6 +11,3 @@ pub mod raw; mod slow_order_response; pub use slow_order_response::*; - -mod types; -pub use types::*; diff --git a/solana/modules/common/src/messages/raw/deposit.rs b/solana/modules/common/src/messages/raw/deposit.rs new file mode 100644 index 00000000..1f2e5343 --- /dev/null +++ b/solana/modules/common/src/messages/raw/deposit.rs @@ -0,0 +1,251 @@ +use wormhole_raw_vaas::{cctp::Deposit, Payload}; + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct LiquidityLayerDeposit<'a> { + span: &'a [u8], + + deposit: Deposit<'a>, + message: DepositMessage<'a>, +} + +impl<'a> AsRef<[u8]> for LiquidityLayerDeposit<'a> { + fn as_ref(&self) -> &[u8] { + self.span + } +} + +impl<'a> TryFrom> for LiquidityLayerDeposit<'a> { + type Error = &'static str; + + fn try_from(payload: Payload<'a>) -> Result { + Self::parse(payload.into()) + } +} + +impl<'a> LiquidityLayerDeposit<'a> { + pub fn span(&self) -> &[u8] { + self.span + } + + pub fn deposit(&self) -> Deposit<'a> { + self.deposit + } + + pub fn message(&self) -> DepositMessage<'a> { + self.message + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.is_empty() { + return Err("LiquidityLayerDeposit span too short. Need at least 1 byte"); + } + + let deposit: Deposit = Deposit::parse(span)?; + let message = DepositMessage::parse(span)?; + + Ok(Self { + span, + deposit, + message, + }) + } +} + +/// The non-type-flag contents +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub enum DepositMessage<'a> { + Fill(Fill<'a>), + FastFill(FastFill<'a>), + SlowOrderResponse(SlowOrderResponse<'a>), +} + +impl<'a> TryFrom> for DepositMessage<'a> { + type Error = &'static str; + + fn try_from(payload: Payload<'a>) -> Result { + Self::parse(payload.into()) + } +} + +impl<'a> AsRef<[u8]> for DepositMessage<'a> { + fn as_ref(&self) -> &[u8] { + match self { + Self::Fill(inner) => inner.as_ref(), + Self::FastFill(inner) => inner.as_ref(), + Self::SlowOrderResponse(inner) => inner.as_ref(), + } + } +} + +impl<'a> DepositMessage<'a> { + pub fn span(&self) -> &[u8] { + self.as_ref() + } + + pub fn fill(&self) -> Option<&Fill> { + match self { + Self::Fill(inner) => Some(inner), + _ => None, + } + } + + pub fn to_fill_unchecked(self) -> Fill<'a> { + match self { + Self::Fill(inner) => inner, + _ => panic!("DepositMessage is not Fill"), + } + } + + pub fn fast_fill(&self) -> Option<&FastFill> { + match self { + Self::FastFill(inner) => Some(inner), + _ => None, + } + } + + pub fn to_fast_fill_unchecked(self) -> FastFill<'a> { + match self { + Self::FastFill(inner) => inner, + _ => panic!("DepositMessage is not FastFill"), + } + } + + pub fn slow_order_response(&self) -> Option<&SlowOrderResponse> { + match self { + Self::SlowOrderResponse(inner) => Some(inner), + _ => None, + } + } + + pub fn to_slow_order_response_unchecked(self) -> SlowOrderResponse<'a> { + match self { + Self::SlowOrderResponse(inner) => inner, + _ => panic!("DepositMessage is not SlowOrderResponse"), + } + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.is_empty() { + return Err("DepositMessage span too short. Need at least 1 byte"); + } + + match span[0] { + 11 => Ok(Self::Fill(Fill::parse(&span[1..])?)), + 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), + 14 => Ok(Self::SlowOrderResponse(SlowOrderResponse::parse( + &span[1..], + )?)), + _ => Err("Unknown DepositMessage type"), + } + } +} + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct Fill<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for Fill<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> Fill<'a> { + pub fn source_chain(&self) -> u16 { + u16::from_be_bytes(self.0[..2].try_into().unwrap()) + } + + pub fn order_sender(&self) -> [u8; 32] { + self.0[2..34].try_into().unwrap() + } + + pub fn redeemer(&self) -> [u8; 32] { + self.0[34..66].try_into().unwrap() + } + + pub fn redeemer_message_len(&self) -> u32 { + u32::from_be_bytes(self.0[66..70].try_into().unwrap()) + } + + pub fn redeemer_message(&self) -> &[u8] { + &self.0[70..] + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() < 70 { + return Err("Fill span too short. Need at least 70 bytes"); + } + + let fill = Self(span); + + // Check payload length vs actual payload. + if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { + return Err("Fill payload length mismatch"); + } + + Ok(fill) + } +} + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct FastFill<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for FastFill<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> FastFill<'a> { + pub fn fill(&'a self) -> Fill<'a> { + Fill::parse(&self.0[..70 + usize::try_from(self.redeemer_message_len()).unwrap()]).unwrap() + } + + pub fn amount(&self) -> u128 { + let len = usize::try_from(self.redeemer_message_len()).unwrap(); + u128::from_be_bytes(self.0[70 + len..86 + len].try_into().unwrap()) + } + + // TODO: remove this when encoding changes. + fn redeemer_message_len(&self) -> u32 { + u32::from_be_bytes(self.0[66..70].try_into().unwrap()) + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() < 86 { + return Err("FastFill span too short. Need at least 86 bytes"); + } + + let fast_fill = Self(span); + + // Check payload length vs actual payload. + let fill = fast_fill.fill(); + if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { + return Err("Fill payload length mismatch"); + } + + Ok(fast_fill) + } +} + +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct SlowOrderResponse<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for SlowOrderResponse<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> SlowOrderResponse<'a> { + pub fn base_fee(&self) -> u128 { + u128::from_be_bytes(self.0[..16].try_into().unwrap()) + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() != 16 { + return Err("SlowOrderResponse span too short. Need exactly 16 bytes"); + } + + Ok(Self(span)) + } +} diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index c4b1021d..f9ec0b52 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -1,4 +1,7 @@ -use wormhole_raw_vaas::{cctp::Deposit, Payload}; +mod deposit; +pub use deposit::*; + +use wormhole_raw_vaas::Payload; #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub struct LiquidityLayerPayload<'a> { @@ -44,11 +47,8 @@ impl<'a> LiquidityLayerPayload<'a> { /// The non-type-flag contents #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub enum LiquidityLayerMessage<'a> { - Deposit(Deposit<'a>), - Fill(Fill<'a>), - FastFill(FastFill<'a>), + Deposit(LiquidityLayerDeposit<'a>), FastMarketOrder(FastMarketOrder<'a>), - SlowOrderResponse(SlowOrderResponse<'a>), } impl<'a> TryFrom> for LiquidityLayerMessage<'a> { @@ -59,14 +59,11 @@ impl<'a> TryFrom> for LiquidityLayerMessage<'a> { } } -impl AsRef<[u8]> for LiquidityLayerMessage<'_> { +impl<'a> AsRef<[u8]> for LiquidityLayerMessage<'a> { fn as_ref(&self) -> &[u8] { match self { Self::Deposit(inner) => inner.as_ref(), - Self::Fill(inner) => inner.as_ref(), - Self::FastFill(inner) => inner.as_ref(), Self::FastMarketOrder(inner) => inner.as_ref(), - Self::SlowOrderResponse(inner) => inner.as_ref(), } } } @@ -76,48 +73,20 @@ impl<'a> LiquidityLayerMessage<'a> { self.as_ref() } - pub fn deposit(&self) -> Option<&Deposit> { + pub fn deposit(&self) -> Option<&LiquidityLayerDeposit> { match self { Self::Deposit(inner) => Some(inner), _ => None, } } - pub fn to_deposit_unchecked(self) -> Deposit<'a> { + pub fn to_deposit_unchecked(self) -> LiquidityLayerDeposit<'a> { match self { Self::Deposit(inner) => inner, _ => panic!("LiquidityLayerMessage is not Deposit"), } } - pub fn fill(&self) -> Option<&Fill> { - match self { - Self::Fill(inner) => Some(inner), - _ => None, - } - } - - pub fn to_fill_unchecked(self) -> Fill<'a> { - match self { - Self::Fill(inner) => inner, - _ => panic!("LiquidityLayerMessage is not Fill"), - } - } - - pub fn fast_fill(&self) -> Option<&FastFill> { - match self { - Self::FastFill(inner) => Some(inner), - _ => None, - } - } - - pub fn to_fast_fill_unchecked(self) -> FastFill<'a> { - match self { - Self::FastFill(inner) => inner, - _ => panic!("LiquidityLayerMessage is not FastFill"), - } - } - pub fn fast_market_order(&self) -> Option<&FastMarketOrder> { match self { Self::FastMarketOrder(inner) => Some(inner), @@ -132,125 +101,19 @@ impl<'a> LiquidityLayerMessage<'a> { } } - pub fn slow_order_response(&self) -> Option<&SlowOrderResponse> { - match self { - Self::SlowOrderResponse(inner) => Some(inner), - _ => None, - } - } - - pub fn to_slow_order_response_unchecked(self) -> SlowOrderResponse<'a> { - match self { - Self::SlowOrderResponse(inner) => inner, - _ => panic!("LiquidityLayerMessage is not SlowOrderResponse"), - } - } - pub fn parse(span: &'a [u8]) -> Result { if span.is_empty() { return Err("LiquidityLayerMessage span too short. Need at least 1 byte"); } match span[0] { - 1 => Ok(Self::Deposit(Deposit::parse(&span[1..])?)), - 11 => Ok(Self::Fill(Fill::parse(&span[1..])?)), - 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), + 1 => Ok(Self::Deposit(LiquidityLayerDeposit::parse(&span[1..])?)), 13 => Ok(Self::FastMarketOrder(FastMarketOrder::parse(&span[1..])?)), - 14 => Ok(Self::SlowOrderResponse(SlowOrderResponse::parse( - &span[1..], - )?)), _ => Err("Unknown LiquidityLayerMessage type"), } } } -#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] -pub struct Fill<'a>(&'a [u8]); - -impl<'a> AsRef<[u8]> for Fill<'a> { - fn as_ref(&self) -> &[u8] { - self.0 - } -} - -impl<'a> Fill<'a> { - pub fn source_chain(&self) -> u16 { - u16::from_be_bytes(self.0[..2].try_into().unwrap()) - } - - pub fn order_sender(&self) -> [u8; 32] { - self.0[2..34].try_into().unwrap() - } - - pub fn redeemer(&self) -> [u8; 32] { - self.0[34..66].try_into().unwrap() - } - - pub fn redeemer_message_len(&self) -> u32 { - u32::from_be_bytes(self.0[66..70].try_into().unwrap()) - } - - pub fn redeemer_message(&self) -> &[u8] { - &self.0[70..] - } - - pub fn parse(span: &'a [u8]) -> Result { - if span.len() < 70 { - return Err("Fill span too short. Need at least 70 bytes"); - } - - let fill = Self(span); - - // Check payload length vs actual payload. - if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { - return Err("Fill payload length mismatch"); - } - - Ok(fill) - } -} - -#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] -pub struct FastFill<'a>(&'a [u8]); - -impl<'a> AsRef<[u8]> for FastFill<'a> { - fn as_ref(&self) -> &[u8] { - self.0 - } -} - -impl<'a> FastFill<'a> { - pub fn fill(&'a self) -> Fill<'a> { - Fill::parse(&self.0[..70 + usize::try_from(self.redeemer_message_len()).unwrap()]).unwrap() - } - - pub fn amount(&self) -> u128 { - let len = usize::try_from(self.redeemer_message_len()).unwrap(); - u128::from_be_bytes(self.0[70 + len..86 + len].try_into().unwrap()) - } - - // TODO: remove this when encoding changes. - fn redeemer_message_len(&self) -> u32 { - u32::from_be_bytes(self.0[66..70].try_into().unwrap()) - } - - pub fn parse(span: &'a [u8]) -> Result { - if span.len() < 86 { - return Err("FastFill span too short. Need at least 86 bytes"); - } - - let fast_fill = Self(span); - - // Check payload length vs actual payload. - let fill = fast_fill.fill(); - if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { - return Err("Fill payload length mismatch"); - } - - Ok(fast_fill) - } -} - #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub struct FastMarketOrder<'a>(&'a [u8]); diff --git a/solana/modules/common/src/messages/types.rs b/solana/modules/common/src/messages/types.rs deleted file mode 100644 index a7ce3ac7..00000000 --- a/solana/modules/common/src/messages/types.rs +++ /dev/null @@ -1,42 +0,0 @@ -use wormhole_io::{Readable, Writeable}; - -#[derive(Debug, Clone, PartialEq, Eq)] -pub struct RedeemerMessage(Vec); - -impl From for Vec { - fn from(v: RedeemerMessage) -> Vec { - v.0 - } -} - -impl Readable for RedeemerMessage { - const SIZE: Option = None; - - fn read(reader: &mut R) -> std::io::Result - where - Self: Sized, - R: std::io::Read, - { - let msg_len = u32::read(reader)?; - let mut out = Vec::with_capacity(msg_len as usize); - reader.read_to_end(&mut out)?; - Ok(Self(out)) - } -} - -impl Writeable for RedeemerMessage { - fn written_size(&self) -> usize { - 4 + self.0.len() - } - - fn write(&self, writer: &mut W) -> std::io::Result<()> - where - Self: Sized, - W: std::io::Write, - { - // usize -> u32 is infallible here. - (self.0.len() as u32).write(writer)?; - writer.write_all(&self.0)?; - Ok(()) - } -} diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 172223fb..a5f51779 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -1,168 +1,49 @@ #[anchor_lang::prelude::error_code] pub enum TokenRouterError { - #[msg("AssistantZeroPubkey")] - AssistantZeroPubkey = 0x100, - - #[msg("FeeRecipientZeroPubkey")] - FeeRecipientZeroPubkey = 0x102, - /// Only the program's owner is permitted. #[msg("OwnerOnly")] - OwnerOnly = 0x200, + OwnerOnly = 0x2, + + // Only the program's owner or assistant is permitted. + #[msg("OwnerOrAssistantOnly")] + OwnerOrAssistantOnly = 0x4, + + #[msg("AssistantZeroPubkey")] + AssistantZeroPubkey = 0x20, #[msg("InvalidNewOwner")] - InvalidNewOwner = 0x202, + InvalidNewOwner = 0x22, /// Specified key is already the program's owner. #[msg("AlreadyOwner")] - AlreadyOwner = 0x204, + AlreadyOwner = 0x24, #[msg("NoTransferOwnershipRequest")] - NoTransferOwnershipRequest = 0x206, + NoTransferOwnershipRequest = 0x26, #[msg("InvalidNewAssistant")] - InvalidNewAssistant = 0x208, - - #[msg("InvalidNewFeeRecipient")] - InvalidNewFeeRecipient = 0x20a, - - #[msg("InvalidChain")] - InvalidChain = 0x20c, + InvalidNewAssistant = 0x28, /// Only the program's pending owner is permitted. #[msg("NotPendingOwner")] - NotPendingOwner = 0x20e, - - #[msg("CctpRemoteTokenMessengerRequired")] - CctpRemoteTokenMessengerRequired, - - #[msg("InvalidCctpEndpoint")] - InvalidCctpEndpoint, - - #[msg("OutboundTransfersPaused")] - /// Outbound transfers are paused. - OutboundTransfersPaused, - - #[msg("OwnerOrAssistantOnly")] - // Only the program's owner or assistant is permitted. - OwnerOrAssistantOnly, - - #[msg("AlreadyTheFeeRecipient")] - /// Specified key is already the program's fee recipient. - AlreadyTheFeeRecipient, - - #[msg("BumpNotFound")] - /// Bump not found in `bumps` map. - BumpNotFound, - - #[msg("FailedToMakeImmutable")] - /// Failed to make program immutable. - FailedToMakeImmutable, - - #[msg("InvalidEndpoint")] - /// Specified foreign contract has a bad chain ID or zero address. - InvalidEndpoint, + NotPendingOwner = 0x2a, #[msg("ChainNotAllowed")] - ChainNotAllowed, + ChainNotAllowed = 0x40, - #[msg("ZeroBridgeAmount")] - /// Nothing to transfer if amount is zero. - ZeroBridgeAmount, - - #[msg("InvalidToNativeAmount")] - /// Must be strictly zero or nonzero when normalized. - InvalidToNativeAmount, - - #[msg("NativeMintRequired")] - /// Must be the native mint. - NativeMintRequired, - - #[msg("SwapsNotAllowedForNativeMint")] - /// Swaps are not allowed for the native mint. - SwapsNotAllowedForNativeMint, - - #[msg("InvalidTokenBridgeConfig")] - /// Specified Token Bridge config PDA is wrong. - InvalidTokenBridgeConfig, - - #[msg("InvalidTokenBridgeAuthoritySigner")] - /// Specified Token Bridge authority signer PDA is wrong. - InvalidTokenBridgeAuthoritySigner, - - #[msg("InvalidTokenBridgeCustodySigner")] - /// Specified Token Bridge custody signer PDA is wrong. - InvalidTokenBridgeCustodySigner, - - #[msg("InvalidTokenBridgeEmitter")] - /// Specified Token Bridge emitter PDA is wrong. - InvalidTokenBridgeEmitter, - - #[msg("InvalidTokenBridgeSequence")] - /// Specified Token Bridge sequence PDA is wrong. - InvalidTokenBridgeSequence, - - #[msg("InvalidRecipient")] - /// Specified recipient has a bad chain ID or zero address. - InvalidRecipient, - - #[msg("InvalidTransferToChain")] - /// Deserialized token chain is invalid. - InvalidTransferToChain, - - #[msg("InvalidTransferTokenChain")] - /// Deserialized recipient chain is invalid. - InvalidTransferTokenChain, - - #[msg("InvalidPrecision")] - /// Relayer fee and swap rate precision must be nonzero. - InvalidPrecision, - - #[msg("InvalidTransferToAddress")] - /// Deserialized recipient must be this program or the redeemer PDA. - InvalidTransferToAddress, - - #[msg("AlreadyRedeemed")] - /// Token Bridge program's transfer is already redeemed. - AlreadyRedeemed, - - #[msg("InvalidTokenBridgeForeignEndpoint")] - /// Token Bridge program's foreign endpoint disagrees with registered one. - InvalidTokenBridgeForeignEndpoint, - - #[msg("InvalidTokenBridgeMintAuthority")] - /// Specified Token Bridge mint authority PDA is wrong. - InvalidTokenBridgeMintAuthority, - - #[msg("InvalidPublicKey")] - /// Pubkey is the default. - InvalidPublicKey, - - #[msg("ZeroSwapRate")] - /// Swap rate is zero. - ZeroSwapRate, - - #[msg("TokenNotRegistered")] - /// Token is not registered. - TokenNotRegistered, - - #[msg("ChainNotRegistered")] - /// Foreign contract not registered for specified chain. - ChainNotRegistered, + /// Specified foreign contract has a bad chain ID or zero address. + #[msg("InvalidEndpoint")] + InvalidEndpoint = 0x42, - #[msg("TokenAlreadyRegistered")] - /// Token is already registered. - TokenAlreadyRegistered, + #[msg("CctpRemoteTokenMessengerRequired")] + CctpRemoteTokenMessengerRequired = 0x44, - #[msg("TokenFeeCalculationError")] - /// Token fee overflow. - FeeCalculationError, + #[msg("InvalidCctpEndpoint")] + InvalidCctpEndpoint = 0x46, - #[msg("InvalidSwapCalculation")] - /// Swap calculation overflow. - InvalidSwapCalculation, + #[msg("ZeroAmount")] + ZeroAmount = 0x100, - #[msg("InsufficientFunds")] - /// Insufficient funds for outbound transfer. - InsufficientFunds, + #[msg("RedeemerZeroAddress")] + RedeemerZeroAddress = 0x102, } diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 6f55a243..8ffbed85 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -26,6 +26,15 @@ cfg_if::cfg_if! { pub mod token_router { use super::*; + pub fn place_market_order_cctp( + ctx: Context, + args: PlaceMarketOrderCctpArgs, + ) -> Result<()> { + processor::place_market_order_cctp(ctx, args) + } + + // admin + /// This instruction is be used to generate your program's config. /// And for convenience, we will store Wormhole-related PDAs in the /// config so we can verify these accounts with a simple == constraint. diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs index 36e32332..df6f9367 100644 --- a/solana/programs/token-router/src/processor/mod.rs +++ b/solana/programs/token-router/src/processor/mod.rs @@ -1,2 +1,5 @@ mod admin; pub use admin::*; + +mod place_market_order; +pub use place_market_order::*; diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs new file mode 100644 index 00000000..65c2a5e1 --- /dev/null +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -0,0 +1,258 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::wormhole_io::TypePrefixedPayload; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + utils::ExternalAccount, + wormhole::core_bridge_program, +}; + +/// Account context to invoke [place_market_order_cctp]. +#[derive(Accounts)] +pub struct PlaceMarketOrderCctp<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// Signer who must have the authority (either as the owner or has been delegated authority) + /// over the `burn_source` token account. + burn_source_authority: Signer<'info>, + + /// Circle-supported mint. + /// + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account( + mut, + address = local_token.mint, + )] + mint: AccountInfo<'info>, + + /// Token account where assets are burned from. The CCTP Token Messenger Minter program will + /// burn the configured [amount](TransferTokensWithPayloadArgs::amount) from this account. + #[account( + mut, + token::mint = mint + )] + burn_source: Account<'info, token::TokenAccount>, + + /// Temporary custody token account. This account will be closed at the end of this instruction. + /// It just acts as a conduit to allow this program to be the transfer initiator in the CCTP + /// message. + /// + /// CHECK: Seeds must be \["custody"\]. + #[account( + mut, + seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: AccountInfo<'info>, + + /// Registered emitter account representing a foreign Circle Integration emitter. This account + /// exists only when another CCTP network is registered. + /// + /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = router_endpoint.bump, + constraint = router_endpoint.cctp_domain.is_some() @ TokenRouterError::InvalidCctpEndpoint, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable signer to create Wormhole message account. + #[account(mut)] + core_message: Signer<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_sender_authority: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + #[account(mut)] + message_transmitter_config: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Local token account, which this program uses to validate the `mint` used to burn. + /// + /// Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: Box>>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +/// Arguments used to invoke [place_market_order_cctp]. +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct PlaceMarketOrderCctpArgs { + /// Transfer (burn) amount. + pub amount_in: u64, + + pub redeemer: [u8; 32], + + /// Arbitrary payload, which can be used to encode instructions or data for another network's + /// smart contract. + pub redeemer_message: Vec, +} + +/// This instruction invokes both Wormhole Core Bridge and CCTP Token Messenger Minter programs to +/// emit a Wormhole message associated with a CCTP message. +/// +/// See [burn_and_publish](wormhole_cctp_solana::cpi::burn_and_publish) for more details. +#[access_control(check_constraints(&args))] +pub fn place_market_order_cctp( + ctx: Context, + args: PlaceMarketOrderCctpArgs, +) -> Result<()> { + let PlaceMarketOrderCctpArgs { + amount_in: amount, + redeemer, + redeemer_message, + } = args; + + // Because the transfer initiator in the Circle message is whoever signs to burn assets, we need + // to transfer assets from the source token account to one that belongs to this program. + token::transfer( + CpiContext::new( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.burn_source.to_account_info(), + to: ctx.accounts.custody_token.to_account_info(), + authority: ctx.accounts.burn_source_authority.to_account_info(), + }, + ), + amount, + )?; + + let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + + // This returns the CCTP nonce, but we do not need it. + wormhole_cctp_solana::cpi::burn_and_publish( + CpiContext::new_with_signer( + ctx.accounts + .token_messenger_minter_program + .to_account_info(), + wormhole_cctp_solana::cpi::DepositForBurnWithCaller { + src_token_owner: ctx.accounts.custodian.to_account_info(), + token_messenger_minter_sender_authority: ctx + .accounts + .token_messenger_minter_sender_authority + .to_account_info(), + src_token: ctx.accounts.custody_token.to_account_info(), + message_transmitter_config: ctx + .accounts + .message_transmitter_config + .to_account_info(), + token_messenger: ctx.accounts.token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.token_minter.to_account_info(), + local_token: ctx.accounts.local_token.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + message_transmitter_program: ctx + .accounts + .message_transmitter_program + .to_account_info(), + token_messenger_minter_program: ctx + .accounts + .token_messenger_minter_program + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + }, + &[custodian_seeds], + ), + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[custodian_seeds], + ), + wormhole_cctp_solana::cpi::BurnAndPublishArgs { + burn_source: ctx.accounts.burn_source.key(), + destination_caller: ctx.accounts.router_endpoint.address, + destination_cctp_domain: ctx.accounts.router_endpoint.cctp_domain.unwrap(), + amount, + mint_recipient: ctx.accounts.router_endpoint.address, + wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: common::messages::Fill { + source_chain: wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + order_sender: ctx.accounts.burn_source_authority.key().to_bytes(), + redeemer, + redeemer_message: redeemer_message.into(), + } + .to_vec_payload(), + }, + )?; + + // Done. + Ok(()) +} + +fn check_constraints(args: &PlaceMarketOrderCctpArgs) -> Result<()> { + // Even though CCTP prevents zero amount burns, we prefer to throw an explicit error here. + require!(args.amount_in > 0, TokenRouterError::ZeroAmount); + + // Cannot send to zero address. + require!( + args.redeemer != [0; 32], + TokenRouterError::RedeemerZeroAddress, + ); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/place_market_order/mod.rs b/solana/programs/token-router/src/processor/place_market_order/mod.rs new file mode 100644 index 00000000..c143ed24 --- /dev/null +++ b/solana/programs/token-router/src/processor/place_market_order/mod.rs @@ -0,0 +1,2 @@ +mod cctp; +pub use cctp::*; From 85a5ac639abbcab704578cb1cf2759f72e2fca26 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 12:42:56 -0600 Subject: [PATCH 024/126] fix deser --- solana/Cargo.lock | 4 +-- solana/Cargo.toml | 2 +- .../common/src/messages/raw/deposit.rs | 16 ++++------- solana/modules/common/src/messages/raw/mod.rs | 27 ++----------------- 4 files changed, 10 insertions(+), 39 deletions(-) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 55a358fb..e91e784c 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2453,9 +2453,9 @@ checksum = "a08bfc5177a40f089539b640b29b7d4520aa3ce465733d10a68eb4e389f77162" [[package]] name = "wormhole-raw-vaas" -version = "0.1.2" +version = "0.1.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "dbdd52bdb8835e72e364a86efaa454b56cda359ae31d196e8429c4566ce025ca" +checksum = "d05bc16d11c8eb6f956c5de65bff05759ac2b961b16b054bef3666fe029db7c9" dependencies = [ "ruint", "ruint-macro", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 9476d92b..a2134aff 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -25,7 +25,7 @@ version = "0.0.1-alpha.2" default-features = false [workspace.dependencies.wormhole-raw-vaas] -version = "0.1.2" +version = "0.1.3" features = ["on-chain"] default-features = false diff --git a/solana/modules/common/src/messages/raw/deposit.rs b/solana/modules/common/src/messages/raw/deposit.rs index 1f2e5343..6657ddd8 100644 --- a/solana/modules/common/src/messages/raw/deposit.rs +++ b/solana/modules/common/src/messages/raw/deposit.rs @@ -5,7 +5,6 @@ pub struct LiquidityLayerDeposit<'a> { span: &'a [u8], deposit: Deposit<'a>, - message: DepositMessage<'a>, } impl<'a> AsRef<[u8]> for LiquidityLayerDeposit<'a> { @@ -31,8 +30,8 @@ impl<'a> LiquidityLayerDeposit<'a> { self.deposit } - pub fn message(&self) -> DepositMessage<'a> { - self.message + pub fn to_message(&'a self) -> Result, &'static str> { + DepositMessage::try_from(self.deposit.payload()) } pub fn parse(span: &'a [u8]) -> Result { @@ -41,13 +40,8 @@ impl<'a> LiquidityLayerDeposit<'a> { } let deposit: Deposit = Deposit::parse(span)?; - let message = DepositMessage::parse(span)?; - Ok(Self { - span, - deposit, - message, - }) + Ok(Self { span, deposit }) } } @@ -166,8 +160,8 @@ impl<'a> Fill<'a> { u32::from_be_bytes(self.0[66..70].try_into().unwrap()) } - pub fn redeemer_message(&self) -> &[u8] { - &self.0[70..] + pub fn redeemer_message(&'a self) -> Payload<'a> { + Payload::parse(&self.0[70..]) } pub fn parse(span: &'a [u8]) -> Result { diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index f9ec0b52..f985dcf0 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -176,8 +176,8 @@ impl<'a> FastMarketOrder<'a> { u32::from_be_bytes(self.0[210..214].try_into().unwrap()) } - pub fn redeemer_message(&self) -> &[u8] { - &self.0[214..] + pub fn redeemer_message(&'a self) -> Payload<'a> { + Payload::parse(&self.0[214..]) } pub fn parse(span: &'a [u8]) -> Result { @@ -197,26 +197,3 @@ impl<'a> FastMarketOrder<'a> { Ok(fast_market_order) } } - -#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] -pub struct SlowOrderResponse<'a>(&'a [u8]); - -impl<'a> AsRef<[u8]> for SlowOrderResponse<'a> { - fn as_ref(&self) -> &[u8] { - self.0 - } -} - -impl<'a> SlowOrderResponse<'a> { - pub fn base_fee(&self) -> u128 { - u128::from_be_bytes(self.0[..16].try_into().unwrap()) - } - - pub fn parse(span: &'a [u8]) -> Result { - if span.len() != 16 { - return Err("SlowOrderResponse span too short. Need exactly 16 bytes"); - } - - Ok(Self(span)) - } -} From c1c18e5c54c3099735d9d04aa8a9370bbe7d5b15 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 10 Jan 2024 13:12:07 -0600 Subject: [PATCH 025/126] solana: checkpoint for matching engine --- solana/programs/matching-engine/src/lib.rs | 7 +++++-- .../src/processor/auction/place_initial_offer.rs | 3 ++- solana/ts/src/matching_engine/index.ts | 4 ++-- solana/ts/tests/02__matchingEngine.ts | 3 ++- 4 files changed, 11 insertions(+), 6 deletions(-) diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 400fbd29..bf97d2fa 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -67,7 +67,10 @@ pub mod matching_engine { processor::update_fee_recipient(ctx) } - pub fn place_initial_offer(ctx: Context) -> Result<()> { - processor::place_initial_offer(ctx) + pub fn place_initial_offer( + ctx: Context, + fee_offer: u64 + ) -> Result<()> { + processor::place_initial_offer(ctx, fee_offer) } } diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 668057ec..0a738344 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -25,8 +25,9 @@ pub struct PlaceInitialOffer<'info> { system_program: Program<'info, System>, } -pub fn place_initial_offer(ctx: Context) -> Result<()> { +pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> Result<()> { let vaa = core_bridge_program::VaaAccount::load(&ctx.accounts.vaa)?; + Ok(()) } \ No newline at end of file diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index 904fbbf4..1f8679fb 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -205,10 +205,10 @@ export class MatchingEngineProgram { .instruction(); } - async placeInitialOfferIx(accounts: { payer: PublicKey; vaa: PublicKey }) { + async placeInitialOfferIx(feeOffer: number, accounts: { payer: PublicKey; vaa: PublicKey }) { const { payer, vaa } = accounts; return this.program.methods - .placeInitialOffer() + .placeInitialOffer(new BN(feeOffer)) .accounts({ payer, custodian: this.custodianAddress(), diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index 10345253..0c5244f9 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -625,8 +625,9 @@ describe("Matching Engine", function () { baseFastOrder, "0x" + Buffer.from(routerEndpointAddress).toString("hex") ); + const startingOffer = 69000; - const placeInitialOfferIx = engine.placeInitialOfferIx({ + const placeInitialOfferIx = engine.placeInitialOfferIx(startingOffer, { payer: payer.publicKey, vaa, }); From 96416247189d521edc44d96af203db932f1fe8b9 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 15:23:51 -0600 Subject: [PATCH 026/126] solana: fix deposit messages --- .../common/src/messages/raw/deposit.rs | 47 +------------------ solana/modules/common/src/messages/raw/mod.rs | 10 ++-- 2 files changed, 6 insertions(+), 51 deletions(-) diff --git a/solana/modules/common/src/messages/raw/deposit.rs b/solana/modules/common/src/messages/raw/deposit.rs index 6657ddd8..7dd801bc 100644 --- a/solana/modules/common/src/messages/raw/deposit.rs +++ b/solana/modules/common/src/messages/raw/deposit.rs @@ -1,49 +1,4 @@ -use wormhole_raw_vaas::{cctp::Deposit, Payload}; - -#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] -pub struct LiquidityLayerDeposit<'a> { - span: &'a [u8], - - deposit: Deposit<'a>, -} - -impl<'a> AsRef<[u8]> for LiquidityLayerDeposit<'a> { - fn as_ref(&self) -> &[u8] { - self.span - } -} - -impl<'a> TryFrom> for LiquidityLayerDeposit<'a> { - type Error = &'static str; - - fn try_from(payload: Payload<'a>) -> Result { - Self::parse(payload.into()) - } -} - -impl<'a> LiquidityLayerDeposit<'a> { - pub fn span(&self) -> &[u8] { - self.span - } - - pub fn deposit(&self) -> Deposit<'a> { - self.deposit - } - - pub fn to_message(&'a self) -> Result, &'static str> { - DepositMessage::try_from(self.deposit.payload()) - } - - pub fn parse(span: &'a [u8]) -> Result { - if span.is_empty() { - return Err("LiquidityLayerDeposit span too short. Need at least 1 byte"); - } - - let deposit: Deposit = Deposit::parse(span)?; - - Ok(Self { span, deposit }) - } -} +use wormhole_raw_vaas::Payload; /// The non-type-flag contents #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index f985dcf0..c6e7bb6f 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -1,7 +1,7 @@ mod deposit; pub use deposit::*; -use wormhole_raw_vaas::Payload; +use wormhole_raw_vaas::{cctp::Deposit, Payload}; #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub struct LiquidityLayerPayload<'a> { @@ -47,7 +47,7 @@ impl<'a> LiquidityLayerPayload<'a> { /// The non-type-flag contents #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub enum LiquidityLayerMessage<'a> { - Deposit(LiquidityLayerDeposit<'a>), + Deposit(Deposit<'a>), FastMarketOrder(FastMarketOrder<'a>), } @@ -73,14 +73,14 @@ impl<'a> LiquidityLayerMessage<'a> { self.as_ref() } - pub fn deposit(&self) -> Option<&LiquidityLayerDeposit> { + pub fn deposit(&self) -> Option<&Deposit> { match self { Self::Deposit(inner) => Some(inner), _ => None, } } - pub fn to_deposit_unchecked(self) -> LiquidityLayerDeposit<'a> { + pub fn to_deposit_unchecked(self) -> Deposit<'a> { match self { Self::Deposit(inner) => inner, _ => panic!("LiquidityLayerMessage is not Deposit"), @@ -107,7 +107,7 @@ impl<'a> LiquidityLayerMessage<'a> { } match span[0] { - 1 => Ok(Self::Deposit(LiquidityLayerDeposit::parse(&span[1..])?)), + 1 => Ok(Self::Deposit(Deposit::parse(&span[1..])?)), 13 => Ok(Self::FastMarketOrder(FastMarketOrder::parse(&span[1..])?)), _ => Err("Unknown LiquidityLayerMessage type"), } From 83c0f0fa23ff3c4c536f32ea4091747bd46d2b96 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 17:06:46 -0600 Subject: [PATCH 027/126] solana: place market order happy path test (WIP) --- solana/modules/common/src/constants/mod.rs | 5 + solana/programs/token-router/src/constants.rs | 10 - solana/programs/token-router/src/lib.rs | 2 - .../src/processor/admin/initialize.rs | 2 +- .../src/processor/place_market_order/cctp.rs | 59 +- .../token-router/src/state/custodian.rs | 2 +- .../token-router/src/state/payer_sequence.rs | 11 +- solana/ts/src/index.ts | 327 ++-- solana/ts/src/state/Custodian.ts | 2 +- solana/ts/src/state/PayerSequence.ts | 9 + solana/ts/tests/01__tokenRouter.ts | 1494 +---------------- 11 files changed, 325 insertions(+), 1598 deletions(-) delete mode 100644 solana/programs/token-router/src/constants.rs diff --git a/solana/modules/common/src/constants/mod.rs b/solana/modules/common/src/constants/mod.rs index 39f06a71..a8f3c524 100644 --- a/solana/modules/common/src/constants/mod.rs +++ b/solana/modules/common/src/constants/mod.rs @@ -1,3 +1,8 @@ pub mod usdc; pub const WORMHOLE_MESSAGE_NONCE: u32 = 0; + +/// Seed for custody token account. +pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; + +pub const CORE_MESSAGE_SEED_PREFIX: &[u8] = b"msg"; diff --git a/solana/programs/token-router/src/constants.rs b/solana/programs/token-router/src/constants.rs deleted file mode 100644 index 4e0b9492..00000000 --- a/solana/programs/token-router/src/constants.rs +++ /dev/null @@ -1,10 +0,0 @@ -use anchor_lang::prelude::constant; - -/// Swap rate precision. This value should NEVER change, unless other Token -/// Bridge Relayer contracts are deployed with a different precision. -#[constant] -pub const NATIVE_SWAP_RATE_PRECISION: u128 = u128::pow(10, 8); - -/// Seed for custody token account. -#[constant] -pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 8ffbed85..4f92309a 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -1,8 +1,6 @@ #![doc = include_str!("../README.md")] #![allow(clippy::result_large_err)] -pub mod constants; - pub mod error; mod processor; diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index 01fd60a1..ebcfd177 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -31,7 +31,7 @@ pub struct Initialize<'info> { #[account( init, payer = owner, - seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump, token::mint = mint, token::authority = custodian diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index 65c2a5e1..648d8b34 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -1,13 +1,12 @@ use crate::{ error::TokenRouterError, - state::{Custodian, RouterEndpoint}, + state::{Custodian, PayerSequence, RouterEndpoint}, }; use anchor_lang::prelude::*; use anchor_spl::token; use common::wormhole_io::TypePrefixedPayload; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, - utils::ExternalAccount, wormhole::core_bridge_program, }; @@ -17,6 +16,18 @@ pub struct PlaceMarketOrderCctp<'info> { #[account(mut)] payer: Signer<'info>, + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + /// This program's Wormhole (Core Bridge) emitter authority. /// /// Seeds must be \["emitter"\]. @@ -36,15 +47,18 @@ pub struct PlaceMarketOrderCctp<'info> { /// Token Messenger Minter program's local token account. #[account( mut, - address = local_token.mint, + address = common::constants::usdc::id(), )] mint: AccountInfo<'info>, /// Token account where assets are burned from. The CCTP Token Messenger Minter program will /// burn the configured [amount](TransferTokensWithPayloadArgs::amount) from this account. + /// + /// CHECK: This account must have delegated authority or be owned by the + /// [burn_source_authority](Self::burn_source_authority). Its mint must be USDC. #[account( mut, - token::mint = mint + token::mint = mint, )] burn_source: Account<'info, token::TokenAccount>, @@ -55,7 +69,7 @@ pub struct PlaceMarketOrderCctp<'info> { /// CHECK: Seeds must be \["custody"\]. #[account( mut, - seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump = custodian.custody_token_bump, )] custody_token: AccountInfo<'info>, @@ -78,9 +92,17 @@ pub struct PlaceMarketOrderCctp<'info> { #[account(mut)] core_bridge_config: UncheckedAccount<'info>, - /// CHECK: Mutable signer to create Wormhole message account. - #[account(mut)] - core_message: Signer<'info>, + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). #[account(mut)] @@ -109,9 +131,9 @@ pub struct PlaceMarketOrderCctp<'info> { /// Local token account, which this program uses to validate the `mint` used to burn. /// - /// Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). #[account(mut)] - local_token: Box>>, + local_token: AccountInfo<'info>, core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, token_messenger_minter_program: @@ -151,6 +173,9 @@ pub fn place_market_order_cctp( ctx: Context, args: PlaceMarketOrderCctpArgs, ) -> Result<()> { + // Set the bump just in case we use this account for anything else. + ctx.accounts.payer_sequence.bump = ctx.bumps["payer_sequence"]; + let PlaceMarketOrderCctpArgs { amount_in: amount, redeemer, @@ -220,7 +245,19 @@ pub fn place_market_order_cctp( clock: ctx.accounts.clock.to_account_info(), rent: ctx.accounts.rent.to_account_info(), }, - &[custodian_seeds], + &[ + custodian_seeds, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]] + ], + ], ), wormhole_cctp_solana::cpi::BurnAndPublishArgs { burn_source: ctx.accounts.burn_source.key(), diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs index d84073c7..e799fb6b 100644 --- a/solana/programs/token-router/src/state/custodian.rs +++ b/solana/programs/token-router/src/state/custodian.rs @@ -22,7 +22,7 @@ pub struct Custodian { } impl Custodian { - pub const SEED_PREFIX: &'static [u8] = b"custodian"; + pub const SEED_PREFIX: &'static [u8] = b"emitter"; } impl common::admin::Ownable for Custodian { diff --git a/solana/programs/token-router/src/state/payer_sequence.rs b/solana/programs/token-router/src/state/payer_sequence.rs index 94fe84b0..888f7d37 100644 --- a/solana/programs/token-router/src/state/payer_sequence.rs +++ b/solana/programs/token-router/src/state/payer_sequence.rs @@ -1,8 +1,9 @@ use anchor_lang::prelude::*; #[account] -#[derive(InitSpace)] +#[derive(Debug, InitSpace)] pub struct PayerSequence { + pub bump: u8, pub value: u64, } @@ -17,11 +18,3 @@ impl PayerSequence { seq } } - -impl std::ops::Deref for PayerSequence { - type Target = u64; - - fn deref(&self) -> &Self::Target { - &self.value - } -} diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index 18c0d295..326af11e 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -17,11 +17,53 @@ export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as co export type ProgramId = (typeof PROGRAM_IDS)[number]; -export type TransferTokensWithRelayArgs = { - amount: BN; - toNativeTokenAmount: BN; +export type PlaceMarketOrderCctpArgs = { + amountIn: bigint; targetChain: ChainId; - targetRecipientWallet: Array; + redeemer: Array; + redeemerMessage: Buffer; +}; + +export type PublishMessageAccounts = { + coreBridgeConfig: PublicKey; + coreEmitterSequence: PublicKey; + coreFeeCollector: PublicKey; + coreBridgeProgram: PublicKey; +}; + +export type TokenRouterCommonAccounts = PublishMessageAccounts & { + tokenRouterProgram: PublicKey; + systemProgram: PublicKey; + rent: PublicKey; + custodian: PublicKey; + custodyToken: PublicKey; + tokenMessenger: PublicKey; + tokenMinter: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; + mint?: PublicKey; + localToken?: PublicKey; + tokenMessengerMinterCustodyToken?: PublicKey; +}; + +export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { + custodian: PublicKey; + custodyToken: PublicKey; + routerEndpoint: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + coreBridgeProgram: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; }; export type AddRouterEndpointArgs = { @@ -64,20 +106,6 @@ export class TokenRouterProgram { return this.program.programId; } - wormholeCctpProgram(): WormholeCctpProgram { - switch (this._programId) { - case testnet(): { - return new WormholeCctpProgram( - this.program.provider.connection, - "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW" - ); - } - default: { - throw new Error("unsupported network"); - } - } - } - custodianAddress(): PublicKey { return Custodian.address(this.ID); } @@ -90,13 +118,23 @@ export class TokenRouterProgram { return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; } + coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], + this.ID + )[0]; + } + payerSequenceAddress(payer: PublicKey): PublicKey { return PayerSequence.address(this.ID, payer); } - async fetchPayerSequence(addr: PublicKey): Promise { - return this.program.account.payerSequence - .fetch(addr) + async fetchPayerSequence(addr: PublicKey): Promise { + return this.program.account.payerSequence.fetch(addr); + } + + async fetchPayerSequenceValue(addr: PublicKey): Promise { + return this.fetchPayerSequence(addr) .then((acct) => acct.value) .catch((_) => new BN(0)); } @@ -109,99 +147,140 @@ export class TokenRouterProgram { return this.program.account.routerEndpoint.fetch(addr); } - // async transferTokensWithRelayIx( - // accounts: { - // payer: PublicKey; - // fromToken: PublicKey; - // mint?: PublicKey; - // custodian?: PublicKey; - // registeredContract?: PublicKey; - // }, - // args: TransferTokensWithRelayArgs - // ): Promise { - // const connection = this.program.provider.connection; - - // const { - // payer, - // fromToken, - // mint: inputMint, - // custodian: inputCustodian, - // registeredContract: inputRegisteredContract, - // } = accounts; - // const { amount, toNativeTokenAmount, targetChain, targetRecipientWallet } = args; - // const mint = await (async () => { - // if (inputMint === undefined) { - // return splToken.getAccount(connection, fromToken).then((acct) => acct.mint); - // } else { - // return inputMint; - // } - // })(); - - // // Fetch the signer sequence. - // const payerSequence = this.payerSequenceAddress(payer); - // const [coreMessage] = await this.program.account.payerSequence - // .fetch(payerSequence) - // .then((acct) => acct.value) - // .catch(() => new BN(0)) - // .then((seq) => - // PublicKey.findProgramAddressSync( - // [Buffer.from("msg"), payer.toBuffer(), seq.toBuffer("be", 8)], - // this.ID - // ) - // ); - - // const wormholeCctp = this.wormholeCctpProgram(); - // const { - // custodian: wormCctpCustodian, - // custodyToken: wormCctpCustodyToken, - // registeredEmitter: wormCctpRegisteredEmitter, - // coreBridgeConfig, - // coreEmitterSequence, - // coreFeeCollector, - // tokenMessengerMinterSenderAuthority: cctpTokenMessengerMinterSenderAuthority, - // messageTransmitterConfig: cctpMessageTransmitterConfig, - // tokenMessenger: cctpTokenMessenger, - // remoteTokenMessenger: cctpRemoteTokenMessenger, - // tokenMinter: cctpTokenMinter, - // localToken: cctpLocalToken, - // tokenProgram, - // coreBridgeProgram, - // tokenMessengerMinterProgram: cctpTokenMessengerMinterProgram, - // messageTransmitterProgram: cctpMessageTransmitterProgram, - // } = await wormholeCctp.transferTokensWithPayloadAccounts(mint, targetChain); - - // return this.program.methods - // .transferTokensWithRelay({ amount, toNativeTokenAmount, targetRecipientWallet }) - // .accounts({ - // payer, - // custodian: inputCustodian ?? this.custodianAddress(), - // payerSequence, - // registeredContract: - // inputRegisteredContract ?? this.registeredContractAddress(targetChain), - // mint, - // fromToken, - // coreMessage, - // custodyToken: this.custodyTokenAccountAddress(), - // wormCctpCustodian, - // wormCctpCustodyToken, - // wormCctpRegisteredEmitter, - // coreBridgeConfig, - // coreEmitterSequence, - // coreFeeCollector, - // cctpTokenMessengerMinterSenderAuthority, - // cctpMessageTransmitterConfig, - // cctpTokenMessenger, - // cctpRemoteTokenMessenger, - // cctpTokenMinter, - // cctpLocalToken, - // tokenProgram, - // wormholeCctpProgram: wormholeCctp.ID, - // coreBridgeProgram, - // cctpTokenMessengerMinterProgram, - // cctpMessageTransmitterProgram, - // }) - // .instruction(); - // } + async placeMarketOrderCctpAccounts( + mint: PublicKey, + targetChain: ChainId, + overrides: { + remoteDomain?: number; + } = {} + ): Promise { + const { remoteDomain: inputRemoteDomain } = overrides; + + const routerEndpoint = this.routerEndpointAddress(targetChain); + const remoteDomain = await (async () => { + if (inputRemoteDomain !== undefined) { + return inputRemoteDomain; + } else { + const cctpDomain = await this.fetchRouterEndpoint(routerEndpoint).then( + (acct) => acct.cctpDomain + ); + if (cctpDomain === null) { + throw new Error("invalid router endpoint"); + } else { + return cctpDomain; + } + } + })(); + + const { + senderAuthority: tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + messageTransmitterProgram, + tokenMessengerMinterProgram, + tokenProgram, + } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); + + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + + return { + custodian, + custodyToken: this.custodyTokenAccountAddress(), + routerEndpoint, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }; + } + + async placeMarketOrderCctpIx( + accounts: { + payer: PublicKey; + mint: PublicKey; + burnSource: PublicKey; + burnSourceAuthority?: PublicKey; + }, + args: PlaceMarketOrderCctpArgs + ): Promise { + let { payer, burnSource, mint, burnSourceAuthority: inputBurnSourceAuthority } = accounts; + const burnSourceAuthority = + inputBurnSourceAuthority ?? + (await splToken + .getAccount(this.program.provider.connection, burnSource) + .then((token) => token.owner)); + + const { amountIn, targetChain, redeemer, redeemerMessage } = args; + + const payerSequence = this.payerSequenceAddress(payer); + const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => + this.coreMessageAddress(payer, value) + ); + const { + custodian, + custodyToken, + routerEndpoint, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + } = await this.placeMarketOrderCctpAccounts(mint, targetChain); + + return this.program.methods + .placeMarketOrderCctp({ + amountIn: new BN(amountIn.toString()), + redeemer, + redeemerMessage, + }) + .accounts({ + payer, + payerSequence, + custodian, + burnSourceAuthority, + mint, + burnSource, + custodyToken, + routerEndpoint, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }) + .instruction(); + } async initializeIx(accounts: { owner: PublicKey; @@ -375,6 +454,26 @@ export class TokenRouterProgram { } } + publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { + const coreBridgeProgram = this.coreBridgeProgramId(); + + return { + coreBridgeConfig: PublicKey.findProgramAddressSync( + [Buffer.from("Bridge")], + coreBridgeProgram + )[0], + coreEmitterSequence: PublicKey.findProgramAddressSync( + [Buffer.from("Sequence"), emitter.toBuffer()], + coreBridgeProgram + )[0], + coreFeeCollector: PublicKey.findProgramAddressSync( + [Buffer.from("fee_collector")], + coreBridgeProgram + )[0], + coreBridgeProgram, + }; + } + coreBridgeProgramId(): PublicKey { switch (this._programId) { case testnet(): { diff --git a/solana/ts/src/state/Custodian.ts b/solana/ts/src/state/Custodian.ts index adb59f90..c9502108 100644 --- a/solana/ts/src/state/Custodian.ts +++ b/solana/ts/src/state/Custodian.ts @@ -28,6 +28,6 @@ export class Custodian { } static address(programId: PublicKey) { - return PublicKey.findProgramAddressSync([Buffer.from("custodian")], programId)[0]; + return PublicKey.findProgramAddressSync([Buffer.from("emitter")], programId)[0]; } } diff --git a/solana/ts/src/state/PayerSequence.ts b/solana/ts/src/state/PayerSequence.ts index 34e6a7d4..5be928cc 100644 --- a/solana/ts/src/state/PayerSequence.ts +++ b/solana/ts/src/state/PayerSequence.ts @@ -1,6 +1,15 @@ +import { BN } from "@coral-xyz/anchor"; import { PublicKey } from "@solana/web3.js"; export class PayerSequence { + bump: number; + value: BN; + + constructor(bump: number, value: BN) { + this.bump = bump; + this.value = value; + } + static address(programId: PublicKey, payer: PublicKey) { return PublicKey.findProgramAddressSync( [Buffer.from("seq"), payer.toBuffer()], diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/01__tokenRouter.ts index a1e94487..e3fc2f0d 100644 --- a/solana/ts/tests/01__tokenRouter.ts +++ b/solana/ts/tests/01__tokenRouter.ts @@ -519,1458 +519,54 @@ describe("Token Router", function () { }); }); - // describe.skip("Transfer Tokens with Relay", function () { - // const sendAmount = new BN(420_000_000); // 420.0 USDC - // const toNativeAmount = new BN(100_000_000); // 50.0 USDC - // const targetRecipientWallet = Array.from(Buffer.alloc(32, "1337beef", "hex")); - - // const createTransferTokensWithRelayIx = (opts?: { - // sender?: PublicKey; - // fromToken?: PublicKey; - // amount?: BN; - // toNativeTokenAmount?: BN; - // targetRecipientWallet?: Array; - // targetChain?: ChainId; - // }) => - // tokenRouter.transferTokensWithRelayIx( - // { - // payer: opts?.sender ?? payer.publicKey, - // fromToken: - // opts?.fromToken ?? - // splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, payer.publicKey), - // }, - // { - // amount: opts?.amount ?? sendAmount, - // toNativeTokenAmount: opts?.toNativeTokenAmount ?? toNativeAmount, - // targetRecipientWallet: opts?.targetRecipientWallet ?? targetRecipientWallet, - // targetChain: opts?.targetChain ?? foreignChain, - // } - // ); - - // before("Set Default Parameters Before Tests", async () => { - // // Set default params. - // // await expectIxOk( - // // connection, - // // [ - // // await tokenRouter.updateRelayerFeeIx( - // // { - // // ownerOrAssistant: owner.publicKey, - // // mint: USDC_MINT_ADDRESS, - // // }, - // // { - // // chain: foreignChain, - // // relayerFee: DEFAULT_RELAYER_FEE, - // // } - // // ), - // // await tokenRouter.updateNativeSwapRateIx( - // // { - // // ownerOrAssistant: owner.publicKey, - // // mint: USDC_MINT_ADDRESS, - // // }, - // // DEFAULT_SWAP_RATE - // // ), - // // await tokenRouter.updateMaxNativeSwapAmountIx( - // // { - // // owner: owner.publicKey, - // // mint: USDC_MINT_ADDRESS, - // // }, - // // DEFAULT_MAX_NATIVE_SWAP_AMOUNT - // // ), - // // ], - // // [owner] - // // ); - // }); - - // it.skip("Cannot Transfer When Paused", async function () { - // // TODO - // }); - - // it.skip("Cannot Transfer Unregistered Asset", async function () { - // // TODO - // }); - - // it.skip("Cannot Transfer Amount Less Than Sum of Relayer Fee and To Native Token Amount", async function () { - // // TODO - // }); - - // it.skip("Cannot Transfer To Unregistered Foreign Contract", async function () { - // // TODO - // }); - - // it.skip("Cannot Transfer To Zero Address", async function () { - // // TODO - // }); - - // it.skip("Cannot Transfer without Delegating Authority to Custodian", async function () { - // // TODO - // }); - - // it("Transfer Tokens With Relay", async function () { - // const payerToken = splToken.getAssociatedTokenAddressSync( - // USDC_MINT_ADDRESS, - // payer.publicKey - // ); - // const balanceBefore = await splToken - // .getAccount(connection, payerToken) - // .then((token) => token.amount); - - // const delegateIx = splToken.createSetAuthorityInstruction( - // payerToken, - // payer.publicKey, - // splToken.AuthorityType.AccountOwner, - // tokenRouter.custodianAddress() - // ); - - // await expectIxOk( - // connection, - // [delegateIx, await createTransferTokensWithRelayIx()], - // [payer] - // ); - - // // TODO: check message - - // const balanceAfter = await splToken - // .getAccount(connection, payerToken) - // .then((token) => token.amount); - // expect(balanceAfter).to.eql(balanceBefore - BigInt(sendAmount.toString())); - // }); - // }); - - // describe("Transfer Tokens With Relay Business Logic", function () { - // // Test parameters. The following tests rely on these parameters, - // // and changing them may cause the tests to fail. - // const batchId = 0; - // const sendAmount = 420000000000; // we are sending once - // const recipientAddress = Buffer.alloc(32, "1337beef", "hex"); - // const initialRelayerFee = 100000000; // $1.00 - // const maxNativeSwapAmount = 50000000000; // 50 SOL - - // const getWormholeSequence = async () => - // ( - // await wormhole.getProgramSequenceTracker(connection, TOKEN_BRIDGE_PID, CORE_BRIDGE_PID) - // ).value(); - - // const verifyTmpTokenAccountDoesNotExist = async (mint: PublicKey) => { - // const tmpTokenAccountKey = tokenBridgeRelayer.deriveTmpTokenAccountKey( - // TOKEN_ROUTER_PID, - // mint - // ); - // await expect(getAccount(connection, tmpTokenAccountKey)).to.be.rejected; - // }; - - // fetchTestTokens().forEach(([isNative, decimals, tokenAddress, mint, swapRate]) => { - // describe(getDescription(decimals, isNative, mint), function () { - // // Target contract swap amount. - // const toNativeTokenAmount = 10000000000; - - // // ATAs. - // const recipientTokenAccount = getAssociatedTokenAddressSync(mint, payer.publicKey); - // const feeRecipientTokenAccount = getAssociatedTokenAddressSync( - // mint, - // feeRecipient.publicKey - // ); - // const relayerTokenAccount = getAssociatedTokenAddressSync(mint, relayer.publicKey); - - // describe(`Transfer Tokens With Payload`, function () { - // const createSendTokensWithPayloadIx = (opts?: { - // sender?: PublicKey; - // amount?: number; - // toNativeTokenAmount?: number; - // recipientAddress?: Buffer; - // recipientChain?: ChainId; - // wrapNative?: boolean; - // }) => - // (isNative - // ? tokenBridgeRelayer.createTransferNativeTokensWithRelayInstruction - // : tokenBridgeRelayer.createTransferWrappedTokensWithRelayInstruction)( - // connection, - // TOKEN_ROUTER_PID, - // opts?.sender ?? payer.publicKey, - // TOKEN_BRIDGE_PID, - // CORE_BRIDGE_PID, - // mint, - // { - // amount: opts?.amount ?? sendAmount, - // toNativeTokenAmount: opts?.toNativeTokenAmount ?? toNativeTokenAmount, - // recipientAddress: opts?.recipientAddress ?? recipientAddress, - // recipientChain: opts?.recipientChain ?? foreignChain, - // batchId: batchId, - // wrapNative: opts?.wrapNative ?? mint === NATIVE_MINT ? true : false, - // } - // ); - - // it("Set the Swap Rate", async function () { - // // Set the swap rate. - // const createUpdateSwapRateIx = await tokenBridgeRelayer.createUpdateSwapRateInstruction( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint, - // new BN(swapRate) - // ); - // await expectIxToSucceed(createUpdateSwapRateIx); - // }); - - // it("Set the Max Native Swap Amount", async function () { - // // Set the max native swap amount. - // const createUpdateMaxNativeSwapAmountIx = - // await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint, - // mint === NATIVE_MINT ? new BN(0) : new BN(maxNativeSwapAmount) - // ); - // await expectIxToSucceed(createUpdateMaxNativeSwapAmountIx); - // }); - - // it("Set the Initial Relayer Fee", async function () { - // // Set the initial relayer fee. - // const createUpdateRelayerFeeIx = - // await tokenBridgeRelayer.updateRelayerFeeIx( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // foreignChain, - // new BN(initialRelayerFee) - // ); - // await expectIxToSucceed(createUpdateRelayerFeeIx); - // }); - - // it("Cannot Transfer When Paused", async function () { - // // Pause transfers. - // const createSetPauseForTransfersIx = - // await tokenBridgeRelayer.setPauseForTransfersIx( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // true - // ); - // await expectIxToSucceed(createSetPauseForTransfersIx); - - // // Attempt to do the transfer. - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx(), - // "OutboundTransfersPaused" - // ); - - // // Unpause transfers. - // const createSetPauseForTransfersIx2 = - // await tokenBridgeRelayer.setPauseForTransfersIx( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // false - // ); - // await expectIxToSucceed(createSetPauseForTransfersIx2); - // }); - - // it("Cannot Transfer Unregistered Token", async function () { - // // Deregister the token. - // await expectIxToSucceed( - // await tokenBridgeRelayer.createDeregisterTokenInstruction( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint - // ) - // ); - - // // Attempt to do the transfer. - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx(), - // "AccountNotInitialized" - // ); - - // // Register the token again. - // await expectIxToSucceed( - // await tokenBridgeRelayer.createRegisterTokenInstruction( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint, - // new BN(swapRate), - // new BN(0) // set the max native to zero, this won't affect subsequent tests - // ) - // ); - // }); - - // if (isNative && decimals > 8) - // it("Cannot Transfer Amount Less Than Bridgeable", async function () { - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx({ amount: 1 }), - // "ZeroBridgeAmount" - // ); - // }); - - // if (isNative && decimals > 8) - // it("Cannot Set To Native Token Amount Less Than Bridgeable", async function () { - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx({ - // toNativeTokenAmount: 1, - // }), - // "InvalidToNativeAmount" - // ); - // }); - - // it("Cannot Transfer Amount Less Than Sum of Relayer Fee and To Native Token Amount", async function () { - // // Calculate the relayer fee in terms of the token. - // const relayerFee = tokenBridgeTransform( - // await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, - // decimals, - // mint - // ), - // decimals - // ); - - // // Calculate the transfer amount. - // const insufficientAmount = relayerFee + toNativeTokenAmount - 1; - - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx({ - // amount: insufficientAmount, - // }), - // "InsufficientFunds" - // ); - // }); - - // it("Cannot Transfer To Unregistered Foreign Contract", async function () { - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx({ - // recipientChain: invalidChain, - // }), - // "AccountNotInitialized" - // ); - // }); - - // [CHAINS.unset, CHAINS.solana].forEach((recipientChain) => - // it(`Cannot Transfer To Chain ID == ${recipientChain}`, async function () { - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx({ recipientChain }), - // "AnchorError caused by account: foreign_contract. Error Code: AccountNotInitialized" - // ); - // }) - // ); - - // it("Cannot Transfer To Zero Address", async function () { - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx({ - // recipientAddress: Buffer.alloc(32), - // }), - // "InvalidRecipient" - // ); - // }); - - // if (mint !== NATIVE_MINT && isNative) - // it("Cannot Wrap Non-Native Token", async function () { - // await expectIxToFailWithError( - // await createSendTokensWithPayloadIx({ - // wrapNative: true, - // }), - // "NativeMintRequired" - // ); - // }); - - // for (const toNativeAmount of [toNativeTokenAmount, 0]) { - // it(`Transfer with Relay (To Native Amount == ${toNativeAmount})`, async function () { - // const sequence = await tokenBridgeRelayer.getSignerSequenceData( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey - // ); - - // // Fetch the balance before the transfer. - // const balanceBefore = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - - // // Attempt to send the transfer. - // await expectIxToSucceed( - // createSendTokensWithPayloadIx({ - // toNativeTokenAmount: toNativeAmount, - // }), - // 250_000 - // ); - - // // Fetch the balance after the transfer. - // const balanceAfter = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - - // // Calculate the balance change and confirm it matches the expected. If - // // wrap is true, then the balance should decrease by the amount sent - // // plus the amount of lamports used to pay for the transaction. - // if (mint === NATIVE_MINT) { - // expect(balanceBefore - balanceAfter).gte( - // tokenBridgeTransform(Number(sendAmount), decimals) - // ); - // } else { - // expect(balanceBefore - balanceAfter).equals( - // tokenBridgeTransform(Number(sendAmount), decimals) - // ); - // } - - // // Normalize the to native token amount. - // const expectedToNativeAmount = tokenBridgeNormalizeAmount(toNativeAmount, decimals); - - // // Calculate the expected target relayer fee and normalize it. - // const expectedFee = tokenBridgeNormalizeAmount( - // await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, - // decimals, - // mint - // ), - // decimals - // ); - - // // Normalize the transfer amount and verify that it's correct. - // const expectedAmount = tokenBridgeNormalizeAmount(sendAmount, decimals); - - // // Parse the token bridge relayer payload and validate the encoded - // // values. - // await verifyRelayerMessage( - // connection, - // payer.publicKey, - // BigInt(sequence.toString()), - // expectedAmount, - // expectedFee, - // expectedToNativeAmount, - // recipientAddress - // ); - - // await verifyTmpTokenAccountDoesNotExist(mint); - // }); - // } - // }); - - // describe("Complete Transfer with Relay", function () { - // // Test parameters. The following tests rely on these values - // // and could fail if they are changed. - // const feeEpsilon = 10000000; - // const receiveAmount = sendAmount / 6; - // const toNativeTokenAmount = 10000000000; - // expect(toNativeTokenAmount).lt(receiveAmount); - - // // Replay protection place holder. - // let replayVAA: Buffer; - - // const createRedeemTransferWithPayloadIx = ( - // sender: PublicKey, - // signedMsg: Buffer, - // recipient: PublicKey - // ) => - // (isNative - // ? tokenBridgeRelayer.createCompleteNativeTransferWithRelayInstruction - // : tokenBridgeRelayer.createCompleteWrappedTransferWithRelayInstruction)( - // connection, - // TOKEN_ROUTER_PID, - // sender, - // feeRecipient.publicKey, - // TOKEN_BRIDGE_PID, - // CORE_BRIDGE_PID, - // signedMsg, - // recipient - // ); - - // it("Cannot Redeem From Unregistered Foreign Contract", async function () { - // // Create the encoded transfer with relay payload. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // 0, // relayer fee - // 0, // to native token amount - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const bogusMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // unregisteredContractAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Post the Wormhole message. - // await postSignedMsgAsVaaOnSolana(bogusMsg); - - // // Attempt to redeem the transfer. - // await expectIxToFailWithError( - // await createRedeemTransferWithPayloadIx(payer.publicKey, bogusMsg, payer.publicKey), - // "InvalidEndpoint" - // ); - // }); - - // it("Cannot Redeem Unregistered Token", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Deregister the token. - // await expectIxToSucceed( - // await tokenBridgeRelayer.createDeregisterTokenInstruction( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint - // ) - // ); - - // // Create the encoded transfer with relay payload. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(relayerFee, decimals), - // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, payer)).to.be.fulfilled; - - // // Attempt to redeem the transfer. - // await expectIxToFailWithError( - // await createRedeemTransferWithPayloadIx(payer.publicKey, signedMsg, payer.publicKey), - // "AccountNotInitialized" - // ); - - // // Register the token again. - // await expectIxToSucceed( - // await tokenBridgeRelayer.createRegisterTokenInstruction( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint, - // new BN(swapRate), - // mint === NATIVE_MINT ? new BN(0) : new BN(maxNativeSwapAmount) - // ) - // ); - // }); - - // it("Cannot Redeem Invalid Recipient", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Encode a different recipient in the payload. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(relayerFee, decimals), - // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), - // relayer.publicKey.toBuffer().toString("hex") // encode the relayer instead of recipient - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, payer)).to.be.fulfilled; - - // // Attempt to redeem the transfer with a different recipient. - // await expectIxToFailWithError( - // await createRedeemTransferWithPayloadIx(payer.publicKey, signedMsg, payer.publicKey), - // "InvalidRecipient" - // ); - // }); - - // it("Self Redeem", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Create the encoded transfer with relay payload. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(relayerFee, decimals), - // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, payer)).to.be.fulfilled; - - // // Fetch the balance before the transfer. - // const balanceBefore = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - - // // Complete the transfer. - // await expectIxToSucceed( - // createRedeemTransferWithPayloadIx(payer.publicKey, signedMsg, payer.publicKey), - // payer - // ); - - // // Fetch the balance after the transfer. - // const balanceAfter = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - - // // Calculate the balance change and confirm it matches the expected. If - // // wrap is true, then the balance should decrease by the amount sent - // // plus the amount of lamports used to pay for the transaction. - // if (mint === NATIVE_MINT) { - // expect(balanceAfter - balanceBefore - receiveAmount).lte( - // tokenBridgeTransform(feeEpsilon, decimals) - // ); - // } else { - // expect(balanceAfter - balanceBefore).equals( - // tokenBridgeTransform(Number(receiveAmount), decimals) - // ); - // } - - // await verifyTmpTokenAccountDoesNotExist(mint); - // }); - - // it("With Relayer (With Swap)", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Create the encoded transfer with relay payload. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(relayerFee, decimals), - // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; - - // // Fetch the token balances before the transfer. - // const recipientTokenBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceBefore = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances before the transfer. - // const recipientLamportBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceBefore = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Complete the transfer. - // await expectIxToSucceed( - // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), - // relayer, - // 250_000 - // ); - - // // Fetch the token balances after the transfer. - // const recipientTokenBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceAfter = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances after the transfer. - // const recipientLamportBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceAfter = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Denormalize the transfer amount and relayer fee. - // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); - // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); - - // // Confirm the balance changes. - // if (mint === NATIVE_MINT) { - // // Confirm lamport changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // tokenBridgeTransform(Number(receiveAmount) - denormalizedRelayerFee, decimals) - // ); - - // // Confirm lamport changes for the relayer. - // expect(relayerLamportBalanceAfter - relayerLamportBalanceBefore).gte( - // denormalizedRelayerFee - feeEpsilon - // ); - // } else { - // // Calculate the expected token swap amounts. - // const [expectedSwapAmountIn, expectedSwapAmountOut] = await calculateSwapAmounts( - // connection, - // program.programId, - // decimals, - // mint, - // toNativeTokenAmount - // ); - - // // Confirm token changes for the recipient. - // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( - // denormalizedReceiveAmount - expectedSwapAmountIn - denormalizedRelayerFee - // ); - - // // Confirm token changes for fee recipient. - // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( - // expectedSwapAmountIn + denormalizedRelayerFee - // ); - - // // Confirm lamports changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // expectedSwapAmountOut - // ); - - // // Confirm lamports changes for the relayer. - // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter) - // .gte(expectedSwapAmountOut) - // .lte(expectedSwapAmountOut + feeEpsilon); - // } - - // await verifyTmpTokenAccountDoesNotExist(mint); - // }); - - // it("With Relayer (With Max Swap Limit Reached)", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Create the encoded transfer with relay payload. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(relayerFee, decimals), - // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Update the max native swap amount if the toNativeTokenAmount is - // // not enough to cap the swap quantity. - // { - // // Compute the max native swap amount in token terms. - // const [maxNativeSwapAmountInTokens, _, __] = await getSwapInputs( - // connection, - // program.programId, - // decimals, - // mint - // ); - - // if (toNativeTokenAmount <= maxNativeSwapAmountInTokens) { - // // Reduce the max native swap amount to half of the - // // to native token amount equivalent. - // const newMaxNativeSwapAmount = - // maxNativeSwapAmount * (toNativeTokenAmount / maxNativeSwapAmountInTokens / 2); - - // await expectIxToSucceed( - // await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint, - // new BN(newMaxNativeSwapAmount) - // ) - // ); - // } - // } - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; - - // // Fetch the token balances before the transfer. - // const recipientTokenBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceBefore = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances before the transfer. - // const recipientLamportBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceBefore = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Complete the transfer. - // await expectIxToSucceed( - // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), - // relayer, - // 250_000 - // ); - - // // Fetch the token balances after the transfer. - // const recipientTokenBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceAfter = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances after the transfer. - // const recipientLamportBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceAfter = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Denormalize the transfer amount and relayer fee. - // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); - // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); - - // // Confirm the balance changes. - // if (mint === NATIVE_MINT) { - // // Confirm lamport changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // tokenBridgeTransform(Number(receiveAmount) - denormalizedRelayerFee, decimals) - // ); - - // // Confirm lamport changes for the relayer. - // expect(relayerLamportBalanceAfter - relayerLamportBalanceBefore).gte( - // denormalizedRelayerFee - feeEpsilon - // ); - // } else { - // // Calculate the expected token swap amounts. - // const [expectedSwapAmountIn, expectedSwapAmountOut] = await calculateSwapAmounts( - // connection, - // program.programId, - // decimals, - // mint, - // toNativeTokenAmount - // ); - - // // Confirm that the expectedSwapAmountIn is less than the - // // original to native token amount. - // expect(expectedSwapAmountIn).lt(toNativeTokenAmount); - - // // Confirm token changes for the recipient. - // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( - // denormalizedReceiveAmount - expectedSwapAmountIn - denormalizedRelayerFee - // ); - - // // Confirm token changes for fee recipient. - // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( - // expectedSwapAmountIn + denormalizedRelayerFee - // ); - - // // Confirm lamports changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // expectedSwapAmountOut - // ); - - // // Confirm lamports changes for the relayer. - // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter) - // .gte(expectedSwapAmountOut) - // .lte(expectedSwapAmountOut + feeEpsilon); - // } - - // // Set the max native swap amount back to the initial value. - // await expectIxToSucceed( - // await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( - // connection, - // TOKEN_ROUTER_PID, - // payer.publicKey, - // mint, - // mint === NATIVE_MINT ? new BN(0) : new BN(maxNativeSwapAmount) - // ) - // ); - - // await verifyTmpTokenAccountDoesNotExist(mint); - // }); - - // it("With Relayer (With Swap No Fee)", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Create the encoded transfer with relay payload. Set the - // // target relayer fee to zero for this test. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(0, decimals), - // tokenBridgeNormalizeAmount(toNativeTokenAmount, decimals), - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; - - // // Fetch the token balances before the transfer. - // const recipientTokenBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceBefore = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances before the transfer. - // const recipientLamportBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceBefore = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Complete the transfer. - // await expectIxToSucceed( - // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), - // relayer, - // 250_000 - // ); - - // // Fetch the token balances after the transfer. - // const recipientTokenBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceAfter = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances after the transfer. - // const recipientLamportBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceAfter = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Denormalize the transfer amount and relayer fee. - // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); - // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); - - // // Confirm the balance changes. - // if (mint === NATIVE_MINT) { - // // Confirm lamport changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // tokenBridgeTransform(Number(receiveAmount), decimals) - // ); - - // // Confirm lamport changes for the relayer. - // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); - // } else { - // // Calculate the expected token swap amounts. - // const [expectedSwapAmountIn, expectedSwapAmountOut] = await calculateSwapAmounts( - // connection, - // program.programId, - // decimals, - // mint, - // toNativeTokenAmount - // ); - - // // Confirm token changes for the recipient. - // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( - // denormalizedReceiveAmount - expectedSwapAmountIn - // ); - - // // Confirm token changes for fee recipient. - // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( - // expectedSwapAmountIn - // ); - - // // Confirm lamports changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // expectedSwapAmountOut - // ); - - // // Confirm lamports changes for the relayer. - // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter) - // .gte(expectedSwapAmountOut) - // .lte(expectedSwapAmountOut + feeEpsilon); - // } - - // await verifyTmpTokenAccountDoesNotExist(mint); - // }); - - // it("With Relayer (No Fee and No Swap)", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Create the encoded transfer with relay payload. Set the - // // to native token amount and relayer fee to zero for this test. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(0, decimals), - // tokenBridgeNormalizeAmount(0, decimals), - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; - - // // Fetch the token balances before the transfer. - // const recipientTokenBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceBefore = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances before the transfer. - // const recipientLamportBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceBefore = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Complete the transfer. - // await expectIxToSucceed( - // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), - // relayer - // ); - - // // Fetch the token balances after the transfer. - // const recipientTokenBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceAfter = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances after the transfer. - // const recipientLamportBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceAfter = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Denormalize the transfer amount and relayer fee. - // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); - - // // Confirm the balance changes. - // if (mint === NATIVE_MINT) { - // // Confirm lamport changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // tokenBridgeTransform(Number(receiveAmount), decimals) - // ); - - // // Confirm lamport changes for the relayer. - // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); - // } else { - // // Confirm token changes for the recipient. - // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( - // denormalizedReceiveAmount - // ); - - // // Confirm token changes for fee recipient. - // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals(0); - - // // Confirm lamports changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals(0); - - // // Confirm lamports changes for the relayer. - // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); - // } - - // await verifyTmpTokenAccountDoesNotExist(mint); - // }); - - // it("With Relayer (No Swap With Fee)", async function () { - // // Define inbound transfer parameters. Calculate the fee - // // using the foreignChain to simulate calculating the - // // target relayer fee. This contract won't allow us to set - // // a relayer fee for the Solana chain ID. - // const relayerFee = await calculateRelayerFee( - // connection, - // program.programId, - // foreignChain, // placeholder - // decimals, - // mint - // ); - - // // Create the encoded transfer with relay payload. Set the - // // to native token amount to zero for this test. - // const transferWithRelayPayload = createTransferWithRelayPayload( - // tokenBridgeNormalizeAmount(relayerFee, decimals), - // tokenBridgeNormalizeAmount(0, decimals), - // payer.publicKey.toBuffer().toString("hex") - // ); - - // // Create the token bridge message. - // const signedMsg = guardianSign( - // foreignTokenBridge.publishTransferTokensWithPayload( - // tokenAddress, - // isNative ? CHAINS.solana : foreignChain, // tokenChain - // BigInt(tokenBridgeNormalizeAmount(receiveAmount, decimals)), - // CHAINS.solana, // recipientChain - // TOKEN_ROUTER_PID.toBuffer().toString("hex"), - // routerEndpointAddress, - // Buffer.from(transferWithRelayPayload.substring(2), "hex"), - // batchId - // ) - // ); - // replayVAA = signedMsg; - - // // Post the Wormhole message. - // await expect(postSignedMsgAsVaaOnSolana(signedMsg, relayer)).to.be.fulfilled; - - // // Fetch the token balances before the transfer. - // const recipientTokenBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceBefore = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances before the transfer. - // const recipientLamportBalanceBefore = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceBefore = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Complete the transfer. - // await expectIxToSucceed( - // createRedeemTransferWithPayloadIx(relayer.publicKey, signedMsg, payer.publicKey), - // relayer - // ); - - // // Fetch the token balances after the transfer. - // const recipientTokenBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // mint === NATIVE_MINT, - // recipientTokenAccount - // ); - // const feeRecipientTokenBalanceAfter = await getBalance( - // connection, - // feeRecipient.publicKey, - // mint === NATIVE_MINT, - // feeRecipientTokenAccount - // ); - - // // Fetch the lamport balances after the transfer. - // const recipientLamportBalanceAfter = await getBalance( - // connection, - // payer.publicKey, - // true, - // recipientTokenAccount - // ); - // const relayerLamportBalanceAfter = await getBalance( - // connection, - // relayer.publicKey, - // true, - // relayerTokenAccount - // ); - - // // Denormalize the transfer amount and relayer fee. - // const denormalizedReceiveAmount = tokenBridgeTransform(receiveAmount, decimals); - // const denormalizedRelayerFee = tokenBridgeTransform(relayerFee, decimals); - - // // Confirm the balance changes. - // if (mint === NATIVE_MINT) { - // // Confirm lamport changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals( - // tokenBridgeTransform(Number(receiveAmount) - denormalizedRelayerFee, decimals) - // ); - - // // Confirm lamport changes for the relayer. - // expect(relayerLamportBalanceAfter - relayerLamportBalanceBefore).gte( - // denormalizedRelayerFee - feeEpsilon - // ); - // } else { - // // Confirm token changes for the recipient. - // expect(recipientTokenBalanceAfter - recipientTokenBalanceBefore).equals( - // denormalizedReceiveAmount - denormalizedRelayerFee - // ); + describe("Outbound Transfers", () => { + const payerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + payer.publicKey + ); + + const createPlaceMarketOrderCctpIx = ( + amountIn: bigint, + opts?: { + sender?: PublicKey; + mint?: PublicKey; + burnSource?: PublicKey; + burnSourceAuthority?: PublicKey; + targetChain?: ChainId; + redeemer?: Array; + } + ) => + tokenRouter.placeMarketOrderCctpIx( + { + payer: opts?.sender ?? payer.publicKey, + mint: opts?.mint ?? USDC_MINT_ADDRESS, + burnSource: opts?.burnSource ?? payerToken, + burnSourceAuthority: opts?.burnSourceAuthority ?? payer.publicKey, + }, + { + amountIn, + targetChain: opts?.targetChain ?? foreignChain, + redeemer: opts?.redeemer ?? Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); - // // Confirm token changes for fee recipient. - // expect(feeRecipientTokenBalanceAfter - feeRecipientTokenBalanceBefore).equals( - // denormalizedRelayerFee - // ); + it("Place Market Order (CCTP) as Payer", async function () { + const amountIn = 69n; - // // Confirm lamports changes for the recipient. - // expect(recipientLamportBalanceAfter - recipientLamportBalanceBefore).equals(0); + const balanceBefore = await splToken + .getAccount(connection, payerToken) + .then((token) => token.amount); - // // Confirm lamports changes for the relayer. - // expect(relayerLamportBalanceBefore - relayerLamportBalanceAfter).lte(feeEpsilon); - // } + // TODO: use lookup table + await expectIxOk(connection, [await createPlaceMarketOrderCctpIx(amountIn)], [payer]); - // await verifyTmpTokenAccountDoesNotExist(mint); - // }); + const balanceAfter = await splToken + .getAccount(connection, payerToken) + .then((token) => token.amount); + expect(balanceAfter + amountIn).equals(balanceBefore); - // it("Cannot Redeem Again", async function () { - // await expectIxToFailWithError( - // await createRedeemTransferWithPayloadIx( - // relayer.publicKey, - // replayVAA, - // payer.publicKey - // ), - // "AlreadyRedeemed", - // relayer - // ); - // }); - // }); - // }); - // }); - // }); + // TODO: check message + }); + }); }); From 5e4aaa6a81cc5fb6b691f6f58e0dc2258e416950 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 10 Jan 2024 21:15:08 -0600 Subject: [PATCH 028/126] solana: add redeem_fill_cctp (untested) --- .../common/src/messages/raw/deposit.rs | 18 +- solana/programs/token-router/src/error.rs | 12 ++ solana/programs/token-router/src/lib.rs | 4 + .../token-router/src/processor/mod.rs | 3 + .../src/processor/place_market_order/cctp.rs | 7 +- .../src/processor/redeem_fill/cctp.rs | 194 ++++++++++++++++++ .../src/processor/redeem_fill/mod.rs | 2 + .../token-router/src/state/payer_sequence.rs | 1 - solana/ts/tests/01__tokenRouter.ts | 20 +- 9 files changed, 244 insertions(+), 17 deletions(-) create mode 100644 solana/programs/token-router/src/processor/redeem_fill/cctp.rs create mode 100644 solana/programs/token-router/src/processor/redeem_fill/mod.rs diff --git a/solana/modules/common/src/messages/raw/deposit.rs b/solana/modules/common/src/messages/raw/deposit.rs index 7dd801bc..ada487c6 100644 --- a/solana/modules/common/src/messages/raw/deposit.rs +++ b/solana/modules/common/src/messages/raw/deposit.rs @@ -2,13 +2,13 @@ use wormhole_raw_vaas::Payload; /// The non-type-flag contents #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] -pub enum DepositMessage<'a> { +pub enum LiquidityLayerDepositMessage<'a> { Fill(Fill<'a>), FastFill(FastFill<'a>), SlowOrderResponse(SlowOrderResponse<'a>), } -impl<'a> TryFrom> for DepositMessage<'a> { +impl<'a> TryFrom> for LiquidityLayerDepositMessage<'a> { type Error = &'static str; fn try_from(payload: Payload<'a>) -> Result { @@ -16,7 +16,7 @@ impl<'a> TryFrom> for DepositMessage<'a> { } } -impl<'a> AsRef<[u8]> for DepositMessage<'a> { +impl<'a> AsRef<[u8]> for LiquidityLayerDepositMessage<'a> { fn as_ref(&self) -> &[u8] { match self { Self::Fill(inner) => inner.as_ref(), @@ -26,7 +26,7 @@ impl<'a> AsRef<[u8]> for DepositMessage<'a> { } } -impl<'a> DepositMessage<'a> { +impl<'a> LiquidityLayerDepositMessage<'a> { pub fn span(&self) -> &[u8] { self.as_ref() } @@ -41,7 +41,7 @@ impl<'a> DepositMessage<'a> { pub fn to_fill_unchecked(self) -> Fill<'a> { match self { Self::Fill(inner) => inner, - _ => panic!("DepositMessage is not Fill"), + _ => panic!("LiquidityLayerDepositMessage is not Fill"), } } @@ -55,7 +55,7 @@ impl<'a> DepositMessage<'a> { pub fn to_fast_fill_unchecked(self) -> FastFill<'a> { match self { Self::FastFill(inner) => inner, - _ => panic!("DepositMessage is not FastFill"), + _ => panic!("LiquidityLayerDepositMessage is not FastFill"), } } @@ -69,13 +69,13 @@ impl<'a> DepositMessage<'a> { pub fn to_slow_order_response_unchecked(self) -> SlowOrderResponse<'a> { match self { Self::SlowOrderResponse(inner) => inner, - _ => panic!("DepositMessage is not SlowOrderResponse"), + _ => panic!("LiquidityLayerDepositMessage is not SlowOrderResponse"), } } pub fn parse(span: &'a [u8]) -> Result { if span.is_empty() { - return Err("DepositMessage span too short. Need at least 1 byte"); + return Err("LiquidityLayerDepositMessage span too short. Need at least 1 byte"); } match span[0] { @@ -84,7 +84,7 @@ impl<'a> DepositMessage<'a> { 14 => Ok(Self::SlowOrderResponse(SlowOrderResponse::parse( &span[1..], )?)), - _ => Err("Unknown DepositMessage type"), + _ => Err("Unknown LiquidityLayerDepositMessage type"), } } } diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index a5f51779..4fcfd1ae 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -46,4 +46,16 @@ pub enum TokenRouterError { #[msg("RedeemerZeroAddress")] RedeemerZeroAddress = 0x102, + + #[msg("UnknownEmitter")] + InvalidSourceRouter = 0x200, + + #[msg("InvalidDepositMessage")] + InvalidDepositMessage = 0x202, + + #[msg("NotFillMessage")] + InvalidPayloadId = 0x204, + + #[msg("InvalidRedeemer")] + InvalidRedeemer = 0x206, } diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 4f92309a..8b48fafd 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -31,6 +31,10 @@ pub mod token_router { processor::place_market_order_cctp(ctx, args) } + pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillCctpArgs) -> Result<()> { + processor::redeem_fill_cctp(ctx, args) + } + // admin /// This instruction is be used to generate your program's config. diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs index df6f9367..3d94b496 100644 --- a/solana/programs/token-router/src/processor/mod.rs +++ b/solana/programs/token-router/src/processor/mod.rs @@ -3,3 +3,6 @@ pub use admin::*; mod place_market_order; pub use place_market_order::*; + +mod redeem_fill; +pub use redeem_fill::*; \ No newline at end of file diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index 648d8b34..a8c332f7 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -133,7 +133,7 @@ pub struct PlaceMarketOrderCctp<'info> { /// /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). #[account(mut)] - local_token: AccountInfo<'info>, + local_token: UncheckedAccount<'info>, core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, token_messenger_minter_program: @@ -173,9 +173,6 @@ pub fn place_market_order_cctp( ctx: Context, args: PlaceMarketOrderCctpArgs, ) -> Result<()> { - // Set the bump just in case we use this account for anything else. - ctx.accounts.payer_sequence.bump = ctx.bumps["payer_sequence"]; - let PlaceMarketOrderCctpArgs { amount_in: amount, redeemer, @@ -255,7 +252,7 @@ pub fn place_market_order_cctp( .take_and_uptick() .to_be_bytes() .as_ref(), - &[ctx.bumps["core_message"]] + &[ctx.bumps["core_message"]], ], ], ), diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs new file mode 100644 index 00000000..c17a79f2 --- /dev/null +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -0,0 +1,194 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::raw::LiquidityLayerDepositMessage; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + cpi::ReceiveMessageArgs, + utils::WormholeCctpPayload, + wormhole::core_bridge_program, +}; + +/// Account context to invoke [redeem_fill_cctp]. +#[derive(Accounts)] +pub struct RedeemFillCctp<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + vaa: AccountInfo<'info>, + + /// Account representing that a VAA has been consumed. + /// + /// CHECK: Seeds must be [emitter_address, emitter_chain, sequence]. These seeds are checked + /// when [claim_vaa](core_bridge_program::sdk::claim_vaa) is called. + #[account(mut)] + claim: AccountInfo<'info>, + + /// Redeemer, who owns the token account that will receive the minted tokens. + /// + /// CHECK: Signer who must be the owner of the `mint_recipient` token account. + redeemer: Signer<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// NOTE: This account must be owned by the `mint_recipient_authority`. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + /// Registered emitter account representing a Circle Integration on another network. + /// + /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = router_endpoint.bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). + message_transmitter_authority: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + message_transmitter_config: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), + /// first_nonce.to_string()\] (CCTP Message Transmitter program). + #[account(mut)] + used_nonces: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Token Messenger Minter's Local Token account. This program uses the mint of this account to + /// validate the `mint_recipient` token account's mint. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP + /// Token Messenger Minter program). + token_pair: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + token_messenger_minter_custody_token: AccountInfo<'info>, + + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +/// Arguments used to invoke [redeem_fill_cctp]. +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct RedeemFillCctpArgs { + /// CCTP message. + pub encoded_cctp_message: Vec, + + /// Attestation of [encoded_cctp_message](Self::encoded_cctp_message). + pub cctp_attestation: Vec, +} + +/// This instruction reconciles a Wormhole CCTP deposit message with a CCTP message to mint tokens +/// for the [mint_recipient](RedeemFillCctp::mint_recipient) token account. +/// +/// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. +pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillCctpArgs) -> Result<()> { + let vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( + &ctx.accounts.vaa, + CpiContext::new_with_signer( + ctx.accounts.message_transmitter_program.to_account_info(), + message_transmitter_program::cpi::ReceiveTokenMessengerMinterMessage { + payer: ctx.accounts.payer.to_account_info(), + caller: ctx.accounts.custodian.to_account_info(), + message_transmitter_authority: ctx + .accounts + .message_transmitter_authority + .to_account_info(), + message_transmitter_config: ctx + .accounts + .message_transmitter_config + .to_account_info(), + used_nonces: ctx.accounts.used_nonces.to_account_info(), + token_messenger_minter_program: ctx + .accounts + .token_messenger_minter_program + .to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + token_messenger: ctx.accounts.token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.token_minter.to_account_info(), + local_token: ctx.accounts.local_token.to_account_info(), + token_pair: ctx.accounts.token_pair.to_account_info(), + mint_recipient: ctx.accounts.custody_token.to_account_info(), + custody_token: ctx + .accounts + .token_messenger_minter_custody_token + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + ReceiveMessageArgs { + encoded_message: args.encoded_cctp_message, + attestation: args.cctp_attestation, + }, + )?; + + // Validate that this message originated from a registered emitter. + let endpoint = &ctx.accounts.router_endpoint; + let emitter = vaa.try_emitter_info().unwrap(); + require!( + emitter.chain == endpoint.chain && emitter.address == endpoint.address, + TokenRouterError::InvalidSourceRouter + ); + + let deposit = WormholeCctpPayload::try_from(vaa.try_payload().unwrap()) + .unwrap() + .message() + .to_deposit_unchecked(); + let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) + .map_err(|_| TokenRouterError::InvalidDepositMessage)?; + + // Verify redeemer. + let fill = msg.fill().ok_or(TokenRouterError::InvalidPayloadId)?; + require_keys_eq!( + Pubkey::from(fill.redeemer()), + ctx.accounts.redeemer.key(), + TokenRouterError::InvalidRedeemer + ); + + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/redeem_fill/mod.rs b/solana/programs/token-router/src/processor/redeem_fill/mod.rs new file mode 100644 index 00000000..802f5a88 --- /dev/null +++ b/solana/programs/token-router/src/processor/redeem_fill/mod.rs @@ -0,0 +1,2 @@ +mod cctp; +pub use cctp::*; \ No newline at end of file diff --git a/solana/programs/token-router/src/state/payer_sequence.rs b/solana/programs/token-router/src/state/payer_sequence.rs index 888f7d37..627330d0 100644 --- a/solana/programs/token-router/src/state/payer_sequence.rs +++ b/solana/programs/token-router/src/state/payer_sequence.rs @@ -3,7 +3,6 @@ use anchor_lang::prelude::*; #[account] #[derive(Debug, InitSpace)] pub struct PayerSequence { - pub bump: u8, pub value: u64, } diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/01__tokenRouter.ts index e3fc2f0d..6ac26393 100644 --- a/solana/ts/tests/01__tokenRouter.ts +++ b/solana/ts/tests/01__tokenRouter.ts @@ -519,7 +519,7 @@ describe("Token Router", function () { }); }); - describe("Outbound Transfers", () => { + describe("Place Market Order (CCTP)", () => { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, payer.publicKey @@ -551,7 +551,19 @@ describe("Token Router", function () { } ); - it("Place Market Order (CCTP) as Payer", async function () { + it.skip("Cannot Place Market Order with Zero Amount", async function () { + // TODO + }); + + it.skip("Cannot Place Market Order with Redeemer as Zero Address", async function () { + // TODO + }); + + it.skip("Cannot Place Market Order with Unregistered Endpoint", async function () { + // TODO + }); + + it("Place Market Order as Payer", async function () { const amountIn = 69n; const balanceBefore = await splToken @@ -568,5 +580,9 @@ describe("Token Router", function () { // TODO: check message }); + + it.skip("Place Market Order as Another Signer", async function () { + // TODO + }); }); }); From 0cb93a5fd213a30b201bbc3fdd2bda8ecc370fee Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 11 Jan 2024 09:37:20 -0600 Subject: [PATCH 029/126] solana: fix payer sequence; add redeem fill me placeholder --- solana/programs/token-router/Cargo.toml | 4 +- solana/programs/token-router/src/lib.rs | 6 +- .../src/processor/place_market_order/cctp.rs | 2 +- .../src/processor/redeem_fill/cctp.rs | 27 ++---- .../src/processor/redeem_fill/me.rs | 85 +++++++++++++++++++ .../src/processor/redeem_fill/mod.rs | 17 +++- solana/ts/src/state/PayerSequence.ts | 4 +- 7 files changed, 117 insertions(+), 28 deletions(-) create mode 100644 solana/programs/token-router/src/processor/redeem_fill/me.rs diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index 537ece6c..18476ad8 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -17,12 +17,12 @@ no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["common/testnet", "wormhole-cctp-solana/testnet"] +testnet = ["common/testnet", "wormhole-cctp-solana/testnet", "matching-engine/testnet"] integration-test = ["testnet"] [dependencies] common.workspace = true -matching-engine.workspace = true +matching-engine = { workspace = true, features = ["cpi"] } wormhole-cctp-solana = { workspace = true, features = ["cpi"] } anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 8b48fafd..a6476f78 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -31,10 +31,14 @@ pub mod token_router { processor::place_market_order_cctp(ctx, args) } - pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillCctpArgs) -> Result<()> { + pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillArgs) -> Result<()> { processor::redeem_fill_cctp(ctx, args) } + pub fn redeem_fill_matching_engine(ctx: Context) -> Result<()> { + processor::redeem_fill_matching_engine(ctx) + } + // admin /// This instruction is be used to generate your program's config. diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index a8c332f7..ffc452fd 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -66,7 +66,7 @@ pub struct PlaceMarketOrderCctp<'info> { /// It just acts as a conduit to allow this program to be the transfer initiator in the CCTP /// message. /// - /// CHECK: Seeds must be \["custody"\]. + /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index c17a79f2..41a27274 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -32,23 +32,18 @@ pub struct RedeemFillCctp<'info> { #[account(owner = core_bridge_program::id())] vaa: AccountInfo<'info>, - /// Account representing that a VAA has been consumed. - /// - /// CHECK: Seeds must be [emitter_address, emitter_chain, sequence]. These seeds are checked - /// when [claim_vaa](core_bridge_program::sdk::claim_vaa) is called. - #[account(mut)] - claim: AccountInfo<'info>, - /// Redeemer, who owns the token account that will receive the minted tokens. /// - /// CHECK: Signer who must be the owner of the `mint_recipient` token account. + /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. redeemer: Signer<'info>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message /// from its custody account to this account. /// - /// NOTE: This account must be owned by the `mint_recipient_authority`. + /// Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], @@ -111,21 +106,11 @@ pub struct RedeemFillCctp<'info> { system_program: Program<'info, System>, } -/// Arguments used to invoke [redeem_fill_cctp]. -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct RedeemFillCctpArgs { - /// CCTP message. - pub encoded_cctp_message: Vec, - - /// Attestation of [encoded_cctp_message](Self::encoded_cctp_message). - pub cctp_attestation: Vec, -} - /// This instruction reconciles a Wormhole CCTP deposit message with a CCTP message to mint tokens /// for the [mint_recipient](RedeemFillCctp::mint_recipient) token account. /// /// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. -pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillCctpArgs) -> Result<()> { +pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArgs) -> Result<()> { let vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( &ctx.accounts.vaa, CpiContext::new_with_signer( @@ -175,6 +160,7 @@ pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillCctpArgs) TokenRouterError::InvalidSourceRouter ); + // Wormhole CCTP deposit should be ours, so make sure this is a fill we recognize. let deposit = WormholeCctpPayload::try_from(vaa.try_payload().unwrap()) .unwrap() .message() @@ -190,5 +176,6 @@ pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillCctpArgs) TokenRouterError::InvalidRedeemer ); + // Done. Ok(()) } diff --git a/solana/programs/token-router/src/processor/redeem_fill/me.rs b/solana/programs/token-router/src/processor/redeem_fill/me.rs new file mode 100644 index 00000000..4872f600 --- /dev/null +++ b/solana/programs/token-router/src/processor/redeem_fill/me.rs @@ -0,0 +1,85 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::raw::LiquidityLayerDepositMessage; +use wormhole_cctp_solana::{utils::WormholeCctpPayload, wormhole::core_bridge_program}; + +/// Account context to invoke [redeem_fill_matching_engine]. +#[derive(Accounts)] +pub struct RedeemFillMatchingEngine<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + vaa: AccountInfo<'info>, + + /// Redeemer, who owns the token account that will receive the minted tokens. + /// + /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. + redeemer: Signer<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + // add matching engine accounts here + // + // + matching_engine_program: Program<'info, matching_engine::program::MatchingEngine>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +/// This instruction reconciles a Wormhole CCTP deposit message with a CCTP message to mint tokens +/// for the [mint_recipient](RedeemFillMatchingEngine::mint_recipient) token account. +/// +/// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. +pub fn redeem_fill_matching_engine(ctx: Context) -> Result<()> { + // TODO: Placeholder for CPI call to matching engine. + // NOTE: It is the matching engine's job to validate this VAA. + + let vaa = + wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount::load(&ctx.accounts.vaa) + .unwrap(); + + // Wormhole CCTP deposit should be ours, so make sure this is a fill we recognize. + let deposit = WormholeCctpPayload::try_from(vaa.try_payload().unwrap()) + .unwrap() + .message() + .to_deposit_unchecked(); + let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) + .map_err(|_| TokenRouterError::InvalidDepositMessage)?; + + // Verify redeemer. + let fill = msg + .fast_fill() + .ok_or(TokenRouterError::InvalidPayloadId) + .map(|fast| fast.fill())?; + require_keys_eq!( + Pubkey::from(fill.redeemer()), + ctx.accounts.redeemer.key(), + TokenRouterError::InvalidRedeemer + ); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/redeem_fill/mod.rs b/solana/programs/token-router/src/processor/redeem_fill/mod.rs index 802f5a88..c9d52a95 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/mod.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/mod.rs @@ -1,2 +1,17 @@ mod cctp; -pub use cctp::*; \ No newline at end of file +pub use cctp::*; + +mod me; +pub use me::*; + +use anchor_lang::prelude::*; + +/// Arguments used to invoke [redeem_fill_matching_engine]. +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct RedeemFillArgs { + /// CCTP message. + pub encoded_cctp_message: Vec, + + /// Attestation of [encoded_cctp_message](Self::encoded_cctp_message). + pub cctp_attestation: Vec, +} diff --git a/solana/ts/src/state/PayerSequence.ts b/solana/ts/src/state/PayerSequence.ts index 5be928cc..a171f659 100644 --- a/solana/ts/src/state/PayerSequence.ts +++ b/solana/ts/src/state/PayerSequence.ts @@ -2,11 +2,9 @@ import { BN } from "@coral-xyz/anchor"; import { PublicKey } from "@solana/web3.js"; export class PayerSequence { - bump: number; value: BN; - constructor(bump: number, value: BN) { - this.bump = bump; + constructor(value: BN) { this.value = value; } From f5c15e5fca770edb24a92ec0624c85987c1cfb5b Mon Sep 17 00:00:00 2001 From: gator-boi Date: Thu, 11 Jan 2024 11:37:22 -0600 Subject: [PATCH 030/126] solana: add happy path test for place_initial_offer --- solana/programs/matching-engine/src/error.rs | 23 +- .../src/processor/auction/mod.rs | 30 ++- .../processor/auction/place_initial_offer.rs | 124 +++++++++- .../matching-engine/src/state/auction_data.rs | 15 +- .../programs/matching-engine/src/state/mod.rs | 3 + solana/ts/src/matching_engine/index.ts | 31 ++- .../src/matching_engine/state/AuctionData.ts | 40 ++++ solana/ts/tests/02__matchingEngine.ts | 218 ++++++++++++++---- .../ts/tests/helpers/matching_engine_utils.ts | 16 +- 9 files changed, 427 insertions(+), 73 deletions(-) create mode 100644 solana/ts/src/matching_engine/state/AuctionData.ts diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index def27cd0..6f0f5012 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -13,7 +13,6 @@ pub enum MatchingEngineError { #[msg("InvalidNewOwner")] InvalidNewOwner = 0x202, - /// Specified key is already the program's owner. #[msg("AlreadyOwner")] AlreadyOwner = 0x204, @@ -29,34 +28,42 @@ pub enum MatchingEngineError { #[msg("InvalidChain")] InvalidChain = 0x20c, - /// Only the program's pending owner is permitted. #[msg("NotPendingOwner")] NotPendingOwner = 0x20e, #[msg("OwnerOrAssistantOnly")] - // Only the program's owner or assistant is permitted. OwnerOrAssistantOnly, #[msg("ChainNotAllowed")] ChainNotAllowed, #[msg("InvalidEndpoint")] - /// Specified foreign contract has a bad chain ID or zero address. InvalidEndpoint, #[msg("InvalidAuctionDuration")] - /// The auction duration is zero. InvalidAuctionDuration, #[msg("InvalidAuctionGracePeriod")] - /// The auction grace period is less than the `auction_duration`. InvalidAuctionGracePeriod, #[msg("UserPenaltyTooLarge")] - /// The value is larger than the maximum precision constant. UserPenaltyTooLarge, #[msg("InitialPenaltyTooLarge")] - /// The value is larger than the maximum precision constant. InitialPenaltyTooLarge, + + #[msg("InvalidVaa")] + InvalidVaa, + + #[msg("NotFastMarketOrder")] + NotFastMarketOrder, + + #[msg("FastMarketOrderExpired")] + FastMarketOrderExpired, + + #[msg("OfferPriceTooHigh")] + OfferPriceTooHigh, + + #[msg("AuctionAlreadyStarted")] + AuctionAlreadyStarted, } diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index dae2c7fd..bcbce247 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -1,2 +1,30 @@ mod place_initial_offer; -pub use place_initial_offer::*; \ No newline at end of file +pub use place_initial_offer::*; +use anchor_lang::prelude::*; + +use crate::{ + error::MatchingEngineError, + state::RouterEndpoint, +}; + +use wormhole_cctp_solana::wormhole::core_bridge_program::sdk::EmitterInfo; + +pub fn verify_router_path( + from_router_endpoint: &RouterEndpoint, + to_router_endpoint: &RouterEndpoint, + emitter_info: &EmitterInfo, + target_chain: u16, +) -> Result<()> { + require!( + from_router_endpoint.chain == emitter_info.chain && + from_router_endpoint.address == emitter_info.address, + MatchingEngineError::InvalidEndpoint + ); + require!( + to_router_endpoint.chain == target_chain && + to_router_endpoint.address != [0u8; 32], + MatchingEngineError::InvalidEndpoint + ); + + Ok(()) +} \ No newline at end of file diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 0a738344..8bbcf0b0 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -1,7 +1,13 @@ +use common::messages::raw::LiquidityLayerPayload; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use wormhole_cctp_solana::wormhole::core_bridge_program; +use anchor_spl::token; use anchor_lang::prelude::*; -use crate::state::Custodian; +use crate::{ + error::MatchingEngineError, + state::{AuctionData, Custodian, RouterEndpoint, AuctionStatus}, processor::verify_router_path, +}; #[derive(Accounts)] pub struct PlaceInitialOffer<'info> { @@ -17,17 +23,127 @@ pub struct PlaceInitialOffer<'info> { )] custodian: Account<'info, Custodian>, - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account( + init_if_needed, + payer = payer, + space = 8 + AuctionData::INIT_SPACE, + seeds = [ + AuctionData::SEED_PREFIX, + VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + ], + bump + )] + auction_data: Account<'info, AuctionData>, + + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + from_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = from_router_endpoint.bump, + )] + from_router_endpoint: Account<'info, RouterEndpoint>, + + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + to_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + )] + to_router_endpoint: Account<'info, RouterEndpoint>, + + #[account( + mut, + associated_token::mint = mint, + associated_token::authority = payer + )] + pub auctioneer_token: Account<'info, token::TokenAccount>, + + #[account( + mut, + seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump, + token::mint = mint, + token::authority = custodian + )] + custody_token: Account<'info, token::TokenAccount>, + + #[account(address = common::constants::usdc::id())] + mint: Account<'info, token::Mint>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. #[account(owner = core_bridge_program::id())] vaa: AccountInfo<'info>, system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, } pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> Result<()> { - let vaa = core_bridge_program::VaaAccount::load(&ctx.accounts.vaa)?; + // Make sure the auction hasn't been started for this VAA. + require!( + ctx.accounts.auction_data.status == AuctionStatus::NotStarted, + MatchingEngineError::AuctionAlreadyStarted, + ); + + // Create zero copy reference to `FastMarketOrder` payload. + let vaa = VaaAccount::load(&ctx.accounts.vaa)?; + let msg = + LiquidityLayerPayload::try_from(vaa.try_payload()?) + .map_err(|_| MatchingEngineError::InvalidVaa)?.message(); + let fast_order = + msg.fast_market_order().ok_or(MatchingEngineError::NotFastMarketOrder)?; + + // Check to see if the deadline has expired. + let deadline = fast_order.deadline(); + let current_time = u32::try_from(Clock::get()?.unix_timestamp).ok().unwrap(); + let max_fee = u64::try_from(fast_order.max_fee()).unwrap(); + + require!( + current_time < deadline || deadline == 0, + MatchingEngineError::FastMarketOrderExpired, + ); + require!(fee_offer <= max_fee, MatchingEngineError::OfferPriceTooHigh); + + // Verify that the to and from router endpoints are valid. + verify_router_path( + &ctx.accounts.from_router_endpoint, + &ctx.accounts.to_router_endpoint, + &vaa.try_emitter_info().unwrap(), + fast_order.target_chain() + )?; + + // Parse the transfer amount from the VAA. + let amount = u64::try_from(fast_order.amount_in()).unwrap(); + + // Transfer tokens from the auctioneer to the custodian. + token::transfer( + CpiContext::new( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: ctx.accounts.auctioneer_token.to_account_info(), + to: ctx.accounts.custody_token.to_account_info(), + authority: ctx.accounts.payer.to_account_info(), + } + ), + u64::try_from(amount).unwrap().checked_add(u64::try_from(fee_offer).unwrap()).unwrap() + )?; + // Set up the AuctionData account for this auction. + ctx.accounts.auction_data.set_inner( + AuctionData { + bump: ctx.bumps["auction_data"], + vaa_hash: vaa.try_digest()?.as_ref().try_into().unwrap(), + status: AuctionStatus::Active, + best_offer: *ctx.accounts.payer.key, + initial_auctioneer: *ctx.accounts.payer.key, + start_slot: Clock::get()?.slot, + amount, + security_deposit: max_fee, + offer_price: fee_offer, + } + ); Ok(()) } \ No newline at end of file diff --git a/solana/programs/matching-engine/src/state/auction_data.rs b/solana/programs/matching-engine/src/state/auction_data.rs index 6f39dc51..719ade19 100644 --- a/solana/programs/matching-engine/src/state/auction_data.rs +++ b/solana/programs/matching-engine/src/state/auction_data.rs @@ -1,24 +1,29 @@ use anchor_lang::prelude::*; +use borsh::{BorshDeserialize, BorshSerialize}; +#[derive(BorshSerialize, BorshDeserialize, Clone, Copy, Debug, InitSpace, PartialEq, Eq)] pub enum AuctionStatus { - None, + NotStarted, Active, Completed, } #[account] #[derive(Debug, InitSpace)] -pub struct Custodian { +pub struct AuctionData { pub bump: u8, + /// VAA hash of the auction. + pub vaa_hash: [u8; 32], + /// Auction status. pub status: AuctionStatus, /// The highest bidder of the auction. - pub highest_bidder: Pubkey, + pub best_offer: Pubkey, /// The initial bidder of the auction. - pub initial_bidder: Pubkey, + pub initial_auctioneer: Pubkey, /// The slot at which the auction started. pub start_slot: u64, @@ -33,6 +38,6 @@ pub struct Custodian { pub offer_price: u64, } -impl Custodian { +impl AuctionData { pub const SEED_PREFIX: &'static [u8] = b"auction"; } \ No newline at end of file diff --git a/solana/programs/matching-engine/src/state/mod.rs b/solana/programs/matching-engine/src/state/mod.rs index 2d82dc57..fb37f7db 100644 --- a/solana/programs/matching-engine/src/state/mod.rs +++ b/solana/programs/matching-engine/src/state/mod.rs @@ -6,3 +6,6 @@ pub use payer_sequence::*; mod router_endpoint; pub use router_endpoint::*; + +mod auction_data; +pub use auction_data::*; \ No newline at end of file diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index 1f8679fb..9d2e5968 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -8,6 +8,8 @@ import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; import { AuctionConfig, Custodian, RouterEndpoint } from "./state"; import { WormholeCctpProgram } from "../wormholeCctp"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; +import { AuctionData } from "./state/AuctionData"; +import { USDC_MINT_ADDRESS } from "../../tests/helpers"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -75,16 +77,23 @@ export class MatchingEngineProgram { return this.program.account.routerEndpoint.fetch(addr); } + auctionDataAddress(vaaHash: Buffer): PublicKey { + return AuctionData.address(this.ID, vaaHash); + } + + async fetchAuctionData(vaaHash: Buffer): Promise { + return this.program.account.auctionData.fetch(this.auctionDataAddress(vaaHash)); + } + async initializeIx( auctionConfig: AuctionConfig, accounts: { owner: PublicKey; ownerAssistant: PublicKey; feeRecipient: PublicKey; - mint: PublicKey; } ): Promise { - const { owner, ownerAssistant, feeRecipient, mint } = accounts; + const { owner, ownerAssistant, feeRecipient } = accounts; return this.program.methods .initialize(auctionConfig) @@ -94,7 +103,7 @@ export class MatchingEngineProgram { ownerAssistant, feeRecipient, custodyToken: this.custodyTokenAccountAddress(), - mint, + mint: USDC_MINT_ADDRESS, }) .instruction(); } @@ -205,13 +214,25 @@ export class MatchingEngineProgram { .instruction(); } - async placeInitialOfferIx(feeOffer: number, accounts: { payer: PublicKey; vaa: PublicKey }) { + async placeInitialOfferIx( + feeOffer: bigint, + fromChain: ChainId, + toChain: ChainId, + vaaHash: Buffer, + accounts: { payer: PublicKey; vaa: PublicKey } + ) { const { payer, vaa } = accounts; return this.program.methods - .placeInitialOffer(new BN(feeOffer)) + .placeInitialOffer(new BN(feeOffer.toString())) .accounts({ payer, custodian: this.custodianAddress(), + auctionData: this.auctionDataAddress(vaaHash), + fromRouterEndpoint: this.routerEndpointAddress(fromChain), + toRouterEndpoint: this.routerEndpointAddress(toChain), + auctioneerToken: splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, payer), + custodyToken: this.custodyTokenAccountAddress(), + mint: USDC_MINT_ADDRESS, vaa, }) .instruction(); diff --git a/solana/ts/src/matching_engine/state/AuctionData.ts b/solana/ts/src/matching_engine/state/AuctionData.ts new file mode 100644 index 00000000..041bc16f --- /dev/null +++ b/solana/ts/src/matching_engine/state/AuctionData.ts @@ -0,0 +1,40 @@ +import { PublicKey } from "@solana/web3.js"; +import { BN } from "@coral-xyz/anchor"; + +export class AuctionData { + bump: number; + vaaHash: number[]; + status: Object; + bestOffer: PublicKey; + initialAuctioneer: PublicKey; + startSlot: BN; + amount: BN; + securityDeposit: BN; + offerPrice: BN; + + constructor( + bump: number, + vaaHash: number[], + status: Object, + bestOffer: PublicKey, + initialAuctioneer: PublicKey, + start_slot: BN, + amount: BN, + security_deposit: BN, + offer_price: BN + ) { + this.bump = bump; + this.vaaHash = vaaHash; + this.status = status; + this.bestOffer = bestOffer; + this.initialAuctioneer = initialAuctioneer; + this.startSlot = start_slot; + this.amount = amount; + this.securityDeposit = security_deposit; + this.offerPrice = offer_price; + } + + static address(programId: PublicKey, vaaHash: Buffer) { + return PublicKey.findProgramAddressSync([Buffer.from("auction"), vaaHash], programId)[0]; + } +} diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/02__matchingEngine.ts index 0c5244f9..3a69dfdd 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/02__matchingEngine.ts @@ -1,6 +1,12 @@ -import { CHAINS } from "@certusone/wormhole-sdk"; +import { CHAINS, parseVaa, ChainId, keccak256 } from "@certusone/wormhole-sdk"; import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; +import { + mintTo, + getAccount, + getAssociatedTokenAddressSync, + getOrCreateAssociatedTokenAccount, +} from "@solana/spl-token"; import chaiAsPromised from "chai-as-promised"; import { AuctionConfig, @@ -16,8 +22,11 @@ import { USDC_MINT_ADDRESS, MOCK_GUARDIANS, } from "./helpers"; -import { FastMarketOrder, postFastTransferVaa } from "./helpers/matching_engine_utils"; -import { ethers } from "ethers"; +import { + FastMarketOrder, + getTokenBalance, + postFastTransferVaa, +} from "./helpers/matching_engine_utils"; chaiUse(chaiAsPromised); @@ -30,9 +39,18 @@ describe("Matching Engine", function () { const ownerAssistant = Keypair.generate(); const feeRecipient = Keypair.generate(); const newFeeRecipient = Keypair.generate(); - - const foreignChain = CHAINS.ethereum; - const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const auctioneerOne = Keypair.generate(); + const auctioneerTwo = Keypair.generate(); + + // Foreign endpoints. + const ethChain = CHAINS.ethereum; + const ethRouter = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const ethDomain = 0; + const arbChain = CHAINS.arbitrum; + const arbRouter = Array.from(Buffer.alloc(32, "bead", "hex")); + const arbDomain = 3; + + // Matching Engine program. const engine = new MatchingEngineProgram(connection); describe("Admin", function () { @@ -54,7 +72,6 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, feeRecipient: opts?.feeRecipient ?? feeRecipient.publicKey, - mint: opts?.mint ?? USDC_MINT_ADDRESS, }); it("Cannot Initialize With Default Owner Assistant", async function () { @@ -94,7 +111,6 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, - mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -113,7 +129,6 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, - mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -132,7 +147,6 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, - mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -151,7 +165,6 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, - mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -439,6 +452,7 @@ describe("Matching Engine", function () { describe("Add Router Endpoint", function () { const createAddRouterEndpointIx = (opts?: { sender?: PublicKey; + chain?: ChainId; contractAddress?: Array; }) => engine.addRouterEndpointIx( @@ -446,8 +460,8 @@ describe("Matching Engine", function () { ownerOrAssistant: opts?.sender ?? owner.publicKey, }, { - chain: foreignChain, - address: opts?.contractAddress ?? routerEndpointAddress, + chain: ethChain, + address: opts?.contractAddress ?? ethRouter, } ); @@ -487,7 +501,7 @@ describe("Matching Engine", function () { [ await engine.addRouterEndpointIx( { ownerOrAssistant: owner.publicKey }, - { chain, address: routerEndpointAddress } + { chain, address: ethRouter } ), ], [owner], @@ -522,11 +536,11 @@ describe("Matching Engine", function () { ); const routerEndpointData = await engine.fetchRouterEndpoint( - engine.routerEndpointAddress(foreignChain) + engine.routerEndpointAddress(ethChain) ); const expectedRouterEndpointData = { bump: 255, - chain: foreignChain, + chain: ethChain, address: contractAddress, } as RouterEndpoint; expect(routerEndpointData).to.eql(expectedRouterEndpointData); @@ -537,19 +551,19 @@ describe("Matching Engine", function () { connection, [ await createAddRouterEndpointIx({ - contractAddress: routerEndpointAddress, + contractAddress: ethRouter, }), ], [owner] ); const routerEndpointData = await engine.fetchRouterEndpoint( - engine.routerEndpointAddress(foreignChain) + engine.routerEndpointAddress(ethChain) ); const expectedRouterEndpointData = { bump: 255, - chain: foreignChain, - address: routerEndpointAddress, + chain: ethChain, + address: ethRouter, } as RouterEndpoint; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); @@ -597,43 +611,153 @@ describe("Matching Engine", function () { }); describe("Business Logic", function () { - describe("Place Initial Offer", function () { - let wormholeSequence = 0n; - - const baseFastOrder: FastMarketOrder = { - amountIn: 1000000000000000000n, - minAmountOut: 1000000000000000000n, - targetChain: 1, - targetDomain: 5, - redeemer: Buffer.from("deadbeef", "hex"), - sender: Buffer.from("deadbeef", "hex"), - refundAddress: Buffer.from("deadbeef", "hex"), - slowSequence: 0n, - slowEmitter: Buffer.from("deadbeef", "hex"), - maxFee: 10000n, - initAuctionFee: 100n, - deadline: 0, - redeemerMessage: Buffer.from("All your base are belong to us."), - }; + let wormholeSequence = 0n; + + const baseFastOrder: FastMarketOrder = { + amountIn: 500000000000n, + minAmountOut: 0n, + targetChain: arbChain, + targetDomain: arbDomain, + redeemer: Buffer.from("deadbeef", "hex"), + sender: Buffer.from("beefdead", "hex"), + refundAddress: Buffer.from("deadbeef", "hex"), + slowSequence: 0n, + slowEmitter: Buffer.from("beefdead", "hex"), + maxFee: 10000n, + initAuctionFee: 100n, + deadline: 0, + redeemerMessage: Buffer.from("All your base are belong to us."), + }; + + before("Register To Router Endpoint", async function () { + await expectIxOk( + connection, + [ + await engine.addRouterEndpointIx( + { + ownerOrAssistant: owner.publicKey, + }, + { + chain: arbChain, + address: arbRouter, + } + ), + ], + [owner] + ); + }); + + before("Transfer Lamports to Auctioneers", async function () { + await expectIxOk( + connection, + [ + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: auctioneerOne.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: auctioneerTwo.publicKey, + lamports: 1000000000, + }), + ], + [payer] + ); + }); + + before("Create ATAs For Auctioneers", async function () { + for (const wallet of [auctioneerOne, auctioneerTwo]) { + await getOrCreateAssociatedTokenAccount( + connection, + wallet, + USDC_MINT_ADDRESS, + wallet.publicKey + ); + + // Mint USDC. + const mintAmount = 100000n * 10000000n; + const destination = await getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + wallet.publicKey + ); + + await expect( + mintTo(connection, payer, USDC_MINT_ADDRESS, destination, payer, mintAmount) + ).to.be.fulfilled; + + const { amount } = await getAccount(connection, destination); + expect(amount).equals(mintAmount); + } + }); + describe("Place Initial Offer", function () { it("Place Initial Offer", async function () { - const vaa = await postFastTransferVaa( + const [vaaKey, signedVaa] = await postFastTransferVaa( connection, - payer, + auctioneerOne, MOCK_GUARDIANS, wormholeSequence++, baseFastOrder, - "0x" + Buffer.from(routerEndpointAddress).toString("hex") + "0x" + Buffer.from(ethRouter).toString("hex") ); - const startingOffer = 69000; - const placeInitialOfferIx = engine.placeInitialOfferIx(startingOffer, { - payer: payer.publicKey, - vaa, - }); + // Fetch the balances before. + const auctioneerBefore = await getTokenBalance(connection, auctioneerOne.publicKey); + const custodyBefore = ( + await getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + // Place the initial offer. + await expectIxOk( + connection, + [ + await engine.placeInitialOfferIx( + baseFastOrder.maxFee, + ethChain, + arbChain, + keccak256(parseVaa(signedVaa).hash), + { + payer: auctioneerOne.publicKey, + vaa: vaaKey, + } + ), + ], + [auctioneerOne] + ); + + // Fetch the balances before. + const auctioneerAfter = await getTokenBalance(connection, auctioneerOne.publicKey); + const custodyAfter = ( + await getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + expect(auctioneerAfter).equals( + auctioneerBefore - baseFastOrder.maxFee - baseFastOrder.amountIn + ); + expect(custodyAfter).equals( + custodyBefore + baseFastOrder.maxFee + baseFastOrder.amountIn + ); + + // Confirm the auction data. + const vaaHash = keccak256(parseVaa(signedVaa).hash); + const auctionData = await engine.fetchAuctionData(vaaHash); + const slot = await connection.getSlot(); - await expectIxOk(connection, [await placeInitialOfferIx], [payer]); + expect(auctionData.bump).to.equal(255); + expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionData.status).to.eql({ active: {} }); + expect(auctionData.bestOffer).to.eql(auctioneerOne.publicKey); + expect(auctionData.initialAuctioneer).to.eql(auctioneerOne.publicKey); + expect(auctionData.startSlot.toString()).to.eql(slot.toString()); + expect(auctionData.amount.toString()).to.eql(baseFastOrder.amountIn.toString()); + expect(auctionData.securityDeposit.toString()).to.eql( + baseFastOrder.maxFee.toString() + ); + expect(auctionData.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); }); }); + + describe("Improve Offer", function () {}); }); }); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index 4ff73b66..c5977d2f 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -1,11 +1,21 @@ import { coalesceChainId, parseVaa, tryNativeToHexString } from "@certusone/wormhole-sdk"; import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; +import { getAssociatedTokenAddressSync, getAccount } from "@solana/spl-token"; import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import { Connection, Keypair, PublicKey } from "@solana/web3.js"; import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; -import { WORMHOLE_CONTRACTS } from "../../tests/helpers"; +import { WORMHOLE_CONTRACTS, USDC_MINT_ADDRESS } from "../../tests/helpers"; import { ethers } from "ethers"; +export async function getTokenBalance(connection: Connection, address: PublicKey) { + return ( + await getAccount( + connection, + await getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, address) + ) + ).amount; +} + export async function postVaa( connection: Connection, payer: Keypair, @@ -120,7 +130,7 @@ export async function postFastTransferVaa( sequence: bigint, fastMessage: FastMarketOrder, emitterAddress: string -) { +): Promise<[PublicKey, Buffer]> { const chainName = "ethereum"; const foreignEmitter = new MockEmitter( tryNativeToHexString(emitterAddress, chainName), @@ -138,5 +148,5 @@ export async function postFastTransferVaa( await postVaa(connection, payer, vaaBuf); - return derivePostedVaaKey(WORMHOLE_CONTRACTS.solana.core, parseVaa(vaaBuf).hash); + return [derivePostedVaaKey(WORMHOLE_CONTRACTS.solana.core, parseVaa(vaaBuf).hash), vaaBuf]; } From 87bbd103a747ee677c6accdadd1d15d6c3f4419f Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 11 Jan 2024 16:45:03 -0600 Subject: [PATCH 031/126] redeem fill happy path works --- solana/programs/token-router/src/error.rs | 7 +- .../src/processor/place_market_order/cctp.rs | 15 +- .../src/processor/redeem_fill/cctp.rs | 30 +- .../{wormholeCctp/circle => cctp}/index.ts | 0 .../MessageTransmitterConfig.ts | 0 .../messageTransmitter/UsedNonces.ts | 0 .../messageTransmitter/index.ts | 0 .../{wormholeCctp/circle => cctp}/messages.ts | 23 +- .../RemoteTokenMessenger.ts | 0 .../tokenMessengerMinter/index.ts | 0 .../types/message_transmitter.ts | 0 .../types/token_messenger_minter.ts | 0 solana/ts/src/index.ts | 188 +- solana/ts/src/matching_engine/index.ts | 15 - solana/ts/src/messages.ts | 201 ++ .../src/{wormholeCctp => }/wormhole/index.ts | 0 solana/ts/src/wormholeCctp/consts.ts | 5 - solana/ts/src/wormholeCctp/index.ts | 699 ------- solana/ts/src/wormholeCctp/messages.ts | 89 - solana/ts/src/wormholeCctp/state/Custodian.ts | 15 - .../wormholeCctp/state/RegisteredEmitter.ts | 24 - solana/ts/src/wormholeCctp/state/index.ts | 2 - .../types/wormhole_cctp_solana.ts | 1827 ----------------- solana/ts/tests/01__tokenRouter.ts | 322 ++- solana/ts/tests/helpers/consts.ts | 7 +- solana/ts/tests/helpers/index.ts | 1 + solana/ts/tests/helpers/mock.ts | 57 + 27 files changed, 793 insertions(+), 2734 deletions(-) rename solana/ts/src/{wormholeCctp/circle => cctp}/index.ts (100%) rename solana/ts/src/{wormholeCctp/circle => cctp}/messageTransmitter/MessageTransmitterConfig.ts (100%) rename solana/ts/src/{wormholeCctp/circle => cctp}/messageTransmitter/UsedNonces.ts (100%) rename solana/ts/src/{wormholeCctp/circle => cctp}/messageTransmitter/index.ts (100%) rename solana/ts/src/{wormholeCctp/circle => cctp}/messages.ts (88%) rename solana/ts/src/{wormholeCctp/circle => cctp}/tokenMessengerMinter/RemoteTokenMessenger.ts (100%) rename solana/ts/src/{wormholeCctp/circle => cctp}/tokenMessengerMinter/index.ts (100%) rename solana/ts/src/{wormholeCctp/circle => cctp}/types/message_transmitter.ts (100%) rename solana/ts/src/{wormholeCctp/circle => cctp}/types/token_messenger_minter.ts (100%) create mode 100644 solana/ts/src/messages.ts rename solana/ts/src/{wormholeCctp => }/wormhole/index.ts (100%) delete mode 100644 solana/ts/src/wormholeCctp/consts.ts delete mode 100644 solana/ts/src/wormholeCctp/index.ts delete mode 100644 solana/ts/src/wormholeCctp/messages.ts delete mode 100644 solana/ts/src/wormholeCctp/state/Custodian.ts delete mode 100644 solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts delete mode 100644 solana/ts/src/wormholeCctp/state/index.ts delete mode 100644 solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts create mode 100644 solana/ts/tests/helpers/mock.ts diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 4fcfd1ae..1c7f8f3c 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -41,11 +41,8 @@ pub enum TokenRouterError { #[msg("InvalidCctpEndpoint")] InvalidCctpEndpoint = 0x46, - #[msg("ZeroAmount")] - ZeroAmount = 0x100, - - #[msg("RedeemerZeroAddress")] - RedeemerZeroAddress = 0x102, + #[msg("InsufficientAmount")] + InsufficientAmount = 0x100, #[msg("UnknownEmitter")] InvalidSourceRouter = 0x200, diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index ffc452fd..5dc23197 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -74,10 +74,14 @@ pub struct PlaceMarketOrderCctp<'info> { )] custody_token: AccountInfo<'info>, - /// Registered emitter account representing a foreign Circle Integration emitter. This account - /// exists only when another CCTP network is registered. + /// Registered router endpoint representing a foreign Token Router. This account may have a + /// CCTP domain encoded if this route is CCTP-enabled. For this instruction, it is required that + /// [RouterEndpoint::cctp_domain] is `Some(value)`. /// /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. + /// + /// NOTE: In the EVM implementation, if there is no router endpoint then "ErrUnsupportedChain" + /// error is thrown (whereas here the account would not exist). #[account( seeds = [ RouterEndpoint::SEED_PREFIX, @@ -279,13 +283,10 @@ pub fn place_market_order_cctp( fn check_constraints(args: &PlaceMarketOrderCctpArgs) -> Result<()> { // Even though CCTP prevents zero amount burns, we prefer to throw an explicit error here. - require!(args.amount_in > 0, TokenRouterError::ZeroAmount); + require!(args.amount_in > 0, TokenRouterError::InsufficientAmount); // Cannot send to zero address. - require!( - args.redeemer != [0; 32], - TokenRouterError::RedeemerZeroAddress, - ); + require!(args.redeemer != [0; 32], TokenRouterError::InvalidRedeemer,); // Done. Ok(()) diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 41a27274..2d9fa9b7 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -37,6 +37,14 @@ pub struct RedeemFillCctp<'info> { /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. redeemer: Signer<'info>, + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + dst_token: AccountInfo<'info>, + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message /// from its custody account to this account. @@ -111,6 +119,8 @@ pub struct RedeemFillCctp<'info> { /// /// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArgs) -> Result<()> { + let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + let vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( &ctx.accounts.vaa, CpiContext::new_with_signer( @@ -144,7 +154,7 @@ pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArg .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[custodian_seeds], ), ReceiveMessageArgs { encoded_message: args.encoded_cctp_message, @@ -176,6 +186,20 @@ pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArg TokenRouterError::InvalidRedeemer ); - // Done. - Ok(()) + // Reload the custody token account so we know how much to transfer. + ctx.accounts.custody_token.reload()?; + + // Finally transfer tokens to destination. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.dst_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + ctx.accounts.custody_token.amount, + ) } diff --git a/solana/ts/src/wormholeCctp/circle/index.ts b/solana/ts/src/cctp/index.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/index.ts rename to solana/ts/src/cctp/index.ts diff --git a/solana/ts/src/wormholeCctp/circle/messageTransmitter/MessageTransmitterConfig.ts b/solana/ts/src/cctp/messageTransmitter/MessageTransmitterConfig.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/messageTransmitter/MessageTransmitterConfig.ts rename to solana/ts/src/cctp/messageTransmitter/MessageTransmitterConfig.ts diff --git a/solana/ts/src/wormholeCctp/circle/messageTransmitter/UsedNonces.ts b/solana/ts/src/cctp/messageTransmitter/UsedNonces.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/messageTransmitter/UsedNonces.ts rename to solana/ts/src/cctp/messageTransmitter/UsedNonces.ts diff --git a/solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts b/solana/ts/src/cctp/messageTransmitter/index.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/messageTransmitter/index.ts rename to solana/ts/src/cctp/messageTransmitter/index.ts diff --git a/solana/ts/src/wormholeCctp/circle/messages.ts b/solana/ts/src/cctp/messages.ts similarity index 88% rename from solana/ts/src/wormholeCctp/circle/messages.ts rename to solana/ts/src/cctp/messages.ts index 789844c6..7c898ba5 100644 --- a/solana/ts/src/wormholeCctp/circle/messages.ts +++ b/solana/ts/src/cctp/messages.ts @@ -3,7 +3,7 @@ import { ethers } from "ethers"; export type Cctp = { version: number; sourceDomain: number; - targetDomain: number; + destinationDomain: number; nonce: bigint; sender: Array; recipient: Array; @@ -31,24 +31,24 @@ export class CctpMessage { static decode(buf: Readonly): CctpMessage { const version = buf.readUInt32BE(0); const sourceDomain = buf.readUInt32BE(4); - const targetDomain = buf.readUInt32BE(8); + const destinationDomain = buf.readUInt32BE(8); const nonce = buf.readBigUInt64BE(12); - const sender = Array.from(buf.slice(20, 52)); - const recipient = Array.from(buf.slice(52, 84)); - const targetCaller = Array.from(buf.slice(84, 116)); + const sender = Array.from(buf.subarray(20, 52)); + const recipient = Array.from(buf.subarray(52, 84)); + const targetCaller = Array.from(buf.subarray(84, 116)); const message = buf.subarray(116); return new CctpMessage( { version, sourceDomain, - targetDomain, + destinationDomain, nonce, sender, recipient, targetCaller, }, - message, + message ); } @@ -72,7 +72,7 @@ export class CctpTokenBurnMessage { burnTokenAddress: Array, mintRecipient: Array, amount: bigint, - sender: Array, + sender: Array ) { this.cctp = cctp; this.version = version; @@ -104,7 +104,7 @@ export class CctpTokenBurnMessage { burnTokenAddress, mintRecipient, amount, - sender, + sender ); } @@ -135,12 +135,13 @@ export class CctpTokenBurnMessage { function encodeCctp(cctp: Cctp): Buffer { const buf = Buffer.alloc(116); - const { version, sourceDomain, targetDomain, nonce, sender, recipient, targetCaller } = cctp; + const { version, sourceDomain, destinationDomain, nonce, sender, recipient, targetCaller } = + cctp; let offset = 0; offset = buf.writeUInt32BE(version, offset); offset = buf.writeUInt32BE(sourceDomain, offset); - offset = buf.writeUInt32BE(targetDomain, offset); + offset = buf.writeUInt32BE(destinationDomain, offset); offset = buf.writeBigUInt64BE(nonce, offset); buf.set(sender, offset); offset += 32; diff --git a/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/RemoteTokenMessenger.ts b/solana/ts/src/cctp/tokenMessengerMinter/RemoteTokenMessenger.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/RemoteTokenMessenger.ts rename to solana/ts/src/cctp/tokenMessengerMinter/RemoteTokenMessenger.ts diff --git a/solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts b/solana/ts/src/cctp/tokenMessengerMinter/index.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/tokenMessengerMinter/index.ts rename to solana/ts/src/cctp/tokenMessengerMinter/index.ts diff --git a/solana/ts/src/wormholeCctp/circle/types/message_transmitter.ts b/solana/ts/src/cctp/types/message_transmitter.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/types/message_transmitter.ts rename to solana/ts/src/cctp/types/message_transmitter.ts diff --git a/solana/ts/src/wormholeCctp/circle/types/token_messenger_minter.ts b/solana/ts/src/cctp/types/token_messenger_minter.ts similarity index 100% rename from solana/ts/src/wormholeCctp/circle/types/token_messenger_minter.ts rename to solana/ts/src/cctp/types/token_messenger_minter.ts diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index 326af11e..453e648d 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -1,17 +1,26 @@ +export * from "./cctp"; +export * from "./messages"; export * from "./state"; import { ChainId } from "@certusone/wormhole-sdk"; import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; -import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; +import { + Connection, + PublicKey, + SYSVAR_RENT_PUBKEY, + SystemProgram, + TransactionInstruction, +} from "@solana/web3.js"; import { IDL, TokenRouter } from "../../target/types/token_router"; -import { Custodian, PayerSequence, RouterEndpoint } from "./state"; -import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "./utils"; import { + CctpTokenBurnMessage, MessageTransmitterProgram, TokenMessengerMinterProgram, - WormholeCctpProgram, -} from "./wormholeCctp"; +} from "./cctp"; +import { Custodian, PayerSequence, RouterEndpoint } from "./state"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "./utils"; +import { VaaAccount } from "./wormhole"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; @@ -66,6 +75,24 @@ export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { tokenProgram: PublicKey; }; +export type RedeemFillCctpAccounts = { + custodian: PublicKey; + custodyToken: PublicKey; + routerEndpoint: PublicKey; + messageTransmitterAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + usedNonces: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + tokenPair: PublicKey; + tokenMessengerMinterCustodyToken: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; +}; + export type AddRouterEndpointArgs = { chain: ChainId; address: Array; @@ -147,6 +174,49 @@ export class TokenRouterProgram { return this.program.account.routerEndpoint.fetch(addr); } + commonAccounts(mint?: PublicKey): TokenRouterCommonAccounts { + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + + const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); + const messageTransmitterProgram = this.messageTransmitterProgram(); + + const [localToken, tokenMessengerMinterCustodyToken] = (() => { + if (mint === undefined) { + return []; + } else { + return [ + tokenMessengerMinterProgram.localTokenAddress(mint), + tokenMessengerMinterProgram.custodyTokenAddress(mint), + ]; + } + })(); + + return { + tokenRouterProgram: this.ID, + systemProgram: SystemProgram.programId, + rent: SYSVAR_RENT_PUBKEY, + custodian, + custodyToken: this.custodyTokenAccountAddress(), + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), + tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), + tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), + tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, + messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), + messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + mint, + localToken, + tokenMessengerMinterCustodyToken, + }; + } + async placeMarketOrderCctpAccounts( mint: PublicKey, targetChain: ChainId, @@ -282,6 +352,114 @@ export class TokenRouterProgram { .instruction(); } + async redeemFillCctpAccounts( + vaa: PublicKey, + cctpMessage: CctpTokenBurnMessage | Buffer + ): Promise { + const msg = CctpTokenBurnMessage.from(cctpMessage); + const custodyToken = this.custodyTokenAccountAddress(); + //const redeemerToken = new PublicKey(msg.mintRecipient); + + // TODO: hardcode mint as USDC? + const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); + + const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); + const { chain } = vaaAcct.emitterInfo(); + + const messageTransmitterProgram = this.messageTransmitterProgram(); + const { + authority: messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessengerMinterProgram, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + custodyToken: tokenMessengerMinterCustodyToken, + tokenProgram, + } = messageTransmitterProgram.receiveMessageAccounts(mint, msg); + + return { + custodian: this.custodianAddress(), + custodyToken, + routerEndpoint: this.routerEndpointAddress(chain as ChainId), // yikes + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenProgram, + }; + } + + async redeemFillCctpIx( + accounts: { + payer: PublicKey; + vaa: PublicKey; + redeemer: PublicKey; + dstToken: PublicKey; + }, + args: { + encodedCctpMessage: Buffer; + cctpAttestation: Buffer; + } + ): Promise { + const { payer, vaa, redeemer, dstToken } = accounts; + + const { encodedCctpMessage } = args; + + const { + custodian, + custodyToken, + routerEndpoint, + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + } = await this.redeemFillCctpAccounts(vaa, encodedCctpMessage); + + return this.program.methods + .redeemFillCctp(args) + .accounts({ + payer, + custodian, + vaa, + redeemer, + dstToken, + custodyToken, + routerEndpoint, + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }) + .instruction(); + } + async initializeIx(accounts: { owner: PublicKey; ownerAssistant: PublicKey; diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matching_engine/index.ts index 9d2e5968..eebab6f2 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matching_engine/index.ts @@ -6,7 +6,6 @@ import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; import { AuctionConfig, Custodian, RouterEndpoint } from "./state"; -import { WormholeCctpProgram } from "../wormholeCctp"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { AuctionData } from "./state/AuctionData"; import { USDC_MINT_ADDRESS } from "../../tests/helpers"; @@ -36,20 +35,6 @@ export class MatchingEngineProgram { return this.program.programId; } - wormholeCctpProgram(): WormholeCctpProgram { - switch (this._programId) { - case testnet(): { - return new WormholeCctpProgram( - this.program.provider.connection, - "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW" - ); - } - default: { - throw new Error("unsupported network"); - } - } - } - custodianAddress(): PublicKey { return Custodian.address(this.ID); } diff --git a/solana/ts/src/messages.ts b/solana/ts/src/messages.ts new file mode 100644 index 00000000..b7f8d820 --- /dev/null +++ b/solana/ts/src/messages.ts @@ -0,0 +1,201 @@ +import { ethers } from "ethers"; + +export type DepositHeader = { + tokenAddress: Array; + amount: bigint; + sourceCctpDomain: number; + destinationCctpDomain: number; + cctpNonce: bigint; + burnSource: Array; + mintRecipient: Array; +}; + +export type Fill = { + sourceChain: number; + orderSender: Array; + redeemer: Array; + redeemerMessage: Buffer; +}; + +export type FastFill = { + fill: Fill; + amount: bigint; +}; + +export type SlowOrderResponse = { + baseFee: bigint; +}; + +export type DepositMessage = { + fill?: Fill; + fastFill?: FastFill; + slowOrderResponse?: SlowOrderResponse; +}; + +export class LiquidityLayerDeposit { + deposit: DepositHeader; + message: DepositMessage; + + constructor(deposit: DepositHeader, message: DepositMessage) { + this.deposit = deposit; + this.message = message; + } + + static decode(buf: Buffer): LiquidityLayerDeposit { + if (buf.readUInt8(0) != 1) { + throw new Error("Invalid Wormhole CCTP deposit message"); + } + buf = buf.subarray(1); + + const tokenAddress = Array.from(buf.subarray(0, 32)); + const amount = BigInt(ethers.BigNumber.from(buf.subarray(32, 64)).toString()); + const sourceCctpDomain = buf.readUInt32BE(64); + const destinationCctpDomain = buf.readUInt32BE(68); + const cctpNonce = buf.readBigUint64BE(72); + const burnSource = Array.from(buf.subarray(80, 112)); + const mintRecipient = Array.from(buf.subarray(112, 144)); + const payloadLen = buf.readUInt16BE(144); + const payload = buf.subarray(146, 146 + payloadLen); + + const payloadId = payload.readUInt8(0); + const messageBuf = payload.subarray(1); + + const message = (() => { + switch (payloadId) { + case 11: { + const sourceChain = messageBuf.readUInt16BE(0); + const orderSender = Array.from(messageBuf.subarray(2, 34)); + const redeemer = Array.from(messageBuf.subarray(34, 66)); + const redeemerMessageLen = messageBuf.readUInt32BE(66); + const redeemerMessage = messageBuf.subarray(70, 70 + redeemerMessageLen); + return { + fill: { sourceChain, orderSender, redeemer, redeemerMessage }, + }; + } + case 12: { + const sourceChain = messageBuf.readUInt16BE(0); + const orderSender = Array.from(messageBuf.subarray(2, 34)); + const redeemer = Array.from(messageBuf.subarray(34, 66)); + const redeemerMessageLen = messageBuf.readUInt32BE(66); + const redeemerMessage = messageBuf.subarray(70, 70 + redeemerMessageLen); + const amount = BigInt( + ethers.BigNumber.from( + messageBuf.subarray(70 + redeemerMessageLen, 86 + redeemerMessageLen) + ).toString() + ); + return { + fastFill: { + fill: { sourceChain, orderSender, redeemer, redeemerMessage }, + amount, + }, + }; + } + case 14: { + const baseFee = BigInt(ethers.BigNumber.from(messageBuf).toString()); + return { slowOrderResponse: { baseFee } }; + } + default: { + throw new Error("Invalid Liquidity Layer deposit message"); + } + } + })(); + + return new LiquidityLayerDeposit( + { + tokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient, + }, + message + ); + } + + encode(): Buffer { + const buf = Buffer.alloc(146); + + const { deposit, message } = this; + const { + tokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient, + } = deposit; + + let offset = 0; + buf.set(tokenAddress, offset); + offset += 32; + + // Special handling w/ uint256. This value will most likely encoded in < 32 bytes, so we + // jump ahead by 32 and subtract the length of the encoded value. + const encodedAmount = ethers.utils.arrayify(ethers.BigNumber.from(amount.toString())); + buf.set(encodedAmount, (offset += 32) - encodedAmount.length); + + offset = buf.writeUInt32BE(sourceCctpDomain, offset); + offset = buf.writeUInt32BE(destinationCctpDomain, offset); + offset = buf.writeBigUInt64BE(cctpNonce, offset); + buf.set(burnSource, offset); + offset += 32; + buf.set(mintRecipient, offset); + offset += 32; + + const { fill, fastFill, slowOrderResponse } = message; + const payload = (() => { + if (fill !== undefined) { + const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; + + const messageBuf = Buffer.alloc(70 + redeemerMessage.length); + + let offset = 0; + offset = messageBuf.writeUInt16BE(sourceChain, offset); + messageBuf.set(orderSender, offset); + offset += 32; + messageBuf.set(redeemer, offset); + offset += 32; + offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); + messageBuf.set(redeemerMessage, 70); + offset += redeemerMessage.length; + + return Buffer.concat([Buffer.alloc(1, 11), messageBuf]); + } else if (fastFill !== undefined) { + const { fill, amount } = fastFill; + const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; + + const messageBuf = Buffer.alloc(86 + redeemerMessage.length); + + let offset = 0; + offset = messageBuf.writeUInt16BE(sourceChain, offset); + messageBuf.set(orderSender, offset); + offset += 32; + messageBuf.set(redeemer, offset); + offset += 32; + offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); + messageBuf.set(redeemerMessage, 70); + offset += redeemerMessage.length; + offset = messageBuf.writeBigUInt64BE(amount, offset); + + return Buffer.concat([Buffer.alloc(1, 12), messageBuf]); + } else if (slowOrderResponse !== undefined) { + const { baseFee } = slowOrderResponse; + + const messageBuf = Buffer.alloc(8); + messageBuf.writeBigUInt64BE(baseFee, 0); + + return Buffer.concat([Buffer.alloc(1, 14), messageBuf]); + } else { + throw new Error("Invalid Liquidity Layer deposit message"); + } + })(); + + // Finally write the length. + buf.writeUInt16BE(payload.length, offset); + + return Buffer.concat([Buffer.alloc(1, 1), buf, payload]); + } +} diff --git a/solana/ts/src/wormholeCctp/wormhole/index.ts b/solana/ts/src/wormhole/index.ts similarity index 100% rename from solana/ts/src/wormholeCctp/wormhole/index.ts rename to solana/ts/src/wormhole/index.ts diff --git a/solana/ts/src/wormholeCctp/consts.ts b/solana/ts/src/wormholeCctp/consts.ts deleted file mode 100644 index 20254f8f..00000000 --- a/solana/ts/src/wormholeCctp/consts.ts +++ /dev/null @@ -1,5 +0,0 @@ -import { PublicKey } from "@solana/web3.js"; - -export const BPF_LOADER_UPGRADEABLE_ID = new PublicKey( - "BPFLoaderUpgradeab1e11111111111111111111111" -); diff --git a/solana/ts/src/wormholeCctp/index.ts b/solana/ts/src/wormholeCctp/index.ts deleted file mode 100644 index 180076ac..00000000 --- a/solana/ts/src/wormholeCctp/index.ts +++ /dev/null @@ -1,699 +0,0 @@ -export * from "./circle"; -export * from "./consts"; -export * from "./messages"; -export * from "./state"; -export * from "./wormhole"; - -import { BN, EventParser, Program, utils as anchorUtils } from "@coral-xyz/anchor"; -import * as splToken from "@solana/spl-token"; -import { - AddressLookupTableAccount, - Connection, - PublicKey, - SYSVAR_CLOCK_PUBKEY, - SYSVAR_RENT_PUBKEY, - SystemProgram, - TransactionInstruction, - VersionedTransactionResponse, -} from "@solana/web3.js"; -import { - CctpMessage, - CctpTokenBurnMessage, - MessageTransmitterProgram, - TokenMessengerMinterProgram, -} from "./circle"; -import { BPF_LOADER_UPGRADEABLE_ID } from "./consts"; -import { DepositWithPayload } from "./messages"; -import { Custodian, RegisteredEmitter } from "./state"; -import { IDL, WormholeCctpSolana } from "./types/wormhole_cctp_solana"; -import { Claim, VaaAccount } from "./wormhole"; - -export const PROGRAM_IDS = [ - "Wormho1eCirc1e1ntegration111111111111111111", // mainnet placeholder - "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", // testnet -] as const; - -export type ProgramId = (typeof PROGRAM_IDS)[number]; - -export type TransferTokensWithPayloadArgs = { - amount: bigint; - targetChain: number; - mintRecipient: Array; - nonce: number; - payload: Buffer; -}; - -export type PublishMessageAccounts = { - coreBridgeConfig: PublicKey; - coreEmitterSequence: PublicKey; - coreFeeCollector: PublicKey; - coreBridgeProgram: PublicKey; -}; - -export type WormholeCctpCommonAccounts = PublishMessageAccounts & { - wormholeCctpProgram: PublicKey; - systemProgram: PublicKey; - rent: PublicKey; - custodian: PublicKey; - custodyToken: PublicKey; - tokenMessenger: PublicKey; - tokenMinter: PublicKey; - tokenMessengerMinterSenderAuthority: PublicKey; - tokenMessengerMinterProgram: PublicKey; - messageTransmitterAuthority: PublicKey; - messageTransmitterConfig: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; - mint?: PublicKey; - localToken?: PublicKey; - tokenMessengerMinterCustodyToken?: PublicKey; -}; - -export type TransferTokensWithPayloadAccounts = PublishMessageAccounts & { - custodian: PublicKey; - custodyToken: PublicKey; - registeredEmitter: PublicKey; - tokenMessengerMinterSenderAuthority: PublicKey; - messageTransmitterConfig: PublicKey; - tokenMessenger: PublicKey; - remoteTokenMessenger: PublicKey; - tokenMinter: PublicKey; - localToken: PublicKey; - coreBridgeProgram: PublicKey; - tokenMessengerMinterProgram: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; -}; - -export type RedeemTokensWithPayloadAccounts = { - custodian: PublicKey; - claim: PublicKey; - redeemer: PublicKey; - redeemerToken: PublicKey; - registeredEmitter: PublicKey; - messageTransmitterAuthority: PublicKey; - messageTransmitterConfig: PublicKey; - usedNonces: PublicKey; - tokenMessenger: PublicKey; - remoteTokenMessenger: PublicKey; - tokenMinter: PublicKey; - localToken: PublicKey; - tokenPair: PublicKey; - tokenMessengerMinterCustodyToken: PublicKey; - tokenMessengerMinterProgram: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; -}; - -export type SolanaWormholeCctpTxData = { - coreMessageAccount: PublicKey; - coreMessageSequence: bigint; - encodedCctpMessage: Buffer; -}; - -export class WormholeCctpProgram { - private _programId: ProgramId; - - program: Program; - - constructor(connection: Connection, programId?: ProgramId) { - this._programId = programId ?? testnet(); - this.program = new Program(IDL, new PublicKey(this._programId), { - connection, - }); - } - - get ID(): PublicKey { - return this.program.programId; - } - - upgradeAuthorityAddress(): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("upgrade")], this.ID)[0]; - } - - programDataAddress(): PublicKey { - return PublicKey.findProgramAddressSync([this.ID.toBuffer()], BPF_LOADER_UPGRADEABLE_ID)[0]; - } - - custodianAddress(): PublicKey { - return Custodian.address(this.ID); - } - - async fetchCustodian(addr: PublicKey): Promise { - const { bump, upgradeAuthorityBump } = await this.program.account.custodian.fetch(addr); - return new Custodian(bump, upgradeAuthorityBump); - } - - registeredEmitterAddress(chain: number): PublicKey { - return RegisteredEmitter.address(this.ID, chain); - } - - async fetchRegisteredEmitter(addr: PublicKey): Promise { - const { - bump, - chain: registeredChain, - cctpDomain, - address, - } = await this.program.account.registeredEmitter.fetch(addr); - return new RegisteredEmitter(bump, cctpDomain, registeredChain, address); - } - - custodyTokenAccountAddress(): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; - } - - commonAccounts(mint?: PublicKey): WormholeCctpCommonAccounts { - const custodian = this.custodianAddress(); - const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - this.publishMessageAccounts(custodian); - - const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); - const messageTransmitterProgram = this.messageTransmitterProgram(); - - const [localToken, tokenMessengerMinterCustodyToken] = (() => { - if (mint === undefined) { - return [undefined]; - } else { - return [ - tokenMessengerMinterProgram.localTokenAddress(mint), - tokenMessengerMinterProgram.custodyTokenAddress(mint), - ]; - } - })(); - - return { - wormholeCctpProgram: this.ID, - systemProgram: SystemProgram.programId, - rent: SYSVAR_RENT_PUBKEY, - custodian, - custodyToken: this.custodyTokenAccountAddress(), - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - coreBridgeProgram, - tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), - tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), - tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), - tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, - messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), - messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), - messageTransmitterProgram: messageTransmitterProgram.ID, - tokenProgram: splToken.TOKEN_PROGRAM_ID, - mint, - localToken, - tokenMessengerMinterCustodyToken, - }; - } - - async initializeIx(deployer: PublicKey): Promise { - return this.program.methods - .initialize() - .accounts({ - deployer, - custodian: this.custodianAddress(), - upgradeAuthority: this.upgradeAuthorityAddress(), - programData: this.programDataAddress(), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_ID, - }) - .instruction(); - } - - async registerEmitterAndDomainIx(accounts: { - payer: PublicKey; - vaa: PublicKey; - remoteTokenMessenger?: PublicKey; - }): Promise { - const { payer, vaa, remoteTokenMessenger: inputRemoteTokenMessenger } = accounts; - - const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); - - // Determine claim PDA. - const { chain, address, sequence } = vaaAcct.emitterInfo(); - const claim = Claim.address(this.ID, address, chain, sequence); - - const payload = vaaAcct.payload(); - const registeredEmitter = this.registeredEmitterAddress(payload.readUInt16BE(35)); - const remoteTokenMessenger = (() => { - if (payload.length >= 73) { - const cctpDomain = payload.readUInt32BE(69); - return this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); - } else if (inputRemoteTokenMessenger !== undefined) { - return inputRemoteTokenMessenger; - } else { - throw new Error("remoteTokenMessenger must be provided"); - } - })(); - - return this.program.methods - .registerEmitterAndDomain() - .accounts({ - payer, - custodian: this.custodianAddress(), - vaa, - claim, - registeredEmitter, - remoteTokenMessenger, - }) - .instruction(); - } - - async upgradeContractIx(accounts: { - payer: PublicKey; - vaa: PublicKey; - buffer?: PublicKey; - }): Promise { - const { payer, vaa, buffer: inputBuffer } = accounts; - - const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); - - // Determine claim PDA. - const { chain, address, sequence } = vaaAcct.emitterInfo(); - const claim = Claim.address(this.ID, address, chain, sequence); - - const payload = vaaAcct.payload(); - - return this.program.methods - .upgradeContract() - .accounts({ - payer, - custodian: this.custodianAddress(), - vaa, - claim, - upgradeAuthority: this.upgradeAuthorityAddress(), - spill: payer, - buffer: inputBuffer ?? new PublicKey(payload.subarray(-32)), - programData: this.programDataAddress(), - thisProgram: this.ID, - rent: SYSVAR_RENT_PUBKEY, - clock: SYSVAR_CLOCK_PUBKEY, - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_ID, - }) - .instruction(); - } - - async transferTokensWithPayloadAccounts( - mint: PublicKey, - targetChain: number - ): Promise { - const registeredEmitter = this.registeredEmitterAddress(targetChain); - const remoteDomain = await this.fetchRegisteredEmitter(registeredEmitter).then( - (acct) => acct.cctpDomain - ); - - const { - senderAuthority: tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - messageTransmitterProgram, - tokenMessengerMinterProgram, - tokenProgram, - } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); - - const custodian = this.custodianAddress(); - const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - this.publishMessageAccounts(custodian); - - return { - custodian, - custodyToken: this.custodyTokenAccountAddress(), - registeredEmitter, - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - coreBridgeProgram, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - }; - } - - async transferTokensWithPayloadIx( - accounts: { - payer: PublicKey; - sender: PublicKey; - mint: PublicKey; - srcToken: PublicKey; - coreMessage: PublicKey; - }, - args: TransferTokensWithPayloadArgs - ): Promise { - let { payer, sender, mint, srcToken, coreMessage } = accounts; - - const { amount, targetChain, mintRecipient, nonce, payload } = args; - - const { - custodian, - custodyToken, - registeredEmitter, - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - coreBridgeProgram, - tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - } = await this.transferTokensWithPayloadAccounts(mint, targetChain); - - return this.program.methods - .transferTokensWithPayload({ - amount: new BN(amount.toString()), - mintRecipient, - nonce, - payload, - }) - .accounts({ - payer, - custodian, - sender, - mint, - srcToken, - custodyToken, - registeredEmitter, - coreBridgeConfig, - coreMessage, - coreEmitterSequence, - coreFeeCollector, - tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - coreBridgeProgram, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - }) - .instruction(); - } - - async redeemTokensWithPayloadAccounts( - vaa: PublicKey, - circleMessage: CctpTokenBurnMessage | Buffer - ): Promise { - const msg = CctpTokenBurnMessage.from(circleMessage); - const redeemerToken = new PublicKey(msg.mintRecipient); - const [mint, redeemer] = await splToken - .getAccount(this.program.provider.connection, redeemerToken) - .then((token) => [token.mint, token.owner]); - - // Determine claim PDA. - const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); - const { chain, address, sequence } = vaaAcct.emitterInfo(); - const claim = Claim.address(this.ID, address, chain, sequence); - - const messageTransmitterProgram = this.messageTransmitterProgram(); - const { - authority: messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessengerMinterProgram, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - custodyToken: tokenMessengerMinterCustodyToken, - tokenProgram, - } = messageTransmitterProgram.receiveMessageAccounts(mint, msg); - - return { - custodian: this.custodianAddress(), - claim, - redeemer, - redeemerToken, - registeredEmitter: this.registeredEmitterAddress(chain), - messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - tokenMessengerMinterCustodyToken, - tokenMessengerMinterProgram, - messageTransmitterProgram: messageTransmitterProgram.ID, - tokenProgram, - }; - } - - async redeemTokensWithPayloadIx( - accounts: { - payer: PublicKey; - vaa: PublicKey; - }, - args: { - encodedCctpMessage: Buffer; - cctpAttestation: Buffer; - } - ): Promise { - const { payer, vaa } = accounts; - - const { encodedCctpMessage } = args; - - const { - custodian, - claim, - redeemer, - redeemerToken, - registeredEmitter, - messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - tokenMessengerMinterCustodyToken, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - } = await this.redeemTokensWithPayloadAccounts(vaa, encodedCctpMessage); - - return this.program.methods - .redeemTokensWithPayload(args) - .accounts({ - payer, - custodian, - vaa, - claim, - redeemer, - redeemerToken, - registeredEmitter, - messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - tokenMessengerMinterCustodyToken, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - }) - .instruction(); - } - - tokenMessengerMinterProgram(): TokenMessengerMinterProgram { - switch (this._programId) { - case testnet(): { - return new TokenMessengerMinterProgram( - this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" - ); - } - case mainnet(): { - return new TokenMessengerMinterProgram( - this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" - ); - } - default: { - throw new Error("unsupported network"); - } - } - } - - messageTransmitterProgram(): MessageTransmitterProgram { - switch (this._programId) { - case testnet(): { - return new MessageTransmitterProgram( - this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" - ); - } - case mainnet(): { - return new MessageTransmitterProgram( - this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" - ); - } - default: { - throw new Error("unsupported network"); - } - } - } - - publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { - const coreBridgeProgram = this.coreBridgeProgramId(); - - return { - coreBridgeConfig: PublicKey.findProgramAddressSync( - [Buffer.from("Bridge")], - coreBridgeProgram - )[0], - coreEmitterSequence: PublicKey.findProgramAddressSync( - [Buffer.from("Sequence"), emitter.toBuffer()], - coreBridgeProgram - )[0], - coreFeeCollector: PublicKey.findProgramAddressSync( - [Buffer.from("fee_collector")], - coreBridgeProgram - )[0], - coreBridgeProgram, - }; - } - - coreBridgeProgramId(): PublicKey { - switch (this._programId) { - case testnet(): { - return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); - } - case mainnet(): { - return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); - } - default: { - throw new Error("unsupported network"); - } - } - } - - async parseTransactionReceipt( - txReceipt: VersionedTransactionResponse, - addressLookupTableAccounts?: AddressLookupTableAccount[] - ): Promise { - if (txReceipt.meta === null) { - throw new Error("meta not found in tx"); - } - - const txMeta = txReceipt.meta; - if (txMeta.logMessages === undefined || txMeta.logMessages === null) { - throw new Error("logMessages not found in tx"); - } - - const txLogMessages = txMeta.logMessages; - - // Decode message field from MessageSent event. - const messageTransmitterProgram = this.messageTransmitterProgram(); - const parser = new EventParser( - messageTransmitterProgram.ID, - messageTransmitterProgram.program.coder - ); - - // Map these puppies based on nonce. - const encodedCctpMessages = new Map(); - for (const parsed of parser.parseLogs(txLogMessages, false)) { - const msg = parsed.data.message as Buffer; - encodedCctpMessages.set(CctpMessage.decode(msg).cctp.nonce, msg); - } - - const fetchedKeys = txReceipt.transaction.message.getAccountKeys({ - addressLookupTableAccounts, - }); - const accountKeys = fetchedKeys.staticAccountKeys; - if (fetchedKeys.accountKeysFromLookups !== undefined) { - accountKeys.push( - ...fetchedKeys.accountKeysFromLookups.writable, - ...fetchedKeys.accountKeysFromLookups.readonly - ); - } - - const coreBridgeProgramIndex = accountKeys.findIndex((key) => - key.equals(this.coreBridgeProgramId()) - ); - const tokenMessengerMinterProgramIndex = accountKeys.findIndex((key) => - key.equals(this.tokenMessengerMinterProgram().ID) - ); - const messageTransmitterProgramIndex = accountKeys.findIndex((key) => - key.equals(this.messageTransmitterProgram().ID) - ); - if ( - coreBridgeProgramIndex == -1 && - tokenMessengerMinterProgramIndex == -1 && - messageTransmitterProgramIndex == -1 - ) { - return []; - } - - if (txMeta.innerInstructions === undefined || txMeta.innerInstructions === null) { - throw new Error("innerInstructions not found in tx"); - } - const txInnerInstructions = txMeta.innerInstructions; - - const custodian = this.custodianAddress(); - const postedMessageKeys: PublicKey[] = []; - for (const innerIx of txInnerInstructions) { - // Traverse instructions to find messages posted by the Wormhole CCTP program. - for (const ixInfo of innerIx.instructions) { - if ( - ixInfo.programIdIndex == coreBridgeProgramIndex && - anchorUtils.bytes.bs58.decode(ixInfo.data)[0] == 1 && - accountKeys[ixInfo.accounts[2]].equals(custodian) - ) { - postedMessageKeys.push(accountKeys[ixInfo.accounts[1]]); - } - } - } - - return this.program.provider.connection - .getMultipleAccountsInfo(postedMessageKeys) - .then((infos) => - infos.map((info, i) => { - if (info === null) { - throw new Error("message info is null"); - } - const payload = info.data.subarray(95); - const nonce = DepositWithPayload.decode(payload).deposit.cctpNonce; - const encodedCctpMessage = encodedCctpMessages.get(nonce); - if (encodedCctpMessage === undefined) { - throw new Error( - `cannot find CCTP message with nonce ${nonce} in tx receipt` - ); - } - - return { - coreMessageAccount: postedMessageKeys[i], - coreMessageSequence: info.data.readBigUInt64LE(49), - encodedCctpMessage, - }; - }) - ); - } -} - -export function mainnet(): ProgramId { - return "Wormho1eCirc1e1ntegration111111111111111111"; -} - -export function testnet(): ProgramId { - return "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW"; -} diff --git a/solana/ts/src/wormholeCctp/messages.ts b/solana/ts/src/wormholeCctp/messages.ts deleted file mode 100644 index f012df96..00000000 --- a/solana/ts/src/wormholeCctp/messages.ts +++ /dev/null @@ -1,89 +0,0 @@ -import { ethers } from "ethers"; - -export type Deposit = { - tokenAddress: Array; - amount: bigint; - sourceCctpDomain: number; - targetCctpDomain: number; - cctpNonce: bigint; - sender: Array; - mintRecipient: Array; - payloadLen: number; -}; - -export class DepositWithPayload { - deposit: Deposit; - payload: Buffer; - - constructor(deposit: Deposit, payload: Buffer) { - this.deposit = deposit; - this.payload = payload; - } - - static decode(buf: Buffer): DepositWithPayload { - if (buf.readUInt8(0) != 1) { - throw new Error("Invalid Wormhole CCTP deposit message"); - } - buf = buf.subarray(1); - - const tokenAddress = Array.from(buf.subarray(0, 32)); - const amount = BigInt(ethers.BigNumber.from(buf.subarray(32, 64)).toString()); - const sourceCctpDomain = buf.readUInt32BE(64); - const targetCctpDomain = buf.readUInt32BE(68); - const cctpNonce = buf.readBigUint64BE(72); - const sender = Array.from(buf.subarray(80, 112)); - const mintRecipient = Array.from(buf.subarray(112, 144)); - const payloadLen = buf.readUInt16BE(144); - const payload = buf.subarray(146, 146 + payloadLen); - - return new DepositWithPayload( - { - tokenAddress, - amount, - sourceCctpDomain, - targetCctpDomain, - cctpNonce, - sender, - mintRecipient, - payloadLen, - }, - payload - ); - } - - encode(): Buffer { - const buf = Buffer.alloc(146); - - const { deposit, payload } = this; - const { - tokenAddress, - amount, - sourceCctpDomain, - targetCctpDomain, - cctpNonce, - sender, - mintRecipient, - payloadLen, - } = deposit; - - let offset = 0; - buf.set(tokenAddress, offset); - offset += 32; - - // Special handling w/ uint256. This value will most likely encoded in < 32 bytes, so we - // jump ahead by 32 and subtract the length of the encoded value. - const encodedAmount = ethers.utils.arrayify(ethers.BigNumber.from(amount.toString())); - buf.set(encodedAmount, (offset += 32) - encodedAmount.length); - - offset = buf.writeUInt32BE(sourceCctpDomain, offset); - offset = buf.writeUInt32BE(targetCctpDomain, offset); - offset = buf.writeBigUInt64BE(cctpNonce, offset); - buf.set(sender, offset); - offset += 32; - buf.set(mintRecipient, offset); - offset += 32; - offset = buf.writeUInt16BE(payloadLen, offset); - - return Buffer.concat([Buffer.alloc(1, 1), buf, payload]); - } -} diff --git a/solana/ts/src/wormholeCctp/state/Custodian.ts b/solana/ts/src/wormholeCctp/state/Custodian.ts deleted file mode 100644 index 87978732..00000000 --- a/solana/ts/src/wormholeCctp/state/Custodian.ts +++ /dev/null @@ -1,15 +0,0 @@ -import { PublicKey } from "@solana/web3.js"; - -export class Custodian { - bump: number; - upgradeAuthorityBump: number; - - constructor(bump: number, upgradeAuthorityBump: number) { - this.bump = bump; - this.upgradeAuthorityBump = upgradeAuthorityBump; - } - - static address(programId: PublicKey): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("emitter")], programId)[0]; - } -} diff --git a/solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts b/solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts deleted file mode 100644 index ff26a470..00000000 --- a/solana/ts/src/wormholeCctp/state/RegisteredEmitter.ts +++ /dev/null @@ -1,24 +0,0 @@ -import { PublicKey } from "@solana/web3.js"; - -export class RegisteredEmitter { - bump: number; - cctpDomain: number; - chain: number; - address: Array; - - constructor(bump: number, cctpDomain: number, chain: number, address: Array) { - this.bump = bump; - this.cctpDomain = cctpDomain; - this.chain = chain; - this.address = address; - } - - static address(programId: PublicKey, chain: number): PublicKey { - const encodedChain = Buffer.alloc(2); - encodedChain.writeUInt16BE(chain, 0); - return PublicKey.findProgramAddressSync( - [Buffer.from("registered_emitter"), encodedChain], - programId, - )[0]; - } -} diff --git a/solana/ts/src/wormholeCctp/state/index.ts b/solana/ts/src/wormholeCctp/state/index.ts deleted file mode 100644 index ee7ed898..00000000 --- a/solana/ts/src/wormholeCctp/state/index.ts +++ /dev/null @@ -1,2 +0,0 @@ -export * from "./Custodian"; -export * from "./RegisteredEmitter"; diff --git a/solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts b/solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts deleted file mode 100644 index 2ef6dd8b..00000000 --- a/solana/ts/src/wormholeCctp/types/wormhole_cctp_solana.ts +++ /dev/null @@ -1,1827 +0,0 @@ -export type WormholeCctpSolana = { - "version": "0.0.0-alpha.8", - "name": "wormhole_cctp_solana", - "constants": [ - { - "name": "UPGRADE_SEED_PREFIX", - "type": "bytes", - "value": "[117, 112, 103, 114, 97, 100, 101]" - }, - { - "name": "CUSTODY_TOKEN_SEED_PREFIX", - "type": "bytes", - "value": "[99, 117, 115, 116, 111, 100, 121]" - } - ], - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "deployer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "upgrade this program's executable. We verify this PDA address here out of convenience to get", - "the PDA bump seed to invoke the upgrade." - ] - }, - { - "name": "programData", - "isMut": true, - "isSigner": false - }, - { - "name": "bpfLoaderUpgradeableProgram", - "isMut": false, - "isSigner": false, - "docs": [ - "BPF Loader Upgradeable program.", - "", - "program." - ] - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - }, - { - "name": "transferTokensWithPayload", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true, - "docs": [ - "Owner of the token account, which will have its funds burned by Circle's Token Messenger", - "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", - "message CPI call." - ] - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] - }, - { - "name": "sender", - "isMut": false, - "isSigner": true, - "docs": [ - "Signer acting as the authority to invoke this instruction. This pubkey address will be", - "encoded as the sender address.", - "", - "NOTE: Unlike Token Bridge, the sender address cannot be a program ID (where this could have", - "acted as a program's authority to send tokens). We implemented it this way because we want", - "to keep the same authority for both burning and minting. For programs, this poses a problem", - "because the program itself cannot be the owner of a token account; its PDA acts as the", - "owner. And because the mint recipient (in our case the mint redeemer) must be the owner of", - "the token account when these tokens are minted, we cannot use a program ID as this", - "authority." - ] - }, - { - "name": "mint", - "isMut": true, - "isSigner": false, - "docs": [ - "Payer Token Account's mint. This mint should be the same one as the one encoded in the", - "source (payer) token account.", - "", - "Messenger Minter program's job to validate this mint. But we will check that this mint", - "address matches the one encoded in the local token account." - ] - }, - { - "name": "srcToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Account. Circle's Token Messenger Minter will burn the configured amount from", - "this account.", - "", - "NOTE: This account will be managed by the sender authority. It is required that the token", - "account owner delegate authority to the sender authority prior to executing this", - "instruction." - ] - }, - { - "name": "custodyToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole CCTP custody token account. This account will be closed at the end of this", - "instruction. It just acts as a conduit to allow this program to be the transfer initiator in", - "the Circle message." - ] - }, - { - "name": "registeredEmitter", - "isMut": false, - "isSigner": false, - "docs": [ - "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", - "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", - "seeds::program = Wormhole CCTP program." - ] - }, - { - "name": "coreBridgeConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge config. Seeds = \\[\"Bridge\"\\], seeds::program = Core Bridge program.", - "", - "instruction handler." - ] - }, - { - "name": "coreMessage", - "isMut": true, - "isSigner": true - }, - { - "name": "coreEmitterSequence", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge emitter sequence. Seeds = \\[\"Sequence\"\\], seeds::program =Core Bridge", - "program.", - "", - "instruction handler." - ] - }, - { - "name": "coreFeeCollector", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge fee collector. Seeds = \\[\"fee_collector\"\\], seeds::program =", - "core_bridge_program. This account should be passed in as Some(fee_collector) if there is a", - "message fee.", - "", - "instruction handler." - ] - }, - { - "name": "tokenMessengerMinterSenderAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's sender authority. Seeds = \\[\"sender_authority\"\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "messageTransmitterConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", - "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", - "", - "Messenger Minter program burns the tokens. See the account loader in the instruction", - "handler." - ] - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Remote Token Messenger account. Seeds =", - "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "coreBridgeProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "clock", - "isMut": false, - "isSigner": false - }, - { - "name": "rent", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "args", - "type": { - "defined": "TransferTokensWithPayloadArgs" - } - } - ] - }, - { - "name": "redeemTokensWithPayload", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true, - "docs": [ - "Owner of the token account, which will have its funds burned by Circle's Token Messenger", - "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", - "message CPI call." - ] - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] - }, - { - "name": "vaa", - "isMut": false, - "isSigner": false - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge::claim_vaa) is called." - ] - }, - { - "name": "redeemer", - "isMut": false, - "isSigner": true, - "docs": [ - "Redeemer, who owns the token account that will receive the minted tokens.", - "", - "program requires that this recipient be a signer so an integrator has control over when he", - "receives his tokens." - ] - }, - { - "name": "redeemerToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Account. Circle's Token Messenger Minter will burn the configured amount from", - "this account.", - "", - "NOTE: This account is the encoded mint recipient in the Circle message. This program", - "adds a constraint that the redeemer must own this account." - ] - }, - { - "name": "registeredEmitter", - "isMut": false, - "isSigner": false, - "docs": [ - "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", - "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", - "seeds::program = Wormhole CCTP program." - ] - }, - { - "name": "messageTransmitterAuthority", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", - "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", - "", - "Messenger Minter program burns the tokens. See the account loader in the instruction", - "handler." - ] - }, - { - "name": "usedNonces", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Remote Token Messenger account. Seeds =", - "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", - "seeds::program = token_messenger_minter_program.", - "", - "The Token Messenger Minter program needs this account. We do not perform any checks", - "in this instruction handler." - ] - }, - { - "name": "tokenPair", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterCustodyToken", - "isMut": true, - "isSigner": false, - "docs": [ - "recipients. This account is topped off by \"pre-minters\"." - ] - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "args", - "type": { - "defined": "RedeemTokensWithPayloadArgs" - } - } - ] - }, - { - "name": "registerEmitterAndDomain", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false - }, - { - "name": "vaa", - "isMut": true, - "isSigner": false - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge::claim_vaa) is called." - ] - }, - { - "name": "registeredEmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - }, - { - "name": "upgradeContract", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false - }, - { - "name": "vaa", - "isMut": false, - "isSigner": false, - "docs": [ - "instruction handler, which also checks this account discriminator (so there is no need to", - "check PDA seeds here)." - ] - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge_sdk::cpi::claim_vaa) is called." - ] - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "upgrade this program's executable. We verify this PDA address here out of convenience to get", - "the PDA bump seed to invoke the upgrade." - ] - }, - { - "name": "spill", - "isMut": true, - "isSigner": false - }, - { - "name": "buffer", - "isMut": true, - "isSigner": false, - "docs": [ - "against the one encoded in the governance VAA." - ] - }, - { - "name": "programData", - "isMut": true, - "isSigner": false - }, - { - "name": "thisProgram", - "isMut": true, - "isSigner": false - }, - { - "name": "rent", - "isMut": false, - "isSigner": false - }, - { - "name": "clock", - "isMut": false, - "isSigner": false - }, - { - "name": "bpfLoaderUpgradeableProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - } - ], - "accounts": [ - { - "name": "custodian", - "docs": [ - "Emitter config account. This account is used to perform the following:", - "1. It is the emitter authority for the Core Bridge program.", - "2. It acts as the custody token account owner for token transfers." - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "bump", - "type": "u8" - }, - { - "name": "upgradeAuthorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "registeredEmitter", - "type": { - "kind": "struct", - "fields": [ - { - "name": "bump", - "type": "u8" - }, - { - "name": "cctpDomain", - "type": "u32" - }, - { - "name": "chain", - "type": "u16" - }, - { - "name": "address", - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - } - ], - "types": [ - { - "name": "RedeemTokensWithPayloadArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "encodedCctpMessage", - "type": "bytes" - }, - { - "name": "cctpAttestation", - "type": "bytes" - } - ] - } - }, - { - "name": "TransferTokensWithPayloadArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "mintRecipient", - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "nonce", - "type": "u32" - }, - { - "name": "payload", - "type": "bytes" - } - ] - } - }, - { - "name": "ReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "message", - "type": "bytes" - }, - { - "name": "attestation", - "type": "bytes" - } - ] - } - }, - { - "name": "DepositForBurnWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "docs": [ - "Transfer amount." - ], - "type": "u64" - }, - { - "name": "destinationDomain", - "docs": [ - "Circle domain value of the token to be transferred." - ], - "type": "u32" - }, - { - "name": "mintRecipient", - "docs": [ - "Recipient of assets on target network.", - "", - "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", - "weird because this address is one for another network. We are making it a 32-byte fixed", - "array instead." - ], - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "destinationCaller", - "docs": [ - "Expected caller on target network.", - "", - "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", - "weird because this address is one for another network. We are making it a 32-byte fixed", - "array instead." - ], - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - }, - { - "name": "RemoteTokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - } - ], - "errors": [ - { - "code": 6002, - "name": "CannotParseMessage", - "msg": "CannotParseMessage" - }, - { - "code": 6003, - "name": "InvalidGovernanceEmitter", - "msg": "InvalidGovernanceEmitter" - }, - { - "code": 6004, - "name": "InvalidGovernanceVaa", - "msg": "InvalidGovernanceVaa" - }, - { - "code": 6005, - "name": "InvalidGovernanceAction", - "msg": "InvalidGovernanceAction" - }, - { - "code": 6006, - "name": "InvalidWormholeFinality", - "msg": "InvalidWormholeFinality" - }, - { - "code": 6007, - "name": "GovernanceForAnotherChain", - "msg": "GovernanceForAnotherChain" - }, - { - "code": 6008, - "name": "ImplementationMismatch", - "msg": "ImplementationMismatch" - }, - { - "code": 6009, - "name": "InvalidForeignChain", - "msg": "InvalidForeignChain" - }, - { - "code": 6010, - "name": "InvalidForeignEmitter", - "msg": "InvalidForeignEmitter" - }, - { - "code": 6011, - "name": "InvalidCctpDomain", - "msg": "InvalidCctpDomain" - }, - { - "code": 6012, - "name": "InvalidProgramSender", - "msg": "InvalidProgramSender" - }, - { - "code": 6013, - "name": "ZeroAmount", - "msg": "ZeroAmount" - }, - { - "code": 6014, - "name": "InvalidMintRecipient", - "msg": "InvalidMintRecipient" - }, - { - "code": 6015, - "name": "ExecutableDisallowed", - "msg": "ExecutableDisallowed" - }, - { - "code": 6016, - "name": "InvalidEmitter", - "msg": "InvalidEmitter" - }, - { - "code": 6017, - "name": "InvalidWormholeCctpMessage", - "msg": "InvalidWormholeCctpMessage" - }, - { - "code": 6018, - "name": "InvalidRegisteredEmitterCctpDomain", - "msg": "InvalidRegisteredEmitterCctpDomain" - }, - { - "code": 6019, - "name": "TargetDomainNotSolana", - "msg": "TargetDomainNotSolana" - }, - { - "code": 6020, - "name": "SourceCctpDomainMismatch", - "msg": "SourceCctpDomainMismatch" - }, - { - "code": 6021, - "name": "TargetCctpDomainMismatch", - "msg": "TargetCctpDomainMismatch" - }, - { - "code": 6022, - "name": "CctpNonceMismatch", - "msg": "CctpNonceMismatch" - }, - { - "code": 6023, - "name": "InvalidCctpMessage", - "msg": "InvalidCctpMessage" - }, - { - "code": 6024, - "name": "RedeemerTokenMismatch", - "msg": "RedeemerTokenMismatch" - } - ] -}; - -export const IDL: WormholeCctpSolana = { - "version": "0.0.0-alpha.8", - "name": "wormhole_cctp_solana", - "constants": [ - { - "name": "UPGRADE_SEED_PREFIX", - "type": "bytes", - "value": "[117, 112, 103, 114, 97, 100, 101]" - }, - { - "name": "CUSTODY_TOKEN_SEED_PREFIX", - "type": "bytes", - "value": "[99, 117, 115, 116, 111, 100, 121]" - } - ], - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "deployer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "upgrade this program's executable. We verify this PDA address here out of convenience to get", - "the PDA bump seed to invoke the upgrade." - ] - }, - { - "name": "programData", - "isMut": true, - "isSigner": false - }, - { - "name": "bpfLoaderUpgradeableProgram", - "isMut": false, - "isSigner": false, - "docs": [ - "BPF Loader Upgradeable program.", - "", - "program." - ] - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - }, - { - "name": "transferTokensWithPayload", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true, - "docs": [ - "Owner of the token account, which will have its funds burned by Circle's Token Messenger", - "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", - "message CPI call." - ] - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] - }, - { - "name": "sender", - "isMut": false, - "isSigner": true, - "docs": [ - "Signer acting as the authority to invoke this instruction. This pubkey address will be", - "encoded as the sender address.", - "", - "NOTE: Unlike Token Bridge, the sender address cannot be a program ID (where this could have", - "acted as a program's authority to send tokens). We implemented it this way because we want", - "to keep the same authority for both burning and minting. For programs, this poses a problem", - "because the program itself cannot be the owner of a token account; its PDA acts as the", - "owner. And because the mint recipient (in our case the mint redeemer) must be the owner of", - "the token account when these tokens are minted, we cannot use a program ID as this", - "authority." - ] - }, - { - "name": "mint", - "isMut": true, - "isSigner": false, - "docs": [ - "Payer Token Account's mint. This mint should be the same one as the one encoded in the", - "source (payer) token account.", - "", - "Messenger Minter program's job to validate this mint. But we will check that this mint", - "address matches the one encoded in the local token account." - ] - }, - { - "name": "srcToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Account. Circle's Token Messenger Minter will burn the configured amount from", - "this account.", - "", - "NOTE: This account will be managed by the sender authority. It is required that the token", - "account owner delegate authority to the sender authority prior to executing this", - "instruction." - ] - }, - { - "name": "custodyToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole CCTP custody token account. This account will be closed at the end of this", - "instruction. It just acts as a conduit to allow this program to be the transfer initiator in", - "the Circle message." - ] - }, - { - "name": "registeredEmitter", - "isMut": false, - "isSigner": false, - "docs": [ - "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", - "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", - "seeds::program = Wormhole CCTP program." - ] - }, - { - "name": "coreBridgeConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge config. Seeds = \\[\"Bridge\"\\], seeds::program = Core Bridge program.", - "", - "instruction handler." - ] - }, - { - "name": "coreMessage", - "isMut": true, - "isSigner": true - }, - { - "name": "coreEmitterSequence", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge emitter sequence. Seeds = \\[\"Sequence\"\\], seeds::program =Core Bridge", - "program.", - "", - "instruction handler." - ] - }, - { - "name": "coreFeeCollector", - "isMut": true, - "isSigner": false, - "docs": [ - "Wormhole Core Bridge fee collector. Seeds = \\[\"fee_collector\"\\], seeds::program =", - "core_bridge_program. This account should be passed in as Some(fee_collector) if there is a", - "message fee.", - "", - "instruction handler." - ] - }, - { - "name": "tokenMessengerMinterSenderAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's sender authority. Seeds = \\[\"sender_authority\"\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "messageTransmitterConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", - "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", - "", - "Messenger Minter program burns the tokens. See the account loader in the instruction", - "handler." - ] - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Remote Token Messenger account. Seeds =", - "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "coreBridgeProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "clock", - "isMut": false, - "isSigner": false - }, - { - "name": "rent", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "args", - "type": { - "defined": "TransferTokensWithPayloadArgs" - } - } - ] - }, - { - "name": "redeemTokensWithPayload", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true, - "docs": [ - "Owner of the token account, which will have its funds burned by Circle's Token Messenger", - "Minter program. This account also acts as the payer for Wormhole Core Bridge's publish", - "message CPI call." - ] - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] - }, - { - "name": "vaa", - "isMut": false, - "isSigner": false - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge::claim_vaa) is called." - ] - }, - { - "name": "redeemer", - "isMut": false, - "isSigner": true, - "docs": [ - "Redeemer, who owns the token account that will receive the minted tokens.", - "", - "program requires that this recipient be a signer so an integrator has control over when he", - "receives his tokens." - ] - }, - { - "name": "redeemerToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Account. Circle's Token Messenger Minter will burn the configured amount from", - "this account.", - "", - "NOTE: This account is the encoded mint recipient in the Circle message. This program", - "adds a constraint that the redeemer must own this account." - ] - }, - { - "name": "registeredEmitter", - "isMut": false, - "isSigner": false, - "docs": [ - "Wormhole CCTP registered emitter account. This account exists only when another CCTP network", - "is registered. Seeds = \\[\"registered_emitter\", target_chain.to_be_bytes()\\],", - "seeds::program = Wormhole CCTP program." - ] - }, - { - "name": "messageTransmitterAuthority", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterConfig", - "isMut": true, - "isSigner": false, - "docs": [ - "Circle Message Transmitter Config account, which belongs to the Message Transmitter Program.", - "Seeds = \\[\"messenger_transmitter\"\\], seeds::program = message_transmitter_program.", - "", - "Messenger Minter program burns the tokens. See the account loader in the instruction", - "handler." - ] - }, - { - "name": "usedNonces", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Messenger account. Seeds = \\[\"token_messenger\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Remote Token Messenger account. Seeds =", - "\\[\"remote_token_messenger\", destination_domain.to_string()\\], seeds::program =", - "token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Token Minter account. Seeds = \\[\"token_minter\"\\],", - "seeds::program = token_messenger_minter_program.", - "", - "in this instruction handler." - ] - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false, - "docs": [ - "Token Messenger Minter's Local Token account. Seeds = \\[\"local_token\", mint\\],", - "seeds::program = token_messenger_minter_program.", - "", - "The Token Messenger Minter program needs this account. We do not perform any checks", - "in this instruction handler." - ] - }, - { - "name": "tokenPair", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterCustodyToken", - "isMut": true, - "isSigner": false, - "docs": [ - "recipients. This account is topped off by \"pre-minters\"." - ] - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "args", - "type": { - "defined": "RedeemTokensWithPayloadArgs" - } - } - ] - }, - { - "name": "registerEmitterAndDomain", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false - }, - { - "name": "vaa", - "isMut": true, - "isSigner": false - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge::claim_vaa) is called." - ] - }, - { - "name": "registeredEmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - }, - { - "name": "upgradeContract", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": false, - "isSigner": false - }, - { - "name": "vaa", - "isMut": false, - "isSigner": false, - "docs": [ - "instruction handler, which also checks this account discriminator (so there is no need to", - "check PDA seeds here)." - ] - }, - { - "name": "claim", - "isMut": true, - "isSigner": false, - "docs": [ - "[claim_vaa](core_bridge_sdk::cpi::claim_vaa) is called." - ] - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": false, - "docs": [ - "upgrade this program's executable. We verify this PDA address here out of convenience to get", - "the PDA bump seed to invoke the upgrade." - ] - }, - { - "name": "spill", - "isMut": true, - "isSigner": false - }, - { - "name": "buffer", - "isMut": true, - "isSigner": false, - "docs": [ - "against the one encoded in the governance VAA." - ] - }, - { - "name": "programData", - "isMut": true, - "isSigner": false - }, - { - "name": "thisProgram", - "isMut": true, - "isSigner": false - }, - { - "name": "rent", - "isMut": false, - "isSigner": false - }, - { - "name": "clock", - "isMut": false, - "isSigner": false - }, - { - "name": "bpfLoaderUpgradeableProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [] - } - ], - "accounts": [ - { - "name": "custodian", - "docs": [ - "Emitter config account. This account is used to perform the following:", - "1. It is the emitter authority for the Core Bridge program.", - "2. It acts as the custody token account owner for token transfers." - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "bump", - "type": "u8" - }, - { - "name": "upgradeAuthorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "registeredEmitter", - "type": { - "kind": "struct", - "fields": [ - { - "name": "bump", - "type": "u8" - }, - { - "name": "cctpDomain", - "type": "u32" - }, - { - "name": "chain", - "type": "u16" - }, - { - "name": "address", - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - } - ], - "types": [ - { - "name": "RedeemTokensWithPayloadArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "encodedCctpMessage", - "type": "bytes" - }, - { - "name": "cctpAttestation", - "type": "bytes" - } - ] - } - }, - { - "name": "TransferTokensWithPayloadArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "mintRecipient", - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "nonce", - "type": "u32" - }, - { - "name": "payload", - "type": "bytes" - } - ] - } - }, - { - "name": "ReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "message", - "type": "bytes" - }, - { - "name": "attestation", - "type": "bytes" - } - ] - } - }, - { - "name": "DepositForBurnWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "docs": [ - "Transfer amount." - ], - "type": "u64" - }, - { - "name": "destinationDomain", - "docs": [ - "Circle domain value of the token to be transferred." - ], - "type": "u32" - }, - { - "name": "mintRecipient", - "docs": [ - "Recipient of assets on target network.", - "", - "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", - "weird because this address is one for another network. We are making it a 32-byte fixed", - "array instead." - ], - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "destinationCaller", - "docs": [ - "Expected caller on target network.", - "", - "NOTE: In the Token Messenger Minter program IDL, this is encoded as a Pubkey, which is", - "weird because this address is one for another network. We are making it a 32-byte fixed", - "array instead." - ], - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - }, - { - "name": "RemoteTokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": { - "array": [ - "u8", - 32 - ] - } - } - ] - } - } - ], - "errors": [ - { - "code": 6002, - "name": "CannotParseMessage", - "msg": "CannotParseMessage" - }, - { - "code": 6003, - "name": "InvalidGovernanceEmitter", - "msg": "InvalidGovernanceEmitter" - }, - { - "code": 6004, - "name": "InvalidGovernanceVaa", - "msg": "InvalidGovernanceVaa" - }, - { - "code": 6005, - "name": "InvalidGovernanceAction", - "msg": "InvalidGovernanceAction" - }, - { - "code": 6006, - "name": "InvalidWormholeFinality", - "msg": "InvalidWormholeFinality" - }, - { - "code": 6007, - "name": "GovernanceForAnotherChain", - "msg": "GovernanceForAnotherChain" - }, - { - "code": 6008, - "name": "ImplementationMismatch", - "msg": "ImplementationMismatch" - }, - { - "code": 6009, - "name": "InvalidForeignChain", - "msg": "InvalidForeignChain" - }, - { - "code": 6010, - "name": "InvalidForeignEmitter", - "msg": "InvalidForeignEmitter" - }, - { - "code": 6011, - "name": "InvalidCctpDomain", - "msg": "InvalidCctpDomain" - }, - { - "code": 6012, - "name": "InvalidProgramSender", - "msg": "InvalidProgramSender" - }, - { - "code": 6013, - "name": "ZeroAmount", - "msg": "ZeroAmount" - }, - { - "code": 6014, - "name": "InvalidMintRecipient", - "msg": "InvalidMintRecipient" - }, - { - "code": 6015, - "name": "ExecutableDisallowed", - "msg": "ExecutableDisallowed" - }, - { - "code": 6016, - "name": "InvalidEmitter", - "msg": "InvalidEmitter" - }, - { - "code": 6017, - "name": "InvalidWormholeCctpMessage", - "msg": "InvalidWormholeCctpMessage" - }, - { - "code": 6018, - "name": "InvalidRegisteredEmitterCctpDomain", - "msg": "InvalidRegisteredEmitterCctpDomain" - }, - { - "code": 6019, - "name": "TargetDomainNotSolana", - "msg": "TargetDomainNotSolana" - }, - { - "code": 6020, - "name": "SourceCctpDomainMismatch", - "msg": "SourceCctpDomainMismatch" - }, - { - "code": 6021, - "name": "TargetCctpDomainMismatch", - "msg": "TargetCctpDomainMismatch" - }, - { - "code": 6022, - "name": "CctpNonceMismatch", - "msg": "CctpNonceMismatch" - }, - { - "code": 6023, - "name": "InvalidCctpMessage", - "msg": "InvalidCctpMessage" - }, - { - "code": 6024, - "name": "RedeemerTokenMismatch", - "msg": "RedeemerTokenMismatch" - } - ] -}; diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/01__tokenRouter.ts index 6ac26393..970f9b47 100644 --- a/solana/ts/tests/01__tokenRouter.ts +++ b/solana/ts/tests/01__tokenRouter.ts @@ -1,10 +1,34 @@ -import { CHAINS, ChainId } from "@certusone/wormhole-sdk"; +import * as wormholeSdk from "@certusone/wormhole-sdk"; import * as splToken from "@solana/spl-token"; -import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; +import { + AddressLookupTableProgram, + ComputeBudgetProgram, + Connection, + Keypair, + PublicKey, + SystemProgram, +} from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; -import { Custodian, RouterEndpoint, TokenRouterProgram } from "../src"; -import { LOCALHOST, PAYER_KEYPAIR, USDC_MINT_ADDRESS, expectIxErr, expectIxOk } from "./helpers"; +import { + CctpTokenBurnMessage, + Custodian, + Fill, + LiquidityLayerDeposit, + RouterEndpoint, + TokenRouterProgram, +} from "../src"; +import { + CircleAttester, + ETHEREUM_USDC_ADDRESS, + LOCALHOST, + MOCK_GUARDIANS, + PAYER_KEYPAIR, + USDC_MINT_ADDRESS, + expectIxErr, + expectIxOk, + postDepositVaa, +} from "./helpers"; chaiUse(chaiAsPromised); @@ -16,13 +40,15 @@ describe("Token Router", function () { const owner = Keypair.generate(); const ownerAssistant = Keypair.generate(); - const foreignChain = CHAINS.ethereum; - const invalidChain = (foreignChain + 1) as ChainId; + const foreignChain = wormholeSdk.CHAINS.ethereum; + const invalidChain = (foreignChain + 1) as wormholeSdk.ChainId; const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const foreignCctpDomain = 0; const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); const tokenRouter = new TokenRouterProgram(connection); + let lookupTableAddress: PublicKey; + describe("Admin", function () { describe("Initialize", function () { const createInitializeIx = (opts?: { ownerAssistant?: PublicKey; mint?: PublicKey }) => @@ -51,7 +77,7 @@ describe("Token Router", function () { const custodianData = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - const expectedCustodianData = { + const expectedCustodianData: Custodian = { bump: 253, custodyTokenBump: 254, paused: false, @@ -59,7 +85,7 @@ describe("Token Router", function () { pendingOwner: null, ownerAssistant: ownerAssistant.publicKey, pausedSetBy: payer.publicKey, - } as Custodian; + }; expect(custodianData).to.eql(expectedCustodianData); const custodyToken = await splToken.getAccount( @@ -81,6 +107,34 @@ describe("Token Router", function () { "already in use" ); }); + + after("Setup Lookup Table", async () => { + // Create. + const [createIx, lookupTable] = await connection.getSlot("finalized").then((slot) => + AddressLookupTableProgram.createLookupTable({ + authority: payer.publicKey, + payer: payer.publicKey, + recentSlot: slot, + }) + ); + await expectIxOk(connection, [createIx], [payer]); + + const usdcCommonAccounts = tokenRouter.commonAccounts(USDC_MINT_ADDRESS); + + // Extend. + const extendIx = AddressLookupTableProgram.extendLookupTable({ + payer: payer.publicKey, + authority: payer.publicKey, + lookupTable, + addresses: Object.values(usdcCommonAccounts).filter((key) => key !== undefined), + }); + + await expectIxOk(connection, [extendIx], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + + lookupTableAddress = lookupTable; + }); }); describe("Ownership Transfer Request", async function () { @@ -395,7 +449,7 @@ describe("Token Router", function () { ); }); - [CHAINS.unset, CHAINS.solana].forEach((chain) => + [wormholeSdk.CHAINS.unset, wormholeSdk.CHAINS.solana].forEach((chain) => it(`Cannot Register Chain ID == ${chain}`, async function () { await expectIxErr( connection, @@ -440,12 +494,12 @@ describe("Token Router", function () { const routerEndpointData = await tokenRouter.fetchRouterEndpoint( tokenRouter.routerEndpointAddress(foreignChain) ); - const expectedRouterEndpointData = { + const expectedRouterEndpointData: RouterEndpoint = { bump: 255, chain: foreignChain, address: contractAddress, cctpDomain: foreignCctpDomain, - } as RouterEndpoint; + }; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); @@ -463,12 +517,12 @@ describe("Token Router", function () { const routerEndpointData = await tokenRouter.fetchRouterEndpoint( tokenRouter.routerEndpointAddress(foreignChain) ); - const expectedRouterEndpointData = { + const expectedRouterEndpointData: RouterEndpoint = { bump: 255, chain: foreignChain, address: routerEndpointAddress, cctpDomain: foreignCctpDomain, - } as RouterEndpoint; + }; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); }); @@ -532,7 +586,7 @@ describe("Token Router", function () { mint?: PublicKey; burnSource?: PublicKey; burnSourceAuthority?: PublicKey; - targetChain?: ChainId; + targetChain?: wormholeSdk.ChainId; redeemer?: Array; } ) => @@ -551,11 +605,11 @@ describe("Token Router", function () { } ); - it.skip("Cannot Place Market Order with Zero Amount", async function () { + it.skip("Cannot Place Market Order with Insufficient Amount", async function () { // TODO }); - it.skip("Cannot Place Market Order with Redeemer as Zero Address", async function () { + it.skip("Cannot Place Market Order with Invalid Redeemer", async function () { // TODO }); @@ -563,26 +617,246 @@ describe("Token Router", function () { // TODO }); + it("Cannot Place Market Order as Invalid Burn Source Authority", async function () { + const burnSourceAuthority = Keypair.generate(); + + const amountIn = 69n; + + // TODO: use lookup table + // NOTE: This error comes from the SPL Token program. + await expectIxErr( + connection, + [ + await createPlaceMarketOrderCctpIx(amountIn, { + burnSourceAuthority: burnSourceAuthority.publicKey, + }), + ], + [payer, burnSourceAuthority], + "Error: owner does not match" + ); + }); + + it("Place Market Order as Burn Source Authority", async function () { + const burnSourceAuthority = Keypair.generate(); + const burnSource = await splToken.createAccount( + connection, + payer, + USDC_MINT_ADDRESS, + burnSourceAuthority.publicKey + ); + + const amountIn = 69n; + + // Add funds to account. + await splToken.mintTo( + connection, + payer, + USDC_MINT_ADDRESS, + burnSource, + payer, + amountIn + ); + + const { amount: balanceBefore } = await splToken.getAccount(connection, burnSource); + + // TODO: use lookup table + await expectIxOk( + connection, + [ + await createPlaceMarketOrderCctpIx(amountIn, { + burnSource, + burnSourceAuthority: burnSourceAuthority.publicKey, + }), + ], + [payer, burnSourceAuthority] + ); + + const { amount: balanceAfter } = await splToken.getAccount(connection, burnSource); + expect(balanceAfter + amountIn).equals(balanceBefore); + + // TODO: check message + }); + it("Place Market Order as Payer", async function () { const amountIn = 69n; - const balanceBefore = await splToken - .getAccount(connection, payerToken) - .then((token) => token.amount); + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); // TODO: use lookup table await expectIxOk(connection, [await createPlaceMarketOrderCctpIx(amountIn)], [payer]); - const balanceAfter = await splToken - .getAccount(connection, payerToken) - .then((token) => token.amount); + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); expect(balanceAfter + amountIn).equals(balanceBefore); // TODO: check message }); + }); - it.skip("Place Market Order as Another Signer", async function () { - // TODO + describe("Redeem Fill (CCTP)", () => { + const payerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + payer.publicKey + ); + + let testCctpNonce = 2n ** 64n - 1n; + + // Hack to prevent math overflow error when invoking CCTP programs. + testCctpNonce -= 2n * 6400n; + + let wormholeSequence = 0n; + + const localVariables = new Map(); + + const createRedeemFillCctpIx = ( + vaa: PublicKey, + encodedCctpMessage: Buffer, + opts?: { + sender?: PublicKey; + redeemer?: PublicKey; + dstToken?: PublicKey; + cctpAttestation?: Buffer; + } + ) => + tokenRouter.redeemFillCctpIx( + { + payer: opts?.sender ?? payer.publicKey, + vaa, + redeemer: opts?.redeemer ?? payer.publicKey, + dstToken: opts?.dstToken ?? payerToken, + }, + { + encodedCctpMessage, + cctpAttestation: + opts?.cctpAttestation ?? + new CircleAttester().createAttestation(encodedCctpMessage), + } + ); + + it("Redeem Fill", async function () { + const redeemer = Keypair.generate(); + + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage } = + await craftCctpTokenBurnMessage( + tokenRouter, + sourceCctpDomain, + cctpNonce, + encodedMintRecipient, + amount, + burnSource + ); + + const fill: Fill = { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }; + const deposit = new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, + }, + { fill } + ); + + const vaa = await postDepositVaa( + connection, + payer, + MOCK_GUARDIANS, + routerEndpointAddress, + wormholeSequence++, + deposit + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxOk( + connection, + [ + computeIx, + await createRedeemFillCctpIx(vaa, encodedCctpMessage, { + redeemer: redeemer.publicKey, + }), + ], + [payer, redeemer], + { addressLookupTableAccounts: [lookupTableAccount!] } + ); + + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore + amount); + + // TODO: check message }); }); }); + +async function craftCctpTokenBurnMessage( + tokenRouter: TokenRouterProgram, + sourceCctpDomain: number, + cctpNonce: bigint, + encodedMintRecipient: number[], + amount: bigint, + burnSource: number[], + overrides: { destinationCctpDomain?: number } = {} +) { + const { destinationCctpDomain: inputDestinationCctpDomain } = overrides; + + const messageTransmitterProgram = tokenRouter.messageTransmitterProgram(); + const { version, localDomain } = await messageTransmitterProgram.fetchMessageTransmitterConfig( + messageTransmitterProgram.messageTransmitterConfigAddress() + ); + const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; + + const tokenMessengerMinterProgram = tokenRouter.tokenMessengerMinterProgram(); + const sourceTokenMessenger = await tokenMessengerMinterProgram + .fetchRemoteTokenMessenger( + tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain) + ) + .then((remote) => remote.tokenMessenger); + + const burnMessage = new CctpTokenBurnMessage( + { + version, + sourceDomain: sourceCctpDomain, + destinationDomain: destinationCctpDomain, + nonce: cctpNonce, + sender: sourceTokenMessenger, + recipient: Array.from(tokenMessengerMinterProgram.ID.toBuffer()), // targetTokenMessenger + targetCaller: Array.from(tokenRouter.custodianAddress().toBuffer()), // targetCaller + }, + 0, + Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress + encodedMintRecipient, + amount, + burnSource + ); + + const encodedCctpMessage = burnMessage.encode(); + + return { + destinationCctpDomain, + burnMessage, + encodedCctpMessage, + }; +} diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts index e764e733..e1cf7d70 100644 --- a/solana/ts/tests/helpers/consts.ts +++ b/solana/ts/tests/helpers/consts.ts @@ -20,8 +20,9 @@ export const PAYER_KEYPAIR = Keypair.fromSecretKey( export const GOVERNANCE_EMITTER_ADDRESS = new PublicKey("11111111111111111111111111111115"); -export const MOCK_GUARDIANS = new MockGuardians(0, [ - "cfb12303a19cde580bb4dd771639b0d26bc68353645571a8cff516ab2ee113a0", -]); +export const GUARDIAN_KEY = "cfb12303a19cde580bb4dd771639b0d26bc68353645571a8cff516ab2ee113a0"; +export const MOCK_GUARDIANS = new MockGuardians(0, [GUARDIAN_KEY]); export const USDC_MINT_ADDRESS = new PublicKey("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + +export const ETHEREUM_USDC_ADDRESS = "0x07865c6e87b9f70255377e024ace6630c1eaa37f"; diff --git a/solana/ts/tests/helpers/index.ts b/solana/ts/tests/helpers/index.ts index a64a0fde..8f561d98 100644 --- a/solana/ts/tests/helpers/index.ts +++ b/solana/ts/tests/helpers/index.ts @@ -1,2 +1,3 @@ export * from "./consts"; +export * from "./mock"; export * from "./utils"; diff --git a/solana/ts/tests/helpers/mock.ts b/solana/ts/tests/helpers/mock.ts new file mode 100644 index 00000000..ef62ab7e --- /dev/null +++ b/solana/ts/tests/helpers/mock.ts @@ -0,0 +1,57 @@ +import { coalesceChainId, parseVaa, tryNativeToHexString } from "@certusone/wormhole-sdk"; +import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; +import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; +import { Connection, Keypair } from "@solana/web3.js"; +import { ethers } from "ethers"; +import { LiquidityLayerDeposit } from "../../src"; +import { CORE_BRIDGE_PID, GUARDIAN_KEY } from "./consts"; +import { postVaa } from "./utils"; + +export async function postDepositVaa( + connection: Connection, + payer: Keypair, + guardians: MockGuardians, + foreignEmitterAddress: Array, + sequence: bigint, + deposit: LiquidityLayerDeposit +) { + const chainName = "ethereum"; + const foreignEmitter = new MockEmitter( + Buffer.from(foreignEmitterAddress).toString("hex"), + coalesceChainId(chainName), + Number(sequence) + ); + + const published = foreignEmitter.publishMessage( + 0, // nonce, + deposit.encode(), + 0, // consistencyLevel + 12345678 // timestamp + ); + const vaaBuf = guardians.addSignatures(published, [0]); + + await postVaa(connection, payer, vaaBuf); + + return derivePostedVaaKey(CORE_BRIDGE_PID, parseVaa(vaaBuf).hash); +} + +export class CircleAttester { + attester: ethers.utils.SigningKey; + + constructor() { + this.attester = new ethers.utils.SigningKey("0x" + GUARDIAN_KEY); + } + + createAttestation(message: Buffer | Uint8Array) { + const signature = this.attester.signDigest(ethers.utils.keccak256(message)); + + const attestation = Buffer.alloc(65); + attestation.set(ethers.utils.arrayify(signature.r), 0); + attestation.set(ethers.utils.arrayify(signature.s), 32); + + const recoveryId = signature.recoveryParam; + attestation.writeUInt8(recoveryId < 27 ? recoveryId + 27 : recoveryId, 64); + + return attestation; + } +} From c795a7a98ac3f3758195bb019f1dbfad6365d83c Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 11 Jan 2024 21:55:18 -0600 Subject: [PATCH 032/126] solana: fix fast fill deser; add redeem fast fill (untested) --- .../common/src/messages/raw/deposit.rs | 58 -------- solana/modules/common/src/messages/raw/mod.rs | 58 ++++++++ solana/programs/matching-engine/src/error.rs | 12 ++ solana/programs/matching-engine/src/lib.rs | 9 +- .../matching-engine/src/processor/mod.rs | 3 + .../src/processor/redeem_fast_fill.rs | 119 +++++++++++++++ .../programs/matching-engine/src/state/mod.rs | 5 +- .../src/state/redeemed_fast_fill.rs | 13 ++ solana/programs/token-router/src/lib.rs | 8 +- .../src/processor/redeem_fill/cctp.rs | 21 +-- .../src/processor/redeem_fill/fast.rs | 135 ++++++++++++++++++ .../src/processor/redeem_fill/me.rs | 85 ----------- .../src/processor/redeem_fill/mod.rs | 6 +- solana/ts/src/index.ts | 8 +- solana/ts/tests/01__tokenRouter.ts | 2 +- 15 files changed, 374 insertions(+), 168 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/redeem_fast_fill.rs create mode 100644 solana/programs/matching-engine/src/state/redeemed_fast_fill.rs create mode 100644 solana/programs/token-router/src/processor/redeem_fill/fast.rs delete mode 100644 solana/programs/token-router/src/processor/redeem_fill/me.rs diff --git a/solana/modules/common/src/messages/raw/deposit.rs b/solana/modules/common/src/messages/raw/deposit.rs index ada487c6..4f5a439d 100644 --- a/solana/modules/common/src/messages/raw/deposit.rs +++ b/solana/modules/common/src/messages/raw/deposit.rs @@ -4,7 +4,6 @@ use wormhole_raw_vaas::Payload; #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub enum LiquidityLayerDepositMessage<'a> { Fill(Fill<'a>), - FastFill(FastFill<'a>), SlowOrderResponse(SlowOrderResponse<'a>), } @@ -20,7 +19,6 @@ impl<'a> AsRef<[u8]> for LiquidityLayerDepositMessage<'a> { fn as_ref(&self) -> &[u8] { match self { Self::Fill(inner) => inner.as_ref(), - Self::FastFill(inner) => inner.as_ref(), Self::SlowOrderResponse(inner) => inner.as_ref(), } } @@ -45,20 +43,6 @@ impl<'a> LiquidityLayerDepositMessage<'a> { } } - pub fn fast_fill(&self) -> Option<&FastFill> { - match self { - Self::FastFill(inner) => Some(inner), - _ => None, - } - } - - pub fn to_fast_fill_unchecked(self) -> FastFill<'a> { - match self { - Self::FastFill(inner) => inner, - _ => panic!("LiquidityLayerDepositMessage is not FastFill"), - } - } - pub fn slow_order_response(&self) -> Option<&SlowOrderResponse> { match self { Self::SlowOrderResponse(inner) => Some(inner), @@ -80,7 +64,6 @@ impl<'a> LiquidityLayerDepositMessage<'a> { match span[0] { 11 => Ok(Self::Fill(Fill::parse(&span[1..])?)), - 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), 14 => Ok(Self::SlowOrderResponse(SlowOrderResponse::parse( &span[1..], )?)), @@ -135,47 +118,6 @@ impl<'a> Fill<'a> { } } -#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] -pub struct FastFill<'a>(&'a [u8]); - -impl<'a> AsRef<[u8]> for FastFill<'a> { - fn as_ref(&self) -> &[u8] { - self.0 - } -} - -impl<'a> FastFill<'a> { - pub fn fill(&'a self) -> Fill<'a> { - Fill::parse(&self.0[..70 + usize::try_from(self.redeemer_message_len()).unwrap()]).unwrap() - } - - pub fn amount(&self) -> u128 { - let len = usize::try_from(self.redeemer_message_len()).unwrap(); - u128::from_be_bytes(self.0[70 + len..86 + len].try_into().unwrap()) - } - - // TODO: remove this when encoding changes. - fn redeemer_message_len(&self) -> u32 { - u32::from_be_bytes(self.0[66..70].try_into().unwrap()) - } - - pub fn parse(span: &'a [u8]) -> Result { - if span.len() < 86 { - return Err("FastFill span too short. Need at least 86 bytes"); - } - - let fast_fill = Self(span); - - // Check payload length vs actual payload. - let fill = fast_fill.fill(); - if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { - return Err("Fill payload length mismatch"); - } - - Ok(fast_fill) - } -} - #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub struct SlowOrderResponse<'a>(&'a [u8]); diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index c6e7bb6f..f2c6d3e0 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -48,6 +48,7 @@ impl<'a> LiquidityLayerPayload<'a> { #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub enum LiquidityLayerMessage<'a> { Deposit(Deposit<'a>), + FastFill(FastFill<'a>), FastMarketOrder(FastMarketOrder<'a>), } @@ -63,6 +64,7 @@ impl<'a> AsRef<[u8]> for LiquidityLayerMessage<'a> { fn as_ref(&self) -> &[u8] { match self { Self::Deposit(inner) => inner.as_ref(), + Self::FastFill(inner) => inner.as_ref(), Self::FastMarketOrder(inner) => inner.as_ref(), } } @@ -87,6 +89,20 @@ impl<'a> LiquidityLayerMessage<'a> { } } + pub fn fast_fill(&self) -> Option<&FastFill> { + match self { + Self::FastFill(inner) => Some(inner), + _ => None, + } + } + + pub fn to_fast_fill_unchecked(self) -> FastFill<'a> { + match self { + Self::FastFill(inner) => inner, + _ => panic!("LiquidityLayerDepositMessage is not FastFill"), + } + } + pub fn fast_market_order(&self) -> Option<&FastMarketOrder> { match self { Self::FastMarketOrder(inner) => Some(inner), @@ -108,12 +124,54 @@ impl<'a> LiquidityLayerMessage<'a> { match span[0] { 1 => Ok(Self::Deposit(Deposit::parse(&span[1..])?)), + 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), 13 => Ok(Self::FastMarketOrder(FastMarketOrder::parse(&span[1..])?)), _ => Err("Unknown LiquidityLayerMessage type"), } } } +#[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] +pub struct FastFill<'a>(&'a [u8]); + +impl<'a> AsRef<[u8]> for FastFill<'a> { + fn as_ref(&self) -> &[u8] { + self.0 + } +} + +impl<'a> FastFill<'a> { + pub fn fill(&'a self) -> Fill<'a> { + Fill::parse(&self.0[..70 + usize::try_from(self.redeemer_message_len()).unwrap()]).unwrap() + } + + pub fn amount(&self) -> u128 { + let len = usize::try_from(self.redeemer_message_len()).unwrap(); + u128::from_be_bytes(self.0[70 + len..86 + len].try_into().unwrap()) + } + + // TODO: remove this when encoding changes. + fn redeemer_message_len(&self) -> u32 { + u32::from_be_bytes(self.0[66..70].try_into().unwrap()) + } + + pub fn parse(span: &'a [u8]) -> Result { + if span.len() < 86 { + return Err("FastFill span too short. Need at least 86 bytes"); + } + + let fast_fill = Self(span); + + // Check payload length vs actual payload. + let fill = fast_fill.fill(); + if fill.redeemer_message().len() != fill.redeemer_message_len().try_into().unwrap() { + return Err("Fill payload length mismatch"); + } + + Ok(fast_fill) + } +} + #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub struct FastMarketOrder<'a>(&'a [u8]); diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 6f0f5012..6f1ad772 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -66,4 +66,16 @@ pub enum MatchingEngineError { #[msg("AuctionAlreadyStarted")] AuctionAlreadyStarted, + + #[msg("InvalidEmitterForFastFill")] + InvalidEmitterForFastFill, + + #[msg("InvalidDeposit")] + InvalidDeposit, + + #[msg("InvalidDepositMessage")] + InvalidDepositMessage, + + #[msg("InvalidPayloadId")] + InvalidPayloadId, } diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index bf97d2fa..ce01bc2d 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -27,6 +27,10 @@ cfg_if::cfg_if! { pub mod matching_engine { use super::*; + pub fn redeem_fast_fill(ctx: Context) -> Result<()> { + processor::redeem_fast_fill(ctx) + } + /// This instruction is be used to generate your program's config. /// And for convenience, we will store Wormhole-related PDAs in the /// config so we can verify these accounts with a simple == constraint. @@ -67,10 +71,7 @@ pub mod matching_engine { processor::update_fee_recipient(ctx) } - pub fn place_initial_offer( - ctx: Context, - fee_offer: u64 - ) -> Result<()> { + pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> Result<()> { processor::place_initial_offer(ctx, fee_offer) } } diff --git a/solana/programs/matching-engine/src/processor/mod.rs b/solana/programs/matching-engine/src/processor/mod.rs index 6e373a13..afb82734 100644 --- a/solana/programs/matching-engine/src/processor/mod.rs +++ b/solana/programs/matching-engine/src/processor/mod.rs @@ -3,3 +3,6 @@ pub use admin::*; mod auction; pub use auction::*; + +mod redeem_fast_fill; +pub use redeem_fast_fill::*; diff --git a/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs b/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs new file mode 100644 index 00000000..8d2806c5 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs @@ -0,0 +1,119 @@ +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::raw::LiquidityLayerMessage; +use wormhole_cctp_solana::wormhole::core_bridge_program; + +use crate::{ + error::MatchingEngineError, + state::{Custodian, RedeemedFastFill, RouterEndpoint}, +}; + +#[derive(Accounts)] +pub struct RedeemFastFill<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + vaa: AccountInfo<'info>, + + #[account( + init, + payer = payer, + space = 8 + RedeemedFastFill::INIT_SPACE, + seeds = [ + RedeemedFastFill::SEED_PREFIX, + core_bridge_program::VaaAccount::load(&vaa)?.try_digest()?.as_ref() + ], + bump + )] + redeemed_fast_fill: Account<'info, RedeemedFastFill>, + + #[account(address = Pubkey::from(router_endpoint.address))] + token_router_emitter: Signer<'info>, + + #[account( + mut, + token::mint = custody_token.mint, + token::authority = token_router_emitter, + )] + token_router_custody_token: Account<'info, token::TokenAccount>, + + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + &core_bridge_program::SOLANA_CHAIN.to_be_bytes() + ], + bump = router_endpoint.bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +pub fn redeem_fast_fill(ctx: Context) -> Result<()> { + let vaa = core_bridge_program::VaaAccount::load(&ctx.accounts.vaa).unwrap(); + + // Emitter must be the matching engine (this program). + { + let emitter = vaa.try_emitter_info()?; + require!( + emitter.chain == core_bridge_program::SOLANA_CHAIN + && Pubkey::from(emitter.address) == crate::ID, + MatchingEngineError::InvalidEmitterForFastFill + ); + + // Fill redeemed fast fill data. + ctx.accounts.redeemed_fast_fill.set_inner(RedeemedFastFill { + bump: ctx.bumps["redeemed_fast_fill"], + hash: vaa.try_digest().unwrap().0, + sequence: emitter.sequence, + }); + } + + // Check whether this message is a deposit message we recognize. + let msg = LiquidityLayerMessage::try_from(vaa.try_payload()?) + .map_err(|_| error!(MatchingEngineError::InvalidVaa))?; + + // Is this a fast fill? + let fast_fill = msg + .fast_fill() + .ok_or(MatchingEngineError::InvalidPayloadId)?; + + // Finally transfer to local token router's token account. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.token_router_custody_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + fast_fill.amount().try_into().unwrap(), + ) +} diff --git a/solana/programs/matching-engine/src/state/mod.rs b/solana/programs/matching-engine/src/state/mod.rs index fb37f7db..e0d944ea 100644 --- a/solana/programs/matching-engine/src/state/mod.rs +++ b/solana/programs/matching-engine/src/state/mod.rs @@ -4,8 +4,11 @@ pub use custodian::*; mod payer_sequence; pub use payer_sequence::*; +mod redeemed_fast_fill; +pub use redeemed_fast_fill::*; + mod router_endpoint; pub use router_endpoint::*; mod auction_data; -pub use auction_data::*; \ No newline at end of file +pub use auction_data::*; diff --git a/solana/programs/matching-engine/src/state/redeemed_fast_fill.rs b/solana/programs/matching-engine/src/state/redeemed_fast_fill.rs new file mode 100644 index 00000000..fece3a29 --- /dev/null +++ b/solana/programs/matching-engine/src/state/redeemed_fast_fill.rs @@ -0,0 +1,13 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(Debug, InitSpace)] +pub struct RedeemedFastFill { + pub bump: u8, + pub hash: [u8; 32], + pub sequence: u64, +} + +impl RedeemedFastFill { + pub const SEED_PREFIX: &'static [u8] = b"redeemed"; +} diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index a6476f78..5eb7524a 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -31,12 +31,12 @@ pub mod token_router { processor::place_market_order_cctp(ctx, args) } - pub fn redeem_fill_cctp(ctx: Context, args: RedeemFillArgs) -> Result<()> { - processor::redeem_fill_cctp(ctx, args) + pub fn redeem_cctp_fill(ctx: Context, args: RedeemFillArgs) -> Result<()> { + processor::redeem_cctp_fill(ctx, args) } - pub fn redeem_fill_matching_engine(ctx: Context) -> Result<()> { - processor::redeem_fill_matching_engine(ctx) + pub fn redeem_fast_fill(ctx: Context) -> Result<()> { + processor::redeem_fast_fill(ctx) } // admin diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 2d9fa9b7..fc50b6a8 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -12,9 +12,9 @@ use wormhole_cctp_solana::{ wormhole::core_bridge_program, }; -/// Account context to invoke [redeem_fill_cctp]. +/// Account context to invoke [redeem_cctp_fill]. #[derive(Accounts)] -pub struct RedeemFillCctp<'info> { +pub struct RedeemCctpFill<'info> { #[account(mut)] payer: Signer<'info>, @@ -115,10 +115,10 @@ pub struct RedeemFillCctp<'info> { } /// This instruction reconciles a Wormhole CCTP deposit message with a CCTP message to mint tokens -/// for the [mint_recipient](RedeemFillCctp::mint_recipient) token account. +/// for the [mint_recipient](RedeemCctpFill::mint_recipient) token account. /// /// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. -pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArgs) -> Result<()> { +pub fn redeem_cctp_fill(ctx: Context, args: super::RedeemFillArgs) -> Result<()> { let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; let vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( @@ -175,6 +175,11 @@ pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArg .unwrap() .message() .to_deposit_unchecked(); + + // Save for final transfer. + let amount = deposit.amount(); + + // Verify as Liquiditiy Layer Deposit message. let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) .map_err(|_| TokenRouterError::InvalidDepositMessage)?; @@ -186,9 +191,6 @@ pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArg TokenRouterError::InvalidRedeemer ); - // Reload the custody token account so we know how much to transfer. - ctx.accounts.custody_token.reload()?; - // Finally transfer tokens to destination. token::transfer( CpiContext::new_with_signer( @@ -200,6 +202,9 @@ pub fn redeem_fill_cctp(ctx: Context, args: super::RedeemFillArg }, &[custodian_seeds], ), - ctx.accounts.custody_token.amount, + // This is safe because we know the amount is within u64 range. + ruint::aliases::U256::from_be_bytes(amount) + .try_into() + .unwrap(), ) } diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs new file mode 100644 index 00000000..bec48281 --- /dev/null +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -0,0 +1,135 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::raw::LiquidityLayerMessage; +use wormhole_cctp_solana::wormhole::core_bridge_program; + +/// Account context to invoke [redeem_fast_fill]. +#[derive(Accounts)] +pub struct RedeemFastFill<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + vaa: AccountInfo<'info>, + + /// Redeemer, who owns the token account that will receive the minted tokens. + /// + /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. + redeemer: Signer<'info>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + dst_token: AccountInfo<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + /// CHECK: Seeds must be \["emitter"] (Matching Engine program). + #[account(mut)] + matching_engine_custodian: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["redeemed", vaa_digest\] (Matching Engine program). + #[account(mut)] + matching_engine_redeemed_fast_fill: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["endpoint", SOLANA_CHAIN.to_be_bytes()\] (Matching Engine program). + matching_engine_router_endpoint: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["custody"] (Matching Engine program). + #[account(mut)] + matching_engine_custody_token: UncheckedAccount<'info>, + + matching_engine_program: Program<'info, matching_engine::program::MatchingEngine>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +/// This instruction reconciles a Wormhole CCTP deposit message with a CCTP message to mint tokens +/// for the [mint_recipient](RedeemFastFill::mint_recipient) token account. +/// +/// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. +pub fn redeem_fast_fill(ctx: Context) -> Result<()> { + let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + + matching_engine::cpi::redeem_fast_fill(CpiContext::new_with_signer( + ctx.accounts.matching_engine_program.to_account_info(), + matching_engine::cpi::accounts::RedeemFastFill { + payer: ctx.accounts.payer.to_account_info(), + custodian: ctx.accounts.matching_engine_custodian.to_account_info(), + vaa: ctx.accounts.vaa.to_account_info(), + redeemed_fast_fill: ctx + .accounts + .matching_engine_redeemed_fast_fill + .to_account_info(), + token_router_emitter: ctx.accounts.custodian.to_account_info(), + token_router_custody_token: ctx.accounts.custody_token.to_account_info(), + router_endpoint: ctx + .accounts + .matching_engine_router_endpoint + .to_account_info(), + custody_token: ctx.accounts.matching_engine_custody_token.to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + }, + &[custodian_seeds], + ))?; + + let vaa = + wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount::load(&ctx.accounts.vaa) + .unwrap(); + + // Verify redeemer. + let amount = { + let fast_fill = LiquidityLayerMessage::try_from(vaa.try_payload().unwrap()) + .unwrap() + .to_fast_fill_unchecked(); + + require_keys_eq!( + Pubkey::from(fast_fill.fill().redeemer()), + ctx.accounts.redeemer.key(), + TokenRouterError::InvalidRedeemer + ); + + // This is safe because we know the amount is within u64 range. + u64::try_from(fast_fill.amount()).unwrap() + }; + + // Finally transfer tokens to destination. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.dst_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + amount, + ) +} diff --git a/solana/programs/token-router/src/processor/redeem_fill/me.rs b/solana/programs/token-router/src/processor/redeem_fill/me.rs deleted file mode 100644 index 4872f600..00000000 --- a/solana/programs/token-router/src/processor/redeem_fill/me.rs +++ /dev/null @@ -1,85 +0,0 @@ -use crate::{error::TokenRouterError, state::Custodian}; -use anchor_lang::prelude::*; -use anchor_spl::token; -use common::messages::raw::LiquidityLayerDepositMessage; -use wormhole_cctp_solana::{utils::WormholeCctpPayload, wormhole::core_bridge_program}; - -/// Account context to invoke [redeem_fill_matching_engine]. -#[derive(Accounts)] -pub struct RedeemFillMatchingEngine<'info> { - #[account(mut)] - payer: Signer<'info>, - - /// This program's Wormhole (Core Bridge) emitter authority. - /// - /// CHECK: Seeds must be \["emitter"\]. - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - )] - custodian: Account<'info, Custodian>, - - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] - vaa: AccountInfo<'info>, - - /// Redeemer, who owns the token account that will receive the minted tokens. - /// - /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. - redeemer: Signer<'info>, - - /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. - /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message - /// from its custody account to this account. - /// - /// Mutable. Seeds must be \["custody"\]. - #[account( - mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, - )] - custody_token: Account<'info, token::TokenAccount>, - - // add matching engine accounts here - // - // - matching_engine_program: Program<'info, matching_engine::program::MatchingEngine>, - token_program: Program<'info, token::Token>, - system_program: Program<'info, System>, -} - -/// This instruction reconciles a Wormhole CCTP deposit message with a CCTP message to mint tokens -/// for the [mint_recipient](RedeemFillMatchingEngine::mint_recipient) token account. -/// -/// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. -pub fn redeem_fill_matching_engine(ctx: Context) -> Result<()> { - // TODO: Placeholder for CPI call to matching engine. - // NOTE: It is the matching engine's job to validate this VAA. - - let vaa = - wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount::load(&ctx.accounts.vaa) - .unwrap(); - - // Wormhole CCTP deposit should be ours, so make sure this is a fill we recognize. - let deposit = WormholeCctpPayload::try_from(vaa.try_payload().unwrap()) - .unwrap() - .message() - .to_deposit_unchecked(); - let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) - .map_err(|_| TokenRouterError::InvalidDepositMessage)?; - - // Verify redeemer. - let fill = msg - .fast_fill() - .ok_or(TokenRouterError::InvalidPayloadId) - .map(|fast| fast.fill())?; - require_keys_eq!( - Pubkey::from(fill.redeemer()), - ctx.accounts.redeemer.key(), - TokenRouterError::InvalidRedeemer - ); - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/redeem_fill/mod.rs b/solana/programs/token-router/src/processor/redeem_fill/mod.rs index c9d52a95..d6036845 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/mod.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/mod.rs @@ -1,12 +1,12 @@ mod cctp; pub use cctp::*; -mod me; -pub use me::*; +mod fast; +pub use fast::*; use anchor_lang::prelude::*; -/// Arguments used to invoke [redeem_fill_matching_engine]. +/// Arguments used to invoke [redeem_fast_fill]. #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] pub struct RedeemFillArgs { /// CCTP message. diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index 453e648d..c3aa20b8 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -352,7 +352,7 @@ export class TokenRouterProgram { .instruction(); } - async redeemFillCctpAccounts( + async redeemCctpFillAccounts( vaa: PublicKey, cctpMessage: CctpTokenBurnMessage | Buffer ): Promise { @@ -400,7 +400,7 @@ export class TokenRouterProgram { }; } - async redeemFillCctpIx( + async redeemCctpFillIx( accounts: { payer: PublicKey; vaa: PublicKey; @@ -432,10 +432,10 @@ export class TokenRouterProgram { tokenMessengerMinterProgram, messageTransmitterProgram, tokenProgram, - } = await this.redeemFillCctpAccounts(vaa, encodedCctpMessage); + } = await this.redeemCctpFillAccounts(vaa, encodedCctpMessage); return this.program.methods - .redeemFillCctp(args) + .redeemCctpFill(args) .accounts({ payer, custodian, diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/01__tokenRouter.ts index 970f9b47..212179c5 100644 --- a/solana/ts/tests/01__tokenRouter.ts +++ b/solana/ts/tests/01__tokenRouter.ts @@ -717,7 +717,7 @@ describe("Token Router", function () { cctpAttestation?: Buffer; } ) => - tokenRouter.redeemFillCctpIx( + tokenRouter.redeemCctpFillIx( { payer: opts?.sender ?? payer.publicKey, vaa, From e141d01105b403659955d87b8b8dde8812f9e8a4 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Fri, 12 Jan 2024 08:41:34 -0600 Subject: [PATCH 033/126] solana: add improve_offer instruction --- solana/programs/matching-engine/src/error.rs | 8 ++ solana/programs/matching-engine/src/lib.rs | 7 ++ .../src/processor/auction/improve_offer.rs | 108 ++++++++++++++++++ .../src/processor/auction/mod.rs | 4 + .../processor/auction/place_initial_offer.rs | 2 +- ...atchingEngine.ts => 01__matchingEngine.ts} | 6 +- ...{01__tokenRouter.ts => 02__tokenRouter.ts} | 0 7 files changed, 131 insertions(+), 4 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/auction/improve_offer.rs rename solana/ts/tests/{02__matchingEngine.ts => 01__matchingEngine.ts} (99%) rename solana/ts/tests/{01__tokenRouter.ts => 02__tokenRouter.ts} (100%) diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 6f1ad772..0166cfad 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -78,4 +78,12 @@ pub enum MatchingEngineError { #[msg("InvalidPayloadId")] InvalidPayloadId, + #[msg("AuctionNotActive")] + AuctionNotActive, + + #[msg("AuctionPeriodExpired")] + AuctionPeriodExpired, + + #[msg("OfferPriceNotImproved")] + OfferPriceNotImproved, } diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index ce01bc2d..dfa3c13e 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -74,4 +74,11 @@ pub mod matching_engine { pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> Result<()> { processor::place_initial_offer(ctx, fee_offer) } + + pub fn improve_offer( + ctx: Context, + fee_offer: u64 + ) -> Result<()> { + processor::improve_offer(ctx, fee_offer) + } } diff --git a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs new file mode 100644 index 00000000..a92b70ea --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs @@ -0,0 +1,108 @@ +use anchor_spl::token; +use anchor_lang::prelude::*; + +use crate::{ + error::MatchingEngineError, + state::{AuctionData, Custodian, AuctionStatus}, +}; + +#[derive(Accounts)] +pub struct ImproveOffer<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + #[account( + mut, + seeds = [ + AuctionData::SEED_PREFIX, + auction_data.vaa_hash.as_ref(), + ], + bump + )] + auction_data: Account<'info, AuctionData>, + + #[account( + mut, + associated_token::mint = mint, + associated_token::authority = payer + )] + auctioneer_token: Account<'info, token::TokenAccount>, + + #[account( + mut, + token::mint = mint, + )] + best_offer_token: Account<'info, token::TokenAccount>, + + #[account( + mut, + seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump, + token::mint = mint, + token::authority = custodian + )] + custody_token: Account<'info, token::TokenAccount>, + + #[account(address = common::constants::usdc::id())] + mint: Account<'info, token::Mint>, + + system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, +} + +pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { + let auction_data = &mut ctx.accounts.auction_data; + + require!( + auction_data.status == AuctionStatus::Active, + MatchingEngineError::AuctionNotActive + ); + + // Push this to the stack to enhance readability. + let auction_duration = + u64::try_from(ctx.accounts.custodian.auction_config.auction_duration).unwrap(); + require!( + Clock::get()?.slot.checked_sub(auction_duration).unwrap() < auction_data.start_slot, + MatchingEngineError::AuctionPeriodExpired + ); + + // Make sure the new offer is less than the previous offer. + require!( + fee_offer < auction_data.offer_price, + MatchingEngineError::OfferPriceNotImproved + ); + + // Transfer funds from the `best_offer` token account to the `auctioneer_token` token account, + // but only if the pubkeys are different. + if auction_data.best_offer != *ctx.accounts.auctioneer_token.to_account_info().key { + token::transfer( + CpiContext::new( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: ctx.accounts.auctioneer_token.to_account_info(), + to: ctx.accounts.best_offer_token.to_account_info(), + authority: ctx.accounts.payer.to_account_info(), + } + ), + auction_data.amount.checked_add(auction_data.security_deposit).unwrap() + )?; + + // Update the `best_offer` token account and `amount` fields. + auction_data.best_offer = *ctx.accounts.auctioneer_token.to_account_info().key; + auction_data.amount = fee_offer; + } else { + // Since the auctioneer is already the best offer, we only need to update the `amount`. + auction_data.amount = fee_offer; + } + + Ok(()) +} \ No newline at end of file diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index bcbce247..795c5574 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -1,5 +1,9 @@ mod place_initial_offer; pub use place_initial_offer::*; + +mod improve_offer; +pub use improve_offer::*; + use anchor_lang::prelude::*; use crate::{ diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 8bbcf0b0..c0bda170 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -58,7 +58,7 @@ pub struct PlaceInitialOffer<'info> { associated_token::mint = mint, associated_token::authority = payer )] - pub auctioneer_token: Account<'info, token::TokenAccount>, + auctioneer_token: Account<'info, token::TokenAccount>, #[account( mut, diff --git a/solana/ts/tests/02__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts similarity index 99% rename from solana/ts/tests/02__matchingEngine.ts rename to solana/ts/tests/01__matchingEngine.ts index 3a69dfdd..edbebedf 100644 --- a/solana/ts/tests/02__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -614,7 +614,7 @@ describe("Matching Engine", function () { let wormholeSequence = 0n; const baseFastOrder: FastMarketOrder = { - amountIn: 500000000000n, + amountIn: 50000000000n, minAmountOut: 0n, targetChain: arbChain, targetDomain: arbDomain, @@ -676,7 +676,7 @@ describe("Matching Engine", function () { ); // Mint USDC. - const mintAmount = 100000n * 10000000n; + const mintAmount = 100000n * 100000000n; const destination = await getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, wallet.publicKey @@ -744,7 +744,7 @@ describe("Matching Engine", function () { const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); - expect(auctionData.bump).to.equal(255); + expect(auctionData.bump).to.equal(254); expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionData.status).to.eql({ active: {} }); expect(auctionData.bestOffer).to.eql(auctioneerOne.publicKey); diff --git a/solana/ts/tests/01__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts similarity index 100% rename from solana/ts/tests/01__tokenRouter.ts rename to solana/ts/tests/02__tokenRouter.ts From 3b1aef0379d34222d55b87452519b2a339fa39a5 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 12 Jan 2024 09:19:12 -0600 Subject: [PATCH 034/126] solana: fix contexts; fix error --- solana/modules/common/src/constants/mod.rs | 2 + solana/modules/common/src/messages/raw/mod.rs | 2 +- .../programs/matching-engine/src/constants.rs | 13 ---- solana/programs/matching-engine/src/lib.rs | 7 +- .../src/processor/admin/initialize.rs | 4 +- .../src/processor/auction/improve_offer.rs | 31 ++++----- .../processor/auction/place_initial_offer.rs | 68 +++++++++---------- .../processor/admin/add_router_endpoint.rs | 2 + 8 files changed, 54 insertions(+), 75 deletions(-) delete mode 100644 solana/programs/matching-engine/src/constants.rs diff --git a/solana/modules/common/src/constants/mod.rs b/solana/modules/common/src/constants/mod.rs index a8f3c524..a3b5014c 100644 --- a/solana/modules/common/src/constants/mod.rs +++ b/solana/modules/common/src/constants/mod.rs @@ -6,3 +6,5 @@ pub const WORMHOLE_MESSAGE_NONCE: u32 = 0; pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; pub const CORE_MESSAGE_SEED_PREFIX: &[u8] = b"msg"; + +pub const FEE_PRECISION_MAX: u32 = 1_000_000; diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index f2c6d3e0..ecc244d8 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -99,7 +99,7 @@ impl<'a> LiquidityLayerMessage<'a> { pub fn to_fast_fill_unchecked(self) -> FastFill<'a> { match self { Self::FastFill(inner) => inner, - _ => panic!("LiquidityLayerDepositMessage is not FastFill"), + _ => panic!("LiquidityLayerMessage is not FastFill"), } } diff --git a/solana/programs/matching-engine/src/constants.rs b/solana/programs/matching-engine/src/constants.rs deleted file mode 100644 index 60f38161..00000000 --- a/solana/programs/matching-engine/src/constants.rs +++ /dev/null @@ -1,13 +0,0 @@ -use anchor_lang::prelude::constant; - -/// Seed for custody token account. -#[constant] -pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; - -/// Nonce for outbound messages. -#[constant] -pub const NONCE: u32 = 0; - -/// Fee precison max. -#[constant] -pub const FEE_PRECISION_MAX: u32 = 1_000_000; diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index dfa3c13e..8919aab6 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -1,8 +1,6 @@ #![doc = include_str!("../README.md")] #![allow(clippy::result_large_err)] -pub mod constants; - pub mod error; mod processor; @@ -75,10 +73,7 @@ pub mod matching_engine { processor::place_initial_offer(ctx, fee_offer) } - pub fn improve_offer( - ctx: Context, - fee_offer: u64 - ) -> Result<()> { + pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { processor::improve_offer(ctx, fee_offer) } } diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index bd7785db..229470c6 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -1,10 +1,10 @@ -use crate::constants::FEE_PRECISION_MAX; use crate::{ error::MatchingEngineError, state::{AuctionConfig, Custodian}, }; use anchor_lang::prelude::*; use anchor_spl::token; +use common::constants::FEE_PRECISION_MAX; #[derive(Accounts)] pub struct Initialize<'info> { @@ -40,7 +40,7 @@ pub struct Initialize<'info> { #[account( init, payer = owner, - seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump, token::mint = mint, token::authority = custodian diff --git a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs index a92b70ea..48c3cebc 100644 --- a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs @@ -1,14 +1,12 @@ -use anchor_spl::token; -use anchor_lang::prelude::*; - use crate::{ error::MatchingEngineError, - state::{AuctionData, Custodian, AuctionStatus}, + state::{AuctionData, AuctionStatus, Custodian}, }; +use anchor_lang::prelude::*; +use anchor_spl::token; #[derive(Accounts)] pub struct ImproveOffer<'info> { - #[account(mut)] payer: Signer<'info>, /// This program's Wormhole (Core Bridge) emitter authority. @@ -32,30 +30,24 @@ pub struct ImproveOffer<'info> { #[account( mut, - associated_token::mint = mint, + associated_token::mint = custody_token.mint, associated_token::authority = payer )] auctioneer_token: Account<'info, token::TokenAccount>, #[account( mut, - token::mint = mint, + token::mint = custody_token.mint, )] best_offer_token: Account<'info, token::TokenAccount>, #[account( mut, - seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump, - token::mint = mint, - token::authority = custodian + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, )] custody_token: Account<'info, token::TokenAccount>, - #[account(address = common::constants::usdc::id())] - mint: Account<'info, token::Mint>, - - system_program: Program<'info, System>, token_program: Program<'info, token::Token>, } @@ -91,9 +83,12 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { from: ctx.accounts.auctioneer_token.to_account_info(), to: ctx.accounts.best_offer_token.to_account_info(), authority: ctx.accounts.payer.to_account_info(), - } + }, ), - auction_data.amount.checked_add(auction_data.security_deposit).unwrap() + auction_data + .amount + .checked_add(auction_data.security_deposit) + .unwrap(), )?; // Update the `best_offer` token account and `amount` fields. @@ -105,4 +100,4 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { } Ok(()) -} \ No newline at end of file +} diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index c0bda170..662f7a6b 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -1,12 +1,13 @@ +use anchor_lang::prelude::*; +use anchor_spl::token; use common::messages::raw::LiquidityLayerPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use wormhole_cctp_solana::wormhole::core_bridge_program; -use anchor_spl::token; -use anchor_lang::prelude::*; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use crate::{ error::MatchingEngineError, - state::{AuctionData, Custodian, RouterEndpoint, AuctionStatus}, processor::verify_router_path, + processor::verify_router_path, + state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}, }; #[derive(Accounts)] @@ -24,7 +25,7 @@ pub struct PlaceInitialOffer<'info> { custodian: Account<'info, Custodian>, #[account( - init_if_needed, + init, payer = payer, space = 8 + AuctionData::INIT_SPACE, seeds = [ @@ -55,23 +56,18 @@ pub struct PlaceInitialOffer<'info> { #[account( mut, - associated_token::mint = mint, + associated_token::mint = custody_token.mint, associated_token::authority = payer )] auctioneer_token: Account<'info, token::TokenAccount>, #[account( mut, - seeds = [crate::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump, - token::mint = mint, - token::authority = custodian + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, )] custody_token: Account<'info, token::TokenAccount>, - #[account(address = common::constants::usdc::id())] - mint: Account<'info, token::Mint>, - /// CHECK: Must be owned by the Wormhole Core Bridge program. #[account(owner = core_bridge_program::id())] vaa: AccountInfo<'info>, @@ -89,11 +85,12 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R // Create zero copy reference to `FastMarketOrder` payload. let vaa = VaaAccount::load(&ctx.accounts.vaa)?; - let msg = - LiquidityLayerPayload::try_from(vaa.try_payload()?) - .map_err(|_| MatchingEngineError::InvalidVaa)?.message(); - let fast_order = - msg.fast_market_order().ok_or(MatchingEngineError::NotFastMarketOrder)?; + let msg = LiquidityLayerPayload::try_from(vaa.try_payload()?) + .map_err(|_| MatchingEngineError::InvalidVaa)? + .message(); + let fast_order = msg + .fast_market_order() + .ok_or(MatchingEngineError::NotFastMarketOrder)?; // Check to see if the deadline has expired. let deadline = fast_order.deadline(); @@ -111,7 +108,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R &ctx.accounts.from_router_endpoint, &ctx.accounts.to_router_endpoint, &vaa.try_emitter_info().unwrap(), - fast_order.target_chain() + fast_order.target_chain(), )?; // Parse the transfer amount from the VAA. @@ -125,25 +122,26 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R from: ctx.accounts.auctioneer_token.to_account_info(), to: ctx.accounts.custody_token.to_account_info(), authority: ctx.accounts.payer.to_account_info(), - } + }, ), - u64::try_from(amount).unwrap().checked_add(u64::try_from(fee_offer).unwrap()).unwrap() + u64::try_from(amount) + .unwrap() + .checked_add(u64::try_from(fee_offer).unwrap()) + .unwrap(), )?; // Set up the AuctionData account for this auction. - ctx.accounts.auction_data.set_inner( - AuctionData { - bump: ctx.bumps["auction_data"], - vaa_hash: vaa.try_digest()?.as_ref().try_into().unwrap(), - status: AuctionStatus::Active, - best_offer: *ctx.accounts.payer.key, - initial_auctioneer: *ctx.accounts.payer.key, - start_slot: Clock::get()?.slot, - amount, - security_deposit: max_fee, - offer_price: fee_offer, - } - ); + ctx.accounts.auction_data.set_inner(AuctionData { + bump: ctx.bumps["auction_data"], + vaa_hash: vaa.try_digest()?.as_ref().try_into().unwrap(), + status: AuctionStatus::Active, + best_offer: *ctx.accounts.payer.key, + initial_auctioneer: *ctx.accounts.payer.key, + start_slot: Clock::get()?.slot, + amount, + security_deposit: max_fee, + offer_price: fee_offer, + }); Ok(()) -} \ No newline at end of file +} diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs index 6f0f15ee..26a20791 100644 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs @@ -34,6 +34,8 @@ pub struct AddRouterEndpoint<'info> { )] router_endpoint: Account<'info, RouterEndpoint>, + /// If provided, seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP + /// Token Messenger Minter program). remote_token_messenger: Option>, system_program: Program<'info, System>, From 16fc6d069ecca2a29915033d9e93409c344d587d Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 12 Jan 2024 10:50:17 -0600 Subject: [PATCH 035/126] solana: reorganize ts --- solana/ts/src/index.ts | 675 +----------------- solana/ts/src/tokenRouter/index.ts | 674 +++++++++++++++++ .../src/{ => tokenRouter}/state/Custodian.ts | 0 .../{ => tokenRouter}/state/PayerSequence.ts | 0 .../{ => tokenRouter}/state/RouterEndpoint.ts | 0 .../ts/src/{ => tokenRouter}/state/index.ts | 0 6 files changed, 675 insertions(+), 674 deletions(-) create mode 100644 solana/ts/src/tokenRouter/index.ts rename solana/ts/src/{ => tokenRouter}/state/Custodian.ts (100%) rename solana/ts/src/{ => tokenRouter}/state/PayerSequence.ts (100%) rename solana/ts/src/{ => tokenRouter}/state/RouterEndpoint.ts (100%) rename solana/ts/src/{ => tokenRouter}/state/index.ts (100%) diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index c3aa20b8..89806e45 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -1,676 +1,3 @@ export * from "./cctp"; export * from "./messages"; -export * from "./state"; - -import { ChainId } from "@certusone/wormhole-sdk"; -import { BN, Program } from "@coral-xyz/anchor"; -import * as splToken from "@solana/spl-token"; -import { - Connection, - PublicKey, - SYSVAR_RENT_PUBKEY, - SystemProgram, - TransactionInstruction, -} from "@solana/web3.js"; -import { IDL, TokenRouter } from "../../target/types/token_router"; -import { - CctpTokenBurnMessage, - MessageTransmitterProgram, - TokenMessengerMinterProgram, -} from "./cctp"; -import { Custodian, PayerSequence, RouterEndpoint } from "./state"; -import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "./utils"; -import { VaaAccount } from "./wormhole"; - -export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; - -export type ProgramId = (typeof PROGRAM_IDS)[number]; - -export type PlaceMarketOrderCctpArgs = { - amountIn: bigint; - targetChain: ChainId; - redeemer: Array; - redeemerMessage: Buffer; -}; - -export type PublishMessageAccounts = { - coreBridgeConfig: PublicKey; - coreEmitterSequence: PublicKey; - coreFeeCollector: PublicKey; - coreBridgeProgram: PublicKey; -}; - -export type TokenRouterCommonAccounts = PublishMessageAccounts & { - tokenRouterProgram: PublicKey; - systemProgram: PublicKey; - rent: PublicKey; - custodian: PublicKey; - custodyToken: PublicKey; - tokenMessenger: PublicKey; - tokenMinter: PublicKey; - tokenMessengerMinterSenderAuthority: PublicKey; - tokenMessengerMinterProgram: PublicKey; - messageTransmitterAuthority: PublicKey; - messageTransmitterConfig: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; - mint?: PublicKey; - localToken?: PublicKey; - tokenMessengerMinterCustodyToken?: PublicKey; -}; - -export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { - custodian: PublicKey; - custodyToken: PublicKey; - routerEndpoint: PublicKey; - tokenMessengerMinterSenderAuthority: PublicKey; - messageTransmitterConfig: PublicKey; - tokenMessenger: PublicKey; - remoteTokenMessenger: PublicKey; - tokenMinter: PublicKey; - localToken: PublicKey; - coreBridgeProgram: PublicKey; - tokenMessengerMinterProgram: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; -}; - -export type RedeemFillCctpAccounts = { - custodian: PublicKey; - custodyToken: PublicKey; - routerEndpoint: PublicKey; - messageTransmitterAuthority: PublicKey; - messageTransmitterConfig: PublicKey; - usedNonces: PublicKey; - tokenMessenger: PublicKey; - remoteTokenMessenger: PublicKey; - tokenMinter: PublicKey; - localToken: PublicKey; - tokenPair: PublicKey; - tokenMessengerMinterCustodyToken: PublicKey; - tokenMessengerMinterProgram: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; -}; - -export type AddRouterEndpointArgs = { - chain: ChainId; - address: Array; - cctpDomain: number | null; -}; - -export type RegisterContractArgs = { - chain: ChainId; - address: Array; -}; - -export type RegisterAssetArgs = { - chain: ChainId; - relayerFee: BN; - nativeSwapRate: BN; - maxNativeSwapAmount: BN; -}; - -export type UpdateRelayerFeeArgs = { - chain: ChainId; - relayerFee: BN; -}; - -export class TokenRouterProgram { - private _programId: ProgramId; - - program: Program; - - // TODO: fix this - constructor(connection: Connection, programId?: ProgramId) { - this._programId = programId ?? testnet(); - this.program = new Program(IDL, new PublicKey(this._programId), { - connection, - }); - } - - get ID(): PublicKey { - return this.program.programId; - } - - custodianAddress(): PublicKey { - return Custodian.address(this.ID); - } - - async fetchCustodian(addr: PublicKey): Promise { - return this.program.account.custodian.fetch(addr); - } - - custodyTokenAccountAddress(): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; - } - - coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { - return PublicKey.findProgramAddressSync( - [Buffer.from("msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], - this.ID - )[0]; - } - - payerSequenceAddress(payer: PublicKey): PublicKey { - return PayerSequence.address(this.ID, payer); - } - - async fetchPayerSequence(addr: PublicKey): Promise { - return this.program.account.payerSequence.fetch(addr); - } - - async fetchPayerSequenceValue(addr: PublicKey): Promise { - return this.fetchPayerSequence(addr) - .then((acct) => acct.value) - .catch((_) => new BN(0)); - } - - routerEndpointAddress(chain: ChainId): PublicKey { - return RouterEndpoint.address(this.ID, chain); - } - - async fetchRouterEndpoint(addr: PublicKey): Promise { - return this.program.account.routerEndpoint.fetch(addr); - } - - commonAccounts(mint?: PublicKey): TokenRouterCommonAccounts { - const custodian = this.custodianAddress(); - const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - this.publishMessageAccounts(custodian); - - const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); - const messageTransmitterProgram = this.messageTransmitterProgram(); - - const [localToken, tokenMessengerMinterCustodyToken] = (() => { - if (mint === undefined) { - return []; - } else { - return [ - tokenMessengerMinterProgram.localTokenAddress(mint), - tokenMessengerMinterProgram.custodyTokenAddress(mint), - ]; - } - })(); - - return { - tokenRouterProgram: this.ID, - systemProgram: SystemProgram.programId, - rent: SYSVAR_RENT_PUBKEY, - custodian, - custodyToken: this.custodyTokenAccountAddress(), - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - coreBridgeProgram, - tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), - tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), - tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), - tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, - messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), - messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), - messageTransmitterProgram: messageTransmitterProgram.ID, - tokenProgram: splToken.TOKEN_PROGRAM_ID, - mint, - localToken, - tokenMessengerMinterCustodyToken, - }; - } - - async placeMarketOrderCctpAccounts( - mint: PublicKey, - targetChain: ChainId, - overrides: { - remoteDomain?: number; - } = {} - ): Promise { - const { remoteDomain: inputRemoteDomain } = overrides; - - const routerEndpoint = this.routerEndpointAddress(targetChain); - const remoteDomain = await (async () => { - if (inputRemoteDomain !== undefined) { - return inputRemoteDomain; - } else { - const cctpDomain = await this.fetchRouterEndpoint(routerEndpoint).then( - (acct) => acct.cctpDomain - ); - if (cctpDomain === null) { - throw new Error("invalid router endpoint"); - } else { - return cctpDomain; - } - } - })(); - - const { - senderAuthority: tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - messageTransmitterProgram, - tokenMessengerMinterProgram, - tokenProgram, - } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); - - const custodian = this.custodianAddress(); - const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - this.publishMessageAccounts(custodian); - - return { - custodian, - custodyToken: this.custodyTokenAccountAddress(), - routerEndpoint, - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - coreBridgeProgram, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - }; - } - - async placeMarketOrderCctpIx( - accounts: { - payer: PublicKey; - mint: PublicKey; - burnSource: PublicKey; - burnSourceAuthority?: PublicKey; - }, - args: PlaceMarketOrderCctpArgs - ): Promise { - let { payer, burnSource, mint, burnSourceAuthority: inputBurnSourceAuthority } = accounts; - const burnSourceAuthority = - inputBurnSourceAuthority ?? - (await splToken - .getAccount(this.program.provider.connection, burnSource) - .then((token) => token.owner)); - - const { amountIn, targetChain, redeemer, redeemerMessage } = args; - - const payerSequence = this.payerSequenceAddress(payer); - const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => - this.coreMessageAddress(payer, value) - ); - const { - custodian, - custodyToken, - routerEndpoint, - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - coreBridgeProgram, - tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - } = await this.placeMarketOrderCctpAccounts(mint, targetChain); - - return this.program.methods - .placeMarketOrderCctp({ - amountIn: new BN(amountIn.toString()), - redeemer, - redeemerMessage, - }) - .accounts({ - payer, - payerSequence, - custodian, - burnSourceAuthority, - mint, - burnSource, - custodyToken, - routerEndpoint, - coreBridgeConfig, - coreMessage, - coreEmitterSequence, - coreFeeCollector, - tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - coreBridgeProgram, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - }) - .instruction(); - } - - async redeemCctpFillAccounts( - vaa: PublicKey, - cctpMessage: CctpTokenBurnMessage | Buffer - ): Promise { - const msg = CctpTokenBurnMessage.from(cctpMessage); - const custodyToken = this.custodyTokenAccountAddress(); - //const redeemerToken = new PublicKey(msg.mintRecipient); - - // TODO: hardcode mint as USDC? - const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); - - const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); - const { chain } = vaaAcct.emitterInfo(); - - const messageTransmitterProgram = this.messageTransmitterProgram(); - const { - authority: messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessengerMinterProgram, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - custodyToken: tokenMessengerMinterCustodyToken, - tokenProgram, - } = messageTransmitterProgram.receiveMessageAccounts(mint, msg); - - return { - custodian: this.custodianAddress(), - custodyToken, - routerEndpoint: this.routerEndpointAddress(chain as ChainId), // yikes - messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - tokenMessengerMinterCustodyToken, - tokenMessengerMinterProgram, - messageTransmitterProgram: messageTransmitterProgram.ID, - tokenProgram, - }; - } - - async redeemCctpFillIx( - accounts: { - payer: PublicKey; - vaa: PublicKey; - redeemer: PublicKey; - dstToken: PublicKey; - }, - args: { - encodedCctpMessage: Buffer; - cctpAttestation: Buffer; - } - ): Promise { - const { payer, vaa, redeemer, dstToken } = accounts; - - const { encodedCctpMessage } = args; - - const { - custodian, - custodyToken, - routerEndpoint, - messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - tokenMessengerMinterCustodyToken, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - } = await this.redeemCctpFillAccounts(vaa, encodedCctpMessage); - - return this.program.methods - .redeemCctpFill(args) - .accounts({ - payer, - custodian, - vaa, - redeemer, - dstToken, - custodyToken, - routerEndpoint, - messageTransmitterAuthority, - messageTransmitterConfig, - usedNonces, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - tokenPair, - tokenMessengerMinterCustodyToken, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - }) - .instruction(); - } - - async initializeIx(accounts: { - owner: PublicKey; - ownerAssistant: PublicKey; - mint: PublicKey; - }): Promise { - const { owner, ownerAssistant, mint } = accounts; - return this.program.methods - .initialize() - .accounts({ - owner, - custodian: this.custodianAddress(), - ownerAssistant, - mint, - custodyToken: this.custodyTokenAccountAddress(), - }) - .instruction(); - } - - async setPauseIx( - accounts: { - ownerOrAssistant: PublicKey; - custodian?: PublicKey; - }, - paused: boolean - ): Promise { - const { ownerOrAssistant, custodian: inputCustodian } = accounts; - return this.program.methods - .setPause(paused) - .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), - }) - .instruction(); - } - - async submitOwnershipTransferIx(accounts: { - owner: PublicKey; - newOwner: PublicKey; - custodian?: PublicKey; - }): Promise { - const { owner, newOwner, custodian: inputCustodian } = accounts; - return this.program.methods - .submitOwnershipTransferRequest() - .accounts({ - owner, - custodian: inputCustodian ?? this.custodianAddress(), - newOwner, - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, - }) - .instruction(); - } - - async confirmOwnershipTransferIx(accounts: { - pendingOwner: PublicKey; - custodian?: PublicKey; - }): Promise { - const { pendingOwner, custodian: inputCustodian } = accounts; - return this.program.methods - .confirmOwnershipTransferRequest() - .accounts({ - pendingOwner, - custodian: inputCustodian ?? this.custodianAddress(), - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, - }) - .instruction(); - } - - async cancelOwnershipTransferIx(accounts: { - owner: PublicKey; - custodian?: PublicKey; - }): Promise { - const { owner, custodian: inputCustodian } = accounts; - return this.program.methods - .cancelOwnershipTransferRequest() - .accounts({ - owner, - custodian: inputCustodian ?? this.custodianAddress(), - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, - }) - .instruction(); - } - - async addRouterEndpointIx( - accounts: { - ownerOrAssistant: PublicKey; - custodian?: PublicKey; - routerEndpoint?: PublicKey; - remoteTokenMessenger?: PublicKey; - }, - args: AddRouterEndpointArgs - ): Promise { - const { - ownerOrAssistant, - custodian: inputCustodian, - routerEndpoint: inputRouterEndpoint, - remoteTokenMessenger: inputRemoteTokenMessenger, - } = accounts; - const { chain, cctpDomain } = args; - const derivedRemoteTokenMessenger = - cctpDomain === null - ? null - : this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); - return this.program.methods - .addRouterEndpoint(args) - .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), - routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), - remoteTokenMessenger: inputRemoteTokenMessenger ?? derivedRemoteTokenMessenger, - }) - .instruction(); - } - - async updateOwnerAssistantIx(accounts: { - owner: PublicKey; - newOwnerAssistant: PublicKey; - custodian?: PublicKey; - }) { - const { owner, newOwnerAssistant, custodian: inputCustodian } = accounts; - return this.program.methods - .updateOwnerAssistant() - .accounts({ - owner, - custodian: inputCustodian ?? this.custodianAddress(), - newOwnerAssistant, - }) - .instruction(); - } - - tokenMessengerMinterProgram(): TokenMessengerMinterProgram { - switch (this._programId) { - case testnet(): { - return new TokenMessengerMinterProgram( - this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" - ); - } - case mainnet(): { - return new TokenMessengerMinterProgram( - this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" - ); - } - default: { - throw new Error("unsupported network"); - } - } - } - - messageTransmitterProgram(): MessageTransmitterProgram { - switch (this._programId) { - case testnet(): { - return new MessageTransmitterProgram( - this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" - ); - } - case mainnet(): { - return new MessageTransmitterProgram( - this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" - ); - } - default: { - throw new Error("unsupported network"); - } - } - } - - publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { - const coreBridgeProgram = this.coreBridgeProgramId(); - - return { - coreBridgeConfig: PublicKey.findProgramAddressSync( - [Buffer.from("Bridge")], - coreBridgeProgram - )[0], - coreEmitterSequence: PublicKey.findProgramAddressSync( - [Buffer.from("Sequence"), emitter.toBuffer()], - coreBridgeProgram - )[0], - coreFeeCollector: PublicKey.findProgramAddressSync( - [Buffer.from("fee_collector")], - coreBridgeProgram - )[0], - coreBridgeProgram, - }; - } - - coreBridgeProgramId(): PublicKey { - switch (this._programId) { - case testnet(): { - return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); - } - case mainnet(): { - return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); - } - default: { - throw new Error("unsupported network"); - } - } - } -} - -export function testnet(): ProgramId { - return "TokenRouter11111111111111111111111111111111"; -} - -export function mainnet(): ProgramId { - return "TokenRouter11111111111111111111111111111111"; -} +export * from "./tokenRouter"; diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts new file mode 100644 index 00000000..7efd5a71 --- /dev/null +++ b/solana/ts/src/tokenRouter/index.ts @@ -0,0 +1,674 @@ +export * from "./state"; + +import { ChainId } from "@certusone/wormhole-sdk"; +import { BN, Program } from "@coral-xyz/anchor"; +import * as splToken from "@solana/spl-token"; +import { + Connection, + PublicKey, + SYSVAR_RENT_PUBKEY, + SystemProgram, + TransactionInstruction, +} from "@solana/web3.js"; +import { IDL, TokenRouter } from "../../../target/types/token_router"; +import { + CctpTokenBurnMessage, + MessageTransmitterProgram, + TokenMessengerMinterProgram, +} from "../cctp"; +import { Custodian, PayerSequence, RouterEndpoint } from "./state"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; +import { VaaAccount } from "../wormhole"; + +export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; + +export type ProgramId = (typeof PROGRAM_IDS)[number]; + +export type PlaceMarketOrderCctpArgs = { + amountIn: bigint; + targetChain: ChainId; + redeemer: Array; + redeemerMessage: Buffer; +}; + +export type PublishMessageAccounts = { + coreBridgeConfig: PublicKey; + coreEmitterSequence: PublicKey; + coreFeeCollector: PublicKey; + coreBridgeProgram: PublicKey; +}; + +export type TokenRouterCommonAccounts = PublishMessageAccounts & { + tokenRouterProgram: PublicKey; + systemProgram: PublicKey; + rent: PublicKey; + custodian: PublicKey; + custodyToken: PublicKey; + tokenMessenger: PublicKey; + tokenMinter: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; + mint?: PublicKey; + localToken?: PublicKey; + tokenMessengerMinterCustodyToken?: PublicKey; +}; + +export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { + custodian: PublicKey; + custodyToken: PublicKey; + routerEndpoint: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + coreBridgeProgram: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; +}; + +export type RedeemFillCctpAccounts = { + custodian: PublicKey; + custodyToken: PublicKey; + routerEndpoint: PublicKey; + messageTransmitterAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + usedNonces: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + tokenPair: PublicKey; + tokenMessengerMinterCustodyToken: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; +}; + +export type AddRouterEndpointArgs = { + chain: ChainId; + address: Array; + cctpDomain: number | null; +}; + +export type RegisterContractArgs = { + chain: ChainId; + address: Array; +}; + +export type RegisterAssetArgs = { + chain: ChainId; + relayerFee: BN; + nativeSwapRate: BN; + maxNativeSwapAmount: BN; +}; + +export type UpdateRelayerFeeArgs = { + chain: ChainId; + relayerFee: BN; +}; + +export class TokenRouterProgram { + private _programId: ProgramId; + + program: Program; + + // TODO: fix this + constructor(connection: Connection, programId?: ProgramId) { + this._programId = programId ?? testnet(); + this.program = new Program(IDL, new PublicKey(this._programId), { + connection, + }); + } + + get ID(): PublicKey { + return this.program.programId; + } + + custodianAddress(): PublicKey { + return Custodian.address(this.ID); + } + + async fetchCustodian(addr: PublicKey): Promise { + return this.program.account.custodian.fetch(addr); + } + + custodyTokenAccountAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; + } + + coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], + this.ID + )[0]; + } + + payerSequenceAddress(payer: PublicKey): PublicKey { + return PayerSequence.address(this.ID, payer); + } + + async fetchPayerSequence(addr: PublicKey): Promise { + return this.program.account.payerSequence.fetch(addr); + } + + async fetchPayerSequenceValue(addr: PublicKey): Promise { + return this.fetchPayerSequence(addr) + .then((acct) => acct.value) + .catch((_) => new BN(0)); + } + + routerEndpointAddress(chain: ChainId): PublicKey { + return RouterEndpoint.address(this.ID, chain); + } + + async fetchRouterEndpoint(addr: PublicKey): Promise { + return this.program.account.routerEndpoint.fetch(addr); + } + + commonAccounts(mint?: PublicKey): TokenRouterCommonAccounts { + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + + const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); + const messageTransmitterProgram = this.messageTransmitterProgram(); + + const [localToken, tokenMessengerMinterCustodyToken] = (() => { + if (mint === undefined) { + return []; + } else { + return [ + tokenMessengerMinterProgram.localTokenAddress(mint), + tokenMessengerMinterProgram.custodyTokenAddress(mint), + ]; + } + })(); + + return { + tokenRouterProgram: this.ID, + systemProgram: SystemProgram.programId, + rent: SYSVAR_RENT_PUBKEY, + custodian, + custodyToken: this.custodyTokenAccountAddress(), + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), + tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), + tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), + tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, + messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), + messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + mint, + localToken, + tokenMessengerMinterCustodyToken, + }; + } + + async placeMarketOrderCctpAccounts( + mint: PublicKey, + targetChain: ChainId, + overrides: { + remoteDomain?: number; + } = {} + ): Promise { + const { remoteDomain: inputRemoteDomain } = overrides; + + const routerEndpoint = this.routerEndpointAddress(targetChain); + const remoteDomain = await (async () => { + if (inputRemoteDomain !== undefined) { + return inputRemoteDomain; + } else { + const cctpDomain = await this.fetchRouterEndpoint(routerEndpoint).then( + (acct) => acct.cctpDomain + ); + if (cctpDomain === null) { + throw new Error("invalid router endpoint"); + } else { + return cctpDomain; + } + } + })(); + + const { + senderAuthority: tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + messageTransmitterProgram, + tokenMessengerMinterProgram, + tokenProgram, + } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); + + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + + return { + custodian, + custodyToken: this.custodyTokenAccountAddress(), + routerEndpoint, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }; + } + + async placeMarketOrderCctpIx( + accounts: { + payer: PublicKey; + mint: PublicKey; + burnSource: PublicKey; + burnSourceAuthority?: PublicKey; + }, + args: PlaceMarketOrderCctpArgs + ): Promise { + let { payer, burnSource, mint, burnSourceAuthority: inputBurnSourceAuthority } = accounts; + const burnSourceAuthority = + inputBurnSourceAuthority ?? + (await splToken + .getAccount(this.program.provider.connection, burnSource) + .then((token) => token.owner)); + + const { amountIn, targetChain, redeemer, redeemerMessage } = args; + + const payerSequence = this.payerSequenceAddress(payer); + const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => + this.coreMessageAddress(payer, value) + ); + const { + custodian, + custodyToken, + routerEndpoint, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + } = await this.placeMarketOrderCctpAccounts(mint, targetChain); + + return this.program.methods + .placeMarketOrderCctp({ + amountIn: new BN(amountIn.toString()), + redeemer, + redeemerMessage, + }) + .accounts({ + payer, + payerSequence, + custodian, + burnSourceAuthority, + mint, + burnSource, + custodyToken, + routerEndpoint, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }) + .instruction(); + } + + async redeemCctpFillAccounts( + vaa: PublicKey, + cctpMessage: CctpTokenBurnMessage | Buffer + ): Promise { + const msg = CctpTokenBurnMessage.from(cctpMessage); + const custodyToken = this.custodyTokenAccountAddress(); + //const redeemerToken = new PublicKey(msg.mintRecipient); + + // TODO: hardcode mint as USDC? + const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); + + const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); + const { chain } = vaaAcct.emitterInfo(); + + const messageTransmitterProgram = this.messageTransmitterProgram(); + const { + authority: messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessengerMinterProgram, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + custodyToken: tokenMessengerMinterCustodyToken, + tokenProgram, + } = messageTransmitterProgram.receiveMessageAccounts(mint, msg); + + return { + custodian: this.custodianAddress(), + custodyToken, + routerEndpoint: this.routerEndpointAddress(chain as ChainId), // yikes + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenProgram, + }; + } + + async redeemCctpFillIx( + accounts: { + payer: PublicKey; + vaa: PublicKey; + redeemer: PublicKey; + dstToken: PublicKey; + }, + args: { + encodedCctpMessage: Buffer; + cctpAttestation: Buffer; + } + ): Promise { + const { payer, vaa, redeemer, dstToken } = accounts; + + const { encodedCctpMessage } = args; + + const { + custodian, + custodyToken, + routerEndpoint, + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + } = await this.redeemCctpFillAccounts(vaa, encodedCctpMessage); + + return this.program.methods + .redeemCctpFill(args) + .accounts({ + payer, + custodian, + vaa, + redeemer, + dstToken, + custodyToken, + routerEndpoint, + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }) + .instruction(); + } + + async initializeIx(accounts: { + owner: PublicKey; + ownerAssistant: PublicKey; + mint: PublicKey; + }): Promise { + const { owner, ownerAssistant, mint } = accounts; + return this.program.methods + .initialize() + .accounts({ + owner, + custodian: this.custodianAddress(), + ownerAssistant, + mint, + custodyToken: this.custodyTokenAccountAddress(), + }) + .instruction(); + } + + async setPauseIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + }, + paused: boolean + ): Promise { + const { ownerOrAssistant, custodian: inputCustodian } = accounts; + return this.program.methods + .setPause(paused) + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + }) + .instruction(); + } + + async submitOwnershipTransferIx(accounts: { + owner: PublicKey; + newOwner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { owner, newOwner, custodian: inputCustodian } = accounts; + return this.program.methods + .submitOwnershipTransferRequest() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + newOwner, + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + }) + .instruction(); + } + + async confirmOwnershipTransferIx(accounts: { + pendingOwner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { pendingOwner, custodian: inputCustodian } = accounts; + return this.program.methods + .confirmOwnershipTransferRequest() + .accounts({ + pendingOwner, + custodian: inputCustodian ?? this.custodianAddress(), + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + }) + .instruction(); + } + + async cancelOwnershipTransferIx(accounts: { + owner: PublicKey; + custodian?: PublicKey; + }): Promise { + const { owner, custodian: inputCustodian } = accounts; + return this.program.methods + .cancelOwnershipTransferRequest() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + programData: getProgramData(this.ID), + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + }) + .instruction(); + } + + async addRouterEndpointIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + remoteTokenMessenger?: PublicKey; + }, + args: AddRouterEndpointArgs + ): Promise { + const { + ownerOrAssistant, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + remoteTokenMessenger: inputRemoteTokenMessenger, + } = accounts; + const { chain, cctpDomain } = args; + const derivedRemoteTokenMessenger = + cctpDomain === null + ? null + : this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); + return this.program.methods + .addRouterEndpoint(args) + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + remoteTokenMessenger: inputRemoteTokenMessenger ?? derivedRemoteTokenMessenger, + }) + .instruction(); + } + + async updateOwnerAssistantIx(accounts: { + owner: PublicKey; + newOwnerAssistant: PublicKey; + custodian?: PublicKey; + }) { + const { owner, newOwnerAssistant, custodian: inputCustodian } = accounts; + return this.program.methods + .updateOwnerAssistant() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + newOwnerAssistant, + }) + .instruction(); + } + + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { + switch (this._programId) { + case testnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + case mainnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + messageTransmitterProgram(): MessageTransmitterProgram { + switch (this._programId) { + case testnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + case mainnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { + const coreBridgeProgram = this.coreBridgeProgramId(); + + return { + coreBridgeConfig: PublicKey.findProgramAddressSync( + [Buffer.from("Bridge")], + coreBridgeProgram + )[0], + coreEmitterSequence: PublicKey.findProgramAddressSync( + [Buffer.from("Sequence"), emitter.toBuffer()], + coreBridgeProgram + )[0], + coreFeeCollector: PublicKey.findProgramAddressSync( + [Buffer.from("fee_collector")], + coreBridgeProgram + )[0], + coreBridgeProgram, + }; + } + + coreBridgeProgramId(): PublicKey { + switch (this._programId) { + case testnet(): { + return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); + } + case mainnet(): { + return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); + } + default: { + throw new Error("unsupported network"); + } + } + } +} + +export function testnet(): ProgramId { + return "TokenRouter11111111111111111111111111111111"; +} + +export function mainnet(): ProgramId { + return "TokenRouter11111111111111111111111111111111"; +} diff --git a/solana/ts/src/state/Custodian.ts b/solana/ts/src/tokenRouter/state/Custodian.ts similarity index 100% rename from solana/ts/src/state/Custodian.ts rename to solana/ts/src/tokenRouter/state/Custodian.ts diff --git a/solana/ts/src/state/PayerSequence.ts b/solana/ts/src/tokenRouter/state/PayerSequence.ts similarity index 100% rename from solana/ts/src/state/PayerSequence.ts rename to solana/ts/src/tokenRouter/state/PayerSequence.ts diff --git a/solana/ts/src/state/RouterEndpoint.ts b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts similarity index 100% rename from solana/ts/src/state/RouterEndpoint.ts rename to solana/ts/src/tokenRouter/state/RouterEndpoint.ts diff --git a/solana/ts/src/state/index.ts b/solana/ts/src/tokenRouter/state/index.ts similarity index 100% rename from solana/ts/src/state/index.ts rename to solana/ts/src/tokenRouter/state/index.ts From a47183844362a161f8ec99b01a6a90ec7e1429ec Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 12 Jan 2024 11:06:26 -0600 Subject: [PATCH 036/126] solana/ts: clean up --- solana/ts/src/index.ts | 1 - .../{matching_engine => matchingEngine}/index.ts | 1 - .../state/AuctionData.ts | 0 .../state/Custodian.ts | 0 .../state/RouterEndpoint.ts | 0 .../state/index.ts | 0 solana/ts/src/tokenRouter/index.ts | 2 +- solana/ts/tests/01__matchingEngine.ts | 16 ++++++++-------- solana/ts/tests/02__tokenRouter.ts | 10 ++-------- 9 files changed, 11 insertions(+), 19 deletions(-) rename solana/ts/src/{matching_engine => matchingEngine}/index.ts (99%) rename solana/ts/src/{matching_engine => matchingEngine}/state/AuctionData.ts (100%) rename solana/ts/src/{matching_engine => matchingEngine}/state/Custodian.ts (100%) rename solana/ts/src/{matching_engine => matchingEngine}/state/RouterEndpoint.ts (100%) rename solana/ts/src/{matching_engine => matchingEngine}/state/index.ts (100%) diff --git a/solana/ts/src/index.ts b/solana/ts/src/index.ts index 89806e45..5933d7c0 100644 --- a/solana/ts/src/index.ts +++ b/solana/ts/src/index.ts @@ -1,3 +1,2 @@ export * from "./cctp"; export * from "./messages"; -export * from "./tokenRouter"; diff --git a/solana/ts/src/matching_engine/index.ts b/solana/ts/src/matchingEngine/index.ts similarity index 99% rename from solana/ts/src/matching_engine/index.ts rename to solana/ts/src/matchingEngine/index.ts index eebab6f2..1dd422b7 100644 --- a/solana/ts/src/matching_engine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -217,7 +217,6 @@ export class MatchingEngineProgram { toRouterEndpoint: this.routerEndpointAddress(toChain), auctioneerToken: splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, payer), custodyToken: this.custodyTokenAccountAddress(), - mint: USDC_MINT_ADDRESS, vaa, }) .instruction(); diff --git a/solana/ts/src/matching_engine/state/AuctionData.ts b/solana/ts/src/matchingEngine/state/AuctionData.ts similarity index 100% rename from solana/ts/src/matching_engine/state/AuctionData.ts rename to solana/ts/src/matchingEngine/state/AuctionData.ts diff --git a/solana/ts/src/matching_engine/state/Custodian.ts b/solana/ts/src/matchingEngine/state/Custodian.ts similarity index 100% rename from solana/ts/src/matching_engine/state/Custodian.ts rename to solana/ts/src/matchingEngine/state/Custodian.ts diff --git a/solana/ts/src/matching_engine/state/RouterEndpoint.ts b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts similarity index 100% rename from solana/ts/src/matching_engine/state/RouterEndpoint.ts rename to solana/ts/src/matchingEngine/state/RouterEndpoint.ts diff --git a/solana/ts/src/matching_engine/state/index.ts b/solana/ts/src/matchingEngine/state/index.ts similarity index 100% rename from solana/ts/src/matching_engine/state/index.ts rename to solana/ts/src/matchingEngine/state/index.ts diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 7efd5a71..9e2c44ce 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -16,9 +16,9 @@ import { MessageTransmitterProgram, TokenMessengerMinterProgram, } from "../cctp"; -import { Custodian, PayerSequence, RouterEndpoint } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; +import { Custodian, PayerSequence, RouterEndpoint } from "./state"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index edbebedf..7ac71869 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,26 +1,26 @@ -import { CHAINS, parseVaa, ChainId, keccak256 } from "@certusone/wormhole-sdk"; -import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; -import { use as chaiUse, expect } from "chai"; +import { CHAINS, ChainId, keccak256, parseVaa } from "@certusone/wormhole-sdk"; import { - mintTo, getAccount, getAssociatedTokenAddressSync, getOrCreateAssociatedTokenAccount, + mintTo, } from "@solana/spl-token"; +import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; +import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { AuctionConfig, Custodian, - RouterEndpoint, MatchingEngineProgram, -} from "../src/matching_engine"; + RouterEndpoint, +} from "../src/matchingEngine"; import { LOCALHOST, + MOCK_GUARDIANS, PAYER_KEYPAIR, + USDC_MINT_ADDRESS, expectIxErr, expectIxOk, - USDC_MINT_ADDRESS, - MOCK_GUARDIANS, } from "./helpers"; import { FastMarketOrder, diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 212179c5..a6ae3b99 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -10,14 +10,8 @@ import { } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; -import { - CctpTokenBurnMessage, - Custodian, - Fill, - LiquidityLayerDeposit, - RouterEndpoint, - TokenRouterProgram, -} from "../src"; +import { CctpTokenBurnMessage, Fill, LiquidityLayerDeposit } from "../src"; +import { Custodian, RouterEndpoint, TokenRouterProgram } from "../src/tokenRouter"; import { CircleAttester, ETHEREUM_USDC_ADDRESS, From 3f4409191cd093be5358215ddabf2a8fde4ef29f Mon Sep 17 00:00:00 2001 From: gator-boi Date: Fri, 12 Jan 2024 13:21:23 -0600 Subject: [PATCH 037/126] solana: add improve_offer happy path test --- .../src/processor/auction/improve_offer.rs | 6 +- .../processor/auction/place_initial_offer.rs | 4 +- solana/ts/src/matchingEngine/index.ts | 19 ++ solana/ts/tests/01__matchingEngine.ts | 184 +++++++++++++++--- .../ts/tests/helpers/matching_engine_utils.ts | 8 + 5 files changed, 188 insertions(+), 33 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs index 48c3cebc..bbc9f529 100644 --- a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs @@ -92,11 +92,11 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { )?; // Update the `best_offer` token account and `amount` fields. - auction_data.best_offer = *ctx.accounts.auctioneer_token.to_account_info().key; - auction_data.amount = fee_offer; + auction_data.best_offer = ctx.accounts.auctioneer_token.key(); + auction_data.offer_price = fee_offer; } else { // Since the auctioneer is already the best offer, we only need to update the `amount`. - auction_data.amount = fee_offer; + auction_data.offer_price = fee_offer; } Ok(()) diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 662f7a6b..15b5695b 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -135,8 +135,8 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R bump: ctx.bumps["auction_data"], vaa_hash: vaa.try_digest()?.as_ref().try_into().unwrap(), status: AuctionStatus::Active, - best_offer: *ctx.accounts.payer.key, - initial_auctioneer: *ctx.accounts.payer.key, + best_offer: ctx.accounts.auctioneer_token.key(), + initial_auctioneer: ctx.accounts.auctioneer_token.key(), start_slot: Clock::get()?.slot, amount, security_deposit: max_fee, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 1dd422b7..d67c6374 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -221,6 +221,25 @@ export class MatchingEngineProgram { }) .instruction(); } + + async improveOfferIx( + feeOffer: bigint, + vaaHash: Buffer, + accounts: { payer: PublicKey; bestOfferToken: PublicKey } + ) { + const { payer, bestOfferToken } = accounts; + return this.program.methods + .improveOffer(new BN(feeOffer.toString())) + .accounts({ + payer, + custodian: this.custodianAddress(), + auctionData: this.auctionDataAddress(vaaHash), + auctioneerToken: splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, payer), + bestOfferToken, + custodyToken: this.custodyTokenAccountAddress(), + }) + .instruction(); + } } export function testnet(): ProgramId { diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 7ac71869..74c0da89 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -24,6 +24,7 @@ import { } from "./helpers"; import { FastMarketOrder, + getBestOfferTokenAccount, getTokenBalance, postFastTransferVaa, } from "./helpers/matching_engine_utils"; @@ -693,40 +694,27 @@ describe("Matching Engine", function () { describe("Place Initial Offer", function () { it("Place Initial Offer", async function () { - const [vaaKey, signedVaa] = await postFastTransferVaa( - connection, - auctioneerOne, - MOCK_GUARDIANS, - wormholeSequence++, - baseFastOrder, - "0x" + Buffer.from(ethRouter).toString("hex") - ); - // Fetch the balances before. const auctioneerBefore = await getTokenBalance(connection, auctioneerOne.publicKey); const custodyBefore = ( await getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - // Place the initial offer. - await expectIxOk( + const signedVaa = await placeInitialOfferForTest( connection, - [ - await engine.placeInitialOfferIx( - baseFastOrder.maxFee, - ethChain, - arbChain, - keccak256(parseVaa(signedVaa).hash), - { - payer: auctioneerOne.publicKey, - vaa: vaaKey, - } - ), - ], - [auctioneerOne] + auctioneerOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } ); - // Fetch the balances before. + // Validate balance changes. const auctioneerAfter = await getTokenBalance(connection, auctioneerOne.publicKey); const custodyAfter = ( await getAccount(connection, engine.custodyTokenAccountAddress()) @@ -743,12 +731,16 @@ describe("Matching Engine", function () { const vaaHash = keccak256(parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); + const auctioneerToken = await getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + auctioneerOne.publicKey + ); expect(auctionData.bump).to.equal(254); expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionData.status).to.eql({ active: {} }); - expect(auctionData.bestOffer).to.eql(auctioneerOne.publicKey); - expect(auctionData.initialAuctioneer).to.eql(auctioneerOne.publicKey); + expect(auctionData.bestOffer).to.eql(auctioneerToken); + expect(auctionData.initialAuctioneer).to.eql(auctioneerToken); expect(auctionData.startSlot.toString()).to.eql(slot.toString()); expect(auctionData.amount.toString()).to.eql(baseFastOrder.amountIn.toString()); expect(auctionData.securityDeposit.toString()).to.eql( @@ -758,6 +750,142 @@ describe("Matching Engine", function () { }); }); - describe("Improve Offer", function () {}); + describe("Improve Offer", function () { + it("Improve Offer With New Auctioneer", async function () { + const signedVaa = await placeInitialOfferForTest( + connection, + auctioneerOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + const initalAuctioneerBefore = await getTokenBalance( + connection, + auctioneerOne.publicKey + ); + const newAuctioneerBefore = await getTokenBalance( + connection, + auctioneerTwo.publicKey + ); + const custodyBefore = ( + await getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + // New Offer from auctioneerTwo. + const newOffer = baseFastOrder.maxFee - 100n; + const vaaHash = keccak256(parseVaa(signedVaa).hash); + const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + await expectIxOk( + connection, + [ + await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { + payer: auctioneerTwo.publicKey, + bestOfferToken, + }), + ], + [auctioneerTwo] + ); + + // Validate balance changes. + const initalAuctioneerAfter = await getTokenBalance( + connection, + auctioneerOne.publicKey + ); + const newAuctioneerAfter = await getTokenBalance( + connection, + auctioneerTwo.publicKey + ); + const custodyAfter = ( + await getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + expect(newAuctioneerAfter).equals( + newAuctioneerBefore - baseFastOrder.maxFee - baseFastOrder.amountIn + ); + expect(initalAuctioneerAfter).equals( + initalAuctioneerBefore + baseFastOrder.maxFee + baseFastOrder.amountIn + ); + expect(custodyAfter).equals(custodyBefore); + + // Confirm the auction data. + const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + const newAuctioneerToken = await getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + auctioneerTwo.publicKey + ); + const initialAuctioneerToken = await getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + auctioneerOne.publicKey + ); + + expect(auctionDataAfter.bump).to.equal(249); + expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionDataAfter.status).to.eql({ active: {} }); + expect(auctionDataAfter.bestOffer).to.eql(newAuctioneerToken); + expect(auctionDataAfter.initialAuctioneer).to.eql(initialAuctioneerToken); + expect(auctionDataAfter.startSlot.toString()).to.eql( + auctionDataBefore.startSlot.toString() + ); + expect(auctionDataAfter.amount.toString()).to.eql( + auctionDataBefore.amount.toString() + ); + expect(auctionDataAfter.securityDeposit.toString()).to.eql( + auctionDataBefore.securityDeposit.toString() + ); + expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + }); + }); }); }); + +async function placeInitialOfferForTest( + connection: Connection, + auctioneer: Keypair, + sequence: bigint, + fastOrder: FastMarketOrder, + emitter: number[], + engine: MatchingEngineProgram, + args: { + feeOffer: bigint; + fromChain: ChainId; + toChain: ChainId; + } +): Promise { + const [vaaKey, signedVaa] = await postFastTransferVaa( + connection, + auctioneer, + MOCK_GUARDIANS, + sequence, + fastOrder, + "0x" + Buffer.from(emitter).toString("hex") + ); + + // Place the initial offer. + await expectIxOk( + connection, + [ + await engine.placeInitialOfferIx( + args.feeOffer, + args.fromChain, + args.toChain, + keccak256(parseVaa(signedVaa).hash), + { + payer: auctioneer.publicKey, + vaa: vaaKey, + } + ), + ], + [auctioneer] + ); + + return signedVaa; +} diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index c5977d2f..7a1f572b 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -5,6 +5,7 @@ import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormh import { Connection, Keypair, PublicKey } from "@solana/web3.js"; import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; import { WORMHOLE_CONTRACTS, USDC_MINT_ADDRESS } from "../../tests/helpers"; +import { MatchingEngineProgram } from "../../src/matchingEngine"; import { ethers } from "ethers"; export async function getTokenBalance(connection: Connection, address: PublicKey) { @@ -150,3 +151,10 @@ export async function postFastTransferVaa( return [derivePostedVaaKey(WORMHOLE_CONTRACTS.solana.core, parseVaa(vaaBuf).hash), vaaBuf]; } + +export async function getBestOfferTokenAccount( + engine: MatchingEngineProgram, + vaaHash: Buffer +): Promise { + return (await engine.fetchAuctionData(vaaHash)).bestOffer; +} From f6d25d05d0f30d5c7cc10b87b6582e83b74451c3 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 12 Jan 2024 15:10:41 -0600 Subject: [PATCH 038/126] solana/ts: refactor messages --- .../src/{messages.ts => messages/deposit.ts} | 72 +-------- solana/ts/src/messages/index.ts | 146 ++++++++++++++++++ solana/ts/tests/02__tokenRouter.ts | 30 ++-- solana/ts/tests/helpers/mock.ts | 6 +- 4 files changed, 173 insertions(+), 81 deletions(-) rename solana/ts/src/{messages.ts => messages/deposit.ts} (62%) create mode 100644 solana/ts/src/messages/index.ts diff --git a/solana/ts/src/messages.ts b/solana/ts/src/messages/deposit.ts similarity index 62% rename from solana/ts/src/messages.ts rename to solana/ts/src/messages/deposit.ts index b7f8d820..19a3ec01 100644 --- a/solana/ts/src/messages.ts +++ b/solana/ts/src/messages/deposit.ts @@ -1,5 +1,7 @@ import { ethers } from "ethers"; +const FILL_PAYLOAD_ID = 11; + export type DepositHeader = { tokenAddress: Array; amount: bigint; @@ -17,26 +19,15 @@ export type Fill = { redeemerMessage: Buffer; }; -export type FastFill = { - fill: Fill; - amount: bigint; -}; - -export type SlowOrderResponse = { - baseFee: bigint; -}; - -export type DepositMessage = { +export type LiquidityLayerDepositMessage = { fill?: Fill; - fastFill?: FastFill; - slowOrderResponse?: SlowOrderResponse; }; export class LiquidityLayerDeposit { deposit: DepositHeader; - message: DepositMessage; + message: LiquidityLayerDepositMessage; - constructor(deposit: DepositHeader, message: DepositMessage) { + constructor(deposit: DepositHeader, message: LiquidityLayerDepositMessage) { this.deposit = deposit; this.message = message; } @@ -62,7 +53,7 @@ export class LiquidityLayerDeposit { const message = (() => { switch (payloadId) { - case 11: { + case FILL_PAYLOAD_ID: { const sourceChain = messageBuf.readUInt16BE(0); const orderSender = Array.from(messageBuf.subarray(2, 34)); const redeemer = Array.from(messageBuf.subarray(34, 66)); @@ -72,28 +63,6 @@ export class LiquidityLayerDeposit { fill: { sourceChain, orderSender, redeemer, redeemerMessage }, }; } - case 12: { - const sourceChain = messageBuf.readUInt16BE(0); - const orderSender = Array.from(messageBuf.subarray(2, 34)); - const redeemer = Array.from(messageBuf.subarray(34, 66)); - const redeemerMessageLen = messageBuf.readUInt32BE(66); - const redeemerMessage = messageBuf.subarray(70, 70 + redeemerMessageLen); - const amount = BigInt( - ethers.BigNumber.from( - messageBuf.subarray(70 + redeemerMessageLen, 86 + redeemerMessageLen) - ).toString() - ); - return { - fastFill: { - fill: { sourceChain, orderSender, redeemer, redeemerMessage }, - amount, - }, - }; - } - case 14: { - const baseFee = BigInt(ethers.BigNumber.from(messageBuf).toString()); - return { slowOrderResponse: { baseFee } }; - } default: { throw new Error("Invalid Liquidity Layer deposit message"); } @@ -145,7 +114,7 @@ export class LiquidityLayerDeposit { buf.set(mintRecipient, offset); offset += 32; - const { fill, fastFill, slowOrderResponse } = message; + const { fill } = message; const payload = (() => { if (fill !== undefined) { const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; @@ -162,32 +131,7 @@ export class LiquidityLayerDeposit { messageBuf.set(redeemerMessage, 70); offset += redeemerMessage.length; - return Buffer.concat([Buffer.alloc(1, 11), messageBuf]); - } else if (fastFill !== undefined) { - const { fill, amount } = fastFill; - const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; - - const messageBuf = Buffer.alloc(86 + redeemerMessage.length); - - let offset = 0; - offset = messageBuf.writeUInt16BE(sourceChain, offset); - messageBuf.set(orderSender, offset); - offset += 32; - messageBuf.set(redeemer, offset); - offset += 32; - offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); - messageBuf.set(redeemerMessage, 70); - offset += redeemerMessage.length; - offset = messageBuf.writeBigUInt64BE(amount, offset); - - return Buffer.concat([Buffer.alloc(1, 12), messageBuf]); - } else if (slowOrderResponse !== undefined) { - const { baseFee } = slowOrderResponse; - - const messageBuf = Buffer.alloc(8); - messageBuf.writeBigUInt64BE(baseFee, 0); - - return Buffer.concat([Buffer.alloc(1, 14), messageBuf]); + return Buffer.concat([Buffer.alloc(1, FILL_PAYLOAD_ID), messageBuf]); } else { throw new Error("Invalid Liquidity Layer deposit message"); } diff --git a/solana/ts/src/messages/index.ts b/solana/ts/src/messages/index.ts new file mode 100644 index 00000000..d90d9abf --- /dev/null +++ b/solana/ts/src/messages/index.ts @@ -0,0 +1,146 @@ +import { ethers } from "ethers"; +import { Fill, LiquidityLayerDeposit } from "./deposit"; + +const ID_DEPOSIT = 1; +const ID_FAST_FILL = 12; +const ID_FAST_MARKET_ORDER = 13; +const ID_SLOW_ORDER_RESPONSE = 14; + +export * from "./deposit"; + +export type FastFill = { + fill: Fill; + amount: bigint; +}; + +export type FastMarketOrder = { + amountIn: bigint; + minAmountOut: bigint; + targetChain: number; + destinationCctpDomain: number; + redeemer: Buffer; + sender: Buffer; + refundAddress: Buffer; + slowSequence: bigint; + slowEmitter: Buffer; + maxFee: bigint; + initAuctionFee: bigint; + deadline: number; + redeemerMessage: Buffer; +}; + +export type SlowOrderResponse = { + baseFee: bigint; +}; + +export class LiquidityLayerMessage { + deposit?: LiquidityLayerDeposit; + fastFill?: FastFill; + fastMarketOrder?: FastMarketOrder; + slowOrderResponse?: SlowOrderResponse; + + constructor(message: { + deposit?: LiquidityLayerDeposit; + fastFill?: FastFill; + fastMarketOrder?: FastMarketOrder; + slowOrderResponse?: SlowOrderResponse; + }) { + const { deposit, fastFill, fastMarketOrder, slowOrderResponse } = message; + this.deposit = deposit; + this.fastFill = fastFill; + this.fastMarketOrder = fastMarketOrder; + this.slowOrderResponse = slowOrderResponse; + } + + static decode(buf: Buffer): LiquidityLayerMessage { + const payloadId = buf.readUInt8(0); + buf = buf.subarray(1); + + const message = (() => { + switch (payloadId) { + case ID_DEPOSIT: { + return { + deposit: LiquidityLayerDeposit.decode(buf), + }; + } + case ID_FAST_FILL: { + const sourceChain = buf.readUInt16BE(0); + const orderSender = Array.from(buf.subarray(2, 34)); + const redeemer = Array.from(buf.subarray(34, 66)); + const redeemerMessageLen = buf.readUInt32BE(66); + const redeemerMessage = buf.subarray(70, 70 + redeemerMessageLen); + const amount = BigInt( + ethers.BigNumber.from( + buf.subarray(70 + redeemerMessageLen, 86 + redeemerMessageLen) + ).toString() + ); + return { + fastFill: { + fill: { sourceChain, orderSender, redeemer, redeemerMessage }, + amount, + }, + }; + } + case ID_FAST_MARKET_ORDER: { + // TODO: Implement + return { + fastMarketOrder: undefined, + }; + } + case ID_SLOW_ORDER_RESPONSE: { + const baseFee = BigInt(ethers.BigNumber.from(buf).toString()); + return { + slowOrderResponse: { baseFee }, + }; + } + default: { + throw new Error("Invalid Liquidity Layer deposit message"); + } + } + })(); + + return new LiquidityLayerMessage(message); + } + + encode(): Buffer { + const { deposit, fastFill, fastMarketOrder, slowOrderResponse } = this; + + const buf = (() => { + if (deposit !== undefined) { + return deposit.encode(); + } else if (fastFill !== undefined) { + const { fill, amount } = fastFill; + const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; + + const messageBuf = Buffer.alloc(86 + redeemerMessage.length); + + let offset = 0; + offset = messageBuf.writeUInt16BE(sourceChain, offset); + messageBuf.set(orderSender, offset); + offset += 32; + messageBuf.set(redeemer, offset); + offset += 32; + offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); + messageBuf.set(redeemerMessage, 70); + offset += redeemerMessage.length; + offset = messageBuf.writeBigUInt64BE(amount, offset); + + return Buffer.concat([Buffer.alloc(1, ID_FAST_FILL), messageBuf]); + } else if (fastMarketOrder !== undefined) { + // TODO: Implement + return Buffer.alloc(1, ID_FAST_MARKET_ORDER); + } else if (slowOrderResponse !== undefined) { + const { baseFee } = slowOrderResponse; + + const messageBuf = Buffer.alloc(8); + messageBuf.writeBigUInt64BE(baseFee, 0); + + return Buffer.concat([Buffer.alloc(1, ID_SLOW_ORDER_RESPONSE), messageBuf]); + } else { + throw new Error("Invalid Liquidity Layer deposit message"); + } + })(); + + return buf; + } +} diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index a6ae3b99..21091140 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -10,7 +10,7 @@ import { } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; -import { CctpTokenBurnMessage, Fill, LiquidityLayerDeposit } from "../src"; +import { CctpTokenBurnMessage, Fill, LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; import { Custodian, RouterEndpoint, TokenRouterProgram } from "../src/tokenRouter"; import { CircleAttester, @@ -754,18 +754,20 @@ describe("Token Router", function () { redeemer: Array.from(redeemer.publicKey.toBuffer()), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }; - const deposit = new LiquidityLayerDeposit( - { - tokenAddress: burnMessage.burnTokenAddress, - amount, - sourceCctpDomain, - destinationCctpDomain, - cctpNonce, - burnSource, - mintRecipient: encodedMintRecipient, - }, - { fill } - ); + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, + }, + { fill } + ), + }); const vaa = await postDepositVaa( connection, @@ -773,7 +775,7 @@ describe("Token Router", function () { MOCK_GUARDIANS, routerEndpointAddress, wormholeSequence++, - deposit + message ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ diff --git a/solana/ts/tests/helpers/mock.ts b/solana/ts/tests/helpers/mock.ts index ef62ab7e..f5eafb2f 100644 --- a/solana/ts/tests/helpers/mock.ts +++ b/solana/ts/tests/helpers/mock.ts @@ -3,7 +3,7 @@ import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import { Connection, Keypair } from "@solana/web3.js"; import { ethers } from "ethers"; -import { LiquidityLayerDeposit } from "../../src"; +import { LiquidityLayerMessage } from "../../src"; import { CORE_BRIDGE_PID, GUARDIAN_KEY } from "./consts"; import { postVaa } from "./utils"; @@ -13,7 +13,7 @@ export async function postDepositVaa( guardians: MockGuardians, foreignEmitterAddress: Array, sequence: bigint, - deposit: LiquidityLayerDeposit + message: LiquidityLayerMessage ) { const chainName = "ethereum"; const foreignEmitter = new MockEmitter( @@ -24,7 +24,7 @@ export async function postDepositVaa( const published = foreignEmitter.publishMessage( 0, // nonce, - deposit.encode(), + message.encode(), 0, // consistencyLevel 12345678 // timestamp ); From dcc8a4c379eed2a78baca832827e00f0a4b701f0 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 12 Jan 2024 15:49:36 -0600 Subject: [PATCH 039/126] solana/ts: fix slow order response --- solana/ts/src/messages/deposit.ts | 106 +++++++++++++++++-------- solana/ts/src/messages/index.ts | 127 +++++++++++++++++++----------- 2 files changed, 156 insertions(+), 77 deletions(-) diff --git a/solana/ts/src/messages/deposit.ts b/solana/ts/src/messages/deposit.ts index 19a3ec01..158a9e1b 100644 --- a/solana/ts/src/messages/deposit.ts +++ b/solana/ts/src/messages/deposit.ts @@ -1,6 +1,10 @@ +import { BN } from "@coral-xyz/anchor"; import { ethers } from "ethers"; -const FILL_PAYLOAD_ID = 11; +export const ID_DEPOSIT = 1; + +export const ID_DEPOSIT_FILL = 11; +export const ID_DEPOSIT_SLOW_ORDER_RESPONSE = 14; export type DepositHeader = { tokenAddress: Array; @@ -19,8 +23,14 @@ export type Fill = { redeemerMessage: Buffer; }; +export type SlowOrderResponse = { + // u128 + baseFee: bigint; +}; + export type LiquidityLayerDepositMessage = { fill?: Fill; + slowOrderResponse?: SlowOrderResponse; }; export class LiquidityLayerDeposit { @@ -33,36 +43,58 @@ export class LiquidityLayerDeposit { } static decode(buf: Buffer): LiquidityLayerDeposit { - if (buf.readUInt8(0) != 1) { + let offset = 0; + const payloadId = buf.readUInt8(offset); + offset += 1; + if (payloadId != 1) { throw new Error("Invalid Wormhole CCTP deposit message"); } - buf = buf.subarray(1); - const tokenAddress = Array.from(buf.subarray(0, 32)); - const amount = BigInt(ethers.BigNumber.from(buf.subarray(32, 64)).toString()); - const sourceCctpDomain = buf.readUInt32BE(64); - const destinationCctpDomain = buf.readUInt32BE(68); - const cctpNonce = buf.readBigUint64BE(72); - const burnSource = Array.from(buf.subarray(80, 112)); - const mintRecipient = Array.from(buf.subarray(112, 144)); - const payloadLen = buf.readUInt16BE(144); - const payload = buf.subarray(146, 146 + payloadLen); - - const payloadId = payload.readUInt8(0); - const messageBuf = payload.subarray(1); + const tokenAddress = Array.from(buf.subarray(offset, (offset += 32))); + const amount = BigInt( + ethers.BigNumber.from(buf.subarray(offset, (offset += 32))).toString() + ); + const sourceCctpDomain = buf.readUInt32BE(offset); + offset += 4; + const destinationCctpDomain = buf.readUInt32BE(offset); + offset += 4; + const cctpNonce = buf.readBigUint64BE(offset); + offset += 8; + const burnSource = Array.from(buf.subarray(offset, (offset += 32))); + const mintRecipient = Array.from(buf.subarray(offset, (offset += 32))); + const payloadLen = buf.readUInt16BE(offset); + offset += 2; + const payload = buf.subarray(offset, (offset += payloadLen)); + + offset = 0; + const depositPayloadId = payload.readUInt8(offset); + offset += 1; const message = (() => { - switch (payloadId) { - case FILL_PAYLOAD_ID: { - const sourceChain = messageBuf.readUInt16BE(0); - const orderSender = Array.from(messageBuf.subarray(2, 34)); - const redeemer = Array.from(messageBuf.subarray(34, 66)); - const redeemerMessageLen = messageBuf.readUInt32BE(66); - const redeemerMessage = messageBuf.subarray(70, 70 + redeemerMessageLen); + switch (depositPayloadId) { + case ID_DEPOSIT_FILL: { + const sourceChain = payload.readUInt16BE(offset); + offset += 2; + const orderSender = Array.from(payload.subarray(offset, (offset += 32))); + const redeemer = Array.from(payload.subarray(offset, (offset += 32))); + const redeemerMessageLen = payload.readUInt32BE(offset); + offset += 4; + const redeemerMessage = payload.subarray( + offset, + (offset += redeemerMessageLen) + ); return { fill: { sourceChain, orderSender, redeemer, redeemerMessage }, }; } + case ID_DEPOSIT_SLOW_ORDER_RESPONSE: { + const baseFee = BigInt( + new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() + ); + return { + slowOrderResponse: { baseFee }, + }; + } default: { throw new Error("Invalid Liquidity Layer deposit message"); } @@ -110,28 +142,40 @@ export class LiquidityLayerDeposit { offset = buf.writeUInt32BE(destinationCctpDomain, offset); offset = buf.writeBigUInt64BE(cctpNonce, offset); buf.set(burnSource, offset); - offset += 32; + offset += burnSource.length; buf.set(mintRecipient, offset); - offset += 32; + offset += mintRecipient.length; - const { fill } = message; + const { fill, slowOrderResponse } = message; const payload = (() => { if (fill !== undefined) { const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; - const messageBuf = Buffer.alloc(70 + redeemerMessage.length); + const messageBuf = Buffer.alloc(1 + 70 + redeemerMessage.length); let offset = 0; + offset = messageBuf.writeUInt8(ID_DEPOSIT_FILL, offset); offset = messageBuf.writeUInt16BE(sourceChain, offset); messageBuf.set(orderSender, offset); - offset += 32; + offset += orderSender.length; messageBuf.set(redeemer, offset); - offset += 32; + offset += redeemer.length; offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); - messageBuf.set(redeemerMessage, 70); + messageBuf.set(redeemerMessage, offset); offset += redeemerMessage.length; - return Buffer.concat([Buffer.alloc(1, FILL_PAYLOAD_ID), messageBuf]); + return messageBuf; + } else if (slowOrderResponse !== undefined) { + const { baseFee } = slowOrderResponse; + + const messageBuf = Buffer.alloc(1 + 16); + let offset = 0; + offset = messageBuf.writeUInt8(ID_DEPOSIT_SLOW_ORDER_RESPONSE, offset); + const encodedBaseFee = new BN(baseFee.toString()).toBuffer("be", 16); + messageBuf.set(encodedBaseFee, offset); + offset += encodedBaseFee.length; + + return messageBuf; } else { throw new Error("Invalid Liquidity Layer deposit message"); } @@ -140,6 +184,6 @@ export class LiquidityLayerDeposit { // Finally write the length. buf.writeUInt16BE(payload.length, offset); - return Buffer.concat([Buffer.alloc(1, 1), buf, payload]); + return Buffer.concat([Buffer.alloc(1, ID_DEPOSIT), buf, payload]); } } diff --git a/solana/ts/src/messages/index.ts b/solana/ts/src/messages/index.ts index d90d9abf..c829de7e 100644 --- a/solana/ts/src/messages/index.ts +++ b/solana/ts/src/messages/index.ts @@ -1,20 +1,22 @@ +import { BN } from "@coral-xyz/anchor"; import { ethers } from "ethers"; -import { Fill, LiquidityLayerDeposit } from "./deposit"; - -const ID_DEPOSIT = 1; -const ID_FAST_FILL = 12; -const ID_FAST_MARKET_ORDER = 13; -const ID_SLOW_ORDER_RESPONSE = 14; +import { Fill, ID_DEPOSIT, LiquidityLayerDeposit } from "./deposit"; export * from "./deposit"; +export const ID_FAST_FILL = 12; +export const ID_FAST_MARKET_ORDER = 13; + export type FastFill = { fill: Fill; + // u128 amount: bigint; }; export type FastMarketOrder = { + // u128 amountIn: bigint; + // u128 minAmountOut: bigint; targetChain: number; destinationCctpDomain: number; @@ -23,38 +25,34 @@ export type FastMarketOrder = { refundAddress: Buffer; slowSequence: bigint; slowEmitter: Buffer; + // u128 maxFee: bigint; + // u128 initAuctionFee: bigint; deadline: number; redeemerMessage: Buffer; }; -export type SlowOrderResponse = { - baseFee: bigint; -}; - export class LiquidityLayerMessage { deposit?: LiquidityLayerDeposit; fastFill?: FastFill; fastMarketOrder?: FastMarketOrder; - slowOrderResponse?: SlowOrderResponse; constructor(message: { deposit?: LiquidityLayerDeposit; fastFill?: FastFill; fastMarketOrder?: FastMarketOrder; - slowOrderResponse?: SlowOrderResponse; }) { - const { deposit, fastFill, fastMarketOrder, slowOrderResponse } = message; + const { deposit, fastFill, fastMarketOrder } = message; this.deposit = deposit; this.fastFill = fastFill; this.fastMarketOrder = fastMarketOrder; - this.slowOrderResponse = slowOrderResponse; } static decode(buf: Buffer): LiquidityLayerMessage { - const payloadId = buf.readUInt8(0); - buf = buf.subarray(1); + let offset = 0; + const payloadId = buf.readUInt8(offset); + offset += 1; const message = (() => { switch (payloadId) { @@ -64,15 +62,15 @@ export class LiquidityLayerMessage { }; } case ID_FAST_FILL: { - const sourceChain = buf.readUInt16BE(0); - const orderSender = Array.from(buf.subarray(2, 34)); - const redeemer = Array.from(buf.subarray(34, 66)); - const redeemerMessageLen = buf.readUInt32BE(66); - const redeemerMessage = buf.subarray(70, 70 + redeemerMessageLen); + const sourceChain = buf.readUInt16BE(offset); + offset += 2; + const orderSender = Array.from(buf.subarray(offset, (offset += 32))); + const redeemer = Array.from(buf.subarray(offset, (offset += 32))); + const redeemerMessageLen = buf.readUInt32BE(offset); + offset += 4; + const redeemerMessage = buf.subarray(offset, (offset += redeemerMessageLen)); const amount = BigInt( - ethers.BigNumber.from( - buf.subarray(70 + redeemerMessageLen, 86 + redeemerMessageLen) - ).toString() + new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() ); return { fastFill: { @@ -87,14 +85,8 @@ export class LiquidityLayerMessage { fastMarketOrder: undefined, }; } - case ID_SLOW_ORDER_RESPONSE: { - const baseFee = BigInt(ethers.BigNumber.from(buf).toString()); - return { - slowOrderResponse: { baseFee }, - }; - } default: { - throw new Error("Invalid Liquidity Layer deposit message"); + throw new Error("Invalid Liquidity Layer message"); } } })(); @@ -103,7 +95,7 @@ export class LiquidityLayerMessage { } encode(): Buffer { - const { deposit, fastFill, fastMarketOrder, slowOrderResponse } = this; + const { deposit, fastFill, fastMarketOrder } = this; const buf = (() => { if (deposit !== undefined) { @@ -112,32 +104,75 @@ export class LiquidityLayerMessage { const { fill, amount } = fastFill; const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; - const messageBuf = Buffer.alloc(86 + redeemerMessage.length); + const messageBuf = Buffer.alloc(1 + 86 + redeemerMessage.length); let offset = 0; + offset = messageBuf.writeUInt8(ID_FAST_FILL, offset); offset = messageBuf.writeUInt16BE(sourceChain, offset); messageBuf.set(orderSender, offset); - offset += 32; + offset += orderSender.length; messageBuf.set(redeemer, offset); - offset += 32; + offset += redeemer.length; offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); - messageBuf.set(redeemerMessage, 70); + messageBuf.set(redeemerMessage, offset); offset += redeemerMessage.length; - offset = messageBuf.writeBigUInt64BE(amount, offset); + const encodedAmount = new BN(amount.toString()).toBuffer("be", 16); + messageBuf.set(encodedAmount, offset); + offset += encodedAmount.length; - return Buffer.concat([Buffer.alloc(1, ID_FAST_FILL), messageBuf]); + return messageBuf; } else if (fastMarketOrder !== undefined) { - // TODO: Implement - return Buffer.alloc(1, ID_FAST_MARKET_ORDER); - } else if (slowOrderResponse !== undefined) { - const { baseFee } = slowOrderResponse; + const { + amountIn, + minAmountOut, + targetChain, + destinationCctpDomain, + redeemer, + sender, + refundAddress, + slowSequence, + slowEmitter, + maxFee, + initAuctionFee, + deadline, + redeemerMessage, + } = fastMarketOrder; + + const messageBuf = Buffer.alloc(1 + 214 + redeemerMessage.length); - const messageBuf = Buffer.alloc(8); - messageBuf.writeBigUInt64BE(baseFee, 0); + let offset = 0; + offset = messageBuf.writeUInt8(ID_FAST_MARKET_ORDER, offset); + const encodedAmountIn = new BN(amountIn.toString()).toBuffer("be", 16); + messageBuf.set(encodedAmountIn, offset); + offset += encodedAmountIn.length; + const encodedMinAmountOut = new BN(minAmountOut.toString()).toBuffer("be", 16); + messageBuf.set(encodedMinAmountOut, offset); + offset += encodedMinAmountOut.length; + offset = messageBuf.writeUInt16BE(targetChain, offset); + offset = messageBuf.writeUInt32BE(destinationCctpDomain, offset); + messageBuf.set(redeemer, offset); + offset += redeemer.length; + messageBuf.set(sender, offset); + offset += sender.length; + messageBuf.set(refundAddress, offset); + offset += refundAddress.length; + offset = messageBuf.writeBigUInt64BE(slowSequence, offset); + messageBuf.set(slowEmitter, offset); + offset += slowEmitter.length; + const encodedMaxFee = new BN(maxFee.toString()).toBuffer("be", 16); + messageBuf.set(encodedMaxFee, offset); + offset += encodedMaxFee.length; + const encodedInitAuctionFee = new BN(initAuctionFee.toString()).toBuffer("be", 16); + messageBuf.set(encodedInitAuctionFee, offset); + offset += encodedInitAuctionFee.length; + offset = messageBuf.writeUInt32BE(deadline, offset); + offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); + messageBuf.set(redeemerMessage, offset); + offset += redeemerMessage.length; - return Buffer.concat([Buffer.alloc(1, ID_SLOW_ORDER_RESPONSE), messageBuf]); + return messageBuf; } else { - throw new Error("Invalid Liquidity Layer deposit message"); + throw new Error("Invalid Liquidity Layer message"); } })(); From 1f0cbf953d63a37e49afd81c2a88ee023e479113 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 12 Jan 2024 16:00:11 -0600 Subject: [PATCH 040/126] solana/ts: fix fast market order --- solana/ts/src/messages/index.ts | 64 ++++++++++++++++++++++++++++----- 1 file changed, 55 insertions(+), 9 deletions(-) diff --git a/solana/ts/src/messages/index.ts b/solana/ts/src/messages/index.ts index c829de7e..29a1d997 100644 --- a/solana/ts/src/messages/index.ts +++ b/solana/ts/src/messages/index.ts @@ -20,11 +20,11 @@ export type FastMarketOrder = { minAmountOut: bigint; targetChain: number; destinationCctpDomain: number; - redeemer: Buffer; - sender: Buffer; - refundAddress: Buffer; + redeemer: Array; + sender: Array; + refundAddress: Array; slowSequence: bigint; - slowEmitter: Buffer; + slowEmitter: Array; // u128 maxFee: bigint; // u128 @@ -54,11 +54,13 @@ export class LiquidityLayerMessage { const payloadId = buf.readUInt8(offset); offset += 1; - const message = (() => { + const { deposit, fastFill, fastMarketOrder } = (() => { switch (payloadId) { case ID_DEPOSIT: { return { deposit: LiquidityLayerDeposit.decode(buf), + fastFill: undefined, + fastMarketOrder: undefined, }; } case ID_FAST_FILL: { @@ -73,16 +75,60 @@ export class LiquidityLayerMessage { new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() ); return { + deposit: undefined, fastFill: { fill: { sourceChain, orderSender, redeemer, redeemerMessage }, amount, - }, + } as FastFill, + fastMarketOrder: undefined, }; } case ID_FAST_MARKET_ORDER: { - // TODO: Implement + const amountIn = BigInt( + new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() + ); + const minAmountOut = BigInt( + new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() + ); + const targetChain = buf.readUInt16BE(offset); + offset += 2; + const destinationCctpDomain = buf.readUInt32BE(offset); + offset += 4; + const redeemer = Array.from(buf.subarray(offset, (offset += 32))); + const sender = Array.from(buf.subarray(offset, (offset += 32))); + const refundAddress = Array.from(buf.subarray(offset, (offset += 32))); + const slowSequence = buf.readBigUInt64BE(offset); + offset += 8; + const slowEmitter = Array.from(buf.subarray(offset, (offset += 32))); + const maxFee = BigInt( + new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() + ); + const initAuctionFee = BigInt( + new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() + ); + const deadline = buf.readUInt32BE(offset); + offset += 4; + const redeemerMessageLen = buf.readUInt32BE(offset); + offset += 4; + const redeemerMessage = buf.subarray(offset, (offset += redeemerMessageLen)); return { - fastMarketOrder: undefined, + deposit: undefined, + fastFill: undefined, + fastMarketOrder: { + amountIn, + minAmountOut, + targetChain, + destinationCctpDomain, + redeemer, + sender, + refundAddress, + slowSequence, + slowEmitter, + maxFee, + initAuctionFee, + deadline, + redeemerMessage, + } as FastMarketOrder, }; } default: { @@ -91,7 +137,7 @@ export class LiquidityLayerMessage { } })(); - return new LiquidityLayerMessage(message); + return new LiquidityLayerMessage({ deposit, fastFill, fastMarketOrder }); } encode(): Buffer { From bfe6252b923e0f7261b153368698920da41f8292 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 12 Jan 2024 20:30:34 -0600 Subject: [PATCH 041/126] solana: fix initialize --- solana/programs/matching-engine/src/error.rs | 6 +++ .../src/processor/admin/initialize.rs | 33 ++++++++++-- solana/programs/token-router/src/error.rs | 6 +++ .../src/processor/admin/initialize.rs | 25 ++++++++- solana/ts/src/matchingEngine/index.ts | 19 ++++--- solana/ts/src/tokenRouter/index.ts | 1 + solana/ts/tests/01__matchingEngine.ts | 53 +++++++++++++------ solana/ts/tests/02__tokenRouter.ts | 53 ++++++++++--------- 8 files changed, 142 insertions(+), 54 deletions(-) diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 0166cfad..76c9a2fd 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -6,6 +6,12 @@ pub enum MatchingEngineError { #[msg("FeeRecipientZeroPubkey")] FeeRecipientZeroPubkey = 0x101, + #[msg("ImmutableProgram")] + ImmutableProgram = 0x102, + + #[msg("NotUsdc")] + NotUsdc = 0x103, + /// Only the program's owner is permitted. #[msg("OwnerOnly")] OwnerOnly = 0x200, diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 229470c6..1e0934a1 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -5,6 +5,7 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::constants::FEE_PRECISION_MAX; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct Initialize<'info> { @@ -47,14 +48,25 @@ pub struct Initialize<'info> { )] custody_token: Account<'info, token::TokenAccount>, - #[account(address = common::constants::usdc::id())] + #[account(address = common::constants::usdc::id() @ MatchingEngineError::NotUsdc)] mint: Account<'info, token::Mint>, + /// We use the program data to make sure this owner is the upgrade authority (the true owner, + /// who deployed this program). + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable::id(), + constraint = program_data.upgrade_authority_address.is_some() @ MatchingEngineError::ImmutableProgram + )] + program_data: Account<'info, ProgramData>, + system_program: Program<'info, System>, token_program: Program<'info, token::Token>, } -#[access_control(check_constraints(&auction_config))] +#[access_control(check_constraints(&ctx, &auction_config))] pub fn initialize(ctx: Context, auction_config: AuctionConfig) -> Result<()> { let owner: Pubkey = ctx.accounts.owner.key(); ctx.accounts.custodian.set_inner(Custodian { @@ -71,7 +83,22 @@ pub fn initialize(ctx: Context, auction_config: AuctionConfig) -> Re Ok(()) } -fn check_constraints(config: &AuctionConfig) -> Result<()> { +fn check_constraints(ctx: &Context, config: &AuctionConfig) -> Result<()> { + // We need to check that the upgrade authority is the owner passed into the account context. + #[cfg(not(feature = "integration-test"))] + { + { + require_keys_eq!( + ctx.accounts.owner.key(), + ctx.accounts.program_data.upgrade_authority_address.unwrap(), + MatchingEngineError::OwnerOnly + ); + } + } + + // This prevents the unused variables warning popping up when this program is built. + let _ = ctx; + require!( config.auction_duration > 0, MatchingEngineError::InvalidAuctionDuration diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 1c7f8f3c..841f16e3 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -11,9 +11,15 @@ pub enum TokenRouterError { #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x20, + #[msg("ImmutableProgram")] + ImmutableProgram = 0x21, + #[msg("InvalidNewOwner")] InvalidNewOwner = 0x22, + #[msg("NotUsdc")] + NotUsdc = 0x23, + /// Specified key is already the program's owner. #[msg("AlreadyOwner")] AlreadyOwner = 0x24, diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index ebcfd177..cfe93681 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -1,6 +1,7 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use anchor_spl::token; +use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct Initialize<'info> { @@ -38,15 +39,37 @@ pub struct Initialize<'info> { )] custody_token: Account<'info, token::TokenAccount>, - #[account(address = common::constants::usdc::id())] + #[account(address = common::constants::usdc::id() @ TokenRouterError::NotUsdc)] mint: Account<'info, token::Mint>, + /// We use the program data to make sure this owner is the upgrade authority (the true owner, + /// who deployed this program). + #[account( + mut, + seeds = [crate::ID.as_ref()], + bump, + seeds::program = bpf_loader_upgradeable::id(), + constraint = program_data.upgrade_authority_address.is_some() @ TokenRouterError::ImmutableProgram + )] + program_data: Account<'info, ProgramData>, + system_program: Program<'info, System>, token_program: Program<'info, token::Token>, } pub fn initialize(ctx: Context) -> Result<()> { let owner = ctx.accounts.owner.key(); + + // We need to check that the upgrade authority is the owner passed into the account context. + #[cfg(not(feature = "integration-test"))] + { + require_keys_eq!( + owner, + ctx.accounts.program_data.upgrade_authority_address.unwrap(), + TokenRouterError::OwnerOnly + ); + } + ctx.accounts.custodian.set_inner(Custodian { bump: ctx.bumps["custodian"], custody_token_bump: ctx.bumps["custody_token"], diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index d67c6374..b3961d81 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -8,7 +8,6 @@ import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; import { AuctionConfig, Custodian, RouterEndpoint } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { AuctionData } from "./state/AuctionData"; -import { USDC_MINT_ADDRESS } from "../../tests/helpers"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -76,9 +75,10 @@ export class MatchingEngineProgram { owner: PublicKey; ownerAssistant: PublicKey; feeRecipient: PublicKey; + mint: PublicKey; } ): Promise { - const { owner, ownerAssistant, feeRecipient } = accounts; + const { owner, ownerAssistant, feeRecipient, mint } = accounts; return this.program.methods .initialize(auctionConfig) @@ -88,7 +88,8 @@ export class MatchingEngineProgram { ownerAssistant, feeRecipient, custodyToken: this.custodyTokenAccountAddress(), - mint: USDC_MINT_ADDRESS, + mint, + programData: getProgramData(this.ID), }) .instruction(); } @@ -204,9 +205,9 @@ export class MatchingEngineProgram { fromChain: ChainId, toChain: ChainId, vaaHash: Buffer, - accounts: { payer: PublicKey; vaa: PublicKey } + accounts: { payer: PublicKey; vaa: PublicKey; mint: PublicKey } ) { - const { payer, vaa } = accounts; + const { payer, vaa, mint } = accounts; return this.program.methods .placeInitialOffer(new BN(feeOffer.toString())) .accounts({ @@ -215,7 +216,7 @@ export class MatchingEngineProgram { auctionData: this.auctionDataAddress(vaaHash), fromRouterEndpoint: this.routerEndpointAddress(fromChain), toRouterEndpoint: this.routerEndpointAddress(toChain), - auctioneerToken: splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, payer), + auctioneerToken: splToken.getAssociatedTokenAddressSync(mint, payer), custodyToken: this.custodyTokenAccountAddress(), vaa, }) @@ -228,13 +229,17 @@ export class MatchingEngineProgram { accounts: { payer: PublicKey; bestOfferToken: PublicKey } ) { const { payer, bestOfferToken } = accounts; + const { mint } = await splToken.getAccount( + this.program.provider.connection, + bestOfferToken + ); return this.program.methods .improveOffer(new BN(feeOffer.toString())) .accounts({ payer, custodian: this.custodianAddress(), auctionData: this.auctionDataAddress(vaaHash), - auctioneerToken: splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, payer), + auctioneerToken: splToken.getAssociatedTokenAddressSync(mint, payer), bestOfferToken, custodyToken: this.custodyTokenAccountAddress(), }) diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 9e2c44ce..1f55f218 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -472,6 +472,7 @@ export class TokenRouterProgram { ownerAssistant, mint, custodyToken: this.custodyTokenAccountAddress(), + programData: getProgramData(this.ID), }) .instruction(); } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 74c0da89..6acd350c 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,10 +1,5 @@ import { CHAINS, ChainId, keccak256, parseVaa } from "@certusone/wormhole-sdk"; -import { - getAccount, - getAssociatedTokenAddressSync, - getOrCreateAssociatedTokenAccount, - mintTo, -} from "@solana/spl-token"; +import * as splToken from "@solana/spl-token"; import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; @@ -73,8 +68,20 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, feeRecipient: opts?.feeRecipient ?? feeRecipient.publicKey, + mint: opts?.mint ?? USDC_MINT_ADDRESS, }); + it("Cannot Initialize Without USDC Mint", async function () { + const mint = await splToken.createMint(connection, payer, payer.publicKey, null, 6); + + await expectIxErr( + connection, + [await createInitializeIx({ mint })], + [payer], + "NotUsdc" + ); + }); + it("Cannot Initialize With Default Owner Assistant", async function () { await expectIxErr( connection, @@ -112,6 +119,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -130,6 +138,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -148,6 +157,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -166,6 +176,7 @@ describe("Matching Engine", function () { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, feeRecipient: feeRecipient.publicKey, + mint: USDC_MINT_ADDRESS, }), ], [payer], @@ -669,7 +680,7 @@ describe("Matching Engine", function () { before("Create ATAs For Auctioneers", async function () { for (const wallet of [auctioneerOne, auctioneerTwo]) { - await getOrCreateAssociatedTokenAccount( + await splToken.getOrCreateAssociatedTokenAccount( connection, wallet, USDC_MINT_ADDRESS, @@ -678,16 +689,23 @@ describe("Matching Engine", function () { // Mint USDC. const mintAmount = 100000n * 100000000n; - const destination = await getAssociatedTokenAddressSync( + const destination = await splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, wallet.publicKey ); await expect( - mintTo(connection, payer, USDC_MINT_ADDRESS, destination, payer, mintAmount) + splToken.mintTo( + connection, + payer, + USDC_MINT_ADDRESS, + destination, + payer, + mintAmount + ) ).to.be.fulfilled; - const { amount } = await getAccount(connection, destination); + const { amount } = await splToken.getAccount(connection, destination); expect(amount).equals(mintAmount); } }); @@ -697,7 +715,7 @@ describe("Matching Engine", function () { // Fetch the balances before. const auctioneerBefore = await getTokenBalance(connection, auctioneerOne.publicKey); const custodyBefore = ( - await getAccount(connection, engine.custodyTokenAccountAddress()) + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; const signedVaa = await placeInitialOfferForTest( @@ -717,7 +735,7 @@ describe("Matching Engine", function () { // Validate balance changes. const auctioneerAfter = await getTokenBalance(connection, auctioneerOne.publicKey); const custodyAfter = ( - await getAccount(connection, engine.custodyTokenAccountAddress()) + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; expect(auctioneerAfter).equals( @@ -731,7 +749,7 @@ describe("Matching Engine", function () { const vaaHash = keccak256(parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); - const auctioneerToken = await getAssociatedTokenAddressSync( + const auctioneerToken = await splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, auctioneerOne.publicKey ); @@ -775,7 +793,7 @@ describe("Matching Engine", function () { auctioneerTwo.publicKey ); const custodyBefore = ( - await getAccount(connection, engine.custodyTokenAccountAddress()) + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; // New Offer from auctioneerTwo. @@ -805,7 +823,7 @@ describe("Matching Engine", function () { auctioneerTwo.publicKey ); const custodyAfter = ( - await getAccount(connection, engine.custodyTokenAccountAddress()) + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; expect(newAuctioneerAfter).equals( @@ -818,11 +836,11 @@ describe("Matching Engine", function () { // Confirm the auction data. const auctionDataAfter = await engine.fetchAuctionData(vaaHash); - const newAuctioneerToken = await getAssociatedTokenAddressSync( + const newAuctioneerToken = await splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, auctioneerTwo.publicKey ); - const initialAuctioneerToken = await getAssociatedTokenAddressSync( + const initialAuctioneerToken = await splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, auctioneerOne.publicKey ); @@ -881,6 +899,7 @@ async function placeInitialOfferForTest( { payer: auctioneer.publicKey, vaa: vaaKey, + mint: USDC_MINT_ADDRESS, } ), ], diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 21091140..f6e0fda2 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -45,28 +45,33 @@ describe("Token Router", function () { describe("Admin", function () { describe("Initialize", function () { - const createInitializeIx = (opts?: { ownerAssistant?: PublicKey; mint?: PublicKey }) => - tokenRouter.initializeIx({ + it("Cannot Initialize Without USDC Mint", async function () { + const mint = await splToken.createMint(connection, payer, payer.publicKey, null, 6); + + const ix = await tokenRouter.initializeIx({ owner: payer.publicKey, - ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, - mint: opts?.mint ?? USDC_MINT_ADDRESS, + ownerAssistant: ownerAssistant.publicKey, + mint, }); - - it.skip("Cannot Initialize Without USDC Mint", async function () { - // TODO + await expectIxErr(connection, [ix], [payer], "NotUsdc"); }); it("Cannot Initialize With Default Owner Assistant", async function () { - await expectIxErr( - connection, - [await createInitializeIx({ ownerAssistant: PublicKey.default })], - [payer], - "AssistantZeroPubkey" - ); + const ix = await tokenRouter.initializeIx({ + owner: payer.publicKey, + ownerAssistant: PublicKey.default, + mint: USDC_MINT_ADDRESS, + }); + await expectIxErr(connection, [ix], [payer], "AssistantZeroPubkey"); }); - it("Finally Initialize Program", async function () { - await expectIxOk(connection, [await createInitializeIx()], [payer]); + it("Initialize", async function () { + const ix = await tokenRouter.initializeIx({ + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + mint: USDC_MINT_ADDRESS, + }); + await expectIxOk(connection, [ix], [payer]); const custodianData = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() @@ -89,17 +94,13 @@ describe("Token Router", function () { expect(custodyToken.amount).to.equal(0n); }); - it("Cannot Call Instruction Again: initialize", async function () { - await expectIxErr( - connection, - [ - await createInitializeIx({ - ownerAssistant: ownerAssistant.publicKey, - }), - ], - [payer], - "already in use" - ); + it("Cannot Initialize Again", async function () { + const ix = await tokenRouter.initializeIx({ + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + mint: USDC_MINT_ADDRESS, + }); + await expectIxErr(connection, [ix], [payer], "already in use"); }); after("Setup Lookup Table", async () => { From 46f3f5b0a3314df3a12e13cf2947ec8d45a78ee6 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 15 Jan 2024 15:14:50 -0600 Subject: [PATCH 042/126] solana: harden add router endpoint; fix outbound transfer; refactor tests --- solana/programs/matching-engine/src/error.rs | 3 + .../processor/admin/add_router_endpoint.rs | 23 + solana/programs/token-router/src/error.rs | 3 + .../src/processor/place_market_order/cctp.rs | 1 + solana/ts/src/matchingEngine/index.ts | 3 + solana/ts/tests/02__tokenRouter.ts | 706 ++++++++---------- 6 files changed, 361 insertions(+), 378 deletions(-) diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 76c9a2fd..2587301d 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -46,6 +46,9 @@ pub enum MatchingEngineError { #[msg("InvalidEndpoint")] InvalidEndpoint, + #[msg("TokenRouterProgramIdRequired")] + TokenRouterProgramIdRequired, + #[msg("InvalidAuctionDuration")] InvalidAuctionDuration, diff --git a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs index ec5169a8..7986485b 100644 --- a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs @@ -32,6 +32,11 @@ pub struct AddRouterEndpoint<'info> { )] router_endpoint: Account<'info, RouterEndpoint>, + /// If provided, must be the Token Router program to check its emitter versus what is provided + /// in the instruction data when the chain ID is Solana's. + #[account(executable)] + token_router_program: Option>, + system_program: Program<'info, System>, } @@ -48,6 +53,24 @@ pub fn add_router_endpoint( ) -> Result<()> { let AddRouterEndpointArgs { chain, address } = args; + // If we are registering Solana's Token Router, we know what the expected emitter is given the + // Token Router's program ID, so check it here. + if chain == wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN { + let token_router_program_id = ctx + .accounts + .token_router_program + .as_ref() + .ok_or(MatchingEngineError::TokenRouterProgramIdRequired) + .map(|info| info.key())?; + let (expected_emitter, _) = + Pubkey::find_program_address(&[b"emitter"], &token_router_program_id); + require_keys_eq!( + Pubkey::from(address), + expected_emitter, + MatchingEngineError::InvalidEndpoint + ) + } + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { bump: ctx.bumps["router_endpoint"], chain, diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 841f16e3..1e3f4bae 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -47,6 +47,9 @@ pub enum TokenRouterError { #[msg("InvalidCctpEndpoint")] InvalidCctpEndpoint = 0x46, + #[msg("Paused")] + Paused = 0x80, + #[msg("InsufficientAmount")] InsufficientAmount = 0x100, diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index 5dc23197..a0dd3609 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -34,6 +34,7 @@ pub struct PlaceMarketOrderCctp<'info> { #[account( seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, + constraint = !custodian.paused @ TokenRouterError::Paused, )] custodian: Account<'info, Custodian>, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index b3961d81..73a56c26 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -165,6 +165,7 @@ export class MatchingEngineProgram { ownerOrAssistant: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; + tokenRouterProgram?: PublicKey; }, args: AddRouterEndpointArgs ): Promise { @@ -172,6 +173,7 @@ export class MatchingEngineProgram { ownerOrAssistant, custodian: inputCustodian, routerEndpoint: inputRouterEndpoint, + tokenRouterProgram, } = accounts; const { chain } = args; return this.program.methods @@ -180,6 +182,7 @@ export class MatchingEngineProgram { ownerOrAssistant, custodian: inputCustodian ?? this.custodianAddress(), routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + tokenRouterProgram: tokenRouterProgram ?? null, }) .instruction(); } diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index f6e0fda2..03f78d09 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -53,7 +53,7 @@ describe("Token Router", function () { ownerAssistant: ownerAssistant.publicKey, mint, }); - await expectIxErr(connection, [ix], [payer], "NotUsdc"); + await expectIxErr(connection, [ix], [payer], "Error Code: NotUsdc"); }); it("Cannot Initialize With Default Owner Assistant", async function () { @@ -62,7 +62,8 @@ describe("Token Router", function () { ownerAssistant: PublicKey.default, mint: USDC_MINT_ADDRESS, }); - await expectIxErr(connection, [ix], [payer], "AssistantZeroPubkey"); + + await expectIxErr(connection, [ix], [payer], "Error Code: AssistantZeroPubkey"); }); it("Initialize", async function () { @@ -71,6 +72,7 @@ describe("Token Router", function () { ownerAssistant: ownerAssistant.publicKey, mint: USDC_MINT_ADDRESS, }); + await expectIxOk(connection, [ix], [payer]); const custodianData = await tokenRouter.fetchCustodian( @@ -100,7 +102,15 @@ describe("Token Router", function () { ownerAssistant: ownerAssistant.publicKey, mint: USDC_MINT_ADDRESS, }); - await expectIxErr(connection, [ix], [payer], "already in use"); + + await expectIxErr( + connection, + [ix], + [payer], + `Allocate: account Address { address: ${tokenRouter + .custodianAddress() + .toString()}, base: None } already in use` + ); }); after("Setup Lookup Table", async () => { @@ -130,44 +140,40 @@ describe("Token Router", function () { lookupTableAddress = lookupTable; }); - }); - - describe("Ownership Transfer Request", async function () { - // Create the submit ownership transfer instruction, which will be used - // to set the pending owner to the `relayer` key. - const createSubmitOwnershipTransferIx = (opts?: { - sender?: PublicKey; - newOwner?: PublicKey; - }) => - tokenRouter.submitOwnershipTransferIx({ - owner: opts?.sender ?? owner.publicKey, - newOwner: opts?.newOwner ?? relayer.publicKey, - }); - // Create the confirm ownership transfer instruction, which will be used - // to set the new owner to the `relayer` key. - const createConfirmOwnershipTransferIx = (opts?: { sender?: PublicKey }) => - tokenRouter.confirmOwnershipTransferIx({ - pendingOwner: opts?.sender ?? relayer.publicKey, - }); - - // Instruction to cancel an ownership transfer request. - const createCancelOwnershipTransferIx = (opts?: { sender?: PublicKey }) => - tokenRouter.cancelOwnershipTransferIx({ - owner: opts?.sender ?? owner.publicKey, - }); - - it("Submit Ownership Transfer Request as Deployer (Payer)", async function () { + after("Transfer Lamports to Owner and Owner Assistant", async function () { await expectIxOk( connection, [ - await createSubmitOwnershipTransferIx({ - sender: payer.publicKey, - newOwner: owner.publicKey, + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: owner.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: ownerAssistant.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: relayer.publicKey, + lamports: 1000000000, }), ], [payer] ); + }); + }); + + describe("Ownership Transfer Request", async function () { + it("Submit Ownership Transfer Request as Payer to Owner Pubkey", async function () { + const ix = await tokenRouter.submitOwnershipTransferIx({ + owner: payer.publicKey, + newOwner: owner.publicKey, + }); + + await expectIxOk(connection, [ix], [payer]); // Confirm that the pending owner variable is set in the owner config. const custodianData = await tokenRouter.fetchCustodian( @@ -177,124 +183,65 @@ describe("Token Router", function () { expect(custodianData.pendingOwner).deep.equals(owner.publicKey); }); - it("Confirm Ownership Transfer Request as Pending Owner", async function () { - await expectIxOk( - connection, - [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], - [payer, owner] - ); + it("Cannot Cancel Ownership Request as Non-Owner", async function () { + const ix = await tokenRouter.cancelOwnershipTransferIx({ + owner: ownerAssistant.publicKey, + }); - // Confirm that the owner config reflects the current ownership status. - { - const custodianData = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); - expect(custodianData.owner).deep.equals(owner.publicKey); - expect(custodianData.pendingOwner).deep.equals(null); - } + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); }); - it("Cannot Submit Ownership Transfer Request (New Owner == Address(0))", async function () { - await expectIxErr( - connection, - [ - await createSubmitOwnershipTransferIx({ - newOwner: PublicKey.default, - }), - ], - [payer, owner], - "InvalidNewOwner" - ); - }); + it("Cancel Ownership Request as Payer", async function () { + const ix = await tokenRouter.cancelOwnershipTransferIx({ + owner: payer.publicKey, + }); - it("Cannot Submit Ownership Transfer Request (New Owner == Owner)", async function () { - await expectIxErr( - connection, - [ - await createSubmitOwnershipTransferIx({ - newOwner: owner.publicKey, - }), - ], - [payer, owner], - "AlreadyOwner" - ); - }); + await expectIxOk(connection, [ix], [payer]); - it("Cannot Submit Ownership Transfer Request as Non-Owner", async function () { - await expectIxErr( - connection, - [ - await createSubmitOwnershipTransferIx({ - sender: ownerAssistant.publicKey, - }), - ], - [payer, ownerAssistant], - "OwnerOnly" + // Confirm the pending owner field was reset. + const custodianData = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() ); + expect(custodianData.pendingOwner).deep.equals(null); }); - it("Submit Ownership Transfer Request as Owner", async function () { - await expectIxOk( - connection, - [await createSubmitOwnershipTransferIx()], - [payer, owner] - ); + it("Submit Ownership Transfer Request as Payer Again to Owner Pubkey", async function () { + const ix = await tokenRouter.submitOwnershipTransferIx({ + owner: payer.publicKey, + newOwner: owner.publicKey, + }); + + await expectIxOk(connection, [ix], [payer]); // Confirm that the pending owner variable is set in the owner config. const custodianData = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); + + expect(custodianData.pendingOwner).deep.equals(owner.publicKey); }); - it("Cannot Confirm Ownership Transfer Request as Non Pending Owner", async function () { + it("Cannot Confirm Ownership Transfer Request as Non-Pending Owner", async function () { + const ix = await tokenRouter.confirmOwnershipTransferIx({ + pendingOwner: ownerAssistant.publicKey, + }); + await expectIxErr( connection, - [ - await createConfirmOwnershipTransferIx({ - sender: ownerAssistant.publicKey, - }), - ], - [payer, ownerAssistant], - "NotPendingOwner" + [ix], + [ownerAssistant], + "Error Code: NotPendingOwner" ); }); it("Confirm Ownership Transfer Request as Pending Owner", async function () { - await expectIxOk( - connection, - [await createConfirmOwnershipTransferIx()], - [payer, relayer] - ); - - // Confirm that the owner config reflects the current ownership status. - { - const custodianData = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); - expect(custodianData.owner).deep.equals(relayer.publicKey); - expect(custodianData.pendingOwner).deep.equals(null); - } - - // Set the owner back to the payer key. - await expectIxOk( - connection, - [ - await createSubmitOwnershipTransferIx({ - sender: relayer.publicKey, - newOwner: owner.publicKey, - }), - ], - [payer, relayer] - ); + const ix = await tokenRouter.confirmOwnershipTransferIx({ + pendingOwner: owner.publicKey, + }); - await expectIxOk( - connection, - [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], - [payer, owner] - ); + await expectIxOk(connection, [ix], [owner]); - // Confirm that the payer is the owner again. + // Confirm that the owner config reflects the current ownership status. { const custodianData = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() @@ -304,81 +251,59 @@ describe("Token Router", function () { } }); - it("Cannot Cancel Ownership Request as Non-Owner", async function () { - // First, submit the ownership transfer request. - await expectIxOk( - connection, - [await createSubmitOwnershipTransferIx()], - [payer, owner] - ); + it("Cannot Submit Ownership Transfer Request to Default Pubkey", async function () { + const ix = await tokenRouter.submitOwnershipTransferIx({ + owner: owner.publicKey, + newOwner: PublicKey.default, + }); - // Confirm that the pending owner variable is set in the owner config. - { - const custodianData = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); - expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); - } + await expectIxErr(connection, [ix], [owner], "Error Code: InvalidNewOwner"); + }); - // Confirm that the cancel ownership transfer request fails. - await expectIxErr( - connection, - [await createCancelOwnershipTransferIx({ sender: ownerAssistant.publicKey })], - [payer, ownerAssistant], - "OwnerOnly" - ); + it("Cannot Submit Ownership Transfer Request to Himself", async function () { + const ix = await tokenRouter.submitOwnershipTransferIx({ + owner: owner.publicKey, + newOwner: owner.publicKey, + }); + + await expectIxErr(connection, [ix], [owner], "Error Code: AlreadyOwner"); }); - it("Cancel Ownership Request as Owner", async function () { - await expectIxOk( - connection, - [await createCancelOwnershipTransferIx()], - [payer, owner] - ); + it("Cannot Submit Ownership Transfer Request as Non-Owner", async function () { + const ix = await tokenRouter.submitOwnershipTransferIx({ + owner: ownerAssistant.publicKey, + newOwner: relayer.publicKey, + }); - // Confirm the pending owner field was reset. - const custodianData = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); - expect(custodianData.pendingOwner).deep.equals(null); + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); }); }); describe("Update Owner Assistant", async function () { - // Create the update owner assistant instruction. - const createUpdateOwnerAssistantIx = (opts?: { - sender?: PublicKey; - newAssistant?: PublicKey; - }) => - tokenRouter.updateOwnerAssistantIx({ - owner: opts?.sender ?? owner.publicKey, - newOwnerAssistant: opts?.newAssistant ?? relayer.publicKey, + it("Cannot Update Assistant to Default Pubkey", async function () { + const ix = await tokenRouter.updateOwnerAssistantIx({ + owner: owner.publicKey, + newOwnerAssistant: PublicKey.default, }); - it("Cannot Update Assistant (New Assistant == Address(0))", async function () { - await expectIxErr( - connection, - [await createUpdateOwnerAssistantIx({ newAssistant: PublicKey.default })], - [payer, owner], - "InvalidNewAssistant" - ); + await expectIxErr(connection, [ix], [owner], "Error Code: InvalidNewAssistant"); }); it("Cannot Update Assistant as Non-Owner", async function () { - await expectIxErr( - connection, - [await createUpdateOwnerAssistantIx({ sender: ownerAssistant.publicKey })], - [payer, ownerAssistant], - "OwnerOnly" - ); + const ix = await tokenRouter.updateOwnerAssistantIx({ + owner: ownerAssistant.publicKey, + newOwnerAssistant: relayer.publicKey, + }); + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); }); it("Update Assistant as Owner", async function () { - await expectIxOk( - connection, - [await createUpdateOwnerAssistantIx()], - [payer, owner] - ); + const ix = await tokenRouter.updateOwnerAssistantIx({ + owner: owner.publicKey, + newOwnerAssistant: relayer.publicKey, + }); + + await expectIxOk(connection, [ix], [payer, owner]); // Confirm the assistant field was updated. const custodianData = await tokenRouter.fetchCustodian( @@ -390,102 +315,80 @@ describe("Token Router", function () { await expectIxOk( connection, [ - await createUpdateOwnerAssistantIx({ - newAssistant: ownerAssistant.publicKey, + await tokenRouter.updateOwnerAssistantIx({ + owner: owner.publicKey, + newOwnerAssistant: ownerAssistant.publicKey, }), ], - [payer, owner] + [owner] ); }); }); describe("Add Router Endpoint", function () { - const createAddRouterEndpointIx = (opts?: { - sender?: PublicKey; - contractAddress?: Array; - cctpDomain?: number | null; - }) => - tokenRouter.addRouterEndpointIx( + it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { + const ix = await tokenRouter.addRouterEndpointIx( { - ownerOrAssistant: opts?.sender ?? owner.publicKey, + ownerOrAssistant: payer.publicKey, }, { chain: foreignChain, - address: opts?.contractAddress ?? routerEndpointAddress, - cctpDomain: opts?.cctpDomain ?? foreignCctpDomain, + address: routerEndpointAddress, + cctpDomain: foreignCctpDomain, } ); - before("Transfer Lamports to Owner and Owner Assistant", async function () { - await expectIxOk( - connection, - [ - SystemProgram.transfer({ - fromPubkey: payer.publicKey, - toPubkey: owner.publicKey, - lamports: 1000000000, - }), - SystemProgram.transfer({ - fromPubkey: payer.publicKey, - toPubkey: ownerAssistant.publicKey, - lamports: 1000000000, - }), - ], - [payer] - ); - }); - - it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { - await expectIxErr( - connection, - [await createAddRouterEndpointIx({ sender: payer.publicKey })], - [payer], - "OwnerOrAssistantOnly" - ); + await expectIxErr(connection, [ix], [payer], "Error Code: OwnerOrAssistantOnly"); }); [wormholeSdk.CHAINS.unset, wormholeSdk.CHAINS.solana].forEach((chain) => it(`Cannot Register Chain ID == ${chain}`, async function () { + const ix = await tokenRouter.addRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { chain, address: routerEndpointAddress, cctpDomain: null } + ); + await expectIxErr( connection, - [ - await tokenRouter.addRouterEndpointIx( - { ownerOrAssistant: owner.publicKey }, - { chain, address: routerEndpointAddress, cctpDomain: null } - ), - ], - [owner], - "ChainNotAllowed" + [ix], + [ownerAssistant], + "Error Code: ChainNotAllowed" ); }) ); it("Cannot Register Zero Address", async function () { - await expectIxErr( - connection, - [ - await createAddRouterEndpointIx({ - contractAddress: new Array(32).fill(0), - }), - ], - [owner], - "InvalidEndpoint" + const ix = await tokenRouter.addRouterEndpointIx( + { + ownerOrAssistant: owner.publicKey, + }, + { + chain: foreignChain, + address: new Array(32).fill(0), + cctpDomain: foreignCctpDomain, + } ); + + await expectIxErr(connection, [ix], [owner], "Error Code: InvalidEndpoint"); }); it(`Add Router Endpoint as Owner Assistant`, async function () { const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); - await expectIxOk( - connection, - [ - await createAddRouterEndpointIx({ - sender: ownerAssistant.publicKey, - contractAddress, - }), - ], - [ownerAssistant] + const ix = await tokenRouter.addRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { + chain: foreignChain, + address: contractAddress, + cctpDomain: null, + } ); + await expectIxOk(connection, [ix], [ownerAssistant]); + const routerEndpointData = await tokenRouter.fetchRouterEndpoint( tokenRouter.routerEndpointAddress(foreignChain) ); @@ -493,22 +396,25 @@ describe("Token Router", function () { bump: 255, chain: foreignChain, address: contractAddress, - cctpDomain: foreignCctpDomain, + cctpDomain: null, }; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); it(`Update Router Endpoint as Owner`, async function () { - await expectIxOk( - connection, - [ - await createAddRouterEndpointIx({ - contractAddress: routerEndpointAddress, - }), - ], - [owner] + const ix = await tokenRouter.addRouterEndpointIx( + { + ownerOrAssistant: owner.publicKey, + }, + { + chain: foreignChain, + address: routerEndpointAddress, + cctpDomain: foreignCctpDomain, + } ); + await expectIxOk(connection, [ix], [owner]); + const routerEndpointData = await tokenRouter.fetchRouterEndpoint( tokenRouter.routerEndpointAddress(foreignChain) ); @@ -523,45 +429,49 @@ describe("Token Router", function () { }); describe("Set Pause", async function () { - const createSetPauseIx = (opts?: { sender?: PublicKey; paused?: boolean }) => - tokenRouter.setPauseIx( + it("Cannot Set Pause for Transfers as Non-Owner", async function () { + const ix = await tokenRouter.setPauseIx( { - ownerOrAssistant: opts?.sender ?? owner.publicKey, + ownerOrAssistant: payer.publicKey, }, - opts?.paused ?? true + true // paused ); - it("Cannot Set Pause for Transfers as Non-Owner", async function () { - await expectIxErr( - connection, - [await createSetPauseIx({ sender: payer.publicKey })], - [payer], - "OwnerOrAssistantOnly" - ); + await expectIxErr(connection, [ix], [payer], "Error Code: OwnerOrAssistantOnly"); }); it("Set Paused == true as Owner Assistant", async function () { const paused = true; - await expectIxOk( - connection, - [await createSetPauseIx({ sender: ownerAssistant.publicKey, paused })], - [ownerAssistant] + const ix = await tokenRouter.setPauseIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + paused ); - const [actualPaused, pausedSetBy] = await tokenRouter - .fetchCustodian(tokenRouter.custodianAddress()) - .then((data) => [data.paused, data.pausedSetBy]); + await expectIxOk(connection, [ix], [ownerAssistant]); + + const { paused: actualPaused, pausedSetBy } = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); expect(actualPaused).equals(paused); expect(pausedSetBy).eql(ownerAssistant.publicKey); }); it("Set Paused == false as Owner", async function () { const paused = false; - await expectIxOk(connection, [await createSetPauseIx({ paused })], [owner]); + const ix = await tokenRouter.setPauseIx( + { + ownerOrAssistant: owner.publicKey, + }, + paused + ); + + await expectIxOk(connection, [ix], [owner]); - const [actualPaused, pausedSetBy] = await tokenRouter - .fetchCustodian(tokenRouter.custodianAddress()) - .then((data) => [data.paused, data.pausedSetBy]); + const { paused: actualPaused, pausedSetBy } = await tokenRouter.fetchCustodian( + tokenRouter.custodianAddress() + ); expect(actualPaused).equals(paused); expect(pausedSetBy).eql(owner.publicKey); }); @@ -573,32 +483,26 @@ describe("Token Router", function () { USDC_MINT_ADDRESS, payer.publicKey ); + const burnSourceAuthority = Keypair.generate(); - const createPlaceMarketOrderCctpIx = ( - amountIn: bigint, - opts?: { - sender?: PublicKey; - mint?: PublicKey; - burnSource?: PublicKey; - burnSourceAuthority?: PublicKey; - targetChain?: wormholeSdk.ChainId; - redeemer?: Array; - } - ) => - tokenRouter.placeMarketOrderCctpIx( - { - payer: opts?.sender ?? payer.publicKey, - mint: opts?.mint ?? USDC_MINT_ADDRESS, - burnSource: opts?.burnSource ?? payerToken, - burnSourceAuthority: opts?.burnSourceAuthority ?? payer.publicKey, - }, - { - amountIn, - targetChain: opts?.targetChain ?? foreignChain, - redeemer: opts?.redeemer ?? Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), - } + before("Set Up Arbitrary Burn Source", async function () { + const burnSource = await splToken.createAccount( + connection, + payer, + USDC_MINT_ADDRESS, + burnSourceAuthority.publicKey + ); + + // Add funds to account. + await splToken.mintTo( + connection, + payer, + USDC_MINT_ADDRESS, + burnSource, + payer, + 1_000_000_000n // 1,000 USDC ); + }); it.skip("Cannot Place Market Order with Insufficient Amount", async function () { // TODO @@ -616,55 +520,60 @@ describe("Token Router", function () { const burnSourceAuthority = Keypair.generate(); const amountIn = 69n; + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: burnSourceAuthority.publicKey, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); // TODO: use lookup table // NOTE: This error comes from the SPL Token program. await expectIxErr( connection, - [ - await createPlaceMarketOrderCctpIx(amountIn, { - burnSourceAuthority: burnSourceAuthority.publicKey, - }), - ], + [ix], [payer, burnSourceAuthority], "Error: owner does not match" ); }); it("Place Market Order as Burn Source Authority", async function () { - const burnSourceAuthority = Keypair.generate(); - const burnSource = await splToken.createAccount( - connection, - payer, + const burnSource = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, burnSourceAuthority.publicKey ); - const amountIn = 69n; - - // Add funds to account. - await splToken.mintTo( - connection, - payer, - USDC_MINT_ADDRESS, - burnSource, - payer, - amountIn + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource, + burnSourceAuthority: burnSourceAuthority.publicKey, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } ); const { amount: balanceBefore } = await splToken.getAccount(connection, burnSource); - // TODO: use lookup table - await expectIxOk( - connection, - [ - await createPlaceMarketOrderCctpIx(amountIn, { - burnSource, - burnSourceAuthority: burnSourceAuthority.publicKey, - }), - ], - [payer, burnSourceAuthority] + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress ); + await expectIxOk(connection, [ix], [payer, burnSourceAuthority], { + addressLookupTableAccounts: [lookupTableAccount!], + }); const { amount: balanceAfter } = await splToken.getAccount(connection, burnSource); expect(balanceAfter + amountIn).equals(balanceBefore); @@ -672,13 +581,74 @@ describe("Token Router", function () { // TODO: check message }); - it("Place Market Order as Payer", async function () { + it("Cannot Place Market Order when Paused", async function () { + // First pause the router. + { + const ix = await tokenRouter.setPauseIx( + { + ownerOrAssistant: owner.publicKey, + }, + true // paused + ); + + await expectIxOk(connection, [ix], [owner]); + } + + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: payer.publicKey, + }, + { + amountIn: 69n, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); + + await expectIxErr(connection, [ix], [payer], "Error Code: Paused"); + }); + + it("Place Market Order after Unpaused", async function () { + // First unpause the router. + { + const ix = await tokenRouter.setPauseIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + false // paused + ); + + await expectIxOk(connection, [ix], [ownerAssistant]); + } + const amountIn = 69n; + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: payer.publicKey, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); - // TODO: use lookup table - await expectIxOk(connection, [await createPlaceMarketOrderCctpIx(amountIn)], [payer]); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxOk(connection, [ix], [payer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); expect(balanceAfter + amountIn).equals(balanceBefore); @@ -702,31 +672,6 @@ describe("Token Router", function () { const localVariables = new Map(); - const createRedeemFillCctpIx = ( - vaa: PublicKey, - encodedCctpMessage: Buffer, - opts?: { - sender?: PublicKey; - redeemer?: PublicKey; - dstToken?: PublicKey; - cctpAttestation?: Buffer; - } - ) => - tokenRouter.redeemCctpFillIx( - { - payer: opts?.sender ?? payer.publicKey, - vaa, - redeemer: opts?.redeemer ?? payer.publicKey, - dstToken: opts?.dstToken ?? payerToken, - }, - { - encodedCctpMessage, - cctpAttestation: - opts?.cctpAttestation ?? - new CircleAttester().createAttestation(encodedCctpMessage), - } - ); - it("Redeem Fill", async function () { const redeemer = Keypair.generate(); @@ -739,7 +684,7 @@ describe("Token Router", function () { // Concoct a Circle message. const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); - const { destinationCctpDomain, burnMessage, encodedCctpMessage } = + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( tokenRouter, sourceCctpDomain, @@ -778,6 +723,18 @@ describe("Token Router", function () { wormholeSequence++, message ); + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + { + encodedCctpMessage, + cctpAttestation, + } + ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ units: 250_000, @@ -788,17 +745,9 @@ describe("Token Router", function () { const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxOk( - connection, - [ - computeIx, - await createRedeemFillCctpIx(vaa, encodedCctpMessage, { - redeemer: redeemer.publicKey, - }), - ], - [payer, redeemer], - { addressLookupTableAccounts: [lookupTableAccount!] } - ); + await expectIxOk(connection, [computeIx, ix], [payer, redeemer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); expect(balanceAfter).equals(balanceBefore + amount); @@ -826,11 +775,10 @@ async function craftCctpTokenBurnMessage( const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; const tokenMessengerMinterProgram = tokenRouter.tokenMessengerMinterProgram(); - const sourceTokenMessenger = await tokenMessengerMinterProgram - .fetchRemoteTokenMessenger( + const { tokenMessenger: sourceTokenMessenger } = + await tokenMessengerMinterProgram.fetchRemoteTokenMessenger( tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain) - ) - .then((remote) => remote.tokenMessenger); + ); const burnMessage = new CctpTokenBurnMessage( { @@ -850,10 +798,12 @@ async function craftCctpTokenBurnMessage( ); const encodedCctpMessage = burnMessage.encode(); + const cctpAttestation = new CircleAttester().createAttestation(encodedCctpMessage); return { destinationCctpDomain, burnMessage, encodedCctpMessage, + cctpAttestation, }; } From 0ec961b71e7d1cbb8794e3c86e8bacb45eba4af1 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 15 Jan 2024 21:04:05 -0600 Subject: [PATCH 043/126] solana: add_cctp_router_endpoint --- solana/programs/token-router/src/lib.rs | 4 +- .../processor/admin/add_router_endpoint.rs | 118 ------------------ .../admin/add_router_endpoint/cctp.rs | 92 ++++++++++++++ .../admin/add_router_endpoint/mod.rs | 2 + .../src/processor/place_market_order/cctp.rs | 38 +++--- .../token-router/src/state/router_endpoint.rs | 14 ++- solana/ts/src/tokenRouter/index.ts | 27 ++-- .../src/tokenRouter/state/RouterEndpoint.ts | 11 +- solana/ts/tests/02__tokenRouter.ts | 28 +++-- 9 files changed, 167 insertions(+), 167 deletions(-) delete mode 100644 solana/programs/token-router/src/processor/admin/add_router_endpoint.rs create mode 100644 solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs create mode 100644 solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 5eb7524a..537e399b 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -112,11 +112,11 @@ pub mod token_router { processor::update_owner_assistant(ctx) } - pub fn add_router_endpoint( + pub fn add_cctp_router_endpoint( ctx: Context, args: AddRouterEndpointArgs, ) -> Result<()> { - processor::add_router_endpoint(ctx, args) + processor::add_cctp_router_endpoint(ctx, args) } /// This instruction updates the `paused` boolean in the `SenderConfig` diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs deleted file mode 100644 index 26a20791..00000000 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint.rs +++ /dev/null @@ -1,118 +0,0 @@ -use crate::{ - error::TokenRouterError, - state::{Custodian, RouterEndpoint}, -}; -use anchor_lang::prelude::*; -use common::admin::utils::assistant::only_authorized; -use wormhole_cctp_solana::{ - cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, - utils::ExternalAccount, -}; - -#[derive(Accounts)] -#[instruction(chain: u16)] -pub struct AddRouterEndpoint<'info> { - #[account(mut)] - owner_or_assistant: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ TokenRouterError::OwnerOrAssistantOnly, - )] - custodian: Account<'info, Custodian>, - - #[account( - init_if_needed, - payer = owner_or_assistant, - space = 8 + RouterEndpoint::INIT_SPACE, - seeds = [ - RouterEndpoint::SEED_PREFIX, - &chain.to_be_bytes() - ], - bump, - )] - router_endpoint: Account<'info, RouterEndpoint>, - - /// If provided, seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP - /// Token Messenger Minter program). - remote_token_messenger: Option>, - - system_program: Program<'info, System>, -} - -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct AddRouterEndpointArgs { - pub chain: u16, - pub address: [u8; 32], - pub cctp_domain: Option, -} - -#[access_control(check_constraints(&ctx, &args))] -pub fn add_router_endpoint( - ctx: Context, - args: AddRouterEndpointArgs, -) -> Result<()> { - let AddRouterEndpointArgs { - chain, - address, - cctp_domain, - } = args; - - ctx.accounts.router_endpoint.set_inner(RouterEndpoint { - bump: ctx.bumps["router_endpoint"], - chain, - address, - cctp_domain, - }); - - // Done. - Ok(()) -} - -fn check_constraints(ctx: &Context, args: &AddRouterEndpointArgs) -> Result<()> { - require!( - args.chain != 0 - && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, - TokenRouterError::ChainNotAllowed - ); - - require!(args.address != [0; 32], TokenRouterError::InvalidEndpoint); - - // If the endpoint is a CCTP endpoint, check that there is a CCTP remote token messenger - // corresponding to the specified CCTP domain. - if let Some(cctp_domain) = args.cctp_domain { - let acc_info = ctx - .accounts - .remote_token_messenger - .as_ref() - .ok_or(TokenRouterError::CctpRemoteTokenMessengerRequired)?; - - // Check that the account derives to the expected. - let (expected_key, _) = Pubkey::find_program_address( - &[ - RemoteTokenMessenger::SEED_PREFIX, - cctp_domain.to_string().as_ref(), - ], - &token_messenger_minter_program::id(), - ); - require_keys_eq!(acc_info.key(), expected_key, ErrorCode::ConstraintSeeds); - - // Now that we re-derived the remote token messenger account using the provided CCTP domain, - // deserialize and double-check that the domain in the account matches the provided one - // (which is what we would have done in the account context, but this account is optional so - // we have to check it here in access control). - let mut acc_data: &[_] = &acc_info.try_borrow_data()?; - let expected_cctp_domain = - ExternalAccount::::try_deserialize(&mut acc_data) - .map(|messenger| messenger.domain)?; - require_eq!( - cctp_domain, - expected_cctp_domain, - TokenRouterError::InvalidCctpEndpoint - ); - } - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs new file mode 100644 index 00000000..15a67854 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs @@ -0,0 +1,92 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, MessageProtocol, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use common::admin::utils::assistant::only_authorized; +use wormhole_cctp_solana::{ + cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, + utils::ExternalAccount, +}; + +#[derive(Accounts)] +#[instruction(chain: u16, cctp_domain: u32)] +pub struct AddRouterEndpoint<'info> { + #[account(mut)] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ TokenRouterError::OwnerOrAssistantOnly, + )] + custodian: Account<'info, Custodian>, + + #[account( + init_if_needed, + payer = owner_or_assistant, + space = 8 + RouterEndpoint::INIT_SPACE, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &chain.to_be_bytes() + ], + bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + #[account( + seeds = [ + RemoteTokenMessenger::SEED_PREFIX, + cctp_domain.to_string().as_ref() + ], + bump, + seeds::program = token_messenger_minter_program::id(), + )] + remote_token_messenger: Account<'info, ExternalAccount>, + + system_program: Program<'info, System>, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct AddRouterEndpointArgs { + pub chain: u16, + pub cctp_domain: u32, + pub address: [u8; 32], +} + +#[access_control(check_constraints(&args))] +pub fn add_cctp_router_endpoint( + ctx: Context, + args: AddRouterEndpointArgs, +) -> Result<()> { + let AddRouterEndpointArgs { + chain, + address, + cctp_domain: domain, + } = args; + + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { + bump: ctx.bumps["router_endpoint"], + chain, + address, + protocol: MessageProtocol::Cctp { domain }, + }); + + // Done. + Ok(()) +} + +fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { + require!( + args.chain != 0 + && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + TokenRouterError::ChainNotAllowed + ); + + require!(args.address != [0; 32], TokenRouterError::InvalidEndpoint); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs new file mode 100644 index 00000000..c143ed24 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs @@ -0,0 +1,2 @@ +mod cctp; +pub use cctp::*; diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index a0dd3609..181d8a1c 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::TokenRouterError, - state::{Custodian, PayerSequence, RouterEndpoint}, + state::{Custodian, MessageProtocol, PayerSequence, RouterEndpoint}, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -89,7 +89,6 @@ pub struct PlaceMarketOrderCctp<'info> { router_endpoint.chain.to_be_bytes().as_ref(), ], bump = router_endpoint.bump, - constraint = router_endpoint.cctp_domain.is_some() @ TokenRouterError::InvalidCctpEndpoint, )] router_endpoint: Account<'info, RouterEndpoint>, @@ -177,6 +176,28 @@ pub struct PlaceMarketOrderCctpArgs { pub fn place_market_order_cctp( ctx: Context, args: PlaceMarketOrderCctpArgs, +) -> Result<()> { + match ctx.accounts.router_endpoint.protocol { + MessageProtocol::Cctp { domain } => handle_place_market_order_cctp(ctx, args, domain), + _ => err!(TokenRouterError::InvalidCctpEndpoint), + } +} + +fn check_constraints(args: &PlaceMarketOrderCctpArgs) -> Result<()> { + // Even though CCTP prevents zero amount burns, we prefer to throw an explicit error here. + require!(args.amount_in > 0, TokenRouterError::InsufficientAmount); + + // Cannot send to zero address. + require!(args.redeemer != [0; 32], TokenRouterError::InvalidRedeemer); + + // Done. + Ok(()) +} + +fn handle_place_market_order_cctp( + ctx: Context, + args: PlaceMarketOrderCctpArgs, + destination_cctp_domain: u32, ) -> Result<()> { let PlaceMarketOrderCctpArgs { amount_in: amount, @@ -264,7 +285,7 @@ pub fn place_market_order_cctp( wormhole_cctp_solana::cpi::BurnAndPublishArgs { burn_source: ctx.accounts.burn_source.key(), destination_caller: ctx.accounts.router_endpoint.address, - destination_cctp_domain: ctx.accounts.router_endpoint.cctp_domain.unwrap(), + destination_cctp_domain, amount, mint_recipient: ctx.accounts.router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, @@ -281,14 +302,3 @@ pub fn place_market_order_cctp( // Done. Ok(()) } - -fn check_constraints(args: &PlaceMarketOrderCctpArgs) -> Result<()> { - // Even though CCTP prevents zero amount burns, we prefer to throw an explicit error here. - require!(args.amount_in > 0, TokenRouterError::InsufficientAmount); - - // Cannot send to zero address. - require!(args.redeemer != [0; 32], TokenRouterError::InvalidRedeemer,); - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/state/router_endpoint.rs b/solana/programs/token-router/src/state/router_endpoint.rs index 90873f47..6cee7cbd 100644 --- a/solana/programs/token-router/src/state/router_endpoint.rs +++ b/solana/programs/token-router/src/state/router_endpoint.rs @@ -1,5 +1,14 @@ use anchor_lang::prelude::*; +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, PartialEq, Eq, InitSpace)] +pub enum MessageProtocol { + Cctp { + /// CCTP domain, which is how CCTP registers identifies foreign networks. + domain: u32, + }, + Canonical, +} + #[account] #[derive(Debug, InitSpace)] /// Foreign emitter account data. @@ -12,9 +21,8 @@ pub struct RouterEndpoint { /// Emitter address. Cannot be zero address. pub address: [u8; 32], - /// CCTP domain, which is how CCTP registers identifies foreign networks. If there is no CCTP - /// for a given foreign network, this field is `None`. - pub cctp_domain: Option, + /// Specific message protocol used to move assets. + pub protocol: MessageProtocol, } impl RouterEndpoint { diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 1f55f218..70e8a11f 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -18,7 +18,7 @@ import { } from "../cctp"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; -import { Custodian, PayerSequence, RouterEndpoint } from "./state"; +import { Custodian, MessageProtocol, PayerSequence, RouterEndpoint } from "./state"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; @@ -91,10 +91,10 @@ export type RedeemFillCctpAccounts = { tokenProgram: PublicKey; }; -export type AddRouterEndpointArgs = { +export type AddCctpRouterEndpointArgs = { chain: ChainId; address: Array; - cctpDomain: number | null; + cctpDomain: number; }; export type RegisterContractArgs = { @@ -229,13 +229,11 @@ export class TokenRouterProgram { if (inputRemoteDomain !== undefined) { return inputRemoteDomain; } else { - const cctpDomain = await this.fetchRouterEndpoint(routerEndpoint).then( - (acct) => acct.cctpDomain - ); - if (cctpDomain === null) { - throw new Error("invalid router endpoint"); + const { protocol } = await this.fetchRouterEndpoint(routerEndpoint); + if (protocol.cctp !== undefined) { + return protocol.cctp.domain; } else { - return cctpDomain; + throw new Error("invalid router endpoint"); } } })(); @@ -544,14 +542,14 @@ export class TokenRouterProgram { .instruction(); } - async addRouterEndpointIx( + async addCctpRouterEndpointIx( accounts: { ownerOrAssistant: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; remoteTokenMessenger?: PublicKey; }, - args: AddRouterEndpointArgs + args: AddCctpRouterEndpointArgs ): Promise { const { ownerOrAssistant, @@ -561,11 +559,10 @@ export class TokenRouterProgram { } = accounts; const { chain, cctpDomain } = args; const derivedRemoteTokenMessenger = - cctpDomain === null - ? null - : this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); + this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); + return this.program.methods - .addRouterEndpoint(args) + .addCctpRouterEndpoint(args) .accounts({ ownerOrAssistant, custodian: inputCustodian ?? this.custodianAddress(), diff --git a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts index eeee10bd..9431544e 100644 --- a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts +++ b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts @@ -1,17 +1,22 @@ import { ChainId } from "@certusone/wormhole-sdk"; import { PublicKey } from "@solana/web3.js"; +export type MessageProtocol = { + cctp?: { domain: number }; + canonical?: {}; +}; + export class RouterEndpoint { bump: number; chain: number; address: Array; - cctpDomain: number | null; + protocol: MessageProtocol; - constructor(bump: number, chain: number, address: Array, cctpDomain: number | null) { + constructor(bump: number, chain: number, address: Array, protocol: MessageProtocol) { this.bump = bump; this.chain = chain; this.address = address; - this.cctpDomain = cctpDomain; + this.protocol = protocol; } static address(programId: PublicKey, chain: ChainId) { diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 03f78d09..418b944c 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -325,9 +325,9 @@ describe("Token Router", function () { }); }); - describe("Add Router Endpoint", function () { - it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { - const ix = await tokenRouter.addRouterEndpointIx( + describe("Add CCTP Router Endpoint", function () { + it("Cannot Add CCTP Router Endpoint as Non-Owner and Non-Assistant", async function () { + const ix = await tokenRouter.addCctpRouterEndpointIx( { ownerOrAssistant: payer.publicKey, }, @@ -343,11 +343,15 @@ describe("Token Router", function () { [wormholeSdk.CHAINS.unset, wormholeSdk.CHAINS.solana].forEach((chain) => it(`Cannot Register Chain ID == ${chain}`, async function () { - const ix = await tokenRouter.addRouterEndpointIx( + const ix = await tokenRouter.addCctpRouterEndpointIx( { ownerOrAssistant: ownerAssistant.publicKey, }, - { chain, address: routerEndpointAddress, cctpDomain: null } + { + chain, + address: routerEndpointAddress, + cctpDomain: foreignCctpDomain, + } ); await expectIxErr( @@ -360,7 +364,7 @@ describe("Token Router", function () { ); it("Cannot Register Zero Address", async function () { - const ix = await tokenRouter.addRouterEndpointIx( + const ix = await tokenRouter.addCctpRouterEndpointIx( { ownerOrAssistant: owner.publicKey, }, @@ -374,16 +378,16 @@ describe("Token Router", function () { await expectIxErr(connection, [ix], [owner], "Error Code: InvalidEndpoint"); }); - it(`Add Router Endpoint as Owner Assistant`, async function () { + it(`Add CCTP Router Endpoint as Owner Assistant`, async function () { const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); - const ix = await tokenRouter.addRouterEndpointIx( + const ix = await tokenRouter.addCctpRouterEndpointIx( { ownerOrAssistant: ownerAssistant.publicKey, }, { chain: foreignChain, address: contractAddress, - cctpDomain: null, + cctpDomain: foreignCctpDomain, } ); @@ -396,13 +400,13 @@ describe("Token Router", function () { bump: 255, chain: foreignChain, address: contractAddress, - cctpDomain: null, + protocol: { cctp: { domain: foreignCctpDomain } }, }; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); it(`Update Router Endpoint as Owner`, async function () { - const ix = await tokenRouter.addRouterEndpointIx( + const ix = await tokenRouter.addCctpRouterEndpointIx( { ownerOrAssistant: owner.publicKey, }, @@ -422,7 +426,7 @@ describe("Token Router", function () { bump: 255, chain: foreignChain, address: routerEndpointAddress, - cctpDomain: foreignCctpDomain, + protocol: { cctp: { domain: foreignCctpDomain } }, }; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); From 7b8952faad41b4b83ab2249ff029ed73ce027d16 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 16 Jan 2024 08:33:03 -0600 Subject: [PATCH 044/126] solana: fix arg names --- solana/programs/token-router/src/lib.rs | 4 ++-- .../src/processor/admin/add_router_endpoint/cctp.rs | 12 ++++++------ 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 537e399b..4bf0ab6f 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -113,8 +113,8 @@ pub mod token_router { } pub fn add_cctp_router_endpoint( - ctx: Context, - args: AddRouterEndpointArgs, + ctx: Context, + args: AddCctpRouterEndpointArgs, ) -> Result<()> { processor::add_cctp_router_endpoint(ctx, args) } diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs index 15a67854..b01f7808 100644 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs @@ -11,7 +11,7 @@ use wormhole_cctp_solana::{ #[derive(Accounts)] #[instruction(chain: u16, cctp_domain: u32)] -pub struct AddRouterEndpoint<'info> { +pub struct AddCctpRouterEndpoint<'info> { #[account(mut)] owner_or_assistant: Signer<'info>, @@ -50,7 +50,7 @@ pub struct AddRouterEndpoint<'info> { } #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct AddRouterEndpointArgs { +pub struct AddCctpRouterEndpointArgs { pub chain: u16, pub cctp_domain: u32, pub address: [u8; 32], @@ -58,10 +58,10 @@ pub struct AddRouterEndpointArgs { #[access_control(check_constraints(&args))] pub fn add_cctp_router_endpoint( - ctx: Context, - args: AddRouterEndpointArgs, + ctx: Context, + args: AddCctpRouterEndpointArgs, ) -> Result<()> { - let AddRouterEndpointArgs { + let AddCctpRouterEndpointArgs { chain, address, cctp_domain: domain, @@ -78,7 +78,7 @@ pub fn add_cctp_router_endpoint( Ok(()) } -fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { +fn check_constraints(args: &AddCctpRouterEndpointArgs) -> Result<()> { require!( args.chain != 0 && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, From 98441b386996049418ec3f77ffc5473b5bd46788 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 16 Jan 2024 09:25:34 -0600 Subject: [PATCH 045/126] solana: add execute_fast_order instruction --- solana/programs/matching-engine/src/error.rs | 13 ++ solana/programs/matching-engine/src/lib.rs | 4 + .../processor/auction/execute_fast_order.rs | 218 ++++++++++++++++++ .../src/processor/auction/improve_offer.rs | 1 + .../src/processor/auction/mod.rs | 17 +- .../matching-engine/src/state/auction_data.rs | 2 +- .../matching-engine/src/state/custodian.rs | 47 +++- .../token-router/src/processor/mod.rs | 2 +- solana/ts/src/matchingEngine/index.ts | 31 +++ .../ts/src/matchingEngine/state/Custodian.ts | 2 +- solana/ts/tests/01__matchingEngine.ts | 118 +++++++++- .../ts/tests/helpers/matching_engine_utils.ts | 16 ++ 12 files changed, 447 insertions(+), 24 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 2587301d..488b2b5a 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -37,6 +37,9 @@ pub enum MatchingEngineError { #[msg("NotPendingOwner")] NotPendingOwner = 0x20e, + #[msg("InvalidTokenAccount")] + InvalidTokenAccount, + #[msg("OwnerOrAssistantOnly")] OwnerOrAssistantOnly, @@ -87,12 +90,22 @@ pub enum MatchingEngineError { #[msg("InvalidPayloadId")] InvalidPayloadId, + #[msg("AuctionNotActive")] AuctionNotActive, #[msg("AuctionPeriodExpired")] AuctionPeriodExpired, + #[msg("AuctionPeriodNotExpired")] + AuctionPeriodNotExpired, + #[msg("OfferPriceNotImproved")] OfferPriceNotImproved, + + #[msg("BestOfferTokenNotPassedIn")] + BestOfferTokenNotPassedIn, + + #[msg("PenaltyCalculationFailed")] + PenaltyCalculationFailed, } diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 8919aab6..c4ce44c3 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -76,4 +76,8 @@ pub mod matching_engine { pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { processor::improve_offer(ctx, fee_offer) } + + pub fn execute_fast_order(ctx: Context) -> Result<()> { + processor::execute_fast_order(ctx) + } } diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs new file mode 100644 index 00000000..475f556a --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs @@ -0,0 +1,218 @@ +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::raw::LiquidityLayerPayload; +use wormhole_cctp_solana::wormhole::core_bridge_program; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; + +use crate::{ + error::MatchingEngineError, + state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}, +}; + +#[derive(Accounts)] +pub struct ExecuteFastOrder<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + #[account( + mut, + seeds = [ + AuctionData::SEED_PREFIX, + VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + ], + bump + )] + auction_data: Account<'info, AuctionData>, + + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + to_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + )] + to_router_endpoint: Account<'info, RouterEndpoint>, + + #[account( + mut, + associated_token::mint = custody_token.mint, + associated_token::authority = payer + )] + executor_token: Account<'info, token::TokenAccount>, + + #[account( + mut, + token::mint = custody_token.mint, + constraint = best_offer_token.key() == auction_data.best_offer.key() @ MatchingEngineError::InvalidTokenAccount, + )] + best_offer_token: Account<'info, token::TokenAccount>, + + #[account( + mut, + token::mint = custody_token.mint, + constraint = initial_offer_token.key() == auction_data.initial_auctioneer.key() @ MatchingEngineError::InvalidTokenAccount, + )] + initial_offer_token: Account<'info, token::TokenAccount>, + + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. + #[account(owner = core_bridge_program::id())] + vaa: AccountInfo<'info>, + + system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, +} + +pub fn execute_fast_order(ctx: Context) -> Result<()> { + require!( + ctx.accounts.auction_data.status == AuctionStatus::Active, + MatchingEngineError::AuctionNotActive + ); + + let slots_elapsed = Clock::get()? + .slot + .checked_sub(ctx.accounts.auction_data.start_slot) + .unwrap(); + let auction_config = &ctx.accounts.custodian.auction_config; + require!( + slots_elapsed > u64::try_from(auction_config.auction_duration).unwrap(), + MatchingEngineError::AuctionPeriodNotExpired + ); + + // Create zero copy reference to `FastMarketOrder` payload. + let vaa = VaaAccount::load(&ctx.accounts.vaa)?; + let msg = LiquidityLayerPayload::try_from(vaa.try_payload()?) + .map_err(|_| MatchingEngineError::InvalidVaa)? + .message(); + let fast_order = msg + .fast_market_order() + .ok_or(MatchingEngineError::NotFastMarketOrder)?; + let auction_data = &mut ctx.accounts.auction_data; + + // Save the custodian seeds to sign transfers with. + let custodian_seeds = &[ + Custodian::SEED_PREFIX.as_ref(), + &[ctx.accounts.custodian.bump], + ]; + + if slots_elapsed > u64::try_from(auction_config.auction_grace_period).unwrap() { + let (penalty, reward) = ctx + .accounts + .custodian + .calculate_dynamic_penalty(auction_data.security_deposit, slots_elapsed) + .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; + + // If caller passes in the same token account, only perform one transfer. + if ctx.accounts.best_offer_token.key() == ctx.accounts.executor_token.key() { + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.best_offer_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&custodian_seeds[..]], + ), + auction_data + .offer_price + .checked_add(auction_data.security_deposit) + .unwrap() + .checked_sub(reward) + .unwrap(), + )?; + } else { + // Pay the liquidator the penalty. + if penalty > 0 { + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.executor_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&custodian_seeds[..]], + ), + penalty, + )?; + } + + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.best_offer_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&custodian_seeds[..]], + ), + auction_data + .offer_price + .checked_add(auction_data.security_deposit) + .unwrap() + .checked_sub(reward) + .unwrap() + .checked_sub(penalty) + .unwrap(), + )?; + } + + // TODO: Do the CCTP transfer or create a fast fill here. + } else { + // Return the security deposit and the fee to the highest bidder. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.best_offer_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&custodian_seeds[..]], + ), + auction_data + .offer_price + .checked_add(auction_data.security_deposit) + .unwrap(), + )?; + } + + // Pay the auction initiator their fee. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.initial_offer_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&custodian_seeds[..]], + ), + u64::try_from(fast_order.init_auction_fee()).unwrap(), + )?; + + // Set the auction status to completed. + auction_data.status = AuctionStatus::Completed; + + Ok(()) +} + +// TODO: need to validate that the caller passed in the correct token accounts +// and not just their own to steal funds. Look at ALL instructions. diff --git a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs index bbc9f529..bda64731 100644 --- a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs @@ -38,6 +38,7 @@ pub struct ImproveOffer<'info> { #[account( mut, token::mint = custody_token.mint, + constraint = best_offer_token.key() == auction_data.best_offer.key() @ MatchingEngineError::InvalidTokenAccount, )] best_offer_token: Account<'info, token::TokenAccount>, diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 795c5574..aa3bd6e2 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -4,12 +4,12 @@ pub use place_initial_offer::*; mod improve_offer; pub use improve_offer::*; +mod execute_fast_order; +pub use execute_fast_order::*; + use anchor_lang::prelude::*; -use crate::{ - error::MatchingEngineError, - state::RouterEndpoint, -}; +use crate::{error::MatchingEngineError, state::RouterEndpoint}; use wormhole_cctp_solana::wormhole::core_bridge_program::sdk::EmitterInfo; @@ -20,15 +20,14 @@ pub fn verify_router_path( target_chain: u16, ) -> Result<()> { require!( - from_router_endpoint.chain == emitter_info.chain && - from_router_endpoint.address == emitter_info.address, + from_router_endpoint.chain == emitter_info.chain + && from_router_endpoint.address == emitter_info.address, MatchingEngineError::InvalidEndpoint ); require!( - to_router_endpoint.chain == target_chain && - to_router_endpoint.address != [0u8; 32], + to_router_endpoint.chain == target_chain && to_router_endpoint.address != [0u8; 32], MatchingEngineError::InvalidEndpoint ); Ok(()) -} \ No newline at end of file +} diff --git a/solana/programs/matching-engine/src/state/auction_data.rs b/solana/programs/matching-engine/src/state/auction_data.rs index 719ade19..5260a0e8 100644 --- a/solana/programs/matching-engine/src/state/auction_data.rs +++ b/solana/programs/matching-engine/src/state/auction_data.rs @@ -40,4 +40,4 @@ pub struct AuctionData { impl AuctionData { pub const SEED_PREFIX: &'static [u8] = b"auction"; -} \ No newline at end of file +} diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index ec2521dd..427fa4e9 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -1,5 +1,5 @@ use anchor_lang::prelude::*; - +use common::constants::FEE_PRECISION_MAX; #[derive(AnchorSerialize, AnchorDeserialize, Clone, Debug, InitSpace)] pub struct AuctionConfig { // The percentage of the penalty that is awarded to the user when the auction is completed. @@ -8,18 +8,18 @@ pub struct AuctionConfig { // The initial penalty percentage that is incurred once the grace period is over. pub initial_penalty_bps: u32, - // The duration of the auction in blocks. About 500ms on Solana. + // The duration of the auction in slots. About 500ms on Solana. pub auction_duration: u16, /** - * The grace period of the auction in blocks. This is the number of blocks the highest bidder + * The grace period of the auction in slots. This is the number of slots the highest bidder * has to execute the fast order before incurring a penalty. About 15 seconds on Avalanche. * This value INCLUDES the `_auctionDuration`. */ pub auction_grace_period: u16, - // The `securityDeposit` decays over the `penaltyBlocks` blocks period. - pub auction_penalty_blocks: u16, + // The `securityDeposit` decays over the `penaltyslots` slots period. + pub auction_penalty_slots: u16, } /// TODO: Whitelist USDC mint key. @@ -46,6 +46,43 @@ pub struct Custodian { impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"custodian"; + + pub fn calculate_dynamic_penalty(&self, amount: u64, slots_elapsed: u64) -> Option<(u64, u64)> { + let config = &self.auction_config; + let grace_period = u64::try_from(config.auction_grace_period).unwrap(); + let auction_penalty_slots = u64::try_from(config.auction_penalty_slots).unwrap(); + let user_penalty_reward_bps = u64::try_from(config.user_penalty_reward_bps).unwrap(); + let fee_precision = u64::try_from(FEE_PRECISION_MAX).unwrap(); + + if slots_elapsed <= grace_period { + return Some((0, 0)); + } + + let penalty_period = slots_elapsed - grace_period; + if penalty_period >= auction_penalty_slots + || config.initial_penalty_bps == FEE_PRECISION_MAX + { + let reward = amount + .checked_mul(user_penalty_reward_bps)? + .checked_div(fee_precision)?; + + return Some((amount.checked_sub(reward)?, reward)); + } else { + let base_penalty = amount + .checked_mul(u64::try_from(config.initial_penalty_bps).unwrap())? + .checked_div(fee_precision)?; + let penalty = base_penalty.checked_add( + (amount.checked_sub(base_penalty)?) + .checked_mul(penalty_period)? + .checked_div(auction_penalty_slots)?, + )?; + let reward = amount + .checked_mul(user_penalty_reward_bps)? + .checked_div(fee_precision)?; + + return Some((penalty - reward, reward)); + } + } } impl common::admin::Ownable for Custodian { diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs index 3d94b496..24795b6c 100644 --- a/solana/programs/token-router/src/processor/mod.rs +++ b/solana/programs/token-router/src/processor/mod.rs @@ -5,4 +5,4 @@ mod place_market_order; pub use place_market_order::*; mod redeem_fill; -pub use redeem_fill::*; \ No newline at end of file +pub use redeem_fill::*; diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 73a56c26..facc14b3 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -248,6 +248,37 @@ export class MatchingEngineProgram { }) .instruction(); } + + async executeFastOrderIx( + toChain: ChainId, + vaaHash: Buffer, + accounts: { + payer: PublicKey; + vaa: PublicKey; + bestOfferToken: PublicKey; + initialOfferToken: PublicKey; + } + ) { + const { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + const { mint } = await splToken.getAccount( + this.program.provider.connection, + bestOfferToken + ); + return this.program.methods + .executeFastOrder() + .accounts({ + payer, + custodian: this.custodianAddress(), + auctionData: this.auctionDataAddress(vaaHash), + toRouterEndpoint: this.routerEndpointAddress(toChain), + executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), + bestOfferToken, + initialOfferToken, + custodyToken: this.custodyTokenAccountAddress(), + vaa, + }) + .instruction(); + } } export function testnet(): ProgramId { diff --git a/solana/ts/src/matchingEngine/state/Custodian.ts b/solana/ts/src/matchingEngine/state/Custodian.ts index 4356430a..3d0937b4 100644 --- a/solana/ts/src/matchingEngine/state/Custodian.ts +++ b/solana/ts/src/matchingEngine/state/Custodian.ts @@ -5,7 +5,7 @@ export interface AuctionConfig { initialPenaltyBps: number; auctionDuration: number; auctionGracePeriod: number; - auctionPenaltyBlocks: number; + auctionPenaltySlots: number; } export class Custodian { diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 6acd350c..8620af6b 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -20,8 +20,10 @@ import { import { FastMarketOrder, getBestOfferTokenAccount, + getInitialAuctioneerTokenAccount, getTokenBalance, postFastTransferVaa, + skip_slots, } from "./helpers/matching_engine_utils"; chaiUse(chaiAsPromised); @@ -54,9 +56,9 @@ describe("Matching Engine", function () { const auctionConfig: AuctionConfig = { userPenaltyRewardBps: 250000, initialPenaltyBps: 250000, - auctionDuration: 10, - auctionGracePeriod: 30, - auctionPenaltyBlocks: 60, + auctionDuration: 2, + auctionGracePeriod: 4, + auctionPenaltySlots: 10, }; const createInitializeIx = (opts?: { @@ -718,7 +720,7 @@ describe("Matching Engine", function () { await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const signedVaa = await placeInitialOfferForTest( + const [, signedVaa] = await placeInitialOfferForTest( connection, auctioneerOne, wormholeSequence++, @@ -770,7 +772,7 @@ describe("Matching Engine", function () { describe("Improve Offer", function () { it("Improve Offer With New Auctioneer", async function () { - const signedVaa = await placeInitialOfferForTest( + const [, signedVaa] = await placeInitialOfferForTest( connection, auctioneerOne, wormholeSequence++, @@ -862,6 +864,108 @@ describe("Matching Engine", function () { expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); }); }); + + describe("Execute Fast Order Within Grace Period", function () { + it("Execute Fast Order", async function () { + // Start the auction with auctioneer two so that we can + // check that the initial auctioneer is refunded. + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + auctioneerTwo, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = keccak256(parseVaa(signedVaa).hash); + let bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialAuctioneerTokenAccount(engine, vaaHash); + const newOffer = baseFastOrder.maxFee - 100n; + + // Improve the bid with auctioneer one. + await expectIxOk( + connection, + [ + await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { + payer: auctioneerOne.publicKey, + bestOfferToken, + }), + ], + [auctioneerOne] + ); + + // Fetch the balances before. + const highestOfferBefore = await getTokenBalance( + connection, + auctioneerOne.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const initialBefore = await getTokenBalance(connection, auctioneerTwo.publicKey); + const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + // Fast forward into the grace period. + await skip_slots(connection, 2); + + await expectIxOk( + connection, + [ + await engine.executeFastOrderIx(arbChain, vaaHash, { + payer: auctioneerOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [auctioneerOne] + ); + + // Validate balance changes. + const highestOfferAfter = await getTokenBalance( + connection, + auctioneerOne.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const initialAfter = await getTokenBalance(connection, auctioneerTwo.publicKey); + const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + + expect(initialAfter - initialBefore).equals(baseFastOrder.initAuctionFee); + expect(highestOfferAfter - highestOfferBefore).equals( + baseFastOrder.maxFee + newOffer + ); + expect(custodyBefore - custodyAfter).equals( + baseFastOrder.initAuctionFee + baseFastOrder.maxFee + newOffer + ); + + // Validate auction data account. + expect(auctionDataAfter.bump).to.equal(250); + expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionDataAfter.status).to.eql({ completed: {} }); + expect(auctionDataAfter.bestOffer).to.eql(bestOfferToken); + expect(auctionDataAfter.initialAuctioneer).to.eql(initialOfferToken); + expect(auctionDataAfter.startSlot.toString()).to.eql( + auctionDataBefore.startSlot.toString() + ); + expect(auctionDataAfter.amount.toString()).to.eql( + auctionDataBefore.amount.toString() + ); + expect(auctionDataAfter.securityDeposit.toString()).to.eql( + auctionDataBefore.securityDeposit.toString() + ); + expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + }); + }); }); }); @@ -877,7 +981,7 @@ async function placeInitialOfferForTest( fromChain: ChainId; toChain: ChainId; } -): Promise { +): Promise<[PublicKey, Buffer]> { const [vaaKey, signedVaa] = await postFastTransferVaa( connection, auctioneer, @@ -906,5 +1010,5 @@ async function placeInitialOfferForTest( [auctioneer] ); - return signedVaa; + return [vaaKey, signedVaa]; } diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index 7a1f572b..fbc05eab 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -158,3 +158,19 @@ export async function getBestOfferTokenAccount( ): Promise { return (await engine.fetchAuctionData(vaaHash)).bestOffer; } + +export async function getInitialAuctioneerTokenAccount( + engine: MatchingEngineProgram, + vaaHash: Buffer +): Promise { + return (await engine.fetchAuctionData(vaaHash)).initialAuctioneer; +} + +const sleep = (ms = 0) => new Promise((resolve) => setTimeout(resolve, ms)); + +export async function skip_slots(connection: Connection, slots: number) { + const start = await connection.getSlot(); + while ((await connection.getSlot()) < start + slots) { + await sleep(500); + } +} From 44de0292dba9cef5000f9d4358cebebc8177f4d4 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 16 Jan 2024 10:24:59 -0600 Subject: [PATCH 046/126] solana: matching engine checkpoint --- .../processor/auction/execute_fast_order.rs | 92 ++++++++++++++++++- solana/ts/src/matchingEngine/index.ts | 92 ++++++++++++++++++- .../src/matchingEngine/state/PayerSequence.ts | 17 ++++ solana/ts/src/matchingEngine/state/index.ts | 1 + 4 files changed, 197 insertions(+), 5 deletions(-) create mode 100644 solana/ts/src/matchingEngine/state/PayerSequence.ts diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs index 475f556a..fa2f9b85 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs @@ -1,12 +1,15 @@ use anchor_lang::prelude::*; use anchor_spl::token; use common::messages::raw::LiquidityLayerPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program; use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, +}; use crate::{ error::MatchingEngineError, - state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}, + state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, }; #[derive(Accounts)] @@ -14,7 +17,8 @@ pub struct ExecuteFastOrder<'info> { #[account(mut)] payer: Signer<'info>, - /// This program's Wormhole (Core Bridge) emitter authority. + /// This program's Wormhole (Core Bridge) emitter authority. This is also the burn-source + /// authority for CCTP transfers. /// /// CHECK: Seeds must be \["emitter"\]. #[account( @@ -63,6 +67,7 @@ pub struct ExecuteFastOrder<'info> { )] initial_offer_token: Account<'info, token::TokenAccount>, + /// Also the burn_source token account. #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], @@ -74,8 +79,89 @@ pub struct ExecuteFastOrder<'info> { #[account(owner = core_bridge_program::id())] vaa: AccountInfo<'info>, + /// Circle-supported mint. + /// + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account( + mut, + address = common::constants::usdc::id(), + )] + mint: AccountInfo<'info>, + + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_sender_authority: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + #[account(mut)] + message_transmitter_config: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Local token account, which this program uses to validate the `mint` used to burn. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, system_program: Program<'info, System>, token_program: Program<'info, token::Token>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, } pub fn execute_fast_order(ctx: Context) -> Result<()> { diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index facc14b3..eb85332a 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -5,9 +5,10 @@ import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; -import { AuctionConfig, Custodian, RouterEndpoint } from "./state"; +import { AuctionConfig, Custodian, RouterEndpoint, PayerSequence } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { AuctionData } from "./state/AuctionData"; +import { TokenMessengerMinterProgram } from "../cctp"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -18,6 +19,13 @@ export type AddRouterEndpointArgs = { address: Array; }; +export type PublishMessageAccounts = { + coreBridgeConfig: PublicKey; + coreEmitterSequence: PublicKey; + coreFeeCollector: PublicKey; + coreBridgeProgram: PublicKey; +}; + export class MatchingEngineProgram { private _programId: ProgramId; @@ -69,6 +77,10 @@ export class MatchingEngineProgram { return this.program.account.auctionData.fetch(this.auctionDataAddress(vaaHash)); } + payerSequenceAddress(payer: PublicKey): PublicKey { + return PayerSequence.address(this.ID, payer); + } + async initializeIx( auctionConfig: AuctionConfig, accounts: { @@ -249,9 +261,30 @@ export class MatchingEngineProgram { .instruction(); } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { + switch (this._programId) { + case testnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + case mainnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + async executeFastOrderIx( toChain: ChainId, vaaHash: Buffer, + remoteDomain: number, accounts: { payer: PublicKey; vaa: PublicKey; @@ -264,11 +297,28 @@ export class MatchingEngineProgram { this.program.provider.connection, bestOfferToken ); + const { + senderAuthority: tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + messageTransmitterProgram, + tokenMessengerMinterProgram, + tokenProgram, + } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); + + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + const payerSequence = this.payerSequenceAddress(payer); + return this.program.methods .executeFastOrder() .accounts({ payer, - custodian: this.custodianAddress(), + custodian, auctionData: this.auctionDataAddress(vaaHash), toRouterEndpoint: this.routerEndpointAddress(toChain), executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), @@ -279,8 +329,46 @@ export class MatchingEngineProgram { }) .instruction(); } + + publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { + const coreBridgeProgram = this.coreBridgeProgramId(); + + return { + coreBridgeConfig: PublicKey.findProgramAddressSync( + [Buffer.from("Bridge")], + coreBridgeProgram + )[0], + coreEmitterSequence: PublicKey.findProgramAddressSync( + [Buffer.from("Sequence"), emitter.toBuffer()], + coreBridgeProgram + )[0], + coreFeeCollector: PublicKey.findProgramAddressSync( + [Buffer.from("fee_collector")], + coreBridgeProgram + )[0], + coreBridgeProgram, + }; + } + + coreBridgeProgramId(): PublicKey { + switch (this._programId) { + case testnet(): { + return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); + } + case mainnet(): { + return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); + } + default: { + throw new Error("unsupported network"); + } + } + } } export function testnet(): ProgramId { return "MatchingEngine11111111111111111111111111111"; } + +export function mainnet(): ProgramId { + return "MatchingEngine11111111111111111111111111111"; +} diff --git a/solana/ts/src/matchingEngine/state/PayerSequence.ts b/solana/ts/src/matchingEngine/state/PayerSequence.ts new file mode 100644 index 00000000..a171f659 --- /dev/null +++ b/solana/ts/src/matchingEngine/state/PayerSequence.ts @@ -0,0 +1,17 @@ +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; + +export class PayerSequence { + value: BN; + + constructor(value: BN) { + this.value = value; + } + + static address(programId: PublicKey, payer: PublicKey) { + return PublicKey.findProgramAddressSync( + [Buffer.from("seq"), payer.toBuffer()], + programId + )[0]; + } +} diff --git a/solana/ts/src/matchingEngine/state/index.ts b/solana/ts/src/matchingEngine/state/index.ts index 71b00f2d..0679cbbd 100644 --- a/solana/ts/src/matchingEngine/state/index.ts +++ b/solana/ts/src/matchingEngine/state/index.ts @@ -1,2 +1,3 @@ export * from "./Custodian"; export * from "./RouterEndpoint"; +export * from "./PayerSequence"; From 3741c5b16b5d8249ecdada9981d56171b7c07b20 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 16 Jan 2024 13:30:01 -0600 Subject: [PATCH 047/126] solana: some refactoring --- solana/programs/matching-engine/src/error.rs | 3 ++ .../processor/admin/add_router_endpoint.rs | 4 +- .../src/processor/admin/initialize.rs | 12 +++-- .../ownership_transfer_request/confirm.rs | 8 ++- .../processor/admin/update/fee_recipient.rs | 8 ++- .../processor/admin/update/owner_assistant.rs | 4 +- .../processor/auction/execute_fast_order.rs | 54 ++++++++++--------- .../src/processor/auction/improve_offer.rs | 28 +++++----- .../processor/auction/place_initial_offer.rs | 49 ++++++++--------- .../matching-engine/src/state/auction_data.rs | 2 +- .../admin/add_router_endpoint/cctp.rs | 25 ++++----- .../src/processor/admin/initialize.rs | 8 ++- .../ownership_transfer_request/confirm.rs | 8 ++- .../src/processor/admin/set_pause.rs | 4 +- .../processor/admin/update/owner_assistant.rs | 4 +- solana/ts/src/matchingEngine/index.ts | 10 ++-- .../src/matchingEngine/state/AuctionData.ts | 6 +-- solana/ts/tests/01__matchingEngine.ts | 14 ++--- .../ts/tests/helpers/matching_engine_utils.ts | 2 +- 19 files changed, 140 insertions(+), 113 deletions(-) diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 488b2b5a..d15fc354 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -1,5 +1,8 @@ #[anchor_lang::prelude::error_code] pub enum MatchingEngineError { + #[msg("Overflow")] + Overflow = 0x2, + #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x100, diff --git a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs index 7986485b..07fc939c 100644 --- a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs @@ -10,7 +10,9 @@ use common::admin::utils::assistant::only_authorized; pub struct AddRouterEndpoint<'info> { #[account( mut, - constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ MatchingEngineError::OwnerOrAssistantOnly, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, )] owner_or_assistant: Signer<'info>, diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 1e0934a1..e4f452c8 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -27,14 +27,18 @@ pub struct Initialize<'info> { /// CHECK: This account must not be the zero pubkey. #[account( owner = Pubkey::default(), - constraint = owner_assistant.key() != Pubkey::default() @ MatchingEngineError::AssistantZeroPubkey + constraint = { + owner_assistant.key() != Pubkey::default() + } @ MatchingEngineError::AssistantZeroPubkey )] owner_assistant: AccountInfo<'info>, /// CHECK: This account must not be the zero pubkey. #[account( owner = Pubkey::default(), - constraint = fee_recipient.key() != Pubkey::default() @ MatchingEngineError::FeeRecipientZeroPubkey + constraint = ( + fee_recipient.key() != Pubkey::default() + ) @ MatchingEngineError::FeeRecipientZeroPubkey )] fee_recipient: AccountInfo<'info>, @@ -58,7 +62,9 @@ pub struct Initialize<'info> { seeds = [crate::ID.as_ref()], bump, seeds::program = bpf_loader_upgradeable::id(), - constraint = program_data.upgrade_authority_address.is_some() @ MatchingEngineError::ImmutableProgram + constraint = { + program_data.upgrade_authority_address.is_some() + } @ MatchingEngineError::ImmutableProgram )] program_data: Account<'info, ProgramData>, diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs index 00e534e4..7b30088e 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs @@ -13,8 +13,12 @@ pub struct ConfirmOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = custodian.pending_owner.is_some() @ MatchingEngineError::NoTransferOwnershipRequest, - constraint = pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) @ MatchingEngineError::NotPendingOwner, + constraint = { + custodian.pending_owner.is_some() + } @ MatchingEngineError::NoTransferOwnershipRequest, + constraint = { + pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) + } @ MatchingEngineError::NotPendingOwner, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs index d6a44b18..bd54d75c 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs @@ -6,7 +6,9 @@ use common::admin::utils::assistant::only_authorized; pub struct UpdateFeeRecipient<'info> { #[account( mut, - constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ MatchingEngineError::OwnerOrAssistantOnly, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, )] owner_or_assistant: Signer<'info>, @@ -21,7 +23,9 @@ pub struct UpdateFeeRecipient<'info> { /// /// CHECK: Must not be zero pubkey. #[account( - constraint = new_fee_recipient.key() != Pubkey::default() @ MatchingEngineError::FeeRecipientZeroPubkey, + constraint = { + new_fee_recipient.key() != Pubkey::default() + } @ MatchingEngineError::FeeRecipientZeroPubkey, )] new_fee_recipient: AccountInfo<'info>, } diff --git a/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs index 27b8d690..97016bb8 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs @@ -19,7 +19,9 @@ pub struct UpdateOwnerAssistant<'info> { /// /// CHECK: Must not be zero pubkey. #[account( - constraint = new_owner_assistant.key() != Pubkey::default() @ MatchingEngineError::InvalidNewAssistant, + constraint = { + new_owner_assistant.key() != Pubkey::default() + } @ MatchingEngineError::InvalidNewAssistant, )] new_owner_assistant: AccountInfo<'info>, } diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs index fa2f9b85..22f177f9 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs @@ -1,3 +1,7 @@ +use crate::{ + error::MatchingEngineError, + state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, +}; use anchor_lang::prelude::*; use anchor_spl::token; use common::messages::raw::LiquidityLayerPayload; @@ -7,11 +11,6 @@ use wormhole_cctp_solana::{ wormhole::core_bridge_program, }; -use crate::{ - error::MatchingEngineError, - state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, -}; - #[derive(Accounts)] pub struct ExecuteFastOrder<'info> { #[account(mut)] @@ -25,17 +24,27 @@ pub struct ExecuteFastOrder<'info> { seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, )] - custodian: Account<'info, Custodian>, + custodian: Box>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. + #[account( + owner = core_bridge_program::id(), + constraint = VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash // TODO: add error + )] + vaa: AccountInfo<'info>, #[account( mut, seeds = [ AuctionData::SEED_PREFIX, - VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + auction_data.vaa_hash.as_ref() ], - bump + bump = auction_data.bump, + constraint = { + auction_data.status == AuctionStatus::Active + } @ MatchingEngineError::AuctionNotActive )] - auction_data: Account<'info, AuctionData>, + auction_data: Box>, #[account( seeds = [ @@ -53,19 +62,23 @@ pub struct ExecuteFastOrder<'info> { )] executor_token: Account<'info, token::TokenAccount>, + /// CHECK: Mutable. Must equal [best_offer](AuctionData::best_offer). #[account( mut, - token::mint = custody_token.mint, - constraint = best_offer_token.key() == auction_data.best_offer.key() @ MatchingEngineError::InvalidTokenAccount, + constraint = { + best_offer_token.key() == auction_data.best_offer.key() + } @ MatchingEngineError::InvalidTokenAccount, )] - best_offer_token: Account<'info, token::TokenAccount>, + best_offer_token: AccountInfo<'info>, + /// CHECK: Mutable. Must equal [initial_offer](AuctionData::initial_offer). #[account( mut, - token::mint = custody_token.mint, - constraint = initial_offer_token.key() == auction_data.initial_auctioneer.key() @ MatchingEngineError::InvalidTokenAccount, + constraint = { + initial_offer_token.key() == auction_data.initial_offer.key() + } @ MatchingEngineError::InvalidTokenAccount, )] - initial_offer_token: Account<'info, token::TokenAccount>, + initial_offer_token: AccountInfo<'info>, /// Also the burn_source token account. #[account( @@ -73,11 +86,7 @@ pub struct ExecuteFastOrder<'info> { seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump = custodian.custody_token_bump, )] - custody_token: Account<'info, token::TokenAccount>, - - /// CHECK: Must be owned by the Wormhole Core Bridge program. - #[account(owner = core_bridge_program::id())] - vaa: AccountInfo<'info>, + custody_token: Box>, /// Circle-supported mint. /// @@ -165,11 +174,6 @@ pub struct ExecuteFastOrder<'info> { } pub fn execute_fast_order(ctx: Context) -> Result<()> { - require!( - ctx.accounts.auction_data.status == AuctionStatus::Active, - MatchingEngineError::AuctionNotActive - ); - let slots_elapsed = Clock::get()? .slot .checked_sub(ctx.accounts.auction_data.start_slot) diff --git a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs index bda64731..8216e329 100644 --- a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs @@ -7,7 +7,7 @@ use anchor_spl::token; #[derive(Accounts)] pub struct ImproveOffer<'info> { - payer: Signer<'info>, + offer_authority: Signer<'info>, /// This program's Wormhole (Core Bridge) emitter authority. /// @@ -31,14 +31,15 @@ pub struct ImproveOffer<'info> { #[account( mut, associated_token::mint = custody_token.mint, - associated_token::authority = payer + associated_token::authority = offer_authority )] - auctioneer_token: Account<'info, token::TokenAccount>, + offer_token: Account<'info, token::TokenAccount>, #[account( mut, - token::mint = custody_token.mint, - constraint = best_offer_token.key() == auction_data.best_offer.key() @ MatchingEngineError::InvalidTokenAccount, + constraint = { + best_offer_token.key() == auction_data.best_offer.key() + } @ MatchingEngineError::InvalidTokenAccount, )] best_offer_token: Account<'info, token::TokenAccount>, @@ -61,10 +62,9 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { ); // Push this to the stack to enhance readability. - let auction_duration = - u64::try_from(ctx.accounts.custodian.auction_config.auction_duration).unwrap(); + let auction_duration = ctx.accounts.custodian.auction_config.auction_duration; require!( - Clock::get()?.slot.checked_sub(auction_duration).unwrap() < auction_data.start_slot, + Clock::get()?.slot.saturating_sub(auction_duration.into()) < auction_data.start_slot, MatchingEngineError::AuctionPeriodExpired ); @@ -74,26 +74,26 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { MatchingEngineError::OfferPriceNotImproved ); - // Transfer funds from the `best_offer` token account to the `auctioneer_token` token account, + // Transfer funds from the `best_offer` token account to the `offer_token` token account, // but only if the pubkeys are different. - if auction_data.best_offer != *ctx.accounts.auctioneer_token.to_account_info().key { + if auction_data.best_offer != *ctx.accounts.offer_token.to_account_info().key { token::transfer( CpiContext::new( ctx.accounts.token_program.to_account_info(), anchor_spl::token::Transfer { - from: ctx.accounts.auctioneer_token.to_account_info(), + from: ctx.accounts.offer_token.to_account_info(), to: ctx.accounts.best_offer_token.to_account_info(), - authority: ctx.accounts.payer.to_account_info(), + authority: ctx.accounts.offer_authority.to_account_info(), }, ), auction_data .amount .checked_add(auction_data.security_deposit) - .unwrap(), + .ok_or(MatchingEngineError::Overflow)?, )?; // Update the `best_offer` token account and `amount` fields. - auction_data.best_offer = ctx.accounts.auctioneer_token.key(); + auction_data.best_offer = ctx.accounts.offer_token.key(); auction_data.offer_price = fee_offer; } else { // Since the auctioneer is already the best offer, we only need to update the `amount`. diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 15b5695b..f0c46b27 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -6,7 +6,6 @@ use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use crate::{ error::MatchingEngineError, - processor::verify_router_path, state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}, }; @@ -15,6 +14,9 @@ pub struct PlaceInitialOffer<'info> { #[account(mut)] payer: Signer<'info>, + // TODO: add initial_offer authority. Do not require to be owner? + // initial_offer_authority: Signer<'info>, + // /// This program's Wormhole (Core Bridge) emitter authority. /// /// CHECK: Seeds must be \["emitter"\]. @@ -24,6 +26,10 @@ pub struct PlaceInitialOffer<'info> { )] custodian: Account<'info, Custodian>, + /// CHECK: Must be owned by the Wormhole Core Bridge program. + #[account(owner = core_bridge_program::id())] + vaa: AccountInfo<'info>, + #[account( init, payer = payer, @@ -59,7 +65,7 @@ pub struct PlaceInitialOffer<'info> { associated_token::mint = custody_token.mint, associated_token::authority = payer )] - auctioneer_token: Account<'info, token::TokenAccount>, + offer_token: Account<'info, token::TokenAccount>, #[account( mut, @@ -68,21 +74,11 @@ pub struct PlaceInitialOffer<'info> { )] custody_token: Account<'info, token::TokenAccount>, - /// CHECK: Must be owned by the Wormhole Core Bridge program. - #[account(owner = core_bridge_program::id())] - vaa: AccountInfo<'info>, - system_program: Program<'info, System>, token_program: Program<'info, token::Token>, } pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> Result<()> { - // Make sure the auction hasn't been started for this VAA. - require!( - ctx.accounts.auction_data.status == AuctionStatus::NotStarted, - MatchingEngineError::AuctionAlreadyStarted, - ); - // Create zero copy reference to `FastMarketOrder` payload. let vaa = VaaAccount::load(&ctx.accounts.vaa)?; let msg = LiquidityLayerPayload::try_from(vaa.try_payload()?) @@ -92,19 +88,21 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R .fast_market_order() .ok_or(MatchingEngineError::NotFastMarketOrder)?; - // Check to see if the deadline has expired. - let deadline = fast_order.deadline(); - let current_time = u32::try_from(Clock::get()?.unix_timestamp).ok().unwrap(); - let max_fee = u64::try_from(fast_order.max_fee()).unwrap(); + // We need to fetch clock values for a couple of operations in this instruction. + let clock = Clock::get()?; + // Check to see if the deadline has expired. + let deadline = i64::from(fast_order.deadline()); require!( - current_time < deadline || deadline == 0, + deadline == 0 || clock.unix_timestamp < deadline, MatchingEngineError::FastMarketOrderExpired, ); + + let max_fee = u64::try_from(fast_order.max_fee()).unwrap(); require!(fee_offer <= max_fee, MatchingEngineError::OfferPriceTooHigh); // Verify that the to and from router endpoints are valid. - verify_router_path( + crate::processor::verify_router_path( &ctx.accounts.from_router_endpoint, &ctx.accounts.to_router_endpoint, &vaa.try_emitter_info().unwrap(), @@ -119,25 +117,22 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R CpiContext::new( ctx.accounts.token_program.to_account_info(), anchor_spl::token::Transfer { - from: ctx.accounts.auctioneer_token.to_account_info(), + from: ctx.accounts.offer_token.to_account_info(), to: ctx.accounts.custody_token.to_account_info(), authority: ctx.accounts.payer.to_account_info(), }, ), - u64::try_from(amount) - .unwrap() - .checked_add(u64::try_from(fee_offer).unwrap()) - .unwrap(), + amount + fee_offer, )?; // Set up the AuctionData account for this auction. ctx.accounts.auction_data.set_inner(AuctionData { bump: ctx.bumps["auction_data"], - vaa_hash: vaa.try_digest()?.as_ref().try_into().unwrap(), + vaa_hash: vaa.try_digest().unwrap().0, status: AuctionStatus::Active, - best_offer: ctx.accounts.auctioneer_token.key(), - initial_auctioneer: ctx.accounts.auctioneer_token.key(), - start_slot: Clock::get()?.slot, + best_offer: ctx.accounts.offer_token.key(), + initial_offer: ctx.accounts.offer_token.key(), + start_slot: clock.slot, amount, security_deposit: max_fee, offer_price: fee_offer, diff --git a/solana/programs/matching-engine/src/state/auction_data.rs b/solana/programs/matching-engine/src/state/auction_data.rs index 5260a0e8..2a785527 100644 --- a/solana/programs/matching-engine/src/state/auction_data.rs +++ b/solana/programs/matching-engine/src/state/auction_data.rs @@ -23,7 +23,7 @@ pub struct AuctionData { pub best_offer: Pubkey, /// The initial bidder of the auction. - pub initial_auctioneer: Pubkey, + pub initial_offer: Pubkey, /// The slot at which the auction started. pub start_slot: u64, diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs index b01f7808..110bc7df 100644 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs +++ b/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs @@ -18,7 +18,9 @@ pub struct AddCctpRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ TokenRouterError::OwnerOrAssistantOnly, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ TokenRouterError::OwnerOrAssistantOnly, )] custodian: Account<'info, Custodian>, @@ -56,7 +58,6 @@ pub struct AddCctpRouterEndpointArgs { pub address: [u8; 32], } -#[access_control(check_constraints(&args))] pub fn add_cctp_router_endpoint( ctx: Context, args: AddCctpRouterEndpointArgs, @@ -67,6 +68,13 @@ pub fn add_cctp_router_endpoint( cctp_domain: domain, } = args; + require!( + chain != 0 && chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + TokenRouterError::ChainNotAllowed + ); + + require!(address != [0; 32], TokenRouterError::InvalidEndpoint); + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { bump: ctx.bumps["router_endpoint"], chain, @@ -77,16 +85,3 @@ pub fn add_cctp_router_endpoint( // Done. Ok(()) } - -fn check_constraints(args: &AddCctpRouterEndpointArgs) -> Result<()> { - require!( - args.chain != 0 - && args.chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, - TokenRouterError::ChainNotAllowed - ); - - require!(args.address != [0; 32], TokenRouterError::InvalidEndpoint); - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index cfe93681..5ad56e1d 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -25,7 +25,9 @@ pub struct Initialize<'info> { /// CHECK: This account must not be the zero pubkey. #[account( owner = Pubkey::default(), - constraint = owner_assistant.key() != Pubkey::default() @ TokenRouterError::AssistantZeroPubkey + constraint = { + owner_assistant.key() != Pubkey::default() + } @ TokenRouterError::AssistantZeroPubkey )] owner_assistant: AccountInfo<'info>, @@ -49,7 +51,9 @@ pub struct Initialize<'info> { seeds = [crate::ID.as_ref()], bump, seeds::program = bpf_loader_upgradeable::id(), - constraint = program_data.upgrade_authority_address.is_some() @ TokenRouterError::ImmutableProgram + constraint = { + program_data.upgrade_authority_address.is_some() + } @ TokenRouterError::ImmutableProgram )] program_data: Account<'info, ProgramData>, diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs index d8247b33..a0dd062d 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -13,8 +13,12 @@ pub struct ConfirmOwnershipTransferRequest<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = custodian.pending_owner.is_some() @ TokenRouterError::NoTransferOwnershipRequest, - constraint = pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) @ TokenRouterError::NotPendingOwner, + constraint = { + custodian.pending_owner.is_some() + } @ TokenRouterError::NoTransferOwnershipRequest, + constraint = { + pending_owner::only_pending_owner_unchecked(&custodian, &pending_owner.key()) + } @ TokenRouterError::NotPendingOwner, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs index 331a3fd9..e27827b7 100644 --- a/solana/programs/token-router/src/processor/admin/set_pause.rs +++ b/solana/programs/token-router/src/processor/admin/set_pause.rs @@ -10,7 +10,9 @@ pub struct SetPause<'info> { mut, seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, - constraint = only_authorized(&custodian, &owner_or_assistant.key()) @ TokenRouterError::OwnerOrAssistantOnly, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ TokenRouterError::OwnerOrAssistantOnly, )] /// Sender Config account. This program requires that the `owner` specified /// in the context equals the pubkey specified in this account. Mutable. diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs index 94b50b82..f84e68da 100644 --- a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -19,7 +19,9 @@ pub struct UpdateOwnerAssistant<'info> { /// /// CHECK: Must not be zero pubkey. #[account( - constraint = new_owner_assistant.key() != Pubkey::default() @ TokenRouterError::InvalidNewAssistant, + constraint = { + new_owner_assistant.key() != Pubkey::default() + } @ TokenRouterError::InvalidNewAssistant, )] new_owner_assistant: AccountInfo<'info>, } diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index eb85332a..95449148 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -231,7 +231,7 @@ export class MatchingEngineProgram { auctionData: this.auctionDataAddress(vaaHash), fromRouterEndpoint: this.routerEndpointAddress(fromChain), toRouterEndpoint: this.routerEndpointAddress(toChain), - auctioneerToken: splToken.getAssociatedTokenAddressSync(mint, payer), + offerToken: splToken.getAssociatedTokenAddressSync(mint, payer), custodyToken: this.custodyTokenAccountAddress(), vaa, }) @@ -241,9 +241,9 @@ export class MatchingEngineProgram { async improveOfferIx( feeOffer: bigint, vaaHash: Buffer, - accounts: { payer: PublicKey; bestOfferToken: PublicKey } + accounts: { offerAuthority: PublicKey; bestOfferToken: PublicKey } ) { - const { payer, bestOfferToken } = accounts; + const { offerAuthority, bestOfferToken } = accounts; const { mint } = await splToken.getAccount( this.program.provider.connection, bestOfferToken @@ -251,10 +251,10 @@ export class MatchingEngineProgram { return this.program.methods .improveOffer(new BN(feeOffer.toString())) .accounts({ - payer, + offerAuthority, custodian: this.custodianAddress(), auctionData: this.auctionDataAddress(vaaHash), - auctioneerToken: splToken.getAssociatedTokenAddressSync(mint, payer), + offerToken: splToken.getAssociatedTokenAddressSync(mint, offerAuthority), bestOfferToken, custodyToken: this.custodyTokenAccountAddress(), }) diff --git a/solana/ts/src/matchingEngine/state/AuctionData.ts b/solana/ts/src/matchingEngine/state/AuctionData.ts index 041bc16f..ccb24113 100644 --- a/solana/ts/src/matchingEngine/state/AuctionData.ts +++ b/solana/ts/src/matchingEngine/state/AuctionData.ts @@ -6,7 +6,7 @@ export class AuctionData { vaaHash: number[]; status: Object; bestOffer: PublicKey; - initialAuctioneer: PublicKey; + initialOffer: PublicKey; startSlot: BN; amount: BN; securityDeposit: BN; @@ -17,7 +17,7 @@ export class AuctionData { vaaHash: number[], status: Object, bestOffer: PublicKey, - initialAuctioneer: PublicKey, + initialOffer: PublicKey, start_slot: BN, amount: BN, security_deposit: BN, @@ -27,7 +27,7 @@ export class AuctionData { this.vaaHash = vaaHash; this.status = status; this.bestOffer = bestOffer; - this.initialAuctioneer = initialAuctioneer; + this.initialOffer = initialOffer; this.startSlot = start_slot; this.amount = amount; this.securityDeposit = security_deposit; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 8620af6b..70f8fd84 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -751,7 +751,7 @@ describe("Matching Engine", function () { const vaaHash = keccak256(parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); - const auctioneerToken = await splToken.getAssociatedTokenAddressSync( + const offerToken = await splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, auctioneerOne.publicKey ); @@ -759,8 +759,8 @@ describe("Matching Engine", function () { expect(auctionData.bump).to.equal(254); expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionData.status).to.eql({ active: {} }); - expect(auctionData.bestOffer).to.eql(auctioneerToken); - expect(auctionData.initialAuctioneer).to.eql(auctioneerToken); + expect(auctionData.bestOffer).to.eql(offerToken); + expect(auctionData.initialOffer).to.eql(offerToken); expect(auctionData.startSlot.toString()).to.eql(slot.toString()); expect(auctionData.amount.toString()).to.eql(baseFastOrder.amountIn.toString()); expect(auctionData.securityDeposit.toString()).to.eql( @@ -808,7 +808,7 @@ describe("Matching Engine", function () { connection, [ await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { - payer: auctioneerTwo.publicKey, + offerAuthority: auctioneerTwo.publicKey, bestOfferToken, }), ], @@ -851,7 +851,7 @@ describe("Matching Engine", function () { expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ active: {} }); expect(auctionDataAfter.bestOffer).to.eql(newAuctioneerToken); - expect(auctionDataAfter.initialAuctioneer).to.eql(initialAuctioneerToken); + expect(auctionDataAfter.initialOffer).to.eql(initialAuctioneerToken); expect(auctionDataAfter.startSlot.toString()).to.eql( auctionDataBefore.startSlot.toString() ); @@ -894,7 +894,7 @@ describe("Matching Engine", function () { connection, [ await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { - payer: auctioneerOne.publicKey, + offerAuthority: auctioneerOne.publicKey, bestOfferToken, }), ], @@ -953,7 +953,7 @@ describe("Matching Engine", function () { expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ completed: {} }); expect(auctionDataAfter.bestOffer).to.eql(bestOfferToken); - expect(auctionDataAfter.initialAuctioneer).to.eql(initialOfferToken); + expect(auctionDataAfter.initialOffer).to.eql(initialOfferToken); expect(auctionDataAfter.startSlot.toString()).to.eql( auctionDataBefore.startSlot.toString() ); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index fbc05eab..9a8d7eb1 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -163,7 +163,7 @@ export async function getInitialAuctioneerTokenAccount( engine: MatchingEngineProgram, vaaHash: Buffer ): Promise { - return (await engine.fetchAuctionData(vaaHash)).initialAuctioneer; + return (await engine.fetchAuctionData(vaaHash)).initialOffer; } const sleep = (ms = 0) => new Promise((resolve) => setTimeout(resolve, ms)); From c7e31904de2ccddba60e1db00de020df1dec4459 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 16 Jan 2024 13:41:29 -0600 Subject: [PATCH 048/126] solana: add cctp accounts to execute_fast_order --- solana/ts/src/matchingEngine/index.ts | 42 +++++++++++++++++++++++---- solana/ts/tests/01__matchingEngine.ts | 2 +- 2 files changed, 37 insertions(+), 7 deletions(-) diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 95449148..705170db 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -9,6 +9,7 @@ import { AuctionConfig, Custodian, RouterEndpoint, PayerSequence } from "./state import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { AuctionData } from "./state/AuctionData"; import { TokenMessengerMinterProgram } from "../cctp"; +import { USDC_MINT_ADDRESS } from "../../tests/helpers"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -54,11 +55,8 @@ export class MatchingEngineProgram { return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; } - async fetchPayerSequence(addr: PublicKey): Promise { - return this.program.account.payerSequence - .fetch(addr) - .then((acct) => acct.value) - .catch((_) => new BN(0)); + async fetchPayerSequence(addr: PublicKey): Promise { + return this.program.account.payerSequence.fetch(addr); } routerEndpointAddress(chain: ChainId): PublicKey { @@ -81,6 +79,19 @@ export class MatchingEngineProgram { return PayerSequence.address(this.ID, payer); } + async fetchPayerSequenceValue(addr: PublicKey): Promise { + return this.fetchPayerSequence(addr) + .then((acct) => acct.value) + .catch((_) => new BN(0)); + } + + coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], + this.ID + )[0]; + } + async initializeIx( auctionConfig: AuctionConfig, accounts: { @@ -283,8 +294,8 @@ export class MatchingEngineProgram { async executeFastOrderIx( toChain: ChainId, - vaaHash: Buffer, remoteDomain: number, + vaaHash: Buffer, accounts: { payer: PublicKey; vaa: PublicKey; @@ -313,6 +324,9 @@ export class MatchingEngineProgram { const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = this.publishMessageAccounts(custodian); const payerSequence = this.payerSequenceAddress(payer); + const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => + this.coreMessageAddress(payer, value) + ); return this.program.methods .executeFastOrder() @@ -326,6 +340,22 @@ export class MatchingEngineProgram { initialOfferToken, custodyToken: this.custodyTokenAccountAddress(), vaa, + mint: USDC_MINT_ADDRESS, + payerSequence, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, }) .instruction(); } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 70f8fd84..faec600c 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -919,7 +919,7 @@ describe("Matching Engine", function () { await expectIxOk( connection, [ - await engine.executeFastOrderIx(arbChain, vaaHash, { + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { payer: auctioneerOne.publicKey, vaa: vaaKey, bestOfferToken, From 600662e52638e66f0bbcbea4e9ccef1d82e9e14c Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 16 Jan 2024 15:22:21 -0600 Subject: [PATCH 049/126] solana: add arbitrum remote token messenger --- solana/Anchor.toml | 5 +++++ .../arbitrum_remote_token_messenger.json | 14 ++++++++++++++ 2 files changed, 19 insertions(+) create mode 100644 solana/ts/tests/accounts/token_messenger_minter/arbitrum_remote_token_messenger.json diff --git a/solana/Anchor.toml b/solana/Anchor.toml index 2394d4f5..82a2a5a0 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -103,6 +103,11 @@ filename = "ts/tests/accounts/token_messenger_minter/usdc_token_pair.json" address = "Hazwi3jFQtLKc2ughi7HFXPkpDeso7DQaMR9Ks4afh3j" filename = "ts/tests/accounts/token_messenger_minter/ethereum_remote_token_messenger.json" +### Circle Token Messenger Minter PDA -- Arbitrum Remote Token Messenger +[[test.validator.account]] +address = "REzxi9nX3Eqseha5fBiaJhTC6SFJx4qJhP83U4UCrtc" +filename = "ts/tests/accounts/token_messenger_minter/arbitrum_remote_token_messenger.json" + ### Circle Token Messenger Minter PDA -- Base Remote Token Messenger [[test.validator.account]] address = "BWyFzH6LsnmDAaDWbGsriQ9SiiKq1CF6pbH4Ye3kzSBV" diff --git a/solana/ts/tests/accounts/token_messenger_minter/arbitrum_remote_token_messenger.json b/solana/ts/tests/accounts/token_messenger_minter/arbitrum_remote_token_messenger.json new file mode 100644 index 00000000..17efccae --- /dev/null +++ b/solana/ts/tests/accounts/token_messenger_minter/arbitrum_remote_token_messenger.json @@ -0,0 +1,14 @@ +{ + "pubkey": "REzxi9nX3Eqseha5fBiaJhTC6SFJx4qJhP83U4UCrtc", + "account": { + "lamports": 1197120, + "data": [ + "aXOuIl/pivwDAAAAAAAAAAAAAAAAAAAAEtz9P+Lp6sKFn9HthtKrjFovk1I=", + "base64" + ], + "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 44 + } +} \ No newline at end of file From 72990a86be697817b3f3ea4fbb9ffa98ca6e9167 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 16 Jan 2024 17:24:44 -0600 Subject: [PATCH 050/126] solana: add cctp transfer to execute_fast_order --- .../processor/auction/execute_fast_order.rs | 63 +++++++++- .../src/processor/auction/mod.rs | 112 +++++++++++++++++- solana/ts/tests/01__matchingEngine.ts | 2 +- 3 files changed, 168 insertions(+), 9 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs index 22f177f9..8f77f73f 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs @@ -1,10 +1,12 @@ use crate::{ error::MatchingEngineError, + send_cctp, state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, + CctpAccounts, }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::raw::LiquidityLayerPayload; +use common::{messages::raw::LiquidityLayerPayload, wormhole_io::TypePrefixedPayload}; use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, @@ -200,6 +202,9 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { &[ctx.accounts.custodian.bump], ]; + // We need to save the reward for the user so we include it when sending the CCTP transfer. + let mut user_reward: u64 = 0; + if slots_elapsed > u64::try_from(auction_config.auction_grace_period).unwrap() { let (penalty, reward) = ctx .accounts @@ -207,6 +212,9 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { .calculate_dynamic_penalty(auction_data.security_deposit, slots_elapsed) .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; + // Save user reward for CCTP transfer. + user_reward = reward; + // If caller passes in the same token account, only perform one transfer. if ctx.accounts.best_offer_token.key() == ctx.accounts.executor_token.key() { token::transfer( @@ -263,8 +271,6 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { .unwrap(), )?; } - - // TODO: Do the CCTP transfer or create a fast fill here. } else { // Return the security deposit and the fee to the highest bidder. token::transfer( @@ -284,6 +290,54 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { )?; } + // Send the CCTP message to the destination chain. + send_cctp( + CctpAccounts { + payer: &ctx.accounts.payer, + custodian: &ctx.accounts.custodian, + to_router_endpoint: &ctx.accounts.to_router_endpoint, + custody_token: &ctx.accounts.custody_token, + mint: &ctx.accounts.mint, + payer_sequence: &mut ctx.accounts.payer_sequence, + core_bridge_config: &ctx.accounts.core_bridge_config, + core_message: &ctx.accounts.core_message, + core_emitter_sequence: &mut ctx.accounts.core_emitter_sequence, + core_fee_collector: &ctx.accounts.core_fee_collector, + token_messenger_minter_sender_authority: &ctx + .accounts + .token_messenger_minter_sender_authority, + message_transmitter_config: &ctx.accounts.message_transmitter_config, + token_messenger: &ctx.accounts.token_messenger, + remote_token_messenger: &ctx.accounts.remote_token_messenger, + token_minter: &ctx.accounts.token_minter, + local_token: &ctx.accounts.local_token, + core_bridge_program: &ctx.accounts.core_bridge_program, + token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, + message_transmitter_program: &ctx.accounts.message_transmitter_program, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + clock: &ctx.accounts.clock, + rent: &ctx.accounts.rent, + }, + auction_data + .amount + .checked_sub(auction_data.offer_price) + .unwrap() + .checked_sub(u64::try_from(fast_order.init_auction_fee()).unwrap()) + .unwrap() + .checked_add(user_reward) + .unwrap(), + fast_order.destination_cctp_domain(), + common::messages::Fill { + source_chain: vaa.try_emitter_chain()?, + order_sender: fast_order.sender(), + redeemer: fast_order.redeemer(), + redeemer_message: <&[u8]>::from(fast_order.redeemer_message()).to_vec().into(), + } + .to_vec_payload(), + ctx.bumps["core_message"], + )?; + // Pay the auction initiator their fee. token::transfer( CpiContext::new_with_signer( @@ -303,6 +357,3 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { Ok(()) } - -// TODO: need to validate that the caller passed in the correct token accounts -// and not just their own to steal funds. Look at ALL instructions. diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index aa3bd6e2..27cc823d 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -8,10 +8,17 @@ mod execute_fast_order; pub use execute_fast_order::*; use anchor_lang::prelude::*; +use anchor_spl::token; -use crate::{error::MatchingEngineError, state::RouterEndpoint}; - +use crate::{ + error::MatchingEngineError, + state::{Custodian, PayerSequence, RouterEndpoint}, +}; use wormhole_cctp_solana::wormhole::core_bridge_program::sdk::EmitterInfo; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, +}; pub fn verify_router_path( from_router_endpoint: &RouterEndpoint, @@ -31,3 +38,104 @@ pub fn verify_router_path( Ok(()) } + +pub struct CctpAccounts<'ctx, 'info> { + payer: &'ctx Signer<'info>, + custodian: &'ctx Account<'info, Custodian>, + to_router_endpoint: &'ctx Account<'info, RouterEndpoint>, + custody_token: &'ctx Account<'info, token::TokenAccount>, + mint: &'ctx AccountInfo<'info>, + payer_sequence: &'ctx mut Account<'info, PayerSequence>, + core_bridge_config: &'ctx UncheckedAccount<'info>, + core_message: &'ctx AccountInfo<'info>, + core_emitter_sequence: &'ctx UncheckedAccount<'info>, + core_fee_collector: &'ctx UncheckedAccount<'info>, + token_messenger_minter_sender_authority: &'ctx UncheckedAccount<'info>, + message_transmitter_config: &'ctx UncheckedAccount<'info>, + token_messenger: &'ctx UncheckedAccount<'info>, + remote_token_messenger: &'ctx UncheckedAccount<'info>, + token_minter: &'ctx UncheckedAccount<'info>, + local_token: &'ctx UncheckedAccount<'info>, + core_bridge_program: &'ctx Program<'info, core_bridge_program::CoreBridge>, + token_messenger_minter_program: + &'ctx Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: + &'ctx Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: &'ctx Program<'info, token::Token>, + system_program: &'ctx Program<'info, System>, + clock: &'ctx AccountInfo<'info>, + rent: &'ctx AccountInfo<'info>, +} + +pub fn send_cctp( + accounts: CctpAccounts, + amount: u64, + destination_cctp_domain: u32, + payload: Vec, + core_message_bump: u8, +) -> Result<()> { + let authority_seeds = &[Custodian::SEED_PREFIX.as_ref(), &[accounts.custodian.bump]]; + + wormhole_cctp_solana::cpi::burn_and_publish( + CpiContext::new_with_signer( + accounts.token_messenger_minter_program.to_account_info(), + wormhole_cctp_solana::cpi::DepositForBurnWithCaller { + src_token_owner: accounts.custodian.to_account_info(), + token_messenger_minter_sender_authority: accounts + .token_messenger_minter_sender_authority + .to_account_info(), + src_token: accounts.custody_token.to_account_info(), + message_transmitter_config: accounts.message_transmitter_config.to_account_info(), + token_messenger: accounts.token_messenger.to_account_info(), + remote_token_messenger: accounts.remote_token_messenger.to_account_info(), + token_minter: accounts.token_minter.to_account_info(), + local_token: accounts.local_token.to_account_info(), + mint: accounts.mint.to_account_info(), + message_transmitter_program: accounts.message_transmitter_program.to_account_info(), + token_messenger_minter_program: accounts + .token_messenger_minter_program + .to_account_info(), + token_program: accounts.token_program.to_account_info(), + }, + &[authority_seeds], + ), + CpiContext::new_with_signer( + accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: accounts.payer.to_account_info(), + message: accounts.core_message.to_account_info(), + emitter: accounts.custodian.to_account_info(), + config: accounts.core_bridge_config.to_account_info(), + emitter_sequence: accounts.core_emitter_sequence.to_account_info(), + fee_collector: accounts.core_fee_collector.to_account_info(), + system_program: accounts.system_program.to_account_info(), + clock: accounts.clock.to_account_info(), + rent: accounts.rent.to_account_info(), + }, + &[ + authority_seeds, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + accounts.payer.key().as_ref(), + accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[core_message_bump], + ], + ], + ), + wormhole_cctp_solana::cpi::BurnAndPublishArgs { + burn_source: accounts.custody_token.key(), + destination_caller: accounts.to_router_endpoint.address, + destination_cctp_domain: destination_cctp_domain, + amount, + mint_recipient: accounts.to_router_endpoint.address, + wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload, + }, + )?; + + Ok(()) +} diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index faec600c..868f738c 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -945,7 +945,7 @@ describe("Matching Engine", function () { baseFastOrder.maxFee + newOffer ); expect(custodyBefore - custodyAfter).equals( - baseFastOrder.initAuctionFee + baseFastOrder.maxFee + newOffer + baseFastOrder.amountIn + baseFastOrder.maxFee ); // Validate auction data account. From 3b39228a9e47dc45e8b4651c7c9f7e33fb730a0f Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 16 Jan 2024 20:59:40 -0600 Subject: [PATCH 051/126] solana: auctioneer -> offer authority; redeem fast fill happy path --- .../processor/auction/execute_fast_order.rs | 42 ++--- .../src/processor/auction/improve_offer.rs | 34 ++-- .../src/processor/auction/mod.rs | 2 +- .../processor/auction/place_initial_offer.rs | 7 +- .../src/processor/redeem_fast_fill.rs | 11 +- .../matching-engine/src/state/auction_data.rs | 4 +- solana/ts/src/matchingEngine/index.ts | 42 ++++- .../src/matchingEngine/state/AuctionData.ts | 14 +- solana/ts/src/tokenRouter/index.ts | 94 +++++++++- solana/ts/src/wormhole/index.ts | 101 ++++++++--- solana/ts/tests/01__matchingEngine.ts | 128 +++++++------ solana/ts/tests/02__tokenRouter.ts | 7 +- solana/ts/tests/04__interaction.ts | 168 ++++++++++++++++++ solana/ts/tests/helpers/consts.ts | 11 +- .../ts/tests/helpers/matching_engine_utils.ts | 6 +- solana/ts/tests/helpers/mock.ts | 15 +- 16 files changed, 516 insertions(+), 170 deletions(-) create mode 100644 solana/ts/tests/04__interaction.ts diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs index 8f77f73f..b363affe 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs @@ -42,6 +42,8 @@ pub struct ExecuteFastOrder<'info> { auction_data.vaa_hash.as_ref() ], bump = auction_data.bump, + has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, + has_one = initial_offer_token @ MatchingEngineError::InvalidTokenAccount, constraint = { auction_data.status == AuctionStatus::Active } @ MatchingEngineError::AuctionNotActive @@ -59,36 +61,28 @@ pub struct ExecuteFastOrder<'info> { #[account( mut, - associated_token::mint = custody_token.mint, + associated_token::mint = mint, associated_token::authority = payer )] executor_token: Account<'info, token::TokenAccount>, /// CHECK: Mutable. Must equal [best_offer](AuctionData::best_offer). - #[account( - mut, - constraint = { - best_offer_token.key() == auction_data.best_offer.key() - } @ MatchingEngineError::InvalidTokenAccount, - )] + #[account(mut)] best_offer_token: AccountInfo<'info>, /// CHECK: Mutable. Must equal [initial_offer](AuctionData::initial_offer). - #[account( - mut, - constraint = { - initial_offer_token.key() == auction_data.initial_offer.key() - } @ MatchingEngineError::InvalidTokenAccount, - )] + #[account(mut)] initial_offer_token: AccountInfo<'info>, /// Also the burn_source token account. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump = custodian.custody_token_bump, )] - custody_token: Box>, + custody_token: AccountInfo<'info>, /// Circle-supported mint. /// @@ -176,13 +170,10 @@ pub struct ExecuteFastOrder<'info> { } pub fn execute_fast_order(ctx: Context) -> Result<()> { - let slots_elapsed = Clock::get()? - .slot - .checked_sub(ctx.accounts.auction_data.start_slot) - .unwrap(); + let slots_elapsed = Clock::get()?.slot - ctx.accounts.auction_data.start_slot; let auction_config = &ctx.accounts.custodian.auction_config; require!( - slots_elapsed > u64::try_from(auction_config.auction_duration).unwrap(), + slots_elapsed > auction_config.auction_duration.into(), MatchingEngineError::AuctionPeriodNotExpired ); @@ -197,10 +188,7 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { let auction_data = &mut ctx.accounts.auction_data; // Save the custodian seeds to sign transfers with. - let custodian_seeds = &[ - Custodian::SEED_PREFIX.as_ref(), - &[ctx.accounts.custodian.bump], - ]; + let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; // We need to save the reward for the user so we include it when sending the CCTP transfer. let mut user_reward: u64 = 0; @@ -225,7 +213,7 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { to: ctx.accounts.best_offer_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&custodian_seeds[..]], + &[custodian_seeds], ), auction_data .offer_price @@ -245,7 +233,7 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { to: ctx.accounts.executor_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&custodian_seeds[..]], + &[custodian_seeds], ), penalty, )?; @@ -259,7 +247,7 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { to: ctx.accounts.best_offer_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&custodian_seeds[..]], + &[custodian_seeds], ), auction_data .offer_price @@ -281,7 +269,7 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { to: ctx.accounts.best_offer_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&custodian_seeds[..]], + &[custodian_seeds], ), auction_data .offer_price diff --git a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs index 8216e329..3ddac6a7 100644 --- a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/improve_offer.rs @@ -24,7 +24,11 @@ pub struct ImproveOffer<'info> { AuctionData::SEED_PREFIX, auction_data.vaa_hash.as_ref(), ], - bump + bump = auction_data.bump, + has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, + constraint = { + auction_data.status == AuctionStatus::Active + } @ MatchingEngineError::AuctionNotActive )] auction_data: Account<'info, AuctionData>, @@ -35,12 +39,7 @@ pub struct ImproveOffer<'info> { )] offer_token: Account<'info, token::TokenAccount>, - #[account( - mut, - constraint = { - best_offer_token.key() == auction_data.best_offer.key() - } @ MatchingEngineError::InvalidTokenAccount, - )] + #[account(mut)] best_offer_token: Account<'info, token::TokenAccount>, #[account( @@ -56,11 +55,6 @@ pub struct ImproveOffer<'info> { pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { let auction_data = &mut ctx.accounts.auction_data; - require!( - auction_data.status == AuctionStatus::Active, - MatchingEngineError::AuctionNotActive - ); - // Push this to the stack to enhance readability. let auction_duration = ctx.accounts.custodian.auction_config.auction_duration; require!( @@ -76,7 +70,8 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { // Transfer funds from the `best_offer` token account to the `offer_token` token account, // but only if the pubkeys are different. - if auction_data.best_offer != *ctx.accounts.offer_token.to_account_info().key { + let offer_token = ctx.accounts.offer_token.key(); + if auction_data.best_offer_token != offer_token { token::transfer( CpiContext::new( ctx.accounts.token_program.to_account_info(), @@ -86,19 +81,14 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { authority: ctx.accounts.offer_authority.to_account_info(), }, ), - auction_data - .amount - .checked_add(auction_data.security_deposit) - .ok_or(MatchingEngineError::Overflow)?, + auction_data.amount + auction_data.security_deposit, )?; // Update the `best_offer` token account and `amount` fields. - auction_data.best_offer = ctx.accounts.offer_token.key(); - auction_data.offer_price = fee_offer; - } else { - // Since the auctioneer is already the best offer, we only need to update the `amount`. - auction_data.offer_price = fee_offer; + auction_data.best_offer_token = offer_token; } + auction_data.offer_price = fee_offer; + Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 27cc823d..75d3a9e0 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -43,7 +43,7 @@ pub struct CctpAccounts<'ctx, 'info> { payer: &'ctx Signer<'info>, custodian: &'ctx Account<'info, Custodian>, to_router_endpoint: &'ctx Account<'info, RouterEndpoint>, - custody_token: &'ctx Account<'info, token::TokenAccount>, + custody_token: &'ctx AccountInfo<'info>, mint: &'ctx AccountInfo<'info>, payer_sequence: &'ctx mut Account<'info, PayerSequence>, core_bridge_config: &'ctx UncheckedAccount<'info>, diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index f0c46b27..ad054def 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -112,7 +112,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R // Parse the transfer amount from the VAA. let amount = u64::try_from(fast_order.amount_in()).unwrap(); - // Transfer tokens from the auctioneer to the custodian. + // Transfer tokens from the offer authority's token account to the custodian. token::transfer( CpiContext::new( ctx.accounts.token_program.to_account_info(), @@ -126,12 +126,13 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R )?; // Set up the AuctionData account for this auction. + let initial_offer_token = ctx.accounts.offer_token.key(); ctx.accounts.auction_data.set_inner(AuctionData { bump: ctx.bumps["auction_data"], vaa_hash: vaa.try_digest().unwrap().0, status: AuctionStatus::Active, - best_offer: ctx.accounts.offer_token.key(), - initial_offer: ctx.accounts.offer_token.key(), + best_offer_token: initial_offer_token, + initial_offer_token, start_slot: clock.slot, amount, security_deposit: max_fee, diff --git a/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs b/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs index 8d2806c5..c6fd183e 100644 --- a/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs @@ -80,9 +80,14 @@ pub fn redeem_fast_fill(ctx: Context) -> Result<()> { // Emitter must be the matching engine (this program). { let emitter = vaa.try_emitter_info()?; - require!( - emitter.chain == core_bridge_program::SOLANA_CHAIN - && Pubkey::from(emitter.address) == crate::ID, + require_eq!( + emitter.chain, + core_bridge_program::SOLANA_CHAIN, + MatchingEngineError::InvalidEmitterForFastFill + ); + require_keys_eq!( + Pubkey::from(emitter.address), + ctx.accounts.custodian.key(), MatchingEngineError::InvalidEmitterForFastFill ); diff --git a/solana/programs/matching-engine/src/state/auction_data.rs b/solana/programs/matching-engine/src/state/auction_data.rs index 2a785527..ca241495 100644 --- a/solana/programs/matching-engine/src/state/auction_data.rs +++ b/solana/programs/matching-engine/src/state/auction_data.rs @@ -20,10 +20,10 @@ pub struct AuctionData { pub status: AuctionStatus, /// The highest bidder of the auction. - pub best_offer: Pubkey, + pub best_offer_token: Pubkey, /// The initial bidder of the auction. - pub initial_offer: Pubkey, + pub initial_offer_token: Pubkey, /// The slot at which the auction started. pub start_slot: u64, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 705170db..b4f20b59 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -1,6 +1,6 @@ export * from "./state"; -import { ChainId } from "@certusone/wormhole-sdk"; +import * as wormholeSdk from "@certusone/wormhole-sdk"; import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; @@ -10,13 +10,14 @@ import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { AuctionData } from "./state/AuctionData"; import { TokenMessengerMinterProgram } from "../cctp"; import { USDC_MINT_ADDRESS } from "../../tests/helpers"; +import { VaaAccount } from "../wormhole"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; export type ProgramId = (typeof PROGRAM_IDS)[number]; export type AddRouterEndpointArgs = { - chain: ChainId; + chain: wormholeSdk.ChainId; address: Array; }; @@ -27,6 +28,15 @@ export type PublishMessageAccounts = { coreBridgeProgram: PublicKey; }; +export type RedeemFastFillAccounts = { + custodian: PublicKey; + redeemedFastFill: PublicKey; + routerEndpoint: PublicKey; + custodyToken: PublicKey; + matchingEngineProgram: PublicKey; + tokenProgram: PublicKey; +}; + export class MatchingEngineProgram { private _programId: ProgramId; @@ -59,7 +69,7 @@ export class MatchingEngineProgram { return this.program.account.payerSequence.fetch(addr); } - routerEndpointAddress(chain: ChainId): PublicKey { + routerEndpointAddress(chain: wormholeSdk.ChainId): PublicKey { return RouterEndpoint.address(this.ID, chain); } @@ -67,7 +77,7 @@ export class MatchingEngineProgram { return this.program.account.routerEndpoint.fetch(addr); } - auctionDataAddress(vaaHash: Buffer): PublicKey { + auctionDataAddress(vaaHash: Buffer | Uint8Array): PublicKey { return AuctionData.address(this.ID, vaaHash); } @@ -92,6 +102,10 @@ export class MatchingEngineProgram { )[0]; } + redeemedFastFillAddress(vaaHash: Buffer | Uint8Array): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("redeemed"), vaaHash], this.ID)[0]; + } + async initializeIx( auctionConfig: AuctionConfig, accounts: { @@ -228,8 +242,8 @@ export class MatchingEngineProgram { async placeInitialOfferIx( feeOffer: bigint, - fromChain: ChainId, - toChain: ChainId, + fromChain: wormholeSdk.ChainId, + toChain: wormholeSdk.ChainId, vaaHash: Buffer, accounts: { payer: PublicKey; vaa: PublicKey; mint: PublicKey } ) { @@ -293,7 +307,7 @@ export class MatchingEngineProgram { } async executeFastOrderIx( - toChain: ChainId, + toChain: wormholeSdk.ChainId, remoteDomain: number, vaaHash: Buffer, accounts: { @@ -360,6 +374,20 @@ export class MatchingEngineProgram { .instruction(); } + async redeemFastFillAccounts(vaa: PublicKey): Promise { + const custodyToken = this.custodyTokenAccountAddress(); + const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); + + return { + custodian: this.custodianAddress(), + redeemedFastFill: this.redeemedFastFillAddress(vaaAcct.digest()), + routerEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + custodyToken, + matchingEngineProgram: this.ID, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + }; + } + publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { const coreBridgeProgram = this.coreBridgeProgramId(); diff --git a/solana/ts/src/matchingEngine/state/AuctionData.ts b/solana/ts/src/matchingEngine/state/AuctionData.ts index ccb24113..2588fd6b 100644 --- a/solana/ts/src/matchingEngine/state/AuctionData.ts +++ b/solana/ts/src/matchingEngine/state/AuctionData.ts @@ -5,8 +5,8 @@ export class AuctionData { bump: number; vaaHash: number[]; status: Object; - bestOffer: PublicKey; - initialOffer: PublicKey; + bestOfferToken: PublicKey; + initialOfferToken: PublicKey; startSlot: BN; amount: BN; securityDeposit: BN; @@ -16,8 +16,8 @@ export class AuctionData { bump: number, vaaHash: number[], status: Object, - bestOffer: PublicKey, - initialOffer: PublicKey, + bestOfferToken: PublicKey, + initialOfferToken: PublicKey, start_slot: BN, amount: BN, security_deposit: BN, @@ -26,15 +26,15 @@ export class AuctionData { this.bump = bump; this.vaaHash = vaaHash; this.status = status; - this.bestOffer = bestOffer; - this.initialOffer = initialOffer; + this.bestOfferToken = bestOfferToken; + this.initialOfferToken = initialOfferToken; this.startSlot = start_slot; this.amount = amount; this.securityDeposit = security_deposit; this.offerPrice = offer_price; } - static address(programId: PublicKey, vaaHash: Buffer) { + static address(programId: PublicKey, vaaHash: Buffer | Uint8Array) { return PublicKey.findProgramAddressSync([Buffer.from("auction"), vaaHash], programId)[0]; } } diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 70e8a11f..e4a5454e 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -19,6 +19,7 @@ import { import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; import { Custodian, MessageProtocol, PayerSequence, RouterEndpoint } from "./state"; +import * as matchingEngineSdk from "../matchingEngine"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; @@ -91,6 +92,17 @@ export type RedeemFillCctpAccounts = { tokenProgram: PublicKey; }; +export type RedeemFastFillAccounts = { + custodian: PublicKey; + custodyToken: PublicKey; + matchingEngineCustodian: PublicKey; + matchingEngineRedeemedFastFill: PublicKey; + matchingEngineRouterEndpoint: PublicKey; + matchingEngineCustodyToken: PublicKey; + matchingEngineProgram: PublicKey; + tokenProgram: PublicKey; +}; + export type AddCctpRouterEndpointArgs = { chain: ChainId; address: Array; @@ -354,9 +366,6 @@ export class TokenRouterProgram { ): Promise { const msg = CctpTokenBurnMessage.from(cctpMessage); const custodyToken = this.custodyTokenAccountAddress(); - //const redeemerToken = new PublicKey(msg.mintRecipient); - - // TODO: hardcode mint as USDC? const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); @@ -456,6 +465,65 @@ export class TokenRouterProgram { .instruction(); } + async redeemFastFillAccounts(vaa: PublicKey): Promise { + const { + custodian: matchingEngineCustodian, + redeemedFastFill: matchingEngineRedeemedFastFill, + routerEndpoint: matchingEngineRouterEndpoint, + custodyToken: matchingEngineCustodyToken, + matchingEngineProgram, + tokenProgram, + } = await this.matchingEngineProgram().redeemFastFillAccounts(vaa); + + return { + custodian: this.custodianAddress(), + custodyToken: this.custodyTokenAccountAddress(), + matchingEngineCustodian, + matchingEngineRedeemedFastFill, + matchingEngineRouterEndpoint, + matchingEngineCustodyToken, + matchingEngineProgram, + tokenProgram, + }; + } + + async redeemFastFillIx(accounts: { + payer: PublicKey; + vaa: PublicKey; + redeemer: PublicKey; + dstToken: PublicKey; + }): Promise { + const { payer, vaa, dstToken, redeemer } = accounts; + const { + custodian, + custodyToken, + matchingEngineCustodian, + matchingEngineRedeemedFastFill, + matchingEngineRouterEndpoint, + matchingEngineCustodyToken, + matchingEngineProgram, + tokenProgram, + } = await this.redeemFastFillAccounts(vaa); + + return this.program.methods + .redeemFastFill() + .accounts({ + payer, + custodian, + vaa, + redeemer, + dstToken, + custodyToken, + matchingEngineCustodian, + matchingEngineRedeemedFastFill, + matchingEngineRouterEndpoint, + matchingEngineCustodyToken, + matchingEngineProgram, + tokenProgram, + }) + .instruction(); + } + async initializeIx(accounts: { owner: PublicKey; ownerAssistant: PublicKey; @@ -628,6 +696,26 @@ export class TokenRouterProgram { } } + matchingEngineProgram(): matchingEngineSdk.MatchingEngineProgram { + switch (this._programId) { + case testnet(): { + return new matchingEngineSdk.MatchingEngineProgram( + this.program.provider.connection, + matchingEngineSdk.testnet() + ); + } + case mainnet(): { + return new matchingEngineSdk.MatchingEngineProgram( + this.program.provider.connection, + matchingEngineSdk.mainnet() + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { const coreBridgeProgram = this.coreBridgeProgramId(); diff --git a/solana/ts/src/wormhole/index.ts b/solana/ts/src/wormhole/index.ts index d087e3aa..555b0f68 100644 --- a/solana/ts/src/wormhole/index.ts +++ b/solana/ts/src/wormhole/index.ts @@ -1,5 +1,6 @@ import { parseVaa } from "@certusone/wormhole-sdk"; import { Connection, PublicKey } from "@solana/web3.js"; +import { ethers } from "ethers"; export type EncodedVaa = { status: number; @@ -31,26 +32,43 @@ export class VaaAccount { private _postedVaaV1?: PostedVaaV1; static async fetch(connection: Connection, addr: PublicKey): Promise { - const data = await connection.getAccountInfo(addr).then((acct) => acct.data); - if (data.subarray(0, 8).equals(Uint8Array.from([226, 101, 163, 4, 133, 160, 84, 245]))) { - const status = data[8]; - const writeAuthority = new PublicKey(data.subarray(9, 41)); - const version = data[41]; - const bufLen = data.readUInt32LE(42); - const buf = data.subarray(46, 46 + bufLen); + const accInfo = await connection.getAccountInfo(addr); + if (accInfo === null) { + throw new Error("no VAA account info found"); + } + const { data } = accInfo; + + let offset = 0; + const disc = data.subarray(offset, (offset += 8)); + if (disc.equals(Uint8Array.from([226, 101, 163, 4, 133, 160, 84, 245]))) { + const status = data[offset]; + offset += 1; + const writeAuthority = new PublicKey(data.subarray(offset, (offset += 32))); + const version = data[offset]; + offset += 1; + const bufLen = data.readUInt32LE(offset); + offset += 4; + const buf = data.subarray(offset, (offset += bufLen)); return new VaaAccount({ encodedVaa: { status, writeAuthority, version, buf } }); - } else if (data.subarray(0, 4).equals(Uint8Array.from([118, 97, 97, 1]))) { - const consistencyLevel = data[4]; - const timestamp = data.readUInt32LE(5); - const signatureSet = new PublicKey(data.subarray(9, 41)); - const guardianSetIndex = data.readUInt32LE(41); - const nonce = data.readUInt32LE(45); - const sequence = data.readBigUInt64LE(49); - const emitterChain = data.readUInt16LE(57); - const emitterAddress = Array.from(data.subarray(59, 91)); - const payloadLen = data.readUInt32LE(91); - const payload = data.subarray(95, 95 + payloadLen); + } else if (disc.subarray(0, (offset -= 4)).equals(Uint8Array.from([118, 97, 97, 1]))) { + const consistencyLevel = data[offset]; + offset += 1; + const timestamp = data.readUInt32LE(offset); + offset += 4; + const signatureSet = new PublicKey(data.subarray(offset, (offset += 32))); + const guardianSetIndex = data.readUInt32LE(offset); + offset += 4; + const nonce = data.readUInt32LE(offset); + offset += 4; + const sequence = data.readBigUInt64LE(offset); + offset += 8; + const emitterChain = data.readUInt16LE(offset); + offset += 2; + const emitterAddress = Array.from(data.subarray(offset, (offset += 32))); + const payloadLen = data.readUInt32LE(offset); + offset += 4; + const payload = data.subarray(offset, (offset += payloadLen)); return new VaaAccount({ postedVaaV1: { @@ -78,21 +96,58 @@ export class VaaAccount { address: Array.from(parsed.emitterAddress), sequence: parsed.sequence, }; - } else { + } else if (this._postedVaaV1 !== undefined) { const { emitterChain: chain, emitterAddress: address, sequence } = this._postedVaaV1; return { chain, address, sequence, }; + } else { + throw new Error("impossible: emitterInfo() failed"); } } payload(): Buffer { if (this._encodedVaa !== undefined) { return parseVaa(this._encodedVaa.buf).payload; - } else { + } else if (this._postedVaaV1 !== undefined) { return this._postedVaaV1.payload; + } else { + throw new Error("impossible: payload() failed"); + } + } + + digest(): Uint8Array { + if (this._encodedVaa !== undefined) { + return ethers.utils.arrayify( + ethers.utils.keccak256(parseVaa(this._encodedVaa.buf).hash) + ); + } else if (this._postedVaaV1 !== undefined) { + const { + consistencyLevel, + timestamp, + nonce, + sequence, + emitterChain, + emitterAddress, + payload, + } = this._postedVaaV1; + + let offset = 0; + const buf = Buffer.alloc(51 + payload.length); + offset = buf.writeUInt32BE(timestamp, offset); + offset = buf.writeUInt32BE(nonce, offset); + offset = buf.writeUInt16BE(emitterChain, offset); + buf.set(emitterAddress, offset); + offset += 32; + offset = buf.writeBigUInt64BE(sequence, offset); + offset = buf.writeUInt8(consistencyLevel, offset); + buf.set(payload, offset); + + return ethers.utils.arrayify(ethers.utils.keccak256(ethers.utils.keccak256(buf))); + } else { + throw new Error("impossible: digest() failed"); } } @@ -127,7 +182,7 @@ export class Claim { address: Array, chain: number, sequence: bigint, - prefix?: Buffer, + prefix?: Buffer ): PublicKey { const chainBuf = Buffer.alloc(2); chainBuf.writeUInt16BE(chain); @@ -138,12 +193,12 @@ export class Claim { if (prefix !== undefined) { return PublicKey.findProgramAddressSync( [prefix, Buffer.from(address), chainBuf, sequenceBuf], - new PublicKey(programId), + new PublicKey(programId) )[0]; } else { return PublicKey.findProgramAddressSync( [Buffer.from(address), chainBuf, sequenceBuf], - new PublicKey(programId), + new PublicKey(programId) )[0]; } } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 868f738c..a23e38a3 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -12,6 +12,7 @@ import { import { LOCALHOST, MOCK_GUARDIANS, + OWNER_ASSISTANT_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, expectIxErr, @@ -20,7 +21,7 @@ import { import { FastMarketOrder, getBestOfferTokenAccount, - getInitialAuctioneerTokenAccount, + getInitialOfferTokenAccount, getTokenBalance, postFastTransferVaa, skip_slots, @@ -34,11 +35,11 @@ describe("Matching Engine", function () { const payer = PAYER_KEYPAIR; const owner = Keypair.generate(); const relayer = Keypair.generate(); - const ownerAssistant = Keypair.generate(); + const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const feeRecipient = Keypair.generate(); const newFeeRecipient = Keypair.generate(); - const auctioneerOne = Keypair.generate(); - const auctioneerTwo = Keypair.generate(); + const offerAuthorityOne = Keypair.generate(); + const offerAuthorityTwo = Keypair.generate(); // Foreign endpoints. const ethChain = CHAINS.ethereum; @@ -661,18 +662,18 @@ describe("Matching Engine", function () { ); }); - before("Transfer Lamports to Auctioneers", async function () { + before("Transfer Lamports to Offer Authorities", async function () { await expectIxOk( connection, [ SystemProgram.transfer({ fromPubkey: payer.publicKey, - toPubkey: auctioneerOne.publicKey, + toPubkey: offerAuthorityOne.publicKey, lamports: 1000000000, }), SystemProgram.transfer({ fromPubkey: payer.publicKey, - toPubkey: auctioneerTwo.publicKey, + toPubkey: offerAuthorityTwo.publicKey, lamports: 1000000000, }), ], @@ -680,8 +681,8 @@ describe("Matching Engine", function () { ); }); - before("Create ATAs For Auctioneers", async function () { - for (const wallet of [auctioneerOne, auctioneerTwo]) { + before("Create ATAs For Offer Authorities", async function () { + for (const wallet of [offerAuthorityOne, offerAuthorityTwo]) { await splToken.getOrCreateAssociatedTokenAccount( connection, wallet, @@ -715,14 +716,17 @@ describe("Matching Engine", function () { describe("Place Initial Offer", function () { it("Place Initial Offer", async function () { // Fetch the balances before. - const auctioneerBefore = await getTokenBalance(connection, auctioneerOne.publicKey); + const offerBalanceBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; const [, signedVaa] = await placeInitialOfferForTest( connection, - auctioneerOne, + offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, @@ -735,13 +739,16 @@ describe("Matching Engine", function () { ); // Validate balance changes. - const auctioneerAfter = await getTokenBalance(connection, auctioneerOne.publicKey); + const offerBalanceAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - expect(auctioneerAfter).equals( - auctioneerBefore - baseFastOrder.maxFee - baseFastOrder.amountIn + expect(offerBalanceAfter).equals( + offerBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn ); expect(custodyAfter).equals( custodyBefore + baseFastOrder.maxFee + baseFastOrder.amountIn @@ -753,14 +760,14 @@ describe("Matching Engine", function () { const slot = await connection.getSlot(); const offerToken = await splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - auctioneerOne.publicKey + offerAuthorityOne.publicKey ); expect(auctionData.bump).to.equal(254); expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionData.status).to.eql({ active: {} }); - expect(auctionData.bestOffer).to.eql(offerToken); - expect(auctionData.initialOffer).to.eql(offerToken); + expect(auctionData.bestOfferToken).to.eql(offerToken); + expect(auctionData.initialOfferToken).to.eql(offerToken); expect(auctionData.startSlot.toString()).to.eql(slot.toString()); expect(auctionData.amount.toString()).to.eql(baseFastOrder.amountIn.toString()); expect(auctionData.securityDeposit.toString()).to.eql( @@ -771,10 +778,10 @@ describe("Matching Engine", function () { }); describe("Improve Offer", function () { - it("Improve Offer With New Auctioneer", async function () { + it("Improve Offer With New Offer Authority", async function () { const [, signedVaa] = await placeInitialOfferForTest( connection, - auctioneerOne, + offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, @@ -786,19 +793,19 @@ describe("Matching Engine", function () { } ); - const initalAuctioneerBefore = await getTokenBalance( + const initialOfferBalanceBefore = await getTokenBalance( connection, - auctioneerOne.publicKey + offerAuthorityOne.publicKey ); - const newAuctioneerBefore = await getTokenBalance( + const newOfferBalanceBefore = await getTokenBalance( connection, - auctioneerTwo.publicKey + offerAuthorityTwo.publicKey ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - // New Offer from auctioneerTwo. + // New Offer from offerAuthorityTwo. const newOffer = baseFastOrder.maxFee - 100n; const vaaHash = keccak256(parseVaa(signedVaa).hash); const auctionDataBefore = await engine.fetchAuctionData(vaaHash); @@ -808,50 +815,50 @@ describe("Matching Engine", function () { connection, [ await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { - offerAuthority: auctioneerTwo.publicKey, + offerAuthority: offerAuthorityTwo.publicKey, bestOfferToken, }), ], - [auctioneerTwo] + [offerAuthorityTwo] ); // Validate balance changes. - const initalAuctioneerAfter = await getTokenBalance( + const initialOfferBalanceAfter = await getTokenBalance( connection, - auctioneerOne.publicKey + offerAuthorityOne.publicKey ); - const newAuctioneerAfter = await getTokenBalance( + const newOfferBalanceAfter = await getTokenBalance( connection, - auctioneerTwo.publicKey + offerAuthorityTwo.publicKey ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - expect(newAuctioneerAfter).equals( - newAuctioneerBefore - baseFastOrder.maxFee - baseFastOrder.amountIn + expect(newOfferBalanceAfter).equals( + newOfferBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn ); - expect(initalAuctioneerAfter).equals( - initalAuctioneerBefore + baseFastOrder.maxFee + baseFastOrder.amountIn + expect(initialOfferBalanceAfter).equals( + initialOfferBalanceBefore + baseFastOrder.maxFee + baseFastOrder.amountIn ); expect(custodyAfter).equals(custodyBefore); // Confirm the auction data. const auctionDataAfter = await engine.fetchAuctionData(vaaHash); - const newAuctioneerToken = await splToken.getAssociatedTokenAddressSync( + const newOfferToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - auctioneerTwo.publicKey + offerAuthorityTwo.publicKey ); - const initialAuctioneerToken = await splToken.getAssociatedTokenAddressSync( + const initialOfferToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - auctioneerOne.publicKey + offerAuthorityOne.publicKey ); expect(auctionDataAfter.bump).to.equal(249); expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ active: {} }); - expect(auctionDataAfter.bestOffer).to.eql(newAuctioneerToken); - expect(auctionDataAfter.initialOffer).to.eql(initialAuctioneerToken); + expect(auctionDataAfter.bestOfferToken).to.eql(newOfferToken); + expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); expect(auctionDataAfter.startSlot.toString()).to.eql( auctionDataBefore.startSlot.toString() ); @@ -867,11 +874,11 @@ describe("Matching Engine", function () { describe("Execute Fast Order Within Grace Period", function () { it("Execute Fast Order", async function () { - // Start the auction with auctioneer two so that we can - // check that the initial auctioneer is refunded. + // Start the auction with offer two so that we can + // check that the initial offer is refunded. const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, - auctioneerTwo, + offerAuthorityTwo, wormholeSequence++, baseFastOrder, ethRouter, @@ -886,30 +893,33 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = keccak256(parseVaa(signedVaa).hash); let bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialAuctioneerTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); const newOffer = baseFastOrder.maxFee - 100n; - // Improve the bid with auctioneer one. + // Improve the bid with offer one. await expectIxOk( connection, [ await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { - offerAuthority: auctioneerOne.publicKey, + offerAuthority: offerAuthorityOne.publicKey, bestOfferToken, }), ], - [auctioneerOne] + [offerAuthorityOne] ); // Fetch the balances before. const highestOfferBefore = await getTokenBalance( connection, - auctioneerOne.publicKey + offerAuthorityOne.publicKey ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const initialBefore = await getTokenBalance(connection, auctioneerTwo.publicKey); + const initialBefore = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); const auctionDataBefore = await engine.fetchAuctionData(vaaHash); bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); @@ -920,24 +930,24 @@ describe("Matching Engine", function () { connection, [ await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { - payer: auctioneerOne.publicKey, + payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, initialOfferToken, }), ], - [auctioneerOne] + [offerAuthorityOne] ); // Validate balance changes. const highestOfferAfter = await getTokenBalance( connection, - auctioneerOne.publicKey + offerAuthorityOne.publicKey ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const initialAfter = await getTokenBalance(connection, auctioneerTwo.publicKey); + const initialAfter = await getTokenBalance(connection, offerAuthorityTwo.publicKey); const auctionDataAfter = await engine.fetchAuctionData(vaaHash); expect(initialAfter - initialBefore).equals(baseFastOrder.initAuctionFee); @@ -952,8 +962,8 @@ describe("Matching Engine", function () { expect(auctionDataAfter.bump).to.equal(250); expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ completed: {} }); - expect(auctionDataAfter.bestOffer).to.eql(bestOfferToken); - expect(auctionDataAfter.initialOffer).to.eql(initialOfferToken); + expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); + expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); expect(auctionDataAfter.startSlot.toString()).to.eql( auctionDataBefore.startSlot.toString() ); @@ -971,7 +981,7 @@ describe("Matching Engine", function () { async function placeInitialOfferForTest( connection: Connection, - auctioneer: Keypair, + offerAuthority: Keypair, sequence: bigint, fastOrder: FastMarketOrder, emitter: number[], @@ -984,7 +994,7 @@ async function placeInitialOfferForTest( ): Promise<[PublicKey, Buffer]> { const [vaaKey, signedVaa] = await postFastTransferVaa( connection, - auctioneer, + offerAuthority, MOCK_GUARDIANS, sequence, fastOrder, @@ -1001,13 +1011,13 @@ async function placeInitialOfferForTest( args.toChain, keccak256(parseVaa(signedVaa).hash), { - payer: auctioneer.publicKey, + payer: offerAuthority.publicKey, vaa: vaaKey, mint: USDC_MINT_ADDRESS, } ), ], - [auctioneer] + [offerAuthority] ); return [vaaKey, signedVaa]; diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 418b944c..65a54298 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -17,11 +17,12 @@ import { ETHEREUM_USDC_ADDRESS, LOCALHOST, MOCK_GUARDIANS, + OWNER_ASSISTANT_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, expectIxErr, expectIxOk, - postDepositVaa, + postLiquidityLayerVaa, } from "./helpers"; chaiUse(chaiAsPromised); @@ -32,7 +33,7 @@ describe("Token Router", function () { const payer = PAYER_KEYPAIR; const relayer = Keypair.generate(); const owner = Keypair.generate(); - const ownerAssistant = Keypair.generate(); + const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const foreignChain = wormholeSdk.CHAINS.ethereum; const invalidChain = (foreignChain + 1) as wormholeSdk.ChainId; @@ -719,7 +720,7 @@ describe("Token Router", function () { ), }); - const vaa = await postDepositVaa( + const vaa = await postLiquidityLayerVaa( connection, payer, MOCK_GUARDIANS, diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts new file mode 100644 index 00000000..a9258c69 --- /dev/null +++ b/solana/ts/tests/04__interaction.ts @@ -0,0 +1,168 @@ +import * as wormholeSdk from "@certusone/wormhole-sdk"; +import { Connection, Keypair, PublicKey } from "@solana/web3.js"; +import { use as chaiUse, expect } from "chai"; +import chaiAsPromised from "chai-as-promised"; +import { CctpTokenBurnMessage, FastFill, LiquidityLayerMessage } from "../src"; +import * as matchingEngineSdk from "../src/matchingEngine"; +import * as tokenRouterSdk from "../src/tokenRouter"; +import { + ETHEREUM_USDC_ADDRESS, + LOCALHOST, + MOCK_GUARDIANS, + OWNER_ASSISTANT_KEYPAIR, + PAYER_KEYPAIR, + USDC_MINT_ADDRESS, + expectIxOk, + postLiquidityLayerVaa, +} from "./helpers"; +import * as splToken from "@solana/spl-token"; + +chaiUse(chaiAsPromised); + +describe("Matching Engine <> Token Router", function () { + const connection = new Connection(LOCALHOST, "processed"); + // payer is also the recipient in all tests + const payer = PAYER_KEYPAIR; + const relayer = Keypair.generate(); + const owner = Keypair.generate(); + const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; + + const foreignChain = wormholeSdk.CHAINS.ethereum; + const thisChain = wormholeSdk.CHAINS.solana; + const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const foreignCctpDomain = 0; + const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); + const tokenRouter = new tokenRouterSdk.TokenRouterProgram(connection); + const matchingEngine = new matchingEngineSdk.MatchingEngineProgram(connection); + + let lookupTableAddress: PublicKey; + + describe("Admin", function () { + describe("Matching Engine -- Add Solana Token Router Endpoint", function () { + it("Add Solana Router Endpoint", async function () { + const emitterAddress = Array.from(tokenRouter.custodianAddress().toBuffer()); + const ix = await matchingEngine.addRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }, + { chain: thisChain, address: emitterAddress } + ); + await expectIxOk(connection, [ix], [ownerAssistant]); + + const routerEndpointData = await matchingEngine.fetchRouterEndpoint( + matchingEngine.routerEndpointAddress(thisChain) + ); + const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { + bump: 254, + chain: thisChain, + address: emitterAddress, + }; + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + }); + }); + + describe("Token Router -- Redeem Fast Fill", function () { + const payerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + payer.publicKey + ); + + let wormholeSequence = 4000n; + + it("Redeem Fast Fill", async function () { + const redeemer = Keypair.generate(); + + const amount = 69n; + const fastFill: FastFill = { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + amount, + }; + const message = new LiquidityLayerMessage({ + fastFill: { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + amount, + }, + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + message, + "solana" + ); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxOk(connection, [ix], [payer, redeemer]); + }); + }); +}); + +async function craftCctpTokenBurnMessage( + tokenRouter: tokenRouterSdk.TokenRouterProgram, + sourceCctpDomain: number, + cctpNonce: bigint, + encodedMintRecipient: number[], + amount: bigint, + burnSource: number[], + overrides: { destinationCctpDomain?: number } = {} +) { + const { destinationCctpDomain: inputDestinationCctpDomain } = overrides; + + const messageTransmitterProgram = tokenRouter.messageTransmitterProgram(); + const { version, localDomain } = await messageTransmitterProgram.fetchMessageTransmitterConfig( + messageTransmitterProgram.messageTransmitterConfigAddress() + ); + const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; + + const tokenMessengerMinterProgram = tokenRouter.tokenMessengerMinterProgram(); + const sourceTokenMessenger = await tokenMessengerMinterProgram + .fetchRemoteTokenMessenger( + tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain) + ) + .then((remote) => remote.tokenMessenger); + + const burnMessage = new CctpTokenBurnMessage( + { + version, + sourceDomain: sourceCctpDomain, + destinationDomain: destinationCctpDomain, + nonce: cctpNonce, + sender: sourceTokenMessenger, + recipient: Array.from(tokenMessengerMinterProgram.ID.toBuffer()), // targetTokenMessenger + targetCaller: Array.from(tokenRouter.custodianAddress().toBuffer()), // targetCaller + }, + 0, + Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress + encodedMintRecipient, + amount, + burnSource + ); + + const encodedCctpMessage = burnMessage.encode(); + + return { + destinationCctpDomain, + burnMessage, + encodedCctpMessage, + }; +} diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts index e1cf7d70..7d6d9e77 100644 --- a/solana/ts/tests/helpers/consts.ts +++ b/solana/ts/tests/helpers/consts.ts @@ -13,8 +13,15 @@ export const LOCALHOST = "http://localhost:8899"; export const PAYER_KEYPAIR = Keypair.fromSecretKey( Buffer.from( - "7037e963e55b4455cf3f0a2e670031fa16bd1ea79d921a94af9bd46856b6b9c00c1a5886fe1093df9fc438c296f9f7275b7718b6bc0e156d8d336c58f083996d", - "hex" + "cDfpY+VbRFXPPwouZwAx+ha9HqedkhqUr5vUaFa2ucAMGliG/hCT35/EOMKW+fcnW3cYtrwOFW2NM2xY8IOZbQ==", + "base64" + ) +); + +export const OWNER_ASSISTANT_KEYPAIR = Keypair.fromSecretKey( + Buffer.from( + "900mlHo1RRdhxUKuBnnPowQ7yqb4rJ1dC7K1PM+pRxeuCWamoSkQdY+3hXAeX0OBXanyqg4oyBl8g1z1sDnSWg==", + "base64" ) ); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index 9a8d7eb1..a13a1471 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -156,14 +156,14 @@ export async function getBestOfferTokenAccount( engine: MatchingEngineProgram, vaaHash: Buffer ): Promise { - return (await engine.fetchAuctionData(vaaHash)).bestOffer; + return (await engine.fetchAuctionData(vaaHash)).bestOfferToken; } -export async function getInitialAuctioneerTokenAccount( +export async function getInitialOfferTokenAccount( engine: MatchingEngineProgram, vaaHash: Buffer ): Promise { - return (await engine.fetchAuctionData(vaaHash)).initialOffer; + return (await engine.fetchAuctionData(vaaHash)).initialOfferToken; } const sleep = (ms = 0) => new Promise((resolve) => setTimeout(resolve, ms)); diff --git a/solana/ts/tests/helpers/mock.ts b/solana/ts/tests/helpers/mock.ts index f5eafb2f..88fbe3aa 100644 --- a/solana/ts/tests/helpers/mock.ts +++ b/solana/ts/tests/helpers/mock.ts @@ -1,4 +1,9 @@ -import { coalesceChainId, parseVaa, tryNativeToHexString } from "@certusone/wormhole-sdk"; +import { + ChainName, + coalesceChainId, + parseVaa, + tryNativeToHexString, +} from "@certusone/wormhole-sdk"; import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import { Connection, Keypair } from "@solana/web3.js"; @@ -7,18 +12,18 @@ import { LiquidityLayerMessage } from "../../src"; import { CORE_BRIDGE_PID, GUARDIAN_KEY } from "./consts"; import { postVaa } from "./utils"; -export async function postDepositVaa( +export async function postLiquidityLayerVaa( connection: Connection, payer: Keypair, guardians: MockGuardians, foreignEmitterAddress: Array, sequence: bigint, - message: LiquidityLayerMessage + message: LiquidityLayerMessage, + chainName?: ChainName ) { - const chainName = "ethereum"; const foreignEmitter = new MockEmitter( Buffer.from(foreignEmitterAddress).toString("hex"), - coalesceChainId(chainName), + coalesceChainId(chainName ?? "ethereum"), Number(sequence) ); From 6889249a9a26a1d4189ba1a015d12e97309bedc2 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 17 Jan 2024 09:08:38 -0600 Subject: [PATCH 052/126] solana: remove_router_endpoint and add_local_router_endpoint (untested) --- solana/programs/matching-engine/src/lib.rs | 8 ++ .../src/processor/admin/mod.rs | 6 +- .../admin/router_endpoint/add/local.rs | 59 +++++++++++++++ .../add/mod.rs} | 54 ++++--------- .../processor/admin/router_endpoint/mod.rs | 5 ++ .../processor/admin/router_endpoint/remove.rs | 39 ++++++++++ solana/programs/token-router/src/lib.rs | 4 + .../admin/add_router_endpoint/mod.rs | 2 - .../token-router/src/processor/admin/mod.rs | 6 +- .../cctp.rs => router_endpoint/add_cctp.rs} | 0 .../processor/admin/router_endpoint/mod.rs | 5 ++ .../processor/admin/router_endpoint/remove.rs | 39 ++++++++++ solana/ts/src/matchingEngine/index.ts | 31 ++++++-- solana/ts/tests/01__matchingEngine.ts | 75 +++++++++++-------- solana/ts/tests/04__interaction.ts | 45 +++++------ 15 files changed, 271 insertions(+), 107 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs rename solana/programs/matching-engine/src/processor/admin/{add_router_endpoint.rs => router_endpoint/add/mod.rs} (52%) create mode 100644 solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs delete mode 100644 solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs rename solana/programs/token-router/src/processor/admin/{add_router_endpoint/cctp.rs => router_endpoint/add_cctp.rs} (100%) create mode 100644 solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs create mode 100644 solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index c4ce44c3..729449ee 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -43,6 +43,14 @@ pub mod matching_engine { processor::add_router_endpoint(ctx, args) } + pub fn add_local_router_endpoint(ctx: Context) -> Result<()> { + processor::add_local_router_endpoint(ctx) + } + + pub fn remove_router_endpoint(ctx: Context) -> Result<()> { + processor::remove_router_endpoint(ctx) + } + pub fn submit_ownership_transfer_request( ctx: Context, ) -> Result<()> { diff --git a/solana/programs/matching-engine/src/processor/admin/mod.rs b/solana/programs/matching-engine/src/processor/admin/mod.rs index 7045e6da..ab17905d 100644 --- a/solana/programs/matching-engine/src/processor/admin/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/mod.rs @@ -1,11 +1,11 @@ -mod add_router_endpoint; -pub use add_router_endpoint::*; - mod initialize; pub use initialize::*; mod ownership_transfer_request; pub use ownership_transfer_request::*; +mod router_endpoint; +pub use router_endpoint::*; + mod update; pub use update::*; diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs new file mode 100644 index 00000000..2ff9fad9 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -0,0 +1,59 @@ +use crate::{ + error::MatchingEngineError, + state::{Custodian, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use common::admin::utils::assistant::only_authorized; +use wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN; + +#[derive(Accounts)] +pub struct AddLocalRouterEndpoint<'info> { + #[account( + mut, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + #[account( + init_if_needed, + payer = owner_or_assistant, + space = 8 + RouterEndpoint::INIT_SPACE, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &SOLANA_CHAIN.to_be_bytes() + ], + bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Must be an executable (the Token Router program), whose ID will be used to derive the + /// emitter (router endpoint) address. + #[account(executable)] + token_router_program: AccountInfo<'info>, + + system_program: Program<'info, System>, +} + +pub fn add_local_router_endpoint(ctx: Context) -> Result<()> { + // This PDA address is the router's emitter address, which is used to publish its Wormhole + // messages. + let (emitter, _) = + Pubkey::find_program_address(&[b"emitter"], &ctx.accounts.token_router_program.key()); + + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { + bump: ctx.bumps["router_endpoint"], + chain: SOLANA_CHAIN, + address: emitter.to_bytes(), + }); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs similarity index 52% rename from solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs rename to solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs index 07fc939c..6dc19bd3 100644 --- a/solana/programs/matching-engine/src/processor/admin/add_router_endpoint.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs @@ -1,3 +1,6 @@ +mod local; +pub use local::*; + use crate::{ error::MatchingEngineError, state::{Custodian, RouterEndpoint}, @@ -8,17 +11,15 @@ use common::admin::utils::assistant::only_authorized; #[derive(Accounts)] #[instruction(chain: u16)] pub struct AddRouterEndpoint<'info> { - #[account( - mut, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ MatchingEngineError::OwnerOrAssistantOnly, - )] + #[account(mut)] owner_or_assistant: Signer<'info>, #[account( seeds = [Custodian::SEED_PREFIX], bump = custodian.bump, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, )] custodian: Account<'info, Custodian>, @@ -34,11 +35,6 @@ pub struct AddRouterEndpoint<'info> { )] router_endpoint: Account<'info, RouterEndpoint>, - /// If provided, must be the Token Router program to check its emitter versus what is provided - /// in the instruction data when the chain ID is Solana's. - #[account(executable)] - token_router_program: Option>, - system_program: Program<'info, System>, } @@ -48,30 +44,18 @@ pub struct AddRouterEndpointArgs { pub address: [u8; 32], } -#[access_control(check_constraints(&args))] pub fn add_router_endpoint( ctx: Context, args: AddRouterEndpointArgs, ) -> Result<()> { let AddRouterEndpointArgs { chain, address } = args; - // If we are registering Solana's Token Router, we know what the expected emitter is given the - // Token Router's program ID, so check it here. - if chain == wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN { - let token_router_program_id = ctx - .accounts - .token_router_program - .as_ref() - .ok_or(MatchingEngineError::TokenRouterProgramIdRequired) - .map(|info| info.key())?; - let (expected_emitter, _) = - Pubkey::find_program_address(&[b"emitter"], &token_router_program_id); - require_keys_eq!( - Pubkey::from(address), - expected_emitter, - MatchingEngineError::InvalidEndpoint - ) - } + require!( + chain != 0 && chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + MatchingEngineError::ChainNotAllowed + ); + + require!(address != [0; 32], MatchingEngineError::InvalidEndpoint); ctx.accounts.router_endpoint.set_inner(RouterEndpoint { bump: ctx.bumps["router_endpoint"], @@ -82,15 +66,3 @@ pub fn add_router_endpoint( // Done. Ok(()) } - -fn check_constraints(args: &AddRouterEndpointArgs) -> Result<()> { - require!(args.chain != 0, MatchingEngineError::ChainNotAllowed); - - require!( - args.address != [0; 32], - MatchingEngineError::InvalidEndpoint - ); - - // Done. - Ok(()) -} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs new file mode 100644 index 00000000..b9ad610f --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs @@ -0,0 +1,5 @@ +mod add; +pub use add::*; + +mod remove; +pub use remove::*; diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs new file mode 100644 index 00000000..2c2af8dd --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs @@ -0,0 +1,39 @@ +use crate::{ + error::MatchingEngineError, + state::{Custodian, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use common::admin::utils::assistant::only_authorized; + +#[derive(Accounts)] +pub struct RemoveRouterEndpoint<'info> { + #[account( + mut, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + #[account( + mut, + close = owner_or_assistant, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &router_endpoint.chain.to_be_bytes() + ], + bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, +} + +pub fn remove_router_endpoint(_ctx: Context) -> Result<()> { + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 4bf0ab6f..250a20dd 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -119,6 +119,10 @@ pub mod token_router { processor::add_cctp_router_endpoint(ctx, args) } + pub fn remove_router_endpoint(ctx: Context) -> Result<()> { + processor::remove_router_endpoint(ctx) + } + /// This instruction updates the `paused` boolean in the `SenderConfig` /// account. This instruction is owner-only, meaning that only the owner /// of the program (defined in the [Config] account) can pause outbound diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs b/solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs deleted file mode 100644 index c143ed24..00000000 --- a/solana/programs/token-router/src/processor/admin/add_router_endpoint/mod.rs +++ /dev/null @@ -1,2 +0,0 @@ -mod cctp; -pub use cctp::*; diff --git a/solana/programs/token-router/src/processor/admin/mod.rs b/solana/programs/token-router/src/processor/admin/mod.rs index ffb38665..25230ee3 100644 --- a/solana/programs/token-router/src/processor/admin/mod.rs +++ b/solana/programs/token-router/src/processor/admin/mod.rs @@ -1,12 +1,12 @@ -mod add_router_endpoint; -pub use add_router_endpoint::*; - mod initialize; pub use initialize::*; mod ownership_transfer_request; pub use ownership_transfer_request::*; +mod router_endpoint; +pub use router_endpoint::*; + mod set_pause; pub use set_pause::*; diff --git a/solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs similarity index 100% rename from solana/programs/token-router/src/processor/admin/add_router_endpoint/cctp.rs rename to solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs new file mode 100644 index 00000000..e7490deb --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs @@ -0,0 +1,5 @@ +mod add_cctp; +pub use add_cctp::*; + +mod remove; +pub use remove::*; diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs new file mode 100644 index 00000000..fdaa0f76 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs @@ -0,0 +1,39 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use common::admin::utils::assistant::only_authorized; + +#[derive(Accounts)] +pub struct RemoveRouterEndpoint<'info> { + #[account( + mut, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ TokenRouterError::OwnerOrAssistantOnly, + )] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + #[account( + mut, + close = owner_or_assistant, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &router_endpoint.chain.to_be_bytes() + ], + bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, +} + +pub fn remove_router_endpoint(_ctx: Context) -> Result<()> { + // Done. + Ok(()) +} diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index b4f20b59..127d765a 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -81,7 +81,7 @@ export class MatchingEngineProgram { return AuctionData.address(this.ID, vaaHash); } - async fetchAuctionData(vaaHash: Buffer): Promise { + async fetchAuctionData(vaaHash: Buffer | Uint8Array): Promise { return this.program.account.auctionData.fetch(this.auctionDataAddress(vaaHash)); } @@ -202,7 +202,6 @@ export class MatchingEngineProgram { ownerOrAssistant: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; - tokenRouterProgram?: PublicKey; }, args: AddRouterEndpointArgs ): Promise { @@ -210,7 +209,6 @@ export class MatchingEngineProgram { ownerOrAssistant, custodian: inputCustodian, routerEndpoint: inputRouterEndpoint, - tokenRouterProgram, } = accounts; const { chain } = args; return this.program.methods @@ -219,7 +217,30 @@ export class MatchingEngineProgram { ownerOrAssistant, custodian: inputCustodian ?? this.custodianAddress(), routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), - tokenRouterProgram: tokenRouterProgram ?? null, + }) + .instruction(); + } + + async addLocalRouterEndpointIx(accounts: { + ownerOrAssistant: PublicKey; + tokenRouterProgram: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + }): Promise { + const { + ownerOrAssistant, + tokenRouterProgram, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + } = accounts; + return this.program.methods + .addLocalRouterEndpoint() + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + routerEndpoint: + inputRouterEndpoint ?? this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + tokenRouterProgram, }) .instruction(); } @@ -265,7 +286,7 @@ export class MatchingEngineProgram { async improveOfferIx( feeOffer: bigint, - vaaHash: Buffer, + vaaHash: Buffer | Uint8Array, accounts: { offerAuthority: PublicKey; bestOfferToken: PublicKey } ) { const { offerAuthority, bestOfferToken } = accounts; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index a23e38a3..1d82fe2d 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,4 +1,4 @@ -import { CHAINS, ChainId, keccak256, parseVaa } from "@certusone/wormhole-sdk"; +import * as wormholeSdk from "@certusone/wormhole-sdk"; import * as splToken from "@solana/spl-token"; import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; @@ -26,6 +26,7 @@ import { postFastTransferVaa, skip_slots, } from "./helpers/matching_engine_utils"; +import { ethers } from "ethers"; chaiUse(chaiAsPromised); @@ -42,10 +43,10 @@ describe("Matching Engine", function () { const offerAuthorityTwo = Keypair.generate(); // Foreign endpoints. - const ethChain = CHAINS.ethereum; + const ethChain = wormholeSdk.CHAINS.ethereum; const ethRouter = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const ethDomain = 0; - const arbChain = CHAINS.arbitrum; + const arbChain = wormholeSdk.CHAINS.arbitrum; const arbRouter = Array.from(Buffer.alloc(32, "bead", "hex")); const arbDomain = 3; @@ -467,7 +468,7 @@ describe("Matching Engine", function () { describe("Add Router Endpoint", function () { const createAddRouterEndpointIx = (opts?: { sender?: PublicKey; - chain?: ChainId; + chain?: wormholeSdk.ChainId; contractAddress?: Array; }) => engine.addRouterEndpointIx( @@ -508,21 +509,23 @@ describe("Matching Engine", function () { ); }); - it("Cannot Register Chain ID == 0", async function () { - const chain = 0; + [wormholeSdk.CHAINS.unset, wormholeSdk.CHAINS.solana].forEach((chain) => + it(`Cannot Register Chain ID == ${chain}`, async function () { + const chain = 0; - await expectIxErr( - connection, - [ - await engine.addRouterEndpointIx( - { ownerOrAssistant: owner.publicKey }, - { chain, address: ethRouter } - ), - ], - [owner], - "ChainNotAllowed" - ); - }); + await expectIxErr( + connection, + [ + await engine.addRouterEndpointIx( + { ownerOrAssistant: owner.publicKey }, + { chain, address: ethRouter } + ), + ], + [owner], + "ChainNotAllowed" + ); + }) + ); it("Cannot Register Zero Address", async function () { await expectIxErr( @@ -755,7 +758,7 @@ describe("Matching Engine", function () { ); // Confirm the auction data. - const vaaHash = keccak256(parseVaa(signedVaa).hash); + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); const offerToken = await splToken.getAssociatedTokenAddressSync( @@ -807,17 +810,21 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityTwo. const newOffer = baseFastOrder.maxFee - 100n; - const vaaHash = keccak256(parseVaa(signedVaa).hash); + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const auctionDataBefore = await engine.fetchAuctionData(vaaHash); const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); await expectIxOk( connection, [ - await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { - offerAuthority: offerAuthorityTwo.publicKey, - bestOfferToken, - }), + await engine.improveOfferIx( + newOffer, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityTwo.publicKey, + bestOfferToken, + } + ), ], [offerAuthorityTwo] ); @@ -891,7 +898,7 @@ describe("Matching Engine", function () { ); // Accounts for the instruction. - const vaaHash = keccak256(parseVaa(signedVaa).hash); + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); let bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); const newOffer = baseFastOrder.maxFee - 100n; @@ -900,10 +907,14 @@ describe("Matching Engine", function () { await expectIxOk( connection, [ - await engine.improveOfferIx(newOffer, keccak256(parseVaa(signedVaa).hash), { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - }), + await engine.improveOfferIx( + newOffer, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + } + ), ], [offerAuthorityOne] ); @@ -988,8 +999,8 @@ async function placeInitialOfferForTest( engine: MatchingEngineProgram, args: { feeOffer: bigint; - fromChain: ChainId; - toChain: ChainId; + fromChain: wormholeSdk.ChainId; + toChain: wormholeSdk.ChainId; } ): Promise<[PublicKey, Buffer]> { const [vaaKey, signedVaa] = await postFastTransferVaa( @@ -1009,7 +1020,7 @@ async function placeInitialOfferForTest( args.feeOffer, args.fromChain, args.toChain, - keccak256(parseVaa(signedVaa).hash), + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthority.publicKey, vaa: vaaKey, diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index a9258c69..d0197d54 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -28,7 +28,6 @@ describe("Matching Engine <> Token Router", function () { const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const foreignChain = wormholeSdk.CHAINS.ethereum; - const thisChain = wormholeSdk.CHAINS.solana; const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const foreignCctpDomain = 0; const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); @@ -38,24 +37,25 @@ describe("Matching Engine <> Token Router", function () { let lookupTableAddress: PublicKey; describe("Admin", function () { - describe("Matching Engine -- Add Solana Token Router Endpoint", function () { - it("Add Solana Router Endpoint", async function () { + describe("Matching Engine -- Add Local Token Router Endpoint", function () { + it.skip("Cannot Add Local Router Endpoint Without Executable", async function () { + // TODO + }); + + it("Add Local Router Endpoint", async function () { const emitterAddress = Array.from(tokenRouter.custodianAddress().toBuffer()); - const ix = await matchingEngine.addRouterEndpointIx( - { - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: tokenRouter.ID, - }, - { chain: thisChain, address: emitterAddress } - ); + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); await expectIxOk(connection, [ix], [ownerAssistant]); const routerEndpointData = await matchingEngine.fetchRouterEndpoint( - matchingEngine.routerEndpointAddress(thisChain) + matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) ); const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { bump: 254, - chain: thisChain, + chain: wormholeSdk.CHAIN_ID_SOLANA, address: emitterAddress, }; expect(routerEndpointData).to.eql(expectedRouterEndpointData); @@ -75,15 +75,6 @@ describe("Matching Engine <> Token Router", function () { const redeemer = Keypair.generate(); const amount = 69n; - const fastFill: FastFill = { - fill: { - sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: Array.from(redeemer.publicKey.toBuffer()), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), - }, - amount, - }; const message = new LiquidityLayerMessage({ fastFill: { fill: { @@ -114,6 +105,18 @@ describe("Matching Engine <> Token Router", function () { await expectIxOk(connection, [ix], [payer, redeemer]); }); + + it.skip("Cannot Redeem Fill Again", async function () { + // TODO + }); + + it.skip("Remove Local Router Endpoint", async function () { + // TODO + }); + + it.skip("Cannot Redeem Fast Fill Without Local Endpoint", async function () { + // TODO + }); }); }); From 6edef65ea90af2a8aa816d7106e5e49ca8cb670b Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 17 Jan 2024 09:35:29 -0600 Subject: [PATCH 053/126] solana: more redeem fast fill tests --- solana/ts/src/matchingEngine/index.ts | 23 ++++ solana/ts/tests/04__interaction.ts | 166 +++++++++++++++++++++++--- 2 files changed, 174 insertions(+), 15 deletions(-) diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 127d765a..5e2e01b1 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -245,6 +245,29 @@ export class MatchingEngineProgram { .instruction(); } + async removeRouterEndpointIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + }, + chain: wormholeSdk.ChainId + ): Promise { + const { + ownerOrAssistant, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + } = accounts; + return this.program.methods + .removeRouterEndpoint() + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + }) + .instruction(); + } + async updateFeeRecipientIx(accounts: { ownerOrAssistant: PublicKey; custodian?: PublicKey; diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index d0197d54..f9b1c2bc 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -1,5 +1,5 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; -import { Connection, Keypair, PublicKey } from "@solana/web3.js"; +import { Connection, Keypair, PublicKey, SYSVAR_RENT_PUBKEY, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { CctpTokenBurnMessage, FastFill, LiquidityLayerMessage } from "../src"; @@ -12,10 +12,12 @@ import { OWNER_ASSISTANT_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, + expectIxErr, expectIxOk, postLiquidityLayerVaa, } from "./helpers"; import * as splToken from "@solana/spl-token"; +import { VaaAccount } from "../src/wormhole"; chaiUse(chaiAsPromised); @@ -38,25 +40,59 @@ describe("Matching Engine <> Token Router", function () { describe("Admin", function () { describe("Matching Engine -- Add Local Token Router Endpoint", function () { - it.skip("Cannot Add Local Router Endpoint Without Executable", async function () { - // TODO + it("Cannot Add Local Router Endpoint Without Executable", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: SYSVAR_RENT_PUBKEY, + }); + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: ConstraintExecutable" + ); }); - it("Add Local Router Endpoint", async function () { - const emitterAddress = Array.from(tokenRouter.custodianAddress().toBuffer()); + it("Add Local Router Endpoint using System Program", async function () { const ix = await matchingEngine.addLocalRouterEndpointIx({ ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: tokenRouter.ID, + tokenRouterProgram: SystemProgram.programId, }); await expectIxOk(connection, [ix], [ownerAssistant]); const routerEndpointData = await matchingEngine.fetchRouterEndpoint( matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) ); + const [expectedAddress] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + SystemProgram.programId + ); const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { bump: 254, chain: wormholeSdk.CHAIN_ID_SOLANA, - address: emitterAddress, + address: Array.from(expectedAddress.toBuffer()), + }; + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + + it("Add Local Router Endpoint using SPL Token Program", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: splToken.TOKEN_PROGRAM_ID, + }); + await expectIxOk(connection, [ix], [ownerAssistant]); + + const routerEndpointData = await matchingEngine.fetchRouterEndpoint( + matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) + ); + const [expectedAddress] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + splToken.TOKEN_PROGRAM_ID + ); + const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { + bump: 254, + chain: wormholeSdk.CHAIN_ID_SOLANA, + address: Array.from(expectedAddress.toBuffer()), }; expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); @@ -71,7 +107,9 @@ describe("Matching Engine <> Token Router", function () { let wormholeSequence = 4000n; - it("Redeem Fast Fill", async function () { + const localVariables = new Map(); + + it("Cannot Redeem Fast Fill as Unregistered Token Router", async function () { const redeemer = Keypair.generate(); const amount = 69n; @@ -103,19 +141,117 @@ describe("Matching Engine <> Token Router", function () { dstToken: payerToken, }); - await expectIxOk(connection, [ix], [payer, redeemer]); + await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: ConstraintAddress"); + + // Save VAA pubkey and redeemer for later. + localVariables.set("vaa", vaa); + localVariables.set("redeemer", redeemer); }); - it.skip("Cannot Redeem Fill Again", async function () { - // TODO + it("Remove Local Router Endpoint", async function () { + const ix = await matchingEngine.removeRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + wormholeSdk.CHAIN_ID_SOLANA + ); + await expectIxOk(connection, [ix], [ownerAssistant]); + + const accInfo = await connection.getAccountInfo( + matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) + ); + expect(accInfo).is.null; }); - it.skip("Remove Local Router Endpoint", async function () { - // TODO + it("Cannot Redeem Fast Fill without Local Router Endpoint", async function () { + const vaa = localVariables.get("vaa") as PublicKey; + expect(localVariables.delete("vaa")).is.true; + + const redeemer = localVariables.get("redeemer") as Keypair; + expect(localVariables.delete("redeemer")).is.true; + + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: AccountNotInitialized" + ); + + // Save VAA pubkey and redeemer for later. + localVariables.set("vaa", vaa); + localVariables.set("redeemer", redeemer); + }); + + it("Add Local Router Endpoint using Token Router Program", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); + await expectIxOk(connection, [ix], [ownerAssistant]); + + const routerEndpointData = await matchingEngine.fetchRouterEndpoint( + matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) + ); + const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { + bump: 254, + chain: wormholeSdk.CHAIN_ID_SOLANA, + address: Array.from(tokenRouter.custodianAddress().toBuffer()), + }; + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + + it("Redeem Fast Fill", async function () { + const vaa = localVariables.get("vaa") as PublicKey; + expect(localVariables.delete("vaa")).is.true; + + const redeemer = localVariables.get("redeemer") as Keypair; + expect(localVariables.delete("redeemer")).is.true; + + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxOk(connection, [ix], [payer, redeemer]); + + // Save VAA pubkey and redeemer for later. + localVariables.set("vaa", vaa); + localVariables.set("redeemer", redeemer); }); - it.skip("Cannot Redeem Fast Fill Without Local Endpoint", async function () { - // TODO + it("Cannot Redeem Same Fast Fill Again", async function () { + const vaa = localVariables.get("vaa") as PublicKey; + expect(localVariables.delete("vaa")).is.true; + + const redeemer = localVariables.get("redeemer") as Keypair; + expect(localVariables.delete("redeemer")).is.true; + + const vaaHash = await VaaAccount.fetch(connection, vaa).then((vaa) => vaa.digest()); + + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxErr( + connection, + [ix], + [payer, redeemer], + `Allocate: account Address { address: ${matchingEngine + .redeemedFastFillAddress(vaaHash) + .toString()}, base: None } already in use` + ); }); }); }); From dfebcd9ca16b20b94a62dc0981d4295b48c6349c Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 17 Jan 2024 12:21:23 -0600 Subject: [PATCH 054/126] solana: clean up redeem fast fill tests --- .../src/processor/redeem_fast_fill.rs | 2 +- .../src/state/redeemed_fast_fill.rs | 2 +- solana/ts/src/matchingEngine/index.ts | 8 +- .../matchingEngine/state/RedeemedFastFill.ts | 18 + solana/ts/src/matchingEngine/state/index.ts | 3 +- solana/ts/src/messages/deposit.ts | 10 +- solana/ts/tests/01__matchingEngine.ts | 66 +++- solana/ts/tests/02__tokenRouter.ts | 101 ++--- solana/ts/tests/04__interaction.ts | 367 ++++++++++-------- solana/ts/tests/helpers/mock.ts | 24 +- 10 files changed, 379 insertions(+), 222 deletions(-) create mode 100644 solana/ts/src/matchingEngine/state/RedeemedFastFill.ts diff --git a/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs b/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs index c6fd183e..c8fc703a 100644 --- a/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs @@ -94,7 +94,7 @@ pub fn redeem_fast_fill(ctx: Context) -> Result<()> { // Fill redeemed fast fill data. ctx.accounts.redeemed_fast_fill.set_inner(RedeemedFastFill { bump: ctx.bumps["redeemed_fast_fill"], - hash: vaa.try_digest().unwrap().0, + vaa_hash: vaa.try_digest().unwrap().0, sequence: emitter.sequence, }); } diff --git a/solana/programs/matching-engine/src/state/redeemed_fast_fill.rs b/solana/programs/matching-engine/src/state/redeemed_fast_fill.rs index fece3a29..d6310bdb 100644 --- a/solana/programs/matching-engine/src/state/redeemed_fast_fill.rs +++ b/solana/programs/matching-engine/src/state/redeemed_fast_fill.rs @@ -4,7 +4,7 @@ use anchor_lang::prelude::*; #[derive(Debug, InitSpace)] pub struct RedeemedFastFill { pub bump: u8, - pub hash: [u8; 32], + pub vaa_hash: [u8; 32], pub sequence: u64, } diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 5e2e01b1..e38d081a 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -5,7 +5,7 @@ import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; -import { AuctionConfig, Custodian, RouterEndpoint, PayerSequence } from "./state"; +import { AuctionConfig, Custodian, RouterEndpoint, PayerSequence, RedeemedFastFill } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { AuctionData } from "./state/AuctionData"; import { TokenMessengerMinterProgram } from "../cctp"; @@ -103,7 +103,11 @@ export class MatchingEngineProgram { } redeemedFastFillAddress(vaaHash: Buffer | Uint8Array): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("redeemed"), vaaHash], this.ID)[0]; + return RedeemedFastFill.address(this.ID, vaaHash); + } + + fetchRedeemedFastFill(addr: PublicKey): Promise { + return this.program.account.redeemedFastFill.fetch(addr); } async initializeIx( diff --git a/solana/ts/src/matchingEngine/state/RedeemedFastFill.ts b/solana/ts/src/matchingEngine/state/RedeemedFastFill.ts new file mode 100644 index 00000000..5233176c --- /dev/null +++ b/solana/ts/src/matchingEngine/state/RedeemedFastFill.ts @@ -0,0 +1,18 @@ +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; + +export class RedeemedFastFill { + bump: number; + vaaHash: Array; + sequence: BN; + + constructor(bump: number, vaaHash: Array, sequence: BN) { + this.bump = bump; + this.vaaHash = vaaHash; + this.sequence = sequence; + } + + static address(programId: PublicKey, vaaHash: Buffer | Uint8Array) { + return PublicKey.findProgramAddressSync([Buffer.from("redeemed"), vaaHash], programId)[0]; + } +} diff --git a/solana/ts/src/matchingEngine/state/index.ts b/solana/ts/src/matchingEngine/state/index.ts index 0679cbbd..17eb5621 100644 --- a/solana/ts/src/matchingEngine/state/index.ts +++ b/solana/ts/src/matchingEngine/state/index.ts @@ -1,3 +1,4 @@ export * from "./Custodian"; -export * from "./RouterEndpoint"; export * from "./PayerSequence"; +export * from "./RedeemedFastFill"; +export * from "./RouterEndpoint"; diff --git a/solana/ts/src/messages/deposit.ts b/solana/ts/src/messages/deposit.ts index 158a9e1b..0975b2d8 100644 --- a/solana/ts/src/messages/deposit.ts +++ b/solana/ts/src/messages/deposit.ts @@ -34,11 +34,11 @@ export type LiquidityLayerDepositMessage = { }; export class LiquidityLayerDeposit { - deposit: DepositHeader; + header: DepositHeader; message: LiquidityLayerDepositMessage; - constructor(deposit: DepositHeader, message: LiquidityLayerDepositMessage) { - this.deposit = deposit; + constructor(header: DepositHeader, message: LiquidityLayerDepositMessage) { + this.header = header; this.message = message; } @@ -118,7 +118,7 @@ export class LiquidityLayerDeposit { encode(): Buffer { const buf = Buffer.alloc(146); - const { deposit, message } = this; + const { header, message } = this; const { tokenAddress, amount, @@ -127,7 +127,7 @@ export class LiquidityLayerDeposit { cctpNonce, burnSource, mintRecipient, - } = deposit; + } = header; let offset = 0; buf.set(tokenAddress, offset); diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 1d82fe2d..8f3dc21d 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,6 +1,6 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import * as splToken from "@solana/spl-token"; -import { Connection, Keypair, PublicKey, SystemProgram } from "@solana/web3.js"; +import { Connection, Keypair, PublicKey, SYSVAR_RENT_PUBKEY, SystemProgram } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { @@ -587,6 +587,70 @@ describe("Matching Engine", function () { }); }); + describe("Add Local Router Endpoint", function () { + const expectedEndpointBump = 254; + + it("Cannot Add Local Router Endpoint Without Executable", async function () { + const ix = await engine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: SYSVAR_RENT_PUBKEY, + }); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: ConstraintExecutable" + ); + }); + + it("Add Local Router Endpoint using System Program", async function () { + const ix = await engine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: SystemProgram.programId, + }); + + await expectIxOk(connection, [ix], [ownerAssistant]); + + const routerEndpointData = await engine.fetchRouterEndpoint( + engine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) + ); + const [expectedAddress] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + SystemProgram.programId + ); + const expectedRouterEndpointData = new RouterEndpoint( + expectedEndpointBump, + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(expectedAddress.toBuffer()) + ); + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + + it("Update Local Router Endpoint using SPL Token Program", async function () { + const ix = await engine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: splToken.TOKEN_PROGRAM_ID, + }); + + await expectIxOk(connection, [ix], [ownerAssistant]); + + const routerEndpointData = await engine.fetchRouterEndpoint( + engine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) + ); + const [expectedAddress] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + splToken.TOKEN_PROGRAM_ID + ); + const expectedRouterEndpointData = new RouterEndpoint( + expectedEndpointBump, + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(expectedAddress.toBuffer()) + ); + expect(routerEndpointData).to.eql(expectedRouterEndpointData); + }); + }); + describe("Update Fee Recipient", async function () { const createUpdateFeeRecipientIx = (opts?: { sender?: PublicKey; diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 65a54298..0587183b 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -79,22 +79,23 @@ describe("Token Router", function () { const custodianData = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - const expectedCustodianData: Custodian = { - bump: 253, - custodyTokenBump: 254, - paused: false, - owner: payer.publicKey, - pendingOwner: null, - ownerAssistant: ownerAssistant.publicKey, - pausedSetBy: payer.publicKey, - }; - expect(custodianData).to.eql(expectedCustodianData); + expect(custodianData).to.eql( + new Custodian( + 253, // bump + 254, // custodyTokenBump + false, // paused + payer.publicKey, // owner + null, // pendingOwner + ownerAssistant.publicKey, + payer.publicKey // pausedSetBy + ) + ); - const custodyToken = await splToken.getAccount( + const { amount } = await splToken.getAccount( connection, tokenRouter.custodyTokenAccountAddress() ); - expect(custodyToken.amount).to.equal(0n); + expect(amount).to.equal(0n); }); it("Cannot Initialize Again", async function () { @@ -123,6 +124,7 @@ describe("Token Router", function () { recentSlot: slot, }) ); + await expectIxOk(connection, [createIx], [payer]); const usdcCommonAccounts = tokenRouter.commonAccounts(USDC_MINT_ADDRESS); @@ -177,11 +179,11 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer]); // Confirm that the pending owner variable is set in the owner config. - const custodianData = await tokenRouter.fetchCustodian( + const { pendingOwner } = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - expect(custodianData.pendingOwner).deep.equals(owner.publicKey); + expect(pendingOwner).deep.equals(owner.publicKey); }); it("Cannot Cancel Ownership Request as Non-Owner", async function () { @@ -200,10 +202,10 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer]); // Confirm the pending owner field was reset. - const custodianData = await tokenRouter.fetchCustodian( + const { pendingOwner } = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - expect(custodianData.pendingOwner).deep.equals(null); + expect(pendingOwner).deep.equals(null); }); it("Submit Ownership Transfer Request as Payer Again to Owner Pubkey", async function () { @@ -215,11 +217,11 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer]); // Confirm that the pending owner variable is set in the owner config. - const custodianData = await tokenRouter.fetchCustodian( + const { pendingOwner } = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - expect(custodianData.pendingOwner).deep.equals(owner.publicKey); + expect(pendingOwner).deep.equals(owner.publicKey); }); it("Cannot Confirm Ownership Transfer Request as Non-Pending Owner", async function () { @@ -244,11 +246,11 @@ describe("Token Router", function () { // Confirm that the owner config reflects the current ownership status. { - const custodianData = await tokenRouter.fetchCustodian( + const { owner: actualOwner, pendingOwner } = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - expect(custodianData.owner).deep.equals(owner.publicKey); - expect(custodianData.pendingOwner).deep.equals(null); + expect(actualOwner).deep.equals(owner.publicKey); + expect(pendingOwner).deep.equals(null); } }); @@ -295,6 +297,7 @@ describe("Token Router", function () { owner: ownerAssistant.publicKey, newOwnerAssistant: relayer.publicKey, }); + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); }); @@ -307,10 +310,10 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer, owner]); // Confirm the assistant field was updated. - const custodianData = await tokenRouter.fetchCustodian( + const { ownerAssistant: actualOwnerAssistant } = await tokenRouter.fetchCustodian( tokenRouter.custodianAddress() ); - expect(custodianData.ownerAssistant).deep.equals(relayer.publicKey); + expect(actualOwnerAssistant).to.eql(relayer.publicKey); // Set the assistant back to the assistant key. await expectIxOk( @@ -327,6 +330,8 @@ describe("Token Router", function () { }); describe("Add CCTP Router Endpoint", function () { + const expectedEndpointBump = 255; + it("Cannot Add CCTP Router Endpoint as Non-Owner and Non-Assistant", async function () { const ix = await tokenRouter.addCctpRouterEndpointIx( { @@ -397,13 +402,14 @@ describe("Token Router", function () { const routerEndpointData = await tokenRouter.fetchRouterEndpoint( tokenRouter.routerEndpointAddress(foreignChain) ); - const expectedRouterEndpointData: RouterEndpoint = { - bump: 255, - chain: foreignChain, - address: contractAddress, - protocol: { cctp: { domain: foreignCctpDomain } }, - }; - expect(routerEndpointData).to.eql(expectedRouterEndpointData); + expect(routerEndpointData).to.eql( + new RouterEndpoint( + expectedEndpointBump, + foreignChain, + contractAddress, + { cctp: { domain: foreignCctpDomain } } // protocol + ) + ); }); it(`Update Router Endpoint as Owner`, async function () { @@ -423,13 +429,14 @@ describe("Token Router", function () { const routerEndpointData = await tokenRouter.fetchRouterEndpoint( tokenRouter.routerEndpointAddress(foreignChain) ); - const expectedRouterEndpointData: RouterEndpoint = { - bump: 255, - chain: foreignChain, - address: routerEndpointAddress, - protocol: { cctp: { domain: foreignCctpDomain } }, - }; - expect(routerEndpointData).to.eql(expectedRouterEndpointData); + expect(routerEndpointData).to.eql( + new RouterEndpoint( + expectedEndpointBump, + foreignChain, + routerEndpointAddress, + { cctp: { domain: foreignCctpDomain } } // protocol + ) + ); }); }); @@ -580,6 +587,7 @@ describe("Token Router", function () { addressLookupTableAccounts: [lookupTableAccount!], }); + // Check balance. const { amount: balanceAfter } = await splToken.getAccount(connection, burnSource); expect(balanceAfter + amountIn).equals(balanceBefore); @@ -655,6 +663,7 @@ describe("Token Router", function () { addressLookupTableAccounts: [lookupTableAccount!], }); + // Check balance. const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); expect(balanceAfter + amountIn).equals(balanceBefore); @@ -699,12 +708,6 @@ describe("Token Router", function () { burnSource ); - const fill: Fill = { - sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: Array.from(redeemer.publicKey.toBuffer()), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), - }; const message = new LiquidityLayerMessage({ deposit: new LiquidityLayerDeposit( { @@ -716,7 +719,14 @@ describe("Token Router", function () { burnSource, mintRecipient: encodedMintRecipient, }, - { fill } + { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + } ), }); @@ -754,10 +764,9 @@ describe("Token Router", function () { addressLookupTableAccounts: [lookupTableAccount!], }); + // Check balance. const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); expect(balanceAfter).equals(balanceBefore + amount); - - // TODO: check message }); }); }); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index f9b1c2bc..688a2826 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -1,12 +1,14 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; -import { Connection, Keypair, PublicKey, SYSVAR_RENT_PUBKEY, SystemProgram } from "@solana/web3.js"; +import { BN } from "@coral-xyz/anchor"; +import * as splToken from "@solana/spl-token"; +import { Connection, Keypair, PublicKey } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; -import { CctpTokenBurnMessage, FastFill, LiquidityLayerMessage } from "../src"; +import { LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; import * as matchingEngineSdk from "../src/matchingEngine"; import * as tokenRouterSdk from "../src/tokenRouter"; +import { VaaAccount } from "../src/wormhole"; import { - ETHEREUM_USDC_ADDRESS, LOCALHOST, MOCK_GUARDIANS, OWNER_ASSISTANT_KEYPAIR, @@ -16,90 +18,20 @@ import { expectIxOk, postLiquidityLayerVaa, } from "./helpers"; -import * as splToken from "@solana/spl-token"; -import { VaaAccount } from "../src/wormhole"; chaiUse(chaiAsPromised); describe("Matching Engine <> Token Router", function () { const connection = new Connection(LOCALHOST, "processed"); - // payer is also the recipient in all tests + const payer = PAYER_KEYPAIR; - const relayer = Keypair.generate(); - const owner = Keypair.generate(); const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const foreignChain = wormholeSdk.CHAINS.ethereum; - const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); - const foreignCctpDomain = 0; - const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); const tokenRouter = new tokenRouterSdk.TokenRouterProgram(connection); const matchingEngine = new matchingEngineSdk.MatchingEngineProgram(connection); - let lookupTableAddress: PublicKey; - - describe("Admin", function () { - describe("Matching Engine -- Add Local Token Router Endpoint", function () { - it("Cannot Add Local Router Endpoint Without Executable", async function () { - const ix = await matchingEngine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: SYSVAR_RENT_PUBKEY, - }); - await expectIxErr( - connection, - [ix], - [ownerAssistant], - "Error Code: ConstraintExecutable" - ); - }); - - it("Add Local Router Endpoint using System Program", async function () { - const ix = await matchingEngine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: SystemProgram.programId, - }); - await expectIxOk(connection, [ix], [ownerAssistant]); - - const routerEndpointData = await matchingEngine.fetchRouterEndpoint( - matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) - ); - const [expectedAddress] = PublicKey.findProgramAddressSync( - [Buffer.from("emitter")], - SystemProgram.programId - ); - const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { - bump: 254, - chain: wormholeSdk.CHAIN_ID_SOLANA, - address: Array.from(expectedAddress.toBuffer()), - }; - expect(routerEndpointData).to.eql(expectedRouterEndpointData); - }); - - it("Add Local Router Endpoint using SPL Token Program", async function () { - const ix = await matchingEngine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: splToken.TOKEN_PROGRAM_ID, - }); - await expectIxOk(connection, [ix], [ownerAssistant]); - - const routerEndpointData = await matchingEngine.fetchRouterEndpoint( - matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) - ); - const [expectedAddress] = PublicKey.findProgramAddressSync( - [Buffer.from("emitter")], - splToken.TOKEN_PROGRAM_ID - ); - const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { - bump: 254, - chain: wormholeSdk.CHAIN_ID_SOLANA, - address: Array.from(expectedAddress.toBuffer()), - }; - expect(routerEndpointData).to.eql(expectedRouterEndpointData); - }); - }); - }); - - describe("Token Router -- Redeem Fast Fill", function () { + describe("Redeem Fast Fill", function () { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, payer.publicKey @@ -109,7 +41,7 @@ describe("Matching Engine <> Token Router", function () { const localVariables = new Map(); - it("Cannot Redeem Fast Fill as Unregistered Token Router", async function () { + it("Token Router ..... Cannot Redeem Fast Fill as Unregistered Token Router", async function () { const redeemer = Keypair.generate(); const amount = 69n; @@ -143,12 +75,13 @@ describe("Matching Engine <> Token Router", function () { await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: ConstraintAddress"); - // Save VAA pubkey and redeemer for later. + // Save for later. localVariables.set("vaa", vaa); localVariables.set("redeemer", redeemer); + localVariables.set("amount", amount); }); - it("Remove Local Router Endpoint", async function () { + it("Matching Engine .. Remove Local Router Endpoint", async function () { const ix = await matchingEngine.removeRouterEndpointIx( { ownerOrAssistant: ownerAssistant.publicKey, @@ -163,12 +96,9 @@ describe("Matching Engine <> Token Router", function () { expect(accInfo).is.null; }); - it("Cannot Redeem Fast Fill without Local Router Endpoint", async function () { + it("Token Router ..... Cannot Redeem Fast Fill without Local Router Endpoint", async function () { const vaa = localVariables.get("vaa") as PublicKey; - expect(localVariables.delete("vaa")).is.true; - const redeemer = localVariables.get("redeemer") as Keypair; - expect(localVariables.delete("redeemer")).is.true; const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, @@ -183,13 +113,9 @@ describe("Matching Engine <> Token Router", function () { [payer, redeemer], "Error Code: AccountNotInitialized" ); - - // Save VAA pubkey and redeemer for later. - localVariables.set("vaa", vaa); - localVariables.set("redeemer", redeemer); }); - it("Add Local Router Endpoint using Token Router Program", async function () { + it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { const ix = await matchingEngine.addLocalRouterEndpointIx({ ownerOrAssistant: ownerAssistant.publicKey, tokenRouterProgram: tokenRouter.ID, @@ -199,20 +125,36 @@ describe("Matching Engine <> Token Router", function () { const routerEndpointData = await matchingEngine.fetchRouterEndpoint( matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) ); - const expectedRouterEndpointData: matchingEngineSdk.RouterEndpoint = { - bump: 254, - chain: wormholeSdk.CHAIN_ID_SOLANA, - address: Array.from(tokenRouter.custodianAddress().toBuffer()), - }; + const expectedRouterEndpointData = new matchingEngineSdk.RouterEndpoint( + 254, // bump + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(tokenRouter.custodianAddress().toBuffer()) + ); expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); - it("Redeem Fast Fill", async function () { + it("Token Router ..... Cannot Redeem Fast Fill with Invalid Redeemer", async function () { const vaa = localVariables.get("vaa") as PublicKey; - expect(localVariables.delete("vaa")).is.true; + const redeemer = Keypair.generate(); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: InvalidRedeemer"); + }); + + it("Token Router ..... Redeem Fast Fill", async function () { + const vaa = localVariables.get("vaa") as PublicKey; const redeemer = localVariables.get("redeemer") as Keypair; - expect(localVariables.delete("redeemer")).is.true; + + const amount = localVariables.get("amount") as bigint; + expect(localVariables.delete("amount")).is.true; + + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, @@ -223,20 +165,123 @@ describe("Matching Engine <> Token Router", function () { await expectIxOk(connection, [ix], [payer, redeemer]); - // Save VAA pubkey and redeemer for later. - localVariables.set("vaa", vaa); - localVariables.set("redeemer", redeemer); + // Check balance. + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore + amount); + + // Check redeemed fast fill account. + const vaaHash = await VaaAccount.fetch(connection, vaa).then((vaa) => vaa.digest()); + //console.log("vaaHash...", Buffer.from(vaaHash).toString("hex")); + const redeemedFastFill = matchingEngine.redeemedFastFillAddress(vaaHash); + const redeemedFastFillData = await matchingEngine.fetchRedeemedFastFill( + redeemedFastFill + ); + + // The VAA hash can change depending on the message (sequence is usually the reason for + // this). So we just take the bump from the fetched data and move on with our lives. + const { bump } = redeemedFastFillData; + expect(redeemedFastFillData).to.eql( + new matchingEngineSdk.RedeemedFastFill( + bump, + Array.from(vaaHash), + new BN(new BN(wormholeSequence.toString()).subn(1).toBuffer("be", 8)) + ) + ); + + // Save for later. + localVariables.set("redeemedFastFill", redeemedFastFill); }); - it("Cannot Redeem Same Fast Fill Again", async function () { + it("Token Router ..... Cannot Redeem Same Fast Fill Again", async function () { const vaa = localVariables.get("vaa") as PublicKey; expect(localVariables.delete("vaa")).is.true; const redeemer = localVariables.get("redeemer") as Keypair; expect(localVariables.delete("redeemer")).is.true; - const vaaHash = await VaaAccount.fetch(connection, vaa).then((vaa) => vaa.digest()); + const redeemedFastFill = localVariables.get("redeemedFastFill") as PublicKey; + expect(localVariables.delete("redeemedFastFill")).is.true; + + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxErr( + connection, + [ix], + [payer, redeemer], + `Allocate: account Address { address: ${redeemedFastFill.toString()}, base: None } already in use` + ); + }); + + it("Token Router ..... Cannot Redeem Fast Fill with Emitter Chain ID != Solana", async function () { + const redeemer = Keypair.generate(); + + const amount = 69n; + const message = new LiquidityLayerMessage({ + fastFill: { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + amount, + }, + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + message, + "avalanche" + ); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: InvalidEmitterForFastFill" + ); + }); + + it("Token Router ..... Cannot Redeem Fast Fill with Emitter Address != Matching Engine Custodian", async function () { + const redeemer = Keypair.generate(); + + const amount = 69n; + const message = new LiquidityLayerMessage({ + fastFill: { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + amount, + }, + }); + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(Buffer.alloc(32, "deadbeef", "hex")), + wormholeSequence++, + message, + "solana" + ); const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, @@ -248,60 +293,76 @@ describe("Matching Engine <> Token Router", function () { connection, [ix], [payer, redeemer], - `Allocate: account Address { address: ${matchingEngine - .redeemedFastFillAddress(vaaHash) - .toString()}, base: None } already in use` + "Error Code: InvalidEmitterForFastFill" + ); + }); + + it("Token Router ..... Cannot Redeem Fast Fill with Invalid VAA", async function () { + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + Buffer.from("Oh noes!"), // message + "solana" + ); + + const redeemer = Keypair.generate(); + + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: InvalidVaa"); + }); + + it("Token Router ..... Cannot Redeem Fast Fill with Invalid Payload", async function () { + const redeemer = Keypair.generate(); + + const amount = 69n; + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: new Array(32).fill(0), + amount, + sourceCctpDomain: 69, + destinationCctpDomain: 69, + cctpNonce: 69n, + burnSource: new Array(32).fill(0), + mintRecipient: new Array(32).fill(0), + }, + { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + } + ), + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + message, + "solana" ); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: InvalidPayloadId"); }); }); }); - -async function craftCctpTokenBurnMessage( - tokenRouter: tokenRouterSdk.TokenRouterProgram, - sourceCctpDomain: number, - cctpNonce: bigint, - encodedMintRecipient: number[], - amount: bigint, - burnSource: number[], - overrides: { destinationCctpDomain?: number } = {} -) { - const { destinationCctpDomain: inputDestinationCctpDomain } = overrides; - - const messageTransmitterProgram = tokenRouter.messageTransmitterProgram(); - const { version, localDomain } = await messageTransmitterProgram.fetchMessageTransmitterConfig( - messageTransmitterProgram.messageTransmitterConfigAddress() - ); - const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; - - const tokenMessengerMinterProgram = tokenRouter.tokenMessengerMinterProgram(); - const sourceTokenMessenger = await tokenMessengerMinterProgram - .fetchRemoteTokenMessenger( - tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain) - ) - .then((remote) => remote.tokenMessenger); - - const burnMessage = new CctpTokenBurnMessage( - { - version, - sourceDomain: sourceCctpDomain, - destinationDomain: destinationCctpDomain, - nonce: cctpNonce, - sender: sourceTokenMessenger, - recipient: Array.from(tokenMessengerMinterProgram.ID.toBuffer()), // targetTokenMessenger - targetCaller: Array.from(tokenRouter.custodianAddress().toBuffer()), // targetCaller - }, - 0, - Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress - encodedMintRecipient, - amount, - burnSource - ); - - const encodedCctpMessage = burnMessage.encode(); - - return { - destinationCctpDomain, - burnMessage, - encodedCctpMessage, - }; -} diff --git a/solana/ts/tests/helpers/mock.ts b/solana/ts/tests/helpers/mock.ts index 88fbe3aa..c594b1fc 100644 --- a/solana/ts/tests/helpers/mock.ts +++ b/solana/ts/tests/helpers/mock.ts @@ -1,9 +1,4 @@ -import { - ChainName, - coalesceChainId, - parseVaa, - tryNativeToHexString, -} from "@certusone/wormhole-sdk"; +import { ChainName, coalesceChainId, parseVaa } from "@certusone/wormhole-sdk"; import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import { Connection, Keypair } from "@solana/web3.js"; @@ -18,18 +13,18 @@ export async function postLiquidityLayerVaa( guardians: MockGuardians, foreignEmitterAddress: Array, sequence: bigint, - message: LiquidityLayerMessage, + message: LiquidityLayerMessage | Buffer, chainName?: ChainName ) { const foreignEmitter = new MockEmitter( Buffer.from(foreignEmitterAddress).toString("hex"), coalesceChainId(chainName ?? "ethereum"), - Number(sequence) + Number(sequence - 1n) ); const published = foreignEmitter.publishMessage( 0, // nonce, - message.encode(), + Buffer.isBuffer(message) ? message : message.encode(), 0, // consistencyLevel 12345678 // timestamp ); @@ -51,11 +46,16 @@ export class CircleAttester { const signature = this.attester.signDigest(ethers.utils.keccak256(message)); const attestation = Buffer.alloc(65); - attestation.set(ethers.utils.arrayify(signature.r), 0); - attestation.set(ethers.utils.arrayify(signature.s), 32); + + let offset = 0; + attestation.set(ethers.utils.arrayify(signature.r), offset); + offset += 32; + attestation.set(ethers.utils.arrayify(signature.s), offset); + offset += 32; const recoveryId = signature.recoveryParam; - attestation.writeUInt8(recoveryId < 27 ? recoveryId + 27 : recoveryId, 64); + attestation.writeUInt8(recoveryId < 27 ? recoveryId + 27 : recoveryId, offset); + offset += 1; return attestation; } From 5e3fcd2a8b91f0a07a8be3d1ab40af61a338d2e4 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 17 Jan 2024 16:10:52 -0600 Subject: [PATCH 055/126] solana: fix errors; more tests --- solana/programs/token-router/src/error.rs | 4 +- .../src/processor/place_market_order/cctp.rs | 18 +- .../src/processor/redeem_fill/cctp.rs | 16 +- solana/ts/src/tokenRouter/index.ts | 61 +- solana/ts/tests/01__matchingEngine.ts | 18 +- solana/ts/tests/02__tokenRouter.ts | 1000 +++++++++++++---- solana/ts/tests/04__interaction.ts | 40 +- 7 files changed, 899 insertions(+), 258 deletions(-) diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 1e3f4bae..939e7695 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -53,13 +53,13 @@ pub enum TokenRouterError { #[msg("InsufficientAmount")] InsufficientAmount = 0x100, - #[msg("UnknownEmitter")] + #[msg("InvalidSourceRouter")] InvalidSourceRouter = 0x200, #[msg("InvalidDepositMessage")] InvalidDepositMessage = 0x202, - #[msg("NotFillMessage")] + #[msg("InvalidPayloadId")] InvalidPayloadId = 0x204, #[msg("InvalidRedeemer")] diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index 181d8a1c..a98e1a9e 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -172,7 +172,6 @@ pub struct PlaceMarketOrderCctpArgs { /// emit a Wormhole message associated with a CCTP message. /// /// See [burn_and_publish](wormhole_cctp_solana::cpi::burn_and_publish) for more details. -#[access_control(check_constraints(&args))] pub fn place_market_order_cctp( ctx: Context, args: PlaceMarketOrderCctpArgs, @@ -183,17 +182,6 @@ pub fn place_market_order_cctp( } } -fn check_constraints(args: &PlaceMarketOrderCctpArgs) -> Result<()> { - // Even though CCTP prevents zero amount burns, we prefer to throw an explicit error here. - require!(args.amount_in > 0, TokenRouterError::InsufficientAmount); - - // Cannot send to zero address. - require!(args.redeemer != [0; 32], TokenRouterError::InvalidRedeemer); - - // Done. - Ok(()) -} - fn handle_place_market_order_cctp( ctx: Context, args: PlaceMarketOrderCctpArgs, @@ -205,6 +193,12 @@ fn handle_place_market_order_cctp( redeemer_message, } = args; + // Even though CCTP prevents zero amount burns, we prefer to throw an explicit error here. + require!(args.amount_in > 0, TokenRouterError::InsufficientAmount); + + // Cannot send to zero address. + require!(args.redeemer != [0; 32], TokenRouterError::InvalidRedeemer); + // Because the transfer initiator in the Circle message is whoever signs to burn assets, we need // to transfer assets from the source token account to one that belongs to this program. token::transfer( diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index fc50b6a8..a13ac97a 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -165,8 +165,13 @@ pub fn redeem_cctp_fill(ctx: Context, args: super::RedeemFillArg // Validate that this message originated from a registered emitter. let endpoint = &ctx.accounts.router_endpoint; let emitter = vaa.try_emitter_info().unwrap(); + require_eq!( + emitter.chain, + endpoint.chain, + TokenRouterError::InvalidSourceRouter + ); require!( - emitter.chain == endpoint.chain && emitter.address == endpoint.address, + emitter.address == endpoint.address, TokenRouterError::InvalidSourceRouter ); @@ -177,7 +182,9 @@ pub fn redeem_cctp_fill(ctx: Context, args: super::RedeemFillArg .to_deposit_unchecked(); // Save for final transfer. - let amount = deposit.amount(); + // + // NOTE: This is safe because we know the amount is within u64 range. + let amount = u64::try_from(ruint::aliases::U256::from_be_bytes(deposit.amount())).unwrap(); // Verify as Liquiditiy Layer Deposit message. let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) @@ -202,9 +209,6 @@ pub fn redeem_cctp_fill(ctx: Context, args: super::RedeemFillArg }, &[custodian_seeds], ), - // This is safe because we know the amount is within u64 range. - ruint::aliases::U256::from_be_bytes(amount) - .try_into() - .unwrap(), + amount, ) } diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index e4a5454e..aa4c46a5 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -1,6 +1,6 @@ export * from "./state"; -import { ChainId } from "@certusone/wormhole-sdk"; +import * as wormholeSdk from "@certusone/wormhole-sdk"; import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { @@ -16,10 +16,10 @@ import { MessageTransmitterProgram, TokenMessengerMinterProgram, } from "../cctp"; +import * as matchingEngineSdk from "../matchingEngine"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; -import { Custodian, MessageProtocol, PayerSequence, RouterEndpoint } from "./state"; -import * as matchingEngineSdk from "../matchingEngine"; +import { Custodian, PayerSequence, RouterEndpoint } from "./state"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; @@ -27,7 +27,7 @@ export type ProgramId = (typeof PROGRAM_IDS)[number]; export type PlaceMarketOrderCctpArgs = { amountIn: bigint; - targetChain: ChainId; + targetChain: wormholeSdk.ChainId; redeemer: Array; redeemerMessage: Buffer; }; @@ -104,25 +104,25 @@ export type RedeemFastFillAccounts = { }; export type AddCctpRouterEndpointArgs = { - chain: ChainId; + chain: wormholeSdk.ChainId; address: Array; cctpDomain: number; }; export type RegisterContractArgs = { - chain: ChainId; + chain: wormholeSdk.ChainId; address: Array; }; export type RegisterAssetArgs = { - chain: ChainId; + chain: wormholeSdk.ChainId; relayerFee: BN; nativeSwapRate: BN; maxNativeSwapAmount: BN; }; export type UpdateRelayerFeeArgs = { - chain: ChainId; + chain: wormholeSdk.ChainId; relayerFee: BN; }; @@ -176,7 +176,7 @@ export class TokenRouterProgram { .catch((_) => new BN(0)); } - routerEndpointAddress(chain: ChainId): PublicKey { + routerEndpointAddress(chain: wormholeSdk.ChainId): PublicKey { return RouterEndpoint.address(this.ID, chain); } @@ -229,7 +229,7 @@ export class TokenRouterProgram { async placeMarketOrderCctpAccounts( mint: PublicKey, - targetChain: ChainId, + targetChain: wormholeSdk.ChainId, overrides: { remoteDomain?: number; } = {} @@ -292,10 +292,17 @@ export class TokenRouterProgram { mint: PublicKey; burnSource: PublicKey; burnSourceAuthority?: PublicKey; + routerEndpoint?: PublicKey; }, args: PlaceMarketOrderCctpArgs ): Promise { - let { payer, burnSource, mint, burnSourceAuthority: inputBurnSourceAuthority } = accounts; + let { + payer, + burnSource, + mint, + burnSourceAuthority: inputBurnSourceAuthority, + routerEndpoint: inputRouterEndpoint, + } = accounts; const burnSourceAuthority = inputBurnSourceAuthority ?? (await splToken @@ -341,7 +348,7 @@ export class TokenRouterProgram { mint, burnSource, custodyToken, - routerEndpoint, + routerEndpoint: inputRouterEndpoint ?? routerEndpoint, coreBridgeConfig, coreMessage, coreEmitterSequence, @@ -389,7 +396,7 @@ export class TokenRouterProgram { return { custodian: this.custodianAddress(), custodyToken, - routerEndpoint: this.routerEndpointAddress(chain as ChainId), // yikes + routerEndpoint: this.routerEndpointAddress(chain as wormholeSdk.ChainId), // yikes messageTransmitterAuthority, messageTransmitterConfig, usedNonces, @@ -411,13 +418,14 @@ export class TokenRouterProgram { vaa: PublicKey; redeemer: PublicKey; dstToken: PublicKey; + routerEndpoint?: PublicKey; }, args: { encodedCctpMessage: Buffer; cctpAttestation: Buffer; } ): Promise { - const { payer, vaa, redeemer, dstToken } = accounts; + const { payer, vaa, redeemer, dstToken, routerEndpoint: inputRouterEndpoint } = accounts; const { encodedCctpMessage } = args; @@ -448,7 +456,7 @@ export class TokenRouterProgram { redeemer, dstToken, custodyToken, - routerEndpoint, + routerEndpoint: inputRouterEndpoint ?? routerEndpoint, messageTransmitterAuthority, messageTransmitterConfig, usedNonces, @@ -640,6 +648,29 @@ export class TokenRouterProgram { .instruction(); } + async removeRouterEndpointIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + }, + chain: wormholeSdk.ChainId + ): Promise { + const { + ownerOrAssistant, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + } = accounts; + return this.program.methods + .removeRouterEndpoint() + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + }) + .instruction(); + } + async updateOwnerAssistantIx(accounts: { owner: PublicKey; newOwnerAssistant: PublicKey; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 8f3dc21d..c2e6b14c 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -75,7 +75,7 @@ describe("Matching Engine", function () { mint: opts?.mint ?? USDC_MINT_ADDRESS, }); - it("Cannot Initialize Without USDC Mint", async function () { + it("Cannot Initialize without USDC Mint", async function () { const mint = await splToken.createMint(connection, payer, payer.publicKey, null, 6); await expectIxErr( @@ -86,7 +86,7 @@ describe("Matching Engine", function () { ); }); - it("Cannot Initialize With Default Owner Assistant", async function () { + it("Cannot Initialize with Default Owner Assistant", async function () { await expectIxErr( connection, [ @@ -99,7 +99,7 @@ describe("Matching Engine", function () { ); }); - it("Cannot Initialize With Default Fee Recipient", async function () { + it("Cannot Initialize with Default Fee Recipient", async function () { await expectIxErr( connection, [ @@ -112,7 +112,7 @@ describe("Matching Engine", function () { ); }); - it("Cannot Initialize With Invalid Auction Duration", async function () { + it("Cannot Initialize with Invalid Auction Duration", async function () { const newAuctionConfig = { ...auctionConfig } as AuctionConfig; newAuctionConfig.auctionDuration = 0; @@ -131,7 +131,7 @@ describe("Matching Engine", function () { ); }); - it("Cannot Initialize With Invalid Auction Grace Period", async function () { + it("Cannot Initialize with Invalid Auction Grace Period", async function () { const newAuctionConfig = { ...auctionConfig } as AuctionConfig; newAuctionConfig.auctionGracePeriod = auctionConfig.auctionDuration - 1; @@ -150,7 +150,7 @@ describe("Matching Engine", function () { ); }); - it("Cannot Initialize With Invalid User Penalty", async function () { + it("Cannot Initialize with Invalid User Penalty", async function () { const newAuctionConfig = { ...auctionConfig } as AuctionConfig; newAuctionConfig.userPenaltyRewardBps = 4294967295; @@ -169,7 +169,7 @@ describe("Matching Engine", function () { ); }); - it("Cannot Initialize With Invalid Initial Penalty", async function () { + it("Cannot Initialize with Invalid Initial Penalty", async function () { const newAuctionConfig = { ...auctionConfig } as AuctionConfig; newAuctionConfig.initialPenaltyBps = 4294967295; @@ -590,7 +590,7 @@ describe("Matching Engine", function () { describe("Add Local Router Endpoint", function () { const expectedEndpointBump = 254; - it("Cannot Add Local Router Endpoint Without Executable", async function () { + it("Cannot Add Local Router Endpoint without Executable", async function () { const ix = await engine.addLocalRouterEndpointIx({ ownerOrAssistant: ownerAssistant.publicKey, tokenRouterProgram: SYSVAR_RENT_PUBKEY, @@ -845,7 +845,7 @@ describe("Matching Engine", function () { }); describe("Improve Offer", function () { - it("Improve Offer With New Offer Authority", async function () { + it("Improve Offer with New Offer Authority", async function () { const [, signedVaa] = await placeInitialOfferForTest( connection, offerAuthorityOne, diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 0587183b..eeea4ca7 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -6,6 +6,7 @@ import { Connection, Keypair, PublicKey, + SYSVAR_RENT_PUBKEY, SystemProgram, } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; @@ -37,7 +38,7 @@ describe("Token Router", function () { const foreignChain = wormholeSdk.CHAINS.ethereum; const invalidChain = (foreignChain + 1) as wormholeSdk.ChainId; - const routerEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const foreignEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const foreignCctpDomain = 0; const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); const tokenRouter = new TokenRouterProgram(connection); @@ -46,7 +47,7 @@ describe("Token Router", function () { describe("Admin", function () { describe("Initialize", function () { - it("Cannot Initialize Without USDC Mint", async function () { + it("Cannot Initialize without USDC Mint", async function () { const mint = await splToken.createMint(connection, payer, payer.publicKey, null, 6); const ix = await tokenRouter.initializeIx({ @@ -57,7 +58,7 @@ describe("Token Router", function () { await expectIxErr(connection, [ix], [payer], "Error Code: NotUsdc"); }); - it("Cannot Initialize With Default Owner Assistant", async function () { + it("Cannot Initialize with Default Owner Assistant", async function () { const ix = await tokenRouter.initializeIx({ owner: payer.publicKey, ownerAssistant: PublicKey.default, @@ -115,7 +116,7 @@ describe("Token Router", function () { ); }); - after("Setup Lookup Table", async () => { + after("Setup Lookup Table", async function () { // Create. const [createIx, lookupTable] = await connection.getSlot("finalized").then((slot) => AddressLookupTableProgram.createLookupTable({ @@ -339,7 +340,7 @@ describe("Token Router", function () { }, { chain: foreignChain, - address: routerEndpointAddress, + address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, } ); @@ -355,7 +356,7 @@ describe("Token Router", function () { }, { chain, - address: routerEndpointAddress, + address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, } ); @@ -419,7 +420,7 @@ describe("Token Router", function () { }, { chain: foreignChain, - address: routerEndpointAddress, + address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, } ); @@ -433,7 +434,7 @@ describe("Token Router", function () { new RouterEndpoint( expectedEndpointBump, foreignChain, - routerEndpointAddress, + foreignEndpointAddress, { cctp: { domain: foreignCctpDomain } } // protocol ) ); @@ -490,113 +491,177 @@ describe("Token Router", function () { }); }); - describe("Place Market Order (CCTP)", () => { - const payerToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - payer.publicKey - ); - const burnSourceAuthority = Keypair.generate(); - - before("Set Up Arbitrary Burn Source", async function () { - const burnSource = await splToken.createAccount( - connection, - payer, + describe("Business Logic", function () { + describe("Place Market Order (CCTP)", function () { + const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - burnSourceAuthority.publicKey + payer.publicKey ); + const burnSourceAuthority = Keypair.generate(); - // Add funds to account. - await splToken.mintTo( - connection, - payer, - USDC_MINT_ADDRESS, - burnSource, - payer, - 1_000_000_000n // 1,000 USDC - ); - }); + before("Set Up Arbitrary Burn Source", async function () { + const burnSource = await splToken.createAccount( + connection, + payer, + USDC_MINT_ADDRESS, + burnSourceAuthority.publicKey + ); - it.skip("Cannot Place Market Order with Insufficient Amount", async function () { - // TODO - }); + // Add funds to account. + await splToken.mintTo( + connection, + payer, + USDC_MINT_ADDRESS, + burnSource, + payer, + 1_000_000_000n // 1,000 USDC + ); + }); - it.skip("Cannot Place Market Order with Invalid Redeemer", async function () { - // TODO - }); + it("Cannot Place Market Order with Unregistered Endpoint", async function () { + const amountIn = 69n; + const unregisteredEndpoint = tokenRouter.routerEndpointAddress( + wormholeSdk.CHAIN_ID_SOLANA + ); + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: payer.publicKey, + routerEndpoint: unregisteredEndpoint, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); - it.skip("Cannot Place Market Order with Unregistered Endpoint", async function () { - // TODO - }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized", { + addressLookupTableAccounts: [lookupTableAccount!], + }); + }); - it("Cannot Place Market Order as Invalid Burn Source Authority", async function () { - const burnSourceAuthority = Keypair.generate(); + it("Cannot Place Market Order with Insufficient Amount", async function () { + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: payer.publicKey, + }, + { + amountIn: 0n, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); - const amountIn = 69n; - const ix = await tokenRouter.placeMarketOrderCctpIx( - { - payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: burnSourceAuthority.publicKey, - }, - { - amountIn, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), - } - ); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr(connection, [ix], [payer], "Error Code: InsufficientAmount", { + addressLookupTableAccounts: [lookupTableAccount!], + }); + }); - // TODO: use lookup table - // NOTE: This error comes from the SPL Token program. - await expectIxErr( - connection, - [ix], - [payer, burnSourceAuthority], - "Error: owner does not match" - ); - }); + it("Cannot Place Market Order with Invalid Redeemer", async function () { + const amountIn = 69n; + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: payer.publicKey, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: new Array(32).fill(0), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); - it("Place Market Order as Burn Source Authority", async function () { - const burnSource = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - burnSourceAuthority.publicKey - ); - const amountIn = 69n; - const ix = await tokenRouter.placeMarketOrderCctpIx( - { - payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource, - burnSourceAuthority: burnSourceAuthority.publicKey, - }, - { - amountIn, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), - } - ); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidRedeemer", { + addressLookupTableAccounts: [lookupTableAccount!], + }); + }); - const { amount: balanceBefore } = await splToken.getAccount(connection, burnSource); + it("Cannot Place Market Order as Invalid Burn Source Authority", async function () { + const burnSourceAuthority = Keypair.generate(); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress - ); - await expectIxOk(connection, [ix], [payer, burnSourceAuthority], { - addressLookupTableAccounts: [lookupTableAccount!], + const amountIn = 69n; + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: burnSourceAuthority.publicKey, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); + + // NOTE: This error comes from the SPL Token program. + await expectIxErr( + connection, + [ix], + [payer, burnSourceAuthority], + "Error: owner does not match" + ); }); - // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, burnSource); - expect(balanceAfter + amountIn).equals(balanceBefore); + it("Place Market Order as Burn Source Authority", async function () { + const burnSource = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + burnSourceAuthority.publicKey + ); + const amountIn = 69n; + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource, + burnSourceAuthority: burnSourceAuthority.publicKey, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); + + const { amount: balanceBefore } = await splToken.getAccount(connection, burnSource); - // TODO: check message - }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxOk(connection, [ix], [payer, burnSourceAuthority], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + + // Check balance. + const { amount: balanceAfter } = await splToken.getAccount(connection, burnSource); + expect(balanceAfter + amountIn).equals(balanceBefore); - it("Cannot Place Market Order when Paused", async function () { - // First pause the router. - { + // TODO: check message + }); + + it("Pause", async function () { const ix = await tokenRouter.setPauseIx( { ownerOrAssistant: owner.publicKey, @@ -605,29 +670,28 @@ describe("Token Router", function () { ); await expectIxOk(connection, [ix], [owner]); - } + }); - const ix = await tokenRouter.placeMarketOrderCctpIx( - { - payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: payer.publicKey, - }, - { - amountIn: 69n, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), - } - ); + it("Cannot Place Market Order when Paused", async function () { + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: payer.publicKey, + }, + { + amountIn: 69n, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); - await expectIxErr(connection, [ix], [payer], "Error Code: Paused"); - }); + await expectIxErr(connection, [ix], [payer], "Error Code: Paused"); + }); - it("Place Market Order after Unpaused", async function () { - // First unpause the router. - { + it("Unpause", async function () { const ix = await tokenRouter.setPauseIx( { ownerOrAssistant: ownerAssistant.publicKey, @@ -636,70 +700,70 @@ describe("Token Router", function () { ); await expectIxOk(connection, [ix], [ownerAssistant]); - } + }); - const amountIn = 69n; - const ix = await tokenRouter.placeMarketOrderCctpIx( - { - payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: payer.publicKey, - }, - { - amountIn, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), - } - ); + it("Place Market Order after Unpaused", async function () { + const amountIn = 69n; + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + mint: USDC_MINT_ADDRESS, + burnSource: payerToken, + burnSourceAuthority: payer.publicKey, + }, + { + amountIn, + targetChain: foreignChain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + redeemerMessage: Buffer.from("All your base are belong to us"), + } + ); - const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress - ); - await expectIxOk(connection, [ix], [payer], { - addressLookupTableAccounts: [lookupTableAccount!], - }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxOk(connection, [ix], [payer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); - // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); - expect(balanceAfter + amountIn).equals(balanceBefore); + // Check balance. + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter + amountIn).equals(balanceBefore); - // TODO: check message + // TODO: check message + }); }); - }); - describe("Redeem Fill (CCTP)", () => { - const payerToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - payer.publicKey - ); + describe("Redeem Fill (CCTP)", function () { + const payerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + payer.publicKey + ); - let testCctpNonce = 2n ** 64n - 1n; + let testCctpNonce = 2n ** 64n - 1n; - // Hack to prevent math overflow error when invoking CCTP programs. - testCctpNonce -= 2n * 6400n; + // Hack to prevent math overflow error when invoking CCTP programs. + testCctpNonce -= 2n * 6400n; - let wormholeSequence = 0n; + let wormholeSequence = 0n; - const localVariables = new Map(); + const localVariables = new Map(); - it("Redeem Fill", async function () { - const redeemer = Keypair.generate(); + it("Cannot Redeem Fill with Invalid VAA Account (Not Owned by Core Bridge)", async function () { + const redeemer = Keypair.generate(); - const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() - ); - const sourceCctpDomain = 0; - const cctpNonce = testCctpNonce++; - const amount = 69n; - - // Concoct a Circle message. - const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); - const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = - await craftCctpTokenBurnMessage( + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( tokenRouter, sourceCctpDomain, cctpNonce, @@ -707,66 +771,576 @@ describe("Token Router", function () { amount, burnSource ); + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + foreignEndpointAddress, + wormholeSequence++, + Buffer.from("Oh noes!") + ); - const message = new LiquidityLayerMessage({ - deposit: new LiquidityLayerDeposit( + const ix = await tokenRouter.redeemCctpFillIx( { - tokenAddress: burnMessage.burnTokenAddress, + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + { + encodedCctpMessage, + cctpAttestation, + } + ); + + // Replace the VAA account pubkey with garbage. + ix.keys[ix.keys.findIndex((key) => key.pubkey.equals(vaa))].pubkey = + SYSVAR_RENT_PUBKEY; + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: ConstraintOwner", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + }); + + it("Cannot Redeem Fill from Invalid Source Router Chain", async function () { + const redeemer = Keypair.generate(); + + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage( + tokenRouter, + sourceCctpDomain, + cctpNonce, + encodedMintRecipient, amount, + burnSource + ); + + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, + }, + { + slowOrderResponse: { + baseFee: 69n, + }, + } + ), + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + foreignEndpointAddress, + wormholeSequence++, + message, + "polygon" + ); + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + routerEndpoint: tokenRouter.routerEndpointAddress(foreignChain), + }, + { + encodedCctpMessage, + cctpAttestation, + } + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: InvalidSourceRouter", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + }); + + it("Cannot Redeem Fill from Invalid Source Router Address", async function () { + const redeemer = Keypair.generate(); + + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage( + tokenRouter, sourceCctpDomain, - destinationCctpDomain, cctpNonce, - burnSource, - mintRecipient: encodedMintRecipient, + encodedMintRecipient, + amount, + burnSource + ); + + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, + }, + { + slowOrderResponse: { + baseFee: 69n, + }, + } + ), + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + new Array(32).fill(0), // emitter address + wormholeSequence++, + message + ); + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, }, { - fill: { - sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: Array.from(redeemer.publicKey.toBuffer()), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), + encodedCctpMessage, + cctpAttestation, + } + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: InvalidSourceRouter", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + }); + + it("Cannot Redeem Fill with Invalid Deposit Message", async function () { + const redeemer = Keypair.generate(); + + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage( + tokenRouter, + sourceCctpDomain, + cctpNonce, + encodedMintRecipient, + amount, + burnSource + ); + + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, }, + { + slowOrderResponse: { + baseFee: 69n, + }, + } + ), + }); + + // Override the payload ID in the deposit message. + const encodedMessage = message.encode(); + encodedMessage[147] = 69; + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + foreignEndpointAddress, + wormholeSequence++, + encodedMessage + ); + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + { + encodedCctpMessage, + cctpAttestation, } - ), + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: InvalidDepositMessage", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); }); - const vaa = await postLiquidityLayerVaa( - connection, - payer, - MOCK_GUARDIANS, - routerEndpointAddress, - wormholeSequence++, - message - ); - const ix = await tokenRouter.redeemCctpFillIx( - { - payer: payer.publicKey, - vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, - }, - { - encodedCctpMessage, - cctpAttestation, - } - ); + it("Cannot Redeem Fill with Invalid Payload ID", async function () { + const redeemer = Keypair.generate(); - const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 250_000, + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage( + tokenRouter, + sourceCctpDomain, + cctpNonce, + encodedMintRecipient, + amount, + burnSource + ); + + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, + }, + { + slowOrderResponse: { + baseFee: 69n, + }, + } + ), + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + foreignEndpointAddress, + wormholeSequence++, + message + ); + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + { + encodedCctpMessage, + cctpAttestation, + } + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: InvalidPayloadId", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); }); - const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + it("Remove Router Endpoint", async function () { + const ix = await tokenRouter.removeRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + foreignChain + ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress - ); - await expectIxOk(connection, [computeIx, ix], [payer, redeemer], { - addressLookupTableAccounts: [lookupTableAccount!], + await expectIxOk(connection, [ix], [ownerAssistant]); + }); + + it("Cannot Redeem Fill without Router Endpoint", async function () { + const redeemer = Keypair.generate(); + + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage( + tokenRouter, + sourceCctpDomain, + cctpNonce, + encodedMintRecipient, + amount, + burnSource + ); + + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, + }, + { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + } + ), + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + foreignEndpointAddress, + wormholeSequence++, + message + ); + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + { + encodedCctpMessage, + cctpAttestation, + } + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: AccountNotInitialized", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + + // Save for later. + localVariables.set("args", { encodedCctpMessage, cctpAttestation }); + localVariables.set("vaa", vaa); + localVariables.set("redeemer", redeemer); + localVariables.set("amount", amount); }); - // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); - expect(balanceAfter).equals(balanceBefore + amount); + it("Add Router Endpoint", async function () { + const ix = await tokenRouter.addCctpRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { + chain: foreignChain, + address: foreignEndpointAddress, + cctpDomain: foreignCctpDomain, + } + ); + + await expectIxOk(connection, [ix], [ownerAssistant]); + }); + + it("Cannot Redeem Fill with Invalid Redeemer", async function () { + const args = localVariables.get("args") as { + encodedCctpMessage: Buffer; + cctpAttestation: Buffer; + }; + const vaa = localVariables.get("vaa") as PublicKey; + + const redeemer = Keypair.generate(); + + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + args + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: InvalidRedeemer", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + }); + + it("Redeem Fill", async function () { + const args = localVariables.get("args") as { + encodedCctpMessage: Buffer; + cctpAttestation: Buffer; + }; + const vaa = localVariables.get("vaa") as PublicKey; + const redeemer = localVariables.get("redeemer") as Keypair; + + const amount = localVariables.get("amount") as bigint; + expect(localVariables.delete("amount")).is.true; + + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + args + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxOk(connection, [computeIx, ix], [payer, redeemer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + + // Check balance. + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore + amount); + }); + + it("Cannot Redeem Same Fill Again", async function () { + const args = localVariables.get("args") as { + encodedCctpMessage: Buffer; + cctpAttestation: Buffer; + }; + expect(localVariables.delete("args")).is.true; + + const vaa = localVariables.get("vaa") as PublicKey; + expect(localVariables.delete("vaa")).is.true; + + const redeemer = localVariables.get("redeemer") as Keypair; + expect(localVariables.delete("redeemer")).is.true; + + const ix = await tokenRouter.redeemCctpFillIx( + { + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }, + args + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + // NOTE: This is a CCTP Message Transmitter program error. + await expectIxErr( + connection, + [ix], + [payer, redeemer], + "Error Code: NonceAlreadyUsed", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + }); }); }); }); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 688a2826..9cb9f48b 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -1,7 +1,7 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import { BN } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; -import { Connection, Keypair, PublicKey } from "@solana/web3.js"; +import { Connection, Keypair, PublicKey, SYSVAR_RENT_PUBKEY } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; @@ -217,6 +217,44 @@ describe("Matching Engine <> Token Router", function () { ); }); + it("Token Router ..... Cannot Redeem Fast Fill with Invalid VAA Account (Not Owned by Core Bridge)", async function () { + const redeemer = Keypair.generate(); + + const amount = 69n; + const message = new LiquidityLayerMessage({ + fastFill: { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + amount, + }, + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + message, + "avalanche" + ); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + redeemer: redeemer.publicKey, + dstToken: payerToken, + }); + + // Replace the VAA account pubkey with garbage. + ix.keys[ix.keys.findIndex((key) => key.pubkey.equals(vaa))].pubkey = SYSVAR_RENT_PUBKEY; + + await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: ConstraintOwner"); + }); + it("Token Router ..... Cannot Redeem Fast Fill with Emitter Chain ID != Solana", async function () { const redeemer = Keypair.generate(); From 337cd855f394f1ce4b271139c8302fba33081a84 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 17 Jan 2024 17:08:08 -0600 Subject: [PATCH 056/126] solana: add execute_fast_order happy path tests --- .../matching-engine/src/state/custodian.rs | 4 +- solana/ts/tests/01__matchingEngine.ts | 209 +++++++++++++++++- solana/ts/tests/helpers/consts.ts | 2 + .../ts/tests/helpers/matching_engine_utils.ts | 41 +++- 4 files changed, 248 insertions(+), 8 deletions(-) diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index 427fa4e9..a46e83b2 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -76,11 +76,11 @@ impl Custodian { .checked_mul(penalty_period)? .checked_div(auction_penalty_slots)?, )?; - let reward = amount + let reward = penalty .checked_mul(user_penalty_reward_bps)? .checked_div(fee_precision)?; - return Some((penalty - reward, reward)); + return Some((penalty.checked_sub(reward).unwrap(), reward)); } } } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index c2e6b14c..1cbebcbd 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -20,6 +20,7 @@ import { } from "./helpers"; import { FastMarketOrder, + calculateDynamicPenalty, getBestOfferTokenAccount, getInitialOfferTokenAccount, getTokenBalance, @@ -943,8 +944,8 @@ describe("Matching Engine", function () { }); }); - describe("Execute Fast Order Within Grace Period", function () { - it("Execute Fast Order", async function () { + describe("Execute Fast Order", function () { + it("Execute Fast Order Within Grace Period", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. const [vaaKey, signedVaa] = await placeInitialOfferForTest( @@ -1050,6 +1051,210 @@ describe("Matching Engine", function () { ); expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); }); + + it("Execute Fast Order After Grace Period", async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Fetch the balances before. + const highestOfferBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + + // Fast forward into the grace period. + const txnSlot = await skip_slots(connection, 7); + + await expectIxOk( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne] + ); + + // Compute the expected penalty and user reward. + const [, expectedReward] = await calculateDynamicPenalty( + ( + await engine.fetchCustodian(engine.custodianAddress()) + ).auctionConfig, + Number(baseFastOrder.maxFee), + txnSlot - Number(auctionDataBefore.startSlot) + ); + + // Validate balance changes. + const highestOfferAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + + // The highest bidder is also the initial bidder in this case. The highest bidder + // is also executing the fast order after the grace period has ended, so they will + // be penalized by the expected user reward portion of the penalty. + expect(highestOfferAfter - highestOfferBefore).equals( + baseFastOrder.maxFee + + baseFastOrder.maxFee + + baseFastOrder.initAuctionFee - + BigInt(expectedReward) + ); + expect(custodyBefore - custodyAfter).equals( + baseFastOrder.amountIn + baseFastOrder.maxFee + ); + + // Validate auction data account. + expect(auctionDataAfter.bump).to.equal(254); + expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionDataAfter.status).to.eql({ completed: {} }); + expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); + expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); + expect(auctionDataAfter.startSlot.toString()).to.eql( + auctionDataBefore.startSlot.toString() + ); + expect(auctionDataAfter.amount.toString()).to.eql( + auctionDataBefore.amount.toString() + ); + expect(auctionDataAfter.securityDeposit.toString()).to.eql( + auctionDataBefore.securityDeposit.toString() + ); + expect(auctionDataAfter.offerPrice.toString()).to.eql( + baseFastOrder.maxFee.toString() + ); + }); + + it("Execute Fast Order After Grace Period (With Liquidator)", async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Fetch the balances before. + const highestOfferBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const liquidatorBefore = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); + const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + + // Fast forward into the grace period. + const txnSlot = await skip_slots(connection, 10); + + // Execute the fast order with the liquidator (offerAuthorityTwo). + await expectIxOk( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityTwo.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityTwo] + ); + + // Compute the expected penalty and user reward. + const [expectedPenalty, expectedReward] = await calculateDynamicPenalty( + ( + await engine.fetchCustodian(engine.custodianAddress()) + ).auctionConfig, + Number(baseFastOrder.maxFee), + txnSlot - Number(auctionDataBefore.startSlot) + ); + + // Validate balance changes. + const highestOfferAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const liquidatorAfter = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + + expect(highestOfferAfter - highestOfferBefore).equals( + baseFastOrder.maxFee + + baseFastOrder.maxFee + + baseFastOrder.initAuctionFee - + BigInt(expectedReward) - + BigInt(expectedPenalty) + ); + expect(liquidatorAfter - liquidatorBefore).equals(BigInt(expectedPenalty)); + expect(custodyBefore - custodyAfter).equals( + baseFastOrder.amountIn + baseFastOrder.maxFee + ); + + // Validate auction data account. + expect(auctionDataAfter.bump).to.equal(255); + expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionDataAfter.status).to.eql({ completed: {} }); + expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); + expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); + expect(auctionDataAfter.startSlot.toString()).to.eql( + auctionDataBefore.startSlot.toString() + ); + expect(auctionDataAfter.amount.toString()).to.eql( + auctionDataBefore.amount.toString() + ); + expect(auctionDataAfter.securityDeposit.toString()).to.eql( + auctionDataBefore.securityDeposit.toString() + ); + expect(auctionDataAfter.offerPrice.toString()).to.eql( + baseFastOrder.maxFee.toString() + ); + }); }); }); }); diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts index 7d6d9e77..918ed1f4 100644 --- a/solana/ts/tests/helpers/consts.ts +++ b/solana/ts/tests/helpers/consts.ts @@ -4,6 +4,8 @@ import { MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; export const SWAP_RATE_PRECISION = 10 ** 8; +export const MAX_BPS_FEE = 1_000_000; + export const WORMHOLE_CONTRACTS = CONTRACTS.TESTNET; export const CORE_BRIDGE_PID = new PublicKey(WORMHOLE_CONTRACTS.solana.core); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index a13a1471..f6fa637b 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -4,8 +4,8 @@ import { getAssociatedTokenAddressSync, getAccount } from "@solana/spl-token"; import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import { Connection, Keypair, PublicKey } from "@solana/web3.js"; import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; -import { WORMHOLE_CONTRACTS, USDC_MINT_ADDRESS } from "../../tests/helpers"; -import { MatchingEngineProgram } from "../../src/matchingEngine"; +import { WORMHOLE_CONTRACTS, USDC_MINT_ADDRESS, MAX_BPS_FEE } from "../../tests/helpers"; +import { AuctionConfig, MatchingEngineProgram } from "../../src/matchingEngine"; import { ethers } from "ethers"; export async function getTokenBalance(connection: Connection, address: PublicKey) { @@ -168,9 +168,42 @@ export async function getInitialOfferTokenAccount( const sleep = (ms = 0) => new Promise((resolve) => setTimeout(resolve, ms)); -export async function skip_slots(connection: Connection, slots: number) { +export async function skip_slots(connection: Connection, slots: number): Promise { const start = await connection.getSlot(); - while ((await connection.getSlot()) < start + slots) { + + while (true) { + const lastSlot = await connection.getSlot(); + if (lastSlot >= start + slots) { + return lastSlot + 1; + } await sleep(500); } } + +export async function calculateDynamicPenalty( + auctionConfig: AuctionConfig, + amount: number, + slotsElapsed: number +): Promise<[number, number]> { + if (slotsElapsed <= auctionConfig.auctionGracePeriod) { + return [0, 0]; + } + + const penaltyPeriod = slotsElapsed - auctionConfig.auctionGracePeriod; + if ( + penaltyPeriod >= auctionConfig.auctionPenaltySlots || + auctionConfig.initialPenaltyBps == 0 + ) { + const userReward = Math.floor((amount * auctionConfig.userPenaltyRewardBps) / MAX_BPS_FEE); + return [amount - userReward, userReward]; + } else { + const basePenalty = Math.floor(amount * auctionConfig.initialPenaltyBps) / MAX_BPS_FEE; + const penalty = Math.floor( + basePenalty + + ((amount - basePenalty) * penaltyPeriod) / auctionConfig.auctionPenaltySlots + ); + const userReward = Math.floor((penalty * auctionConfig.userPenaltyRewardBps) / MAX_BPS_FEE); + + return [penalty - userReward, userReward]; + } +} From 9249c7b98286b89f24c387f93c99c2cd0a4e2afe Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 17 Jan 2024 19:21:02 -0600 Subject: [PATCH 057/126] solana: add fill message verification in test --- .../matching-engine/src/state/custodian.rs | 2 - solana/ts/src/matchingEngine/index.ts | 8 +++ solana/ts/tests/01__matchingEngine.ts | 68 +++++++++++++++---- .../ts/tests/helpers/matching_engine_utils.ts | 19 ++++++ 4 files changed, 83 insertions(+), 14 deletions(-) diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index a46e83b2..08e044f6 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -22,8 +22,6 @@ pub struct AuctionConfig { pub auction_penalty_slots: u16, } -/// TODO: Whitelist USDC mint key. - #[account] #[derive(Debug, InitSpace)] pub struct Custodian { diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index e38d081a..717de6a4 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -288,6 +288,14 @@ export class MatchingEngineProgram { .instruction(); } + async getCoreMessage(payer: PublicKey): Promise { + const payerSequence = this.payerSequenceAddress(payer); + const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => + this.coreMessageAddress(payer, value) + ); + return coreMessage; + } + async placeInitialOfferIx( feeOffer: bigint, fromChain: wormholeSdk.ChainId, diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 1cbebcbd..f9deaad7 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -26,8 +26,8 @@ import { getTokenBalance, postFastTransferVaa, skip_slots, + verifyFillMessage, } from "./helpers/matching_engine_utils"; -import { ethers } from "ethers"; chaiUse(chaiAsPromised); @@ -701,11 +701,11 @@ describe("Matching Engine", function () { minAmountOut: 0n, targetChain: arbChain, targetDomain: arbDomain, - redeemer: Buffer.from("deadbeef", "hex"), - sender: Buffer.from("beefdead", "hex"), - refundAddress: Buffer.from("deadbeef", "hex"), + redeemer: Buffer.alloc(32, "deadbeef", "hex"), + sender: Buffer.alloc(32, "beefdead", "hex"), + refundAddress: Buffer.alloc(32, "beef", "hex"), slowSequence: 0n, - slowEmitter: Buffer.from("beefdead", "hex"), + slowEmitter: Buffer.alloc(32, "dead", "hex"), maxFee: 10000n, initAuctionFee: 100n, deadline: 0, @@ -831,7 +831,6 @@ describe("Matching Engine", function () { offerAuthorityOne.publicKey ); - expect(auctionData.bump).to.equal(254); expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionData.status).to.eql({ active: {} }); expect(auctionData.bestOfferToken).to.eql(offerToken); @@ -926,7 +925,6 @@ describe("Matching Engine", function () { offerAuthorityOne.publicKey ); - expect(auctionDataAfter.bump).to.equal(249); expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ active: {} }); expect(auctionDataAfter.bestOfferToken).to.eql(newOfferToken); @@ -1001,7 +999,7 @@ describe("Matching Engine", function () { // Fast forward into the grace period. await skip_slots(connection, 2); - + const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); await expectIxOk( connection, [ @@ -1035,7 +1033,6 @@ describe("Matching Engine", function () { ); // Validate auction data account. - expect(auctionDataAfter.bump).to.equal(250); expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ completed: {} }); expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); @@ -1050,6 +1047,20 @@ describe("Matching Engine", function () { auctionDataBefore.securityDeposit.toString() ); expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + + // Validate the core message. + await verifyFillMessage( + connection, + message, + baseFastOrder.amountIn - newOffer - baseFastOrder.initAuctionFee, + arbDomain, + { + sourceChain: ethChain, + orderSender: Array.from(baseFastOrder.sender), + redeemer: Array.from(baseFastOrder.redeemer), + redeemerMessage: baseFastOrder.redeemerMessage, + } + ); }); it("Execute Fast Order After Grace Period", async function () { @@ -1084,7 +1095,7 @@ describe("Matching Engine", function () { // Fast forward into the grace period. const txnSlot = await skip_slots(connection, 7); - + const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); await expectIxOk( connection, [ @@ -1131,7 +1142,6 @@ describe("Matching Engine", function () { ); // Validate auction data account. - expect(auctionDataAfter.bump).to.equal(254); expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ completed: {} }); expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); @@ -1148,6 +1158,23 @@ describe("Matching Engine", function () { expect(auctionDataAfter.offerPrice.toString()).to.eql( baseFastOrder.maxFee.toString() ); + + // Validate the core message. + await verifyFillMessage( + connection, + message, + baseFastOrder.amountIn - + baseFastOrder.maxFee - + baseFastOrder.initAuctionFee + + BigInt(expectedReward), + arbDomain, + { + sourceChain: ethChain, + orderSender: Array.from(baseFastOrder.sender), + redeemer: Array.from(baseFastOrder.redeemer), + redeemerMessage: baseFastOrder.redeemerMessage, + } + ); }); it("Execute Fast Order After Grace Period (With Liquidator)", async function () { @@ -1188,6 +1215,7 @@ describe("Matching Engine", function () { const txnSlot = await skip_slots(connection, 10); // Execute the fast order with the liquidator (offerAuthorityTwo). + const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); await expectIxOk( connection, [ @@ -1237,7 +1265,6 @@ describe("Matching Engine", function () { ); // Validate auction data account. - expect(auctionDataAfter.bump).to.equal(255); expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ completed: {} }); expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); @@ -1254,6 +1281,23 @@ describe("Matching Engine", function () { expect(auctionDataAfter.offerPrice.toString()).to.eql( baseFastOrder.maxFee.toString() ); + + // Validate the core message. + await verifyFillMessage( + connection, + message, + baseFastOrder.amountIn - + baseFastOrder.maxFee - + baseFastOrder.initAuctionFee + + BigInt(expectedReward), + arbDomain, + { + sourceChain: ethChain, + orderSender: Array.from(baseFastOrder.sender), + redeemer: Array.from(baseFastOrder.redeemer), + redeemerMessage: baseFastOrder.redeemerMessage, + } + ); }); }); }); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index f6fa637b..fe67c8a8 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -6,7 +6,11 @@ import { Connection, Keypair, PublicKey } from "@solana/web3.js"; import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; import { WORMHOLE_CONTRACTS, USDC_MINT_ADDRESS, MAX_BPS_FEE } from "../../tests/helpers"; import { AuctionConfig, MatchingEngineProgram } from "../../src/matchingEngine"; +import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import { ethers } from "ethers"; +import { Fill, LiquidityLayerMessage } from "../../src"; + +import { expect } from "chai"; export async function getTokenBalance(connection: Connection, address: PublicKey) { return ( @@ -207,3 +211,18 @@ export async function calculateDynamicPenalty( return [penalty - userReward, userReward]; } } + +export async function verifyFillMessage( + connection: Connection, + message: PublicKey, + amount: bigint, + targetDomain: number, + expectedFill: Fill +) { + const fillPayload = (await getPostedMessage(connection, message)).message.payload; + const parsed = LiquidityLayerMessage.decode(fillPayload); + + expect(parsed.deposit?.header.amount).to.equal(amount); + expect(parsed.deposit?.header.destinationCctpDomain).to.equal(targetDomain); + expect(parsed.deposit?.message.fill).to.deep.equal(expectedFill); +} From 0b25f449e7b961d6e617a80dbd9c1cee5197b770 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Thu, 18 Jan 2024 10:14:12 -0600 Subject: [PATCH 058/126] solana: refactor execute_fast_order --- .../processor/auction/execute_fast_order.rs | 162 ++------------ .../src/processor/auction/mod.rs | 203 ++++++++++++++++-- 2 files changed, 202 insertions(+), 163 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs index b363affe..2b162318 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs @@ -1,12 +1,12 @@ use crate::{ error::MatchingEngineError, - send_cctp, + handle_fast_order_execution, send_cctp, state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, - CctpAccounts, + CctpAccounts, ExecuteFastOrderAccounts, }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::{messages::raw::LiquidityLayerPayload, wormhole_io::TypePrefixedPayload}; +use common::wormhole_io::TypePrefixedPayload; use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, @@ -56,6 +56,9 @@ pub struct ExecuteFastOrder<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = { + to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Account<'info, RouterEndpoint>, @@ -170,113 +173,16 @@ pub struct ExecuteFastOrder<'info> { } pub fn execute_fast_order(ctx: Context) -> Result<()> { - let slots_elapsed = Clock::get()?.slot - ctx.accounts.auction_data.start_slot; - let auction_config = &ctx.accounts.custodian.auction_config; - require!( - slots_elapsed > auction_config.auction_duration.into(), - MatchingEngineError::AuctionPeriodNotExpired - ); - - // Create zero copy reference to `FastMarketOrder` payload. - let vaa = VaaAccount::load(&ctx.accounts.vaa)?; - let msg = LiquidityLayerPayload::try_from(vaa.try_payload()?) - .map_err(|_| MatchingEngineError::InvalidVaa)? - .message(); - let fast_order = msg - .fast_market_order() - .ok_or(MatchingEngineError::NotFastMarketOrder)?; - let auction_data = &mut ctx.accounts.auction_data; - - // Save the custodian seeds to sign transfers with. - let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; - - // We need to save the reward for the user so we include it when sending the CCTP transfer. - let mut user_reward: u64 = 0; - - if slots_elapsed > u64::try_from(auction_config.auction_grace_period).unwrap() { - let (penalty, reward) = ctx - .accounts - .custodian - .calculate_dynamic_penalty(auction_data.security_deposit, slots_elapsed) - .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; - - // Save user reward for CCTP transfer. - user_reward = reward; - - // If caller passes in the same token account, only perform one transfer. - if ctx.accounts.best_offer_token.key() == ctx.accounts.executor_token.key() { - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.best_offer_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - auction_data - .offer_price - .checked_add(auction_data.security_deposit) - .unwrap() - .checked_sub(reward) - .unwrap(), - )?; - } else { - // Pay the liquidator the penalty. - if penalty > 0 { - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.executor_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - penalty, - )?; - } - - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.best_offer_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - auction_data - .offer_price - .checked_add(auction_data.security_deposit) - .unwrap() - .checked_sub(reward) - .unwrap() - .checked_sub(penalty) - .unwrap(), - )?; - } - } else { - // Return the security deposit and the fee to the highest bidder. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.best_offer_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - auction_data - .offer_price - .checked_add(auction_data.security_deposit) - .unwrap(), - )?; - } + let cctp_args = handle_fast_order_execution(ExecuteFastOrderAccounts { + custodian: &ctx.accounts.custodian, + vaa: &ctx.accounts.vaa, + auction_data: &mut ctx.accounts.auction_data, + custody_token: &ctx.accounts.custody_token, + executor_token: &ctx.accounts.executor_token, + best_offer_token: &ctx.accounts.best_offer_token, + initial_offer_token: &ctx.accounts.initial_offer_token, + token_program: &ctx.accounts.token_program, + })?; // Send the CCTP message to the destination chain. send_cctp( @@ -307,41 +213,11 @@ pub fn execute_fast_order(ctx: Context) -> Result<()> { clock: &ctx.accounts.clock, rent: &ctx.accounts.rent, }, - auction_data - .amount - .checked_sub(auction_data.offer_price) - .unwrap() - .checked_sub(u64::try_from(fast_order.init_auction_fee()).unwrap()) - .unwrap() - .checked_add(user_reward) - .unwrap(), - fast_order.destination_cctp_domain(), - common::messages::Fill { - source_chain: vaa.try_emitter_chain()?, - order_sender: fast_order.sender(), - redeemer: fast_order.redeemer(), - redeemer_message: <&[u8]>::from(fast_order.redeemer_message()).to_vec().into(), - } - .to_vec_payload(), + cctp_args.transfer_amount, + cctp_args.cctp_destination_domain, + cctp_args.fill.to_vec_payload(), ctx.bumps["core_message"], )?; - // Pay the auction initiator their fee. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.initial_offer_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[&custodian_seeds[..]], - ), - u64::try_from(fast_order.init_auction_fee()).unwrap(), - )?; - - // Set the auction status to completed. - auction_data.status = AuctionStatus::Completed; - Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 75d3a9e0..21e1c92e 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -12,33 +12,16 @@ use anchor_spl::token; use crate::{ error::MatchingEngineError, - state::{Custodian, PayerSequence, RouterEndpoint}, + state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, }; +use common::messages::raw::LiquidityLayerPayload; use wormhole_cctp_solana::wormhole::core_bridge_program::sdk::EmitterInfo; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, wormhole::core_bridge_program, }; -pub fn verify_router_path( - from_router_endpoint: &RouterEndpoint, - to_router_endpoint: &RouterEndpoint, - emitter_info: &EmitterInfo, - target_chain: u16, -) -> Result<()> { - require!( - from_router_endpoint.chain == emitter_info.chain - && from_router_endpoint.address == emitter_info.address, - MatchingEngineError::InvalidEndpoint - ); - require!( - to_router_endpoint.chain == target_chain && to_router_endpoint.address != [0u8; 32], - MatchingEngineError::InvalidEndpoint - ); - - Ok(()) -} - pub struct CctpAccounts<'ctx, 'info> { payer: &'ctx Signer<'info>, custodian: &'ctx Account<'info, Custodian>, @@ -67,6 +50,167 @@ pub struct CctpAccounts<'ctx, 'info> { rent: &'ctx AccountInfo<'info>, } +pub struct ExecuteFastOrderAccounts<'ctx, 'info> { + custodian: &'ctx Account<'info, Custodian>, + vaa: &'ctx AccountInfo<'info>, + auction_data: &'ctx mut Box>, + custody_token: &'ctx AccountInfo<'info>, + executor_token: &'ctx Account<'info, token::TokenAccount>, + best_offer_token: &'ctx AccountInfo<'info>, + initial_offer_token: &'ctx AccountInfo<'info>, + token_program: &'ctx Program<'info, token::Token>, +} + +pub struct ReturnArgs { + pub transfer_amount: u64, + pub cctp_destination_domain: u32, + pub fill: common::messages::Fill, +} + +pub fn handle_fast_order_execution(accounts: ExecuteFastOrderAccounts) -> Result { + let slots_elapsed = Clock::get()?.slot - accounts.auction_data.start_slot; + let auction_config = &accounts.custodian.auction_config; + require!( + slots_elapsed > auction_config.auction_duration.into(), + MatchingEngineError::AuctionPeriodNotExpired + ); + + // Create zero copy reference to `FastMarketOrder` payload. + let vaa = VaaAccount::load(accounts.vaa)?; + let msg = LiquidityLayerPayload::try_from(vaa.try_payload()?) + .map_err(|_| MatchingEngineError::InvalidVaa)? + .message(); + let fast_order = msg + .fast_market_order() + .ok_or(MatchingEngineError::NotFastMarketOrder)?; + let auction_data = accounts.auction_data; + + // Save the custodian seeds to sign transfers with. + let custodian_seeds = &[Custodian::SEED_PREFIX, &[accounts.custodian.bump]]; + + // We need to save the reward for the user so we include it when sending the CCTP transfer. + let mut user_reward: u64 = 0; + + if slots_elapsed > u64::try_from(auction_config.auction_grace_period).unwrap() { + let (penalty, reward) = accounts + .custodian + .calculate_dynamic_penalty(auction_data.security_deposit, slots_elapsed) + .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; + + // Save user reward for CCTP transfer. + user_reward = reward; + + // If caller passes in the same token account, only perform one transfer. + if accounts.best_offer_token.key() == accounts.executor_token.key() { + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.best_offer_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + auction_data + .offer_price + .checked_add(auction_data.security_deposit) + .unwrap() + .checked_sub(reward) + .unwrap(), + )?; + } else { + // Pay the liquidator the penalty. + if penalty > 0 { + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.executor_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + penalty, + )?; + } + + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.best_offer_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + auction_data + .offer_price + .checked_add(auction_data.security_deposit) + .unwrap() + .checked_sub(reward) + .unwrap() + .checked_sub(penalty) + .unwrap(), + )?; + } + } else { + // Return the security deposit and the fee to the highest bidder. + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.best_offer_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + auction_data + .offer_price + .checked_add(auction_data.security_deposit) + .unwrap(), + )?; + } + + // Pay the auction initiator their fee. + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.initial_offer_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[&custodian_seeds[..]], + ), + u64::try_from(fast_order.init_auction_fee()).unwrap(), + )?; + + // Set the auction status to completed. + auction_data.status = AuctionStatus::Completed; + + Ok(ReturnArgs { + transfer_amount: auction_data + .amount + .checked_sub(auction_data.offer_price) + .unwrap() + .checked_sub(u64::try_from(fast_order.init_auction_fee()).unwrap()) + .unwrap() + .checked_add(user_reward) + .unwrap(), + cctp_destination_domain: fast_order.destination_cctp_domain(), + fill: common::messages::Fill { + source_chain: vaa.try_emitter_chain()?, + order_sender: fast_order.sender(), + redeemer: fast_order.redeemer(), + redeemer_message: <&[u8]>::from(fast_order.redeemer_message()).to_vec().into(), + }, + }) +} + pub fn send_cctp( accounts: CctpAccounts, amount: u64, @@ -139,3 +283,22 @@ pub fn send_cctp( Ok(()) } + +pub fn verify_router_path( + from_router_endpoint: &RouterEndpoint, + to_router_endpoint: &RouterEndpoint, + emitter_info: &EmitterInfo, + target_chain: u16, +) -> Result<()> { + require!( + from_router_endpoint.chain == emitter_info.chain + && from_router_endpoint.address == emitter_info.address, + MatchingEngineError::InvalidEndpoint + ); + require!( + to_router_endpoint.chain == target_chain && to_router_endpoint.address != [0u8; 32], + MatchingEngineError::InvalidEndpoint + ); + + Ok(()) +} From c26e9b6056eed2d0220cfe753dbf0c7fc0bfbecd Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 18 Jan 2024 10:15:48 -0600 Subject: [PATCH 059/126] solana: execute slow order (WIP) --- solana/programs/matching-engine/src/error.rs | 6 + solana/programs/matching-engine/src/lib.rs | 7 + .../execute_slow_order/auction_completed.rs | 173 ++++++++++++++++++ .../src/processor/execute_slow_order/mod.rs | 130 +++++++++++++ .../matching-engine/src/processor/mod.rs | 3 + 5 files changed, 319 insertions(+) create mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs create mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index d15fc354..83b66907 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -94,6 +94,9 @@ pub enum MatchingEngineError { #[msg("InvalidPayloadId")] InvalidPayloadId, + #[msg("InvalidDepositPayloadId")] + InvalidDepositPayloadId, + #[msg("AuctionNotActive")] AuctionNotActive, @@ -111,4 +114,7 @@ pub enum MatchingEngineError { #[msg("PenaltyCalculationFailed")] PenaltyCalculationFailed, + + #[msg("VaaMismatch")] + VaaMismatch, } diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 729449ee..df63db61 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -29,6 +29,13 @@ pub mod matching_engine { processor::redeem_fast_fill(ctx) } + pub fn execute_slow_order_auction_completed( + ctx: Context, + args: CctpMessageArgs, + ) -> Result<()> { + processor::execute_slow_order_auction_completed(ctx, args) + } + /// This instruction is be used to generate your program's config. /// And for convenience, we will store Wormhole-related PDAs in the /// config so we can verify these accounts with a simple == constraint. diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs new file mode 100644 index 00000000..d35f52d0 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs @@ -0,0 +1,173 @@ +use crate::state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, +}; + +use super::CctpMessageArgs; + +#[derive(Accounts)] +pub struct ExecuteSlowOrderAuctionCompleted<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + finalized_vaa: AccountInfo<'info>, + + #[account( + seeds = [ + AuctionData::SEED_PREFIX, + VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), + ], + bump = auction_data.bump, + constraint = auction_data.status == AuctionStatus::Completed // TODO: add error + )] + auction_data: Account<'info, AuctionData>, + + /// Redeemer, who owns the token account that will receive the minted tokens. + /// + /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. + redeemer: Signer<'info>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + dst_token: AccountInfo<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + /// Registered emitter account representing a Circle Integration on another network. + /// + /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = router_endpoint.bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). + message_transmitter_authority: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + message_transmitter_config: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), + /// first_nonce.to_string()\] (CCTP Message Transmitter program). + #[account(mut)] + used_nonces: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Token Messenger Minter's Local Token account. This program uses the mint of this account to + /// validate the `mint_recipient` token account's mint. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP + /// Token Messenger Minter program). + token_pair: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + token_messenger_minter_custody_token: AccountInfo<'info>, + + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +pub fn execute_slow_order_auction_completed( + ctx: Context, + args: CctpMessageArgs, +) -> Result<()> { + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + + // NOTE: We do not need the return values here for this instruction. + super::prepare_execute_slow_order( + &fast_vaa, + super::PrepareExecuteSlowOrder { + payer: &ctx.accounts.payer, + custodian: &ctx.accounts.custodian, + finalized_vaa: &ctx.accounts.finalized_vaa, + custody_token: ctx.accounts.custody_token.as_ref(), + message_transmitter_authority: &ctx.accounts.message_transmitter_authority, + message_transmitter_config: &ctx.accounts.message_transmitter_config, + used_nonces: &ctx.accounts.used_nonces, + token_messenger: &ctx.accounts.token_messenger, + remote_token_messenger: &ctx.accounts.remote_token_messenger, + token_minter: &ctx.accounts.token_minter, + local_token: &ctx.accounts.local_token, + token_pair: &ctx.accounts.token_pair, + token_messenger_minter_custody_token: &ctx + .accounts + .token_messenger_minter_custody_token, + message_transmitter_program: &ctx.accounts.message_transmitter_program, + token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + }, + args, + )?; + + // Finally transfer the funds back to the highest bidder. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.dst_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + ctx.accounts.auction_data.amount, + ) +} diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs new file mode 100644 index 00000000..9d4e5e9a --- /dev/null +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs @@ -0,0 +1,130 @@ +mod auction_completed; +pub use auction_completed::*; + +use crate::{error::MatchingEngineError, state::Custodian}; +use anchor_lang::prelude::*; +use common::messages::raw::{FastMarketOrder, LiquidityLayerDepositMessage, LiquidityLayerMessage}; +use wormhole_cctp_solana::{ + cctp::message_transmitter_program, wormhole::core_bridge_program::VaaAccount, +}; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct CctpMessageArgs { + pub encoded_cctp_message: Vec, + pub cctp_attestation: Vec, +} + +pub(self) struct PrepareExecuteSlowOrder<'ctx, 'info> { + payer: &'ctx Signer<'info>, + custodian: &'ctx Account<'info, Custodian>, + finalized_vaa: &'ctx AccountInfo<'info>, + custody_token: &'ctx AccountInfo<'info>, + message_transmitter_authority: &'ctx AccountInfo<'info>, + message_transmitter_config: &'ctx AccountInfo<'info>, + used_nonces: &'ctx AccountInfo<'info>, + token_messenger: &'ctx AccountInfo<'info>, + remote_token_messenger: &'ctx AccountInfo<'info>, + token_minter: &'ctx AccountInfo<'info>, + local_token: &'ctx AccountInfo<'info>, + token_pair: &'ctx AccountInfo<'info>, + token_messenger_minter_custody_token: &'ctx AccountInfo<'info>, + message_transmitter_program: &'ctx AccountInfo<'info>, + token_messenger_minter_program: &'ctx AccountInfo<'info>, + token_program: &'ctx AccountInfo<'info>, + system_program: &'ctx AccountInfo<'info>, +} + +pub(self) fn prepare_execute_slow_order<'ix, 'accts, 'info>( + fast_vaa: &'ix VaaAccount<'accts>, + accounts: PrepareExecuteSlowOrder<'accts, 'info>, + args: CctpMessageArgs, +) -> Result<(FastMarketOrder<'accts>, u128)> +where + 'ix: 'accts, +{ + let custodian_bump = accounts.custodian.bump; + + let finalized_vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( + &accounts.finalized_vaa, + CpiContext::new_with_signer( + accounts.message_transmitter_program.to_account_info(), + message_transmitter_program::cpi::ReceiveTokenMessengerMinterMessage { + payer: accounts.payer.to_account_info(), + caller: accounts.custodian.to_account_info(), + message_transmitter_authority: accounts + .message_transmitter_authority + .to_account_info(), + message_transmitter_config: accounts.message_transmitter_config.to_account_info(), + used_nonces: accounts.used_nonces.to_account_info(), + token_messenger_minter_program: accounts + .token_messenger_minter_program + .to_account_info(), + system_program: accounts.system_program.to_account_info(), + token_messenger: accounts.token_messenger.to_account_info(), + remote_token_messenger: accounts.remote_token_messenger.to_account_info(), + token_minter: accounts.token_minter.to_account_info(), + local_token: accounts.local_token.to_account_info(), + token_pair: accounts.token_pair.to_account_info(), + mint_recipient: accounts.custody_token.to_account_info(), + custody_token: accounts + .token_messenger_minter_custody_token + .to_account_info(), + token_program: accounts.token_program.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[custodian_bump]]], + ), + wormhole_cctp_solana::cpi::ReceiveMessageArgs { + encoded_message: args.encoded_cctp_message, + attestation: args.cctp_attestation, + }, + )?; + + // Reconcile fast VAA with finalized VAA. + { + let fast_emitter = fast_vaa.try_emitter_info().unwrap(); + let finalized_emitter = finalized_vaa.try_emitter_info().unwrap(); + require_eq!( + fast_emitter.chain, + finalized_emitter.chain, + MatchingEngineError::VaaMismatch + ); + require!( + fast_emitter.address == finalized_emitter.address, + MatchingEngineError::VaaMismatch + ); + require_eq!( + fast_emitter.sequence + 1, + finalized_emitter.sequence, + MatchingEngineError::VaaMismatch + ); + require!( + fast_vaa.try_timestamp().unwrap() == finalized_vaa.try_timestamp().unwrap(), + MatchingEngineError::VaaMismatch + ); + } + + // This should be infallible because: + // 1. We know that the fast VAA was used to start this auction (using its hash for the + // auction data PDA). + // 2. The finalized VAA's sequence is one greater than the fast VAA's sequence. + // + // However, we will still process results in case Token Router implementation renders any of + // these assumptions invalid. + let finalized_msg = LiquidityLayerMessage::try_from(finalized_vaa.try_payload().unwrap()) + .map_err(|_| error!(MatchingEngineError::InvalidVaa))?; + let deposit = finalized_msg + .deposit() + .ok_or(MatchingEngineError::InvalidPayloadId)?; + let deposit_msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) + .map_err(|_| error!(MatchingEngineError::InvalidDepositMessage))?; + let slow_order_response = deposit_msg + .slow_order_response() + .ok_or(MatchingEngineError::InvalidDepositPayloadId)?; + + Ok(( + LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) + .unwrap() + .to_fast_market_order_unchecked(), + slow_order_response.base_fee(), + )) +} diff --git a/solana/programs/matching-engine/src/processor/mod.rs b/solana/programs/matching-engine/src/processor/mod.rs index afb82734..33d60f15 100644 --- a/solana/programs/matching-engine/src/processor/mod.rs +++ b/solana/programs/matching-engine/src/processor/mod.rs @@ -4,5 +4,8 @@ pub use admin::*; mod auction; pub use auction::*; +mod execute_slow_order; +pub use execute_slow_order::*; + mod redeem_fast_fill; pub use redeem_fast_fill::*; From ff39b36ccbdbc2538c4920bf5700c73a7fdbfe8b Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 18 Jan 2024 10:46:49 -0600 Subject: [PATCH 060/126] solana: more wip; uptick wormhole-cctp-solana to 0.0.1-alpha.3 --- solana/Cargo.lock | 4 +- solana/Cargo.toml | 2 +- solana/programs/matching-engine/src/lib.rs | 7 + .../src/processor/auction/mod.rs | 2 +- .../src/processor/execute_slow_order/mod.rs | 3 + .../execute_slow_order/no_auction.rs | 192 ++++++++++++++++++ 6 files changed, 206 insertions(+), 4 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index e91e784c..6e904f95 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2415,9 +2415,9 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.0.1-alpha.2" +version = "0.0.1-alpha.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ed46fab23137cc483e25fd9be674e80805f31140eae1f7b86030d6e22d9870dd" +checksum = "f39e17a44f92c20a4455560e6a7fa1216745eb44e3bc5e29fcbc18fccab49125" dependencies = [ "anchor-lang", "anchor-spl", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index a2134aff..600fd50a 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -21,7 +21,7 @@ path = "modules/common" path = "programs/matching-engine" [workspace.dependencies.wormhole-cctp-solana] -version = "0.0.1-alpha.2" +version = "0.0.1-alpha.3" default-features = false [workspace.dependencies.wormhole-raw-vaas] diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index df63db61..e16442c9 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -36,6 +36,13 @@ pub mod matching_engine { processor::execute_slow_order_auction_completed(ctx, args) } + pub fn execute_slow_order_no_auction( + ctx: Context, + args: CctpMessageArgs, + ) -> Result<()> { + processor::execute_slow_order_no_auction(ctx, args) + } + /// This instruction is be used to generate your program's config. /// And for convenience, we will store Wormhole-related PDAs in the /// config so we can verify these accounts with a simple == constraint. diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 21e1c92e..728f6234 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -273,7 +273,7 @@ pub fn send_cctp( wormhole_cctp_solana::cpi::BurnAndPublishArgs { burn_source: accounts.custody_token.key(), destination_caller: accounts.to_router_endpoint.address, - destination_cctp_domain: destination_cctp_domain, + destination_cctp_domain, amount, mint_recipient: accounts.to_router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs index 9d4e5e9a..aa908460 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs @@ -1,6 +1,9 @@ mod auction_completed; pub use auction_completed::*; +mod no_auction; +pub use no_auction::*; + use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; use common::messages::raw::{FastMarketOrder, LiquidityLayerDepositMessage, LiquidityLayerMessage}; diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs new file mode 100644 index 00000000..93370553 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs @@ -0,0 +1,192 @@ +use crate::state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, +}; + +use super::CctpMessageArgs; + +#[derive(Accounts)] +pub struct ExecuteSlowOrderNoAuction<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + finalized_vaa: AccountInfo<'info>, + + /// CHECK: There should be no account data here because an auction was never created. + #[account( + init, + payer = payer, + space = 8 + AuctionData::INIT_SPACE, + seeds = [ + AuctionData::SEED_PREFIX, + VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), + ], + bump, + )] + auction_data: Account<'info, AuctionData>, + + /// Redeemer, who owns the token account that will receive the minted tokens. + /// + /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. + redeemer: Signer<'info>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + dst_token: AccountInfo<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + /// Registered emitter account representing a Circle Integration on another network. + /// + /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = router_endpoint.bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). + message_transmitter_authority: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + message_transmitter_config: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), + /// first_nonce.to_string()\] (CCTP Message Transmitter program). + #[account(mut)] + used_nonces: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Token Messenger Minter's Local Token account. This program uses the mint of this account to + /// validate the `mint_recipient` token account's mint. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP + /// Token Messenger Minter program). + token_pair: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + token_messenger_minter_custody_token: AccountInfo<'info>, + + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +pub fn execute_slow_order_no_auction( + ctx: Context, + args: CctpMessageArgs, +) -> Result<()> { + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + + // NOTE: We do not need the return values here for this instruction. + super::prepare_execute_slow_order( + &fast_vaa, + super::PrepareExecuteSlowOrder { + payer: &ctx.accounts.payer, + custodian: &ctx.accounts.custodian, + finalized_vaa: &ctx.accounts.finalized_vaa, + custody_token: ctx.accounts.custody_token.as_ref(), + message_transmitter_authority: &ctx.accounts.message_transmitter_authority, + message_transmitter_config: &ctx.accounts.message_transmitter_config, + used_nonces: &ctx.accounts.used_nonces, + token_messenger: &ctx.accounts.token_messenger, + remote_token_messenger: &ctx.accounts.remote_token_messenger, + token_minter: &ctx.accounts.token_minter, + local_token: &ctx.accounts.local_token, + token_pair: &ctx.accounts.token_pair, + token_messenger_minter_custody_token: &ctx + .accounts + .token_messenger_minter_custody_token, + message_transmitter_program: &ctx.accounts.message_transmitter_program, + token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + }, + args, + )?; + + // TODO: + // // SECURITY: We need to verify the router path, since an auction was never created + // // and this check is done in `placeInitialBid`. + // _verifyRouterPath( + // cctpVaa.emitterChainId, + // cctpVaa.emitterAddress, + // order.targetChain, + // ); + + // sequence = _handleCctpTransfer(order.amountIn - baseFee, cctpVaa.emitterChainId, order); + + // /** + // * Pay the `feeRecipient` the `baseFee`. This ensures that the protocol relayer + // * is paid for relaying slow VAAs that do not have an associated auction. + // * This prevents the protocol relayer from any MEV attacks. + // */ + // SafeERC20.safeTransfer(_token, feeRecipient(), baseFee); + + // /* + // * SECURITY: this is a necessary security check. This will prevent a relayer from + // * starting an auction with the fast transfer VAA, even though the slow + // * relayer already delivered the slow VAA. Not setting this could lead + // * to trapped funds (which would require an upgrade to fix). + // */ + // auction.status = AuctionStatus.Completed; + + ctx.accounts.auction_data.status = AuctionStatus::Completed; + + Ok(()) +} From 796ba3c3d3abbb12ca4f00b91008329c61bb929a Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 18 Jan 2024 11:12:02 -0600 Subject: [PATCH 061/126] solana: some clean up; fix clippy --- solana/programs/matching-engine/src/lib.rs | 3 +- .../src/processor/admin/initialize.rs | 8 ++--- .../src/processor/auction/mod.rs | 24 ++------------ .../processor/auction/place_initial_offer.rs | 2 +- .../execute_slow_order/auction_completed.rs | 24 +++----------- .../src/processor/execute_slow_order/mod.rs | 6 ++-- .../execute_slow_order/no_auction.rs | 6 ++-- .../matching-engine/src/state/custodian.rs | 14 ++++----- .../programs/matching-engine/src/utils/mod.rs | 31 +++++++++++++++++++ 9 files changed, 57 insertions(+), 61 deletions(-) create mode 100644 solana/programs/matching-engine/src/utils/mod.rs diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index e16442c9..9901dae1 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -7,7 +7,8 @@ mod processor; pub(crate) use processor::*; pub mod state; -use crate::state::AuctionConfig; + +pub mod utils; use anchor_lang::prelude::*; diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index e4f452c8..9d1b54c4 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -1,12 +1,12 @@ -use crate::{ - error::MatchingEngineError, - state::{AuctionConfig, Custodian}, -}; +use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; use anchor_spl::token; use common::constants::FEE_PRECISION_MAX; use solana_program::bpf_loader_upgradeable; +// Because this is used as the args for initialize, we'll make it public here. +pub use crate::state::AuctionConfig; + #[derive(Accounts)] pub struct Initialize<'info> { /// Owner of the program, who presumably deployed this program. diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 728f6234..ec298ae9 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -15,7 +15,6 @@ use crate::{ state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, }; use common::messages::raw::LiquidityLayerPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program::sdk::EmitterInfo; use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, @@ -91,7 +90,7 @@ pub fn handle_fast_order_execution(accounts: ExecuteFastOrderAccounts) -> Result // We need to save the reward for the user so we include it when sending the CCTP transfer. let mut user_reward: u64 = 0; - if slots_elapsed > u64::try_from(auction_config.auction_grace_period).unwrap() { + if slots_elapsed > auction_config.auction_grace_period.into() { let (penalty, reward) = accounts .custodian .calculate_dynamic_penalty(auction_data.security_deposit, slots_elapsed) @@ -218,7 +217,7 @@ pub fn send_cctp( payload: Vec, core_message_bump: u8, ) -> Result<()> { - let authority_seeds = &[Custodian::SEED_PREFIX.as_ref(), &[accounts.custodian.bump]]; + let authority_seeds = &[Custodian::SEED_PREFIX, &[accounts.custodian.bump]]; wormhole_cctp_solana::cpi::burn_and_publish( CpiContext::new_with_signer( @@ -283,22 +282,3 @@ pub fn send_cctp( Ok(()) } - -pub fn verify_router_path( - from_router_endpoint: &RouterEndpoint, - to_router_endpoint: &RouterEndpoint, - emitter_info: &EmitterInfo, - target_chain: u16, -) -> Result<()> { - require!( - from_router_endpoint.chain == emitter_info.chain - && from_router_endpoint.address == emitter_info.address, - MatchingEngineError::InvalidEndpoint - ); - require!( - to_router_endpoint.chain == target_chain && to_router_endpoint.address != [0u8; 32], - MatchingEngineError::InvalidEndpoint - ); - - Ok(()) -} diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index ad054def..0acbb581 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -102,7 +102,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R require!(fee_offer <= max_fee, MatchingEngineError::OfferPriceTooHigh); // Verify that the to and from router endpoints are valid. - crate::processor::verify_router_path( + crate::utils::verify_router_path( &ctx.accounts.from_router_endpoint, &ctx.accounts.to_router_endpoint, &vaa.try_emitter_info().unwrap(), diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs index d35f52d0..d4b58ff7 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs @@ -1,4 +1,4 @@ -use crate::state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}; +use crate::state::{AuctionData, AuctionStatus, Custodian}; use anchor_lang::prelude::*; use anchor_spl::token; use wormhole_cctp_solana::{ @@ -38,22 +38,18 @@ pub struct ExecuteSlowOrderAuctionCompleted<'info> { VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), ], bump = auction_data.bump, + has_one = best_offer_token, constraint = auction_data.status == AuctionStatus::Completed // TODO: add error )] auction_data: Account<'info, AuctionData>, - /// Redeemer, who owns the token account that will receive the minted tokens. - /// - /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. - redeemer: Signer<'info>, - /// Destination token account, which the redeemer may not own. But because the redeemer is a /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent /// to any account he chooses (this one). /// /// CHECK: This token account must already exist. #[account(mut)] - dst_token: AccountInfo<'info>, + best_offer_token: AccountInfo<'info>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -69,18 +65,6 @@ pub struct ExecuteSlowOrderAuctionCompleted<'info> { )] custody_token: Account<'info, token::TokenAccount>, - /// Registered emitter account representing a Circle Integration on another network. - /// - /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. - #[account( - seeds = [ - RouterEndpoint::SEED_PREFIX, - router_endpoint.chain.to_be_bytes().as_ref(), - ], - bump = router_endpoint.bump, - )] - router_endpoint: Account<'info, RouterEndpoint>, - /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). message_transmitter_authority: UncheckedAccount<'info>, @@ -163,7 +147,7 @@ pub fn execute_slow_order_auction_completed( ctx.accounts.token_program.to_account_info(), token::Transfer { from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.dst_token.to_account_info(), + to: ctx.accounts.best_offer_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs index aa908460..5484aaf6 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs @@ -17,7 +17,7 @@ pub struct CctpMessageArgs { pub cctp_attestation: Vec, } -pub(self) struct PrepareExecuteSlowOrder<'ctx, 'info> { +pub struct PrepareExecuteSlowOrder<'ctx, 'info> { payer: &'ctx Signer<'info>, custodian: &'ctx Account<'info, Custodian>, finalized_vaa: &'ctx AccountInfo<'info>, @@ -37,7 +37,7 @@ pub(self) struct PrepareExecuteSlowOrder<'ctx, 'info> { system_program: &'ctx AccountInfo<'info>, } -pub(self) fn prepare_execute_slow_order<'ix, 'accts, 'info>( +pub fn prepare_execute_slow_order<'ix, 'accts, 'info>( fast_vaa: &'ix VaaAccount<'accts>, accounts: PrepareExecuteSlowOrder<'accts, 'info>, args: CctpMessageArgs, @@ -48,7 +48,7 @@ where let custodian_bump = accounts.custodian.bump; let finalized_vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( - &accounts.finalized_vaa, + accounts.finalized_vaa, CpiContext::new_with_signer( accounts.message_transmitter_program.to_account_info(), message_transmitter_program::cpi::ReceiveTokenMessengerMinterMessage { diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs index 93370553..aeb2597d 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs @@ -32,7 +32,7 @@ pub struct ExecuteSlowOrderNoAuction<'info> { #[account(owner = core_bridge_program::id())] finalized_vaa: AccountInfo<'info>, - /// CHECK: There should be no account data here because an auction was never created. + /// There should be no account data here because an auction was never created. #[account( init, payer = payer, @@ -62,7 +62,7 @@ pub struct ExecuteSlowOrderNoAuction<'info> { /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message /// from its custody account to this account. /// - /// Mutable. Seeds must be \["custody"\]. + /// CHECK: Mutable. Seeds must be \["custody"\]. /// /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( @@ -70,7 +70,7 @@ pub struct ExecuteSlowOrderNoAuction<'info> { seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump = custodian.custody_token_bump, )] - custody_token: Account<'info, token::TokenAccount>, + custody_token: AccountInfo<'info>, /// Registered emitter account representing a Circle Integration on another network. /// diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index 08e044f6..557e2540 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -47,10 +47,10 @@ impl Custodian { pub fn calculate_dynamic_penalty(&self, amount: u64, slots_elapsed: u64) -> Option<(u64, u64)> { let config = &self.auction_config; - let grace_period = u64::try_from(config.auction_grace_period).unwrap(); - let auction_penalty_slots = u64::try_from(config.auction_penalty_slots).unwrap(); - let user_penalty_reward_bps = u64::try_from(config.user_penalty_reward_bps).unwrap(); - let fee_precision = u64::try_from(FEE_PRECISION_MAX).unwrap(); + let grace_period = config.auction_grace_period.into(); + let auction_penalty_slots = config.auction_penalty_slots.into(); + let user_penalty_reward_bps = config.user_penalty_reward_bps.into(); + let fee_precision = FEE_PRECISION_MAX.into(); if slots_elapsed <= grace_period { return Some((0, 0)); @@ -64,10 +64,10 @@ impl Custodian { .checked_mul(user_penalty_reward_bps)? .checked_div(fee_precision)?; - return Some((amount.checked_sub(reward)?, reward)); + Some((amount.checked_sub(reward)?, reward)) } else { let base_penalty = amount - .checked_mul(u64::try_from(config.initial_penalty_bps).unwrap())? + .checked_mul(config.initial_penalty_bps.into())? .checked_div(fee_precision)?; let penalty = base_penalty.checked_add( (amount.checked_sub(base_penalty)?) @@ -78,7 +78,7 @@ impl Custodian { .checked_mul(user_penalty_reward_bps)? .checked_div(fee_precision)?; - return Some((penalty.checked_sub(reward).unwrap(), reward)); + Some((penalty.checked_sub(reward).unwrap(), reward)) } } } diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs new file mode 100644 index 00000000..d4b7fdc6 --- /dev/null +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -0,0 +1,31 @@ +use crate::{error::MatchingEngineError, state::RouterEndpoint}; +use anchor_lang::prelude::*; +use wormhole_cctp_solana::wormhole::core_bridge_program::sdk::EmitterInfo; + +pub fn verify_router_path( + src_endpoint: &RouterEndpoint, + dst_endpoint: &RouterEndpoint, + emitter_info: &EmitterInfo, + target_chain: u16, +) -> Result<()> { + require_eq!( + src_endpoint.chain, + emitter_info.chain, + MatchingEngineError::InvalidEndpoint + ); + require!( + src_endpoint.address == emitter_info.address, + MatchingEngineError::InvalidEndpoint + ); + require_eq!( + dst_endpoint.chain, + target_chain, + MatchingEngineError::InvalidEndpoint + ); + require!( + dst_endpoint.address != [0u8; 32], + MatchingEngineError::InvalidEndpoint + ); + + Ok(()) +} From b54717c19e9ff958b5319ba18f119f4694634877 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Thu, 18 Jan 2024 14:17:27 -0600 Subject: [PATCH 062/126] solana: add execute_fast_order_solana instruction --- solana/programs/matching-engine/src/lib.rs | 4 + .../auction/execute_fast_order_solana.rs | 200 ++++++++++++++++++ .../src/processor/auction/mod.rs | 3 + solana/ts/src/matchingEngine/index.ts | 46 ++++ solana/ts/tests/01__matchingEngine.ts | 129 ++++++++++- .../ts/tests/helpers/matching_engine_utils.ts | 13 ++ 6 files changed, 393 insertions(+), 2 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 9901dae1..435664a3 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -103,4 +103,8 @@ pub mod matching_engine { pub fn execute_fast_order(ctx: Context) -> Result<()> { processor::execute_fast_order(ctx) } + + pub fn execute_fast_order_solana(ctx: Context) -> Result<()> { + processor::execute_fast_order_solana(ctx) + } } diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs new file mode 100644 index 00000000..a7c6d484 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs @@ -0,0 +1,200 @@ +use crate::{ + error::MatchingEngineError, + handle_fast_order_execution, + state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, + ExecuteFastOrderAccounts, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::wormhole_io::TypePrefixedPayload; +use wormhole_cctp_solana::wormhole::core_bridge_program; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; + +#[derive(Accounts)] +pub struct ExecuteFastOrderSolana<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. This is also the burn-source + /// authority for CCTP transfers. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Box>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. + #[account( + owner = core_bridge_program::id(), + constraint = VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash // TODO: add error + )] + vaa: AccountInfo<'info>, + + #[account( + mut, + seeds = [ + AuctionData::SEED_PREFIX, + auction_data.vaa_hash.as_ref() + ], + bump = auction_data.bump, + has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, + has_one = initial_offer_token @ MatchingEngineError::InvalidTokenAccount, + constraint = { + auction_data.status == AuctionStatus::Active + } @ MatchingEngineError::AuctionNotActive + )] + auction_data: Box>, + + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + to_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + constraint = { + to_router_endpoint.chain == core_bridge_program::SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain + )] + to_router_endpoint: Account<'info, RouterEndpoint>, + + #[account( + mut, + associated_token::mint = mint, + associated_token::authority = payer + )] + executor_token: Account<'info, token::TokenAccount>, + + /// CHECK: Mutable. Must equal [best_offer](AuctionData::best_offer). + #[account(mut)] + best_offer_token: AccountInfo<'info>, + + /// CHECK: Mutable. Must equal [initial_offer](AuctionData::initial_offer). + #[account(mut)] + initial_offer_token: AccountInfo<'info>, + + /// Also the burn_source token account. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: AccountInfo<'info>, + + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account( + mut, + address = common::constants::usdc::id(), + )] + mint: AccountInfo<'info>, + + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +pub fn execute_fast_order_solana(ctx: Context) -> Result<()> { + let wormhole_args = handle_fast_order_execution(ExecuteFastOrderAccounts { + custodian: &ctx.accounts.custodian, + vaa: &ctx.accounts.vaa, + auction_data: &mut ctx.accounts.auction_data, + custody_token: &ctx.accounts.custody_token, + executor_token: &ctx.accounts.executor_token, + best_offer_token: &ctx.accounts.best_offer_token, + initial_offer_token: &ctx.accounts.initial_offer_token, + token_program: &ctx.accounts.token_program, + })?; + + // Publish message via Core Bridge. + core_bridge_program::cpi::post_message( + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + &[ + Custodian::SEED_PREFIX.as_ref(), + &[ctx.accounts.custodian.bump], + ], + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]], + ], + ], + ), + core_bridge_program::cpi::PostMessageArgs { + nonce: 0, + payload: common::messages::FastFill { + fill: wormhole_args.fill, + amount: u128::try_from(wormhole_args.transfer_amount).unwrap(), + } + .to_vec_payload(), + commitment: core_bridge_program::Commitment::Finalized, + }, + )?; + + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index ec298ae9..3be36a79 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -7,6 +7,9 @@ pub use improve_offer::*; mod execute_fast_order; pub use execute_fast_order::*; +mod execute_fast_order_solana; +pub use execute_fast_order_solana::*; + use anchor_lang::prelude::*; use anchor_spl::token; diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 717de6a4..c0cbac27 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -430,6 +430,52 @@ export class MatchingEngineProgram { .instruction(); } + async executeFastOrderSolanaIx( + vaaHash: Buffer, + accounts: { + payer: PublicKey; + vaa: PublicKey; + bestOfferToken: PublicKey; + initialOfferToken: PublicKey; + } + ) { + const { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + const { mint } = await splToken.getAccount( + this.program.provider.connection, + bestOfferToken + ); + + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); + const payerSequence = this.payerSequenceAddress(payer); + const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => + this.coreMessageAddress(payer, value) + ); + + return this.program.methods + .executeFastOrderSolana() + .accounts({ + payer, + custodian, + auctionData: this.auctionDataAddress(vaaHash), + toRouterEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), + bestOfferToken, + initialOfferToken, + custodyToken: this.custodyTokenAccountAddress(), + vaa, + mint: USDC_MINT_ADDRESS, + payerSequence, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + }) + .instruction(); + } + async redeemFastFillAccounts(vaa: PublicKey): Promise { const custodyToken = this.custodyTokenAccountAddress(); const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index f9deaad7..c8d6cc79 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -26,6 +26,7 @@ import { getTokenBalance, postFastTransferVaa, skip_slots, + verifyFastFillMessage, verifyFillMessage, } from "./helpers/matching_engine_utils"; @@ -50,6 +51,9 @@ describe("Matching Engine", function () { const arbChain = wormholeSdk.CHAINS.arbitrum; const arbRouter = Array.from(Buffer.alloc(32, "bead", "hex")); const arbDomain = 3; + const solanaChain = wormholeSdk.CHAINS.solana; + const solanaRouter = Array.from(Buffer.alloc(32, "c0ffee", "hex")); + const solanaDomain = 5; // Matching Engine program. const engine = new MatchingEngineProgram(connection); @@ -510,7 +514,7 @@ describe("Matching Engine", function () { ); }); - [wormholeSdk.CHAINS.unset, wormholeSdk.CHAINS.solana].forEach((chain) => + [wormholeSdk.CHAINS.unset, solanaChain].forEach((chain) => it(`Cannot Register Chain ID == ${chain}`, async function () { const chain = 0; @@ -712,7 +716,7 @@ describe("Matching Engine", function () { redeemerMessage: Buffer.from("All your base are belong to us."), }; - before("Register To Router Endpoint", async function () { + before("Register To Router Endpoints", async function () { await expectIxOk( connection, [ @@ -1063,6 +1067,127 @@ describe("Matching Engine", function () { ); }); + it("Execute Fast Order Within Grace Period (Target == Solana)", async function () { + const fastOrder = { ...baseFastOrder }; + fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; + fastOrder.targetDomain = solanaDomain; + + // Start the auction with offer two so that we can + // check that the initial offer is refunded. + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityTwo, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: fastOrder.maxFee, + fromChain: ethChain, + toChain: solanaChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + let bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const newOffer = fastOrder.maxFee - 100n; + + // Improve the bid with offer one. + await expectIxOk( + connection, + [ + await engine.improveOfferIx( + newOffer, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + } + ), + ], + [offerAuthorityOne] + ); + + // Fetch the balances before. + const highestOfferBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const initialBefore = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); + const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + // Fast forward into the grace period. + await skip_slots(connection, 2); + const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); + await expectIxOk( + connection, + [ + await engine.executeFastOrderSolanaIx(vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne] + ); + + // Validate balance changes. + const highestOfferAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const initialAfter = await getTokenBalance(connection, offerAuthorityTwo.publicKey); + const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + + expect(initialAfter - initialBefore).equals(fastOrder.initAuctionFee); + expect(highestOfferAfter - highestOfferBefore).equals(fastOrder.maxFee + newOffer); + expect(custodyBefore - custodyAfter).equals( + fastOrder.maxFee + newOffer + fastOrder.initAuctionFee + ); + + // Validate auction data account. + expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionDataAfter.status).to.eql({ completed: {} }); + expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); + expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); + expect(auctionDataAfter.startSlot.toString()).to.eql( + auctionDataBefore.startSlot.toString() + ); + expect(auctionDataAfter.amount.toString()).to.eql( + auctionDataBefore.amount.toString() + ); + expect(auctionDataAfter.securityDeposit.toString()).to.eql( + auctionDataBefore.securityDeposit.toString() + ); + expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + + // Validate the core message. + await verifyFastFillMessage( + connection, + message, + fastOrder.amountIn - newOffer - fastOrder.initAuctionFee, + { + sourceChain: ethChain, + orderSender: Array.from(fastOrder.sender), + redeemer: Array.from(fastOrder.redeemer), + redeemerMessage: fastOrder.redeemerMessage, + } + ); + }); + it("Execute Fast Order After Grace Period", async function () { const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index fe67c8a8..a2af8845 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -226,3 +226,16 @@ export async function verifyFillMessage( expect(parsed.deposit?.header.destinationCctpDomain).to.equal(targetDomain); expect(parsed.deposit?.message.fill).to.deep.equal(expectedFill); } + +export async function verifyFastFillMessage( + connection: Connection, + message: PublicKey, + amount: bigint, + expectedFill: Fill +) { + const fillPayload = (await getPostedMessage(connection, message)).message.payload; + const parsed = LiquidityLayerMessage.decode(fillPayload); + + expect(parsed.fastFill?.fill).to.deep.equal(expectedFill); + expect(parsed.fastFill?.amount).to.equal(amount); +} From ec6f7099e7224682b9efca093b9dd5e97b458e7c Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 18 Jan 2024 12:59:54 -0600 Subject: [PATCH 063/126] solana: more slow order --- solana/programs/matching-engine/src/error.rs | 6 + solana/programs/matching-engine/src/lib.rs | 6 +- .../processor/auction/place_initial_offer.rs | 2 +- .../execute_slow_order/auction_completed.rs | 2 +- .../src/processor/execute_slow_order/mod.rs | 4 +- .../execute_slow_order/no_auction.rs | 192 ---------- .../execute_slow_order/no_auction_cctp.rs | 351 ++++++++++++++++++ .../programs/matching-engine/src/utils/mod.rs | 31 +- 8 files changed, 380 insertions(+), 214 deletions(-) delete mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs create mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 83b66907..e9d84b2d 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -52,6 +52,12 @@ pub enum MatchingEngineError { #[msg("InvalidEndpoint")] InvalidEndpoint, + #[msg("ErrInvalidSourceRouter")] + ErrInvalidSourceRouter, + + #[msg("ErrInvalidTargetRouter")] + ErrInvalidTargetRouter, + #[msg("TokenRouterProgramIdRequired")] TokenRouterProgramIdRequired, diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 435664a3..2eb268c9 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -37,11 +37,11 @@ pub mod matching_engine { processor::execute_slow_order_auction_completed(ctx, args) } - pub fn execute_slow_order_no_auction( - ctx: Context, + pub fn execute_slow_order_no_auction_cctp( + ctx: Context, args: CctpMessageArgs, ) -> Result<()> { - processor::execute_slow_order_no_auction(ctx, args) + processor::execute_slow_order_no_auction_cctp(ctx, args) } /// This instruction is be used to generate your program's config. diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 0acbb581..18e01e55 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -103,9 +103,9 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R // Verify that the to and from router endpoints are valid. crate::utils::verify_router_path( + &vaa, &ctx.accounts.from_router_endpoint, &ctx.accounts.to_router_endpoint, - &vaa.try_emitter_info().unwrap(), fast_order.target_chain(), )?; diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs index d4b58ff7..c098f3cf 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs @@ -38,7 +38,7 @@ pub struct ExecuteSlowOrderAuctionCompleted<'info> { VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), ], bump = auction_data.bump, - has_one = best_offer_token, + has_one = best_offer_token, // TODO: add error constraint = auction_data.status == AuctionStatus::Completed // TODO: add error )] auction_data: Account<'info, AuctionData>, diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs index 5484aaf6..0b150137 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs @@ -1,8 +1,8 @@ mod auction_completed; pub use auction_completed::*; -mod no_auction; -pub use no_auction::*; +mod no_auction_cctp; +pub use no_auction_cctp::*; use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs deleted file mode 100644 index aeb2597d..00000000 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction.rs +++ /dev/null @@ -1,192 +0,0 @@ -use crate::state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}; -use anchor_lang::prelude::*; -use anchor_spl::token; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, -}; - -use super::CctpMessageArgs; - -#[derive(Accounts)] -pub struct ExecuteSlowOrderNoAuction<'info> { - #[account(mut)] - payer: Signer<'info>, - - /// This program's Wormhole (Core Bridge) emitter authority. - /// - /// CHECK: Seeds must be \["emitter"\]. - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - )] - custodian: Account<'info, Custodian>, - - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] - fast_vaa: AccountInfo<'info>, - - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] - finalized_vaa: AccountInfo<'info>, - - /// There should be no account data here because an auction was never created. - #[account( - init, - payer = payer, - space = 8 + AuctionData::INIT_SPACE, - seeds = [ - AuctionData::SEED_PREFIX, - VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), - ], - bump, - )] - auction_data: Account<'info, AuctionData>, - - /// Redeemer, who owns the token account that will receive the minted tokens. - /// - /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. - redeemer: Signer<'info>, - - /// Destination token account, which the redeemer may not own. But because the redeemer is a - /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent - /// to any account he chooses (this one). - /// - /// CHECK: This token account must already exist. - #[account(mut)] - dst_token: AccountInfo<'info>, - - /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. - /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message - /// from its custody account to this account. - /// - /// CHECK: Mutable. Seeds must be \["custody"\]. - /// - /// NOTE: This account must be encoded as the mint recipient in the CCTP message. - #[account( - mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, - )] - custody_token: AccountInfo<'info>, - - /// Registered emitter account representing a Circle Integration on another network. - /// - /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. - #[account( - seeds = [ - RouterEndpoint::SEED_PREFIX, - router_endpoint.chain.to_be_bytes().as_ref(), - ], - bump = router_endpoint.bump, - )] - router_endpoint: Account<'info, RouterEndpoint>, - - /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). - message_transmitter_authority: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). - message_transmitter_config: AccountInfo<'info>, - - /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), - /// first_nonce.to_string()\] (CCTP Message Transmitter program). - #[account(mut)] - used_nonces: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). - token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token - /// Messenger Minter program). - remote_token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). - token_minter: UncheckedAccount<'info>, - - /// Token Messenger Minter's Local Token account. This program uses the mint of this account to - /// validate the `mint_recipient` token account's mint. - /// - /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - local_token: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP - /// Token Messenger Minter program). - token_pair: AccountInfo<'info>, - - /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - token_messenger_minter_custody_token: AccountInfo<'info>, - - token_messenger_minter_program: - Program<'info, token_messenger_minter_program::TokenMessengerMinter>, - message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, - token_program: Program<'info, token::Token>, - system_program: Program<'info, System>, -} - -pub fn execute_slow_order_no_auction( - ctx: Context, - args: CctpMessageArgs, -) -> Result<()> { - let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); - - // NOTE: We do not need the return values here for this instruction. - super::prepare_execute_slow_order( - &fast_vaa, - super::PrepareExecuteSlowOrder { - payer: &ctx.accounts.payer, - custodian: &ctx.accounts.custodian, - finalized_vaa: &ctx.accounts.finalized_vaa, - custody_token: ctx.accounts.custody_token.as_ref(), - message_transmitter_authority: &ctx.accounts.message_transmitter_authority, - message_transmitter_config: &ctx.accounts.message_transmitter_config, - used_nonces: &ctx.accounts.used_nonces, - token_messenger: &ctx.accounts.token_messenger, - remote_token_messenger: &ctx.accounts.remote_token_messenger, - token_minter: &ctx.accounts.token_minter, - local_token: &ctx.accounts.local_token, - token_pair: &ctx.accounts.token_pair, - token_messenger_minter_custody_token: &ctx - .accounts - .token_messenger_minter_custody_token, - message_transmitter_program: &ctx.accounts.message_transmitter_program, - token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - }, - args, - )?; - - // TODO: - // // SECURITY: We need to verify the router path, since an auction was never created - // // and this check is done in `placeInitialBid`. - // _verifyRouterPath( - // cctpVaa.emitterChainId, - // cctpVaa.emitterAddress, - // order.targetChain, - // ); - - // sequence = _handleCctpTransfer(order.amountIn - baseFee, cctpVaa.emitterChainId, order); - - // /** - // * Pay the `feeRecipient` the `baseFee`. This ensures that the protocol relayer - // * is paid for relaying slow VAAs that do not have an associated auction. - // * This prevents the protocol relayer from any MEV attacks. - // */ - // SafeERC20.safeTransfer(_token, feeRecipient(), baseFee); - - // /* - // * SECURITY: this is a necessary security check. This will prevent a relayer from - // * starting an auction with the fast transfer VAA, even though the slow - // * relayer already delivered the slow VAA. Not setting this could lead - // * to trapped funds (which would require an upgrade to fix). - // */ - // auction.status = AuctionStatus.Completed; - - ctx.accounts.auction_data.status = AuctionStatus::Completed; - - Ok(()) -} diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs new file mode 100644 index 00000000..8d57b780 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs @@ -0,0 +1,351 @@ +use std::io::Write; + +use crate::state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::wormhole_io::TypePrefixedPayload; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, +}; + +use super::CctpMessageArgs; + +#[derive(Accounts)] +pub struct ExecuteSlowOrderNoAuctionCctp<'info> { + #[account(mut)] + payer: Signer<'info>, + + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + has_one = fee_recipient, // TODO: add error + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + finalized_vaa: AccountInfo<'info>, + + /// There should be no account data here because an auction was never created. + #[account( + init, + payer = payer, + space = 8 + AuctionData::INIT_SPACE, + seeds = [ + AuctionData::SEED_PREFIX, + VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), + ], + bump, + )] + auction_data: Account<'info, AuctionData>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + fee_recipient: AccountInfo<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: AccountInfo<'info>, + + /// Circle-supported mint. + /// + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account( + mut, + address = common::constants::usdc::id(), + )] + mint: AccountInfo<'info>, + + /// Seeds must be \["endpoint", chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + from_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = from_router_endpoint.bump, + )] + from_router_endpoint: Account<'info, RouterEndpoint>, + + /// Seeds must be \["endpoint", chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + to_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + )] + to_router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). + message_transmitter_authority: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + message_transmitter_config: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), + /// first_nonce.to_string()\] (CCTP Message Transmitter program). + #[account(mut)] + used_nonces: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Token Messenger Minter's Local Token account. This program uses the mint of this account to + /// validate the `mint_recipient` token account's mint. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP + /// Token Messenger Minter program). + token_pair: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + token_messenger_minter_custody_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_sender_authority: UncheckedAccount<'info>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +pub fn execute_slow_order_no_auction_cctp( + ctx: Context, + args: CctpMessageArgs, +) -> Result<()> { + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + + // NOTE: We do not need the return values here for this instruction. + let (order, base_fee) = super::prepare_execute_slow_order( + &fast_vaa, + super::PrepareExecuteSlowOrder { + payer: &ctx.accounts.payer, + custodian: &ctx.accounts.custodian, + finalized_vaa: &ctx.accounts.finalized_vaa, + custody_token: ctx.accounts.custody_token.as_ref(), + message_transmitter_authority: &ctx.accounts.message_transmitter_authority, + message_transmitter_config: &ctx.accounts.message_transmitter_config, + used_nonces: &ctx.accounts.used_nonces, + token_messenger: &ctx.accounts.token_messenger, + remote_token_messenger: &ctx.accounts.remote_token_messenger, + token_minter: &ctx.accounts.token_minter, + local_token: &ctx.accounts.local_token, + token_pair: &ctx.accounts.token_pair, + token_messenger_minter_custody_token: &ctx + .accounts + .token_messenger_minter_custody_token, + message_transmitter_program: &ctx.accounts.message_transmitter_program, + token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + }, + args, + )?; + + // NOTE: We need to verify the router path, since an auction was never created and this check is + // done in the `place_initial_offer` instruction. + crate::utils::verify_router_path( + &fast_vaa, + &ctx.accounts.from_router_endpoint, + &ctx.accounts.to_router_endpoint, + order.target_chain(), + )?; + + let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + + // TODO: encoding will change from u128 to u64 + let amount = u64::try_from(order.amount_in() - base_fee).unwrap(); + let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); + redeemer_message.write_all(order.redeemer_message().into())?; + + // This returns the CCTP nonce, but we do not need it. + wormhole_cctp_solana::cpi::burn_and_publish( + CpiContext::new_with_signer( + ctx.accounts + .token_messenger_minter_program + .to_account_info(), + wormhole_cctp_solana::cpi::DepositForBurnWithCaller { + src_token_owner: ctx.accounts.custodian.to_account_info(), + token_messenger_minter_sender_authority: ctx + .accounts + .token_messenger_minter_sender_authority + .to_account_info(), + src_token: ctx.accounts.custody_token.to_account_info(), + message_transmitter_config: ctx + .accounts + .message_transmitter_config + .to_account_info(), + token_messenger: ctx.accounts.token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.token_minter.to_account_info(), + local_token: ctx.accounts.local_token.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + message_transmitter_program: ctx + .accounts + .message_transmitter_program + .to_account_info(), + token_messenger_minter_program: ctx + .accounts + .token_messenger_minter_program + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + }, + &[custodian_seeds], + ), + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + custodian_seeds, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]], + ], + ], + ), + wormhole_cctp_solana::cpi::BurnAndPublishArgs { + burn_source: ctx.accounts.custody_token.key(), + destination_caller: ctx.accounts.to_router_endpoint.address, + destination_cctp_domain: order.destination_cctp_domain(), + amount, + // TODO: add mint recipient to the router endpoint account to future proof this? + mint_recipient: ctx.accounts.to_router_endpoint.address, + wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: common::messages::Fill { + source_chain: ctx.accounts.from_router_endpoint.chain, + order_sender: order.sender(), + redeemer: order.redeemer(), + redeemer_message: redeemer_message.into(), + } + .to_vec_payload(), + }, + )?; + + // TODO: + + // sequence = _handleCctpTransfer(order.amountIn - baseFee, cctpVaa.emitterChainId, order); + + // This is a necessary security check. This will prevent a relayer from starting an auction with + // the fast transfer VAA, even though the slow relayer already delivered the slow VAA. Not + // setting this could lead to trapped funds (which would require an upgrade to fix). + // + // NOTE: We do not bother setting the other fields in this account. The existence of this + // accounts ensures the security defined in the previous paragraph. + ctx.accounts.auction_data.status = AuctionStatus::Completed; + + // Pay the `fee_recipient` the base fee. This ensures that the protocol relayer is paid for + // relaying slow VAAs that do not have an associated auction. This prevents the protocol relayer + // from any MEV attacks. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.fee_recipient.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + // TODO: encoding will change from u128 to u64 + base_fee.try_into().unwrap(), + ) +} diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index d4b7fdc6..0e97a56d 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -1,30 +1,31 @@ use crate::{error::MatchingEngineError, state::RouterEndpoint}; use anchor_lang::prelude::*; -use wormhole_cctp_solana::wormhole::core_bridge_program::sdk::EmitterInfo; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; pub fn verify_router_path( - src_endpoint: &RouterEndpoint, - dst_endpoint: &RouterEndpoint, - emitter_info: &EmitterInfo, - target_chain: u16, + vaa: &VaaAccount<'_>, + source_endpoint: &RouterEndpoint, + target_endpoint: &RouterEndpoint, + expected_target_chain: u16, ) -> Result<()> { + let emitter = vaa.try_emitter_info()?; require_eq!( - src_endpoint.chain, - emitter_info.chain, - MatchingEngineError::InvalidEndpoint + source_endpoint.chain, + emitter.chain, + MatchingEngineError::ErrInvalidSourceRouter ); require!( - src_endpoint.address == emitter_info.address, - MatchingEngineError::InvalidEndpoint + source_endpoint.address == emitter.address, + MatchingEngineError::ErrInvalidSourceRouter ); require_eq!( - dst_endpoint.chain, - target_chain, - MatchingEngineError::InvalidEndpoint + target_endpoint.chain, + expected_target_chain, + MatchingEngineError::ErrInvalidTargetRouter ); require!( - dst_endpoint.address != [0u8; 32], - MatchingEngineError::InvalidEndpoint + target_endpoint.address != [0u8; 32], + MatchingEngineError::ErrInvalidTargetRouter ); Ok(()) From 9a748085ab9f0e6275c5fb202fcd3d4ed443181a Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 18 Jan 2024 19:53:03 -0600 Subject: [PATCH 064/126] solana: yolo slow order split --- solana/programs/matching-engine/src/lib.rs | 21 +- .../execute_slow_order/auction_active_cctp.rs | 345 ++++++++++++++++++ .../execute_slow_order/auction_complete.rs | 94 +++++ .../execute_slow_order/auction_completed.rs | 157 -------- .../src/processor/execute_slow_order/mod.rs | 135 +------ .../execute_slow_order/no_auction_cctp.rs | 158 ++++---- .../matching-engine/src/processor/mod.rs | 3 + .../src/processor/prepare_slow_order/cctp.rs | 221 +++++++++++ .../src/processor/prepare_slow_order/mod.rs | 2 + .../matching-engine/src/state/auction_data.rs | 1 + .../programs/matching-engine/src/state/mod.rs | 9 +- .../src/state/prepared_slow_order.rs | 16 + 12 files changed, 771 insertions(+), 391 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs create mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs delete mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs create mode 100644 solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs create mode 100644 solana/programs/matching-engine/src/processor/prepare_slow_order/mod.rs create mode 100644 solana/programs/matching-engine/src/state/prepared_slow_order.rs diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 2eb268c9..3d8a9472 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -30,18 +30,29 @@ pub mod matching_engine { processor::redeem_fast_fill(ctx) } - pub fn execute_slow_order_auction_completed( - ctx: Context, + pub fn prepare_slow_order_cctp( + ctx: Context, args: CctpMessageArgs, ) -> Result<()> { - processor::execute_slow_order_auction_completed(ctx, args) + processor::prepare_slow_order_cctp(ctx, args) + } + + pub fn execute_slow_order_auction_complete( + ctx: Context, + ) -> Result<()> { + processor::execute_slow_order_auction_complete(ctx) } pub fn execute_slow_order_no_auction_cctp( ctx: Context, - args: CctpMessageArgs, ) -> Result<()> { - processor::execute_slow_order_no_auction_cctp(ctx, args) + processor::execute_slow_order_no_auction_cctp(ctx) + } + + pub fn execute_slow_order_auction_active_cctp( + ctx: Context, + ) -> Result<()> { + processor::execute_slow_order_auction_active_cctp(ctx) } /// This instruction is be used to generate your program's config. diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs new file mode 100644 index 00000000..5bc0f10f --- /dev/null +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs @@ -0,0 +1,345 @@ +use std::io::Write; + +use crate::{ + error::MatchingEngineError, + state::{ + AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedSlowOrder, RouterEndpoint, + }, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::{messages::raw::LiquidityLayerMessage, wormhole_io::TypePrefixedPayload}; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, +}; + +#[derive(Accounts)] +pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { + #[account(mut)] + payer: Signer<'info>, + + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Box>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + #[account( + mut, + close = payer, + seeds = [ + PreparedSlowOrder::SEED_PREFIX, + payer.key().as_ref(), + core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + ], + bump = prepared_slow_order.bump, + )] + prepared_slow_order: Account<'info, PreparedSlowOrder>, + + /// There should be no account data here because an auction was never created. + #[account( + mut, + seeds = [ + AuctionData::SEED_PREFIX, + prepared_slow_order.fast_vaa_hash.as_ref(), + ], + bump = auction_data.bump, + has_one = best_offer_token, // TODO: add error + constraint = auction_data.status == AuctionStatus::Active // TODO: add error + )] + auction_data: Box>, + + /// CHECK: Must equal the best offer token in the auction data account. + #[account(mut)] + best_offer_token: AccountInfo<'info>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + liquidator_token: AccountInfo<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: AccountInfo<'info>, + + /// Circle-supported mint. + /// + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account( + mut, + address = common::constants::usdc::id(), + )] + mint: AccountInfo<'info>, + + /// Seeds must be \["endpoint", chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + to_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + )] + to_router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). + message_transmitter_authority: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + message_transmitter_config: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), + /// first_nonce.to_string()\] (CCTP Message Transmitter program). + #[account(mut)] + used_nonces: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Token Messenger Minter's Local Token account. This program uses the mint of this account to + /// validate the `mint_recipient` token account's mint. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP + /// Token Messenger Minter program). + token_pair: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + token_messenger_minter_custody_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_sender_authority: UncheckedAccount<'info>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +pub fn execute_slow_order_auction_active_cctp( + ctx: Context, +) -> Result<()> { + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) + .unwrap() + .to_fast_market_order_unchecked(); + + let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + + // This means the slow message beat the fast message. We need to refund the bidder and + // (potentially) take a penalty for not fulfilling their obligation. The `penalty` CAN be zero + // in this case, since the auction grace period might not have ended yet. + let (final_status, liquidator_amount, best_offer_amount, cctp_amount) = { + let auction = &ctx.accounts.auction_data; + let slots_elapsed = Clock::get().map(|clock| clock.slot - auction.start_slot)?; + let (penalty, reward) = ctx + .accounts + .custodian + .calculate_dynamic_penalty(auction.security_deposit, slots_elapsed) + .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; + + let base_fee = ctx.accounts.prepared_slow_order.base_fee; + ( + AuctionStatus::Settled { + base_fee, + penalty: Some(penalty), + }, + penalty + base_fee, + auction.amount + auction.security_deposit - penalty - reward, + auction.amount - base_fee + reward, + ) + }; + + // Transfer to the best offer token what he deserves. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.best_offer_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + best_offer_amount, + )?; + + let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); + redeemer_message.write_all(order.redeemer_message().into())?; + + // This returns the CCTP nonce, but we do not need it. + wormhole_cctp_solana::cpi::burn_and_publish( + CpiContext::new_with_signer( + ctx.accounts + .token_messenger_minter_program + .to_account_info(), + wormhole_cctp_solana::cpi::DepositForBurnWithCaller { + src_token_owner: ctx.accounts.custodian.to_account_info(), + token_messenger_minter_sender_authority: ctx + .accounts + .token_messenger_minter_sender_authority + .to_account_info(), + src_token: ctx.accounts.custody_token.to_account_info(), + message_transmitter_config: ctx + .accounts + .message_transmitter_config + .to_account_info(), + token_messenger: ctx.accounts.token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.token_minter.to_account_info(), + local_token: ctx.accounts.local_token.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + message_transmitter_program: ctx + .accounts + .message_transmitter_program + .to_account_info(), + token_messenger_minter_program: ctx + .accounts + .token_messenger_minter_program + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + }, + &[custodian_seeds], + ), + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + custodian_seeds, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]], + ], + ], + ), + wormhole_cctp_solana::cpi::BurnAndPublishArgs { + burn_source: ctx.accounts.custody_token.key(), + destination_caller: ctx.accounts.to_router_endpoint.address, + destination_cctp_domain: order.destination_cctp_domain(), + amount: cctp_amount, + // TODO: add mint recipient to the router endpoint account to future proof this? + mint_recipient: ctx.accounts.to_router_endpoint.address, + wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: common::messages::Fill { + source_chain: ctx.accounts.prepared_slow_order.source_chain, + order_sender: order.sender(), + redeemer: order.redeemer(), + redeemer_message: redeemer_message.into(), + } + .to_vec_payload(), + }, + )?; + + // Everyone's whole, set the auction as completed. + ctx.accounts.auction_data.status = final_status; + + // Transfer the penalty amount to the caller. The caller also earns the base fee for relaying + // the slow VAA. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.liquidator_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[custodian_seeds], + ), + liquidator_amount, + ) +} diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs new file mode 100644 index 00000000..0678f424 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs @@ -0,0 +1,94 @@ +use crate::state::{AuctionData, AuctionStatus, Custodian, PreparedSlowOrder}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use wormhole_cctp_solana::wormhole::core_bridge_program; + +#[derive(Accounts)] +pub struct ExecuteSlowOrderAuctionComplete<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + #[account( + mut, + close = payer, + seeds = [ + PreparedSlowOrder::SEED_PREFIX, + payer.key().as_ref(), + core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + ], + bump = prepared_slow_order.bump, + )] + prepared_slow_order: Account<'info, PreparedSlowOrder>, + + #[account( + seeds = [ + AuctionData::SEED_PREFIX, + prepared_slow_order.fast_vaa_hash.as_ref(), + ], + bump = auction_data.bump, + has_one = best_offer_token, // TODO: add error + constraint = auction_data.status == AuctionStatus::Completed // TODO: add error + )] + auction_data: Account<'info, AuctionData>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + best_offer_token: AccountInfo<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + token_program: Program<'info, token::Token>, +} + +pub fn execute_slow_order_auction_complete( + ctx: Context, +) -> Result<()> { + ctx.accounts.auction_data.status = AuctionStatus::Settled { + base_fee: ctx.accounts.prepared_slow_order.base_fee, + penalty: None, + }; + + // Finally transfer the funds back to the highest bidder. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.best_offer_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + ctx.accounts.auction_data.amount, + ) +} diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs deleted file mode 100644 index c098f3cf..00000000 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_completed.rs +++ /dev/null @@ -1,157 +0,0 @@ -use crate::state::{AuctionData, AuctionStatus, Custodian}; -use anchor_lang::prelude::*; -use anchor_spl::token; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, -}; - -use super::CctpMessageArgs; - -#[derive(Accounts)] -pub struct ExecuteSlowOrderAuctionCompleted<'info> { - #[account(mut)] - payer: Signer<'info>, - - /// This program's Wormhole (Core Bridge) emitter authority. - /// - /// CHECK: Seeds must be \["emitter"\]. - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - )] - custodian: Account<'info, Custodian>, - - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] - fast_vaa: AccountInfo<'info>, - - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] - finalized_vaa: AccountInfo<'info>, - - #[account( - seeds = [ - AuctionData::SEED_PREFIX, - VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), - ], - bump = auction_data.bump, - has_one = best_offer_token, // TODO: add error - constraint = auction_data.status == AuctionStatus::Completed // TODO: add error - )] - auction_data: Account<'info, AuctionData>, - - /// Destination token account, which the redeemer may not own. But because the redeemer is a - /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent - /// to any account he chooses (this one). - /// - /// CHECK: This token account must already exist. - #[account(mut)] - best_offer_token: AccountInfo<'info>, - - /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. - /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message - /// from its custody account to this account. - /// - /// Mutable. Seeds must be \["custody"\]. - /// - /// NOTE: This account must be encoded as the mint recipient in the CCTP message. - #[account( - mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, - )] - custody_token: Account<'info, token::TokenAccount>, - - /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). - message_transmitter_authority: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). - message_transmitter_config: AccountInfo<'info>, - - /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), - /// first_nonce.to_string()\] (CCTP Message Transmitter program). - #[account(mut)] - used_nonces: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). - token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token - /// Messenger Minter program). - remote_token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). - token_minter: UncheckedAccount<'info>, - - /// Token Messenger Minter's Local Token account. This program uses the mint of this account to - /// validate the `mint_recipient` token account's mint. - /// - /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - local_token: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP - /// Token Messenger Minter program). - token_pair: AccountInfo<'info>, - - /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - token_messenger_minter_custody_token: AccountInfo<'info>, - - token_messenger_minter_program: - Program<'info, token_messenger_minter_program::TokenMessengerMinter>, - message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, - token_program: Program<'info, token::Token>, - system_program: Program<'info, System>, -} - -pub fn execute_slow_order_auction_completed( - ctx: Context, - args: CctpMessageArgs, -) -> Result<()> { - let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); - - // NOTE: We do not need the return values here for this instruction. - super::prepare_execute_slow_order( - &fast_vaa, - super::PrepareExecuteSlowOrder { - payer: &ctx.accounts.payer, - custodian: &ctx.accounts.custodian, - finalized_vaa: &ctx.accounts.finalized_vaa, - custody_token: ctx.accounts.custody_token.as_ref(), - message_transmitter_authority: &ctx.accounts.message_transmitter_authority, - message_transmitter_config: &ctx.accounts.message_transmitter_config, - used_nonces: &ctx.accounts.used_nonces, - token_messenger: &ctx.accounts.token_messenger, - remote_token_messenger: &ctx.accounts.remote_token_messenger, - token_minter: &ctx.accounts.token_minter, - local_token: &ctx.accounts.local_token, - token_pair: &ctx.accounts.token_pair, - token_messenger_minter_custody_token: &ctx - .accounts - .token_messenger_minter_custody_token, - message_transmitter_program: &ctx.accounts.message_transmitter_program, - token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - }, - args, - )?; - - // Finally transfer the funds back to the highest bidder. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.best_offer_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], - ), - ctx.accounts.auction_data.amount, - ) -} diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs index 0b150137..e492e0a6 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs @@ -1,133 +1,8 @@ -mod auction_completed; -pub use auction_completed::*; +mod auction_active_cctp; +pub use auction_active_cctp::*; + +mod auction_complete; +pub use auction_complete::*; mod no_auction_cctp; pub use no_auction_cctp::*; - -use crate::{error::MatchingEngineError, state::Custodian}; -use anchor_lang::prelude::*; -use common::messages::raw::{FastMarketOrder, LiquidityLayerDepositMessage, LiquidityLayerMessage}; -use wormhole_cctp_solana::{ - cctp::message_transmitter_program, wormhole::core_bridge_program::VaaAccount, -}; - -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct CctpMessageArgs { - pub encoded_cctp_message: Vec, - pub cctp_attestation: Vec, -} - -pub struct PrepareExecuteSlowOrder<'ctx, 'info> { - payer: &'ctx Signer<'info>, - custodian: &'ctx Account<'info, Custodian>, - finalized_vaa: &'ctx AccountInfo<'info>, - custody_token: &'ctx AccountInfo<'info>, - message_transmitter_authority: &'ctx AccountInfo<'info>, - message_transmitter_config: &'ctx AccountInfo<'info>, - used_nonces: &'ctx AccountInfo<'info>, - token_messenger: &'ctx AccountInfo<'info>, - remote_token_messenger: &'ctx AccountInfo<'info>, - token_minter: &'ctx AccountInfo<'info>, - local_token: &'ctx AccountInfo<'info>, - token_pair: &'ctx AccountInfo<'info>, - token_messenger_minter_custody_token: &'ctx AccountInfo<'info>, - message_transmitter_program: &'ctx AccountInfo<'info>, - token_messenger_minter_program: &'ctx AccountInfo<'info>, - token_program: &'ctx AccountInfo<'info>, - system_program: &'ctx AccountInfo<'info>, -} - -pub fn prepare_execute_slow_order<'ix, 'accts, 'info>( - fast_vaa: &'ix VaaAccount<'accts>, - accounts: PrepareExecuteSlowOrder<'accts, 'info>, - args: CctpMessageArgs, -) -> Result<(FastMarketOrder<'accts>, u128)> -where - 'ix: 'accts, -{ - let custodian_bump = accounts.custodian.bump; - - let finalized_vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( - accounts.finalized_vaa, - CpiContext::new_with_signer( - accounts.message_transmitter_program.to_account_info(), - message_transmitter_program::cpi::ReceiveTokenMessengerMinterMessage { - payer: accounts.payer.to_account_info(), - caller: accounts.custodian.to_account_info(), - message_transmitter_authority: accounts - .message_transmitter_authority - .to_account_info(), - message_transmitter_config: accounts.message_transmitter_config.to_account_info(), - used_nonces: accounts.used_nonces.to_account_info(), - token_messenger_minter_program: accounts - .token_messenger_minter_program - .to_account_info(), - system_program: accounts.system_program.to_account_info(), - token_messenger: accounts.token_messenger.to_account_info(), - remote_token_messenger: accounts.remote_token_messenger.to_account_info(), - token_minter: accounts.token_minter.to_account_info(), - local_token: accounts.local_token.to_account_info(), - token_pair: accounts.token_pair.to_account_info(), - mint_recipient: accounts.custody_token.to_account_info(), - custody_token: accounts - .token_messenger_minter_custody_token - .to_account_info(), - token_program: accounts.token_program.to_account_info(), - }, - &[&[Custodian::SEED_PREFIX, &[custodian_bump]]], - ), - wormhole_cctp_solana::cpi::ReceiveMessageArgs { - encoded_message: args.encoded_cctp_message, - attestation: args.cctp_attestation, - }, - )?; - - // Reconcile fast VAA with finalized VAA. - { - let fast_emitter = fast_vaa.try_emitter_info().unwrap(); - let finalized_emitter = finalized_vaa.try_emitter_info().unwrap(); - require_eq!( - fast_emitter.chain, - finalized_emitter.chain, - MatchingEngineError::VaaMismatch - ); - require!( - fast_emitter.address == finalized_emitter.address, - MatchingEngineError::VaaMismatch - ); - require_eq!( - fast_emitter.sequence + 1, - finalized_emitter.sequence, - MatchingEngineError::VaaMismatch - ); - require!( - fast_vaa.try_timestamp().unwrap() == finalized_vaa.try_timestamp().unwrap(), - MatchingEngineError::VaaMismatch - ); - } - - // This should be infallible because: - // 1. We know that the fast VAA was used to start this auction (using its hash for the - // auction data PDA). - // 2. The finalized VAA's sequence is one greater than the fast VAA's sequence. - // - // However, we will still process results in case Token Router implementation renders any of - // these assumptions invalid. - let finalized_msg = LiquidityLayerMessage::try_from(finalized_vaa.try_payload().unwrap()) - .map_err(|_| error!(MatchingEngineError::InvalidVaa))?; - let deposit = finalized_msg - .deposit() - .ok_or(MatchingEngineError::InvalidPayloadId)?; - let deposit_msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) - .map_err(|_| error!(MatchingEngineError::InvalidDepositMessage))?; - let slow_order_response = deposit_msg - .slow_order_response() - .ok_or(MatchingEngineError::InvalidDepositPayloadId)?; - - Ok(( - LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) - .unwrap() - .to_fast_market_order_unchecked(), - slow_order_response.base_fee(), - )) -} diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs index 8d57b780..80e0cf96 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs @@ -1,16 +1,16 @@ use std::io::Write; -use crate::state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}; +use crate::state::{ + AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedSlowOrder, RouterEndpoint, +}; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; +use common::{messages::raw::LiquidityLayerMessage, wormhole_io::TypePrefixedPayload}; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, wormhole::core_bridge_program::{self, VaaAccount}, }; -use super::CctpMessageArgs; - #[derive(Accounts)] pub struct ExecuteSlowOrderNoAuctionCctp<'info> { #[account(mut)] @@ -26,7 +26,7 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { ], bump, )] - payer_sequence: Account<'info, PayerSequence>, + payer_sequence: Box>, /// This program's Wormhole (Core Bridge) emitter authority. /// @@ -36,17 +36,24 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { bump = custodian.bump, has_one = fee_recipient, // TODO: add error )] - custodian: Account<'info, Custodian>, + custodian: Box>, /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] - finalized_vaa: AccountInfo<'info>, + #[account( + mut, + close = payer, + seeds = [ + PreparedSlowOrder::SEED_PREFIX, + payer.key().as_ref(), + core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + ], + bump = prepared_slow_order.bump, + )] + prepared_slow_order: Account<'info, PreparedSlowOrder>, /// There should be no account data here because an auction was never created. #[account( @@ -55,19 +62,11 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { space = 8 + AuctionData::INIT_SPACE, seeds = [ AuctionData::SEED_PREFIX, - VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), + prepared_slow_order.fast_vaa_hash.as_ref(), ], - bump, + bump )] - auction_data: Account<'info, AuctionData>, - - /// Destination token account, which the redeemer may not own. But because the redeemer is a - /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent - /// to any account he chooses (this one). - /// - /// CHECK: This token account must already exist. - #[account(mut)] - fee_recipient: AccountInfo<'info>, + auction_data: Box>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -83,6 +82,14 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { )] custody_token: AccountInfo<'info>, + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + fee_recipient: AccountInfo<'info>, + /// Circle-supported mint. /// /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP @@ -101,7 +108,7 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { ], bump = from_router_endpoint.bump, )] - from_router_endpoint: Account<'info, RouterEndpoint>, + from_router_endpoint: Box>, /// Seeds must be \["endpoint", chain.to_be_bytes()\]. #[account( @@ -111,43 +118,7 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { ], bump = to_router_endpoint.bump, )] - to_router_endpoint: Account<'info, RouterEndpoint>, - - /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). - message_transmitter_authority: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). - message_transmitter_config: AccountInfo<'info>, - - /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), - /// first_nonce.to_string()\] (CCTP Message Transmitter program). - #[account(mut)] - used_nonces: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). - token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token - /// Messenger Minter program). - remote_token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). - token_minter: UncheckedAccount<'info>, - - /// Token Messenger Minter's Local Token account. This program uses the mint of this account to - /// validate the `mint_recipient` token account's mint. - /// - /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - local_token: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP - /// Token Messenger Minter program). - token_pair: UncheckedAccount<'info>, - - /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - token_messenger_minter_custody_token: UncheckedAccount<'info>, + to_router_endpoint: Box>, /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] @@ -176,6 +147,26 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). token_messenger_minter_sender_authority: UncheckedAccount<'info>, + /// CHECK: Mutable. Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + #[account(mut)] + message_transmitter_config: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Local token account, which this program uses to validate the `mint` used to burn. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, @@ -194,36 +185,11 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { pub fn execute_slow_order_no_auction_cctp( ctx: Context, - args: CctpMessageArgs, ) -> Result<()> { let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); - - // NOTE: We do not need the return values here for this instruction. - let (order, base_fee) = super::prepare_execute_slow_order( - &fast_vaa, - super::PrepareExecuteSlowOrder { - payer: &ctx.accounts.payer, - custodian: &ctx.accounts.custodian, - finalized_vaa: &ctx.accounts.finalized_vaa, - custody_token: ctx.accounts.custody_token.as_ref(), - message_transmitter_authority: &ctx.accounts.message_transmitter_authority, - message_transmitter_config: &ctx.accounts.message_transmitter_config, - used_nonces: &ctx.accounts.used_nonces, - token_messenger: &ctx.accounts.token_messenger, - remote_token_messenger: &ctx.accounts.remote_token_messenger, - token_minter: &ctx.accounts.token_minter, - local_token: &ctx.accounts.local_token, - token_pair: &ctx.accounts.token_pair, - token_messenger_minter_custody_token: &ctx - .accounts - .token_messenger_minter_custody_token, - message_transmitter_program: &ctx.accounts.message_transmitter_program, - token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - }, - args, - )?; + let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) + .unwrap() + .to_fast_market_order_unchecked(); // NOTE: We need to verify the router path, since an auction was never created and this check is // done in the `place_initial_offer` instruction. @@ -237,7 +203,8 @@ pub fn execute_slow_order_no_auction_cctp( let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; // TODO: encoding will change from u128 to u64 - let amount = u64::try_from(order.amount_in() - base_fee).unwrap(); + let base_fee = ctx.accounts.prepared_slow_order.base_fee; + let amount = u64::try_from(order.amount_in()).unwrap() - base_fee; let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); redeemer_message.write_all(order.redeemer_message().into())?; @@ -311,7 +278,7 @@ pub fn execute_slow_order_no_auction_cctp( mint_recipient: ctx.accounts.to_router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, payload: common::messages::Fill { - source_chain: ctx.accounts.from_router_endpoint.chain, + source_chain: ctx.accounts.prepared_slow_order.source_chain, order_sender: order.sender(), redeemer: order.redeemer(), redeemer_message: redeemer_message.into(), @@ -320,17 +287,16 @@ pub fn execute_slow_order_no_auction_cctp( }, )?; - // TODO: - - // sequence = _handleCctpTransfer(order.amountIn - baseFee, cctpVaa.emitterChainId, order); - // This is a necessary security check. This will prevent a relayer from starting an auction with // the fast transfer VAA, even though the slow relayer already delivered the slow VAA. Not // setting this could lead to trapped funds (which would require an upgrade to fix). // // NOTE: We do not bother setting the other fields in this account. The existence of this // accounts ensures the security defined in the previous paragraph. - ctx.accounts.auction_data.status = AuctionStatus::Completed; + ctx.accounts.auction_data.status = AuctionStatus::Settled { + base_fee, + penalty: None, + }; // Pay the `fee_recipient` the base fee. This ensures that the protocol relayer is paid for // relaying slow VAAs that do not have an associated auction. This prevents the protocol relayer @@ -343,9 +309,9 @@ pub fn execute_slow_order_no_auction_cctp( to: ctx.accounts.fee_recipient.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[custodian_seeds], ), // TODO: encoding will change from u128 to u64 - base_fee.try_into().unwrap(), + ctx.accounts.prepared_slow_order.base_fee, ) } diff --git a/solana/programs/matching-engine/src/processor/mod.rs b/solana/programs/matching-engine/src/processor/mod.rs index 33d60f15..68acb961 100644 --- a/solana/programs/matching-engine/src/processor/mod.rs +++ b/solana/programs/matching-engine/src/processor/mod.rs @@ -7,5 +7,8 @@ pub use auction::*; mod execute_slow_order; pub use execute_slow_order::*; +mod prepare_slow_order; +pub use prepare_slow_order::*; + mod redeem_fast_fill; pub use redeem_fast_fill::*; diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs new file mode 100644 index 00000000..576e4caa --- /dev/null +++ b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs @@ -0,0 +1,221 @@ +use crate::{ + error::MatchingEngineError, + state::{Custodian, PreparedSlowOrder}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::raw::{LiquidityLayerDepositMessage, LiquidityLayerMessage}; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, +}; + +#[derive(Accounts)] +pub struct PrepareSlowOrderCctp<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Box>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + finalized_vaa: AccountInfo<'info>, + + #[account( + init, + payer = payer, + space = 8 + PreparedSlowOrder::INIT_SPACE, + seeds = [ + PreparedSlowOrder::SEED_PREFIX, + payer.key().as_ref(), + core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + ], + bump, + )] + prepared_slow_order: Account<'info, PreparedSlowOrder>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: Account<'info, token::TokenAccount>, + + /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). + message_transmitter_authority: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + message_transmitter_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), + /// first_nonce.to_string()\] (CCTP Message Transmitter program). + #[account(mut)] + used_nonces: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Token Messenger Minter's Local Token account. This program uses the mint of this account to + /// validate the `mint_recipient` token account's mint. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP + /// Token Messenger Minter program). + token_pair: AccountInfo<'info>, + + /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + token_messenger_minter_custody_token: AccountInfo<'info>, + + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct CctpMessageArgs { + pub encoded_cctp_message: Vec, + pub cctp_attestation: Vec, +} + +pub fn prepare_slow_order_cctp( + ctx: Context, + args: CctpMessageArgs, +) -> Result<()> { + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + + let finalized_vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( + &ctx.accounts.finalized_vaa, + CpiContext::new_with_signer( + ctx.accounts.message_transmitter_program.to_account_info(), + message_transmitter_program::cpi::ReceiveTokenMessengerMinterMessage { + payer: ctx.accounts.payer.to_account_info(), + caller: ctx.accounts.custodian.to_account_info(), + message_transmitter_authority: ctx + .accounts + .message_transmitter_authority + .to_account_info(), + message_transmitter_config: ctx + .accounts + .message_transmitter_config + .to_account_info(), + used_nonces: ctx.accounts.used_nonces.to_account_info(), + token_messenger_minter_program: ctx + .accounts + .token_messenger_minter_program + .to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + token_messenger: ctx.accounts.token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.token_minter.to_account_info(), + local_token: ctx.accounts.local_token.to_account_info(), + token_pair: ctx.accounts.token_pair.to_account_info(), + mint_recipient: ctx.accounts.custody_token.to_account_info(), + custody_token: ctx + .accounts + .token_messenger_minter_custody_token + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + ), + wormhole_cctp_solana::cpi::ReceiveMessageArgs { + encoded_message: args.encoded_cctp_message, + attestation: args.cctp_attestation, + }, + )?; + + // Reconcile fast VAA with finalized VAA. + let source_chain = { + let fast_emitter = fast_vaa.try_emitter_info().unwrap(); + let finalized_emitter = finalized_vaa.try_emitter_info().unwrap(); + require_eq!( + fast_emitter.chain, + finalized_emitter.chain, + MatchingEngineError::VaaMismatch + ); + require!( + fast_emitter.address == finalized_emitter.address, + MatchingEngineError::VaaMismatch + ); + require_eq!( + fast_emitter.sequence + 1, + finalized_emitter.sequence, + MatchingEngineError::VaaMismatch + ); + require!( + fast_vaa.try_timestamp().unwrap() == finalized_vaa.try_timestamp().unwrap(), + MatchingEngineError::VaaMismatch + ); + + finalized_emitter.chain + }; + + // This should be infallible because: + // 1. We know that the fast VAA was used to start this auction (using its hash for the + // auction data PDA). + // 2. The finalized VAA's sequence is one greater than the fast VAA's sequence. + // + // However, we will still process results in case Token Router implementation renders any of + // these assumptions invalid. + let finalized_msg = LiquidityLayerMessage::try_from(finalized_vaa.try_payload().unwrap()) + .map_err(|_| error!(MatchingEngineError::InvalidVaa))?; + let deposit = finalized_msg + .deposit() + .ok_or(MatchingEngineError::InvalidPayloadId)?; + let deposit_msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) + .map_err(|_| error!(MatchingEngineError::InvalidDepositMessage))?; + let slow_order_response = deposit_msg + .slow_order_response() + .ok_or(MatchingEngineError::InvalidDepositPayloadId)?; + + // Write to the prepared slow order account, which will be closed by one of the following + // instructions: + // * execute_slow_order_auction_active_cctp + // * execute_slow_order_auction_complete + // * execute_slow_order_no_auction + ctx.accounts + .prepared_slow_order + .set_inner(PreparedSlowOrder { + bump: ctx.bumps["prepared_slow_order"], + payer: ctx.accounts.payer.key(), + fast_vaa_hash: fast_vaa.try_digest().unwrap().0, + source_chain, + base_fee: slow_order_response.base_fee().try_into().unwrap(), + }); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/prepare_slow_order/mod.rs new file mode 100644 index 00000000..c143ed24 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/prepare_slow_order/mod.rs @@ -0,0 +1,2 @@ +mod cctp; +pub use cctp::*; diff --git a/solana/programs/matching-engine/src/state/auction_data.rs b/solana/programs/matching-engine/src/state/auction_data.rs index ca241495..e33f30b6 100644 --- a/solana/programs/matching-engine/src/state/auction_data.rs +++ b/solana/programs/matching-engine/src/state/auction_data.rs @@ -6,6 +6,7 @@ pub enum AuctionStatus { NotStarted, Active, Completed, + Settled { base_fee: u64, penalty: Option }, } #[account] diff --git a/solana/programs/matching-engine/src/state/mod.rs b/solana/programs/matching-engine/src/state/mod.rs index e0d944ea..c444b4cf 100644 --- a/solana/programs/matching-engine/src/state/mod.rs +++ b/solana/programs/matching-engine/src/state/mod.rs @@ -1,14 +1,17 @@ +mod auction_data; +pub use auction_data::*; + mod custodian; pub use custodian::*; mod payer_sequence; pub use payer_sequence::*; +mod prepared_slow_order; +pub use prepared_slow_order::*; + mod redeemed_fast_fill; pub use redeemed_fast_fill::*; mod router_endpoint; pub use router_endpoint::*; - -mod auction_data; -pub use auction_data::*; diff --git a/solana/programs/matching-engine/src/state/prepared_slow_order.rs b/solana/programs/matching-engine/src/state/prepared_slow_order.rs new file mode 100644 index 00000000..3903c679 --- /dev/null +++ b/solana/programs/matching-engine/src/state/prepared_slow_order.rs @@ -0,0 +1,16 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(Debug, InitSpace)] +pub struct PreparedSlowOrder { + pub bump: u8, + pub payer: Pubkey, + pub fast_vaa_hash: [u8; 32], + + pub source_chain: u16, + pub base_fee: u64, +} + +impl PreparedSlowOrder { + pub const SEED_PREFIX: &'static [u8] = b"prepared"; +} From 5ce84b4cd7219bae83877b581673986ccbc7f4e0 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Fri, 19 Jan 2024 09:22:23 -0600 Subject: [PATCH 065/126] solana: matching engine checkpoint --- .../auction/execute_fast_order_solana.rs | 2 +- .../processor/auction/place_initial_offer.rs | 2 +- solana/ts/tests/01__matchingEngine.ts | 224 +++++++++++++++++- .../ts/tests/helpers/matching_engine_utils.ts | 24 +- 4 files changed, 236 insertions(+), 16 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs index a7c6d484..6c333a1d 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs @@ -186,7 +186,7 @@ pub fn execute_fast_order_solana(ctx: Context) -> Result ], ), core_bridge_program::cpi::PostMessageArgs { - nonce: 0, + nonce: 0, // Always zero. payload: common::messages::FastFill { fill: wormhole_args.fill, amount: u128::try_from(wormhole_args.transfer_amount).unwrap(), diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 18e01e55..01b0d493 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -122,7 +122,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R authority: ctx.accounts.payer.to_account_info(), }, ), - amount + fee_offer, + amount + max_fee, )?; // Set up the AuctionData account for this auction. diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index c8d6cc79..ac87f4f4 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -25,6 +25,7 @@ import { getInitialOfferTokenAccount, getTokenBalance, postFastTransferVaa, + postVaaWithMessage, skip_slots, verifyFastFillMessage, verifyFillMessage, @@ -710,7 +711,7 @@ describe("Matching Engine", function () { refundAddress: Buffer.alloc(32, "beef", "hex"), slowSequence: 0n, slowEmitter: Buffer.alloc(32, "dead", "hex"), - maxFee: 10000n, + maxFee: 1000000n, initAuctionFee: 100n, deadline: 0, redeemerMessage: Buffer.from("All your base are belong to us."), @@ -786,7 +787,77 @@ describe("Matching Engine", function () { }); describe("Place Initial Offer", function () { - it("Place Initial Offer", async function () { + for (const offerPrice of [0n, baseFastOrder.maxFee / 2n, baseFastOrder.maxFee]) { + it(`Place Initial Offer (Price == ${offerPrice})`, async function () { + // Fetch the balances before. + const offerBalanceBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + const [, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: offerPrice, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Validate balance changes. + const offerBalanceAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + expect(offerBalanceAfter).equals( + offerBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn + ); + expect(custodyAfter).equals( + custodyBefore + baseFastOrder.maxFee + baseFastOrder.amountIn + ); + + // Confirm the auction data. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const auctionData = await engine.fetchAuctionData(vaaHash); + const slot = await connection.getSlot(); + const offerToken = await splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + offerAuthorityOne.publicKey + ); + + expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionData.status).to.eql({ active: {} }); + expect(auctionData.bestOfferToken).to.eql(offerToken); + expect(auctionData.initialOfferToken).to.eql(offerToken); + expect(auctionData.startSlot.toString()).to.eql(slot.toString()); + expect(auctionData.amount.toString()).to.eql(baseFastOrder.amountIn.toString()); + expect(auctionData.securityDeposit.toString()).to.eql( + baseFastOrder.maxFee.toString() + ); + expect(auctionData.offerPrice.toString()).to.eql(offerPrice.toString()); + }); + } + + it(`Place Initial Offer (Offer Price == ${ + baseFastOrder.amountIn - 1n + })`, async function () { + const fastOrder = { ...baseFastOrder } as FastMarketOrder; + + // Set the deadline to 10 slots from now. + fastOrder.maxFee = fastOrder.amountIn - 1n; + // Fetch the balances before. const offerBalanceBefore = await getTokenBalance( connection, @@ -800,11 +871,11 @@ describe("Matching Engine", function () { connection, offerAuthorityOne, wormholeSequence++, - baseFastOrder, + fastOrder, ethRouter, engine, { - feeOffer: baseFastOrder.maxFee, + feeOffer: fastOrder.maxFee, fromChain: ethChain, toChain: arbChain, } @@ -820,12 +891,76 @@ describe("Matching Engine", function () { ).amount; expect(offerBalanceAfter).equals( - offerBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn + offerBalanceBefore - fastOrder.maxFee - fastOrder.amountIn ); - expect(custodyAfter).equals( - custodyBefore + baseFastOrder.maxFee + baseFastOrder.amountIn + expect(custodyAfter).equals(custodyBefore + fastOrder.maxFee + fastOrder.amountIn); + + // Confirm the auction data. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const auctionData = await engine.fetchAuctionData(vaaHash); + const slot = await connection.getSlot(); + const offerToken = await splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + offerAuthorityOne.publicKey ); + expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionData.status).to.eql({ active: {} }); + expect(auctionData.bestOfferToken).to.eql(offerToken); + expect(auctionData.initialOfferToken).to.eql(offerToken); + expect(auctionData.startSlot.toString()).to.eql(slot.toString()); + expect(auctionData.amount.toString()).to.eql(fastOrder.amountIn.toString()); + expect(auctionData.securityDeposit.toString()).to.eql(fastOrder.maxFee.toString()); + expect(auctionData.offerPrice.toString()).to.eql(fastOrder.maxFee.toString()); + }); + + it(`Place Initial Offer (With Deadline)`, async function () { + const fastOrder = { ...baseFastOrder } as FastMarketOrder; + + // Set the deadline to 10 slots from now. + const currTime = await connection.getBlockTime(await connection.getSlot()); + if (currTime === null) { + throw new Error("Failed to get current block time"); + } + fastOrder.deadline = currTime + 10; + + // Fetch the balances before. + const offerBalanceBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + const [, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: fastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Validate balance changes. + const offerBalanceAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + expect(offerBalanceAfter).equals( + offerBalanceBefore - fastOrder.maxFee - fastOrder.amountIn + ); + expect(custodyAfter).equals(custodyBefore + fastOrder.maxFee + fastOrder.amountIn); + // Confirm the auction data. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); @@ -840,12 +975,79 @@ describe("Matching Engine", function () { expect(auctionData.bestOfferToken).to.eql(offerToken); expect(auctionData.initialOfferToken).to.eql(offerToken); expect(auctionData.startSlot.toString()).to.eql(slot.toString()); - expect(auctionData.amount.toString()).to.eql(baseFastOrder.amountIn.toString()); - expect(auctionData.securityDeposit.toString()).to.eql( - baseFastOrder.maxFee.toString() + expect(auctionData.amount.toString()).to.eql(fastOrder.amountIn.toString()); + expect(auctionData.securityDeposit.toString()).to.eql(fastOrder.maxFee.toString()); + expect(auctionData.offerPrice.toString()).to.eql(fastOrder.maxFee.toString()); + }); + + it(`Cannot Place Initial Offer (Deadline Exceeded)`, async function () { + const fastOrder = { ...baseFastOrder } as FastMarketOrder; + + // Set the deadline to the previous block timestamp. + const currTime = await connection.getBlockTime(await connection.getSlot()); + if (currTime === null) { + throw new Error("Failed to get current block time"); + } + fastOrder.deadline = currTime + -1; + + const [vaaKey, signedVaa] = await postFastTransferVaa( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + fastOrder, + "0x" + Buffer.from(ethRouter).toString("hex") + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + fastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "FastMarketOrderExpired" ); - expect(auctionData.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); }); + + // it(`Cannot Place Initial Offer (Invalid Payload)`, async function () { + // const [vaaKey, signedVaa] = await postVaaWithMessage( + // connection, + // offerAuthorityOne, + // MOCK_GUARDIANS, + // wormholeSequence++, + // Buffer.from("deadbeef", "hex"), + // "0x" + Buffer.from(ethRouter).toString("hex") + // ); + + // await expectIxErr( + // connection, + // [ + // await engine.placeInitialOfferIx( + // baseFastOrder.maxFee, + // ethChain, + // arbChain, + // wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + // { + // payer: offerAuthorityOne.publicKey, + // vaa: vaaKey, + // mint: USDC_MINT_ADDRESS, + // } + // ), + // ], + // [offerAuthorityOne], + // "NotFastMarketOrder" + // ); + // }); }); describe("Improve Offer", function () { diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index a2af8845..4e851da8 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -128,12 +128,12 @@ export function decodeFastMarketOrder(buf: Buffer): FastMarketOrder { return order; } -export async function postFastTransferVaa( +export async function postVaaWithMessage( connection: Connection, payer: Keypair, guardians: MockGuardians, sequence: bigint, - fastMessage: FastMarketOrder, + payload: Buffer, emitterAddress: string ): Promise<[PublicKey, Buffer]> { const chainName = "ethereum"; @@ -145,7 +145,7 @@ export async function postFastTransferVaa( const published = foreignEmitter.publishMessage( 0, // nonce, - encodeFastMarketOrder(fastMessage), + payload, 200, // consistencyLevel 12345678 // timestamp ); @@ -156,6 +156,24 @@ export async function postFastTransferVaa( return [derivePostedVaaKey(WORMHOLE_CONTRACTS.solana.core, parseVaa(vaaBuf).hash), vaaBuf]; } +export async function postFastTransferVaa( + connection: Connection, + payer: Keypair, + guardians: MockGuardians, + sequence: bigint, + fastMessage: FastMarketOrder, + emitterAddress: string +): Promise<[PublicKey, Buffer]> { + return postVaaWithMessage( + connection, + payer, + guardians, + sequence, + encodeFastMarketOrder(fastMessage), + emitterAddress + ); +} + export async function getBestOfferTokenAccount( engine: MatchingEngineProgram, vaaHash: Buffer From 11eb1475f606c343749393d99135f60aaaf3c857 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Fri, 19 Jan 2024 13:31:31 -0600 Subject: [PATCH 066/126] solana: add negative tests for place_initial_offer --- .../processor/auction/place_initial_offer.rs | 2 + .../programs/matching-engine/src/utils/mod.rs | 4 - solana/ts/tests/01__matchingEngine.ts | 275 ++++++++++++++++-- .../ts/tests/helpers/matching_engine_utils.ts | 26 +- 4 files changed, 267 insertions(+), 40 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index 01b0d493..c832abb6 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -30,6 +30,8 @@ pub struct PlaceInitialOffer<'info> { #[account(owner = core_bridge_program::id())] vaa: AccountInfo<'info>, + /// This account should only be created once, and should never be changed to + /// init_if_needed. Otherwise someone can game an existing auction. #[account( init, payer = payer, diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 0e97a56d..00c8145b 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -23,10 +23,6 @@ pub fn verify_router_path( expected_target_chain, MatchingEngineError::ErrInvalidTargetRouter ); - require!( - target_endpoint.address != [0u8; 32], - MatchingEngineError::ErrInvalidTargetRouter - ); Ok(()) } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index ac87f4f4..a7e0b85d 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -30,6 +30,7 @@ import { verifyFastFillMessage, verifyFillMessage, } from "./helpers/matching_engine_utils"; +import { FastFill, LiquidityLayerMessage } from "../src"; chaiUse(chaiAsPromised); @@ -980,6 +981,77 @@ describe("Matching Engine", function () { expect(auctionData.offerPrice.toString()).to.eql(fastOrder.maxFee.toString()); }); + it(`Cannot Place Initial Offer (Invalid VAA)`, async function () { + const [vaaKey, signedVaa] = await postVaaWithMessage( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + Buffer.from("deadbeef", "hex"), + "0x" + Buffer.from(ethRouter).toString("hex") + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + baseFastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "InvalidVaa" + ); + }); + + it(`Cannot Place Initial Offer (Invalid Payload)`, async function () { + const fastFill = { + fill: { + sourceChain: ethChain, + orderSender: Array.from(baseFastOrder.sender), + redeemer: Array.from(baseFastOrder.redeemer), + redeemerMessage: baseFastOrder.redeemerMessage, + }, + amount: 1000n, + } as FastFill; + const payload = new LiquidityLayerMessage({ fastFill: fastFill }).encode(); + + const [vaaKey, signedVaa] = await postVaaWithMessage( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + payload, + "0x" + Buffer.from(ethRouter).toString("hex") + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + baseFastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "NotFastMarketOrder" + ); + }); + it(`Cannot Place Initial Offer (Deadline Exceeded)`, async function () { const fastOrder = { ...baseFastOrder } as FastMarketOrder; @@ -1019,35 +1091,180 @@ describe("Matching Engine", function () { ); }); - // it(`Cannot Place Initial Offer (Invalid Payload)`, async function () { - // const [vaaKey, signedVaa] = await postVaaWithMessage( - // connection, - // offerAuthorityOne, - // MOCK_GUARDIANS, - // wormholeSequence++, - // Buffer.from("deadbeef", "hex"), - // "0x" + Buffer.from(ethRouter).toString("hex") - // ); - - // await expectIxErr( - // connection, - // [ - // await engine.placeInitialOfferIx( - // baseFastOrder.maxFee, - // ethChain, - // arbChain, - // wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - // { - // payer: offerAuthorityOne.publicKey, - // vaa: vaaKey, - // mint: USDC_MINT_ADDRESS, - // } - // ), - // ], - // [offerAuthorityOne], - // "NotFastMarketOrder" - // ); - // }); + it(`Cannot Place Initial Offer (Offer Price Too High)`, async function () { + const feeOffer = baseFastOrder.maxFee + 1n; + + const [vaaKey, signedVaa] = await postFastTransferVaa( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + baseFastOrder, + "0x" + Buffer.from(ethRouter).toString("hex") + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + feeOffer, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "OfferPriceTooHigh" + ); + }); + + it(`Cannot Place Initial Offer (Invalid Emitter Chain)`, async function () { + const [vaaKey, signedVaa] = await postFastTransferVaa( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + baseFastOrder, + "0x" + Buffer.from(ethRouter).toString("hex"), + wormholeSdk.CHAINS.acala // Pass invalid emitter chain. + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + baseFastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "ErrInvalidSourceRouter" + ); + }); + + it(`Cannot Place Initial Offer (Invalid Emitter Address)`, async function () { + const [vaaKey, signedVaa] = await postFastTransferVaa( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + baseFastOrder, + "0x" + Buffer.from(arbRouter).toString("hex") // Pass arbRouter instead of ethRouter. + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + baseFastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "ErrInvalidSourceRouter" + ); + }); + + it(`Cannot Place Initial Offer (Invalid Target Router Chain)`, async function () { + // Change the fast order chain Id. + const fastOrder = { ...baseFastOrder } as FastMarketOrder; + fastOrder.targetChain = wormholeSdk.CHAINS.acala; + + const [vaaKey, signedVaa] = await postFastTransferVaa( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + fastOrder, + "0x" + Buffer.from(ethRouter).toString("hex") + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + fastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "ErrInvalidTargetRouter" + ); + }); + + it(`Cannot Place Initial Offer Again`, async function () { + const [vaaKey, signedVaa] = await postFastTransferVaa( + connection, + offerAuthorityOne, + MOCK_GUARDIANS, + wormholeSequence++, + baseFastOrder, + "0x" + Buffer.from(ethRouter).toString("hex") + ); + + await expectIxOk( + connection, + [ + await engine.placeInitialOfferIx( + baseFastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne] + ); + + await expectIxErr( + connection, + [ + await engine.placeInitialOfferIx( + baseFastOrder.maxFee, + ethChain, + arbChain, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + mint: USDC_MINT_ADDRESS, + } + ), + ], + [offerAuthorityOne], + "already in use" + ); + }); }); describe("Improve Offer", function () { diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index 4e851da8..9bdcc914 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -1,4 +1,10 @@ -import { coalesceChainId, parseVaa, tryNativeToHexString } from "@certusone/wormhole-sdk"; +import { + CHAIN_ID_ETH, + ChainId, + coalesceChainId, + parseVaa, + tryNativeToHexString, +} from "@certusone/wormhole-sdk"; import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; import { getAssociatedTokenAddressSync, getAccount } from "@solana/spl-token"; import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; @@ -134,12 +140,16 @@ export async function postVaaWithMessage( guardians: MockGuardians, sequence: bigint, payload: Buffer, - emitterAddress: string + emitterAddress: string, + emitterChain?: ChainId ): Promise<[PublicKey, Buffer]> { - const chainName = "ethereum"; + if (emitterChain === undefined) { + emitterChain = CHAIN_ID_ETH; + } + const foreignEmitter = new MockEmitter( - tryNativeToHexString(emitterAddress, chainName), - coalesceChainId(chainName), + tryNativeToHexString(emitterAddress, emitterChain), + emitterChain, Number(sequence) ); @@ -162,7 +172,8 @@ export async function postFastTransferVaa( guardians: MockGuardians, sequence: bigint, fastMessage: FastMarketOrder, - emitterAddress: string + emitterAddress: string, + emitterChain?: ChainId ): Promise<[PublicKey, Buffer]> { return postVaaWithMessage( connection, @@ -170,7 +181,8 @@ export async function postFastTransferVaa( guardians, sequence, encodeFastMarketOrder(fastMessage), - emitterAddress + emitterAddress, + emitterChain ); } From 5ab336fd8b7b098c7890c688983ded486b9818ff Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 19 Jan 2024 13:37:47 -0600 Subject: [PATCH 067/126] solana: uptick wormhole-cctp-solana to 0.0.1-alpha.6 solana: add mint recipient to endpoint --- solana/Cargo.lock | 4 +- solana/Cargo.toml | 2 +- .../admin/router_endpoint/add/local.rs | 11 +- .../admin/router_endpoint/add/mod.rs | 8 +- .../src/processor/auction/mod.rs | 2 +- .../execute_slow_order/auction_active_cctp.rs | 6 +- .../execute_slow_order/auction_complete.rs | 8 +- .../execute_slow_order/no_auction_cctp.rs | 2 +- .../src/state/router_endpoint.rs | 4 + .../admin/router_endpoint/add_cctp.rs | 5 +- .../src/processor/place_market_order/cctp.rs | 4 +- .../token-router/src/state/router_endpoint.rs | 4 + solana/ts/src/matchingEngine/index.ts | 1 + .../matchingEngine/state/RouterEndpoint.ts | 4 +- solana/ts/src/tokenRouter/index.ts | 3 +- .../src/tokenRouter/state/RouterEndpoint.ts | 10 +- solana/ts/tests/01__matchingEngine.ts | 167 +++++++++--------- solana/ts/tests/02__tokenRouter.ts | 8 + solana/ts/tests/04__interaction.ts | 12 +- 19 files changed, 151 insertions(+), 114 deletions(-) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 6e904f95..5ac4f75a 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2415,9 +2415,9 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.0.1-alpha.3" +version = "0.0.1-alpha.6" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f39e17a44f92c20a4455560e6a7fa1216745eb44e3bc5e29fcbc18fccab49125" +checksum = "2c6dc492a1db64b466853a60a91a975bb227b65c1c374c1bd825ba4d2449fe09" dependencies = [ "anchor-lang", "anchor-spl", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 600fd50a..b7be1b80 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -21,7 +21,7 @@ path = "modules/common" path = "programs/matching-engine" [workspace.dependencies.wormhole-cctp-solana] -version = "0.0.1-alpha.3" +version = "0.0.1-alpha.6" default-features = false [workspace.dependencies.wormhole-raw-vaas] diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs index 2ff9fad9..efb04c2c 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -43,15 +43,22 @@ pub struct AddLocalRouterEndpoint<'info> { } pub fn add_local_router_endpoint(ctx: Context) -> Result<()> { + let program_id = &ctx.accounts.token_router_program.key(); + // This PDA address is the router's emitter address, which is used to publish its Wormhole // messages. - let (emitter, _) = - Pubkey::find_program_address(&[b"emitter"], &ctx.accounts.token_router_program.key()); + let (emitter, _) = Pubkey::find_program_address(&[b"emitter"], program_id); ctx.accounts.router_endpoint.set_inner(RouterEndpoint { bump: ctx.bumps["router_endpoint"], chain: SOLANA_CHAIN, address: emitter.to_bytes(), + mint_recipient: Pubkey::find_program_address( + &[common::constants::CUSTODY_TOKEN_SEED_PREFIX], + program_id, + ) + .0 + .to_bytes(), }); // Done. diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs index 6dc19bd3..117697c5 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs @@ -42,13 +42,18 @@ pub struct AddRouterEndpoint<'info> { pub struct AddRouterEndpointArgs { pub chain: u16, pub address: [u8; 32], + pub mint_recipient: Option<[u8; 32]>, } pub fn add_router_endpoint( ctx: Context, args: AddRouterEndpointArgs, ) -> Result<()> { - let AddRouterEndpointArgs { chain, address } = args; + let AddRouterEndpointArgs { + chain, + address, + mint_recipient, + } = args; require!( chain != 0 && chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, @@ -61,6 +66,7 @@ pub fn add_router_endpoint( bump: ctx.bumps["router_endpoint"], chain, address, + mint_recipient: mint_recipient.unwrap_or(address), }); // Done. diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 3be36a79..be61ba3a 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -273,7 +273,7 @@ pub fn send_cctp( ], ), wormhole_cctp_solana::cpi::BurnAndPublishArgs { - burn_source: accounts.custody_token.key(), + burn_source: None, destination_caller: accounts.to_router_endpoint.address, destination_cctp_domain, amount, diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs index 5bc0f10f..b15e93af 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs @@ -55,7 +55,7 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { ], bump = prepared_slow_order.bump, )] - prepared_slow_order: Account<'info, PreparedSlowOrder>, + prepared_slow_order: Box>, /// There should be no account data here because an auction was never created. #[account( @@ -114,7 +114,7 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { ], bump = to_router_endpoint.bump, )] - to_router_endpoint: Account<'info, RouterEndpoint>, + to_router_endpoint: Box>, /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). message_transmitter_authority: UncheckedAccount<'info>, @@ -308,7 +308,7 @@ pub fn execute_slow_order_auction_active_cctp( ], ), wormhole_cctp_solana::cpi::BurnAndPublishArgs { - burn_source: ctx.accounts.custody_token.key(), + burn_source: None, destination_caller: ctx.accounts.to_router_endpoint.address, destination_cctp_domain: order.destination_cctp_domain(), amount: cctp_amount, diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs index 0678f424..fbf62eed 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs @@ -1,7 +1,6 @@ use crate::state::{AuctionData, AuctionStatus, Custodian, PreparedSlowOrder}; use anchor_lang::prelude::*; use anchor_spl::token; -use wormhole_cctp_solana::wormhole::core_bridge_program; #[derive(Accounts)] pub struct ExecuteSlowOrderAuctionComplete<'info> { @@ -17,18 +16,13 @@ pub struct ExecuteSlowOrderAuctionComplete<'info> { )] custodian: Account<'info, Custodian>, - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] - fast_vaa: AccountInfo<'info>, - #[account( mut, close = payer, seeds = [ PreparedSlowOrder::SEED_PREFIX, payer.key().as_ref(), - core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + prepared_slow_order.fast_vaa_hash.as_ref() ], bump = prepared_slow_order.bump, )] diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs index 80e0cf96..3938bcad 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs @@ -270,7 +270,7 @@ pub fn execute_slow_order_no_auction_cctp( ], ), wormhole_cctp_solana::cpi::BurnAndPublishArgs { - burn_source: ctx.accounts.custody_token.key(), + burn_source: None, destination_caller: ctx.accounts.to_router_endpoint.address, destination_cctp_domain: order.destination_cctp_domain(), amount, diff --git a/solana/programs/matching-engine/src/state/router_endpoint.rs b/solana/programs/matching-engine/src/state/router_endpoint.rs index c44eeeae..9ff33547 100644 --- a/solana/programs/matching-engine/src/state/router_endpoint.rs +++ b/solana/programs/matching-engine/src/state/router_endpoint.rs @@ -11,6 +11,10 @@ pub struct RouterEndpoint { /// Emitter address. Cannot be zero address. pub address: [u8; 32], + + /// Future-proof field in case another network has token accounts to send assets to instead of + /// sending to the address directly. + pub mint_recipient: [u8; 32], } impl RouterEndpoint { diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs index 110bc7df..33dc6477 100644 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs @@ -56,6 +56,7 @@ pub struct AddCctpRouterEndpointArgs { pub chain: u16, pub cctp_domain: u32, pub address: [u8; 32], + pub mint_recipient: Option<[u8; 32]>, } pub fn add_cctp_router_endpoint( @@ -64,8 +65,9 @@ pub fn add_cctp_router_endpoint( ) -> Result<()> { let AddCctpRouterEndpointArgs { chain, - address, cctp_domain: domain, + address, + mint_recipient, } = args; require!( @@ -79,6 +81,7 @@ pub fn add_cctp_router_endpoint( bump: ctx.bumps["router_endpoint"], chain, address, + mint_recipient: mint_recipient.unwrap_or(address), protocol: MessageProtocol::Cctp { domain }, }); diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/place_market_order/cctp.rs index a98e1a9e..800fb720 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/place_market_order/cctp.rs @@ -277,11 +277,11 @@ fn handle_place_market_order_cctp( ], ), wormhole_cctp_solana::cpi::BurnAndPublishArgs { - burn_source: ctx.accounts.burn_source.key(), + burn_source: Some(ctx.accounts.burn_source.key()), destination_caller: ctx.accounts.router_endpoint.address, destination_cctp_domain, amount, - mint_recipient: ctx.accounts.router_endpoint.address, + mint_recipient: ctx.accounts.router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, payload: common::messages::Fill { source_chain: wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, diff --git a/solana/programs/token-router/src/state/router_endpoint.rs b/solana/programs/token-router/src/state/router_endpoint.rs index 6cee7cbd..10d38812 100644 --- a/solana/programs/token-router/src/state/router_endpoint.rs +++ b/solana/programs/token-router/src/state/router_endpoint.rs @@ -21,6 +21,10 @@ pub struct RouterEndpoint { /// Emitter address. Cannot be zero address. pub address: [u8; 32], + /// Future-proof field in case another network has token accounts to send assets to instead of + /// sending to the address directly. + pub mint_recipient: [u8; 32], + /// Specific message protocol used to move assets. pub protocol: MessageProtocol, } diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index c0cbac27..a3d57cde 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -19,6 +19,7 @@ export type ProgramId = (typeof PROGRAM_IDS)[number]; export type AddRouterEndpointArgs = { chain: wormholeSdk.ChainId; address: Array; + mintRecipient: Array | null; }; export type PublishMessageAccounts = { diff --git a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts index a9811b31..8501f301 100644 --- a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts +++ b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts @@ -5,11 +5,13 @@ export class RouterEndpoint { bump: number; chain: number; address: Array; + mintRecipient: Array; - constructor(bump: number, chain: number, address: Array) { + constructor(bump: number, chain: number, address: Array, mintRecipient: Array) { this.bump = bump; this.chain = chain; this.address = address; + this.mintRecipient = mintRecipient; } static address(programId: PublicKey, chain: ChainId) { diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index aa4c46a5..1b3bdee9 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -105,8 +105,9 @@ export type RedeemFastFillAccounts = { export type AddCctpRouterEndpointArgs = { chain: wormholeSdk.ChainId; - address: Array; cctpDomain: number; + address: Array; + mintRecipient: Array | null; }; export type RegisterContractArgs = { diff --git a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts index 9431544e..788e28f3 100644 --- a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts +++ b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts @@ -10,12 +10,20 @@ export class RouterEndpoint { bump: number; chain: number; address: Array; + mintRecipient: Array; protocol: MessageProtocol; - constructor(bump: number, chain: number, address: Array, protocol: MessageProtocol) { + constructor( + bump: number, + chain: number, + address: Array, + mintRecipient: Array, + protocol: MessageProtocol + ) { this.bump = bump; this.chain = chain; this.address = address; + this.mintRecipient = mintRecipient; this.protocol = protocol; } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index a7e0b85d..1f738663 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -219,6 +219,25 @@ describe("Matching Engine", function () { "already in use" ); }); + + after("Transfer Lamports to Owner and Owner Assistant", async function () { + await expectIxOk( + connection, + [ + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: owner.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: ownerAssistant.publicKey, + lamports: 1000000000, + }), + ], + [payer] + ); + }); }); describe("Ownership Transfer Request", async function () { @@ -473,47 +492,17 @@ describe("Matching Engine", function () { }); describe("Add Router Endpoint", function () { - const createAddRouterEndpointIx = (opts?: { - sender?: PublicKey; - chain?: wormholeSdk.ChainId; - contractAddress?: Array; - }) => - engine.addRouterEndpointIx( - { - ownerOrAssistant: opts?.sender ?? owner.publicKey, - }, + it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { + const ix = await engine.addRouterEndpointIx( + { ownerOrAssistant: payer.publicKey }, { chain: ethChain, - address: opts?.contractAddress ?? ethRouter, + address: ethRouter, + mintRecipient: null, } ); - before("Transfer Lamports to Owner and Owner Assistant", async function () { - await expectIxOk( - connection, - [ - SystemProgram.transfer({ - fromPubkey: payer.publicKey, - toPubkey: owner.publicKey, - lamports: 1000000000, - }), - SystemProgram.transfer({ - fromPubkey: payer.publicKey, - toPubkey: ownerAssistant.publicKey, - lamports: 1000000000, - }), - ], - [payer] - ); - }); - - it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { - await expectIxErr( - connection, - [await createAddRouterEndpointIx({ sender: payer.publicKey })], - [payer], - "OwnerOrAssistantOnly" - ); + await expectIxErr(connection, [ix], [payer], "OwnerOrAssistantOnly"); }); [wormholeSdk.CHAINS.unset, solanaChain].forEach((chain) => @@ -525,7 +514,7 @@ describe("Matching Engine", function () { [ await engine.addRouterEndpointIx( { ownerOrAssistant: owner.publicKey }, - { chain, address: ethRouter } + { chain, address: ethRouter, mintRecipient: null } ), ], [owner], @@ -535,62 +524,57 @@ describe("Matching Engine", function () { ); it("Cannot Register Zero Address", async function () { - await expectIxErr( - connection, - [ - await createAddRouterEndpointIx({ - contractAddress: new Array(32).fill(0), - }), - ], - [owner], - "InvalidEndpoint" + const ix = await engine.addRouterEndpointIx( + { ownerOrAssistant: owner.publicKey }, + { + chain: ethChain, + address: new Array(32).fill(0), + mintRecipient: null, + } ); + + await expectIxErr(connection, [ix], [owner], "InvalidEndpoint"); }); it(`Add Router Endpoint as Owner Assistant`, async function () { const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); - await expectIxOk( - connection, - [ - await createAddRouterEndpointIx({ - sender: ownerAssistant.publicKey, - contractAddress, - }), - ], - [ownerAssistant] + const mintRecipient = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const ix = await engine.addRouterEndpointIx( + { ownerOrAssistant: ownerAssistant.publicKey }, + { + chain: ethChain, + address: contractAddress, + mintRecipient, + } ); + await expectIxOk(connection, [ix], [ownerAssistant]); const routerEndpointData = await engine.fetchRouterEndpoint( engine.routerEndpointAddress(ethChain) ); - const expectedRouterEndpointData = { - bump: 255, - chain: ethChain, - address: contractAddress, - } as RouterEndpoint; - expect(routerEndpointData).to.eql(expectedRouterEndpointData); + expect(routerEndpointData).to.eql( + new RouterEndpoint(255, ethChain, contractAddress, mintRecipient) + ); }); it(`Update Router Endpoint as Owner`, async function () { - await expectIxOk( - connection, - [ - await createAddRouterEndpointIx({ - contractAddress: ethRouter, - }), - ], - [owner] + const ix = await engine.addRouterEndpointIx( + { ownerOrAssistant: owner.publicKey }, + { + chain: ethChain, + address: ethRouter, + mintRecipient: null, + } ); + await expectIxOk(connection, [ix], [owner]); + const routerEndpointData = await engine.fetchRouterEndpoint( engine.routerEndpointAddress(ethChain) ); - const expectedRouterEndpointData = { - bump: 255, - chain: ethChain, - address: ethRouter, - } as RouterEndpoint; - expect(routerEndpointData).to.eql(expectedRouterEndpointData); + expect(routerEndpointData).to.eql( + new RouterEndpoint(255, ethChain, ethRouter, ethRouter) + ); }); }); @@ -626,12 +610,18 @@ describe("Matching Engine", function () { [Buffer.from("emitter")], SystemProgram.programId ); - const expectedRouterEndpointData = new RouterEndpoint( - expectedEndpointBump, - wormholeSdk.CHAIN_ID_SOLANA, - Array.from(expectedAddress.toBuffer()) + const [expectedMintRecipient] = PublicKey.findProgramAddressSync( + [Buffer.from("custody")], + SystemProgram.programId + ); + expect(routerEndpointData).to.eql( + new RouterEndpoint( + expectedEndpointBump, + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(expectedAddress.toBuffer()), + Array.from(expectedMintRecipient.toBuffer()) + ) ); - expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); it("Update Local Router Endpoint using SPL Token Program", async function () { @@ -649,12 +639,18 @@ describe("Matching Engine", function () { [Buffer.from("emitter")], splToken.TOKEN_PROGRAM_ID ); - const expectedRouterEndpointData = new RouterEndpoint( - expectedEndpointBump, - wormholeSdk.CHAIN_ID_SOLANA, - Array.from(expectedAddress.toBuffer()) + const [expectedMintRecipient] = PublicKey.findProgramAddressSync( + [Buffer.from("custody")], + splToken.TOKEN_PROGRAM_ID + ); + expect(routerEndpointData).to.eql( + new RouterEndpoint( + expectedEndpointBump, + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(expectedAddress.toBuffer()), + Array.from(expectedMintRecipient.toBuffer()) + ) ); - expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); }); @@ -729,6 +725,7 @@ describe("Matching Engine", function () { { chain: arbChain, address: arbRouter, + mintRecipient: null, } ), ], diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index eeea4ca7..97cd13c6 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -342,6 +342,7 @@ describe("Token Router", function () { chain: foreignChain, address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, + mintRecipient: null, } ); @@ -358,6 +359,7 @@ describe("Token Router", function () { chain, address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, + mintRecipient: null, } ); @@ -379,6 +381,7 @@ describe("Token Router", function () { chain: foreignChain, address: new Array(32).fill(0), cctpDomain: foreignCctpDomain, + mintRecipient: null, } ); @@ -395,6 +398,7 @@ describe("Token Router", function () { chain: foreignChain, address: contractAddress, cctpDomain: foreignCctpDomain, + mintRecipient: null, } ); @@ -408,6 +412,7 @@ describe("Token Router", function () { expectedEndpointBump, foreignChain, contractAddress, + contractAddress, { cctp: { domain: foreignCctpDomain } } // protocol ) ); @@ -422,6 +427,7 @@ describe("Token Router", function () { chain: foreignChain, address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, + mintRecipient: null, } ); @@ -435,6 +441,7 @@ describe("Token Router", function () { expectedEndpointBump, foreignChain, foreignEndpointAddress, + foreignEndpointAddress, { cctp: { domain: foreignCctpDomain } } // protocol ) ); @@ -1226,6 +1233,7 @@ describe("Token Router", function () { chain: foreignChain, address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, + mintRecipient: null, } ); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 9cb9f48b..e52e4187 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -125,12 +125,14 @@ describe("Matching Engine <> Token Router", function () { const routerEndpointData = await matchingEngine.fetchRouterEndpoint( matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) ); - const expectedRouterEndpointData = new matchingEngineSdk.RouterEndpoint( - 254, // bump - wormholeSdk.CHAIN_ID_SOLANA, - Array.from(tokenRouter.custodianAddress().toBuffer()) + expect(routerEndpointData).to.eql( + new matchingEngineSdk.RouterEndpoint( + 254, // bump + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(tokenRouter.custodianAddress().toBuffer()), + Array.from(tokenRouter.custodyTokenAccountAddress().toBuffer()) + ) ); - expect(routerEndpointData).to.eql(expectedRouterEndpointData); }); it("Token Router ..... Cannot Redeem Fast Fill with Invalid Redeemer", async function () { From f6c1e4a35764ad801b51951f46fa1992ec09ac09 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 19 Jan 2024 17:23:15 -0600 Subject: [PATCH 068/126] solana: prepare slow order cctp happy path --- .../src/processor/prepare_slow_order/cctp.rs | 4 +- .../ts/src/cctp/messageTransmitter/index.ts | 2 + solana/ts/src/matchingEngine/index.ts | 104 ++++++++- .../src/matchingEngine/state/AuctionData.ts | 7 +- .../matchingEngine/state/PreparedSlowOrder.ts | 31 +++ .../matchingEngine/state/RedeemedFastFill.ts | 7 +- solana/ts/tests/01__matchingEngine.ts | 198 +++++++++++++++++- 7 files changed, 335 insertions(+), 18 deletions(-) create mode 100644 solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs index 576e4caa..3c13d387 100644 --- a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs @@ -51,7 +51,7 @@ pub struct PrepareSlowOrderCctp<'info> { /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message /// from its custody account to this account. /// - /// Mutable. Seeds must be \["custody"\]. + /// CHECK: Mutable. Seeds must be \["custody"\]. /// /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( @@ -59,7 +59,7 @@ pub struct PrepareSlowOrderCctp<'info> { seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump = custodian.custody_token_bump, )] - custody_token: Account<'info, token::TokenAccount>, + custody_token: AccountInfo<'info>, /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). message_transmitter_authority: UncheckedAccount<'info>, diff --git a/solana/ts/src/cctp/messageTransmitter/index.ts b/solana/ts/src/cctp/messageTransmitter/index.ts index ef27e597..d9067be3 100644 --- a/solana/ts/src/cctp/messageTransmitter/index.ts +++ b/solana/ts/src/cctp/messageTransmitter/index.ts @@ -22,6 +22,7 @@ export type ReceiveMessageAccounts = { localToken: PublicKey; tokenPair: PublicKey; custodyToken: PublicKey; + messageTransmitterProgram: PublicKey; tokenProgram: PublicKey; }; @@ -130,6 +131,7 @@ export class MessageTransmitterProgram { localToken: tokenMessengerMinterProgram.localTokenAddress(mint), tokenPair: tokenMessengerMinterProgram.tokenPairAddress(sourceDomain, burnTokenAddress), custodyToken: tokenMessengerMinterProgram.custodyTokenAddress(mint), + messageTransmitterProgram: this.ID, tokenProgram: TOKEN_PROGRAM_ID, }; } diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index a3d57cde..bd50c097 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -8,9 +8,10 @@ import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; import { AuctionConfig, Custodian, RouterEndpoint, PayerSequence, RedeemedFastFill } from "./state"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { AuctionData } from "./state/AuctionData"; -import { TokenMessengerMinterProgram } from "../cctp"; +import { MessageTransmitterProgram, TokenMessengerMinterProgram } from "../cctp"; import { USDC_MINT_ADDRESS } from "../../tests/helpers"; import { VaaAccount } from "../wormhole"; +import { PreparedSlowOrder } from "./state/PreparedSlowOrder"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -38,6 +39,11 @@ export type RedeemFastFillAccounts = { tokenProgram: PublicKey; }; +export type CctpMessageArgs = { + encodedCctpMessage: Buffer; + cctpAttestation: Buffer; +}; + export class MatchingEngineProgram { private _programId: ProgramId; @@ -78,11 +84,11 @@ export class MatchingEngineProgram { return this.program.account.routerEndpoint.fetch(addr); } - auctionDataAddress(vaaHash: Buffer | Uint8Array): PublicKey { + auctionDataAddress(vaaHash: Array | Buffer | Uint8Array): PublicKey { return AuctionData.address(this.ID, vaaHash); } - async fetchAuctionData(vaaHash: Buffer | Uint8Array): Promise { + async fetchAuctionData(vaaHash: Array | Buffer | Uint8Array): Promise { return this.program.account.auctionData.fetch(this.auctionDataAddress(vaaHash)); } @@ -103,7 +109,7 @@ export class MatchingEngineProgram { )[0]; } - redeemedFastFillAddress(vaaHash: Buffer | Uint8Array): PublicKey { + redeemedFastFillAddress(vaaHash: Array | Buffer | Uint8Array): PublicKey { return RedeemedFastFill.address(this.ID, vaaHash); } @@ -111,6 +117,20 @@ export class MatchingEngineProgram { return this.program.account.redeemedFastFill.fetch(addr); } + preparedSlowOrderAddress( + payer: PublicKey, + fastVaaHash: Array | Buffer | Uint8Array + ): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("prepared"), payer.toBuffer(), Buffer.from(fastVaaHash)], + this.ID + )[0]; + } + + fetchPreparedSlowOrder(addr: PublicKey): Promise { + return this.program.account.preparedSlowOrder.fetch(addr); + } + async initializeIx( auctionConfig: AuctionConfig, accounts: { @@ -303,7 +323,7 @@ export class MatchingEngineProgram { toChain: wormholeSdk.ChainId, vaaHash: Buffer, accounts: { payer: PublicKey; vaa: PublicKey; mint: PublicKey } - ) { + ): Promise { const { payer, vaa, mint } = accounts; return this.program.methods .placeInitialOffer(new BN(feeOffer.toString())) @@ -324,7 +344,7 @@ export class MatchingEngineProgram { feeOffer: bigint, vaaHash: Buffer | Uint8Array, accounts: { offerAuthority: PublicKey; bestOfferToken: PublicKey } - ) { + ): Promise { const { offerAuthority, bestOfferToken } = accounts; const { mint } = await splToken.getAccount( this.program.provider.connection, @@ -343,6 +363,58 @@ export class MatchingEngineProgram { .instruction(); } + async prepareSlowOrderCctpIx( + accounts: { + payer: PublicKey; + fastVaa: PublicKey; + finalizedVaa: PublicKey; + mint: PublicKey; + }, + args: CctpMessageArgs + ): Promise { + const { payer, fastVaa, finalizedVaa, mint } = accounts; + const fastVaaAcct = await VaaAccount.fetch(this.program.provider.connection, fastVaa); + const { encodedCctpMessage } = args; + const { + authority: messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessengerMinterProgram, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + custodyToken: tokenMessengerMinterCustodyToken, + messageTransmitterProgram, + tokenProgram, + } = this.messageTransmitterProgram().receiveMessageAccounts(mint, encodedCctpMessage); + + return this.program.methods + .prepareSlowOrderCctp(args) + .accounts({ + payer, + custodian: this.custodianAddress(), + fastVaa, + finalizedVaa, + preparedSlowOrder: this.preparedSlowOrderAddress(payer, fastVaaAcct.digest()), + custodyToken: this.custodyTokenAccountAddress(), + messageTransmitterAuthority, + messageTransmitterConfig, + usedNonces, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + tokenPair, + tokenMessengerMinterCustodyToken, + tokenMessengerMinterProgram, + messageTransmitterProgram, + tokenProgram, + }) + .instruction(); + } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { switch (this._programId) { case testnet(): { @@ -363,6 +435,26 @@ export class MatchingEngineProgram { } } + messageTransmitterProgram(): MessageTransmitterProgram { + switch (this._programId) { + case testnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + case mainnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + async executeFastOrderIx( toChain: wormholeSdk.ChainId, remoteDomain: number, diff --git a/solana/ts/src/matchingEngine/state/AuctionData.ts b/solana/ts/src/matchingEngine/state/AuctionData.ts index 2588fd6b..1a22d2e0 100644 --- a/solana/ts/src/matchingEngine/state/AuctionData.ts +++ b/solana/ts/src/matchingEngine/state/AuctionData.ts @@ -34,7 +34,10 @@ export class AuctionData { this.offerPrice = offer_price; } - static address(programId: PublicKey, vaaHash: Buffer | Uint8Array) { - return PublicKey.findProgramAddressSync([Buffer.from("auction"), vaaHash], programId)[0]; + static address(programId: PublicKey, vaaHash: Array | Buffer | Uint8Array) { + return PublicKey.findProgramAddressSync( + [Buffer.from("auction"), Buffer.from(vaaHash)], + programId + )[0]; } } diff --git a/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts b/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts new file mode 100644 index 00000000..3e08a098 --- /dev/null +++ b/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts @@ -0,0 +1,31 @@ +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; + +export class PreparedSlowOrder { + bump: number; + payer: PublicKey; + fastVaaHash: Array; + sourceChain: number; + baseFee: BN; + + constructor( + bump: number, + payer: PublicKey, + fastVaaHash: Array, + sourceChain: number, + baseFee: BN + ) { + this.bump = bump; + this.payer = payer; + this.fastVaaHash = fastVaaHash; + this.sourceChain = sourceChain; + this.baseFee = baseFee; + } + + static address(programId: PublicKey, payer: PublicKey, fastVaaHash: Array) { + return PublicKey.findProgramAddressSync( + [Buffer.from("prepared"), payer.toBuffer(), Buffer.from(fastVaaHash)], + programId + )[0]; + } +} diff --git a/solana/ts/src/matchingEngine/state/RedeemedFastFill.ts b/solana/ts/src/matchingEngine/state/RedeemedFastFill.ts index 5233176c..ada9d012 100644 --- a/solana/ts/src/matchingEngine/state/RedeemedFastFill.ts +++ b/solana/ts/src/matchingEngine/state/RedeemedFastFill.ts @@ -12,7 +12,10 @@ export class RedeemedFastFill { this.sequence = sequence; } - static address(programId: PublicKey, vaaHash: Buffer | Uint8Array) { - return PublicKey.findProgramAddressSync([Buffer.from("redeemed"), vaaHash], programId)[0]; + static address(programId: PublicKey, vaaHash: Array | Buffer | Uint8Array) { + return PublicKey.findProgramAddressSync( + [Buffer.from("redeemed"), Buffer.from(vaaHash)], + programId + )[0]; } } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 1f738663..b5183580 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,6 +1,13 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import * as splToken from "@solana/spl-token"; -import { Connection, Keypair, PublicKey, SYSVAR_RENT_PUBKEY, SystemProgram } from "@solana/web3.js"; +import { + Connection, + Keypair, + PublicKey, + SYSVAR_RENT_PUBKEY, + SystemProgram, + TransactionInstruction, +} from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { @@ -10,6 +17,8 @@ import { RouterEndpoint, } from "../src/matchingEngine"; import { + CircleAttester, + ETHEREUM_USDC_ADDRESS, LOCALHOST, MOCK_GUARDIANS, OWNER_ASSISTANT_KEYPAIR, @@ -17,6 +26,7 @@ import { USDC_MINT_ADDRESS, expectIxErr, expectIxOk, + postLiquidityLayerVaa, } from "./helpers"; import { FastMarketOrder, @@ -30,7 +40,13 @@ import { verifyFastFillMessage, verifyFillMessage, } from "./helpers/matching_engine_utils"; -import { FastFill, LiquidityLayerMessage } from "../src"; +import { + CctpTokenBurnMessage, + FastFill, + LiquidityLayerDeposit, + LiquidityLayerMessage, +} from "../src"; +import { VaaAccount } from "../src/wormhole"; chaiUse(chaiAsPromised); @@ -763,7 +779,7 @@ describe("Matching Engine", function () { // Mint USDC. const mintAmount = 100000n * 100000000n; - const destination = await splToken.getAssociatedTokenAddressSync( + const destination = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, wallet.publicKey ); @@ -830,7 +846,7 @@ describe("Matching Engine", function () { const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); - const offerToken = await splToken.getAssociatedTokenAddressSync( + const offerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityOne.publicKey ); @@ -897,7 +913,7 @@ describe("Matching Engine", function () { const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); - const offerToken = await splToken.getAssociatedTokenAddressSync( + const offerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityOne.publicKey ); @@ -963,7 +979,7 @@ describe("Matching Engine", function () { const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const auctionData = await engine.fetchAuctionData(vaaHash); const slot = await connection.getSlot(); - const offerToken = await splToken.getAssociatedTokenAddressSync( + const offerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityOne.publicKey ); @@ -1841,6 +1857,127 @@ describe("Matching Engine", function () { ); }); }); + + describe("Prepare Slow Order", function () { + let testCctpNonce = 2n ** 64n - 1n; + + // Hack to prevent math overflow error when invoking CCTP programs. + testCctpNonce -= 4n * 6400n; + + const localVariables = new Map(); + + // TODO: add negative tests + + it("Prepare Slow Order", async function () { + const redeemer = Keypair.generate(); + + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage(engine, sourceCctpDomain, cctpNonce, amountIn); + + const fastMessage = new LiquidityLayerMessage({ + fastMarketOrder: { + amountIn, + minAmountOut: 0n, + targetChain: wormholeSdk.CHAIN_ID_SOLANA as number, + destinationCctpDomain, + redeemer: Array.from(redeemer.publicKey.toBuffer()), + sender: new Array(32).fill(0), + refundAddress: new Array(32).fill(0), + slowSequence: 0n, // TODO: will be removed + slowEmitter: new Array(32).fill(0), // TODO: will be removed + maxFee: 42069n, + initAuctionFee: 2000n, + deadline: 2, + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + }); + + const finalizedMessage = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount: amountIn, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: Array.from( + engine.custodyTokenAccountAddress().toBuffer() + ), + }, + { + slowOrderResponse: { + baseFee: 420n, + }, + } + ), + }); + + const fastVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + fastMessage + ); + const finalizedVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + finalizedMessage + ); + + const ix = await engine.prepareSlowOrderCctpIx( + { + payer: payer.publicKey, + fastVaa, + finalizedVaa, + mint: USDC_MINT_ADDRESS, + }, + { + encodedCctpMessage, + cctpAttestation, + } + ); + + await expectIxOk(connection, [ix], [payer]); + + // TODO: validate prepared slow order + const fastVaaAcct = await VaaAccount.fetch(connection, fastVaa); + const preparedSlowOrder = engine.preparedSlowOrderAddress( + payer.publicKey, + fastVaaAcct.digest() + ); + + // Save for later. + localVariables.set("ix", ix); + localVariables.set("preparedSlowOrder", preparedSlowOrder); + }); + + it("Cannot Prepare Slow Order for Same VAAs", async function () { + const ix = localVariables.get("ix") as TransactionInstruction; + expect(localVariables.delete("ix")).is.true; + + const preparedSlowOrder = localVariables.get("preparedSlowOrder") as PublicKey; + expect(localVariables.delete("preparedSlowOrder")).is.true; + + await expectIxErr( + connection, + [ix], + [payer], + `Allocate: account Address { address: ${preparedSlowOrder.toString()}, base: None } already in use` + ); + }); + }); }); }); @@ -1887,3 +2024,52 @@ async function placeInitialOfferForTest( return [vaaKey, signedVaa]; } + +async function craftCctpTokenBurnMessage( + engine: MatchingEngineProgram, + sourceCctpDomain: number, + cctpNonce: bigint, + amount: bigint, + overrides: { destinationCctpDomain?: number } = {} +) { + const { destinationCctpDomain: inputDestinationCctpDomain } = overrides; + + const messageTransmitterProgram = engine.messageTransmitterProgram(); + const { version, localDomain } = await messageTransmitterProgram.fetchMessageTransmitterConfig( + messageTransmitterProgram.messageTransmitterConfigAddress() + ); + const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; + + const tokenMessengerMinterProgram = engine.tokenMessengerMinterProgram(); + const { tokenMessenger: sourceTokenMessenger } = + await tokenMessengerMinterProgram.fetchRemoteTokenMessenger( + tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain) + ); + + const burnMessage = new CctpTokenBurnMessage( + { + version, + sourceDomain: sourceCctpDomain, + destinationDomain: destinationCctpDomain, + nonce: cctpNonce, + sender: sourceTokenMessenger, + recipient: Array.from(tokenMessengerMinterProgram.ID.toBuffer()), // targetTokenMessenger + targetCaller: Array.from(engine.custodianAddress().toBuffer()), // targetCaller + }, + 0, + Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress + Array.from(engine.custodyTokenAccountAddress().toBuffer()), // mint recipient + amount, + new Array(32).fill(0) // burnSource + ); + + const encodedCctpMessage = burnMessage.encode(); + const cctpAttestation = new CircleAttester().createAttestation(encodedCctpMessage); + + return { + destinationCctpDomain, + burnMessage, + encodedCctpMessage, + cctpAttestation, + }; +} From 3d804e088f217d354f1b43977db86821ebd05468 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 19 Jan 2024 17:26:51 -0600 Subject: [PATCH 069/126] solana: fix unchecked --- .../src/processor/execute_slow_order/auction_active_cctp.rs | 2 +- .../src/processor/prepare_slow_order/cctp.rs | 4 ++-- .../programs/token-router/src/processor/redeem_fill/cctp.rs | 6 +++--- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs index b15e93af..4ef57618 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs @@ -120,7 +120,7 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { message_transmitter_authority: UncheckedAccount<'info>, /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). - message_transmitter_config: AccountInfo<'info>, + message_transmitter_config: UncheckedAccount<'info>, /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), /// first_nonce.to_string()\] (CCTP Message Transmitter program). diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs index 3c13d387..db2982a9 100644 --- a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs @@ -91,11 +91,11 @@ pub struct PrepareSlowOrderCctp<'info> { /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP /// Token Messenger Minter program). - token_pair: AccountInfo<'info>, + token_pair: UncheckedAccount<'info>, /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). #[account(mut)] - token_messenger_minter_custody_token: AccountInfo<'info>, + token_messenger_minter_custody_token: UncheckedAccount<'info>, token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index a13ac97a..6dd6bcd1 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -75,7 +75,7 @@ pub struct RedeemCctpFill<'info> { message_transmitter_authority: UncheckedAccount<'info>, /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). - message_transmitter_config: AccountInfo<'info>, + message_transmitter_config: UncheckedAccount<'info>, /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), /// first_nonce.to_string()\] (CCTP Message Transmitter program). @@ -101,11 +101,11 @@ pub struct RedeemCctpFill<'info> { /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP /// Token Messenger Minter program). - token_pair: AccountInfo<'info>, + token_pair: UncheckedAccount<'info>, /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). #[account(mut)] - token_messenger_minter_custody_token: AccountInfo<'info>, + token_messenger_minter_custody_token: UncheckedAccount<'info>, token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, From 7bb2a9230d7f83951844c3f6b8e96d3797bd5dee Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 19 Jan 2024 19:43:44 -0600 Subject: [PATCH 070/126] solana: fix prepared by --- .../processor/execute_slow_order/auction_active_cctp.rs | 8 ++++++-- .../src/processor/execute_slow_order/auction_complete.rs | 7 ++++--- .../src/processor/execute_slow_order/no_auction_cctp.rs | 8 ++++++-- .../src/processor/prepare_slow_order/cctp.rs | 2 +- .../matching-engine/src/state/prepared_slow_order.rs | 2 +- solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts | 6 +++--- solana/ts/tests/01__matchingEngine.ts | 8 +++++--- 7 files changed, 26 insertions(+), 15 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs index 4ef57618..55c8b423 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs @@ -45,12 +45,16 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, + /// CHECK: Must be the account that created the prepared slow order. + #[account(mut)] + prepared_by: AccountInfo<'info>, + #[account( mut, - close = payer, + close = prepared_by, seeds = [ PreparedSlowOrder::SEED_PREFIX, - payer.key().as_ref(), + prepared_by.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump = prepared_slow_order.bump, diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs index fbf62eed..b82fb42b 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs @@ -4,8 +4,9 @@ use anchor_spl::token; #[derive(Accounts)] pub struct ExecuteSlowOrderAuctionComplete<'info> { + /// CHECK: Must be the account that created the prepared slow order. #[account(mut)] - payer: Signer<'info>, + prepared_by: AccountInfo<'info>, /// This program's Wormhole (Core Bridge) emitter authority. /// @@ -18,10 +19,10 @@ pub struct ExecuteSlowOrderAuctionComplete<'info> { #[account( mut, - close = payer, + close = prepared_by, seeds = [ PreparedSlowOrder::SEED_PREFIX, - payer.key().as_ref(), + prepared_by.key().as_ref(), prepared_slow_order.fast_vaa_hash.as_ref() ], bump = prepared_slow_order.bump, diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs index 3938bcad..6bc6671a 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs @@ -43,12 +43,16 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, + /// CHECK: Must be the account that created the prepared slow order. + #[account(mut)] + prepared_by: AccountInfo<'info>, + #[account( mut, - close = payer, + close = prepared_by, seeds = [ PreparedSlowOrder::SEED_PREFIX, - payer.key().as_ref(), + prepared_by.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump = prepared_slow_order.bump, diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs index db2982a9..b77e6962 100644 --- a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs @@ -210,7 +210,7 @@ pub fn prepare_slow_order_cctp( .prepared_slow_order .set_inner(PreparedSlowOrder { bump: ctx.bumps["prepared_slow_order"], - payer: ctx.accounts.payer.key(), + prepared_by: ctx.accounts.payer.key(), fast_vaa_hash: fast_vaa.try_digest().unwrap().0, source_chain, base_fee: slow_order_response.base_fee().try_into().unwrap(), diff --git a/solana/programs/matching-engine/src/state/prepared_slow_order.rs b/solana/programs/matching-engine/src/state/prepared_slow_order.rs index 3903c679..d8f875e0 100644 --- a/solana/programs/matching-engine/src/state/prepared_slow_order.rs +++ b/solana/programs/matching-engine/src/state/prepared_slow_order.rs @@ -4,7 +4,7 @@ use anchor_lang::prelude::*; #[derive(Debug, InitSpace)] pub struct PreparedSlowOrder { pub bump: u8, - pub payer: Pubkey, + pub prepared_by: Pubkey, pub fast_vaa_hash: [u8; 32], pub source_chain: u16, diff --git a/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts b/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts index 3e08a098..748fc80e 100644 --- a/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts +++ b/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts @@ -3,20 +3,20 @@ import { PublicKey } from "@solana/web3.js"; export class PreparedSlowOrder { bump: number; - payer: PublicKey; + preparedBy: PublicKey; fastVaaHash: Array; sourceChain: number; baseFee: BN; constructor( bump: number, - payer: PublicKey, + preparedBy: PublicKey, fastVaaHash: Array, sourceChain: number, baseFee: BN ) { this.bump = bump; - this.payer = payer; + this.preparedBy = preparedBy; this.fastVaaHash = fastVaaHash; this.sourceChain = sourceChain; this.baseFee = baseFee; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index b5183580..8c8bbb4c 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1952,10 +1952,12 @@ describe("Matching Engine", function () { await expectIxOk(connection, [ix], [payer]); // TODO: validate prepared slow order - const fastVaaAcct = await VaaAccount.fetch(connection, fastVaa); + const fastVaaHash = await VaaAccount.fetch(connection, fastVaa).then((vaa) => + vaa.digest() + ); const preparedSlowOrder = engine.preparedSlowOrderAddress( payer.publicKey, - fastVaaAcct.digest() + fastVaaHash ); // Save for later. @@ -1963,7 +1965,7 @@ describe("Matching Engine", function () { localVariables.set("preparedSlowOrder", preparedSlowOrder); }); - it("Cannot Prepare Slow Order for Same VAAs", async function () { + it("Cannot Prepare Slow Order for Same VAAs with Same Payer", async function () { const ix = localVariables.get("ix") as TransactionInstruction; expect(localVariables.delete("ix")).is.true; From 94696df55ea73658d9c82bc4f3e4dbecbe0ed320 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Sat, 20 Jan 2024 16:54:53 -0600 Subject: [PATCH 071/126] solana: add negative improve_offer tests --- solana/ts/src/matchingEngine/index.ts | 50 ++++- solana/ts/tests/01__matchingEngine.ts | 293 +++++++++++++++++++++++--- 2 files changed, 308 insertions(+), 35 deletions(-) diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index bd50c097..8167a942 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -131,6 +131,14 @@ export class MatchingEngineProgram { return this.program.account.preparedSlowOrder.fetch(addr); } + async getBestOfferTokenAccount(vaaHash: Buffer | Uint8Array): Promise { + return (await this.fetchAuctionData(vaaHash)).bestOfferToken; + } + + async getInitialOfferTokenAccount(vaaHash: Buffer): Promise { + return (await this.fetchAuctionData(vaaHash)).bestOfferToken; + } + async initializeIx( auctionConfig: AuctionConfig, accounts: { @@ -343,9 +351,14 @@ export class MatchingEngineProgram { async improveOfferIx( feeOffer: bigint, vaaHash: Buffer | Uint8Array, - accounts: { offerAuthority: PublicKey; bestOfferToken: PublicKey } - ): Promise { - const { offerAuthority, bestOfferToken } = accounts; + accounts: { offerAuthority: PublicKey; bestOfferToken?: PublicKey } + ) { + let { offerAuthority, bestOfferToken } = accounts; + + if (bestOfferToken === undefined) { + bestOfferToken = await this.getBestOfferTokenAccount(vaaHash); + } + const { mint } = await splToken.getAccount( this.program.provider.connection, bestOfferToken @@ -462,11 +475,19 @@ export class MatchingEngineProgram { accounts: { payer: PublicKey; vaa: PublicKey; - bestOfferToken: PublicKey; - initialOfferToken: PublicKey; + bestOfferToken?: PublicKey; + initialOfferToken?: PublicKey; } ) { - const { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + let { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + + if (bestOfferToken === undefined) { + bestOfferToken = await this.getBestOfferTokenAccount(vaaHash); + } + + if (initialOfferToken === undefined) { + initialOfferToken = await this.getInitialOfferTokenAccount(vaaHash); + } const { mint } = await splToken.getAccount( this.program.provider.connection, bestOfferToken @@ -528,14 +549,23 @@ export class MatchingEngineProgram { accounts: { payer: PublicKey; vaa: PublicKey; - bestOfferToken: PublicKey; - initialOfferToken: PublicKey; + bestOfferToken?: PublicKey; + initialOfferToken?: PublicKey; } ) { - const { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + let { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + + if (bestOfferToken === undefined) { + bestOfferToken = await this.getBestOfferTokenAccount(vaaHash); + } + + if (initialOfferToken === undefined) { + initialOfferToken = await this.getInitialOfferTokenAccount(vaaHash); + } + const { mint } = await splToken.getAccount( this.program.provider.connection, - bestOfferToken + bestOfferToken! ); const custodian = this.custodianAddress(); diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 8c8bbb4c..15f2108b 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1281,7 +1281,104 @@ describe("Matching Engine", function () { }); describe("Improve Offer", function () { - it("Improve Offer with New Offer Authority", async function () { + for (const newOffer of [0n, baseFastOrder.maxFee / 2n, baseFastOrder.maxFee - 1n]) { + it(`Improve Offer (Price == ${newOffer})`, async function () { + const [, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + const initialOfferBalanceBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const newOfferBalanceBefore = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + // New Offer from offerAuthorityTwo. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + await expectIxOk( + connection, + [ + await engine.improveOfferIx( + newOffer, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityTwo.publicKey, + bestOfferToken, + } + ), + ], + [offerAuthorityTwo] + ); + + // Validate balance changes. + const initialOfferBalanceAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const newOfferBalanceAfter = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + + expect(newOfferBalanceAfter).equals( + newOfferBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn + ); + expect(initialOfferBalanceAfter).equals( + initialOfferBalanceBefore + baseFastOrder.maxFee + baseFastOrder.amountIn + ); + expect(custodyAfter).equals(custodyBefore); + + // Confirm the auction data. + const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + const newOfferToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + offerAuthorityTwo.publicKey + ); + const initialOfferToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + offerAuthorityOne.publicKey + ); + + expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionDataAfter.status).to.eql({ active: {} }); + expect(auctionDataAfter.bestOfferToken).to.eql(newOfferToken); + expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); + expect(auctionDataAfter.startSlot.toString()).to.eql( + auctionDataBefore.startSlot.toString() + ); + expect(auctionDataAfter.amount.toString()).to.eql( + auctionDataBefore.amount.toString() + ); + expect(auctionDataAfter.securityDeposit.toString()).to.eql( + auctionDataBefore.securityDeposit.toString() + ); + expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + }); + } + + it(`Improve Offer With Highest Offer Account`, async function () { const [, signedVaa] = await placeInitialOfferForTest( connection, offerAuthorityOne, @@ -1300,17 +1397,13 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey ); - const newOfferBalanceBefore = await getTokenBalance( - connection, - offerAuthorityTwo.publicKey - ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - // New Offer from offerAuthorityTwo. - const newOffer = baseFastOrder.maxFee - 100n; + // New Offer from offerAuthorityOne. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const newOffer = baseFastOrder.maxFee - 100n; const auctionDataBefore = await engine.fetchAuctionData(vaaHash); const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); @@ -1321,41 +1414,28 @@ describe("Matching Engine", function () { newOffer, wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { - offerAuthority: offerAuthorityTwo.publicKey, + offerAuthority: offerAuthorityOne.publicKey, bestOfferToken, } ), ], - [offerAuthorityTwo] + [offerAuthorityOne] ); - // Validate balance changes. + // Validate balance changes (nothing should change). const initialOfferBalanceAfter = await getTokenBalance( connection, offerAuthorityOne.publicKey ); - const newOfferBalanceAfter = await getTokenBalance( - connection, - offerAuthorityTwo.publicKey - ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - expect(newOfferBalanceAfter).equals( - newOfferBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn - ); - expect(initialOfferBalanceAfter).equals( - initialOfferBalanceBefore + baseFastOrder.maxFee + baseFastOrder.amountIn - ); + expect(initialOfferBalanceAfter).equals(initialOfferBalanceBefore); expect(custodyAfter).equals(custodyBefore); // Confirm the auction data. const auctionDataAfter = await engine.fetchAuctionData(vaaHash); - const newOfferToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - offerAuthorityTwo.publicKey - ); const initialOfferToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityOne.publicKey @@ -1363,7 +1443,7 @@ describe("Matching Engine", function () { expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ active: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(newOfferToken); + expect(auctionDataAfter.bestOfferToken).to.eql(auctionDataAfter.bestOfferToken); expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); expect(auctionDataAfter.startSlot.toString()).to.eql( auctionDataBefore.startSlot.toString() @@ -1376,6 +1456,169 @@ describe("Matching Engine", function () { ); expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); }); + + it(`Cannot Improve Offer (Auction Expired)`, async function () { + const [, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // New Offer from offerAuthorityOne. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const newOffer = baseFastOrder.maxFee - 100n; + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + await skip_slots(connection, 3); + + await expectIxErr( + connection, + [ + await engine.improveOfferIx( + newOffer, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + } + ), + ], + [offerAuthorityOne], + "AuctionPeriodExpired" + ); + }); + + it(`Cannot Improve Offer (Invalid Best Offer Token Account)`, async function () { + const [, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // New Offer from offerAuthorityOne. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const newOffer = baseFastOrder.maxFee - 100n; + + // Pass the wrong address for the best offer token account. + await expectIxErr( + connection, + [ + await engine.improveOfferIx( + newOffer, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken: engine.custodyTokenAccountAddress(), + } + ), + ], + [offerAuthorityOne], + "InvalidTokenAccount" + ); + }); + + it(`Cannot Improve Offer (Auction Not Active)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // New Offer from offerAuthorityOne. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const newOffer = baseFastOrder.maxFee - 100n; + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + await skip_slots(connection, 3); + + // Excute the fast order so that the auction status changes. + await expectIxOk( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + }), + ], + [offerAuthorityOne] + ); + + await expectIxErr( + connection, + [ + await engine.improveOfferIx( + newOffer, + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + } + ), + ], + [offerAuthorityOne], + "AuctionNotActive" + ); + }); + + it(`Cannot Improve Offer (Offer Price Not Improved)`, async function () { + const [, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // New Offer from offerAuthorityOne. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + await expectIxErr( + connection, + [ + await engine.improveOfferIx( + baseFastOrder.maxFee, // Offer price not improved. + wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + } + ), + ], + [offerAuthorityOne], + "OfferPriceNotImproved" + ); + }); }); describe("Execute Fast Order", function () { From 7e4ae0d7dd75675b3460854dc9fa9b779b9200c4 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Sun, 21 Jan 2024 15:54:37 -0600 Subject: [PATCH 072/126] solana: add negative tests for execute fast order --- solana/programs/matching-engine/src/error.rs | 3 + .../processor/auction/execute_fast_order.rs | 4 +- .../auction/execute_fast_order_solana.rs | 4 +- solana/ts/src/matchingEngine/index.ts | 9 +- solana/ts/tests/01__matchingEngine.ts | 627 +++++++++++++++++- 5 files changed, 637 insertions(+), 10 deletions(-) diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index e9d84b2d..b25cad5b 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -123,4 +123,7 @@ pub enum MatchingEngineError { #[msg("VaaMismatch")] VaaMismatch, + + #[msg("MismatchedVaaHash")] + MismatchedVaaHash, } diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs index 2b162318..1567e4b1 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs @@ -31,7 +31,9 @@ pub struct ExecuteFastOrder<'info> { /// CHECK: Must be owned by the Wormhole Core Bridge program. #[account( owner = core_bridge_program::id(), - constraint = VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash // TODO: add error + constraint = { + VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash + } @ MatchingEngineError::MismatchedVaaHash )] vaa: AccountInfo<'info>, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs index 6c333a1d..408a8ee8 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs @@ -28,7 +28,9 @@ pub struct ExecuteFastOrderSolana<'info> { /// CHECK: Must be owned by the Wormhole Core Bridge program. #[account( owner = core_bridge_program::id(), - constraint = VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash // TODO: add error + constraint = { + VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash + } @ MatchingEngineError::MismatchedVaaHash )] vaa: AccountInfo<'info>, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 8167a942..74d6e512 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -551,9 +551,10 @@ export class MatchingEngineProgram { vaa: PublicKey; bestOfferToken?: PublicKey; initialOfferToken?: PublicKey; + toRouterEndpoint?: PublicKey; } ) { - let { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + let { payer, vaa, bestOfferToken, initialOfferToken, toRouterEndpoint } = accounts; if (bestOfferToken === undefined) { bestOfferToken = await this.getBestOfferTokenAccount(vaaHash); @@ -563,6 +564,10 @@ export class MatchingEngineProgram { initialOfferToken = await this.getInitialOfferTokenAccount(vaaHash); } + if (toRouterEndpoint === undefined) { + toRouterEndpoint = this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA); + } + const { mint } = await splToken.getAccount( this.program.provider.connection, bestOfferToken! @@ -582,7 +587,7 @@ export class MatchingEngineProgram { payer, custodian, auctionData: this.auctionDataAddress(vaaHash), - toRouterEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + toRouterEndpoint, executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), bestOfferToken, initialOfferToken, diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 15f2108b..d8984ab4 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1894,9 +1894,9 @@ describe("Matching Engine", function () { const auctionDataBefore = await engine.fetchAuctionData(vaaHash); // Fast forward into the grace period. - const txnSlot = await skip_slots(connection, 7); + await skip_slots(connection, 7); const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); - await expectIxOk( + const txnSignature = await expectIxOk( connection, [ await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { @@ -1908,6 +1908,9 @@ describe("Matching Engine", function () { ], [offerAuthorityOne] ); + const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { + return status.value!.slot; + }); // Compute the expected penalty and user reward. const [, expectedReward] = await calculateDynamicPenalty( @@ -1977,7 +1980,7 @@ describe("Matching Engine", function () { ); }); - it("Execute Fast Order After Grace Period (With Liquidator)", async function () { + it(`Execute Fast Order With Liquidator (Within Penalty Period)`, async function () { const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, offerAuthorityOne, @@ -2011,12 +2014,138 @@ describe("Matching Engine", function () { ); const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - // Fast forward into the grace period. - const txnSlot = await skip_slots(connection, 10); + // Fast forward into tge penalty period. + await skip_slots(connection, 10); // Execute the fast order with the liquidator (offerAuthorityTwo). const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); - await expectIxOk( + const txnSignature = await expectIxOk( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityTwo.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityTwo] + ); + const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { + return status.value!.slot; + }); + + // Compute the expected penalty and user reward. + const [expectedPenalty, expectedReward] = await calculateDynamicPenalty( + ( + await engine.fetchCustodian(engine.custodianAddress()) + ).auctionConfig, + Number(baseFastOrder.maxFee), + txnSlot - Number(auctionDataBefore.startSlot) + ); + + // Validate balance changes. + const highestOfferAfter = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const liquidatorAfter = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); + const custodyAfter = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + + expect(highestOfferAfter - highestOfferBefore).equals( + baseFastOrder.maxFee + + baseFastOrder.maxFee + + baseFastOrder.initAuctionFee - + BigInt(expectedReward) - + BigInt(expectedPenalty) + ); + expect(liquidatorAfter - liquidatorBefore).equals(BigInt(expectedPenalty)); + expect(custodyBefore - custodyAfter).equals( + baseFastOrder.amountIn + baseFastOrder.maxFee + ); + + // Validate auction data account. + expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + expect(auctionDataAfter.status).to.eql({ completed: {} }); + expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); + expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); + expect(auctionDataAfter.startSlot.toString()).to.eql( + auctionDataBefore.startSlot.toString() + ); + expect(auctionDataAfter.amount.toString()).to.eql( + auctionDataBefore.amount.toString() + ); + expect(auctionDataAfter.securityDeposit.toString()).to.eql( + auctionDataBefore.securityDeposit.toString() + ); + expect(auctionDataAfter.offerPrice.toString()).to.eql( + baseFastOrder.maxFee.toString() + ); + + // Validate the core message. + await verifyFillMessage( + connection, + message, + baseFastOrder.amountIn - + baseFastOrder.maxFee - + baseFastOrder.initAuctionFee + + BigInt(expectedReward), + arbDomain, + { + sourceChain: ethChain, + orderSender: Array.from(baseFastOrder.sender), + redeemer: Array.from(baseFastOrder.redeemer), + redeemerMessage: baseFastOrder.redeemerMessage, + } + ); + }); + + it(`Execute Fast Order With Liquidator (Post Penalty Period)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Fetch the balances before. + const highestOfferBefore = await getTokenBalance( + connection, + offerAuthorityOne.publicKey + ); + const custodyBefore = ( + await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) + ).amount; + const liquidatorBefore = await getTokenBalance( + connection, + offerAuthorityTwo.publicKey + ); + const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + + // Fast forward past the penalty period. + await skip_slots(connection, 15); + + // Execute the fast order with the liquidator (offerAuthorityTwo). + const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); + const txnSignature = await expectIxOk( connection, [ await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { @@ -2028,6 +2157,9 @@ describe("Matching Engine", function () { ], [offerAuthorityTwo] ); + const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { + return status.value!.slot; + }); // Compute the expected penalty and user reward. const [expectedPenalty, expectedReward] = await calculateDynamicPenalty( @@ -2038,6 +2170,10 @@ describe("Matching Engine", function () { txnSlot - Number(auctionDataBefore.startSlot) ); + // Since we are beyond the penalty period, the entire security deposit + // is divided between the highest bidder and the liquidator. + expect(baseFastOrder.maxFee).equals(BigInt(expectedReward + expectedPenalty)); + // Validate balance changes. const highestOfferAfter = await getTokenBalance( connection, @@ -2099,6 +2235,485 @@ describe("Matching Engine", function () { } ); }); + + it(`Cannot Execute Fast Order (Invalid Chain)`, async function () { + const fastOrder = { ...baseFastOrder }; + fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; + fastOrder.targetDomain = solanaDomain; + + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: fastOrder.maxFee, + fromChain: ethChain, + toChain: solanaChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + await expectIxErr( + connection, + [ + await engine.executeFastOrderIx(solanaChain, solanaDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne], + "InvalidChain" + ); + }); + + it(`Cannot Execute Fast Order (Vaa Hash Mismatch)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + const [vaaKey2, signedVaa2] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Fast forward past the penalty period. + await skip_slots(connection, 15); + + await expectIxErr( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash2, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne], + "MismatchedVaaHash" + ); + }); + + it(`Cannot Execute Fast Order (Invalid Best Offer Token Account)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Pass the wrong address for the best offer token account. + await expectIxErr( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken: engine.custodyTokenAccountAddress(), + initialOfferToken, + }), + ], + [offerAuthorityOne], + "InvalidTokenAccount" + ); + }); + + it(`Cannot Execute Fast Order (Invalid Initial Offer Token Account)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + // Pass the wrong address for the initial offer token account. + await expectIxErr( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken: engine.custodyTokenAccountAddress(), + }), + ], + [offerAuthorityOne], + "InvalidTokenAccount" + ); + }); + + it(`Cannot Execute Fast Order (Auction Not Active)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Fast forward into the grace period. + await skip_slots(connection, 4); + + await expectIxOk( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne] + ); + + // Should already be completed. + await expectIxErr( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne], + "AuctionNotActive" + ); + }); + + it(`Cannot Execute Fast Order (Auction Period Not Expired)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Do not fast forward into the grace period. + + // Pass the wrong address for the initial offer token account. + await expectIxErr( + connection, + [ + await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne], + "AuctionPeriodNotExpired" + ); + }); + + it(`Cannot Execute Fast Order Solana (Invalid Chain)`, async function () { + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: arbChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + await expectIxErr( + connection, + [ + await engine.executeFastOrderSolanaIx(vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + toRouterEndpoint: engine.routerEndpointAddress(arbChain), + }), + ], + [offerAuthorityOne], + "InvalidChain" + ); + }); + + it(`Cannot Execute Fast Order Solana (Vaa Hash Mismatch)`, async function () { + const fastOrder = { ...baseFastOrder }; + fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; + fastOrder.targetDomain = solanaDomain; + + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: baseFastOrder.maxFee, + fromChain: ethChain, + toChain: solanaChain, + } + ); + + const [vaaKey2, signedVaa2] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: fastOrder.maxFee, + fromChain: ethChain, + toChain: solanaChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Fast forward past the penalty period. + await skip_slots(connection, 15); + + await expectIxErr( + connection, + [ + await engine.executeFastOrderSolanaIx(vaaHash2, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne], + "MismatchedVaaHash" + ); + }); + + it(`Cannot Execute Fast Order Solana (Invalid Best Offer Token Account)`, async function () { + const fastOrder = { ...baseFastOrder }; + fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; + fastOrder.targetDomain = solanaDomain; + + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: fastOrder.maxFee, + fromChain: ethChain, + toChain: solanaChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Pass the wrong address for the best offer token account. + await expectIxErr( + connection, + [ + await engine.executeFastOrderSolanaIx(vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken: engine.custodyTokenAccountAddress(), + initialOfferToken, + }), + ], + [offerAuthorityOne], + "InvalidTokenAccount" + ); + }); + + it(`Cannot Execute Fast Order Solana (Invalid Initial Offer Token Account)`, async function () { + const fastOrder = { ...baseFastOrder }; + fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; + fastOrder.targetDomain = solanaDomain; + + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: fastOrder.maxFee, + fromChain: ethChain, + toChain: solanaChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + + // Pass the wrong address for the initial offer token account. + await expectIxErr( + connection, + [ + await engine.executeFastOrderSolanaIx(vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken: engine.custodyTokenAccountAddress(), + }), + ], + [offerAuthorityOne], + "InvalidTokenAccount" + ); + }); + + it(`Cannot Execute Fast Order Solana (Auction Not Active)`, async function () { + const fastOrder = { ...baseFastOrder }; + fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; + fastOrder.targetDomain = solanaDomain; + + const [vaaKey, signedVaa] = await placeInitialOfferForTest( + connection, + offerAuthorityOne, + wormholeSequence++, + fastOrder, + ethRouter, + engine, + { + feeOffer: fastOrder.maxFee, + fromChain: ethChain, + toChain: solanaChain, + } + ); + + // Accounts for the instruction. + const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + + // Fast forward into the grace period. + await skip_slots(connection, 4); + + await expectIxOk( + connection, + [ + await engine.executeFastOrderSolanaIx(vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne] + ); + + // Should already be completed. + await expectIxErr( + connection, + [ + await engine.executeFastOrderSolanaIx(vaaHash, { + payer: offerAuthorityOne.publicKey, + vaa: vaaKey, + bestOfferToken, + initialOfferToken, + }), + ], + [offerAuthorityOne], + "AuctionNotActive" + ); + }); }); describe("Prepare Slow Order", function () { From 147e86d413c25f9fbd4b35d31c5c3bb159563482 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Sun, 21 Jan 2024 21:21:02 -0600 Subject: [PATCH 073/126] solana: add prepare order; fix place order --- solana/programs/token-router/src/error.rs | 12 + solana/programs/token-router/src/lib.rs | 23 +- .../src/processor/admin/initialize.rs | 2 - .../ownership_transfer_request/cancel.rs | 9 +- .../ownership_transfer_request/confirm.rs | 6 +- .../ownership_transfer_request/submit.rs | 9 +- .../admin/router_endpoint/add_cctp.rs | 3 +- .../processor/admin/router_endpoint/remove.rs | 3 +- .../src/processor/admin/set_pause.rs | 4 +- .../processor/admin/update/owner_assistant.rs | 9 +- .../src/processor/close_prepared_order.rs | 67 +++ .../src/processor/market_order/mod.rs | 5 + .../cctp.rs => market_order/place_cctp.rs} | 90 +--- .../src/processor/market_order/prepare.rs | 120 +++++ .../token-router/src/processor/mod.rs | 7 +- .../src/processor/place_market_order/mod.rs | 2 - .../src/processor/redeem_fill/cctp.rs | 9 +- .../src/processor/redeem_fill/fast.rs | 10 +- .../token-router/src/state/custodian.rs | 3 - solana/programs/token-router/src/state/mod.rs | 3 + .../token-router/src/state/prepared_order.rs | 41 ++ solana/ts/src/tokenRouter/index.ts | 168 ++++-- solana/ts/src/tokenRouter/state/Custodian.ts | 6 - .../ts/src/tokenRouter/state/PreparedOrder.ts | 29 + solana/ts/src/tokenRouter/state/index.ts | 1 + solana/ts/tests/01__matchingEngine.ts | 9 +- solana/ts/tests/02__tokenRouter.ts | 497 +++++++++++++----- 27 files changed, 844 insertions(+), 303 deletions(-) create mode 100644 solana/programs/token-router/src/processor/close_prepared_order.rs create mode 100644 solana/programs/token-router/src/processor/market_order/mod.rs rename solana/programs/token-router/src/processor/{place_market_order/cctp.rs => market_order/place_cctp.rs} (78%) create mode 100644 solana/programs/token-router/src/processor/market_order/prepare.rs delete mode 100644 solana/programs/token-router/src/processor/place_market_order/mod.rs create mode 100644 solana/programs/token-router/src/state/prepared_order.rs create mode 100644 solana/ts/src/tokenRouter/state/PreparedOrder.ts diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 939e7695..b3f28651 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -53,6 +53,18 @@ pub enum TokenRouterError { #[msg("InsufficientAmount")] InsufficientAmount = 0x100, + #[msg("MinAmountOutTooHigh")] + MinAmountOutTooHigh = 0x102, + + #[msg("PayerMismatch")] + PayerMismatch = 0x120, + + #[msg("OrderSenderMismatch")] + OrderSenderMismatch = 0x122, + + #[msg("RefundTokenMismatch")] + RefundTokenMismatch = 0x124, + #[msg("InvalidSourceRouter")] InvalidSourceRouter = 0x200, diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 250a20dd..d1e93968 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -11,12 +11,11 @@ pub mod state; use anchor_lang::prelude::*; cfg_if::cfg_if! { - if #[cfg(feature = "mainnet")] { - // Placeholder. - declare_id!("TokenRouter11111111111111111111111111111111"); - } else if #[cfg(feature = "testnet")] { + if #[cfg(feature = "testnet")] { // Placeholder. declare_id!("TokenRouter11111111111111111111111111111111"); + const CUSTODIAN_BUMP: u8 = 253; + const CUSTODY_TOKEN_BUMP: u8 = 254; } } @@ -24,11 +23,19 @@ cfg_if::cfg_if! { pub mod token_router { use super::*; - pub fn place_market_order_cctp( - ctx: Context, - args: PlaceMarketOrderCctpArgs, + pub fn prepare_market_order( + ctx: Context, + args: PrepareMarketOrderArgs, ) -> Result<()> { - processor::place_market_order_cctp(ctx, args) + processor::prepare_market_order(ctx, args) + } + + pub fn close_prepared_order(ctx: Context) -> Result<()> { + processor::close_prepared_order(ctx) + } + + pub fn place_market_order_cctp(ctx: Context) -> Result<()> { + processor::place_market_order_cctp(ctx) } pub fn redeem_cctp_fill(ctx: Context, args: RedeemFillArgs) -> Result<()> { diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index 5ad56e1d..cf367ea6 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -75,8 +75,6 @@ pub fn initialize(ctx: Context) -> Result<()> { } ctx.accounts.custodian.set_inner(Custodian { - bump: ctx.bumps["custodian"], - custody_token_bump: ctx.bumps["custody_token"], paused: false, paused_set_by: owner, owner, diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs index 40dca434..a854ae63 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,6 +1,5 @@ -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; use anchor_lang::prelude::*; -use common::admin::utils::ownable::only_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -11,8 +10,8 @@ pub struct CancelOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - constraint = only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, + bump = CUSTODIAN_BUMP, + has_one = owner @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -50,7 +49,7 @@ pub fn cancel_ownership_transfer_request( current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.owner.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], ), crate::ID, )?; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs index a0dd062d..50527ede 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; use anchor_lang::prelude::*; use common::admin::utils::pending_owner; use solana_program::bpf_loader_upgradeable; @@ -12,7 +12,7 @@ pub struct ConfirmOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = CUSTODIAN_BUMP, constraint = { custodian.pending_owner.is_some() } @ TokenRouterError::NoTransferOwnershipRequest, @@ -56,7 +56,7 @@ pub fn confirm_ownership_transfer_request( current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.pending_owner.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], ), crate::ID, )?; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs index 04f8c2ba..a321dce1 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,6 +1,5 @@ -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; use anchor_lang::prelude::*; -use common::admin::utils::ownable::only_owner; use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] @@ -11,8 +10,8 @@ pub struct SubmitOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - constraint = only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, + bump = CUSTODIAN_BUMP, + has_one = owner @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -63,7 +62,7 @@ pub fn submit_ownership_transfer_request( current_authority: ctx.accounts.owner.to_account_info(), new_authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], ), crate::ID, )?; diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs index 33dc6477..d3dddb6c 100644 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs @@ -1,6 +1,7 @@ use crate::{ error::TokenRouterError, state::{Custodian, MessageProtocol, RouterEndpoint}, + CUSTODIAN_BUMP, }; use anchor_lang::prelude::*; use common::admin::utils::assistant::only_authorized; @@ -17,7 +18,7 @@ pub struct AddCctpRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = CUSTODIAN_BUMP, constraint = { only_authorized(&custodian, &owner_or_assistant.key()) } @ TokenRouterError::OwnerOrAssistantOnly, diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs index fdaa0f76..71cf36f3 100644 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs @@ -1,6 +1,7 @@ use crate::{ error::TokenRouterError, state::{Custodian, RouterEndpoint}, + CUSTODIAN_BUMP, }; use anchor_lang::prelude::*; use common::admin::utils::assistant::only_authorized; @@ -17,7 +18,7 @@ pub struct RemoveRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = CUSTODIAN_BUMP, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs index e27827b7..42f3008e 100644 --- a/solana/programs/token-router/src/processor/admin/set_pause.rs +++ b/solana/programs/token-router/src/processor/admin/set_pause.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; use anchor_lang::prelude::*; use common::admin::utils::assistant::only_authorized; @@ -9,7 +9,7 @@ pub struct SetPause<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = CUSTODIAN_BUMP, constraint = { only_authorized(&custodian, &owner_or_assistant.key()) } @ TokenRouterError::OwnerOrAssistantOnly, diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs index f84e68da..e6957c4f 100644 --- a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -1,6 +1,5 @@ -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; use anchor_lang::prelude::*; -use common::admin::utils::{assistant, ownable::only_owner}; #[derive(Accounts)] pub struct UpdateOwnerAssistant<'info> { @@ -10,8 +9,8 @@ pub struct UpdateOwnerAssistant<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - constraint = only_owner(&custodian, &owner.key()) @ TokenRouterError::OwnerOnly, + bump = CUSTODIAN_BUMP, + has_one = owner @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -27,7 +26,7 @@ pub struct UpdateOwnerAssistant<'info> { } pub fn update_owner_assistant(ctx: Context) -> Result<()> { - assistant::transfer_owner_assistant( + common::admin::utils::assistant::transfer_owner_assistant( &mut ctx.accounts.custodian, &ctx.accounts.new_owner_assistant.key(), ); diff --git a/solana/programs/token-router/src/processor/close_prepared_order.rs b/solana/programs/token-router/src/processor/close_prepared_order.rs new file mode 100644 index 00000000..4f8f24e5 --- /dev/null +++ b/solana/programs/token-router/src/processor/close_prepared_order.rs @@ -0,0 +1,67 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, PreparedOrder}, + CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; + +#[derive(Accounts)] +pub struct ClosePreparedOrder<'info> { + /// CHECK: This payer must be the same one encoded in the prepared order. + #[account(mut)] + payer: AccountInfo<'info>, + + /// Custodian, but does not need to be deserialized. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = CUSTODIAN_BUMP, + )] + custodian: AccountInfo<'info>, + + /// This signer must be the same one encoded in the prepared order. + order_sender: Signer<'info>, + + #[account( + mut, + close = payer, + has_one = payer @ TokenRouterError::PayerMismatch, + has_one = order_sender @ TokenRouterError::OrderSenderMismatch, + has_one = refund_token @ TokenRouterError::RefundTokenMismatch, + )] + prepared_order: Account<'info, PreparedOrder>, + + /// CHECK: This account must be the same one encoded in the prepared order. + #[account(mut)] + refund_token: AccountInfo<'info>, + + /// Custody token account. This account will be closed at the end of this instruction. It just + /// acts as a conduit to allow this program to be the transfer initiator in the CCTP message. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = CUSTODY_TOKEN_BUMP, + )] + custody_token: AccountInfo<'info>, + + token_program: Program<'info, token::Token>, +} + +pub fn close_prepared_order(ctx: Context) -> Result<()> { + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.refund_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], + ), + ctx.accounts.prepared_order.amount_in, + ) +} diff --git a/solana/programs/token-router/src/processor/market_order/mod.rs b/solana/programs/token-router/src/processor/market_order/mod.rs new file mode 100644 index 00000000..54f74c2e --- /dev/null +++ b/solana/programs/token-router/src/processor/market_order/mod.rs @@ -0,0 +1,5 @@ +mod place_cctp; +pub use place_cctp::*; + +mod prepare; +pub use prepare::*; diff --git a/solana/programs/token-router/src/processor/place_market_order/cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs similarity index 78% rename from solana/programs/token-router/src/processor/place_market_order/cctp.rs rename to solana/programs/token-router/src/processor/market_order/place_cctp.rs index 800fb720..d7a26af3 100644 --- a/solana/programs/token-router/src/processor/place_market_order/cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -1,6 +1,7 @@ use crate::{ error::TokenRouterError, - state::{Custodian, MessageProtocol, PayerSequence, RouterEndpoint}, + state::{Custodian, MessageProtocol, PayerSequence, PreparedOrder, RouterEndpoint}, + CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -33,36 +34,30 @@ pub struct PlaceMarketOrderCctp<'info> { /// Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = CUSTODIAN_BUMP, constraint = !custodian.paused @ TokenRouterError::Paused, )] custodian: Account<'info, Custodian>, + #[account( + mut, + close = payer, + has_one = payer @ TokenRouterError::PayerMismatch, + has_one = order_sender @ TokenRouterError::OrderSenderMismatch, + )] + prepared_order: Account<'info, PreparedOrder>, + /// Signer who must have the authority (either as the owner or has been delegated authority) /// over the `burn_source` token account. - burn_source_authority: Signer<'info>, + order_sender: Signer<'info>, /// Circle-supported mint. /// /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP /// Token Messenger Minter program's local token account. - #[account( - mut, - address = common::constants::usdc::id(), - )] + #[account(mut)] mint: AccountInfo<'info>, - /// Token account where assets are burned from. The CCTP Token Messenger Minter program will - /// burn the configured [amount](TransferTokensWithPayloadArgs::amount) from this account. - /// - /// CHECK: This account must have delegated authority or be owned by the - /// [burn_source_authority](Self::burn_source_authority). Its mint must be USDC. - #[account( - mut, - token::mint = mint, - )] - burn_source: Account<'info, token::TokenAccount>, - /// Temporary custody token account. This account will be closed at the end of this instruction. /// It just acts as a conduit to allow this program to be the transfer initiator in the CCTP /// message. @@ -71,7 +66,7 @@ pub struct PlaceMarketOrderCctp<'info> { #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + bump = CUSTODY_TOKEN_BUMP, )] custody_token: AccountInfo<'info>, @@ -155,65 +150,24 @@ pub struct PlaceMarketOrderCctp<'info> { rent: AccountInfo<'info>, } -/// Arguments used to invoke [place_market_order_cctp]. -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct PlaceMarketOrderCctpArgs { - /// Transfer (burn) amount. - pub amount_in: u64, - - pub redeemer: [u8; 32], - - /// Arbitrary payload, which can be used to encode instructions or data for another network's - /// smart contract. - pub redeemer_message: Vec, -} - /// This instruction invokes both Wormhole Core Bridge and CCTP Token Messenger Minter programs to /// emit a Wormhole message associated with a CCTP message. /// /// See [burn_and_publish](wormhole_cctp_solana::cpi::burn_and_publish) for more details. -pub fn place_market_order_cctp( - ctx: Context, - args: PlaceMarketOrderCctpArgs, -) -> Result<()> { +pub fn place_market_order_cctp(ctx: Context) -> Result<()> { match ctx.accounts.router_endpoint.protocol { - MessageProtocol::Cctp { domain } => handle_place_market_order_cctp(ctx, args, domain), + MessageProtocol::Cctp { domain } => handle_place_market_order_cctp(ctx, domain), _ => err!(TokenRouterError::InvalidCctpEndpoint), } } fn handle_place_market_order_cctp( ctx: Context, - args: PlaceMarketOrderCctpArgs, destination_cctp_domain: u32, ) -> Result<()> { - let PlaceMarketOrderCctpArgs { - amount_in: amount, - redeemer, - redeemer_message, - } = args; - - // Even though CCTP prevents zero amount burns, we prefer to throw an explicit error here. - require!(args.amount_in > 0, TokenRouterError::InsufficientAmount); - - // Cannot send to zero address. - require!(args.redeemer != [0; 32], TokenRouterError::InvalidRedeemer); - - // Because the transfer initiator in the Circle message is whoever signs to burn assets, we need - // to transfer assets from the source token account to one that belongs to this program. - token::transfer( - CpiContext::new( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.burn_source.to_account_info(), - to: ctx.accounts.custody_token.to_account_info(), - authority: ctx.accounts.burn_source_authority.to_account_info(), - }, - ), - amount, - )?; + let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; - let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + let redeemer_message = std::mem::take(&mut ctx.accounts.prepared_order.redeemer_message); // This returns the CCTP nonce, but we do not need it. wormhole_cctp_solana::cpi::burn_and_publish( @@ -277,16 +231,16 @@ fn handle_place_market_order_cctp( ], ), wormhole_cctp_solana::cpi::BurnAndPublishArgs { - burn_source: Some(ctx.accounts.burn_source.key()), + burn_source: Some(ctx.accounts.prepared_order.order_token), destination_caller: ctx.accounts.router_endpoint.address, destination_cctp_domain, - amount, + amount: ctx.accounts.prepared_order.amount_in, mint_recipient: ctx.accounts.router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, payload: common::messages::Fill { source_chain: wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, - order_sender: ctx.accounts.burn_source_authority.key().to_bytes(), - redeemer, + order_sender: ctx.accounts.order_sender.key().to_bytes(), + redeemer: ctx.accounts.prepared_order.redeemer, redeemer_message: redeemer_message.into(), } .to_vec_payload(), diff --git a/solana/programs/token-router/src/processor/market_order/prepare.rs b/solana/programs/token-router/src/processor/market_order/prepare.rs new file mode 100644 index 00000000..26ff7c60 --- /dev/null +++ b/solana/programs/token-router/src/processor/market_order/prepare.rs @@ -0,0 +1,120 @@ +use anchor_lang::prelude::*; +use anchor_spl::token; + +use crate::{ + error::TokenRouterError, + state::{OrderType, PreparedOrder, PreparedOrderInfo}, + CUSTODY_TOKEN_BUMP, +}; + +#[derive(Accounts)] +#[instruction(args: PrepareMarketOrderArgs)] +pub struct PrepareMarketOrder<'info> { + #[account(mut)] + payer: Signer<'info>, + + order_sender: Signer<'info>, + + #[account( + init, + payer = payer, + space = PreparedOrder::compute_size(args.redeemer_message.len()) + )] + prepared_order: Account<'info, PreparedOrder>, + + /// Token account where assets are burned from. The CCTP Token Messenger Minter program will + /// burn the configured [amount](TransferTokensWithPayloadArgs::amount) from this account. + /// + /// CHECK: This account must have delegated authority or be owned by the + /// [burn_source_authority](Self::burn_source_authority). Its mint must be USDC. + #[account(mut)] + order_token: AccountInfo<'info>, + + #[account(token::mint = common::constants::usdc::id())] + refund_token: Account<'info, token::TokenAccount>, + + /// Custody token account. This account will be closed at the end of this instruction. It just + /// acts as a conduit to allow this program to be the transfer initiator in the CCTP message. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = CUSTODY_TOKEN_BUMP, + )] + custody_token: AccountInfo<'info>, + + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct PrepareMarketOrderArgs { + /// Transfer amount. + pub amount_in: u64, + + // If provided, amount of tokens expected to be received on the target chain. + pub min_amount_out: Option, + + pub target_chain: u16, + + pub redeemer: [u8; 32], + + /// Arbitrary payload, which can be used to encode instructions or data for another network's + /// smart contract. + pub redeemer_message: Vec, +} + +pub fn prepare_market_order( + ctx: Context, + args: PrepareMarketOrderArgs, +) -> Result<()> { + let PrepareMarketOrderArgs { + amount_in, + min_amount_out, + target_chain, + redeemer, + redeemer_message, + } = args; + + require!(args.amount_in > 0, TokenRouterError::InsufficientAmount); + + // Cannot send to zero address. + require!(args.redeemer != [0; 32], TokenRouterError::InvalidRedeemer); + + // If provided, validate min amount out. + if let Some(min_amount_out) = min_amount_out { + require!( + min_amount_out <= amount_in, + TokenRouterError::MinAmountOutTooHigh, + ); + } + + // Set the values in prepared order account. + ctx.accounts.prepared_order.set_inner(PreparedOrder { + info: Box::new(PreparedOrderInfo { + order_sender: ctx.accounts.order_sender.key(), + payer: ctx.accounts.payer.key(), + order_type: OrderType::Market { min_amount_out }, + order_token: ctx.accounts.order_token.key(), + refund_token: ctx.accounts.refund_token.key(), + amount_in, + target_chain, + redeemer, + }), + redeemer_message, + }); + + // Finally transfer amount to custody token account. + token::transfer( + CpiContext::new( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.order_token.to_account_info(), + to: ctx.accounts.custody_token.to_account_info(), + authority: ctx.accounts.order_sender.to_account_info(), + }, + ), + amount_in, + ) +} diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs index 24795b6c..45e548d5 100644 --- a/solana/programs/token-router/src/processor/mod.rs +++ b/solana/programs/token-router/src/processor/mod.rs @@ -1,8 +1,11 @@ mod admin; pub use admin::*; -mod place_market_order; -pub use place_market_order::*; +mod close_prepared_order; +pub use close_prepared_order::*; + +mod market_order; +pub use market_order::*; mod redeem_fill; pub use redeem_fill::*; diff --git a/solana/programs/token-router/src/processor/place_market_order/mod.rs b/solana/programs/token-router/src/processor/place_market_order/mod.rs deleted file mode 100644 index c143ed24..00000000 --- a/solana/programs/token-router/src/processor/place_market_order/mod.rs +++ /dev/null @@ -1,2 +0,0 @@ -mod cctp; -pub use cctp::*; diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 6dd6bcd1..d80c449c 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -1,6 +1,7 @@ use crate::{ error::TokenRouterError, state::{Custodian, RouterEndpoint}, + CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -23,9 +24,9 @@ pub struct RedeemCctpFill<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = CUSTODIAN_BUMP, )] - custodian: Account<'info, Custodian>, + custodian: AccountInfo<'info>, /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. @@ -55,7 +56,7 @@ pub struct RedeemCctpFill<'info> { #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + bump = CUSTODY_TOKEN_BUMP, )] custody_token: Account<'info, token::TokenAccount>, @@ -119,7 +120,7 @@ pub struct RedeemCctpFill<'info> { /// /// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. pub fn redeem_cctp_fill(ctx: Context, args: super::RedeemFillArgs) -> Result<()> { - let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; let vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( &ctx.accounts.vaa, diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index bec48281..1d9e06a4 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian}; +use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP}; use anchor_lang::prelude::*; use anchor_spl::token; use common::messages::raw::LiquidityLayerMessage; @@ -15,9 +15,9 @@ pub struct RedeemFastFill<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = CUSTODIAN_BUMP, )] - custodian: Account<'info, Custodian>, + custodian: AccountInfo<'info>, /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. @@ -45,7 +45,7 @@ pub struct RedeemFastFill<'info> { #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + bump = CUSTODY_TOKEN_BUMP, )] custody_token: Account<'info, token::TokenAccount>, @@ -74,7 +74,7 @@ pub struct RedeemFastFill<'info> { /// /// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. pub fn redeem_fast_fill(ctx: Context) -> Result<()> { - let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; + let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; matching_engine::cpi::redeem_fast_fill(CpiContext::new_with_signer( ctx.accounts.matching_engine_program.to_account_info(), diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs index e799fb6b..579939d4 100644 --- a/solana/programs/token-router/src/state/custodian.rs +++ b/solana/programs/token-router/src/state/custodian.rs @@ -3,9 +3,6 @@ use anchor_lang::prelude::*; #[account] #[derive(Debug, InitSpace)] pub struct Custodian { - pub bump: u8, - pub custody_token_bump: u8, - /// Boolean indicating whether outbound transfers are paused. pub paused: bool, diff --git a/solana/programs/token-router/src/state/mod.rs b/solana/programs/token-router/src/state/mod.rs index 2d82dc57..4e1eb439 100644 --- a/solana/programs/token-router/src/state/mod.rs +++ b/solana/programs/token-router/src/state/mod.rs @@ -4,5 +4,8 @@ pub use custodian::*; mod payer_sequence; pub use payer_sequence::*; +mod prepared_order; +pub use prepared_order::*; + mod router_endpoint; pub use router_endpoint::*; diff --git a/solana/programs/token-router/src/state/prepared_order.rs b/solana/programs/token-router/src/state/prepared_order.rs new file mode 100644 index 00000000..cce660b4 --- /dev/null +++ b/solana/programs/token-router/src/state/prepared_order.rs @@ -0,0 +1,41 @@ +use anchor_lang::prelude::*; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace)] +pub enum OrderType { + Market { min_amount_out: Option }, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace)] +pub struct PreparedOrderInfo { + pub order_sender: Pubkey, + pub payer: Pubkey, + + pub order_type: OrderType, + pub order_token: Pubkey, + pub refund_token: Pubkey, + + pub amount_in: u64, + pub target_chain: u16, + pub redeemer: [u8; 32], +} + +#[account] +#[derive(Debug)] +pub struct PreparedOrder { + pub info: Box, + pub redeemer_message: Vec, +} + +impl PreparedOrder { + pub(crate) fn compute_size(message_len: usize) -> usize { + 8 + PreparedOrderInfo::INIT_SPACE + 4 + message_len + } +} + +impl std::ops::Deref for PreparedOrder { + type Target = PreparedOrderInfo; + + fn deref(&self) -> &Self::Target { + &self.info + } +} diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 1b3bdee9..d622da5b 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -19,7 +19,7 @@ import { import * as matchingEngineSdk from "../matchingEngine"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; -import { Custodian, PayerSequence, RouterEndpoint } from "./state"; +import { Custodian, PayerSequence, PreparedOrder, RouterEndpoint } from "./state"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; @@ -32,6 +32,14 @@ export type PlaceMarketOrderCctpArgs = { redeemerMessage: Buffer; }; +export type PrepareMarketOrderArgs = { + amountIn: bigint; + minAmountOut: bigint | null; + targetChain: wormholeSdk.ChainId; + redeemer: Array; + redeemerMessage: Buffer; +}; + export type PublishMessageAccounts = { coreBridgeConfig: PublicKey; coreEmitterSequence: PublicKey; @@ -61,6 +69,7 @@ export type TokenRouterCommonAccounts = PublishMessageAccounts & { export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { custodian: PublicKey; custodyToken: PublicKey; + mint: PublicKey; routerEndpoint: PublicKey; tokenMessengerMinterSenderAuthority: PublicKey; messageTransmitterConfig: PublicKey; @@ -185,7 +194,11 @@ export class TokenRouterProgram { return this.program.account.routerEndpoint.fetch(addr); } - commonAccounts(mint?: PublicKey): TokenRouterCommonAccounts { + async fetchPreparedOrder(addr: PublicKey): Promise { + return this.program.account.preparedOrder.fetch(addr); + } + + async commonAccounts(): Promise { const custodian = this.custodianAddress(); const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = this.publishMessageAccounts(custodian); @@ -193,23 +206,15 @@ export class TokenRouterProgram { const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); const messageTransmitterProgram = this.messageTransmitterProgram(); - const [localToken, tokenMessengerMinterCustodyToken] = (() => { - if (mint === undefined) { - return []; - } else { - return [ - tokenMessengerMinterProgram.localTokenAddress(mint), - tokenMessengerMinterProgram.custodyTokenAddress(mint), - ]; - } - })(); + const custodyToken = this.custodyTokenAccountAddress(); + const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); return { tokenRouterProgram: this.ID, systemProgram: SystemProgram.programId, rent: SYSVAR_RENT_PUBKEY, custodian, - custodyToken: this.custodyTokenAccountAddress(), + custodyToken, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, @@ -223,13 +228,94 @@ export class TokenRouterProgram { messageTransmitterProgram: messageTransmitterProgram.ID, tokenProgram: splToken.TOKEN_PROGRAM_ID, mint, - localToken, - tokenMessengerMinterCustodyToken, + localToken: tokenMessengerMinterProgram.localTokenAddress(mint), + tokenMessengerMinterCustodyToken: tokenMessengerMinterProgram.custodyTokenAddress(mint), }; } + async prepareMarketOrderIx( + accounts: { + payer: PublicKey; + orderSender: PublicKey; + preparedOrder: PublicKey; + orderToken: PublicKey; + refundToken: PublicKey; + }, + args: PrepareMarketOrderArgs + ): Promise { + const { payer, orderSender, preparedOrder, orderToken, refundToken } = accounts; + const { amountIn, minAmountOut, ...remainingArgs } = args; + + return this.program.methods + .prepareMarketOrder({ + amountIn: new BN(amountIn.toString()), + minAmountOut: minAmountOut === null ? null : new BN(minAmountOut.toString()), + ...remainingArgs, + }) + .accounts({ + payer, + orderSender, + preparedOrder, + orderToken, + refundToken, + custodyToken: this.custodyTokenAccountAddress(), + tokenProgram: splToken.TOKEN_PROGRAM_ID, + }) + .instruction(); + } + + async closePreparedOrderIx(accounts: { + preparedOrder: PublicKey; + payer?: PublicKey; + orderSender?: PublicKey; + refundToken?: PublicKey; + }): Promise { + const { + preparedOrder, + payer: inputPayer, + orderSender: inputOrderSender, + refundToken: inputRefundToken, + } = accounts; + + const { payer, orderSender, refundToken } = await (async () => { + if ( + inputPayer === undefined || + inputOrderSender === undefined || + inputRefundToken === undefined + ) { + const { + info: { payer, orderSender, refundToken }, + } = await this.fetchPreparedOrder(preparedOrder); + + return { + payer: inputPayer ?? payer, + orderSender: inputOrderSender ?? orderSender, + refundToken: inputRefundToken ?? refundToken, + }; + } else { + return { + payer: inputPayer, + orderSender: inputOrderSender, + refundToken: inputRefundToken, + }; + } + })(); + + return this.program.methods + .closePreparedOrder() + .accounts({ + payer, + custodian: this.custodianAddress(), + orderSender, + preparedOrder, + refundToken, + custodyToken: this.custodyTokenAccountAddress(), + tokenProgram: splToken.TOKEN_PROGRAM_ID, + }) + .instruction(); + } + async placeMarketOrderCctpAccounts( - mint: PublicKey, targetChain: wormholeSdk.ChainId, overrides: { remoteDomain?: number; @@ -251,6 +337,9 @@ export class TokenRouterProgram { } })(); + const custodyToken = this.custodyTokenAccountAddress(); + const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); + const { senderAuthority: tokenMessengerMinterSenderAuthority, messageTransmitterConfig, @@ -269,7 +358,8 @@ export class TokenRouterProgram { return { custodian, - custodyToken: this.custodyTokenAccountAddress(), + custodyToken, + mint, routerEndpoint, coreBridgeConfig, coreEmitterSequence, @@ -287,30 +377,21 @@ export class TokenRouterProgram { }; } - async placeMarketOrderCctpIx( - accounts: { - payer: PublicKey; - mint: PublicKey; - burnSource: PublicKey; - burnSourceAuthority?: PublicKey; - routerEndpoint?: PublicKey; - }, - args: PlaceMarketOrderCctpArgs - ): Promise { + async placeMarketOrderCctpIx(accounts: { + payer: PublicKey; + preparedOrder: PublicKey; + orderSender?: PublicKey; + routerEndpoint?: PublicKey; + }): Promise { let { payer, - burnSource, - mint, - burnSourceAuthority: inputBurnSourceAuthority, + preparedOrder, + orderSender: inputOrderSender, routerEndpoint: inputRouterEndpoint, } = accounts; - const burnSourceAuthority = - inputBurnSourceAuthority ?? - (await splToken - .getAccount(this.program.provider.connection, burnSource) - .then((token) => token.owner)); - - const { amountIn, targetChain, redeemer, redeemerMessage } = args; + const { + info: { orderSender, targetChain }, + } = await this.fetchPreparedOrder(preparedOrder); const payerSequence = this.payerSequenceAddress(payer); const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => @@ -319,6 +400,7 @@ export class TokenRouterProgram { const { custodian, custodyToken, + mint, routerEndpoint, coreBridgeConfig, coreEmitterSequence, @@ -333,21 +415,17 @@ export class TokenRouterProgram { tokenMessengerMinterProgram, messageTransmitterProgram, tokenProgram, - } = await this.placeMarketOrderCctpAccounts(mint, targetChain); + } = await this.placeMarketOrderCctpAccounts(targetChain as wormholeSdk.ChainId); return this.program.methods - .placeMarketOrderCctp({ - amountIn: new BN(amountIn.toString()), - redeemer, - redeemerMessage, - }) + .placeMarketOrderCctp() .accounts({ payer, payerSequence, custodian, - burnSourceAuthority, + preparedOrder, + orderSender: inputOrderSender ?? orderSender, mint, - burnSource, custodyToken, routerEndpoint: inputRouterEndpoint ?? routerEndpoint, coreBridgeConfig, diff --git a/solana/ts/src/tokenRouter/state/Custodian.ts b/solana/ts/src/tokenRouter/state/Custodian.ts index c9502108..36a872c2 100644 --- a/solana/ts/src/tokenRouter/state/Custodian.ts +++ b/solana/ts/src/tokenRouter/state/Custodian.ts @@ -1,8 +1,6 @@ import { PublicKey } from "@solana/web3.js"; export class Custodian { - bump: number; - custodyTokenBump: number; paused: boolean; owner: PublicKey; pendingOwner: PublicKey | null; @@ -10,16 +8,12 @@ export class Custodian { pausedSetBy: PublicKey; constructor( - bump: number, - custodyTokenBump: number, paused: boolean, owner: PublicKey, pendingOwner: PublicKey | null, ownerAssistant: PublicKey, pausedSetBy: PublicKey ) { - this.bump = bump; - this.custodyTokenBump = custodyTokenBump; this.paused = paused; this.owner = owner; this.pendingOwner = pendingOwner; diff --git a/solana/ts/src/tokenRouter/state/PreparedOrder.ts b/solana/ts/src/tokenRouter/state/PreparedOrder.ts new file mode 100644 index 00000000..232326a2 --- /dev/null +++ b/solana/ts/src/tokenRouter/state/PreparedOrder.ts @@ -0,0 +1,29 @@ +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; + +export type OrderType = { + market?: { + minAmountOut: BN | null; + }; +}; + +export type PreparedOrderInfo = { + orderSender: PublicKey; + payer: PublicKey; + orderType: OrderType; + orderToken: PublicKey; + refundToken: PublicKey; + amountIn: BN; + targetChain: number; + redeemer: Array; +}; + +export class PreparedOrder { + info: PreparedOrderInfo; + redeemerMessage: Buffer; + + constructor(info: PreparedOrderInfo, redeemerMessage: Buffer) { + this.info = info; + this.redeemerMessage = redeemerMessage; + } +} diff --git a/solana/ts/src/tokenRouter/state/index.ts b/solana/ts/src/tokenRouter/state/index.ts index 5112021e..c2b32b47 100644 --- a/solana/ts/src/tokenRouter/state/index.ts +++ b/solana/ts/src/tokenRouter/state/index.ts @@ -1,5 +1,6 @@ export * from "./Custodian"; export * from "./PayerSequence"; +export * from "./PreparedOrder"; export * from "./RouterEndpoint"; import { solana } from "@certusone/wormhole-sdk"; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index d8984ab4..0fbad146 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,6 +1,7 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import * as splToken from "@solana/spl-token"; import { + ComputeBudgetProgram, Connection, Keypair, PublicKey, @@ -2807,7 +2808,11 @@ describe("Matching Engine", function () { } ); - await expectIxOk(connection, [ix], [payer]); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + + await expectIxOk(connection, [computeIx, ix], [payer]); // TODO: validate prepared slow order const fastVaaHash = await VaaAccount.fetch(connection, fastVaa).then((vaa) => @@ -2823,7 +2828,7 @@ describe("Matching Engine", function () { localVariables.set("preparedSlowOrder", preparedSlowOrder); }); - it("Cannot Prepare Slow Order for Same VAAs with Same Payer", async function () { + it("Cannot Prepare Slow Order for Same VAAs", async function () { const ix = localVariables.get("ix") as TransactionInstruction; expect(localVariables.delete("ix")).is.true; diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 97cd13c6..4ac35a26 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -11,8 +11,8 @@ import { } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; -import { CctpTokenBurnMessage, Fill, LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; -import { Custodian, RouterEndpoint, TokenRouterProgram } from "../src/tokenRouter"; +import { CctpTokenBurnMessage, LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; +import { Custodian, PreparedOrder, RouterEndpoint, TokenRouterProgram } from "../src/tokenRouter"; import { CircleAttester, ETHEREUM_USDC_ADDRESS, @@ -25,6 +25,9 @@ import { expectIxOk, postLiquidityLayerVaa, } from "./helpers"; +import { BN } from "@coral-xyz/anchor"; +import { VaaAccount } from "../src/wormhole"; +import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; chaiUse(chaiAsPromised); @@ -82,8 +85,6 @@ describe("Token Router", function () { ); expect(custodianData).to.eql( new Custodian( - 253, // bump - 254, // custodyTokenBump false, // paused payer.publicKey, // owner null, // pendingOwner @@ -128,7 +129,7 @@ describe("Token Router", function () { await expectIxOk(connection, [createIx], [payer]); - const usdcCommonAccounts = tokenRouter.commonAccounts(USDC_MINT_ADDRESS); + const usdcCommonAccounts = await tokenRouter.commonAccounts(); // Extend. const extendIx = AddressLookupTableProgram.extendLookupTable({ @@ -499,173 +500,390 @@ describe("Token Router", function () { }); describe("Business Logic", function () { - describe("Place Market Order (CCTP)", function () { + describe("Preparing Order", function () { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, payer.publicKey ); - const burnSourceAuthority = Keypair.generate(); - before("Set Up Arbitrary Burn Source", async function () { - const burnSource = await splToken.createAccount( - connection, - payer, - USDC_MINT_ADDRESS, - burnSourceAuthority.publicKey - ); + const localVariables = new Map(); - // Add funds to account. - await splToken.mintTo( - connection, - payer, - USDC_MINT_ADDRESS, - burnSource, - payer, - 1_000_000_000n // 1,000 USDC - ); + it.skip("Cannot Prepare Market Order with Insufficient Amount", async function () { + // TODO }); - it("Cannot Place Market Order with Unregistered Endpoint", async function () { + it.skip("Cannot Prepare Market Order with Invalid Redeemer", async function () { + // TODO + }); + + it("Prepare Market Order with Some Min Amount Out", async function () { + const orderSender = Keypair.generate(); + const preparedOrder = Keypair.generate(); + const amountIn = 69n; - const unregisteredEndpoint = tokenRouter.routerEndpointAddress( - wormholeSdk.CHAIN_ID_SOLANA - ); - const ix = await tokenRouter.placeMarketOrderCctpIx( + const minAmountOut = 0n; + const targetChain = foreignChain; + const redeemer = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const redeemerMessage = Buffer.from("All your base are belong to us"); + const ix = await tokenRouter.prepareMarketOrderIx( { payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: payer.publicKey, - routerEndpoint: unregisteredEndpoint, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + orderToken: payerToken, + refundToken: payerToken, }, { amountIn, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), + minAmountOut, + targetChain, + redeemer, + redeemerMessage, } ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + const approveIx = splToken.createApproveInstruction( + payerToken, + orderSender.publicKey, + payer.publicKey, + amountIn + ); + + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + + await expectIxOk(connection, [approveIx, ix], [payer, orderSender, preparedOrder]); + + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore - amountIn); + + const preparedOrderData = await tokenRouter.fetchPreparedOrder( + preparedOrder.publicKey + ); + expect(preparedOrderData).to.eql( + new PreparedOrder( + { + orderSender: orderSender.publicKey, + payer: payer.publicKey, + orderType: { + market: { + minAmountOut: (() => { + const buf = Buffer.alloc(8); + buf.writeBigUInt64BE(minAmountOut); + return new BN(buf); + })(), + }, + }, + orderToken: payerToken, + refundToken: payerToken, + amountIn: (() => { + const buf = Buffer.alloc(8); + buf.writeBigUInt64BE(amountIn); + return new BN(buf); + })(), + targetChain, + redeemer, + }, + redeemerMessage + ) ); - await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized", { - addressLookupTableAccounts: [lookupTableAccount!], - }); }); - it("Cannot Place Market Order with Insufficient Amount", async function () { - const ix = await tokenRouter.placeMarketOrderCctpIx( + it("Prepare Market Order without Min Amount Out", async function () { + const orderSender = Keypair.generate(); + const preparedOrder = Keypair.generate(); + + const amountIn = 69n; + const ix = await tokenRouter.prepareMarketOrderIx( { payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: payer.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + orderToken: payerToken, + refundToken: payerToken, }, { - amountIn: 0n, + amountIn, + minAmountOut: null, targetChain: foreignChain, redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), redeemerMessage: Buffer.from("All your base are belong to us"), } ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + const approveIx = splToken.createApproveInstruction( + payerToken, + orderSender.publicKey, + payer.publicKey, + amountIn ); - await expectIxErr(connection, [ix], [payer], "Error Code: InsufficientAmount", { - addressLookupTableAccounts: [lookupTableAccount!], + + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + + await expectIxOk(connection, [approveIx, ix], [payer, orderSender, preparedOrder]); + + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore - amountIn); + + // We've checked other fields in a previous test. Just make sure the min amount out + // is null. + const { + info: { orderType }, + } = await tokenRouter.fetchPreparedOrder(preparedOrder.publicKey); + expect(orderType).to.eql({ market: { minAmountOut: null } }); + + // Save for later. + localVariables.set("preparedOrder", preparedOrder.publicKey); + localVariables.set("orderSender", orderSender); + localVariables.set("amountIn", amountIn); + }); + + it("Cannot Close Prepared Order without Original Payer", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + const orderSender = localVariables.get("orderSender") as Keypair; + + const ix = await tokenRouter.closePreparedOrderIx({ + preparedOrder, + payer: ownerAssistant.publicKey, }); + + await expectIxErr( + connection, + [ix], + [ownerAssistant, orderSender], + "Error Code: PayerMismatch" + ); + }); + + it("Cannot Close Prepared Order without Order Sender", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + + const ix = await tokenRouter.closePreparedOrderIx({ + preparedOrder, + orderSender: ownerAssistant.publicKey, + }); + + await expectIxErr( + connection, + [ix], + [payer, ownerAssistant], + "Error Code: OrderSenderMismatch" + ); + }); + + it("Cannot Close Prepared Order without Correct Refund Token", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + const orderSender = localVariables.get("orderSender") as Keypair; + + const refundToken = Keypair.generate().publicKey; + + const ix = await tokenRouter.closePreparedOrderIx({ + preparedOrder, + refundToken, + }); + + await expectIxErr( + connection, + [ix], + [payer, orderSender], + "Error Code: RefundTokenMismatch" + ); + }); + + it("Close Prepared Order", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + expect(localVariables.delete("preparedOrder")).is.true; + const orderSender = localVariables.get("orderSender") as Keypair; + expect(localVariables.delete("orderSender")).is.true; + const amountIn = localVariables.get("amountIn") as bigint; + expect(localVariables.delete("amountIn")).is.true; + + const ix = await tokenRouter.closePreparedOrderIx({ + preparedOrder, + }); + + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + + await expectIxOk(connection, [ix], [payer, orderSender]); + + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore + amountIn); + + const accInfo = await connection.getAccountInfo(preparedOrder); + expect(accInfo).is.null; + }); + }); + + describe("Place Market Order (CCTP)", function () { + const payerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + payer.publicKey + ); + const orderSender = Keypair.generate(); + + const redeemer = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const redeemerMessage = Buffer.from("All your base are belong to us"); + + const localVariables = new Map(); + + it.skip("Cannot Place Market Order without Prepared Order", async function () { + // TODO }); - it("Cannot Place Market Order with Invalid Redeemer", async function () { + it("Prepare Market Order", async function () { + const preparedOrder = Keypair.generate(); + const amountIn = 69n; - const ix = await tokenRouter.placeMarketOrderCctpIx( + const ix = await tokenRouter.prepareMarketOrderIx( { payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: payer.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + orderToken: payerToken, + refundToken: payerToken, }, { amountIn, + minAmountOut: null, targetChain: foreignChain, - redeemer: new Array(32).fill(0), - redeemerMessage: Buffer.from("All your base are belong to us"), + redeemer, + redeemerMessage, } ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + const approveIx = splToken.createApproveInstruction( + payerToken, + orderSender.publicKey, + payer.publicKey, + amountIn ); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidRedeemer", { - addressLookupTableAccounts: [lookupTableAccount!], - }); + + await expectIxOk(connection, [approveIx, ix], [payer, orderSender, preparedOrder]); + + // Save for later. + localVariables.set("preparedOrder", preparedOrder.publicKey); + localVariables.set("amountIn", amountIn); }); - it("Cannot Place Market Order as Invalid Burn Source Authority", async function () { - const burnSourceAuthority = Keypair.generate(); + it("Cannot Place Market Order with Unregistered Endpoint", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; - const amountIn = 69n; - const ix = await tokenRouter.placeMarketOrderCctpIx( - { - payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: burnSourceAuthority.publicKey, - }, + const unregisteredEndpoint = tokenRouter.routerEndpointAddress( + wormholeSdk.CHAIN_ID_SOLANA + ); + const ix = await tokenRouter.placeMarketOrderCctpIx({ + payer: payer.publicKey, + preparedOrder, + routerEndpoint: unregisteredEndpoint, + }); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxErr( + connection, + [ix], + [payer, orderSender], + "Error Code: AccountNotInitialized", { - amountIn, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), + addressLookupTableAccounts: [lookupTableAccount!], } ); + }); + + it.skip("Cannot Place Market Order without Original Payer", async function () { + // TODO + }); + + it("Cannot Place Market Order without Order Sender", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + + const someoneElse = Keypair.generate(); + + const ix = await tokenRouter.placeMarketOrderCctpIx({ + payer: payer.publicKey, + preparedOrder, + orderSender: someoneElse.publicKey, + }); // NOTE: This error comes from the SPL Token program. await expectIxErr( connection, [ix], - [payer, burnSourceAuthority], - "Error: owner does not match" + [payer, someoneElse], + "Error Code: OrderSenderMismatch" ); }); - it("Place Market Order as Burn Source Authority", async function () { - const burnSource = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - burnSourceAuthority.publicKey + it("Place Market Order", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + expect(localVariables.delete("preparedOrder")).is.true; + const amountIn = localVariables.get("amountIn") as bigint; + expect(localVariables.delete("amountIn")).is.true; + + const ix = await tokenRouter.placeMarketOrderCctpIx({ + payer: payer.publicKey, + preparedOrder, + }); + + const custodyToken = tokenRouter.custodyTokenAccountAddress(); + const { amount: balanceBefore } = await splToken.getAccount( + connection, + custodyToken + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress ); - const amountIn = 69n; - const ix = await tokenRouter.placeMarketOrderCctpIx( + await expectIxOk(connection, [ix], [payer, orderSender], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + + // Check balance of custody account. + const { amount: balanceAfter } = await splToken.getAccount( + connection, + custodyToken + ); + expect(balanceAfter).equals(balanceBefore - amountIn); + + // TODO: check message + + const accInfo = await connection.getAccountInfo(preparedOrder); + expect(accInfo).is.null; + }); + + it("Prepare Another Market Order", async () => { + const preparedOrder = Keypair.generate(); + + const amountIn = 420n; + const ix = await tokenRouter.prepareMarketOrderIx( { payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource, - burnSourceAuthority: burnSourceAuthority.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + orderToken: payerToken, + refundToken: payerToken, }, { amountIn, + minAmountOut: null, targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), + redeemer, + redeemerMessage, } ); - const { amount: balanceBefore } = await splToken.getAccount(connection, burnSource); - - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + const approveIx = splToken.createApproveInstruction( + payerToken, + orderSender.publicKey, + payer.publicKey, + amountIn ); - await expectIxOk(connection, [ix], [payer, burnSourceAuthority], { - addressLookupTableAccounts: [lookupTableAccount!], - }); - // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, burnSource); - expect(balanceAfter + amountIn).equals(balanceBefore); + await expectIxOk(connection, [approveIx, ix], [payer, orderSender, preparedOrder]); - // TODO: check message + // Save for later. + localVariables.set("preparedOrder", preparedOrder.publicKey); + localVariables.set("amountIn", amountIn); }); it("Pause", async function () { @@ -680,22 +898,14 @@ describe("Token Router", function () { }); it("Cannot Place Market Order when Paused", async function () { - const ix = await tokenRouter.placeMarketOrderCctpIx( - { - payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: payer.publicKey, - }, - { - amountIn: 69n, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), - } - ); + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + + const ix = await tokenRouter.placeMarketOrderCctpIx({ + payer: payer.publicKey, + preparedOrder, + }); - await expectIxErr(connection, [ix], [payer], "Error Code: Paused"); + await expectIxErr(connection, [ix], [payer, orderSender], "Error Code: Paused"); }); it("Unpause", async function () { @@ -710,36 +920,55 @@ describe("Token Router", function () { }); it("Place Market Order after Unpaused", async function () { - const amountIn = 69n; - const ix = await tokenRouter.placeMarketOrderCctpIx( - { - payer: payer.publicKey, - mint: USDC_MINT_ADDRESS, - burnSource: payerToken, - burnSourceAuthority: payer.publicKey, - }, - { - amountIn, - targetChain: foreignChain, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - redeemerMessage: Buffer.from("All your base are belong to us"), - } - ); + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + const amountIn = localVariables.get("amountIn") as bigint; - const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + const ix = await tokenRouter.placeMarketOrderCctpIx({ + payer: payer.publicKey, + preparedOrder, + }); + + const custodyToken = tokenRouter.custodyTokenAccountAddress(); + const { amount: balanceBefore } = await splToken.getAccount( + connection, + custodyToken + ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxOk(connection, [ix], [payer], { + await expectIxOk(connection, [ix], [payer, orderSender], { addressLookupTableAccounts: [lookupTableAccount!], }); // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); - expect(balanceAfter + amountIn).equals(balanceBefore); + const { amount: balanceAfter } = await splToken.getAccount( + connection, + custodyToken + ); + expect(balanceAfter).equals(balanceBefore - amountIn); // TODO: check message + const { value: payerSequenceValue } = await tokenRouter.fetchPayerSequence( + tokenRouter.payerSequenceAddress(payer.publicKey) + ); + const { + message: { emitterAddress, payload }, + } = await getPostedMessage( + connection, + tokenRouter.coreMessageAddress(payer.publicKey, payerSequenceValue.subn(1)) + ); + expect(emitterAddress).to.eql(tokenRouter.custodianAddress().toBuffer()); + + const actualDepositMessage = LiquidityLayerMessage.decode(payload); + // TODO: check this with an expected message + + const accInfo = await connection.getAccountInfo(preparedOrder); + expect(accInfo).is.null; + }); + + it.skip("Prepare and Place Market Order in One Transaction", async function () { + // TODO }); }); From 766aa4fb8e5a0869f2bc73799ab74714841a4a1f Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 22 Jan 2024 08:33:18 -0600 Subject: [PATCH 074/126] solana: move calculate_dynamic_penalty to utils --- .../src/processor/auction/mod.rs | 10 +-- .../execute_slow_order/auction_active_cctp.rs | 11 +-- .../matching-engine/src/state/custodian.rs | 39 +--------- .../programs/matching-engine/src/utils/mod.rs | 44 +++++++++++- solana/ts/tests/01__matchingEngine.ts | 72 +++++++++---------- .../ts/tests/helpers/matching_engine_utils.ts | 14 ---- 6 files changed, 91 insertions(+), 99 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index be61ba3a..3f555a21 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -94,10 +94,12 @@ pub fn handle_fast_order_execution(accounts: ExecuteFastOrderAccounts) -> Result let mut user_reward: u64 = 0; if slots_elapsed > auction_config.auction_grace_period.into() { - let (penalty, reward) = accounts - .custodian - .calculate_dynamic_penalty(auction_data.security_deposit, slots_elapsed) - .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; + let (penalty, reward) = crate::utils::calculate_dynamic_penalty( + &accounts.custodian.auction_config, + auction_data.security_deposit, + slots_elapsed, + ) + .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; // Save user reward for CCTP transfer. user_reward = reward; diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs index 55c8b423..b8d4e223 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs @@ -215,11 +215,12 @@ pub fn execute_slow_order_auction_active_cctp( let (final_status, liquidator_amount, best_offer_amount, cctp_amount) = { let auction = &ctx.accounts.auction_data; let slots_elapsed = Clock::get().map(|clock| clock.slot - auction.start_slot)?; - let (penalty, reward) = ctx - .accounts - .custodian - .calculate_dynamic_penalty(auction.security_deposit, slots_elapsed) - .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; + let (penalty, reward) = crate::utils::calculate_dynamic_penalty( + &ctx.accounts.custodian.auction_config, + auction.security_deposit, + slots_elapsed, + ) + .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; let base_fee = ctx.accounts.prepared_slow_order.base_fee; ( diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index 557e2540..dc8fe941 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -1,5 +1,5 @@ use anchor_lang::prelude::*; -use common::constants::FEE_PRECISION_MAX; + #[derive(AnchorSerialize, AnchorDeserialize, Clone, Debug, InitSpace)] pub struct AuctionConfig { // The percentage of the penalty that is awarded to the user when the auction is completed. @@ -44,43 +44,6 @@ pub struct Custodian { impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"custodian"; - - pub fn calculate_dynamic_penalty(&self, amount: u64, slots_elapsed: u64) -> Option<(u64, u64)> { - let config = &self.auction_config; - let grace_period = config.auction_grace_period.into(); - let auction_penalty_slots = config.auction_penalty_slots.into(); - let user_penalty_reward_bps = config.user_penalty_reward_bps.into(); - let fee_precision = FEE_PRECISION_MAX.into(); - - if slots_elapsed <= grace_period { - return Some((0, 0)); - } - - let penalty_period = slots_elapsed - grace_period; - if penalty_period >= auction_penalty_slots - || config.initial_penalty_bps == FEE_PRECISION_MAX - { - let reward = amount - .checked_mul(user_penalty_reward_bps)? - .checked_div(fee_precision)?; - - Some((amount.checked_sub(reward)?, reward)) - } else { - let base_penalty = amount - .checked_mul(config.initial_penalty_bps.into())? - .checked_div(fee_precision)?; - let penalty = base_penalty.checked_add( - (amount.checked_sub(base_penalty)?) - .checked_mul(penalty_period)? - .checked_div(auction_penalty_slots)?, - )?; - let reward = penalty - .checked_mul(user_penalty_reward_bps)? - .checked_div(fee_precision)?; - - Some((penalty.checked_sub(reward).unwrap(), reward)) - } - } } impl common::admin::Ownable for Custodian { diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 00c8145b..b8da3d1c 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -1,5 +1,9 @@ -use crate::{error::MatchingEngineError, state::RouterEndpoint}; +use crate::{ + error::MatchingEngineError, + state::{AuctionConfig, RouterEndpoint}, +}; use anchor_lang::prelude::*; +use common::constants::FEE_PRECISION_MAX; use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; pub fn verify_router_path( @@ -26,3 +30,41 @@ pub fn verify_router_path( Ok(()) } + +pub fn calculate_dynamic_penalty( + config: &AuctionConfig, + amount: u64, + slots_elapsed: u64, +) -> Option<(u64, u64)> { + let grace_period = config.auction_grace_period.into(); + let auction_penalty_slots = config.auction_penalty_slots.into(); + let user_penalty_reward_bps = config.user_penalty_reward_bps.into(); + let fee_precision = FEE_PRECISION_MAX.into(); + + if slots_elapsed <= grace_period { + return Some((0, 0)); + } + + let penalty_period = slots_elapsed - grace_period; + if penalty_period >= auction_penalty_slots || config.initial_penalty_bps == FEE_PRECISION_MAX { + let reward = amount + .checked_mul(user_penalty_reward_bps)? + .checked_div(fee_precision)?; + + Some((amount.checked_sub(reward)?, reward)) + } else { + let base_penalty = amount + .checked_mul(config.initial_penalty_bps.into())? + .checked_div(fee_precision)?; + let penalty = base_penalty.checked_add( + (amount.checked_sub(base_penalty)?) + .checked_mul(penalty_period)? + .checked_div(auction_penalty_slots)?, + )?; + let reward = penalty + .checked_mul(user_penalty_reward_bps)? + .checked_div(fee_precision)?; + + Some((penalty.checked_sub(reward).unwrap(), reward)) + } +} diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 0fbad146..79cee0cc 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -32,8 +32,6 @@ import { import { FastMarketOrder, calculateDynamicPenalty, - getBestOfferTokenAccount, - getInitialOfferTokenAccount, getTokenBalance, postFastTransferVaa, postVaaWithMessage, @@ -1313,7 +1311,7 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityTwo. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); await expectIxOk( connection, @@ -1406,7 +1404,7 @@ describe("Matching Engine", function () { const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const newOffer = baseFastOrder.maxFee - 100n; const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); await expectIxOk( connection, @@ -1476,7 +1474,7 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityOne. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const newOffer = baseFastOrder.maxFee - 100n; - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); await skip_slots(connection, 3); @@ -1552,7 +1550,7 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityOne. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const newOffer = baseFastOrder.maxFee - 100n; - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); await skip_slots(connection, 3); @@ -1602,7 +1600,7 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityOne. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); await expectIxErr( connection, @@ -1642,8 +1640,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - let bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + let bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); const newOffer = baseFastOrder.maxFee - 100n; // Improve the bid with offer one. @@ -1675,7 +1673,7 @@ describe("Matching Engine", function () { offerAuthorityTwo.publicKey ); const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); // Fast forward into the grace period. await skip_slots(connection, 2); @@ -1766,8 +1764,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - let bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + let bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); const newOffer = fastOrder.maxFee - 100n; // Improve the bid with offer one. @@ -1799,7 +1797,7 @@ describe("Matching Engine", function () { offerAuthorityTwo.publicKey ); const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); // Fast forward into the grace period. await skip_slots(connection, 2); @@ -1881,8 +1879,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fetch the balances before. const highestOfferBefore = await getTokenBalance( @@ -1998,8 +1996,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fetch the balances before. const highestOfferBefore = await getTokenBalance( @@ -2124,8 +2122,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fetch the balances before. const highestOfferBefore = await getTokenBalance( @@ -2258,8 +2256,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); await expectIxErr( connection, @@ -2308,8 +2306,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward past the penalty period. await skip_slots(connection, 15); @@ -2346,7 +2344,7 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Pass the wrong address for the best offer token account. await expectIxErr( @@ -2381,7 +2379,7 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); // Pass the wrong address for the initial offer token account. await expectIxErr( @@ -2416,8 +2414,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward into the grace period. await skip_slots(connection, 4); @@ -2468,8 +2466,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Do not fast forward into the grace period. @@ -2506,8 +2504,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); await expectIxErr( connection, @@ -2561,8 +2559,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward past the penalty period. await skip_slots(connection, 15); @@ -2603,7 +2601,7 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Pass the wrong address for the best offer token account. await expectIxErr( @@ -2642,7 +2640,7 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); // Pass the wrong address for the initial offer token account. await expectIxErr( @@ -2681,8 +2679,8 @@ describe("Matching Engine", function () { // Accounts for the instruction. const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await getBestOfferTokenAccount(engine, vaaHash); - const initialOfferToken = await getInitialOfferTokenAccount(engine, vaaHash); + const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward into the grace period. await skip_slots(connection, 4); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index 9bdcc914..f82c0a7c 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -186,20 +186,6 @@ export async function postFastTransferVaa( ); } -export async function getBestOfferTokenAccount( - engine: MatchingEngineProgram, - vaaHash: Buffer -): Promise { - return (await engine.fetchAuctionData(vaaHash)).bestOfferToken; -} - -export async function getInitialOfferTokenAccount( - engine: MatchingEngineProgram, - vaaHash: Buffer -): Promise { - return (await engine.fetchAuctionData(vaaHash)).initialOfferToken; -} - const sleep = (ms = 0) => new Promise((resolve) => setTimeout(resolve, ms)); export async function skip_slots(connection: Connection, slots: number): Promise { From 22c66801a9ea035e5290349bd5c5f6f4be37213c Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 22 Jan 2024 10:54:02 -0600 Subject: [PATCH 075/126] solana: refactor tests --- solana/ts/src/tokenRouter/index.ts | 36 +++-- solana/ts/tests/02__tokenRouter.ts | 214 +++++++++++++++++++---------- 2 files changed, 168 insertions(+), 82 deletions(-) diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index d622da5b..d71e3856 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -377,21 +377,37 @@ export class TokenRouterProgram { }; } - async placeMarketOrderCctpIx(accounts: { - payer: PublicKey; - preparedOrder: PublicKey; - orderSender?: PublicKey; - routerEndpoint?: PublicKey; - }): Promise { - let { + async placeMarketOrderCctpIx( + accounts: { + payer: PublicKey; + preparedOrder: PublicKey; + orderSender?: PublicKey; + routerEndpoint?: PublicKey; + }, + args?: { + targetChain: number; + } + ): Promise { + const { payer, preparedOrder, orderSender: inputOrderSender, routerEndpoint: inputRouterEndpoint, } = accounts; - const { - info: { orderSender, targetChain }, - } = await this.fetchPreparedOrder(preparedOrder); + const { orderSender, targetChain } = await (async () => { + if (inputOrderSender !== undefined && args !== undefined) { + return { orderSender: inputOrderSender, targetChain: args.targetChain }; + } else { + const { + info: { orderSender, targetChain }, + } = await this.fetchPreparedOrder(preparedOrder).catch((_) => { + throw new Error( + "Cannot find prepared order. If it doesn't exist, please provide orderSender and targetChain." + ); + }); + return { orderSender, targetChain }; + } + })(); const payerSequence = this.payerSequenceAddress(payer); const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 4ac35a26..8eee2f83 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -730,35 +730,15 @@ describe("Token Router", function () { }); it("Prepare Market Order", async function () { - const preparedOrder = Keypair.generate(); - const amountIn = 69n; - const ix = await tokenRouter.prepareMarketOrderIx( - { - payer: payer.publicKey, - orderSender: orderSender.publicKey, - preparedOrder: preparedOrder.publicKey, - orderToken: payerToken, - refundToken: payerToken, - }, - { - amountIn, - minAmountOut: null, - targetChain: foreignChain, - redeemer, - redeemerMessage, - } - ); + const { preparedOrder, approveIx, prepareIx } = await prepareOrder(amountIn); - const approveIx = splToken.createApproveInstruction( - payerToken, - orderSender.publicKey, - payer.publicKey, - amountIn + await expectIxOk( + connection, + [approveIx, prepareIx], + [payer, orderSender, preparedOrder] ); - await expectIxOk(connection, [approveIx, ix], [payer, orderSender, preparedOrder]); - // Save for later. localVariables.set("preparedOrder", preparedOrder.publicKey); localVariables.set("amountIn", amountIn); @@ -845,45 +825,7 @@ describe("Token Router", function () { ); expect(balanceAfter).equals(balanceBefore - amountIn); - // TODO: check message - - const accInfo = await connection.getAccountInfo(preparedOrder); - expect(accInfo).is.null; - }); - - it("Prepare Another Market Order", async () => { - const preparedOrder = Keypair.generate(); - - const amountIn = 420n; - const ix = await tokenRouter.prepareMarketOrderIx( - { - payer: payer.publicKey, - orderSender: orderSender.publicKey, - preparedOrder: preparedOrder.publicKey, - orderToken: payerToken, - refundToken: payerToken, - }, - { - amountIn, - minAmountOut: null, - targetChain: foreignChain, - redeemer, - redeemerMessage, - } - ); - - const approveIx = splToken.createApproveInstruction( - payerToken, - orderSender.publicKey, - payer.publicKey, - amountIn - ); - - await expectIxOk(connection, [approveIx, ix], [payer, orderSender, preparedOrder]); - - // Save for later. - localVariables.set("preparedOrder", preparedOrder.publicKey); - localVariables.set("amountIn", amountIn); + checkAfterEffects({ preparedOrder, amountIn, burnSource: payerToken }); }); it("Pause", async function () { @@ -897,6 +839,21 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [owner]); }); + it("Prepare Another Market Order While Paused", async () => { + const amountIn = 420n; + const { preparedOrder, approveIx, prepareIx } = await prepareOrder(amountIn); + + await expectIxOk( + connection, + [approveIx, approveIx, prepareIx], + [payer, orderSender, preparedOrder] + ); + + // Save for later. + localVariables.set("preparedOrder", preparedOrder.publicKey); + localVariables.set("amountIn", amountIn); + }); + it("Cannot Place Market Order when Paused", async function () { const preparedOrder = localVariables.get("preparedOrder") as PublicKey; @@ -921,7 +878,9 @@ describe("Token Router", function () { it("Place Market Order after Unpaused", async function () { const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + expect(localVariables.delete("preparedOrder")).is.true; const amountIn = localVariables.get("amountIn") as bigint; + expect(localVariables.delete("amountIn")).is.true; const ix = await tokenRouter.placeMarketOrderCctpIx({ payer: payer.publicKey, @@ -948,7 +907,84 @@ describe("Token Router", function () { ); expect(balanceAfter).equals(balanceBefore - amountIn); - // TODO: check message + checkAfterEffects({ preparedOrder, amountIn, burnSource: payerToken }); + }); + + it("Prepare and Place Market Order in One Transaction", async function () { + const amountIn = 42069n; + const { preparedOrder, approveIx, prepareIx } = await prepareOrder(amountIn); + + const ix = await tokenRouter.placeMarketOrderCctpIx( + { + payer: payer.publicKey, + preparedOrder: preparedOrder.publicKey, + orderSender: orderSender.publicKey, + }, + { + targetChain: foreignChain, + } + ); + + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + await expectIxOk( + connection, + [approveIx, prepareIx, ix], + [payer, orderSender, preparedOrder], + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore - amountIn); + + checkAfterEffects({ + preparedOrder: preparedOrder.publicKey, + amountIn, + burnSource: payerToken, + }); + }); + + async function prepareOrder(amountIn: bigint) { + const preparedOrder = Keypair.generate(); + const prepareIx = await tokenRouter.prepareMarketOrderIx( + { + payer: payer.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + orderToken: payerToken, + refundToken: payerToken, + }, + { + amountIn, + minAmountOut: null, + targetChain: foreignChain, + redeemer, + redeemerMessage, + } + ); + + const approveIx = splToken.createApproveInstruction( + payerToken, + orderSender.publicKey, + payer.publicKey, + amountIn + ); + + return { preparedOrder, approveIx, prepareIx }; + } + + async function checkAfterEffects(args: { + preparedOrder: PublicKey; + amountIn: bigint; + burnSource: PublicKey; + }) { + const { preparedOrder, amountIn, burnSource } = args; + const { value: payerSequenceValue } = await tokenRouter.fetchPayerSequence( tokenRouter.payerSequenceAddress(payer.publicKey) ); @@ -960,16 +996,50 @@ describe("Token Router", function () { ); expect(emitterAddress).to.eql(tokenRouter.custodianAddress().toBuffer()); - const actualDepositMessage = LiquidityLayerMessage.decode(payload); - // TODO: check this with an expected message + const { sourceCctpDomain, cctpNonce } = await (async () => { + const transmitter = tokenRouter.messageTransmitterProgram(); + const config = transmitter.messageTransmitterConfigAddress(); + const { localDomain, nextAvailableNonce } = + await transmitter.fetchMessageTransmitterConfig(config); + return { sourceCctpDomain: localDomain, cctpNonce: nextAvailableNonce - 1n }; + })(); + + const { + protocol: { cctp: cctpProtocol }, + } = await tokenRouter.fetchRouterEndpoint( + tokenRouter.routerEndpointAddress(foreignChain) + ); + expect(cctpProtocol).is.not.null; + const { domain: destinationCctpDomain } = cctpProtocol!; + + const depositMessage = LiquidityLayerMessage.decode(payload); + expect(depositMessage).to.eql( + new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: Array.from(USDC_MINT_ADDRESS.toBuffer()), + amount: amountIn, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource: Array.from(burnSource.toBuffer()), + mintRecipient: foreignEndpointAddress, + }, + { + fill: { + sourceChain: wormholeSdk.CHAIN_ID_SOLANA as number, + orderSender: Array.from(orderSender.publicKey.toBuffer()), + redeemer, + redeemerMessage, + }, + } + ), + }) + ); const accInfo = await connection.getAccountInfo(preparedOrder); expect(accInfo).is.null; - }); - - it.skip("Prepare and Place Market Order in One Transaction", async function () { - // TODO - }); + } }); describe("Redeem Fill (CCTP)", function () { From 13f9f99879b96491be1ae759ab4b78d5360cfa1f Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 22 Jan 2024 12:07:19 -0600 Subject: [PATCH 076/126] solana: add unit tests for calculate_dynamic_penalty --- .../programs/matching-engine/src/utils/mod.rs | 154 ++++++++++++++++++ 1 file changed, 154 insertions(+) diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index b8da3d1c..8e19291d 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -68,3 +68,157 @@ pub fn calculate_dynamic_penalty( Some((penalty.checked_sub(reward).unwrap(), reward)) } } + +#[cfg(test)] +mod test { + use super::*; + use anchor_lang::prelude::Result; + + #[test] + fn test_calculate_dynamic_penalty() -> Result<()> { + // Create test AuctionConfig struct. + let mut config = AuctionConfig { + user_penalty_reward_bps: 250000, + initial_penalty_bps: 100000, + auction_duration: 2, + auction_grace_period: 6, + auction_penalty_slots: 20, + }; + + // Still in grace period. + { + let amount = 10000000; + let slots_elapsed = config.auction_grace_period - 1; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 0); + assert_eq!(reward, 0); + } + + // Penalty period is over. + { + let amount = 10000000; + let slots_elapsed = config.auction_penalty_slots + config.auction_grace_period; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 7500000); + assert_eq!(reward, 2500000); + } + + // One slot into the penalty period. + { + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 1; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 1087500); + assert_eq!(reward, 362500); + } + + // 50% of the way through the penalty period. + { + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 10; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 4125000); + assert_eq!(reward, 1375000); + } + + // Penalty period (19/20 slots). + { + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 19; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 7162500); + assert_eq!(reward, 2387500); + } + + // Update the initial penalty to 0%. 50% of the way through the penalty period. + { + config.initial_penalty_bps = 0; + + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 10; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 3750000); + assert_eq!(reward, 1250000); + } + + // Set the user reward to 0%. + { + config.user_penalty_reward_bps = 0; + + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 10; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 5000000); + assert_eq!(reward, 0); + } + + // Set the initial penalty to 100% and user penalty to 50%. + { + config.initial_penalty_bps = FEE_PRECISION_MAX; + config.user_penalty_reward_bps = 500000; + + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 5; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 5000000); + assert_eq!(reward, 5000000); + } + + // Set the user penalty to 100% and initial penalty to 50%. + { + config.initial_penalty_bps = 500000; + config.user_penalty_reward_bps = FEE_PRECISION_MAX; + + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 10; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 0); + assert_eq!(reward, 7500000); + } + + // Set the penalty blocks to zero. + { + config.initial_penalty_bps = 500000; + config.user_penalty_reward_bps = 500000; + config.auction_penalty_slots = 0; + + let amount = 10000000; + let slots_elapsed = config.auction_grace_period + 10; + let (penalty, reward) = + calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) + .unwrap(); + + assert_eq!(penalty, 5000000); + assert_eq!(reward, 5000000); + } + + Ok(()) + } +} From 89a8117078e21bf154451ccbb619a3ed352a4c17 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 22 Jan 2024 16:30:19 -0600 Subject: [PATCH 077/126] evm: amount type changes to uint128 --- evm/forge/tests/MatchingEngine.t.sol | 250 +++++++++--------- evm/forge/tests/TokenRouter.t.sol | 90 +++---- evm/src/MatchingEngine/assets/Errors.sol | 2 +- .../assets/MatchingEngineFastOrders.sol | 37 +-- evm/src/MatchingEngine/assets/State.sol | 26 +- evm/src/TokenRouter/assets/Errors.sol | 6 +- .../TokenRouter/assets/PlaceMarketOrder.sol | 28 +- evm/src/TokenRouter/assets/State.sol | 10 +- .../interfaces/IMatchingEngineFastOrders.sol | 4 +- evm/src/interfaces/IMatchingEngineState.sol | 12 +- evm/src/interfaces/IMatchingEngineTypes.sol | 8 +- evm/src/interfaces/IPlaceMarketOrder.sol | 16 +- evm/src/interfaces/ITokenRouterState.sol | 10 +- evm/src/interfaces/ITokenRouterTypes.sol | 6 +- evm/src/shared/Messages.sol | 28 +- evm/ts/src/MatchingEngine/evm.ts | 2 +- evm/ts/src/TokenRouter/evm.ts | 17 +- evm/ts/src/messages.ts | 40 ++- 18 files changed, 299 insertions(+), 293 deletions(-) diff --git a/evm/forge/tests/MatchingEngine.t.sol b/evm/forge/tests/MatchingEngine.t.sol index 9c2e3691..2886f571 100644 --- a/evm/forge/tests/MatchingEngine.t.sol +++ b/evm/forge/tests/MatchingEngine.t.sol @@ -72,12 +72,12 @@ contract MatchingEngineTest is Test { bytes32 immutable TEST_REDEEMER = makeAddr("TEST_REDEEMER").toUniversalAddress(); // Used to calculate a theo price for the fast transfer fee. - uint128 immutable TEST_TRANSFER_FEE_IN_BPS = 25000; // 0.25%. + uint64 immutable TEST_TRANSFER_FEE_IN_BPS = 25000; // 0.25%. // Fast transfer outbound parameters. - uint128 immutable FAST_TRANSFER_MAX_AMOUNT = 500000e6; // 500,000 USDC. - uint128 immutable FAST_TRANSFER_BASE_FEE = 1e6; // 1 USDC. - uint128 immutable FAST_TRANSFER_INIT_AUCTION_FEE = 1e6; // 1 USDC. + uint64 immutable FAST_TRANSFER_MAX_AMOUNT = 500000e6; // 500,000 USDC. + uint64 immutable FAST_TRANSFER_BASE_FEE = 1e6; // 1 USDC. + uint64 immutable FAST_TRANSFER_INIT_AUCTION_FEE = 1e6; // 1 USDC. // Initial Auction parameters. uint24 immutable USER_PENALTY_REWARD_BPS = 250000; // 25%. @@ -364,8 +364,8 @@ contract MatchingEngineTest is Test { function testCalculateDynamicPenalty() public { // Still in grace period. { - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() - 1); assertEq(penalty, 0); assertEq(reward, 0); @@ -373,8 +373,8 @@ contract MatchingEngineTest is Test { // Penalty period is over. { - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = engine.calculateDynamicPenalty( + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty( amount, engine.getAuctionPenaltyBlocks() + engine.getAuctionGracePeriod() ); assertEq(penalty, 7500000); @@ -383,8 +383,8 @@ contract MatchingEngineTest is Test { // One block into the penalty period. { - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() + 1); assertEq(penalty, 1087500); assertEq(reward, 362500); @@ -392,8 +392,8 @@ contract MatchingEngineTest is Test { // 50% of the way through the penalty period. { - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() + 10); assertEq(penalty, 4125000); assertEq(reward, 1375000); @@ -401,8 +401,8 @@ contract MatchingEngineTest is Test { // Penalty period boundary (19/20) { - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() + 19); assertEq(penalty, 7162500); assertEq(reward, 2387500); @@ -418,8 +418,8 @@ contract MatchingEngineTest is Test { engine.getAuctionPenaltyBlocks() ); - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() + 10); assertEq(penalty, 3750000); assertEq(reward, 1250000); @@ -435,8 +435,8 @@ contract MatchingEngineTest is Test { engine.getAuctionPenaltyBlocks() ); - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() + 10); assertEq(penalty, 5000000); assertEq(reward, 0); @@ -452,8 +452,8 @@ contract MatchingEngineTest is Test { engine.getAuctionPenaltyBlocks() ); - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() + 5); assertEq(penalty, 5000000); assertEq(reward, 5000000); @@ -469,8 +469,8 @@ contract MatchingEngineTest is Test { engine.getAuctionPenaltyBlocks() ); - uint128 amount = 10000000; - (uint128 penalty, uint128 reward) = + uint64 amount = 10000000; + (uint64 penalty, uint64 reward) = engine.calculateDynamicPenalty(amount, engine.getAuctionGracePeriod() + 10); assertEq(penalty, 0); assertEq(reward, 7500000); @@ -481,26 +481,24 @@ contract MatchingEngineTest is Test { * PLACE INITIAL BID TESTS */ - function testPlaceInitialBid(uint128 amountIn, uint128 feeBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testPlaceInitialBid(uint64 amountIn, uint64 feeBid) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); // This method explicitly sets the deadline to zero. (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); // Cap the fee bid. - feeBid = uint128(bound(feeBid, 0, order.maxFee)); + feeBid = uint64(bound(feeBid, 0, order.maxFee)); // Place initial bid with player one and verify the state changes. _placeInitialBid(order, fastMessage, feeBid, PLAYER_ONE); } - function testPlaceInitialBidWithDeadline( - uint128 amountIn, - uint128 feeBid, - uint32 timeToDeadline - ) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testPlaceInitialBidWithDeadline(uint64 amountIn, uint64 feeBid, uint32 timeToDeadline) + public + { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); timeToDeadline = uint32(bound(timeToDeadline, 5, type(uint32).max - uint32(block.timestamp))); uint32 deadline = uint32(block.timestamp + timeToDeadline); @@ -510,15 +508,15 @@ contract MatchingEngineTest is Test { _getFastMarketOrder(amountIn, deadline); // Cap the fee bid. - feeBid = uint128(bound(feeBid, 0, order.maxFee)); + feeBid = uint64(bound(feeBid, 0, order.maxFee)); // Place initial bid with player one and verify the state changes. _placeInitialBid(order, fastMessage, feeBid, PLAYER_ONE); } function testCannotPlaceInitialBidDeadlineExceeded() public { - uint128 amountIn = _getMinTransferAmount() + 6900; - uint128 transferFee = _calculateFastTransferFee(amountIn); + uint64 amountIn = _getMinTransferAmount() + 6900; + uint64 transferFee = _calculateFastTransferFee(amountIn); uint32 deadline = uint32(block.timestamp) + 10; Messages.FastMarketOrder memory order = Messages.FastMarketOrder({ @@ -546,8 +544,7 @@ contract MatchingEngineTest is Test { } function testCannotPlaceInitialBidInvalidWormholeMessage() public { - (, bytes memory fastMessage) = - _getFastMarketOrder(_getMinTransferAmount()); + (, bytes memory fastMessage) = _getFastMarketOrder(_getMinTransferAmount()); // Modify the vaa. fastMessage[5] = 0x00; @@ -557,8 +554,8 @@ contract MatchingEngineTest is Test { } function testCannotPlaceInitialBidInvalidRouterPath() public { - uint128 amountIn = _getMinTransferAmount() + 6900; - uint128 bid = 420; + uint64 amountIn = _getMinTransferAmount() + 6900; + uint64 bid = 420; uint16 invalidChain = 69; Messages.FastMarketOrder memory order = Messages.FastMarketOrder({ @@ -587,8 +584,8 @@ contract MatchingEngineTest is Test { } function testCannotPlaceInitialBidInvalidTargetRouter() public { - uint128 amountIn = _getMinTransferAmount() + 6900; - uint128 bid = 420; + uint64 amountIn = _getMinTransferAmount() + 6900; + uint64 bid = 420; uint16 invalidChain = 69; // Use an invalid target chain. @@ -614,8 +611,8 @@ contract MatchingEngineTest is Test { } function testCannotPlaceInitialBidPriceTooHigh() public { - uint128 amountIn = _getMinTransferAmount() + 6900; - uint128 transferFee = _calculateFastTransferFee(amountIn); + uint64 amountIn = _getMinTransferAmount() + 6900; + uint64 transferFee = _calculateFastTransferFee(amountIn); Messages.FastMarketOrder memory order = Messages.FastMarketOrder({ amountIn: amountIn, @@ -636,14 +633,14 @@ contract MatchingEngineTest is Test { vm.expectRevert( abi.encodeWithSignature( - "ErrBidPriceTooHigh(uint128,uint128)", transferFee + 1, transferFee + "ErrBidPriceTooHigh(uint64,uint64)", transferFee + 1, transferFee ) ); engine.placeInitialBid(fastMessage, transferFee + 1); } function testCannotPlaceInitialBidAuctionNotActive() public { - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -666,8 +663,8 @@ contract MatchingEngineTest is Test { * two players are racing to place the initial bid. Instead, `_improveBid` * is called and the highest bidder is updated. */ - function testPlaceInitialBidAgain(uint128 amountIn, uint128 newBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testPlaceInitialBidAgain(uint64 amountIn, uint64 newBid) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -676,7 +673,7 @@ contract MatchingEngineTest is Test { _placeInitialBid(order, fastMessage, order.maxFee, PLAYER_ONE); // Create a bid that is lower than the current bid. - newBid = uint128(bound(newBid, 0, order.maxFee)); + newBid = uint64(bound(newBid, 0, order.maxFee)); _dealAndApproveUsdc(engine, order.amountIn + order.maxFee, PLAYER_TWO); @@ -706,8 +703,8 @@ contract MatchingEngineTest is Test { * IMPROVE BID TESTS */ - function testImproveBid(uint128 amountIn, uint128 newBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testImproveBid(uint64 amountIn, uint64 newBid) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -716,13 +713,13 @@ contract MatchingEngineTest is Test { _placeInitialBid(order, fastMessage, order.maxFee, PLAYER_ONE); // Create a bid that is lower than the current bid. - newBid = uint128(bound(newBid, 0, order.maxFee)); + newBid = uint64(bound(newBid, 0, order.maxFee)); _improveBid(order, fastMessage, newBid, PLAYER_ONE, PLAYER_TWO); } - function testImproveBidWithHighestBidder(uint128 amountIn, uint128 newBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testImproveBidWithHighestBidder(uint64 amountIn, uint64 newBid) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -731,7 +728,7 @@ contract MatchingEngineTest is Test { _placeInitialBid(order, fastMessage, order.maxFee, PLAYER_ONE); // Create a bid that is lower than the current bid. - newBid = uint128(bound(newBid, 0, order.maxFee)); + newBid = uint64(bound(newBid, 0, order.maxFee)); IWormhole.VM memory _vm = wormhole.parseVM(fastMessage); @@ -748,7 +745,7 @@ contract MatchingEngineTest is Test { } function testCannotImproveBidAuctionAlreadyCompleted() public { - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -767,7 +764,7 @@ contract MatchingEngineTest is Test { } function testCannotImproveBidAuctionNotActive() public { - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -779,7 +776,7 @@ contract MatchingEngineTest is Test { } function testCannotImproveBidAuctionExpired() public { - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -796,7 +793,7 @@ contract MatchingEngineTest is Test { } function testCannotImproveBidPriceTooHigh() public { - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -806,9 +803,7 @@ contract MatchingEngineTest is Test { // Try to place a bid with the same price. vm.expectRevert( - abi.encodeWithSignature( - "ErrBidPriceTooHigh(uint128,uint128)", order.maxFee, order.maxFee - ) + abi.encodeWithSignature("ErrBidPriceTooHigh(uint64,uint64)", order.maxFee, order.maxFee) ); engine.improveBid(auctionId, order.maxFee); } @@ -817,8 +812,8 @@ contract MatchingEngineTest is Test { * EXECUTE FAST ORDER TESTS */ - function testExecuteFastOrder(uint128 amountIn, uint128 newBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testExecuteFastOrder(uint64 amountIn, uint64 newBid) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -827,7 +822,7 @@ contract MatchingEngineTest is Test { _placeInitialBid(order, fastMessage, order.maxFee, PLAYER_ONE); // Create a bid that is lower than the current bid. - newBid = uint128(bound(newBid, 0, order.maxFee)); + newBid = uint64(bound(newBid, 0, order.maxFee)); _improveBid(order, fastMessage, newBid, PLAYER_ONE, PLAYER_TWO); IWormhole.VM memory _vm = wormhole.parseVM(fastMessage); @@ -856,26 +851,26 @@ contract MatchingEngineTest is Test { assertEq(uint8(engine.getAuctionStatus(_vm.hash)), uint8(AuctionStatus.Completed)); } - function testExecuteFastOrderWithPenalty(uint128 amountIn, uint8 penaltyBlocks) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testExecuteFastOrderWithPenalty(uint64 amountIn, uint8 penaltyBlocks) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); // Place initial bid for the max fee with player one. - uint128 bidPrice = order.maxFee - 1; + uint64 bidPrice = order.maxFee - 1; _placeInitialBid(order, fastMessage, bidPrice, PLAYER_ONE); IWormhole.VM memory _vm = wormhole.parseVM(fastMessage); // Warp the block into the penalty period. penaltyBlocks = uint8(bound(penaltyBlocks, 1, engine.getAuctionPenaltyBlocks() + 1)); - uint128 startBlock = engine.liveAuctionInfo(_vm.hash).startBlock; + uint64 startBlock = engine.liveAuctionInfo(_vm.hash).startBlock; vm.roll(startBlock + engine.getAuctionGracePeriod() + penaltyBlocks); // Calculate the expected penalty and reward. - (uint128 expectedPenalty, uint128 expectedReward) = - engine.calculateDynamicPenalty(order.maxFee, uint128(block.number - startBlock)); + (uint64 expectedPenalty, uint64 expectedReward) = + engine.calculateDynamicPenalty(order.maxFee, uint64(block.number - startBlock)); // Execute the fast order, the highest bidder should receive some of their security deposit // (less penalties). @@ -903,7 +898,7 @@ contract MatchingEngineTest is Test { } function testCannotExecuteFastOrderAuctionNotActive() public { - uint128 amountIn = _getMinTransferAmount() + 69; + uint64 amountIn = _getMinTransferAmount() + 69; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -922,7 +917,7 @@ contract MatchingEngineTest is Test { } function testCannotExecuteFastOrderAuctionPeriodNotComplete() public { - uint128 amountIn = _getMinTransferAmount() + 69; + uint64 amountIn = _getMinTransferAmount() + 69; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -937,7 +932,7 @@ contract MatchingEngineTest is Test { } function testCannotExecuteFastOrderAuctionInvalidWormholeMessage() public { - uint128 amountIn = _getMinTransferAmount() + 69; + uint64 amountIn = _getMinTransferAmount() + 69; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -957,8 +952,8 @@ contract MatchingEngineTest is Test { * SLOW ORDER TESTS */ - function testExecuteSlowOrderAndRedeem(uint128 amountIn, uint128 newBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testExecuteSlowOrderAndRedeem(uint64 amountIn, uint64 newBid) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -966,7 +961,7 @@ contract MatchingEngineTest is Test { // Start the auction and make some bids. _placeInitialBid(order, fastMessage, order.maxFee, PLAYER_ONE); _improveBid( - order, fastMessage, uint128(bound(newBid, 0, order.maxFee)), PLAYER_ONE, PLAYER_TWO + order, fastMessage, uint64(bound(newBid, 0, order.maxFee)), PLAYER_ONE, PLAYER_TWO ); IWormhole.VM memory vaa = wormhole.parseVM(fastMessage); @@ -993,8 +988,8 @@ contract MatchingEngineTest is Test { assertEq(IERC20(USDC_ADDRESS).balanceOf(PLAYER_TWO) - balanceBefore, order.amountIn); } - function testExecuteSlowOrderAndRedeemAuctionNotStarted(uint128 amountIn) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testExecuteSlowOrderAndRedeemAuctionNotStarted(uint64 amountIn) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -1034,21 +1029,21 @@ contract MatchingEngineTest is Test { assertEq(uint8(engine.getAuctionStatus(auctionId)), uint8(AuctionStatus.Completed)); } - function testExecuteSlowOrderAndRedeemAuctionStillActive(uint128 amountIn, uint128 newBid) + function testExecuteSlowOrderAndRedeemAuctionStillActive(uint64 amountIn, uint64 newBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); // Cache security deposit for later use. - uint128 securityDeposit = order.maxFee; + uint64 securityDeposit = order.maxFee; // Start the auction and make some bids. _placeInitialBid(order, fastMessage, order.maxFee, PLAYER_ONE); _improveBid( - order, fastMessage, uint128(bound(newBid, 0, order.maxFee)), PLAYER_ONE, PLAYER_TWO + order, fastMessage, uint64(bound(newBid, 0, order.maxFee)), PLAYER_ONE, PLAYER_TWO ); IWormhole.VM memory vaa = wormhole.parseVM(fastMessage); @@ -1081,10 +1076,10 @@ contract MatchingEngineTest is Test { } function testExecuteSlowOrderAndRedeemAuctionStillActiveWithPenalty( - uint128 amountIn, + uint64 amountIn, uint8 penaltyBlocks ) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -1093,7 +1088,7 @@ contract MatchingEngineTest is Test { uint256 securityDeposit = order.maxFee; // Place initial bid for the max fee with player one. - uint128 bidPrice = order.maxFee - 1; + uint64 bidPrice = order.maxFee - 1; _placeInitialBid(order, fastMessage, bidPrice, PLAYER_ONE); IWormhole.VM memory vaa = wormhole.parseVM(fastMessage); @@ -1102,12 +1097,12 @@ contract MatchingEngineTest is Test { // Warp the block into the penalty period. penaltyBlocks = uint8(bound(penaltyBlocks, 1, engine.getAuctionPenaltyBlocks() + 1)); - uint128 startBlock = engine.liveAuctionInfo(auctionId).startBlock; + uint64 startBlock = engine.liveAuctionInfo(auctionId).startBlock; vm.roll(startBlock + engine.getAuctionGracePeriod() + penaltyBlocks); // Calculate the expected penalty and reward. - (uint128 expectedPenalty, uint128 expectedReward) = - engine.calculateDynamicPenalty(order.maxFee, uint128(block.number - startBlock)); + (uint64 expectedPenalty, uint64 expectedReward) = + engine.calculateDynamicPenalty(order.maxFee, uint64(block.number - startBlock)); CctpMessage memory params = _craftWormholeCctpRedeemParams( engine, @@ -1136,7 +1131,7 @@ contract MatchingEngineTest is Test { } function testCannotExecuteSlowOrderAndRedeemInvalidSourceRouterNoAuction() public { - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; uint64 fastSequence = 69; Messages.FastMarketOrder memory order = Messages.FastMarketOrder({ @@ -1174,16 +1169,15 @@ contract MatchingEngineTest is Test { engine.executeSlowOrderAndRedeem(fastMessage, params); } - function testCannotExecuteSlowOrderAndRedeemWithRolledBackVaa(uint128 amountIn) public { + function testCannotExecuteSlowOrderAndRedeemWithRolledBackVaa(uint64 amountIn) public { uint32 timestampOne = 69; - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); // Create two fast orders with the same sequence, but different timestamps to simulate // a rolled back VAA. The fast message that doesn't have a specified timestamp arg // will use the default 1234567, which is also assigned to the slow VAA. - (, bytes memory rolledBackMessage) = _getFastMarketOrder( - amountIn, ETH_CHAIN, ETH_DOMAIN, 0, timestampOne - ); + (, bytes memory rolledBackMessage) = + _getFastMarketOrder(amountIn, ETH_CHAIN, ETH_DOMAIN, 0, timestampOne); (Messages.FastMarketOrder memory order,) = _getFastMarketOrder(amountIn, 0); // Start the auction and make some bids. @@ -1210,7 +1204,7 @@ contract MatchingEngineTest is Test { } function testCannotExecuteSlowOrderAndRedeemInvalidTargetRouter() public { - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; uint16 invalidTargetChain = 69; uint64 fastSequence = 69; @@ -1245,7 +1239,7 @@ contract MatchingEngineTest is Test { function testCannotExecuteSlowOrderAndRedeemVaaMismatchCompletedAuction() public { uint64 fastSequence = 69; - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -1257,7 +1251,10 @@ contract MatchingEngineTest is Test { // NOTE: Create slow VAA with a different sequence number. CctpMessage memory params = _craftWormholeCctpRedeemParams( - engine, amountIn, order.encode(), fastSequence - 2 // Subtract 2 to make it invalid. + engine, + amountIn, + order.encode(), + fastSequence - 2 // Subtract 2 to make it invalid. ); vm.expectRevert(abi.encodeWithSignature("ErrVaaMismatch()")); @@ -1266,7 +1263,7 @@ contract MatchingEngineTest is Test { function testCannotExecuteSlowOrderAndRedeemVaaMismatchActiveAuction() public { uint64 fastSequence = 69; - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); @@ -1278,7 +1275,10 @@ contract MatchingEngineTest is Test { // NOTE: Create slow VAA with a different sequence number. CctpMessage memory params = _craftWormholeCctpRedeemParams( - engine, amountIn, order.encode(), fastSequence - 2 // Subtract 2 to make it invalid. + engine, + amountIn, + order.encode(), + fastSequence - 2 // Subtract 2 to make it invalid. ); vm.expectRevert(abi.encodeWithSignature("ErrVaaMismatch()")); @@ -1287,14 +1287,17 @@ contract MatchingEngineTest is Test { function testCannotExecuteSlowOrderAndRedeemVaaMismatchAuctionNotStarted() public { uint64 fastSequence = 69; - uint128 amountIn = _getMinTransferAmount() + 6900; + uint64 amountIn = _getMinTransferAmount() + 6900; (Messages.FastMarketOrder memory order, bytes memory fastMessage) = _getFastMarketOrder(amountIn); // NOTE: Create slow VAA with a different sequence number. CctpMessage memory params = _craftWormholeCctpRedeemParams( - engine, amountIn, order.encode(), fastSequence - 2 // Subtract 2 to make it invalid. + engine, + amountIn, + order.encode(), + fastSequence - 2 // Subtract 2 to make it invalid. ); vm.expectRevert(abi.encodeWithSignature("ErrVaaMismatch()")); @@ -1305,8 +1308,8 @@ contract MatchingEngineTest is Test { * FAST FILL TESTS */ - function testRedeemFastFill(uint128 amountIn, uint128 newBid) public { - amountIn = uint128(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); + function testRedeemFastFill(uint64 amountIn, uint64 newBid) public { + amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); // Deploy the avax token router and register it. ITokenRouter avaxRouter = _deployAndRegisterAvaxRouter(); @@ -1317,7 +1320,7 @@ contract MatchingEngineTest is Test { // Start the auction and make some bids. _placeInitialBid(order, fastMessage, order.maxFee, PLAYER_ONE); _improveBid( - order, fastMessage, uint128(bound(newBid, 0, order.maxFee)), PLAYER_ONE, PLAYER_TWO + order, fastMessage, uint64(bound(newBid, 0, order.maxFee)), PLAYER_ONE, PLAYER_TWO ); bytes32 auctionId = wormhole.parseVM(fastMessage).hash; @@ -1352,7 +1355,7 @@ contract MatchingEngineTest is Test { } function testCannotRedeemFastFillInvalidEmitterChain() public { - uint128 amountIn = _getMinTransferAmount() + 69; + uint64 amountIn = _getMinTransferAmount() + 69; uint16 invalidEmitterChain = 69; // Deploy the avax token router and register it. @@ -1380,7 +1383,7 @@ contract MatchingEngineTest is Test { } function testCannotRedeemFastFillInvalidEmitterAddress() public { - uint128 amountIn = _getMinTransferAmount() + 69; + uint64 amountIn = _getMinTransferAmount() + 69; address invalidEmitterAddress = makeAddr("invalidEmitter"); // Deploy the avax token router and register it. @@ -1408,7 +1411,7 @@ contract MatchingEngineTest is Test { } function testCannotRedeemFastFillInvalidSourceRouter() public { - uint128 amountIn = _getMinTransferAmount() + 69; + uint64 amountIn = _getMinTransferAmount() + 69; address invalidRouter = makeAddr("invalidRouter"); // Deploy the avax token router and register it. @@ -1442,7 +1445,7 @@ contract MatchingEngineTest is Test { } function testCannotRedeemFastFillAgain() public { - uint128 amountIn = _getMinTransferAmount() + 69; + uint64 amountIn = _getMinTransferAmount() + 69; // Deploy the avax token router and register it. ITokenRouter avaxRouter = _deployAndRegisterAvaxRouter(); @@ -1471,7 +1474,7 @@ contract MatchingEngineTest is Test { } function testCannotRedeemFastFillInvalidRedeemer() public { - uint128 amountIn = _getMinTransferAmount() + 69420; + uint64 amountIn = _getMinTransferAmount() + 69420; address invalidRedeemer = makeAddr("invalidRedeemer"); // Deploy the avax token router and register it. @@ -1537,7 +1540,7 @@ contract MatchingEngineTest is Test { function _placeInitialBid( Messages.FastMarketOrder memory order, bytes memory fastMessage, - uint128 feeBid, + uint64 feeBid, address bidder ) internal { _dealAndApproveUsdc(engine, order.amountIn + order.maxFee, bidder); @@ -1561,7 +1564,7 @@ contract MatchingEngineTest is Test { function _improveBid( Messages.FastMarketOrder memory order, bytes memory fastMessage, - uint128 newBid, + uint64 newBid, address initialBidder, address newBidder ) internal { @@ -1653,7 +1656,7 @@ contract MatchingEngineTest is Test { function _verifyAuctionState( Messages.FastMarketOrder memory order, - uint128 feeBid, + uint64 feeBid, address currentBidder, address initialBidder, bytes32 vmHash @@ -1670,7 +1673,7 @@ contract MatchingEngineTest is Test { function _verifyOutboundCctpTransfer( Messages.FastMarketOrder memory order, - uint128 transferAmount, + uint64 transferAmount, IWormhole.VM memory cctpMessage, address caller ) internal { @@ -1705,7 +1708,7 @@ contract MatchingEngineTest is Test { assertEq(mintRecipient, ETH_ROUTER); } - function _getFastMarketOrder(uint128 amountIn) + function _getFastMarketOrder(uint64 amountIn) internal view returns (Messages.FastMarketOrder memory order, bytes memory fastMessage) @@ -1713,7 +1716,7 @@ contract MatchingEngineTest is Test { return _getFastMarketOrder(amountIn, ETH_CHAIN, ETH_DOMAIN, 0); } - function _getFastMarketOrder(uint128 amountIn, uint32 deadline) + function _getFastMarketOrder(uint64 amountIn, uint32 deadline) internal view returns (Messages.FastMarketOrder memory order, bytes memory fastMessage) @@ -1722,18 +1725,16 @@ contract MatchingEngineTest is Test { } function _getFastMarketOrder( - uint128 amountIn, + uint64 amountIn, uint16 targetChain, uint32 targetDomain, uint32 deadline ) internal view returns (Messages.FastMarketOrder memory order, bytes memory fastMessage) { - return _getFastMarketOrder( - amountIn, targetChain, targetDomain, deadline, 1234567 - ); + return _getFastMarketOrder(amountIn, targetChain, targetDomain, deadline, 1234567); } function _getFastMarketOrder( - uint128 amountIn, + uint64 amountIn, uint16 targetChain, uint32 targetDomain, uint32 deadline, @@ -1757,23 +1758,24 @@ contract MatchingEngineTest is Test { uint64 sequence = 69; // Generate the fast message vaa using the information from the fast order. - fastMessage = _createSignedVaa(ARB_CHAIN, ARB_ROUTER, sequence, vaaTimestamp, order.encode()); + fastMessage = + _createSignedVaa(ARB_CHAIN, ARB_ROUTER, sequence, vaaTimestamp, order.encode()); } - function _getMinTransferAmount() internal pure returns (uint128) { + function _getMinTransferAmount() internal pure returns (uint64) { return FAST_TRANSFER_BASE_FEE + FAST_TRANSFER_INIT_AUCTION_FEE + 1; } - function _getMaxTransferAmount() internal pure returns (uint128) { + function _getMaxTransferAmount() internal pure returns (uint64) { return FAST_TRANSFER_MAX_AMOUNT; } - function _calculateFastTransferFee(uint128 amount) internal view returns (uint128) { + function _calculateFastTransferFee(uint64 amount) internal view returns (uint64) { if (amount < FAST_TRANSFER_BASE_FEE + FAST_TRANSFER_INIT_AUCTION_FEE) { revert(); } - uint128 transferFee = uint128( + uint64 transferFee = uint64( (amount - FAST_TRANSFER_BASE_FEE - FAST_TRANSFER_INIT_AUCTION_FEE) * TEST_TRANSFER_FEE_IN_BPS / engine.maxBpsFee() ); diff --git a/evm/forge/tests/TokenRouter.t.sol b/evm/forge/tests/TokenRouter.t.sol index 5f7ad961..edffa60f 100644 --- a/evm/forge/tests/TokenRouter.t.sol +++ b/evm/forge/tests/TokenRouter.t.sol @@ -58,9 +58,9 @@ contract TokenRouterTest is Test { uint256 immutable TESTING_SIGNER = uint256(vm.envBytes32("TESTING_DEVNET_GUARDIAN")); // Fast transfer parameters. - uint128 immutable FAST_TRANSFER_MAX_AMOUNT = 500000e6; // 500,000 USDC. - uint128 immutable FAST_TRANSFER_BASE_FEE = 1e6; // 1 USDC. - uint128 immutable FAST_TRANSFER_INIT_AUCTION_FEE = 1e6; // 1 USDC. + uint64 immutable FAST_TRANSFER_MAX_AMOUNT = 500000e6; // 500,000 USDC. + uint64 immutable FAST_TRANSFER_BASE_FEE = 1e6; // 1 USDC. + uint64 immutable FAST_TRANSFER_INIT_AUCTION_FEE = 1e6; // 1 USDC. // Matching engine (Ethereum). uint16 immutable matchingEngineChain = 2; @@ -539,15 +539,15 @@ contract TokenRouterTest is Test { } function testEncodeAndDecodeFastMarketOrder( - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, uint32 targetDomain, bytes32 redeemer, bytes32 sender, bytes32 refundAddress, - uint128 maxFee, - uint128 initAuctionFee, + uint64 maxFee, + uint64 initAuctionFee, uint32 deadline, bytes memory redeemerMessage ) public { @@ -587,7 +587,7 @@ contract TokenRouterTest is Test { */ function testCannotPlaceMarketOrderErrInsufficientAmount() public { - vm.expectRevert(abi.encodeWithSignature("ErrInsufficientAmount(uint128,uint128)", 0, 0)); + vm.expectRevert(abi.encodeWithSignature("ErrInsufficientAmount(uint64,uint64)", 0, 0)); router.placeMarketOrder( 0, // Zero amount - amountIn. 0, // minAmountOut @@ -623,7 +623,7 @@ contract TokenRouterTest is Test { } function testCannotPlaceMarketOrderErrUnsupportedChain() public { - uint128 amountIn = 69; + uint64 amountIn = 69; uint16 targetChain = 2; vm.expectRevert(abi.encodeWithSelector(ErrUnsupportedChain.selector, targetChain)); @@ -637,8 +637,8 @@ contract TokenRouterTest is Test { ); } - function testPlaceMarketOrder(uint128 amountIn) public { - amountIn = uint128(bound(amountIn, 1, _cctpBurnLimit())); + function testPlaceMarketOrder(uint64 amountIn) public { + amountIn = uint64(bound(amountIn, 1, _cctpBurnLimit())); _dealAndApproveUsdc(router, amountIn); @@ -671,8 +671,8 @@ contract TokenRouterTest is Test { assertEq(payload, expectedFill.encode()); } - function testPlaceMarketOrderWithCctpInterface(uint128 amountIn) public { - amountIn = uint128(bound(amountIn, 1, _cctpBurnLimit())); + function testPlaceMarketOrderWithCctpInterface(uint64 amountIn) public { + amountIn = uint64(bound(amountIn, 1, _cctpBurnLimit())); bytes memory message = bytes("All your base are belong to us"); _dealAndApproveUsdc(router, amountIn); @@ -709,7 +709,7 @@ contract TokenRouterTest is Test { function testCannotPlaceFastMarketOrderErrInvalidRefundAddress() public { bytes memory encodedSignature = abi.encodeWithSignature( - "placeFastMarketOrder(uint128,uint128,uint16,bytes32,bytes,address,uint128,uint32)", + "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)", router.getMinTransferAmount(), // amountIn. 0, // minAmountOut ARB_CHAIN, // targetChain @@ -727,11 +727,11 @@ contract TokenRouterTest is Test { } function testCannotPlaceFastMarketOrderErrInsufficientAmount() public { - uint128 amountIn = router.getMinFee(); - uint128 maxFee = router.getMinFee(); + uint64 amountIn = router.getMinFee(); + uint64 maxFee = router.getMinFee(); vm.expectRevert( - abi.encodeWithSignature("ErrInsufficientAmount(uint128,uint128)", amountIn, maxFee) + abi.encodeWithSignature("ErrInsufficientAmount(uint64,uint64)", amountIn, maxFee) ); router.placeFastMarketOrder( amountIn, @@ -746,9 +746,9 @@ contract TokenRouterTest is Test { } function testCannotPlaceFastMarketOrderErrInvalidMaxFee() public { - uint128 maxFee = router.getMinFee() - 1; + uint64 maxFee = router.getMinFee() - 1; vm.expectRevert( - abi.encodeWithSignature("ErrInvalidMaxFee(uint128,uint128)", maxFee, router.getMinFee()) + abi.encodeWithSignature("ErrInvalidMaxFee(uint64,uint64)", maxFee, router.getMinFee()) ); router.placeFastMarketOrder( 6900000, // amountIn. @@ -764,7 +764,7 @@ contract TokenRouterTest is Test { function testCannotPlaceFastMarketOrderErrInvalidRedeemerAddress() public { bytes memory encodedSignature = abi.encodeWithSignature( - "placeFastMarketOrder(uint128,uint128,uint16,bytes32,bytes,address,uint128,uint32)", + "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)", router.getMinTransferAmount(), // amountIn. 0, // minAmountOut ARB_CHAIN, // targetChain @@ -785,7 +785,7 @@ contract TokenRouterTest is Test { uint16 unsupportedChain = 2; bytes memory encodedSignature = abi.encodeWithSignature( - "placeFastMarketOrder(uint128,uint128,uint16,bytes32,bytes,address,uint128,uint32)", + "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)", router.getMinTransferAmount(), 0, // minAmountOut unsupportedChain, // targetChain @@ -807,7 +807,7 @@ contract TokenRouterTest is Test { router.enableFastTransfers(false); bytes memory encodedSignature = abi.encodeWithSignature( - "placeFastMarketOrder(uint128,uint128,uint16,bytes32,bytes,address,uint128,uint32)", + "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)", router.getMinTransferAmount(), 0, // minAmountOut ARB_CHAIN, // targetChain @@ -826,7 +826,7 @@ contract TokenRouterTest is Test { function testCannotPlaceFastMarketOrderErrAmountTooLarge() public { bytes memory encodedSignature = abi.encodeWithSignature( - "placeFastMarketOrder(uint128,uint128,uint16,bytes32,bytes,address,uint128,uint32)", + "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)", router.getMaxTransferAmount() + 1, 0, // minAmountOut ARB_CHAIN, // targetChain @@ -850,7 +850,7 @@ contract TokenRouterTest is Test { router.setPause(true); bytes memory encodedSignature = abi.encodeWithSignature( - "placeFastMarketOrder(uint128,uint128,uint16,bytes32,bytes,address,uint128,uint32)", + "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)", router.getMinTransferAmount(), 0, // minAmountOut ARB_CHAIN, // targetChain @@ -863,11 +863,11 @@ contract TokenRouterTest is Test { expectRevert(address(router), encodedSignature, abi.encodeWithSignature("ContractPaused()")); } - function testPlaceFastMarketOrder(uint128 amountIn, uint128 maxFee, uint32 deadline) public { - amountIn = uint128( + function testPlaceFastMarketOrder(uint64 amountIn, uint64 maxFee, uint32 deadline) public { + amountIn = uint64( bound(amountIn, router.getMinTransferAmount() + 1, router.getMaxTransferAmount()) ); - maxFee = uint128(bound(maxFee, router.getMinFee(), amountIn - 1)); + maxFee = uint64(bound(maxFee, router.getMinFee(), amountIn - 1)); _dealAndApproveUsdc(router, amountIn); @@ -916,14 +916,14 @@ contract TokenRouterTest is Test { } function testPlaceFastMarketOrderWithCctpInterface( - uint128 amountIn, - uint128 maxFee, + uint64 amountIn, + uint64 maxFee, uint32 deadline ) public { - amountIn = uint128( + amountIn = uint64( bound(amountIn, router.getMinTransferAmount() + 1, router.getMaxTransferAmount()) ); - maxFee = uint128(bound(maxFee, router.getMinFee(), amountIn - 1)); + maxFee = uint64(bound(maxFee, router.getMinFee(), amountIn - 1)); _dealAndApproveUsdc(router, amountIn); @@ -980,14 +980,14 @@ contract TokenRouterTest is Test { } function testPlaceFastMarketOrderTargetIsMatchingEngine( - uint128 amountIn, - uint128 maxFee, + uint64 amountIn, + uint64 maxFee, uint32 deadline ) public { - amountIn = uint128( + amountIn = uint64( bound(amountIn, router.getMinTransferAmount() + 1, router.getMaxTransferAmount()) ); - maxFee = uint128(bound(maxFee, router.getMinFee(), amountIn - 1)); + maxFee = uint64(bound(maxFee, router.getMinFee(), amountIn - 1)); _dealAndApproveUsdc(router, amountIn); @@ -1111,8 +1111,8 @@ contract TokenRouterTest is Test { ); } - function testRedeemFill(uint128 amount) public { - amount = uint128(bound(amount, 1, _cctpMintLimit())); + function testRedeemFill(uint64 amount) public { + amount = uint64(bound(amount, 1, _cctpMintLimit())); RedeemedFill memory expectedRedeemed = RedeemedFill({ sender: TEST_REDEEMER, @@ -1129,7 +1129,7 @@ contract TokenRouterTest is Test { * TEST HELPERS */ - function _dealAndApproveUsdc(ITokenRouter _router, uint128 amount) internal { + function _dealAndApproveUsdc(ITokenRouter _router, uint64 amount) internal { mintUSDC(amount, address(this)); IERC20(USDC_ADDRESS).approve(address(_router), amount); } @@ -1151,7 +1151,7 @@ contract TokenRouterTest is Test { function _placeMarketOrder( ITokenRouter _router, - uint128 amountIn, + uint64 amountIn, uint16 targetChain, Messages.Fill memory expectedFill ) internal returns (IWormhole.VM memory) { @@ -1168,8 +1168,8 @@ contract TokenRouterTest is Test { function _placeMarketOrder( ITokenRouter _router, - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, bytes32 redeemer, bytes memory redeemerMessage, @@ -1200,7 +1200,7 @@ contract TokenRouterTest is Test { function _placeCctpMarketOrder( ITokenRouter _router, - uint128 amountIn, + uint64 amountIn, uint16 targetChain, bytes32 redeemer, bytes memory redeemerMessage @@ -1229,7 +1229,7 @@ contract TokenRouterTest is Test { function _placeFastMarketOrder( ITokenRouter _router, Messages.FastMarketOrder memory expectedOrder, - uint128 maxFee + uint64 maxFee ) internal returns (IWormhole.VM memory slowMessage, IWormhole.VM memory fastMessage) { // Grab balance. uint256 balanceBefore = _router.orderToken().balanceOf(address(this)); @@ -1269,11 +1269,11 @@ contract TokenRouterTest is Test { function _placeCctpFastMarketOrder( ITokenRouter _router, - uint128 amountIn, + uint64 amountIn, uint16 targetChain, bytes32 redeemer, bytes memory redeemerMessage, - uint128 maxFee, + uint64 maxFee, uint32 deadline ) internal returns (IWormhole.VM memory slowMessage, IWormhole.VM memory fastMessage) { // Grab balance. diff --git a/evm/src/MatchingEngine/assets/Errors.sol b/evm/src/MatchingEngine/assets/Errors.sol index 9744208c..426745e8 100644 --- a/evm/src/MatchingEngine/assets/Errors.sol +++ b/evm/src/MatchingEngine/assets/Errors.sol @@ -12,7 +12,7 @@ error ErrInvalidTargetRouter(uint16 chain); error ErrInvalidSourceRouter(bytes32 sender, bytes32 expected); -error ErrBidPriceTooHigh(uint128 bidPrice, uint128 maxPrice); +error ErrBidPriceTooHigh(uint64 bidPrice, uint64 maxPrice); error ErrAuctionPeriodExpired(); diff --git a/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol index 32f861ef..d03cb249 100644 --- a/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol +++ b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol @@ -30,12 +30,12 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { using Messages for *; event AuctionStarted( - bytes32 indexed auctionId, uint128 transferAmount, uint128 startingBid, address bidder + bytes32 indexed auctionId, uint64 transferAmount, uint64 startingBid, address bidder ); - event NewBid(bytes32 indexed auctionId, uint128 newBid, uint128 oldBid, address bidder); + event NewBid(bytes32 indexed auctionId, uint64 newBid, uint64 oldBid, address bidder); /// @inheritdoc IMatchingEngineFastOrders - function placeInitialBid(bytes calldata fastTransferVaa, uint128 feeBid) external { + function placeInitialBid(bytes calldata fastTransferVaa, uint64 feeBid) external { IWormhole.VM memory vaa = _verifyWormholeMessage(fastTransferVaa); Messages.FastMarketOrder memory order = vaa.payload.decodeFastMarketOrder(); @@ -76,7 +76,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { // Set the live auction data. auction.status = AuctionStatus.Active; - auction.startBlock = uint128(block.number); + auction.startBlock = uint64(block.number); auction.highestBidder = msg.sender; auction.initialBidder = msg.sender; auction.amount = order.amountIn; @@ -87,7 +87,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { } /// @inheritdoc IMatchingEngineFastOrders - function improveBid(bytes32 auctionId, uint128 feeBid) public { + function improveBid(bytes32 auctionId, uint64 feeBid) public { // Fetch auction information, if it exists. LiveAuctionData storage auction = getLiveAuctionInfo().auctions[auctionId]; @@ -108,7 +108,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { revert ErrAuctionNotActive(vaa.hash); } - uint128 blocksElapsed = uint128(block.number) - auction.startBlock; + uint64 blocksElapsed = uint64(block.number) - auction.startBlock; if (blocksElapsed <= _auctionDuration) { revert ErrAuctionPeriodNotComplete(); } @@ -116,7 +116,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { Messages.FastMarketOrder memory order = vaa.payload.decodeFastMarketOrder(); if (blocksElapsed > _auctionGracePeriod) { - (uint128 penalty, uint128 userReward) = + (uint64 penalty, uint64 userReward) = calculateDynamicPenalty(auction.securityDeposit, blocksElapsed); /** @@ -174,14 +174,15 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { // Confirm that the fast transfer VAA is associated with the slow transfer VAA. if ( - vaa.emitterChainId != cctpVaa.emitterChainId || vaa.emitterAddress != cctpVaa.emitterAddress - || vaa.sequence != cctpVaa.sequence + 1 || vaa.timestamp != cctpVaa.timestamp + vaa.emitterChainId != cctpVaa.emitterChainId + || vaa.emitterAddress != cctpVaa.emitterAddress || vaa.sequence != cctpVaa.sequence + 1 + || vaa.timestamp != cctpVaa.timestamp ) { revert ErrVaaMismatch(); } // Parse the `maxFee` from the slow VAA. - uint128 baseFee = payload.decodeSlowOrderResponse().baseFee; + uint64 baseFee = payload.decodeSlowOrderResponse().baseFee; LiveAuctionData storage auction = getLiveAuctionInfo().auctions[vaa.hash]; @@ -213,8 +214,8 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { * obligation. The `penalty` CAN be zero in this case, since the auction * grace period might not have ended yet. */ - (uint128 penalty, uint128 userReward) = calculateDynamicPenalty( - auction.securityDeposit, uint128(block.number) - auction.startBlock + (uint64 penalty, uint64 userReward) = calculateDynamicPenalty( + auction.securityDeposit, uint64(block.number) - auction.startBlock ); // Transfer the penalty amount to the caller. The caller also earns the base @@ -247,7 +248,8 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { { IWormhole.VM memory vaa = _verifyWormholeMessage(fastFillVaa); if ( - vaa.emitterChainId != _chainId || vaa.emitterAddress != address(this).toUniversalAddress() + vaa.emitterChainId != _chainId + || vaa.emitterAddress != address(this).toUniversalAddress() ) { revert ErrInvalidEmitterForFastFill(); } @@ -275,7 +277,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { // ------------------------------- Private --------------------------------- function _handleCctpTransfer( - uint128 amount, + uint64 amount, uint16 sourceChain, Messages.FastMarketOrder memory order ) private returns (uint64 sequence) { @@ -316,7 +318,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { } } - function _improveBid(bytes32 auctionId, LiveAuctionData storage auction, uint128 feeBid) + function _improveBid(bytes32 auctionId, LiveAuctionData storage auction, uint64 feeBid) private { /** @@ -328,7 +330,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { if (auction.status != AuctionStatus.Active) { revert ErrAuctionNotActive(auctionId); } - if (uint128(block.number) - auction.startBlock > getAuctionDuration()) { + if (uint64(block.number) - auction.startBlock > getAuctionDuration()) { revert ErrAuctionPeriodExpired(); } if (feeBid >= auction.bidPrice) { @@ -368,7 +370,8 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { view returns (IWormhole.VM memory) { - (IWormhole.VM memory vaa, bool valid, string memory reason) = _wormhole.parseAndVerifyVM(_vaa); + (IWormhole.VM memory vaa, bool valid, string memory reason) = + _wormhole.parseAndVerifyVM(_vaa); if (!valid) { revert ErrInvalidWormholeMessage(reason); diff --git a/evm/src/MatchingEngine/assets/State.sol b/evm/src/MatchingEngine/assets/State.sol index 59eea6bc..1053ad5b 100644 --- a/evm/src/MatchingEngine/assets/State.sol +++ b/evm/src/MatchingEngine/assets/State.sol @@ -84,33 +84,33 @@ abstract contract State is IMatchingEngineState, WormholeCctpTokenMessenger { function calculateDynamicPenalty(bytes32 auctionId) external view - returns (uint128 penalty, uint128 userReward) + returns (uint64 penalty, uint64 userReward) { LiveAuctionData memory auction = getLiveAuctionInfo().auctions[auctionId]; return calculateDynamicPenalty( - auction.securityDeposit, uint128(block.number) - auction.startBlock + auction.securityDeposit, uint64(block.number) - auction.startBlock ); } /// @inheritdoc IMatchingEngineState - function calculateDynamicPenalty(uint128 amount, uint128 blocksElapsed) + function calculateDynamicPenalty(uint64 amount, uint64 blocksElapsed) public view - returns (uint128, uint128) + returns (uint64, uint64) { if (blocksElapsed <= _auctionGracePeriod) { return (0, 0); } - uint128 penaltyPeriod = blocksElapsed - _auctionGracePeriod; + uint64 penaltyPeriod = blocksElapsed - _auctionGracePeriod; if (penaltyPeriod >= _auctionPenaltyBlocks || _initialPenaltyBps == MAX_BPS_FEE) { - uint128 userReward = amount * _userPenaltyRewardBps / MAX_BPS_FEE; + uint64 userReward = amount * _userPenaltyRewardBps / MAX_BPS_FEE; return (amount - userReward, userReward); } else { - uint128 basePenalty = amount * _initialPenaltyBps / MAX_BPS_FEE; - uint128 penalty = + uint64 basePenalty = amount * _initialPenaltyBps / MAX_BPS_FEE; + uint64 penalty = basePenalty + ((amount - basePenalty) * penaltyPeriod / _auctionPenaltyBlocks); - uint128 userReward = penalty * _userPenaltyRewardBps / MAX_BPS_FEE; + uint64 userReward = penalty * _userPenaltyRewardBps / MAX_BPS_FEE; return (penalty - userReward, userReward); } @@ -175,8 +175,8 @@ abstract contract State is IMatchingEngineState, WormholeCctpTokenMessenger { } /// @inheritdoc IMatchingEngineState - function getAuctionBlocksElapsed(bytes32 auctionId) public view returns (uint128) { - return uint128(block.number) - getLiveAuctionInfo().auctions[auctionId].startBlock; + function getAuctionBlocksElapsed(bytes32 auctionId) public view returns (uint64) { + return uint64(block.number) - getLiveAuctionInfo().auctions[auctionId].startBlock; } /// @inheritdoc IMatchingEngineState @@ -195,12 +195,12 @@ abstract contract State is IMatchingEngineState, WormholeCctpTokenMessenger { } /// @inheritdoc IMatchingEngineState - function getAuctionAmount(bytes32 auctionId) public view returns (uint128) { + function getAuctionAmount(bytes32 auctionId) public view returns (uint64) { return getLiveAuctionInfo().auctions[auctionId].amount; } /// @inheritdoc IMatchingEngineState - function getSecurityDeposit(bytes32 auctionId) public view returns (uint128) { + function getSecurityDeposit(bytes32 auctionId) public view returns (uint64) { return getLiveAuctionInfo().auctions[auctionId].securityDeposit; } diff --git a/evm/src/TokenRouter/assets/Errors.sol b/evm/src/TokenRouter/assets/Errors.sol index fd47eec3..55a2a728 100644 --- a/evm/src/TokenRouter/assets/Errors.sol +++ b/evm/src/TokenRouter/assets/Errors.sol @@ -20,11 +20,11 @@ error ErrInvalidMatchingEngineSender(bytes32 sender, bytes32 expected); error ErrInvalidChain(uint16 chain); -error ErrInsufficientAmount(uint128 amount, uint128 minAmount); +error ErrInsufficientAmount(uint64 amount, uint64 minAmount); error ErrInsufficientFastTransferFee(); -error ErrAmountTooLarge(uint128 amountIn, uint128 maxAmount); +error ErrAmountTooLarge(uint64 amountIn, uint64 maxAmount); error ErrFastTransferFeeUnset(); @@ -38,4 +38,4 @@ error ErrInvalidFeeOverride(); error ErrFastTransferDisabled(); -error ErrInvalidMaxFee(uint128 maxFee, uint128 minimumReuiredFee); +error ErrInvalidMaxFee(uint64 maxFee, uint64 minimumReuiredFee); diff --git a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol index 91b85ff2..0ab627fe 100644 --- a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol +++ b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol @@ -24,8 +24,8 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { /// @inheritdoc IPlaceMarketOrder function placeMarketOrder( - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, @@ -41,7 +41,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { /// @inheritdoc IPlaceMarketOrder function placeMarketOrder( - uint128 amountIn, + uint64 amountIn, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage @@ -51,13 +51,13 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { /// @inheritdoc IPlaceMarketOrder function placeFastMarketOrder( - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, address refundAddress, - uint128 maxFee, + uint64 maxFee, uint32 deadline ) external payable notPaused returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce) { if (refundAddress == address(0)) { @@ -77,11 +77,11 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { /// @inheritdoc IPlaceMarketOrder function placeFastMarketOrder( - uint128 amountIn, + uint64 amountIn, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, - uint128 maxFee, + uint64 maxFee, uint32 deadline ) external payable notPaused returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce) { return _handleFastOrder( @@ -92,8 +92,8 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { // ---------------------------------------- private ------------------------------------------- function _handleOrder( - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, @@ -125,13 +125,13 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { } function _handleFastOrder( - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, address refundAddress, - uint128 maxFee, + uint64 maxFee, uint32 deadline ) private returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce) { // The Matching Engine chain is a fast finality chain already, @@ -152,7 +152,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { if (amountIn <= maxFee) { revert ErrInsufficientAmount(amountIn, maxFee); } - uint128 minimumRequiredFee = fastParams.baseFee + fastParams.initAuctionFee + 1; + uint64 minimumRequiredFee = fastParams.baseFee + fastParams.initAuctionFee + 1; if (maxFee < minimumRequiredFee) { revert ErrInvalidMaxFee(maxFee, minimumRequiredFee); } diff --git a/evm/src/TokenRouter/assets/State.sol b/evm/src/TokenRouter/assets/State.sol index e44e1024..0c1fca87 100644 --- a/evm/src/TokenRouter/assets/State.sol +++ b/evm/src/TokenRouter/assets/State.sol @@ -91,28 +91,28 @@ abstract contract State is ITokenRouterState, WormholeCctpTokenMessenger { } /// @inheritdoc ITokenRouterState - function getInitialAuctionFee() external view returns (uint128) { + function getInitialAuctionFee() external view returns (uint64) { return getFastTransferParametersState().initAuctionFee; } /// @inheritdoc ITokenRouterState - function getBaseFee() external view returns (uint128) { + function getBaseFee() external view returns (uint64) { return getFastTransferParametersState().baseFee; } /// @inheritdoc ITokenRouterState - function getMinFee() public pure returns (uint128) { + function getMinFee() public pure returns (uint64) { FastTransferParameters memory params = getFastTransferParametersState(); return params.baseFee + params.initAuctionFee + 1; } /// @inheritdoc ITokenRouterState - function getMinTransferAmount() external pure returns (uint128) { + function getMinTransferAmount() external pure returns (uint64) { return getMinFee() + 1; } /// @inheritdoc ITokenRouterState - function getMaxTransferAmount() external view returns (uint128) { + function getMaxTransferAmount() external view returns (uint64) { return getFastTransferParametersState().maxAmount; } } diff --git a/evm/src/interfaces/IMatchingEngineFastOrders.sol b/evm/src/interfaces/IMatchingEngineFastOrders.sol index 0c2e1190..1b0e7e82 100644 --- a/evm/src/interfaces/IMatchingEngineFastOrders.sol +++ b/evm/src/interfaces/IMatchingEngineFastOrders.sol @@ -16,7 +16,7 @@ interface IMatchingEngineFastOrders { * @dev This function calls `improveBid` internally so that subsequent bidders * will not waste gas when racing to start an auction. */ - function placeInitialBid(bytes calldata fastTransferVaa, uint128 feeBid) external; + function placeInitialBid(bytes calldata fastTransferVaa, uint64 feeBid) external; /** * @notice Improve the bid on a fast transfer auction. @@ -24,7 +24,7 @@ interface IMatchingEngineFastOrders { * @param feeBid The fee bid to place on the auction. Must be less than the * current bid. */ - function improveBid(bytes32 auctionId, uint128 feeBid) external; + function improveBid(bytes32 auctionId, uint64 feeBid) external; /** * @notice Execute a fast transfer order. This function sends the funds to diff --git a/evm/src/interfaces/IMatchingEngineState.sol b/evm/src/interfaces/IMatchingEngineState.sol index 5073dae0..31264c87 100644 --- a/evm/src/interfaces/IMatchingEngineState.sol +++ b/evm/src/interfaces/IMatchingEngineState.sol @@ -15,10 +15,10 @@ interface IMatchingEngineState { * @return penalty The penalty amount. * @return userReward The user reward amount. */ - function calculateDynamicPenalty(uint128 amount, uint128 blocksElapsed) + function calculateDynamicPenalty(uint64 amount, uint64 blocksElapsed) external view - returns (uint128 penalty, uint128 userReward); + returns (uint64 penalty, uint64 userReward); /** * @notice Calculates the dynamic penalty for the specified auction. @@ -29,7 +29,7 @@ interface IMatchingEngineState { function calculateDynamicPenalty(bytes32 auctionId) external view - returns (uint128 penalty, uint128 userReward); + returns (uint64 penalty, uint64 userReward); /** * @notice Returns the original `deployer` of the contracts. @@ -82,12 +82,12 @@ interface IMatchingEngineState { /** * @notice Returns the transfer amount for a particular auction. */ - function getAuctionAmount(bytes32 auctionId) external view returns (uint128); + function getAuctionAmount(bytes32 auctionId) external view returns (uint64); /** * @notice Returns the security deposit for a particular auction. */ - function getSecurityDeposit(bytes32 auctionId) external view returns (uint128); + function getSecurityDeposit(bytes32 auctionId) external view returns (uint64); /** * @notice Returns the status of the specified `auctionId`. @@ -125,7 +125,7 @@ interface IMatchingEngineState { /** * @notice Returns the number of blocks elapsed since the auction started. */ - function getAuctionBlocksElapsed(bytes32 auctionId) external view returns (uint128); + function getAuctionBlocksElapsed(bytes32 auctionId) external view returns (uint64); /** * @notice Returns a boolean which indicates whether the specified `FastFill` has been redeemed. diff --git a/evm/src/interfaces/IMatchingEngineTypes.sol b/evm/src/interfaces/IMatchingEngineTypes.sol index fd1514c5..503066fe 100644 --- a/evm/src/interfaces/IMatchingEngineTypes.sol +++ b/evm/src/interfaces/IMatchingEngineTypes.sol @@ -35,13 +35,13 @@ struct LiveAuctionData { // The initial bidder of the auction. address initialBidder; // The block number at which the auction started. - uint128 startBlock; + uint64 startBlock; // The amount of tokens to be sent to the user. - uint128 amount; + uint64 amount; // The additional deposit made by the highest bidder. - uint128 securityDeposit; + uint64 securityDeposit; // The bid price of the highest bidder. - uint128 bidPrice; + uint64 bidPrice; } struct LiveAuctionInfo { diff --git a/evm/src/interfaces/IPlaceMarketOrder.sol b/evm/src/interfaces/IPlaceMarketOrder.sol index 0c3fb693..9606f58d 100644 --- a/evm/src/interfaces/IPlaceMarketOrder.sol +++ b/evm/src/interfaces/IPlaceMarketOrder.sol @@ -30,8 +30,8 @@ interface IPlaceMarketOrder { * amount returned by `messageFee()` on the IWormhole.sol interface. */ function placeMarketOrder( - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, @@ -56,7 +56,7 @@ interface IPlaceMarketOrder { * amount returned by `messageFee()` on the IWormhole.sol interface. */ function placeMarketOrder( - uint128 amountIn, + uint64 amountIn, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage @@ -98,13 +98,13 @@ interface IPlaceMarketOrder { * */ function placeFastMarketOrder( - uint128 amountIn, - uint128 minAmountOut, + uint64 amountIn, + uint64 minAmountOut, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, address refundAddress, - uint128 maxFee, + uint64 maxFee, uint32 deadline ) external payable returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce); @@ -137,11 +137,11 @@ interface IPlaceMarketOrder { * times the amount returned by `messageFee()` on the IWormhole.sol interface. */ function placeFastMarketOrder( - uint128 amountIn, + uint64 amountIn, uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage, - uint128 maxFee, + uint64 maxFee, uint32 deadline ) external payable returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce); } diff --git a/evm/src/interfaces/ITokenRouterState.sol b/evm/src/interfaces/ITokenRouterState.sol index 51a3d0ad..d94f6211 100644 --- a/evm/src/interfaces/ITokenRouterState.sol +++ b/evm/src/interfaces/ITokenRouterState.sol @@ -56,29 +56,29 @@ interface ITokenRouterState { /** * @notice Returns the minimum transfer amount for fast transfers. */ - function getMinTransferAmount() external view returns (uint128); + function getMinTransferAmount() external view returns (uint64); /** * @notice Returns the minimum fee for fast transfers. This includes the `baseFee` * and `initialAuctionFee`. */ - function getMinFee() external pure returns (uint128); + function getMinFee() external pure returns (uint64); /** * @notice Returns the maximum transfer amount for fast transfers. */ - function getMaxTransferAmount() external view returns (uint128); + function getMaxTransferAmount() external view returns (uint64); /** * @notice Returns the initial auction fee for fast transfers. This is the fee * the relayer is paid for starting a fast transfer auction. */ - function getInitialAuctionFee() external view returns (uint128); + function getInitialAuctionFee() external view returns (uint64); /** * @notice Returns the base fee for fast transfers. This is the fee the relayer * is paid for relaying the CCTP message associated with a fast transfer. This fee * is only paid in the a fast transfer auction does not occur. */ - function getBaseFee() external view returns (uint128); + function getBaseFee() external view returns (uint64); } diff --git a/evm/src/interfaces/ITokenRouterTypes.sol b/evm/src/interfaces/ITokenRouterTypes.sol index 3a63947f..b0be3577 100644 --- a/evm/src/interfaces/ITokenRouterTypes.sol +++ b/evm/src/interfaces/ITokenRouterTypes.sol @@ -15,11 +15,11 @@ struct FastTransferParameters { // Determines if fast transfers are enabled. bool enabled; // The maximum amount that can be transferred using fast transfers. - uint128 maxAmount; + uint64 maxAmount; // The `baseFee` which is summed with the `feeInBps` to calculate the total fee. - uint128 baseFee; + uint64 baseFee; // The fee paid to the initial bidder of an auction. - uint128 initAuctionFee; + uint64 initAuctionFee; } struct RouterEndpoints { diff --git a/evm/src/shared/Messages.sol b/evm/src/shared/Messages.sol index 515ade3c..c83112ad 100644 --- a/evm/src/shared/Messages.sol +++ b/evm/src/shared/Messages.sol @@ -29,26 +29,26 @@ library Messages { } struct FastFill { + uint64 fillAmount; Fill fill; - uint128 fillAmount; } struct FastMarketOrder { - uint128 amountIn; - uint128 minAmountOut; + uint64 amountIn; + uint64 minAmountOut; uint16 targetChain; uint32 targetDomain; bytes32 redeemer; bytes32 sender; bytes32 refundAddress; - uint128 maxFee; - uint128 initAuctionFee; + uint64 maxFee; + uint64 initAuctionFee; uint32 deadline; bytes redeemerMessage; } struct SlowOrderResponse { - uint128 baseFee; + uint64 baseFee; } function encode(Fill memory fill) internal pure returns (bytes memory encoded) { @@ -97,15 +97,15 @@ library Messages { uint256 offset = _checkPayloadId(encoded, 0, FAST_MARKET_ORDER); // Parse the encoded message. - (order.amountIn, offset) = encoded.asUint128Unchecked(offset); - (order.minAmountOut, offset) = encoded.asUint128Unchecked(offset); + (order.amountIn, offset) = encoded.asUint64Unchecked(offset); + (order.minAmountOut, offset) = encoded.asUint64Unchecked(offset); (order.targetChain, offset) = encoded.asUint16Unchecked(offset); (order.targetDomain, offset) = encoded.asUint32Unchecked(offset); (order.redeemer, offset) = encoded.asBytes32Unchecked(offset); (order.sender, offset) = encoded.asBytes32Unchecked(offset); (order.refundAddress, offset) = encoded.asBytes32Unchecked(offset); - (order.maxFee, offset) = encoded.asUint128Unchecked(offset); - (order.initAuctionFee, offset) = encoded.asUint128Unchecked(offset); + (order.maxFee, offset) = encoded.asUint64Unchecked(offset); + (order.initAuctionFee, offset) = encoded.asUint64Unchecked(offset); (order.deadline, offset) = encoded.asUint32Unchecked(offset); (order.redeemerMessage, offset) = _decodeBytes(encoded, offset); @@ -115,11 +115,11 @@ library Messages { function encode(FastFill memory fastFill) internal pure returns (bytes memory encoded) { encoded = abi.encodePacked( FAST_FILL, + fastFill.fillAmount, fastFill.fill.sourceChain, fastFill.fill.orderSender, fastFill.fill.redeemer, - _encodeBytes(fastFill.fill.redeemerMessage), - fastFill.fillAmount + _encodeBytes(fastFill.fill.redeemerMessage) ); } @@ -131,11 +131,11 @@ library Messages { uint256 offset = _checkPayloadId(encoded, 0, FAST_FILL); // Parse the encoded message. + (fastFill.fillAmount, offset) = encoded.asUint64Unchecked(offset); (fastFill.fill.sourceChain, offset) = encoded.asUint16Unchecked(offset); (fastFill.fill.orderSender, offset) = encoded.asBytes32Unchecked(offset); (fastFill.fill.redeemer, offset) = encoded.asBytes32Unchecked(offset); (fastFill.fill.redeemerMessage, offset) = _decodeBytes(encoded, offset); - (fastFill.fillAmount, offset) = encoded.asUint128Unchecked(offset); _checkLength(encoded, offset); } @@ -156,7 +156,7 @@ library Messages { uint256 offset = _checkPayloadId(encoded, 0, SLOW_ORDER_RESPONSE); // Parse the encoded message. - (response.baseFee, offset) = encoded.asUint128Unchecked(offset); + (response.baseFee, offset) = encoded.asUint64Unchecked(offset); _checkLength(encoded, offset); } diff --git a/evm/ts/src/MatchingEngine/evm.ts b/evm/ts/src/MatchingEngine/evm.ts index 502a9813..7a83f1c2 100644 --- a/evm/ts/src/MatchingEngine/evm.ts +++ b/evm/ts/src/MatchingEngine/evm.ts @@ -90,7 +90,7 @@ export class EvmMatchingEngine implements MatchingEngine { refundAddress?: string ) { if (minAmountOut !== undefined && refundAddress !== undefined) { - return this.contract["placeMarketOrder(uint128,uint128,uint16,bytes32,bytes,address)"]( + return this.contract["placeMarketOrder(uint64,uint64,uint16,bytes32,bytes,address)"]( amountIn, minAmountOut, targetChain, @@ -53,7 +53,7 @@ export class EvmTokenRouter implements TokenRouter { refundAddress ); } else { - return this.contract["placeMarketOrder(uint128,uint16,bytes32,bytes)"]( + return this.contract["placeMarketOrder(uint64,uint16,bytes32,bytes)"]( amountIn, targetChain, redeemer, @@ -74,7 +74,7 @@ export class EvmTokenRouter implements TokenRouter { ) { if (minAmountOut !== undefined && refundAddress !== undefined) { return this.contract[ - "placeFastMarketOrder(uint128,uint128,uint16,bytes32,bytes,address,uint128,uint32)" + "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)" ]( amountIn, minAmountOut, @@ -86,9 +86,14 @@ export class EvmTokenRouter implements TokenRouter { deadline ); } else { - return this.contract[ - "placeFastMarketOrder(uint128,uint16,bytes32,bytes,uint128,uint32)" - ](amountIn, targetChain, redeemer, redeemerMessage, maxFee, deadline); + return this.contract["placeFastMarketOrder(uint64,uint16,bytes32,bytes,uint64,uint32)"]( + amountIn, + targetChain, + redeemer, + redeemerMessage, + maxFee, + deadline + ); } } diff --git a/evm/ts/src/messages.ts b/evm/ts/src/messages.ts index ebd8cc8c..060219af 100644 --- a/evm/ts/src/messages.ts +++ b/evm/ts/src/messages.ts @@ -211,15 +211,13 @@ export class FastFill { static decode(payload: Buffer): FastFill { const buf = takePayloadId(payload, this.ID); - const sourceChain = buf.readUInt16BE(0); - const orderSender = buf.subarray(2, 34); - const redeemer = buf.subarray(34, 66); - const redeemerMsgLen = buf.readUInt32BE(66); + const fillAmount = buf.readBigUInt64BE(0); + const sourceChain = buf.readUInt16BE(8); + const orderSender = buf.subarray(10, 42); + const redeemer = buf.subarray(42, 74); + const redeemerMsgLen = buf.readUInt32BE(74); const endMessage = 70 + redeemerMsgLen; - const redeemerMessage = buf.subarray(70, endMessage); - const fillAmount = BigInt( - ethers.BigNumber.from(buf.subarray(endMessage, endMessage + 16)).toString() - ); + const redeemerMessage = buf.subarray(78, endMessage); return new FastFill(sourceChain, orderSender, redeemer, redeemerMessage, fillAmount); } @@ -271,20 +269,18 @@ export class FastMarketOrder { static decode(payload: Buffer): FastMarketOrder { const buf = takePayloadId(payload, this.ID); - const amountIn = BigInt(ethers.BigNumber.from(buf.subarray(0, 16)).toString()); - const minAmountOut = BigInt(ethers.BigNumber.from(buf.subarray(16, 32)).toString()); - const targetChain = buf.readUInt16BE(32); - const targetDomain = buf.readUInt32BE(34); - const redeemer = buf.subarray(38, 70); - const sender = buf.subarray(70, 102); - const refundAddress = buf.subarray(102, 134); - //const slowSequence = buf.readBigUint64BE(134); - //const slowEmitter = buf.subarray(142, 174); - const maxFee = BigInt(ethers.BigNumber.from(buf.subarray(134, 150)).toString()); - const initAuctionFee = BigInt(ethers.BigNumber.from(buf.subarray(150, 166)).toString()); - const deadline = buf.readUInt32BE(166); - const redeemerMsgLen = buf.readUInt32BE(170); - const redeemerMessage = buf.subarray(174, 174 + redeemerMsgLen); + const amountIn = buf.readBigUInt64BE(0); + const minAmountOut = buf.readBigUInt64BE(8); + const targetChain = buf.readUInt16BE(16); + const targetDomain = buf.readUInt32BE(18); + const redeemer = buf.subarray(22, 54); + const sender = buf.subarray(54, 86); + const refundAddress = buf.subarray(86, 118); + const maxFee = buf.readBigUInt64BE(118); + const initAuctionFee = buf.readBigUInt64BE(126); + const deadline = buf.readUInt32BE(134); + const redeemerMsgLen = buf.readUInt32BE(138); + const redeemerMessage = buf.subarray(138, 138 + redeemerMsgLen); return new FastMarketOrder( amountIn, minAmountOut, From 38b0a062ef085ef214635295fd06f00645369b11 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 22 Jan 2024 16:43:50 -0600 Subject: [PATCH 078/126] evm: update payload ID enumeration --- evm/src/shared/Messages.sol | 9 +++++---- evm/ts/src/messages.ts | 6 +++--- 2 files changed, 8 insertions(+), 7 deletions(-) diff --git a/evm/src/shared/Messages.sol b/evm/src/shared/Messages.sol index c83112ad..a0e71331 100644 --- a/evm/src/shared/Messages.sol +++ b/evm/src/shared/Messages.sol @@ -7,11 +7,12 @@ import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; library Messages { using BytesParsing for bytes; - // Payload IDs. Payload IDs 1-10 are reserved for CCTP deposit messages. - uint8 private constant FILL = 11; + // Payload IDs. Payloads IDs 1-10 are reserved for messages that are + // paired with a CCTP transfeer. + uint8 private constant FILL = 1; + uint8 private constant SLOW_ORDER_RESPONSE = 2; + uint8 private constant FAST_MARKET_ORDER = 11; uint8 private constant FAST_FILL = 12; - uint8 private constant FAST_MARKET_ORDER = 13; - uint8 private constant SLOW_ORDER_RESPONSE = 14; // VAA fields. uint256 private constant SIG_COUNT_OFFSET = 5; diff --git a/evm/ts/src/messages.ts b/evm/ts/src/messages.ts index 060219af..8558dd89 100644 --- a/evm/ts/src/messages.ts +++ b/evm/ts/src/messages.ts @@ -167,7 +167,7 @@ export class Fill { } static get ID(): number { - return 11; + return 1; } static decode(payload: Buffer): Fill { @@ -263,7 +263,7 @@ export class FastMarketOrder { } static get ID(): number { - return 13; + return 11; } static decode(payload: Buffer): FastMarketOrder { @@ -305,7 +305,7 @@ export class SlowOrderResponse { } static get ID(): number { - return 14; + return 2; } static decode(payload: Buffer): SlowOrderResponse { From 298bfe39290cf7a6827ce05899933ae1ad8b4789 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 22 Jan 2024 17:36:51 -0600 Subject: [PATCH 079/126] solana: add prepared fill (tests WIP); uptick wormhole-cctp-solana 0.0.1-alpha.7 --- solana/Cargo.lock | 4 +- solana/Cargo.toml | 2 +- .../src/processor/prepare_slow_order/cctp.rs | 5 +- solana/programs/token-router/src/error.rs | 3 + solana/programs/token-router/src/lib.rs | 6 +- .../src/processor/close_prepared_order.rs | 8 +- .../src/processor/consume_prepared_fill.rs | 72 ++++ .../token-router/src/processor/mod.rs | 3 + .../src/processor/redeem_fill/cctp.rs | 89 ++--- .../src/processor/redeem_fill/fast.rs | 88 ++--- .../src/processor/redeem_fill/mod.rs | 11 +- solana/programs/token-router/src/state/mod.rs | 3 + .../token-router/src/state/prepared_fill.rs | 27 ++ solana/ts/src/matchingEngine/index.ts | 20 +- solana/ts/src/tokenRouter/index.ts | 68 +++- .../ts/src/tokenRouter/state/PreparedFill.ts | 46 +++ solana/ts/src/tokenRouter/state/index.ts | 1 + solana/ts/tests/01__matchingEngine.ts | 2 +- solana/ts/tests/02__tokenRouter.ts | 344 +++++++----------- solana/ts/tests/04__interaction.ts | 221 +++++------ 20 files changed, 554 insertions(+), 469 deletions(-) create mode 100644 solana/programs/token-router/src/processor/consume_prepared_fill.rs create mode 100644 solana/programs/token-router/src/state/prepared_fill.rs create mode 100644 solana/ts/src/tokenRouter/state/PreparedFill.ts diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 5ac4f75a..18af3664 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2415,9 +2415,9 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.0.1-alpha.6" +version = "0.0.1-alpha.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "2c6dc492a1db64b466853a60a91a975bb227b65c1c374c1bd825ba4d2449fe09" +checksum = "d566238cc3af7a9a451c6199f327213be31ba97534c28dc96b6ea6d009ce8695" dependencies = [ "anchor-lang", "anchor-spl", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index b7be1b80..a79b2a71 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -21,7 +21,7 @@ path = "modules/common" path = "programs/matching-engine" [workspace.dependencies.wormhole-cctp-solana] -version = "0.0.1-alpha.6" +version = "0.0.1-alpha.7" default-features = false [workspace.dependencies.wormhole-raw-vaas] diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs index b77e6962..11168ff3 100644 --- a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs @@ -29,9 +29,8 @@ pub struct PrepareSlowOrderCctp<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] + /// CHECK: Must be owned by the Wormhole Core Bridge program. Ownership check happens in + /// [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint). finalized_vaa: AccountInfo<'info>, #[account( diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index b3f28651..d267cc67 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -76,4 +76,7 @@ pub enum TokenRouterError { #[msg("InvalidRedeemer")] InvalidRedeemer = 0x206, + + #[msg("RedeemerMismatch")] + RedeemerMismatch = 0x220, } diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index d1e93968..fc1e426a 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -38,7 +38,7 @@ pub mod token_router { processor::place_market_order_cctp(ctx) } - pub fn redeem_cctp_fill(ctx: Context, args: RedeemFillArgs) -> Result<()> { + pub fn redeem_cctp_fill(ctx: Context, args: CctpMessageArgs) -> Result<()> { processor::redeem_cctp_fill(ctx, args) } @@ -46,6 +46,10 @@ pub mod token_router { processor::redeem_fast_fill(ctx) } + pub fn consume_prepared_fill(ctx: Context) -> Result<()> { + processor::consume_prepared_fill(ctx) + } + // admin /// This instruction is be used to generate your program's config. diff --git a/solana/programs/token-router/src/processor/close_prepared_order.rs b/solana/programs/token-router/src/processor/close_prepared_order.rs index 4f8f24e5..8ed6399f 100644 --- a/solana/programs/token-router/src/processor/close_prepared_order.rs +++ b/solana/programs/token-router/src/processor/close_prepared_order.rs @@ -8,10 +8,6 @@ use anchor_spl::token; #[derive(Accounts)] pub struct ClosePreparedOrder<'info> { - /// CHECK: This payer must be the same one encoded in the prepared order. - #[account(mut)] - payer: AccountInfo<'info>, - /// Custodian, but does not need to be deserialized. /// /// CHECK: Seeds must be \["emitter"\]. @@ -24,6 +20,10 @@ pub struct ClosePreparedOrder<'info> { /// This signer must be the same one encoded in the prepared order. order_sender: Signer<'info>, + /// CHECK: This payer must be the same one encoded in the prepared order. + #[account(mut)] + payer: AccountInfo<'info>, + #[account( mut, close = payer, diff --git a/solana/programs/token-router/src/processor/consume_prepared_fill.rs b/solana/programs/token-router/src/processor/consume_prepared_fill.rs new file mode 100644 index 00000000..1b104b7c --- /dev/null +++ b/solana/programs/token-router/src/processor/consume_prepared_fill.rs @@ -0,0 +1,72 @@ +use crate::{ + error::TokenRouterError, + state::{Custodian, PreparedFill}, + CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; + +#[derive(Accounts)] +pub struct ConsumePreparedFill<'info> { + /// Custodian, but does not need to be deserialized. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = CUSTODIAN_BUMP, + )] + custodian: AccountInfo<'info>, + + /// This signer must be the same one encoded in the prepared fill. + redeemer: Signer<'info>, + + /// CHECK: This recipient may not necessarily be the same one encoded in the prepared fill (as + /// the payer). If someone were to prepare a fill via a redeem fill instruction and he had no + /// intention of consuming it, he will be out of luck. We will reward the redeemer with the + /// closed account funds with a payer of his choosing. + #[account(mut)] + rent_recipient: AccountInfo<'info>, + + #[account( + mut, + close = rent_recipient, + has_one = redeemer @ TokenRouterError::RedeemerMismatch, + )] + prepared_fill: Account<'info, PreparedFill>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + dst_token: AccountInfo<'info>, + + /// Custody token account. This account will be closed at the end of this instruction. It just + /// acts as a conduit to allow this program to be the transfer initiator in the CCTP message. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = CUSTODY_TOKEN_BUMP, + )] + custody_token: AccountInfo<'info>, + + token_program: Program<'info, token::Token>, +} + +pub fn consume_prepared_fill(ctx: Context) -> Result<()> { + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.dst_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], + ), + ctx.accounts.prepared_fill.amount, + ) +} diff --git a/solana/programs/token-router/src/processor/mod.rs b/solana/programs/token-router/src/processor/mod.rs index 45e548d5..a83ff2c4 100644 --- a/solana/programs/token-router/src/processor/mod.rs +++ b/solana/programs/token-router/src/processor/mod.rs @@ -4,6 +4,9 @@ pub use admin::*; mod close_prepared_order; pub use close_prepared_order::*; +mod consume_prepared_fill; +pub use consume_prepared_fill::*; + mod market_order; pub use market_order::*; diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index d80c449c..6b7cb9fd 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::TokenRouterError, - state::{Custodian, RouterEndpoint}, + state::{Custodian, FillType, PreparedFill, RouterEndpoint}, CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; @@ -10,7 +10,7 @@ use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, cpi::ReceiveMessageArgs, utils::WormholeCctpPayload, - wormhole::core_bridge_program, + wormhole::core_bridge_program::VaaAccount, }; /// Account context to invoke [redeem_cctp_fill]. @@ -28,29 +28,27 @@ pub struct RedeemCctpFill<'info> { )] custodian: AccountInfo<'info>, - /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via - /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. - #[account(owner = core_bridge_program::id())] + /// CHECK: Must be owned by the Wormhole Core Bridge program. Ownership check happens in + /// [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint). vaa: AccountInfo<'info>, - /// Redeemer, who owns the token account that will receive the minted tokens. - /// - /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. - redeemer: Signer<'info>, - - /// Destination token account, which the redeemer may not own. But because the redeemer is a - /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent - /// to any account he chooses (this one). - /// - /// CHECK: This token account must already exist. - #[account(mut)] - dst_token: AccountInfo<'info>, + #[account( + init_if_needed, + payer = payer, + space = 8 + PreparedFill::INIT_SPACE, + seeds = [ + PreparedFill::SEED_PREFIX, + VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + ], + bump, + )] + prepared_fill: Account<'info, PreparedFill>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message /// from its custody account to this account. /// - /// Mutable. Seeds must be \["custody"\]. + /// CHECK: Mutable. Seeds must be \["custody"\]. /// /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( @@ -58,7 +56,7 @@ pub struct RedeemCctpFill<'info> { seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump = CUSTODY_TOKEN_BUMP, )] - custody_token: Account<'info, token::TokenAccount>, + custody_token: AccountInfo<'info>, /// Registered emitter account representing a Circle Integration on another network. /// @@ -115,11 +113,28 @@ pub struct RedeemCctpFill<'info> { system_program: Program<'info, System>, } +/// Arguments used to invoke [redeem_cctp_fill]. +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct CctpMessageArgs { + /// CCTP message. + pub encoded_cctp_message: Vec, + + /// Attestation of [encoded_cctp_message](Self::encoded_cctp_message). + pub cctp_attestation: Vec, +} + /// This instruction reconciles a Wormhole CCTP deposit message with a CCTP message to mint tokens /// for the [mint_recipient](RedeemCctpFill::mint_recipient) token account. /// /// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. -pub fn redeem_cctp_fill(ctx: Context, args: super::RedeemFillArgs) -> Result<()> { +pub fn redeem_cctp_fill(ctx: Context, args: CctpMessageArgs) -> Result<()> { + match ctx.accounts.prepared_fill.fill_type { + FillType::Unset => handle_redeem_fill_cctp(ctx, args), + _ => super::redeem_fill_noop(), + } +} + +fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) -> Result<()> { let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; let vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( @@ -182,34 +197,26 @@ pub fn redeem_cctp_fill(ctx: Context, args: super::RedeemFillArg .message() .to_deposit_unchecked(); - // Save for final transfer. - // // NOTE: This is safe because we know the amount is within u64 range. let amount = u64::try_from(ruint::aliases::U256::from_be_bytes(deposit.amount())).unwrap(); // Verify as Liquiditiy Layer Deposit message. let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) .map_err(|_| TokenRouterError::InvalidDepositMessage)?; - - // Verify redeemer. let fill = msg.fill().ok_or(TokenRouterError::InvalidPayloadId)?; - require_keys_eq!( - Pubkey::from(fill.redeemer()), - ctx.accounts.redeemer.key(), - TokenRouterError::InvalidRedeemer - ); - // Finally transfer tokens to destination. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.dst_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), + // Set prepared fill data. + ctx.accounts.prepared_fill.set_inner(PreparedFill { + vaa_hash: vaa.try_digest().unwrap().0, + bump: ctx.bumps["prepared_fill"], + redeemer: Pubkey::from(fill.redeemer()), + payer: ctx.accounts.payer.key(), + fill_type: FillType::WormholeCctpDeposit, + source_chain: fill.source_chain(), + order_sender: fill.order_sender(), amount, - ) + }); + + // Done. + Ok(()) } diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 1d9e06a4..01398142 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -1,8 +1,11 @@ -use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP}; +use crate::{ + state::{Custodian, FillType, PreparedFill}, + CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, +}; use anchor_lang::prelude::*; use anchor_spl::token; use common::messages::raw::LiquidityLayerMessage; -use wormhole_cctp_solana::wormhole::core_bridge_program; +use wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}; /// Account context to invoke [redeem_fast_fill]. #[derive(Accounts)] @@ -24,18 +27,17 @@ pub struct RedeemFastFill<'info> { #[account(owner = core_bridge_program::id())] vaa: AccountInfo<'info>, - /// Redeemer, who owns the token account that will receive the minted tokens. - /// - /// CHECK: Signer must be the redeemer encoded in the Deposit Fill message. - redeemer: Signer<'info>, - - /// Destination token account, which the redeemer may not own. But because the redeemer is a - /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent - /// to any account he chooses (this one). - /// - /// CHECK: This token account must already exist. - #[account(mut)] - dst_token: AccountInfo<'info>, + #[account( + init_if_needed, + payer = payer, + space = 8 + PreparedFill::INIT_SPACE, + seeds = [ + PreparedFill::SEED_PREFIX, + VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + ], + bump, + )] + prepared_fill: Account<'info, PreparedFill>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -74,6 +76,13 @@ pub struct RedeemFastFill<'info> { /// /// See [verify_vaa_and_mint](wormhole_cctp_solana::cpi::verify_vaa_and_mint) for more details. pub fn redeem_fast_fill(ctx: Context) -> Result<()> { + match ctx.accounts.prepared_fill.fill_type { + FillType::Unset => handle_redeem_fast_fill(ctx), + _ => super::redeem_fill_noop(), + } +} + +fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; matching_engine::cpi::redeem_fast_fill(CpiContext::new_with_signer( @@ -102,34 +111,27 @@ pub fn redeem_fast_fill(ctx: Context) -> Result<()> { let vaa = wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount::load(&ctx.accounts.vaa) .unwrap(); - - // Verify redeemer. - let amount = { - let fast_fill = LiquidityLayerMessage::try_from(vaa.try_payload().unwrap()) - .unwrap() - .to_fast_fill_unchecked(); - - require_keys_eq!( - Pubkey::from(fast_fill.fill().redeemer()), - ctx.accounts.redeemer.key(), - TokenRouterError::InvalidRedeemer - ); - - // This is safe because we know the amount is within u64 range. - u64::try_from(fast_fill.amount()).unwrap() - }; - - // Finally transfer tokens to destination. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.dst_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), + let fast_fill = LiquidityLayerMessage::try_from(vaa.try_payload().unwrap()) + .unwrap() + .to_fast_fill_unchecked(); + + // This is safe because we know the amount is within u64 range. + let amount = u64::try_from(fast_fill.amount()).unwrap(); + + let fill = fast_fill.fill(); + + // Set prepared fill data. + ctx.accounts.prepared_fill.set_inner(PreparedFill { + vaa_hash: vaa.try_digest().unwrap().0, + bump: ctx.bumps["prepared_fill"], + redeemer: Pubkey::from(fill.redeemer()), + payer: ctx.accounts.payer.key(), + fill_type: FillType::FastFill, + source_chain: fill.source_chain(), + order_sender: fill.order_sender(), amount, - ) + }); + + // Done. + Ok(()) } diff --git a/solana/programs/token-router/src/processor/redeem_fill/mod.rs b/solana/programs/token-router/src/processor/redeem_fill/mod.rs index d6036845..c53594a2 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/mod.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/mod.rs @@ -6,12 +6,9 @@ pub use fast::*; use anchor_lang::prelude::*; -/// Arguments used to invoke [redeem_fast_fill]. -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct RedeemFillArgs { - /// CCTP message. - pub encoded_cctp_message: Vec, +fn redeem_fill_noop() -> Result<()> { + msg!("Already redeemed"); - /// Attestation of [encoded_cctp_message](Self::encoded_cctp_message). - pub cctp_attestation: Vec, + // No-op. + Ok(()) } diff --git a/solana/programs/token-router/src/state/mod.rs b/solana/programs/token-router/src/state/mod.rs index 4e1eb439..93d1e04e 100644 --- a/solana/programs/token-router/src/state/mod.rs +++ b/solana/programs/token-router/src/state/mod.rs @@ -4,6 +4,9 @@ pub use custodian::*; mod payer_sequence; pub use payer_sequence::*; +mod prepared_fill; +pub use prepared_fill::*; + mod prepared_order; pub use prepared_order::*; diff --git a/solana/programs/token-router/src/state/prepared_fill.rs b/solana/programs/token-router/src/state/prepared_fill.rs new file mode 100644 index 00000000..acfc6a54 --- /dev/null +++ b/solana/programs/token-router/src/state/prepared_fill.rs @@ -0,0 +1,27 @@ +use anchor_lang::prelude::*; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace)] +pub enum FillType { + Unset, + WormholeCctpDeposit, + FastFill, +} + +#[account] +#[derive(Debug, InitSpace)] +pub struct PreparedFill { + pub vaa_hash: [u8; 32], + pub bump: u8, + + pub redeemer: Pubkey, + pub payer: Pubkey, + + pub fill_type: FillType, + pub source_chain: u16, + pub order_sender: [u8; 32], + pub amount: u64, +} + +impl PreparedFill { + pub const SEED_PREFIX: &'static [u8] = b"fill"; +} diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 74d6e512..d4b4a6a3 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -604,17 +604,23 @@ export class MatchingEngineProgram { .instruction(); } - async redeemFastFillAccounts(vaa: PublicKey): Promise { + async redeemFastFillAccounts( + vaa: PublicKey + ): Promise<{ vaaHash: Uint8Array; accounts: RedeemFastFillAccounts }> { const custodyToken = this.custodyTokenAccountAddress(); const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); + const vaaHash = vaaAcct.digest(); return { - custodian: this.custodianAddress(), - redeemedFastFill: this.redeemedFastFillAddress(vaaAcct.digest()), - routerEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), - custodyToken, - matchingEngineProgram: this.ID, - tokenProgram: splToken.TOKEN_PROGRAM_ID, + vaaHash, + accounts: { + custodian: this.custodianAddress(), + redeemedFastFill: this.redeemedFastFillAddress(vaaHash), + routerEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + custodyToken, + matchingEngineProgram: this.ID, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + }, }; } diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index d71e3856..dc9e5ad3 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -19,7 +19,7 @@ import { import * as matchingEngineSdk from "../matchingEngine"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; -import { Custodian, PayerSequence, PreparedOrder, RouterEndpoint } from "./state"; +import { Custodian, PayerSequence, PreparedFill, PreparedOrder, RouterEndpoint } from "./state"; export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; @@ -85,6 +85,7 @@ export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { export type RedeemFillCctpAccounts = { custodian: PublicKey; + preparedFill: PublicKey; custodyToken: PublicKey; routerEndpoint: PublicKey; messageTransmitterAuthority: PublicKey; @@ -103,6 +104,7 @@ export type RedeemFillCctpAccounts = { export type RedeemFastFillAccounts = { custodian: PublicKey; + preparedFill: PublicKey; custodyToken: PublicKey; matchingEngineCustodian: PublicKey; matchingEngineRedeemedFastFill: PublicKey; @@ -198,6 +200,14 @@ export class TokenRouterProgram { return this.program.account.preparedOrder.fetch(addr); } + preparedFillAddress(vaaHash: Array | Uint8Array | Buffer) { + return PreparedFill.address(this.ID, vaaHash); + } + + async fetchPreparedFill(addr: PublicKey): Promise { + return this.program.account.preparedFill.fetch(addr); + } + async commonAccounts(): Promise { const custodian = this.custodianAddress(); const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = @@ -315,6 +325,28 @@ export class TokenRouterProgram { .instruction(); } + async consumePreparedFillIx(accounts: { + preparedFill: PublicKey; + redeemer: PublicKey; + dstToken: PublicKey; + rentRecipient: PublicKey; + }): Promise { + const { preparedFill, redeemer, dstToken, rentRecipient } = accounts; + + return this.program.methods + .consumePreparedFill() + .accounts({ + custodian: this.custodianAddress(), + redeemer, + rentRecipient, + preparedFill, + dstToken, + custodyToken: this.custodyTokenAccountAddress(), + tokenProgram: splToken.TOKEN_PROGRAM_ID, + }) + .instruction(); + } + async placeMarketOrderCctpAccounts( targetChain: wormholeSdk.ChainId, overrides: { @@ -472,6 +504,7 @@ export class TokenRouterProgram { const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); const { chain } = vaaAcct.emitterInfo(); + const preparedFill = this.preparedFillAddress(vaaAcct.digest()); const messageTransmitterProgram = this.messageTransmitterProgram(); const { @@ -490,6 +523,7 @@ export class TokenRouterProgram { return { custodian: this.custodianAddress(), + preparedFill, custodyToken, routerEndpoint: this.routerEndpointAddress(chain as wormholeSdk.ChainId), // yikes messageTransmitterAuthority, @@ -511,8 +545,6 @@ export class TokenRouterProgram { accounts: { payer: PublicKey; vaa: PublicKey; - redeemer: PublicKey; - dstToken: PublicKey; routerEndpoint?: PublicKey; }, args: { @@ -520,12 +552,13 @@ export class TokenRouterProgram { cctpAttestation: Buffer; } ): Promise { - const { payer, vaa, redeemer, dstToken, routerEndpoint: inputRouterEndpoint } = accounts; + const { payer, vaa, routerEndpoint: inputRouterEndpoint } = accounts; const { encodedCctpMessage } = args; const { custodian, + preparedFill, custodyToken, routerEndpoint, messageTransmitterAuthority, @@ -548,8 +581,7 @@ export class TokenRouterProgram { payer, custodian, vaa, - redeemer, - dstToken, + preparedFill, custodyToken, routerEndpoint: inputRouterEndpoint ?? routerEndpoint, messageTransmitterAuthority, @@ -570,16 +602,20 @@ export class TokenRouterProgram { async redeemFastFillAccounts(vaa: PublicKey): Promise { const { - custodian: matchingEngineCustodian, - redeemedFastFill: matchingEngineRedeemedFastFill, - routerEndpoint: matchingEngineRouterEndpoint, - custodyToken: matchingEngineCustodyToken, - matchingEngineProgram, - tokenProgram, + vaaHash, + accounts: { + custodian: matchingEngineCustodian, + redeemedFastFill: matchingEngineRedeemedFastFill, + routerEndpoint: matchingEngineRouterEndpoint, + custodyToken: matchingEngineCustodyToken, + matchingEngineProgram, + tokenProgram, + }, } = await this.matchingEngineProgram().redeemFastFillAccounts(vaa); return { custodian: this.custodianAddress(), + preparedFill: this.preparedFillAddress(vaaHash), custodyToken: this.custodyTokenAccountAddress(), matchingEngineCustodian, matchingEngineRedeemedFastFill, @@ -593,12 +629,11 @@ export class TokenRouterProgram { async redeemFastFillIx(accounts: { payer: PublicKey; vaa: PublicKey; - redeemer: PublicKey; - dstToken: PublicKey; }): Promise { - const { payer, vaa, dstToken, redeemer } = accounts; + const { payer, vaa } = accounts; const { custodian, + preparedFill, custodyToken, matchingEngineCustodian, matchingEngineRedeemedFastFill, @@ -614,8 +649,7 @@ export class TokenRouterProgram { payer, custodian, vaa, - redeemer, - dstToken, + preparedFill, custodyToken, matchingEngineCustodian, matchingEngineRedeemedFastFill, diff --git a/solana/ts/src/tokenRouter/state/PreparedFill.ts b/solana/ts/src/tokenRouter/state/PreparedFill.ts new file mode 100644 index 00000000..5dde63e7 --- /dev/null +++ b/solana/ts/src/tokenRouter/state/PreparedFill.ts @@ -0,0 +1,46 @@ +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; + +export type FillType = { + unset?: {}; + wormholeCctpDeposit?: {}; + fastFill?: {}; +}; + +export class PreparedFill { + vaaHash: Array; + bump: number; + redeemer: PublicKey; + payer: PublicKey; + fillType: FillType; + sourceChain: number; + orderSender: Array; + amount: BN; + + constructor( + vaaHash: Array, + bump: number, + redeemer: PublicKey, + payer: PublicKey, + fillType: FillType, + sourceChain: number, + orderSender: Array, + amount: BN + ) { + this.vaaHash = vaaHash; + this.bump = bump; + this.redeemer = redeemer; + this.payer = payer; + this.fillType = fillType; + this.sourceChain = sourceChain; + this.orderSender = orderSender; + this.amount = amount; + } + + static address(programId: PublicKey, vaaHash: Array | Uint8Array | Buffer) { + return PublicKey.findProgramAddressSync( + [Buffer.from("fill"), Buffer.from(vaaHash)], + programId + )[0]; + } +} diff --git a/solana/ts/src/tokenRouter/state/index.ts b/solana/ts/src/tokenRouter/state/index.ts index c2b32b47..8c5efe61 100644 --- a/solana/ts/src/tokenRouter/state/index.ts +++ b/solana/ts/src/tokenRouter/state/index.ts @@ -1,5 +1,6 @@ export * from "./Custodian"; export * from "./PayerSequence"; +export * from "./PreparedFill"; export * from "./PreparedOrder"; export * from "./RouterEndpoint"; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 79cee0cc..0be0fcea 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -2719,7 +2719,7 @@ describe("Matching Engine", function () { let testCctpNonce = 2n ** 64n - 1n; // Hack to prevent math overflow error when invoking CCTP programs. - testCctpNonce -= 4n * 6400n; + testCctpNonce -= 10n * 6400n; const localVariables = new Map(); diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 8eee2f83..47803c00 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -1043,92 +1043,27 @@ describe("Token Router", function () { }); describe("Redeem Fill (CCTP)", function () { - const payerToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - payer.publicKey + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() ); + const sourceCctpDomain = 0; + const amount = 69n; + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const redeemer = Keypair.generate(); let testCctpNonce = 2n ** 64n - 1n; // Hack to prevent math overflow error when invoking CCTP programs. - testCctpNonce -= 2n * 6400n; + testCctpNonce -= 20n * 6400n; - let wormholeSequence = 0n; + let wormholeSequence = 2000n; const localVariables = new Map(); - it("Cannot Redeem Fill with Invalid VAA Account (Not Owned by Core Bridge)", async function () { - const redeemer = Keypair.generate(); - - const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() - ); - const sourceCctpDomain = 0; - const cctpNonce = testCctpNonce++; - const amount = 69n; - - // Concoct a Circle message. - const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); - const { encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( - tokenRouter, - sourceCctpDomain, - cctpNonce, - encodedMintRecipient, - amount, - burnSource - ); - const vaa = await postLiquidityLayerVaa( - connection, - payer, - MOCK_GUARDIANS, - foreignEndpointAddress, - wormholeSequence++, - Buffer.from("Oh noes!") - ); - - const ix = await tokenRouter.redeemCctpFillIx( - { - payer: payer.publicKey, - vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, - }, - { - encodedCctpMessage, - cctpAttestation, - } - ); - - // Replace the VAA account pubkey with garbage. - ix.keys[ix.keys.findIndex((key) => key.pubkey.equals(vaa))].pubkey = - SYSVAR_RENT_PUBKEY; - - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress - ); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: ConstraintOwner", - { - addressLookupTableAccounts: [lookupTableAccount!], - } - ); - }); - it("Cannot Redeem Fill from Invalid Source Router Chain", async function () { - const redeemer = Keypair.generate(); - - const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() - ); - const sourceCctpDomain = 0; const cctpNonce = testCctpNonce++; - const amount = 69n; // Concoct a Circle message. - const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( tokenRouter, @@ -1171,8 +1106,6 @@ describe("Token Router", function () { { payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, routerEndpoint: tokenRouter.routerEndpointAddress(foreignChain), }, { @@ -1184,29 +1117,15 @@ describe("Token Router", function () { const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: InvalidSourceRouter", - { - addressLookupTableAccounts: [lookupTableAccount!], - } - ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidSourceRouter", { + addressLookupTableAccounts: [lookupTableAccount!], + }); }); it("Cannot Redeem Fill from Invalid Source Router Address", async function () { - const redeemer = Keypair.generate(); - - const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() - ); - const sourceCctpDomain = 0; const cctpNonce = testCctpNonce++; - const amount = 69n; // Concoct a Circle message. - const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( tokenRouter, @@ -1248,8 +1167,6 @@ describe("Token Router", function () { { payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }, { encodedCctpMessage, @@ -1260,29 +1177,15 @@ describe("Token Router", function () { const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: InvalidSourceRouter", - { - addressLookupTableAccounts: [lookupTableAccount!], - } - ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidSourceRouter", { + addressLookupTableAccounts: [lookupTableAccount!], + }); }); it("Cannot Redeem Fill with Invalid Deposit Message", async function () { - const redeemer = Keypair.generate(); - - const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() - ); - const sourceCctpDomain = 0; const cctpNonce = testCctpNonce++; - const amount = 69n; // Concoct a Circle message. - const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( tokenRouter, @@ -1328,8 +1231,6 @@ describe("Token Router", function () { { payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }, { encodedCctpMessage, @@ -1340,29 +1241,15 @@ describe("Token Router", function () { const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: InvalidDepositMessage", - { - addressLookupTableAccounts: [lookupTableAccount!], - } - ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidDepositMessage", { + addressLookupTableAccounts: [lookupTableAccount!], + }); }); it("Cannot Redeem Fill with Invalid Payload ID", async function () { - const redeemer = Keypair.generate(); - - const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() - ); - const sourceCctpDomain = 0; const cctpNonce = testCctpNonce++; - const amount = 69n; // Concoct a Circle message. - const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( tokenRouter, @@ -1404,8 +1291,6 @@ describe("Token Router", function () { { payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }, { encodedCctpMessage, @@ -1416,15 +1301,9 @@ describe("Token Router", function () { const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: InvalidPayloadId", - { - addressLookupTableAccounts: [lookupTableAccount!], - } - ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidPayloadId", { + addressLookupTableAccounts: [lookupTableAccount!], + }); }); it("Remove Router Endpoint", async function () { @@ -1439,17 +1318,9 @@ describe("Token Router", function () { }); it("Cannot Redeem Fill without Router Endpoint", async function () { - const redeemer = Keypair.generate(); - - const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() - ); - const sourceCctpDomain = 0; const cctpNonce = testCctpNonce++; - const amount = 69n; // Concoct a Circle message. - const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = await craftCctpTokenBurnMessage( tokenRouter, @@ -1494,8 +1365,6 @@ describe("Token Router", function () { { payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }, { encodedCctpMessage, @@ -1506,21 +1375,13 @@ describe("Token Router", function () { const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: AccountNotInitialized", - { - addressLookupTableAccounts: [lookupTableAccount!], - } - ); + await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized", { + addressLookupTableAccounts: [lookupTableAccount!], + }); // Save for later. localVariables.set("args", { encodedCctpMessage, cctpAttestation }); localVariables.set("vaa", vaa); - localVariables.set("redeemer", redeemer); - localVariables.set("amount", amount); }); it("Add Router Endpoint", async function () { @@ -1539,56 +1400,17 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [ownerAssistant]); }); - it("Cannot Redeem Fill with Invalid Redeemer", async function () { - const args = localVariables.get("args") as { - encodedCctpMessage: Buffer; - cctpAttestation: Buffer; - }; - const vaa = localVariables.get("vaa") as PublicKey; - - const redeemer = Keypair.generate(); - - const ix = await tokenRouter.redeemCctpFillIx( - { - payer: payer.publicKey, - vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, - }, - args - ); - - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress - ); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: InvalidRedeemer", - { - addressLookupTableAccounts: [lookupTableAccount!], - } - ); - }); - it("Redeem Fill", async function () { const args = localVariables.get("args") as { encodedCctpMessage: Buffer; cctpAttestation: Buffer; }; const vaa = localVariables.get("vaa") as PublicKey; - const redeemer = localVariables.get("redeemer") as Keypair; - - const amount = localVariables.get("amount") as bigint; - expect(localVariables.delete("amount")).is.true; const ix = await tokenRouter.redeemCctpFillIx( { payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }, args ); @@ -1597,21 +1419,30 @@ describe("Token Router", function () { units: 250_000, }); - const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + const custodyToken = tokenRouter.custodyTokenAccountAddress(); + const { amount: balanceBefore } = await splToken.getAccount( + connection, + custodyToken + ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxOk(connection, [computeIx, ix], [payer, redeemer], { + await expectIxOk(connection, [computeIx, ix], [payer], { addressLookupTableAccounts: [lookupTableAccount!], }); // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + const { amount: balanceAfter } = await splToken.getAccount( + connection, + custodyToken + ); expect(balanceAfter).equals(balanceBefore + amount); + + // TODO: check prepared fill account. }); - it("Cannot Redeem Same Fill Again", async function () { + it("Redeem Same Fill is No-op", async function () { const args = localVariables.get("args") as { encodedCctpMessage: Buffer; cctpAttestation: Buffer; @@ -1621,15 +1452,10 @@ describe("Token Router", function () { const vaa = localVariables.get("vaa") as PublicKey; expect(localVariables.delete("vaa")).is.true; - const redeemer = localVariables.get("redeemer") as Keypair; - expect(localVariables.delete("redeemer")).is.true; - const ix = await tokenRouter.redeemCctpFillIx( { payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }, args ); @@ -1637,17 +1463,101 @@ describe("Token Router", function () { const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - // NOTE: This is a CCTP Message Transmitter program error. - await expectIxErr( + await expectIxOk(connection, [ix], [payer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + + // TODO: check prepared fill account. + }); + }); + + describe("Consume Prepared Fill", function () { + const redeemer = Keypair.generate(); + + let testCctpNonce = 2n ** 64n - 1n; + + // Hack to prevent math overflow error when invoking CCTP programs. + testCctpNonce -= 21n * 6400n; + + let wormholeSequence = 2100n; + + const localVariables = new Map(); + + it.skip("Redeem Fill (CCTP)", async function () { + // TODO + }); + + it.skip("Consume Prepared Fill after Redeem Fill (CCTP)", async function () { + // TODO + }); + + it.skip("Cannot Redeem Fill Again (CCTP)", async function () { + // TODO + }); + + async function redeemFillCctp() { + const encodedMintRecipient = Array.from( + tokenRouter.custodyTokenAccountAddress().toBuffer() + ); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amount = 69n; + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage( + tokenRouter, + sourceCctpDomain, + cctpNonce, + encodedMintRecipient, + amount, + burnSource + ); + + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: encodedMintRecipient, + }, + { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + } + ), + }); + + const vaa = await postLiquidityLayerVaa( connection, - [ix], - [payer, redeemer], - "Error Code: NonceAlreadyUsed", + payer, + MOCK_GUARDIANS, + foreignEndpointAddress, + wormholeSequence++, + message + ); + const redeemIx = await tokenRouter.redeemCctpFillIx( { - addressLookupTableAccounts: [lookupTableAccount!], + payer: payer.publicKey, + vaa, + }, + { + encodedCctpMessage, + cctpAttestation, } ); - }); + + return { amount, message, vaa, redeemIx }; + } }); }); }); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index e52e4187..01690b01 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -37,19 +37,20 @@ describe("Matching Engine <> Token Router", function () { payer.publicKey ); + const orderSender = Array.from(Buffer.alloc(32, "d00d", "hex")); + const redeemer = Keypair.generate(); + let wormholeSequence = 4000n; const localVariables = new Map(); it("Token Router ..... Cannot Redeem Fast Fill as Unregistered Token Router", async function () { - const redeemer = Keypair.generate(); - const amount = 69n; const message = new LiquidityLayerMessage({ fastFill: { fill: { sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + orderSender, redeemer: Array.from(redeemer.publicKey.toBuffer()), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, @@ -69,15 +70,12 @@ describe("Matching Engine <> Token Router", function () { const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: ConstraintAddress"); + await expectIxErr(connection, [ix], [payer], "Error Code: ConstraintAddress"); // Save for later. localVariables.set("vaa", vaa); - localVariables.set("redeemer", redeemer); localVariables.set("amount", amount); }); @@ -98,21 +96,13 @@ describe("Matching Engine <> Token Router", function () { it("Token Router ..... Cannot Redeem Fast Fill without Local Router Endpoint", async function () { const vaa = localVariables.get("vaa") as PublicKey; - const redeemer = localVariables.get("redeemer") as Keypair; const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: AccountNotInitialized" - ); + await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized"); }); it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { @@ -135,45 +125,28 @@ describe("Matching Engine <> Token Router", function () { ); }); - it("Token Router ..... Cannot Redeem Fast Fill with Invalid Redeemer", async function () { - const vaa = localVariables.get("vaa") as PublicKey; - - const redeemer = Keypair.generate(); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, - }); - - await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: InvalidRedeemer"); - }); - it("Token Router ..... Redeem Fast Fill", async function () { const vaa = localVariables.get("vaa") as PublicKey; - const redeemer = localVariables.get("redeemer") as Keypair; - const amount = localVariables.get("amount") as bigint; - expect(localVariables.delete("amount")).is.true; - - const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - await expectIxOk(connection, [ix], [payer, redeemer]); + const custodyToken = tokenRouter.custodyTokenAccountAddress(); + const { amount: balanceBefore } = await splToken.getAccount(connection, custodyToken); + + await expectIxOk(connection, [ix], [payer]); // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + const { amount: balanceAfter } = await splToken.getAccount(connection, custodyToken); expect(balanceAfter).equals(balanceBefore + amount); - // Check redeemed fast fill account. const vaaHash = await VaaAccount.fetch(connection, vaa).then((vaa) => vaa.digest()); - //console.log("vaaHash...", Buffer.from(vaaHash).toString("hex")); + const preparedFill = tokenRouter.preparedFillAddress(vaaHash); + + // Check redeemed fast fill account. const redeemedFastFill = matchingEngine.redeemedFastFillAddress(vaaHash); const redeemedFastFillData = await matchingEngine.fetchRedeemedFastFill( redeemedFastFill @@ -181,92 +154,114 @@ describe("Matching Engine <> Token Router", function () { // The VAA hash can change depending on the message (sequence is usually the reason for // this). So we just take the bump from the fetched data and move on with our lives. - const { bump } = redeemedFastFillData; - expect(redeemedFastFillData).to.eql( - new matchingEngineSdk.RedeemedFastFill( - bump, - Array.from(vaaHash), - new BN(new BN(wormholeSequence.toString()).subn(1).toBuffer("be", 8)) - ) - ); + { + const { bump } = redeemedFastFillData; + expect(redeemedFastFillData).to.eql( + new matchingEngineSdk.RedeemedFastFill( + bump, + Array.from(vaaHash), + new BN(new BN(wormholeSequence.toString()).subn(1).toBuffer("be", 8)) + ) + ); + } + + { + const preparedFillData = await tokenRouter.fetchPreparedFill(preparedFill); + const { bump } = preparedFillData; + expect(preparedFillData).to.eql( + new tokenRouterSdk.PreparedFill( + Array.from(vaaHash), + bump, + redeemer.publicKey, + payer.publicKey, + { fastFill: {} }, + foreignChain, + orderSender, + (() => { + const buf = Buffer.alloc(8); + buf.writeBigUInt64BE(amount); + return new BN(buf); + })() + ) + ); + } // Save for later. localVariables.set("redeemedFastFill", redeemedFastFill); + localVariables.set("preparedFill", preparedFill); }); - it("Token Router ..... Cannot Redeem Same Fast Fill Again", async function () { + it("Token Router ..... Redeem Same Fast Fill is No-op", async function () { const vaa = localVariables.get("vaa") as PublicKey; - expect(localVariables.delete("vaa")).is.true; - - const redeemer = localVariables.get("redeemer") as Keypair; - expect(localVariables.delete("redeemer")).is.true; - - const redeemedFastFill = localVariables.get("redeemedFastFill") as PublicKey; - expect(localVariables.delete("redeemedFastFill")).is.true; const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, + }); + + await expectIxOk(connection, [ix], [payer]); + }); + + it("Token Router ..... Consume Prepared Fill for Fast Fill", async function () { + const preparedFill = localVariables.get("preparedFill") as PublicKey; + expect(localVariables.delete("preparedFill")).is.true; + + const amount = localVariables.get("amount") as bigint; + expect(localVariables.delete("amount")).is.true; + + const rentRecipient = Keypair.generate().publicKey; + const ix = await tokenRouter.consumePreparedFillIx({ + preparedFill, redeemer: redeemer.publicKey, dstToken: payerToken, + rentRecipient, }); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - `Allocate: account Address { address: ${redeemedFastFill.toString()}, base: None } already in use` - ); + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + const solBalanceBefore = await connection.getBalance(rentRecipient); + + await expectIxOk(connection, [ix], [payer, redeemer]); + + // Check balance. + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore + amount); + + const solBalanceAfter = await connection.getBalance(rentRecipient); + const preparedFillRent = await connection.getMinimumBalanceForRentExemption(148); + expect(solBalanceAfter).equals(solBalanceBefore + preparedFillRent); + + const accInfo = await connection.getAccountInfo(preparedFill); + expect(accInfo).is.null; }); - it("Token Router ..... Cannot Redeem Fast Fill with Invalid VAA Account (Not Owned by Core Bridge)", async function () { - const redeemer = Keypair.generate(); + it("Token Router ..... Cannot Redeem Same Fast Fill Again", async function () { + const vaa = localVariables.get("vaa") as PublicKey; + expect(localVariables.delete("vaa")).is.true; - const amount = 69n; - const message = new LiquidityLayerMessage({ - fastFill: { - fill: { - sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: Array.from(redeemer.publicKey.toBuffer()), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), - }, - amount, - }, - }); + const redeemedFastFill = localVariables.get("redeemedFastFill") as PublicKey; + expect(localVariables.delete("redeemedFastFill")).is.true; - const vaa = await postLiquidityLayerVaa( - connection, - payer, - MOCK_GUARDIANS, - Array.from(matchingEngine.custodianAddress().toBuffer()), - wormholeSequence++, - message, - "avalanche" - ); const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - // Replace the VAA account pubkey with garbage. - ix.keys[ix.keys.findIndex((key) => key.pubkey.equals(vaa))].pubkey = SYSVAR_RENT_PUBKEY; - - await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: ConstraintOwner"); + await expectIxErr( + connection, + [ix], + [payer], + `Allocate: account Address { address: ${redeemedFastFill.toString()}, base: None } already in use` + ); }); it("Token Router ..... Cannot Redeem Fast Fill with Emitter Chain ID != Solana", async function () { - const redeemer = Keypair.generate(); - const amount = 69n; const message = new LiquidityLayerMessage({ fastFill: { fill: { sourceChain: foreignChain, orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemer: new Array(32).fill(0), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, amount, @@ -285,28 +280,19 @@ describe("Matching Engine <> Token Router", function () { const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: InvalidEmitterForFastFill" - ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidEmitterForFastFill"); }); it("Token Router ..... Cannot Redeem Fast Fill with Emitter Address != Matching Engine Custodian", async function () { - const redeemer = Keypair.generate(); - const amount = 69n; const message = new LiquidityLayerMessage({ fastFill: { fill: { sourceChain: foreignChain, orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemer: new Array(32).fill(0), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, amount, @@ -325,16 +311,9 @@ describe("Matching Engine <> Token Router", function () { const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - await expectIxErr( - connection, - [ix], - [payer, redeemer], - "Error Code: InvalidEmitterForFastFill" - ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidEmitterForFastFill"); }); it("Token Router ..... Cannot Redeem Fast Fill with Invalid VAA", async function () { @@ -348,21 +327,15 @@ describe("Matching Engine <> Token Router", function () { "solana" ); - const redeemer = Keypair.generate(); - const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: InvalidVaa"); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidVaa"); }); it("Token Router ..... Cannot Redeem Fast Fill with Invalid Payload", async function () { - const redeemer = Keypair.generate(); - const amount = 69n; const message = new LiquidityLayerMessage({ deposit: new LiquidityLayerDeposit( @@ -379,7 +352,7 @@ describe("Matching Engine <> Token Router", function () { fill: { sourceChain: foreignChain, orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemer: new Array(32).fill(0), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, } @@ -398,11 +371,9 @@ describe("Matching Engine <> Token Router", function () { const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, - redeemer: redeemer.publicKey, - dstToken: payerToken, }); - await expectIxErr(connection, [ix], [payer, redeemer], "Error Code: InvalidPayloadId"); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidPayloadId"); }); }); }); From 0779689044cedec72d97e3f4aa8912f95910e5cd Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 22 Jan 2024 20:17:00 -0600 Subject: [PATCH 080/126] solana: test 2x speed; remove unnecessary accounts --- solana/Anchor.toml | 21 +++---------------- .../avalanche_registered_emitter.json | 14 ------------- .../accounts/wormhole_cctp/custodian.json | 14 ------------- .../ethereum_registered_emitter.json | 14 ------------- 4 files changed, 3 insertions(+), 60 deletions(-) delete mode 100644 solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json delete mode 100644 solana/ts/tests/accounts/wormhole_cctp/custodian.json delete mode 100644 solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json diff --git a/solana/Anchor.toml b/solana/Anchor.toml index 82a2a5a0..e81869d4 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -32,24 +32,9 @@ startup_wait = 16000 [test.validator] url = "https://api.devnet.solana.com" -### Wormhole CCTP Program -[[test.validator.clone]] -address = "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW" - -### Wormhole CCTP PDA -- Custodian -[[test.validator.account]] -address = "2LtnJESn3gEmte4pEBjnTjWX4Npb8esKKPeyWTN6cJP9" -filename = "ts/tests/accounts/wormhole_cctp/custodian.json" - -### Wormhole CCTP PDA -- Registered Emitter (Ethereum) -[[test.validator.account]] -address = "ERX9PQpfrY7rBJJwA62gY5dMeKmxtMRztwMcxdLJ7Eg8" -filename = "ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json" - -### Wormhole CCTP PDA -- Registered Emitter (Avalanche) -[[test.validator.account]] -address = "EaSe23XdXyWsKzmrRkwdpdUEWy4AnU5YZ8SSjQJnpji" -filename = "ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json" +### At 160 ticks/s, 64 ticks per slot implies that leader rotation and voting will happen +### every 400 ms. A fast voting cadence ensures faster finality and convergence +ticks_per_slot = 32 ### Wormhole Core Bridge Program [[test.validator.clone]] diff --git a/solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json b/solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json deleted file mode 100644 index e7850334..00000000 --- a/solana/ts/tests/accounts/wormhole_cctp/avalanche_registered_emitter.json +++ /dev/null @@ -1,14 +0,0 @@ -{ - "pubkey": "EaSe23XdXyWsKzmrRkwdpdUEWy4AnU5YZ8SSjQJnpji", - "account": { - "lamports": 1218000, - "data": [ - "hNl7+WI2j+j/AQAAAAYAAAAAAAAAAAAAAAAAWPTBdEnJBmWJHELhTTSq56JqRy4=", - "base64" - ], - "owner": "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", - "executable": false, - "rentEpoch": 18446744073709551615, - "space": 47 - } -} \ No newline at end of file diff --git a/solana/ts/tests/accounts/wormhole_cctp/custodian.json b/solana/ts/tests/accounts/wormhole_cctp/custodian.json deleted file mode 100644 index 97685263..00000000 --- a/solana/ts/tests/accounts/wormhole_cctp/custodian.json +++ /dev/null @@ -1,14 +0,0 @@ -{ - "pubkey": "2LtnJESn3gEmte4pEBjnTjWX4Npb8esKKPeyWTN6cJP9", - "account": { - "lamports": 960480, - "data": [ - "hOSLuHDkbPD/+w==", - "base64" - ], - "owner": "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", - "executable": false, - "rentEpoch": 18446744073709551615, - "space": 10 - } -} \ No newline at end of file diff --git a/solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json b/solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json deleted file mode 100644 index 315066a9..00000000 --- a/solana/ts/tests/accounts/wormhole_cctp/ethereum_registered_emitter.json +++ /dev/null @@ -1,14 +0,0 @@ -{ - "pubkey": "ERX9PQpfrY7rBJJwA62gY5dMeKmxtMRztwMcxdLJ7Eg8", - "account": { - "lamports": 1218000, - "data": [ - "hNl7+WI2j+j/AAAAAAIAAAAAAAAAAAAAAAAACmkUZxazohYiKH76FgdCTGYwaaQ=", - "base64" - ], - "owner": "wCCTPvsyeL9qYqbHTv3DUAyzEfYcyHoYw5c4mgcbBeW", - "executable": false, - "rentEpoch": 18446744073709551615, - "space": 47 - } -} \ No newline at end of file From 716eed766c35edbbba65efd7ab7e5772ffb2b79f Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 23 Jan 2024 10:12:00 -0600 Subject: [PATCH 081/126] evm: add mint recipient registry --- evm/env/localnet/arbitrum.env | 5 +- evm/env/localnet/avalanche.env | 5 +- evm/env/localnet/ethereum.env | 5 +- .../scripts/DeployTokenRouterContracts.s.sol | 7 +- evm/forge/scripts/UpgradeMatchingEngine.s.sol | 11 +- evm/forge/scripts/UpgradeTokenRouter.s.sol | 7 +- evm/forge/tests/MatchingEngine.t.sol | 61 ++++++++-- evm/forge/tests/TokenRouter.t.sol | 111 +++++++++++++++--- .../mock/MockTokenRouterImplementation.sol | 2 + .../assets/MatchingEngineAdmin.sol | 10 +- .../assets/MatchingEngineFastOrders.sol | 14 +-- evm/src/MatchingEngine/assets/State.sol | 19 ++- .../TokenRouter/TokenRouterImplementation.sol | 2 + .../TokenRouter/assets/PlaceMarketOrder.sol | 22 ++-- evm/src/TokenRouter/assets/State.sol | 16 ++- .../TokenRouter/assets/TokenRouterAdmin.sol | 7 +- evm/src/interfaces/IMatchingEngineAdmin.sol | 6 +- evm/src/interfaces/IMatchingEngineState.sol | 12 ++ evm/src/interfaces/IMatchingEngineTypes.sol | 7 +- evm/src/interfaces/ITokenRouterAdmin.sol | 6 +- evm/src/interfaces/ITokenRouterState.sol | 12 ++ evm/src/interfaces/ITokenRouterTypes.sol | 7 +- evm/ts/src/MatchingEngine/evm.ts | 9 +- evm/ts/src/MatchingEngine/index.ts | 10 +- evm/ts/src/TokenRouter/evm.ts | 6 +- evm/ts/src/TokenRouter/index.ts | 7 +- evm/ts/src/env.ts | 12 +- evm/ts/src/utils.ts | 6 +- evm/ts/tests/01__registration.ts | 56 +++++++-- evm/ts/tests/02__configuration.ts | 7 +- evm/ts/tests/04__fastMarketOrder.ts | 4 +- 31 files changed, 378 insertions(+), 93 deletions(-) diff --git a/evm/env/localnet/arbitrum.env b/evm/env/localnet/arbitrum.env index abac7460..c7ff87d6 100644 --- a/evm/env/localnet/arbitrum.env +++ b/evm/env/localnet/arbitrum.env @@ -42,7 +42,8 @@ export RELEASE_TOKEN_ROUTER_ADDRESS=0xB9c90045934D8AdBc665BC5D77c5F8C112F2a2ca ############################### Matching Engine ############################### -### Matching Engine Proxy (evm address) +### Matching Engine Proxy (universal evm address) export RELEASE_MATCHING_ENGINE_CHAIN=6 -export RELEASE_MATCHING_ENGINE_ADDRESS=0xB9c90045934D8AdBc665BC5D77c5F8C112F2a2ca +export RELEASE_MATCHING_ENGINE_ADDRESS=0x000000000000000000000000B9c90045934D8AdBc665BC5D77c5F8C112F2a2ca +export RELEASE_MATCHING_ENGINE_MINT_RECIPIENT=0x000000000000000000000000B9c90045934D8AdBc665BC5D77c5F8C112F2a2ca export RELEASE_MATCHING_ENGINE_DOMAIN=1 \ No newline at end of file diff --git a/evm/env/localnet/avalanche.env b/evm/env/localnet/avalanche.env index e97e05be..4d2803df 100644 --- a/evm/env/localnet/avalanche.env +++ b/evm/env/localnet/avalanche.env @@ -49,9 +49,10 @@ export RELEASE_TOKEN_ROUTER_ADDRESS=0x438fDf069b811b871280AECd130D58ab6EC5c0Bc ############################### Matching Engine ############################### -### Matching Engine Proxy (evm address) +### Matching Engine Proxy (universal evm address) export RELEASE_MATCHING_ENGINE_CHAIN=6 -export RELEASE_MATCHING_ENGINE_ADDRESS=0xB9c90045934D8AdBc665BC5D77c5F8C112F2a2ca +export RELEASE_MATCHING_ENGINE_ADDRESS=0x000000000000000000000000B9c90045934D8AdBc665BC5D77c5F8C112F2a2ca +export RELEASE_MATCHING_ENGINE_MINT_RECIPIENT=0x000000000000000000000000B9c90045934D8AdBc665BC5D77c5F8C112F2a2ca export RELEASE_MATCHING_ENGINE_DOMAIN=1 diff --git a/evm/env/localnet/ethereum.env b/evm/env/localnet/ethereum.env index 6c439fd9..05e1fac4 100644 --- a/evm/env/localnet/ethereum.env +++ b/evm/env/localnet/ethereum.env @@ -42,7 +42,8 @@ export RELEASE_TOKEN_ROUTER_ADDRESS=0xd98bfe6915cE92D4915149941246d36504125501 ############################### Matching Engine ############################### -### Matching Engine Proxy (evm address) +### Matching Engine Proxy (universal evm address) export RELEASE_MATCHING_ENGINE_CHAIN=6 -export RELEASE_MATCHING_ENGINE_ADDRESS=0xB9c90045934D8AdBc665BC5D77c5F8C112F2a2ca +export RELEASE_MATCHING_ENGINE_ADDRESS=0x000000000000000000000000B9c90045934D8AdBc665BC5D77c5F8C112F2a2ca +export RELEASE_MATCHING_ENGINE_MINT_RECIPIENT=0x000000000000000000000000B9c90045934D8AdBc665BC5D77c5F8C112F2a2ca export RELEASE_MATCHING_ENGINE_DOMAIN=1 \ No newline at end of file diff --git a/evm/forge/scripts/DeployTokenRouterContracts.s.sol b/evm/forge/scripts/DeployTokenRouterContracts.s.sol index 9b6af2cc..f22cf30b 100644 --- a/evm/forge/scripts/DeployTokenRouterContracts.s.sol +++ b/evm/forge/scripts/DeployTokenRouterContracts.s.sol @@ -25,7 +25,9 @@ contract DeployTokenRouterContracts is CheckWormholeContracts, Script { address immutable _wormhole = vm.envAddress("RELEASE_WORMHOLE_ADDRESS"); address immutable _cctpTokenMessenger = vm.envAddress("RELEASE_TOKEN_MESSENGER_ADDRESS"); address immutable _ownerAssistantAddress = vm.envAddress("RELEASE_OWNER_ASSISTANT_ADDRESS"); - address immutable _matchingEngineAddress = vm.envAddress("RELEASE_MATCHING_ENGINE_ADDRESS"); + bytes32 immutable _matchingEngineAddress = vm.envBytes32("RELEASE_MATCHING_ENGINE_ADDRESS"); + bytes32 immutable _matchingEngineMintRecipient = + vm.envBytes32("RELEASE_MATCHING_ENGINE_MINT_RECIPIENT"); uint16 immutable _matchingEngineChain = uint16(vm.envUint("RELEASE_MATCHING_ENGINE_CHAIN")); uint32 immutable _matchingEngineDomain = uint32(vm.envUint("RELEASE_MATCHING_ENGINE_DOMAIN")); @@ -37,7 +39,8 @@ contract DeployTokenRouterContracts is CheckWormholeContracts, Script { _wormhole, _cctpTokenMessenger, _matchingEngineChain, - _matchingEngineAddress.toUniversalAddress(), + _matchingEngineAddress, + _matchingEngineMintRecipient, _matchingEngineDomain ); diff --git a/evm/forge/scripts/UpgradeMatchingEngine.s.sol b/evm/forge/scripts/UpgradeMatchingEngine.s.sol index 63c8e4ec..7efdb64f 100644 --- a/evm/forge/scripts/UpgradeMatchingEngine.s.sol +++ b/evm/forge/scripts/UpgradeMatchingEngine.s.sol @@ -16,12 +16,17 @@ import {MatchingEngineImplementation} from import {CheckWormholeContracts} from "./helpers/CheckWormholeContracts.sol"; +import {Utils} from "../../src/shared/Utils.sol"; + contract UpgradeMatchingEngine is CheckWormholeContracts, Script { + using Utils for bytes32; + uint16 immutable _chainId = uint16(vm.envUint("RELEASE_CHAIN_ID")); address immutable _token = vm.envAddress("RELEASE_TOKEN_ADDRESS"); address immutable _wormhole = vm.envAddress("RELEASE_WORMHOLE_ADDRESS"); address immutable _cctpTokenMessenger = vm.envAddress("RELEASE_TOKEN_MESSENGER_ADDRESS"); - address immutable _matchingEngineAddress = vm.envAddress("RELEASE_MATCHING_ENGINE_ADDRESS"); + bytes32 immutable _matchingEngineAddress = + vm.envBytes32("RELEASE_MATCHING_ENGINE_MINT_RECIPIENT"); // Auction parameters. uint24 immutable _userPenaltyRewardBps = uint24(vm.envUint("RELEASE_USER_REWARD_BPS")); @@ -43,7 +48,9 @@ contract UpgradeMatchingEngine is CheckWormholeContracts, Script { _auctionGracePeriod, _auctionPenaltyBlocks ); - IMatchingEngine(_matchingEngineAddress).upgradeContract(address(implementation)); + IMatchingEngine(_matchingEngineAddress.fromUniversalAddress()).upgradeContract( + address(implementation) + ); } function run() public { diff --git a/evm/forge/scripts/UpgradeTokenRouter.s.sol b/evm/forge/scripts/UpgradeTokenRouter.s.sol index a3d2efe5..2ee7b2a0 100644 --- a/evm/forge/scripts/UpgradeTokenRouter.s.sol +++ b/evm/forge/scripts/UpgradeTokenRouter.s.sol @@ -25,7 +25,9 @@ contract UpgradeTokenRouter is CheckWormholeContracts, Script { address immutable _wormhole = vm.envAddress("RELEASE_WORMHOLE_ADDRESS"); address immutable _cctpTokenMessenger = vm.envAddress("RELEASE_TOKEN_MESSENGER_ADDRESS"); address immutable _ownerAssistantAddress = vm.envAddress("RELEASE_OWNER_ASSISTANT_ADDRESS"); - address immutable _matchingEngineAddress = vm.envAddress("RELEASE_MATCHING_ENGINE_ADDRESS"); + bytes32 immutable _matchingEngineAddress = vm.envBytes32("RELEASE_MATCHING_ENGINE_ADDRESS"); + bytes32 immutable _matchingEngineMintRecipient = + vm.envBytes32("RELEASE_MATCHING_ENGINE_MINT_RECIPIENT"); uint16 immutable _matchingEngineChain = uint16(vm.envUint("RELEASE_MATCHING_ENGINE_CHAIN")); uint32 immutable _matchingEngineDomain = uint32(vm.envUint("RELEASE_MATCHING_ENGINE_DOMAIN")); @@ -37,7 +39,8 @@ contract UpgradeTokenRouter is CheckWormholeContracts, Script { _wormhole, _cctpTokenMessenger, _matchingEngineChain, - _matchingEngineAddress.toUniversalAddress(), + _matchingEngineAddress, + _matchingEngineMintRecipient, _matchingEngineDomain ); diff --git a/evm/forge/tests/MatchingEngine.t.sol b/evm/forge/tests/MatchingEngine.t.sol index 2886f571..b5fdbd35 100644 --- a/evm/forge/tests/MatchingEngine.t.sol +++ b/evm/forge/tests/MatchingEngine.t.sol @@ -31,7 +31,8 @@ import {IMatchingEngine} from "../../src/interfaces/IMatchingEngine.sol"; import { LiveAuctionData, AuctionStatus, - CctpMessage + CctpMessage, + RouterEndpoint } from "../../src/interfaces/IMatchingEngineTypes.sol"; import {FastTransferParameters} from "../../src/interfaces/ITokenRouterTypes.sol"; @@ -137,8 +138,12 @@ contract MatchingEngineTest is Test { engine.setCctpAllowance(type(uint256).max); // Set up the router endpoints. - engine.addRouterEndpoint(ARB_CHAIN, ARB_ROUTER); - engine.addRouterEndpoint(ETH_CHAIN, ETH_ROUTER); + engine.addRouterEndpoint( + ARB_CHAIN, RouterEndpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}) + ); + engine.addRouterEndpoint( + ETH_CHAIN, RouterEndpoint({router: ETH_ROUTER, mintRecipient: ETH_ROUTER}) + ); vm.stopPrank(); @@ -277,40 +282,66 @@ contract MatchingEngineTest is Test { function testAddRouterEndpoint() public { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); assertEq(engine.getRouter(chain), bytes32(0)); + assertEq(engine.getMintRecipient(chain), bytes32(0)); vm.prank(makeAddr("owner")); - engine.addRouterEndpoint(chain, routerEndpoint); + engine.addRouterEndpoint( + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + ); assertEq(engine.getRouter(chain), routerEndpoint); + assertEq(engine.getMintRecipient(chain), mintRecipient); } function testCannotAddRouterEndpointChainIdZero() public { uint16 chain = 0; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrChainNotAllowed(uint16)", chain)); - engine.addRouterEndpoint(chain, routerEndpoint); + engine.addRouterEndpoint( + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + ); } - function testCannotAddRouterEndpointInvalidEndpoint() public { + function testCannotAddRouterEndpointInvalidRouter() public { uint16 chain = 1; bytes32 routerEndpoint = bytes32(0); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrInvalidEndpoint(bytes32)", routerEndpoint)); - engine.addRouterEndpoint(chain, routerEndpoint); + engine.addRouterEndpoint( + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + ); + } + + function testCannotAddRouterEndpointInvalidMintRecipient() public { + uint16 chain = 1; + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = bytes32(0); + + vm.prank(makeAddr("owner")); + vm.expectRevert(abi.encodeWithSignature("ErrInvalidEndpoint(bytes32)", mintRecipient)); + engine.addRouterEndpoint( + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + ); } function testCannotAddRouterEndpointOwnerOrAssistantOnly() public { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); vm.prank(makeAddr("robber")); vm.expectRevert(abi.encodeWithSignature("NotTheOwnerOrAssistant()")); - engine.addRouterEndpoint(chain, routerEndpoint); + engine.addRouterEndpoint( + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + ); } function testUpdateFeeRecipient() public { @@ -1159,7 +1190,10 @@ contract MatchingEngineTest is Test { // Change the address for the arb router. vm.prank(makeAddr("owner")); - engine.addRouterEndpoint(ARB_CHAIN, bytes32("deadbeef")); + engine.addRouterEndpoint( + ARB_CHAIN, + RouterEndpoint({router: bytes32("deadbeef"), mintRecipient: bytes32("beefdead")}) + ); vm.expectRevert( abi.encodeWithSignature( @@ -1523,6 +1557,7 @@ contract MatchingEngineTest is Test { CIRCLE_BRIDGE.fromUniversalAddress(), AVAX_CHAIN, address(engine).toUniversalAddress(), + address(engine).toUniversalAddress(), ENGINE_DOMAIN ); @@ -1532,7 +1567,13 @@ contract MatchingEngineTest is Test { address proxy = setup.deployProxy(address(implementation), makeAddr("ownerAssistant")); vm.prank(makeAddr("owner")); - engine.addRouterEndpoint(AVAX_CHAIN, proxy.toUniversalAddress()); + engine.addRouterEndpoint( + AVAX_CHAIN, + RouterEndpoint({ + router: proxy.toUniversalAddress(), + mintRecipient: proxy.toUniversalAddress() + }) + ); return ITokenRouter(proxy); } diff --git a/evm/forge/tests/TokenRouter.t.sol b/evm/forge/tests/TokenRouter.t.sol index edffa60f..d6914c17 100644 --- a/evm/forge/tests/TokenRouter.t.sol +++ b/evm/forge/tests/TokenRouter.t.sol @@ -29,7 +29,7 @@ import {Messages} from "../../src/shared/Messages.sol"; import {Utils} from "../../src/shared/Utils.sol"; import "../../src/interfaces/ITokenRouter.sol"; -import {FastTransferParameters} from "../../src/interfaces/ITokenRouterTypes.sol"; +import {FastTransferParameters, Endpoint} from "../../src/interfaces/ITokenRouterTypes.sol"; import {WormholeCctpMessages} from "../../src/shared/WormholeCctpMessages.sol"; @@ -62,9 +62,11 @@ contract TokenRouterTest is Test { uint64 immutable FAST_TRANSFER_BASE_FEE = 1e6; // 1 USDC. uint64 immutable FAST_TRANSFER_INIT_AUCTION_FEE = 1e6; // 1 USDC. - // Matching engine (Ethereum). + // Matching engine (Ethereum). Setting the matching engine mint recipient to + // a different address for testing purposes. uint16 immutable matchingEngineChain = 2; bytes32 immutable matchingEngineAddress = makeAddr("ME").toUniversalAddress(); + bytes32 immutable matchingEngineMintRecipient = makeAddr("MR").toUniversalAddress(); uint32 immutable matchingEngineDomain = 0; // Test. @@ -86,6 +88,7 @@ contract TokenRouterTest is Test { _tokenMessenger, matchingEngineChain, matchingEngineAddress, + matchingEngineMintRecipient, matchingEngineDomain ); @@ -106,7 +109,9 @@ contract TokenRouterTest is Test { router.setCctpAllowance(type(uint256).max); // Register target chain endpoints. - router.addRouterEndpoint(ARB_CHAIN, ARB_ROUTER, ARB_DOMAIN); + router.addRouterEndpoint( + ARB_CHAIN, Endpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}), ARB_DOMAIN + ); // Set the fast transfer parameters for Arbitrum. router.updateFastTransferParameters( @@ -138,6 +143,7 @@ contract TokenRouterTest is Test { CIRCLE_BRIDGE, matchingEngineChain, matchingEngineAddress, + matchingEngineMintRecipient, matchingEngineDomain ); @@ -161,6 +167,7 @@ contract TokenRouterTest is Test { CIRCLE_BRIDGE, matchingEngineChain, matchingEngineAddress, + matchingEngineMintRecipient, matchingEngineDomain ); @@ -347,56 +354,86 @@ contract TokenRouterTest is Test { function testAddRouterEndpoint() public { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = routerEndpoint; uint32 domain = 1; assertEq(router.getRouter(chain), bytes32(0)); + assertEq(router.getMintRecipient(chain), bytes32(0)); assertEq(router.getDomain(chain), 0); vm.prank(makeAddr("owner")); - router.addRouterEndpoint(chain, routerEndpoint, domain); + router.addRouterEndpoint( + chain, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); assertEq(router.getRouter(chain), routerEndpoint); + assertEq(router.getMintRecipient(chain), mintRecipient); assertEq(router.getDomain(chain), domain); } function testCannotAddRouterEndpointChainIdZero() public { uint16 chain = 0; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = routerEndpoint; uint32 domain = 1; vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrChainNotAllowed(uint16)", chain)); - router.addRouterEndpoint(chain, routerEndpoint, domain); + router.addRouterEndpoint( + chain, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); } function testCannotAddRouterEndpointThisChain() public { uint16 chain = router.wormholeChainId(); bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = routerEndpoint; uint32 domain = 1; vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrChainNotAllowed(uint16)", chain)); - router.addRouterEndpoint(chain, routerEndpoint, domain); + router.addRouterEndpoint( + chain, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); } - function testCannotAddRouterEndpointInvalidEndpoint() public { + function testCannotAddRouterEndpointInvalidRouter() public { uint16 chain = 1; bytes32 routerEndpoint = bytes32(0); + bytes32 mintRecipient = routerEndpoint; uint32 domain = 1; vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrInvalidEndpoint(bytes32)", routerEndpoint)); - router.addRouterEndpoint(chain, routerEndpoint, domain); + router.addRouterEndpoint( + chain, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); + } + + function testCannotAddRouterEndpointInvalidMintRecipient() public { + uint16 chain = 1; + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = bytes32(0); + uint32 domain = 1; + + vm.prank(makeAddr("owner")); + vm.expectRevert(abi.encodeWithSignature("ErrInvalidEndpoint(bytes32)", mintRecipient)); + router.addRouterEndpoint( + chain, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); } function testCannotAddRouterEndpointOwnerOrAssistantOnly() public { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = routerEndpoint; uint32 domain = 1; vm.prank(makeAddr("robber")); vm.expectRevert(abi.encodeWithSignature("NotTheOwnerOrAssistant()")); - router.addRouterEndpoint(chain, routerEndpoint, domain); + router.addRouterEndpoint( + chain, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); } function testUpdateFastTransferParameters() public { @@ -707,6 +744,49 @@ contract TokenRouterTest is Test { assertEq(payload, expectedFill.encode()); } + function testPlaceMarketOrderDifferentMintRecipient() public { + uint64 amountIn = 690000; + + _dealAndApproveUsdc(router, amountIn); + + Messages.Fill memory expectedFill = Messages.Fill({ + sourceChain: router.wormholeChainId(), + orderSender: address(this).toUniversalAddress(), + redeemer: TEST_REDEEMER, + redeemerMessage: bytes("All your base are belong to us") + }); + + { + vm.prank(makeAddr("owner")); + router.addRouterEndpoint( + ARB_CHAIN, + Endpoint({router: ARB_ROUTER, mintRecipient: bytes32("c0ffee")}), + ARB_DOMAIN + ); + } + + // Place the order and parse the deposit message. + ( + bytes32 token, + uint256 amount, + uint32 sourceCctpDomain, + uint32 targetCctpDomain, + , + bytes32 burnSource, + bytes32 mintRecipient, + bytes memory payload + ) = _placeMarketOrder(router, amountIn, ARB_CHAIN, expectedFill).decodeDeposit(); + + // Compare the expected values with the actual deposit message. + assertEq(token, USDC_ADDRESS.toUniversalAddress()); + assertEq(amount, amountIn); + assertEq(sourceCctpDomain, AVAX_DOMAIN); + assertEq(targetCctpDomain, ARB_DOMAIN); + assertEq(burnSource, address(this).toUniversalAddress()); + assertEq(mintRecipient, router.getMintRecipient(ARB_CHAIN)); + assertEq(payload, expectedFill.encode()); + } + function testCannotPlaceFastMarketOrderErrInvalidRefundAddress() public { bytes memory encodedSignature = abi.encodeWithSignature( "placeFastMarketOrder(uint64,uint64,uint16,bytes32,bytes,address,uint64,uint32)", @@ -911,7 +991,7 @@ contract TokenRouterTest is Test { assertEq(sourceCctpDomain, AVAX_DOMAIN); assertEq(targetCctpDomain, matchingEngineDomain); assertEq(burnSource, address(this).toUniversalAddress()); - assertEq(mintRecipient, matchingEngineAddress); + assertEq(mintRecipient, matchingEngineMintRecipient); assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); } @@ -975,7 +1055,7 @@ contract TokenRouterTest is Test { assertEq(sourceCctpDomain, AVAX_DOMAIN); assertEq(targetCctpDomain, matchingEngineDomain); assertEq(burnSource, address(this).toUniversalAddress()); - assertEq(mintRecipient, matchingEngineAddress); + assertEq(mintRecipient, matchingEngineMintRecipient); assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); } @@ -993,10 +1073,13 @@ contract TokenRouterTest is Test { // Register a router for the matching engine chain. uint16 targetChain = matchingEngineChain; - bytes32 targetRouter = makeAddr("targetRouter").toUniversalAddress(); + Endpoint memory targetEndpoint = Endpoint({ + router: makeAddr("targetRouter").toUniversalAddress(), + mintRecipient: makeAddr("targetRouter").toUniversalAddress() + }); vm.prank(makeAddr("owner")); - router.addRouterEndpoint(targetChain, targetRouter, matchingEngineDomain); + router.addRouterEndpoint(targetChain, targetEndpoint, matchingEngineDomain); // Create a fast market order, this is actually the payload that will be encoded // in the "slow message". @@ -1038,7 +1121,7 @@ contract TokenRouterTest is Test { assertEq(sourceCctpDomain, AVAX_DOMAIN); assertEq(targetCctpDomain, matchingEngineDomain); assertEq(burnSource, address(this).toUniversalAddress()); - assertEq(mintRecipient, matchingEngineAddress); + assertEq(mintRecipient, matchingEngineMintRecipient); assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); } diff --git a/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol b/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol index ba3d9f66..b3aaf8e3 100644 --- a/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol +++ b/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol @@ -19,6 +19,7 @@ contract MockTokenRouterImplementation is TokenRouterImplementation { address _cctpTokenMessenger, uint16 _matchingEngineChain, bytes32 _matchingEngineAddress, + bytes32 _matchingEngineMintRecipient, uint32 _matchingEngineDomain ) TokenRouterImplementation( @@ -27,6 +28,7 @@ contract MockTokenRouterImplementation is TokenRouterImplementation { _cctpTokenMessenger, _matchingEngineChain, _matchingEngineAddress, + _matchingEngineMintRecipient, _matchingEngineDomain ) {} diff --git a/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol b/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol index 7b9fe98e..3d98e698 100644 --- a/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol +++ b/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol @@ -8,20 +8,24 @@ import "./Errors.sol"; import {State} from "./State.sol"; import {getRouterEndpointState, getFeeRecipientState} from "./Storage.sol"; +import {RouterEndpoint} from "../../interfaces/IMatchingEngineTypes.sol"; import {IMatchingEngineAdmin} from "../../interfaces/IMatchingEngineAdmin.sol"; abstract contract MatchingEngineAdmin is IMatchingEngineAdmin, Admin, State { /// @inheritdoc IMatchingEngineAdmin - function addRouterEndpoint(uint16 chain, bytes32 router) external onlyOwnerOrAssistant { + function addRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint) + external + onlyOwnerOrAssistant + { if (chain == 0) { revert ErrChainNotAllowed(chain); } - if (router == bytes32(0)) { + if (endpoint.router == bytes32(0) || endpoint.mintRecipient == bytes32(0)) { revert ErrInvalidEndpoint(bytes32(0)); } - getRouterEndpointState().endpoints[chain] = router; + getRouterEndpointState().endpoints[chain] = endpoint; } /// @inheritdoc IMatchingEngineAdmin diff --git a/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol index d03cb249..27133008 100644 --- a/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol +++ b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol @@ -14,7 +14,7 @@ import {IMatchingEngineFastOrders} from "../../interfaces/IMatchingEngineFastOrd import "./Errors.sol"; import {State} from "./State.sol"; import {Utils} from "../../shared/Utils.sol"; -import {CctpMessage} from "../../interfaces/IMatchingEngineTypes.sol"; +import {CctpMessage, RouterEndpoint} from "../../interfaces/IMatchingEngineTypes.sol"; import { getRouterEndpointState, LiveAuctionData, @@ -261,7 +261,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { fastFills.redeemed[vaa.hash] = true; // Only the TokenRouter from this chain (_chainId) can redeem this message type. - bytes32 expectedRouter = getRouterEndpointState().endpoints[_chainId]; + bytes32 expectedRouter = getRouterEndpointState().endpoints[_chainId].router; bytes32 callingRouter = msg.sender.toUniversalAddress(); if (expectedRouter != callingRouter) { revert ErrInvalidSourceRouter(callingRouter, expectedRouter); @@ -297,15 +297,15 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { FINALITY ); } else { - bytes32 targetRouter = getRouterEndpointState().endpoints[order.targetChain]; + RouterEndpoint memory endpoint = getRouterEndpointState().endpoints[order.targetChain]; // Burn the tokens and publish the message to the target chain. (sequence,) = burnAndPublish( - targetRouter, + endpoint.router, order.targetDomain, address(_token), amount, - targetRouter, + endpoint.mintRecipient, NONCE, Messages.Fill({ sourceChain: sourceChain, @@ -355,12 +355,12 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { } function _verifyRouterPath(uint16 chain, bytes32 fromRouter, uint16 targetChain) private view { - bytes32 expectedRouter = getRouterEndpointState().endpoints[chain]; + bytes32 expectedRouter = getRouterEndpointState().endpoints[chain].router; if (fromRouter != expectedRouter) { revert ErrInvalidSourceRouter(fromRouter, expectedRouter); } - if (getRouterEndpointState().endpoints[targetChain] == bytes32(0)) { + if (getRouterEndpointState().endpoints[targetChain].router == bytes32(0)) { revert ErrInvalidTargetRouter(targetChain); } } diff --git a/evm/src/MatchingEngine/assets/State.sol b/evm/src/MatchingEngine/assets/State.sol index 1053ad5b..6e3638f1 100644 --- a/evm/src/MatchingEngine/assets/State.sol +++ b/evm/src/MatchingEngine/assets/State.sol @@ -4,6 +4,7 @@ pragma solidity ^0.8.19; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; import {IWormhole} from "wormhole-solidity/IWormhole.sol"; import {IMatchingEngineState} from "../../interfaces/IMatchingEngineState.sol"; +import {RouterEndpoint} from "../../interfaces/IMatchingEngineTypes.sol"; import "./Errors.sol"; @@ -117,22 +118,32 @@ abstract contract State is IMatchingEngineState, WormholeCctpTokenMessenger { } /// @inheritdoc IMatchingEngineState - function getDeployer() external view returns (address) { + function getDeployer() public view returns (address) { return _deployer; } /// @inheritdoc IMatchingEngineState function getRouter(uint16 chain) public view returns (bytes32) { + return getRouterEndpointState().endpoints[chain].router; + } + + /// @inheritdoc IMatchingEngineState + function getMintRecipient(uint16 chain) public view returns (bytes32) { + return getRouterEndpointState().endpoints[chain].mintRecipient; + } + + /// @inheritdoc IMatchingEngineState + function getRouterEndpoint(uint16 chain) public view returns (RouterEndpoint memory) { return getRouterEndpointState().endpoints[chain]; } /// @inheritdoc IMatchingEngineState - function wormhole() external view returns (IWormhole) { + function wormhole() public view returns (IWormhole) { return _wormhole; } /// @inheritdoc IMatchingEngineState - function wormholeChainId() external view returns (uint16) { + function wormholeChainId() public view returns (uint16) { return _chainId; } @@ -142,7 +153,7 @@ abstract contract State is IMatchingEngineState, WormholeCctpTokenMessenger { } /// @inheritdoc IMatchingEngineState - function token() external view returns (IERC20) { + function token() public view returns (IERC20) { return _token; } diff --git a/evm/src/TokenRouter/TokenRouterImplementation.sol b/evm/src/TokenRouter/TokenRouterImplementation.sol index 55375f57..d3767df0 100644 --- a/evm/src/TokenRouter/TokenRouterImplementation.sol +++ b/evm/src/TokenRouter/TokenRouterImplementation.sol @@ -23,6 +23,7 @@ contract TokenRouterImplementation is TokenRouterAdmin, PlaceMarketOrder, Redeem address cctpTokenMessenger_, uint16 matchingEngineChain_, bytes32 matchingEngineAddress_, + bytes32 matchingEngineMintRecipient_, uint32 matchingEngineDomain_ ) State( @@ -31,6 +32,7 @@ contract TokenRouterImplementation is TokenRouterAdmin, PlaceMarketOrder, Redeem cctpTokenMessenger_, matchingEngineChain_, matchingEngineAddress_, + matchingEngineMintRecipient_, matchingEngineDomain_ ) {} diff --git a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol index 0ab627fe..782f074a 100644 --- a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol +++ b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol @@ -12,8 +12,12 @@ import {Utils} from "../../shared/Utils.sol"; import "./Errors.sol"; import {State} from "./State.sol"; -import {FastTransferParameters} from "../../interfaces/ITokenRouterTypes.sol"; -import {getFastTransferParametersState, getCircleDomainsState} from "./Storage.sol"; +import {FastTransferParameters, Endpoint} from "../../interfaces/ITokenRouterTypes.sol"; +import { + getFastTransferParametersState, + getCircleDomainsState, + getRouterEndpointState +} from "./Storage.sol"; import "../../interfaces/IPlaceMarketOrder.sol"; @@ -103,16 +107,16 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { revert ErrInsufficientAmount(0, 0); } - bytes32 targetRouter = _verifyTarget(targetChain, redeemer); + Endpoint memory endpoint = _verifyTarget(targetChain, redeemer); SafeERC20.safeTransferFrom(_orderToken, msg.sender, address(this), amountIn); (sequence, cctpNonce) = burnAndPublish( - targetRouter, + endpoint.router, getCircleDomainsState().domains[targetChain], address(_orderToken), amountIn, - targetRouter, + endpoint.mintRecipient, NONCE, Messages.Fill({ sourceChain: _chainId, @@ -169,7 +173,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { _matchingEngineDomain, address(_orderToken), amountIn, - _matchingEngineAddress, + _matchingEngineMintRecipient, NONCE, Messages.SlowOrderResponse({baseFee: fastParams.baseFee}).encode(), messageFee @@ -198,15 +202,15 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { function _verifyTarget(uint16 targetChain, bytes32 redeemer) private view - returns (bytes32 targetRouter) + returns (Endpoint storage endpoint) { if (redeemer == bytes32(0)) { revert ErrInvalidRedeemerAddress(); } // This check also validates that a target domain has been set. - targetRouter = getRouter(targetChain); - if (targetRouter == bytes32(0)) { + endpoint = getRouterEndpointState().endpoints[targetChain]; + if (endpoint.router == bytes32(0)) { revert ErrUnsupportedChain(targetChain); } } diff --git a/evm/src/TokenRouter/assets/State.sol b/evm/src/TokenRouter/assets/State.sol index 0c1fca87..9d924e3c 100644 --- a/evm/src/TokenRouter/assets/State.sol +++ b/evm/src/TokenRouter/assets/State.sol @@ -7,7 +7,7 @@ import {IWormhole} from "wormhole-solidity/IWormhole.sol"; import {ITokenRouterState} from "../../interfaces/ITokenRouterState.sol"; import "./Errors.sol"; -import {FastTransferParameters} from "../../interfaces/ITokenRouterTypes.sol"; +import {FastTransferParameters, Endpoint} from "../../interfaces/ITokenRouterTypes.sol"; import { getRouterEndpointState, getFastTransferParametersState, @@ -24,6 +24,7 @@ abstract contract State is ITokenRouterState, WormholeCctpTokenMessenger { // Matching engine info. uint16 immutable _matchingEngineChain; bytes32 immutable _matchingEngineAddress; + bytes32 immutable _matchingEngineMintRecipient; uint32 immutable _matchingEngineDomain; // Consts. @@ -37,16 +38,19 @@ abstract contract State is ITokenRouterState, WormholeCctpTokenMessenger { address cctpTokenMessenger_, uint16 matchingEngineChain_, bytes32 matchingEngineAddress_, + bytes32 matchingEngineMintRecipient_, uint32 matchingEngineDomain_ ) WormholeCctpTokenMessenger(wormhole_, cctpTokenMessenger_) { assert(token_ != address(0)); assert(matchingEngineChain_ != 0); assert(matchingEngineAddress_ != bytes32(0)); + assert(matchingEngineMintRecipient_ != bytes32(0)); _deployer = msg.sender; _orderToken = IERC20(token_); _matchingEngineChain = matchingEngineChain_; _matchingEngineAddress = matchingEngineAddress_; + _matchingEngineMintRecipient = matchingEngineMintRecipient_; _matchingEngineDomain = matchingEngineDomain_; } @@ -57,6 +61,16 @@ abstract contract State is ITokenRouterState, WormholeCctpTokenMessenger { /// @inheritdoc ITokenRouterState function getRouter(uint16 chain) public view returns (bytes32) { + return getRouterEndpointState().endpoints[chain].router; + } + + /// @inheritdoc ITokenRouterState + function getMintRecipient(uint16 chain) public view returns (bytes32) { + return getRouterEndpointState().endpoints[chain].mintRecipient; + } + + /// @inheritdoc ITokenRouterState + function getRouterEndpoint(uint16 chain) public view returns (Endpoint memory) { return getRouterEndpointState().endpoints[chain]; } diff --git a/evm/src/TokenRouter/assets/TokenRouterAdmin.sol b/evm/src/TokenRouter/assets/TokenRouterAdmin.sol index 6547ad60..ea651d4b 100644 --- a/evm/src/TokenRouter/assets/TokenRouterAdmin.sol +++ b/evm/src/TokenRouter/assets/TokenRouterAdmin.sol @@ -13,11 +13,12 @@ import { FastTransferParameters } from "./Storage.sol"; +import {Endpoint} from "../../interfaces/ITokenRouterTypes.sol"; import {ITokenRouterAdmin} from "../../interfaces/ITokenRouterAdmin.sol"; abstract contract TokenRouterAdmin is ITokenRouterAdmin, Admin, State { /// @inheritdoc ITokenRouterAdmin - function addRouterEndpoint(uint16 chain, bytes32 router, uint32 circleDomain) + function addRouterEndpoint(uint16 chain, Endpoint memory endpoint, uint32 circleDomain) external onlyOwnerOrAssistant { @@ -25,11 +26,11 @@ abstract contract TokenRouterAdmin is ITokenRouterAdmin, Admin, State { revert ErrChainNotAllowed(chain); } - if (router == bytes32(0)) { + if (endpoint.router == bytes32(0) || endpoint.mintRecipient == bytes32(0)) { revert ErrInvalidEndpoint(bytes32(0)); } - getRouterEndpointState().endpoints[chain] = router; + getRouterEndpointState().endpoints[chain] = endpoint; getCircleDomainsState().domains[chain] = circleDomain; } diff --git a/evm/src/interfaces/IMatchingEngineAdmin.sol b/evm/src/interfaces/IMatchingEngineAdmin.sol index 39046964..1e0fd14c 100644 --- a/evm/src/interfaces/IMatchingEngineAdmin.sol +++ b/evm/src/interfaces/IMatchingEngineAdmin.sol @@ -1,15 +1,17 @@ // SPDX-License-Identifier: Apache 2 +import {RouterEndpoint} from "./IMatchingEngineTypes.sol"; + pragma solidity ^0.8.0; interface IMatchingEngineAdmin { /** * @notice Add a `router` endpoint for the specified Wormhole `chain`. * @param chain The Wormhole chain ID. - * @param router The `router` address in Wormhole universal format. + * @param endpoint The `Endpoint` for the specified `chain`. * @dev This function is only callable by the contract owner or assistant. */ - function addRouterEndpoint(uint16 chain, bytes32 router) external; + function addRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint) external; /** * @notice Updates the `feeRecipient` state variable. This method can diff --git a/evm/src/interfaces/IMatchingEngineState.sol b/evm/src/interfaces/IMatchingEngineState.sol index 31264c87..86cd7a45 100644 --- a/evm/src/interfaces/IMatchingEngineState.sol +++ b/evm/src/interfaces/IMatchingEngineState.sol @@ -43,6 +43,18 @@ interface IMatchingEngineState { */ function getRouter(uint16 chain) external view returns (bytes32); + /** + * @notice Returns the mint recipient for a given chain ID. + * @param chain The Wormhole chain ID. + */ + function getMintRecipient(uint16 chain) external view returns (bytes32); + + /** + * @notice Returns the router endpoint for a given chain ID. + * @param chain The Wormhole chain ID. + */ + function getRouterEndpoint(uint16 chain) external view returns (RouterEndpoint memory); + /** * @notice Returns the Wormhole contract interface. */ diff --git a/evm/src/interfaces/IMatchingEngineTypes.sol b/evm/src/interfaces/IMatchingEngineTypes.sol index 503066fe..136d4473 100644 --- a/evm/src/interfaces/IMatchingEngineTypes.sol +++ b/evm/src/interfaces/IMatchingEngineTypes.sol @@ -16,9 +16,14 @@ struct FeeRecipient { address recipient; } +struct RouterEndpoint { + bytes32 router; + bytes32 mintRecipient; +} + struct RouterEndpoints { // Mapping of chain ID to router address in Wormhole universal format. - mapping(uint16 chain => bytes32 endpoint) endpoints; + mapping(uint16 chain => RouterEndpoint endpoint) endpoints; } enum AuctionStatus { diff --git a/evm/src/interfaces/ITokenRouterAdmin.sol b/evm/src/interfaces/ITokenRouterAdmin.sol index c27d474c..e4bbcce2 100644 --- a/evm/src/interfaces/ITokenRouterAdmin.sol +++ b/evm/src/interfaces/ITokenRouterAdmin.sol @@ -2,17 +2,17 @@ pragma solidity ^0.8.0; -import {FastTransferParameters} from "./ITokenRouterTypes.sol"; +import {Endpoint, FastTransferParameters} from "./ITokenRouterTypes.sol"; interface ITokenRouterAdmin { /** * @notice Add a `router` endpoint for the specified Wormhole `chain`. * @param chain The Wormhole chain ID. - * @param router The `router` address in Wormhole universal format. + * @param endpoint The `Endpoint` for the specified `chain`. * @param domain The Circle domain for the specified `chain`. * @dev This function is only callable by the contract owner or assistant. */ - function addRouterEndpoint(uint16 chain, bytes32 router, uint32 domain) external; + function addRouterEndpoint(uint16 chain, Endpoint memory endpoint, uint32 domain) external; /** * @notice Update the fast transfer parameters. diff --git a/evm/src/interfaces/ITokenRouterState.sol b/evm/src/interfaces/ITokenRouterState.sol index d94f6211..669c85a4 100644 --- a/evm/src/interfaces/ITokenRouterState.sol +++ b/evm/src/interfaces/ITokenRouterState.sol @@ -13,6 +13,18 @@ interface ITokenRouterState { */ function getRouter(uint16 chain) external view returns (bytes32); + /** + * @notice Returns the mint recipient for a given chain ID. + * @param chain The Wormhole chain ID. + */ + function getMintRecipient(uint16 chain) external view returns (bytes32); + + /** + * @notice Returns the router endpoint for a given chain ID. + * @param chain The Wormhole chain ID. + */ + function getRouterEndpoint(uint16 chain) external view returns (Endpoint memory); + /** * @notice Returns the Circle domain for a given chain ID. * @param chain The Wormhole chain ID. diff --git a/evm/src/interfaces/ITokenRouterTypes.sol b/evm/src/interfaces/ITokenRouterTypes.sol index b0be3577..b1e6315f 100644 --- a/evm/src/interfaces/ITokenRouterTypes.sol +++ b/evm/src/interfaces/ITokenRouterTypes.sol @@ -22,9 +22,14 @@ struct FastTransferParameters { uint64 initAuctionFee; } +struct Endpoint { + bytes32 router; + bytes32 mintRecipient; +} + struct RouterEndpoints { // Mapping of chain ID to router address in Wormhole universal format. - mapping(uint16 chain => bytes32 endpoint) endpoints; + mapping(uint16 chain => Endpoint endpoint) endpoints; } struct CircleDomains { diff --git a/evm/ts/src/MatchingEngine/evm.ts b/evm/ts/src/MatchingEngine/evm.ts index 7a83f1c2..54ab5ff7 100644 --- a/evm/ts/src/MatchingEngine/evm.ts +++ b/evm/ts/src/MatchingEngine/evm.ts @@ -1,6 +1,6 @@ import { ChainId } from "@certusone/wormhole-sdk"; import { ethers } from "ethers"; -import { LiveAuctionData, MatchingEngine, RedeemParameters } from "."; +import { RouterEndpoint, LiveAuctionData, MatchingEngine, RedeemParameters } from "."; import { LiquidityLayerTransactionResult } from ".."; import { IMatchingEngine, @@ -51,8 +51,11 @@ export class EvmMatchingEngine implements MatchingEngine { - return this.contract.addRouterEndpoint(chain, router); + async addRouterEndpoint( + chain: number, + endpoint: RouterEndpoint + ): Promise { + return this.contract.addRouterEndpoint(chain, endpoint); } async placeInitialBid( diff --git a/evm/ts/src/MatchingEngine/index.ts b/evm/ts/src/MatchingEngine/index.ts index f609974f..978af456 100644 --- a/evm/ts/src/MatchingEngine/index.ts +++ b/evm/ts/src/MatchingEngine/index.ts @@ -19,10 +19,18 @@ export type LiveAuctionData = { bidPrice: bigint | ethers.BigNumberish; }; +export type RouterEndpoint = { + router: string | Buffer | Uint8Array; + mintRecipient: string | Buffer | Uint8Array; +}; + export abstract class MatchingEngine { abstract get address(): string; - abstract addRouterEndpoint(chain: number, router: string): Promise; + abstract addRouterEndpoint( + chain: number, + endpoint: RouterEndpoint + ): Promise; abstract liveAuctionInfo(auctionId: Buffer | Uint8Array): Promise; diff --git a/evm/ts/src/TokenRouter/evm.ts b/evm/ts/src/TokenRouter/evm.ts index 49396bc6..e3f6a855 100644 --- a/evm/ts/src/TokenRouter/evm.ts +++ b/evm/ts/src/TokenRouter/evm.ts @@ -1,6 +1,6 @@ import { ChainId } from "@certusone/wormhole-sdk"; import { ethers } from "ethers"; -import { OrderResponse, TokenRouter, FastTransferParameters } from "."; +import { Endpoint, OrderResponse, TokenRouter, FastTransferParameters } from "."; import { LiquidityLayerTransactionResult } from ".."; import { ITokenRouter, @@ -101,8 +101,8 @@ export class EvmTokenRouter implements TokenRouter { return this.contract.redeemFill(response); } - addRouterEndpoint(chain: number, info: string, domain: number) { - return this.contract.addRouterEndpoint(chain, info, domain); + addRouterEndpoint(chain: number, endpoint: Endpoint, domain: number) { + return this.contract.addRouterEndpoint(chain, endpoint, domain); } updateFastTransferParameters(newParams: FastTransferParameters) { diff --git a/evm/ts/src/TokenRouter/index.ts b/evm/ts/src/TokenRouter/index.ts index 32695ec6..8a700eec 100644 --- a/evm/ts/src/TokenRouter/index.ts +++ b/evm/ts/src/TokenRouter/index.ts @@ -15,6 +15,11 @@ export type OrderResponse = { circleAttestation: Buffer | Uint8Array; }; +export type Endpoint = { + router: string | Buffer | Uint8Array; + mintRecipient: string | Buffer | Uint8Array; +}; + export abstract class TokenRouter { abstract get address(): string; @@ -42,7 +47,7 @@ export abstract class TokenRouter; diff --git a/evm/ts/src/env.ts b/evm/ts/src/env.ts index dcc057e6..e470a24f 100644 --- a/evm/ts/src/env.ts +++ b/evm/ts/src/env.ts @@ -15,9 +15,11 @@ export type LiquidityLayerEnv = { tokenMessengerAddress: string; ownerAssistantAddress: string; tokenRouterAddress: string; + tokenRouterMintRecipient?: string; feeRecipient?: string; matchingEngineChain: string; matchingEngineAddress: string; + matchingEngineMintRecipient: string; matchingEngineDomain?: string; }; @@ -38,13 +40,19 @@ export function parseLiquidityLayerEnvFile(envPath: string): LiquidityLayerEnv { "TOKEN_MESSENGER_ADDRESS", "OWNER_ASSISTANT_ADDRESS", "TOKEN_ROUTER_ADDRESS", + "TOKEN_ROUTER_MINT_RECIPIENT", "FEE_RECIPIENT_ADDRESS", "MATCHING_ENGINE_CHAIN", "MATCHING_ENGINE_ADDRESS", + "MATCHING_ENGINE_MINT_RECIPIENT", "MATCHING_ENGINE_DOMAIN", ]; for (const key of keys) { - if (!contents[key] && key != "FEE_RECIPIENT_ADDRESS") { + if ( + !contents[key] && + key != "FEE_RECIPIENT_ADDRESS" && + key != "TOKEN_ROUTER_MINT_RECIPIENT" + ) { throw new Error(`no ${key}`); } } @@ -58,9 +66,11 @@ export function parseLiquidityLayerEnvFile(envPath: string): LiquidityLayerEnv { tokenMessengerAddress: contents.TOKEN_MESSENGER_ADDRESS, ownerAssistantAddress: contents.OWNER_ASSISTANT_ADDRESS, tokenRouterAddress: contents.TOKEN_ROUTER_ADDRESS, + tokenRouterMintRecipient: contents.TOKEN_ROUTER_MINT_RECIPIENT, feeRecipient: contents.FEE_RECIPIENT_ADDRESS, matchingEngineChain: contents.MATCHING_ENGINE_CHAIN, matchingEngineAddress: contents.MATCHING_ENGINE_ADDRESS, + matchingEngineMintRecipient: contents.MATCHING_ENGINE_MINT_RECIPIENT, matchingEngineDomain: contents.MATCHING_ENGINE_DOMAIN, }; } diff --git a/evm/ts/src/utils.ts b/evm/ts/src/utils.ts index 9ee8ad79..045566fc 100644 --- a/evm/ts/src/utils.ts +++ b/evm/ts/src/utils.ts @@ -148,7 +148,7 @@ export class LiquidityLayerTransactionResult { let wormhole: LiquidityLayerObservation | undefined; for (const message of publishedMessages) { - const { + let { sender: evmEmitterAddress, sequence: ethersSequence, nonce, @@ -162,6 +162,10 @@ export class LiquidityLayerTransactionResult { const payloadId = encodedMessage.readUInt8(0); + // Make sure the address is checksummed. + evmEmitterAddress = ethers.utils.getAddress(evmEmitterAddress); + contractAddress = ethers.utils.getAddress(contractAddress); + if (evmEmitterAddress == contractAddress) { if (payloadId == CCTP_DEPOSIT_PAYLOAD) { wormhole = { diff --git a/evm/ts/tests/01__registration.ts b/evm/ts/tests/01__registration.ts index eaf7d954..64f42678 100644 --- a/evm/ts/tests/01__registration.ts +++ b/evm/ts/tests/01__registration.ts @@ -1,4 +1,9 @@ -import { coalesceChainId, tryNativeToUint8Array } from "@certusone/wormhole-sdk"; +import { + CHAIN_ID_AVAX, + coalesceChainId, + tryHexToNativeAssetString, + tryNativeToUint8Array, +} from "@certusone/wormhole-sdk"; import { ethers } from "ethers"; import { ITokenRouter__factory, IMatchingEngine__factory } from "../src/types"; import { @@ -10,7 +15,7 @@ import { } from "./helpers"; import { expect } from "chai"; -import { parseLiquidityLayerEnvFile } from "../src"; +import { parseLiquidityLayerEnvFile, ChainType, LiquidityLayerEnv } from "../src"; const CHAIN_PATHWAYS: ValidNetwork[] = ["ethereum", "avalanche", "arbitrum"]; @@ -23,18 +28,24 @@ describe("Registration", () => { LOCALHOSTS[MATCHING_ENGINE_NAME] ); const assistant = new ethers.Wallet(OWNER_ASSISTANT_PRIVATE_KEY, provider); - const engine = IMatchingEngine__factory.connect(env.matchingEngineAddress, assistant); + const engine = IMatchingEngine__factory.connect( + tryHexToNativeAssetString(env.matchingEngineAddress, CHAIN_ID_AVAX), + assistant + ); for (const chainName of CHAIN_PATHWAYS) { it(`Register ${chainName}`, async () => { const targetEnv = parseLiquidityLayerEnvFile(`${envPath}/${chainName}.env`); - const formattedAddress = tryNativeToUint8Array( - targetEnv.tokenRouterAddress, + const [formattedAddress, mintRecipient] = fetchTokenRouterEndpoint( + targetEnv, chainName ); const targetChainId = coalesceChainId(chainName); await engine - .addRouterEndpoint(targetChainId, formattedAddress) + .addRouterEndpoint(targetChainId, { + router: formattedAddress, + mintRecipient, + }) .then((tx) => mineWait(provider, tx)); const registeredAddress = await engine.getRouter(targetChainId); @@ -59,13 +70,17 @@ describe("Registration", () => { it(`Register ${targetChain}`, async () => { const targetEnv = parseLiquidityLayerEnvFile(`${envPath}/${targetChain}.env`); - const formattedAddress = tryNativeToUint8Array( - targetEnv.tokenRouterAddress, - targetChain + const [formattedAddress, mintRecipient] = fetchTokenRouterEndpoint( + targetEnv, + chainName ); const targetChainId = coalesceChainId(targetChain); await router - .addRouterEndpoint(targetChainId, formattedAddress, targetEnv.domain) + .addRouterEndpoint( + targetChainId, + { router: formattedAddress, mintRecipient }, + targetEnv.domain + ) .then((tx) => mineWait(provider, tx)); const registeredAddress = await router.getRouter(targetChainId); @@ -77,3 +92,24 @@ describe("Registration", () => { }); } }); + +function fetchTokenRouterEndpoint( + targetEnv: LiquidityLayerEnv, + chainName: ValidNetwork +): [Uint8Array, Uint8Array] { + const formattedAddress = tryNativeToUint8Array(targetEnv.tokenRouterAddress, chainName); + let formattedMintRecipient; + if (targetEnv.chainType === ChainType.Evm) { + formattedMintRecipient = formattedAddress; + } else { + if (targetEnv.tokenRouterMintRecipient === undefined) { + throw new Error("no token router mint recipient specified"); + } else { + formattedMintRecipient = tryNativeToUint8Array( + targetEnv.tokenRouterMintRecipient, + chainName + ); + } + } + return [formattedAddress, formattedMintRecipient]; +} diff --git a/evm/ts/tests/02__configuration.ts b/evm/ts/tests/02__configuration.ts index 02356560..f31593f7 100644 --- a/evm/ts/tests/02__configuration.ts +++ b/evm/ts/tests/02__configuration.ts @@ -7,8 +7,8 @@ import { ValidNetwork, DEFAULT_FAST_TRANSFER_PARAMS, MATCHING_ENGINE_NAME, - MATCHING_ENGINE_CHAIN, } from "./helpers"; +import { tryHexToNativeAssetString, CHAIN_ID_AVAX } from "@certusone/wormhole-sdk"; import { expect } from "chai"; import { parseLiquidityLayerEnvFile } from "../src"; @@ -58,7 +58,10 @@ describe("Configuration", () => { LOCALHOSTS[MATCHING_ENGINE_NAME] ); const assistant = new ethers.Wallet(OWNER_ASSISTANT_PRIVATE_KEY, provider); - const engine = IMatchingEngine__factory.connect(env.matchingEngineAddress, assistant); + const engine = IMatchingEngine__factory.connect( + tryHexToNativeAssetString(env.matchingEngineAddress, CHAIN_ID_AVAX), + assistant + ); await engine .setCctpAllowance(ethers.constants.MaxUint256) diff --git a/evm/ts/tests/04__fastMarketOrder.ts b/evm/ts/tests/04__fastMarketOrder.ts index 83adf58f..e1565a1d 100644 --- a/evm/ts/tests/04__fastMarketOrder.ts +++ b/evm/ts/tests/04__fastMarketOrder.ts @@ -3,6 +3,8 @@ import { parseVaa, keccak256, tryNativeToUint8Array, + tryHexToNativeAssetString, + CHAIN_ID_AVAX, } from "@certusone/wormhole-sdk"; import { expect } from "chai"; import { ethers } from "ethers"; @@ -60,7 +62,7 @@ describe("Fast Market Order Business Logic -- CCTP to CCTP", function (this: Moc if (engineEnv.chainType === ChainType.Evm) { return new EvmMatchingEngine( engineWallet, - engineEnv.matchingEngineAddress, + tryHexToNativeAssetString(engineEnv.matchingEngineAddress, CHAIN_ID_AVAX), engineEnv.tokenMessengerAddress ); } else { From 8b0d4cb5b2b223d8a892e6ea97f013309c3db6ad Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 23 Jan 2024 11:58:51 -0600 Subject: [PATCH 082/126] evm: change name of cctpNonce to protocolSequence --- .../TokenRouter/assets/PlaceMarketOrder.sol | 26 +++++++++++------ evm/src/interfaces/IPlaceMarketOrder.sol | 28 +++++++++++++------ 2 files changed, 38 insertions(+), 16 deletions(-) diff --git a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol index 782f074a..7167bb28 100644 --- a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol +++ b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol @@ -34,7 +34,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { bytes32 redeemer, bytes calldata redeemerMessage, address refundAddress - ) external payable notPaused returns (uint64 sequence, uint64 cctpNonce) { + ) external payable notPaused returns (uint64 sequence, uint256 protocolSequence) { if (refundAddress == address(0)) { revert ErrInvalidRefundAddress(); } @@ -49,7 +49,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage - ) external payable notPaused returns (uint64 sequence, uint64 cctpNonce) { + ) external payable notPaused returns (uint64 sequence, uint256 protocolSequence) { return _handleOrder(amountIn, 0, targetChain, redeemer, redeemerMessage, address(0)); } @@ -63,7 +63,12 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { address refundAddress, uint64 maxFee, uint32 deadline - ) external payable notPaused returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce) { + ) + external + payable + notPaused + returns (uint64 sequence, uint64 fastSequence, uint256 protocolSequence) + { if (refundAddress == address(0)) { revert ErrInvalidRefundAddress(); } @@ -87,7 +92,12 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { bytes calldata redeemerMessage, uint64 maxFee, uint32 deadline - ) external payable notPaused returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce) { + ) + external + payable + notPaused + returns (uint64 sequence, uint64 fastSequence, uint256 protocolSequence) + { return _handleFastOrder( amountIn, 0, targetChain, redeemer, redeemerMessage, address(0), maxFee, deadline ); @@ -102,7 +112,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { bytes32 redeemer, bytes calldata redeemerMessage, address refundAddress - ) private returns (uint64 sequence, uint64 cctpNonce) { + ) private returns (uint64 sequence, uint256 protocolSequence) { if (amountIn == 0) { revert ErrInsufficientAmount(0, 0); } @@ -111,7 +121,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { SafeERC20.safeTransferFrom(_orderToken, msg.sender, address(this), amountIn); - (sequence, cctpNonce) = burnAndPublish( + (sequence, protocolSequence) = burnAndPublish( endpoint.router, getCircleDomainsState().domains[targetChain], address(_orderToken), @@ -137,7 +147,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { address refundAddress, uint64 maxFee, uint32 deadline - ) private returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce) { + ) private returns (uint64 sequence, uint64 fastSequence, uint256 protocolSequence) { // The Matching Engine chain is a fast finality chain already, // so we don't need to send a fast transfer message. if (_chainId == _matchingEngineChain) { @@ -168,7 +178,7 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { // User needs to send enough value to pay for two Wormhole messages. uint256 messageFee = msg.value / 2; - (sequence, cctpNonce) = burnAndPublish( + (sequence, protocolSequence) = burnAndPublish( _matchingEngineAddress, _matchingEngineDomain, address(_orderToken), diff --git a/evm/src/interfaces/IPlaceMarketOrder.sol b/evm/src/interfaces/IPlaceMarketOrder.sol index 9606f58d..0ee2709c 100644 --- a/evm/src/interfaces/IPlaceMarketOrder.sol +++ b/evm/src/interfaces/IPlaceMarketOrder.sol @@ -19,7 +19,10 @@ interface IPlaceMarketOrder { * parameter is currently unused, but is available to future proof * the contract. * @return sequence The sequence number of the `Fill` Wormhole message. - * @return cctpNonce The sequence of the CCTP message. + * @return protocolSequence The sequence returned by the bridge contract. For + * CCTP-enabled chains, this value is the sequence of the CCTP message. For + * non-CCTP enabled chains, this value is the sequence of the Token Bridge + * message. * @dev Currently, the `minAmountOut` and `refundAddress` parameters * are unused, but are available to future proof the contract. Eventually, * the `MatchingEngine` contract will faciliate transfers of cononical @@ -36,7 +39,7 @@ interface IPlaceMarketOrder { bytes32 redeemer, bytes calldata redeemerMessage, address refundAddress - ) external payable returns (uint64 sequence, uint64 cctpNonce); + ) external payable returns (uint64 sequence, uint256 protocolSequence); /** * @notice Place an "order" to transfer USDC to a CCTP-enabled blockchain. @@ -47,7 +50,10 @@ interface IPlaceMarketOrder { * @param redeemer The address of the redeeming contract on the target chain. * @param redeemerMessage Arbitrary payload to be sent to the `redeemer`. * @return sequence The sequence number of the `Fill` Wormhole message. - * @return cctpNonce The sequence of the CCTP message. + * @return protocolSequence The sequence returned by the bridge contract. For + * CCTP-enabled chains, this value is the sequence of the CCTP message. For + * non-CCTP enabled chains, this value is the sequence of the Token Bridge + * message. * @dev This interface is for CCTP-enabled chains only. If you plan to * support non-CCTP enabled chains in the future, use the other `placeMarketOrder` * interface which includes a `minAmountOut` and `refundAddress` parameter. @@ -60,7 +66,7 @@ interface IPlaceMarketOrder { uint16 targetChain, bytes32 redeemer, bytes calldata redeemerMessage - ) external payable returns (uint64 sequence, uint64 cctpNonce); + ) external payable returns (uint64 sequence, uint256 protocolSequence); /** * @notice Place a "fast order" to transfer USDC to another blockchain. @@ -86,7 +92,10 @@ interface IPlaceMarketOrder { * different blockchains. Set this value to 0 to opt out of using a deadline. * @return sequence The sequence number of the `SlowOrderResponse` Wormhole message. * @return fastSequence The sequence number of the `FastMarketOrder` Wormhole message. - * @return cctpNonce The sequence of the CCTP message. + * @return protocolSequence The sequence returned by the bridge contract. For + * CCTP-enabled chains, this value is the sequence of the CCTP message. For + * non-CCTP enabled chains, this value is the sequence of the Token Bridge + * message. * @dev Currently, the `minAmountOut` and `refundAddress` parameters * are unused, but are available to future proof the contract. Eventually, * the `MatchingEngine` contract will faciliate transfers of cononical @@ -106,7 +115,7 @@ interface IPlaceMarketOrder { address refundAddress, uint64 maxFee, uint32 deadline - ) external payable returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce); + ) external payable returns (uint64 sequence, uint64 fastSequence, uint256 protocolSequence); /** * @notice Place a "fast order" to transfer USDC to another blockchain. @@ -128,7 +137,10 @@ interface IPlaceMarketOrder { * different blockchains. Set this value to 0 to opt out of using a deadline. * @return sequence The sequence number of the `SlowOrderResponse` Wormhole message. * @return fastSequence The sequence number of the `FastMarketOrder` Wormhole message. - * @return cctpNonce The sequence of the CCTP message. + * @return protocolSequence The sequence returned by the bridge contract. For + * CCTP-enabled chains, this value is the sequence of the CCTP message. For + * non-CCTP enabled chains, this value is the sequence of the Token Bridge + * message. * @dev This interface is for CCTP-enabled chains only. If you plan to * support non-CCTP enabled chains in the future, use the other `placeMarketOrder` * interface which includes a `minAmountOut` and `refundAddress` parameter. @@ -143,5 +155,5 @@ interface IPlaceMarketOrder { bytes calldata redeemerMessage, uint64 maxFee, uint32 deadline - ) external payable returns (uint64 sequence, uint64 fastSequence, uint64 cctpNonce); + ) external payable returns (uint64 sequence, uint64 fastSequence, uint256 protocolSequence); } From 439e48bce9e998af654046e98674f00f1dd09bd1 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 23 Jan 2024 13:58:59 -0600 Subject: [PATCH 083/126] solana: broken deserialization code --- .../modules/common/src/messages/fast_fill.rs | 6 +- .../common/src/messages/fast_market_order.rs | 56 ++--------- solana/modules/common/src/messages/fill.rs | 2 +- solana/modules/common/src/messages/raw/mod.rs | 62 +++++------- .../src/messages/slow_order_response.rs | 44 +-------- .../auction/execute_fast_order_solana.rs | 2 +- .../src/processor/auction/mod.rs | 4 +- .../processor/auction/place_initial_offer.rs | 4 +- .../execute_slow_order/no_auction_cctp.rs | 3 +- .../src/processor/redeem_fill/fast.rs | 5 +- solana/ts/src/messages/index.ts | 64 +++++------- solana/ts/tests/01__matchingEngine.ts | 26 +++-- .../ts/tests/helpers/matching_engine_utils.ts | 97 ++----------------- 13 files changed, 88 insertions(+), 287 deletions(-) diff --git a/solana/modules/common/src/messages/fast_fill.rs b/solana/modules/common/src/messages/fast_fill.rs index cc3979da..f99ab530 100644 --- a/solana/modules/common/src/messages/fast_fill.rs +++ b/solana/modules/common/src/messages/fast_fill.rs @@ -5,8 +5,8 @@ use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; #[derive(Debug, Clone, PartialEq, Eq)] pub struct FastFill { + pub amount: u64, pub fill: Fill, - pub amount: u128, } impl Readable for FastFill { @@ -26,7 +26,7 @@ impl Readable for FastFill { impl Writeable for FastFill { fn written_size(&self) -> usize { - self.fill.written_size() + 16 + self.fill.written_size() + 8 } fn write(&self, writer: &mut W) -> std::io::Result<()> @@ -34,8 +34,8 @@ impl Writeable for FastFill { Self: Sized, W: std::io::Write, { - self.fill.write(writer)?; self.amount.write(writer)?; + self.fill.write(writer)?; Ok(()) } } diff --git a/solana/modules/common/src/messages/fast_market_order.rs b/solana/modules/common/src/messages/fast_market_order.rs index 186fb2d3..a15e2e3e 100644 --- a/solana/modules/common/src/messages/fast_market_order.rs +++ b/solana/modules/common/src/messages/fast_market_order.rs @@ -4,17 +4,15 @@ use wormhole_io::{Readable, TypePrefixedPayload, Writeable, WriteableBytes}; #[derive(Debug, Clone, PartialEq, Eq)] pub struct FastMarketOrder { - pub amount_in: u128, - pub min_amount_out: u128, + pub amount_in: u64, + pub min_amount_out: u64, pub target_chain: u16, pub destination_cctp_domain: u32, pub redeemer: [u8; 32], pub sender: [u8; 32], pub refund_address: [u8; 32], - pub slow_sequence: u64, - pub slow_emitter: [u8; 32], - pub max_fee: u128, - pub init_auction_fee: u128, + pub max_fee: u64, + pub init_auction_fee: u64, pub deadline: u32, pub redeemer_message: WriteableBytes, } @@ -35,8 +33,6 @@ impl Readable for FastMarketOrder { redeemer: Readable::read(reader)?, sender: Readable::read(reader)?, refund_address: Readable::read(reader)?, - slow_sequence: Readable::read(reader)?, - slow_emitter: Readable::read(reader)?, max_fee: Readable::read(reader)?, init_auction_fee: Readable::read(reader)?, deadline: Readable::read(reader)?, @@ -47,7 +43,7 @@ impl Readable for FastMarketOrder { impl Writeable for FastMarketOrder { fn written_size(&self) -> usize { - 16 + 16 + 2 + 4 + 32 + 32 + 32 + 8 + 32 + 16 + 16 + 4 + self.redeemer_message.written_size() + 8 + 8 + 2 + 4 + 32 + 32 + 32 + 8 + 8 + 4 + self.redeemer_message.written_size() } fn write(&self, writer: &mut W) -> std::io::Result<()> @@ -62,8 +58,6 @@ impl Writeable for FastMarketOrder { self.redeemer.write(writer)?; self.sender.write(writer)?; self.refund_address.write(writer)?; - self.slow_sequence.write(writer)?; - self.slow_emitter.write(writer)?; self.max_fee.write(writer)?; self.init_auction_fee.write(writer)?; self.deadline.write(writer)?; @@ -73,43 +67,5 @@ impl Writeable for FastMarketOrder { } impl TypePrefixedPayload for FastMarketOrder { - const TYPE: Option = Some(13); -} - -#[cfg(test)] -mod test { - // use hex_literal::hex; - - // use super::*; - - // #[test] - // fn transfer_tokens_with_relay() { - // let msg = TransferTokensWithRelay { - // target_relayer_fee: U256::from(69u64), - // to_native_token_amount: U256::from(420u64), - // target_recipient_wallet: hex!( - // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" - // ), - // }; - - // let mut bytes = Vec::with_capacity(msg.payload_written_size()); - // msg.write_typed(&mut bytes).unwrap(); - // assert_eq!(bytes.len(), msg.payload_written_size()); - // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); - - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); - // assert_eq!(recovered, msg); - // } - - // #[test] - // fn invalid_message_type() { - // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); - - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let err = TransferTokensWithRelay::read_typed(&mut cursor) - // .err() - // .unwrap(); - // matches!(err.kind(), std::io::ErrorKind::InvalidData); - // } + const TYPE: Option = Some(11); } diff --git a/solana/modules/common/src/messages/fill.rs b/solana/modules/common/src/messages/fill.rs index 1cbbfd93..8fd694a6 100644 --- a/solana/modules/common/src/messages/fill.rs +++ b/solana/modules/common/src/messages/fill.rs @@ -46,7 +46,7 @@ impl Writeable for Fill { } impl TypePrefixedPayload for Fill { - const TYPE: Option = Some(11); + const TYPE: Option = Some(1); } #[cfg(test)] diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index ecc244d8..100784aa 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -125,7 +125,7 @@ impl<'a> LiquidityLayerMessage<'a> { match span[0] { 1 => Ok(Self::Deposit(Deposit::parse(&span[1..])?)), 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), - 13 => Ok(Self::FastMarketOrder(FastMarketOrder::parse(&span[1..])?)), + 11 => Ok(Self::FastMarketOrder(FastMarketOrder::parse(&span[1..])?)), _ => Err("Unknown LiquidityLayerMessage type"), } } @@ -142,22 +142,16 @@ impl<'a> AsRef<[u8]> for FastFill<'a> { impl<'a> FastFill<'a> { pub fn fill(&'a self) -> Fill<'a> { - Fill::parse(&self.0[..70 + usize::try_from(self.redeemer_message_len()).unwrap()]).unwrap() + Fill::parse(&self.0[78..]).unwrap() } - pub fn amount(&self) -> u128 { - let len = usize::try_from(self.redeemer_message_len()).unwrap(); - u128::from_be_bytes(self.0[70 + len..86 + len].try_into().unwrap()) - } - - // TODO: remove this when encoding changes. - fn redeemer_message_len(&self) -> u32 { - u32::from_be_bytes(self.0[66..70].try_into().unwrap()) + pub fn amount(&self) -> u64 { + u64::from_be_bytes(self.0[66..74].try_into().unwrap()) } pub fn parse(span: &'a [u8]) -> Result { - if span.len() < 86 { - return Err("FastFill span too short. Need at least 86 bytes"); + if span.len() < 78 { + return Err("FastFill span too short. Need at least 78 bytes"); } let fast_fill = Self(span); @@ -182,65 +176,57 @@ impl<'a> AsRef<[u8]> for FastMarketOrder<'a> { } impl<'a> FastMarketOrder<'a> { - pub fn amount_in(&self) -> u128 { - u128::from_be_bytes(self.0[..16].try_into().unwrap()) + pub fn amount_in(&self) -> u64 { + u64::from_be_bytes(self.0[..8].try_into().unwrap()) } - pub fn min_amount_out(&self) -> u128 { - u128::from_be_bytes(self.0[16..32].try_into().unwrap()) + pub fn min_amount_out(&self) -> u64 { + u64::from_be_bytes(self.0[8..16].try_into().unwrap()) } pub fn target_chain(&self) -> u16 { - u16::from_be_bytes(self.0[32..34].try_into().unwrap()) + u16::from_be_bytes(self.0[16..18].try_into().unwrap()) } pub fn destination_cctp_domain(&self) -> u32 { - u32::from_be_bytes(self.0[34..38].try_into().unwrap()) + u32::from_be_bytes(self.0[18..22].try_into().unwrap()) } pub fn redeemer(&self) -> [u8; 32] { - self.0[38..70].try_into().unwrap() + self.0[22..54].try_into().unwrap() } pub fn sender(&self) -> [u8; 32] { - self.0[70..102].try_into().unwrap() + self.0[54..86].try_into().unwrap() } pub fn refund_address(&self) -> [u8; 32] { - self.0[102..134].try_into().unwrap() - } - - pub fn slow_sequence(&self) -> u64 { - u64::from_be_bytes(self.0[134..142].try_into().unwrap()) - } - - pub fn slow_emitter(&self) -> [u8; 32] { - self.0[142..174].try_into().unwrap() + self.0[86..118].try_into().unwrap() } - pub fn max_fee(&self) -> u128 { - u128::from_be_bytes(self.0[174..190].try_into().unwrap()) + pub fn max_fee(&self) -> u64 { + u64::from_be_bytes(self.0[118..126].try_into().unwrap()) } - pub fn init_auction_fee(&self) -> u128 { - u128::from_be_bytes(self.0[190..206].try_into().unwrap()) + pub fn init_auction_fee(&self) -> u64 { + u64::from_be_bytes(self.0[126..134].try_into().unwrap()) } pub fn deadline(&self) -> u32 { - u32::from_be_bytes(self.0[206..210].try_into().unwrap()) + u32::from_be_bytes(self.0[134..138].try_into().unwrap()) } pub fn redeemer_message_len(&self) -> u32 { - u32::from_be_bytes(self.0[210..214].try_into().unwrap()) + u32::from_be_bytes(self.0[138..142].try_into().unwrap()) } pub fn redeemer_message(&'a self) -> Payload<'a> { - Payload::parse(&self.0[214..]) + Payload::parse(&self.0[142..]) } pub fn parse(span: &'a [u8]) -> Result { - if span.len() < 214 { - return Err("FastMarketOrder span too short. Need at least 214 bytes"); + if span.len() < 142 { + return Err("FastMarketOrder span too short. Need at least 142 bytes"); } let fast_market_order = Self(span); diff --git a/solana/modules/common/src/messages/slow_order_response.rs b/solana/modules/common/src/messages/slow_order_response.rs index e3672ab8..61ef3097 100644 --- a/solana/modules/common/src/messages/slow_order_response.rs +++ b/solana/modules/common/src/messages/slow_order_response.rs @@ -4,11 +4,11 @@ use wormhole_io::{Readable, TypePrefixedPayload, Writeable}; #[derive(Debug, Clone, PartialEq, Eq)] pub struct SlowOrderResponse { - pub base_fee: u128, + pub base_fee: u64, } impl Readable for SlowOrderResponse { - const SIZE: Option = Some(16); + const SIZE: Option = Some(8); fn read(reader: &mut R) -> std::io::Result where @@ -37,43 +37,5 @@ impl Writeable for SlowOrderResponse { } impl TypePrefixedPayload for SlowOrderResponse { - const TYPE: Option = Some(14); -} - -#[cfg(test)] -mod test { - // use hex_literal::hex; - - // use super::*; - - // #[test] - // fn transfer_tokens_with_relay() { - // let msg = TransferTokensWithRelay { - // target_relayer_fee: U256::from(69u64), - // to_native_token_amount: U256::from(420u64), - // target_recipient_wallet: hex!( - // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" - // ), - // }; - - // let mut bytes = Vec::with_capacity(msg.payload_written_size()); - // msg.write_typed(&mut bytes).unwrap(); - // assert_eq!(bytes.len(), msg.payload_written_size()); - // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); - - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); - // assert_eq!(recovered, msg); - // } - - // #[test] - // fn invalid_message_type() { - // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); - - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let err = TransferTokensWithRelay::read_typed(&mut cursor) - // .err() - // .unwrap(); - // matches!(err.kind(), std::io::ErrorKind::InvalidData); - // } + const TYPE: Option = Some(2); } diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs index 408a8ee8..9ae8dc41 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs @@ -190,8 +190,8 @@ pub fn execute_fast_order_solana(ctx: Context) -> Result core_bridge_program::cpi::PostMessageArgs { nonce: 0, // Always zero. payload: common::messages::FastFill { + amount: wormhole_args.transfer_amount, fill: wormhole_args.fill, - amount: u128::try_from(wormhole_args.transfer_amount).unwrap(), } .to_vec_payload(), commitment: core_bridge_program::Commitment::Finalized, diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 3f555a21..43e964d5 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -190,7 +190,7 @@ pub fn handle_fast_order_execution(accounts: ExecuteFastOrderAccounts) -> Result }, &[&custodian_seeds[..]], ), - u64::try_from(fast_order.init_auction_fee()).unwrap(), + fast_order.init_auction_fee(), )?; // Set the auction status to completed. @@ -201,7 +201,7 @@ pub fn handle_fast_order_execution(accounts: ExecuteFastOrderAccounts) -> Result .amount .checked_sub(auction_data.offer_price) .unwrap() - .checked_sub(u64::try_from(fast_order.init_auction_fee()).unwrap()) + .checked_sub(fast_order.init_auction_fee()) .unwrap() .checked_add(user_reward) .unwrap(), diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs index c832abb6..ff008bfc 100644 --- a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs +++ b/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs @@ -100,7 +100,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R MatchingEngineError::FastMarketOrderExpired, ); - let max_fee = u64::try_from(fast_order.max_fee()).unwrap(); + let max_fee = fast_order.max_fee(); require!(fee_offer <= max_fee, MatchingEngineError::OfferPriceTooHigh); // Verify that the to and from router endpoints are valid. @@ -112,7 +112,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R )?; // Parse the transfer amount from the VAA. - let amount = u64::try_from(fast_order.amount_in()).unwrap(); + let amount = fast_order.amount_in(); // Transfer tokens from the offer authority's token account to the custodian. token::transfer( diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs index 6bc6671a..84ea4299 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs +++ b/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs @@ -206,9 +206,8 @@ pub fn execute_slow_order_no_auction_cctp( let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; - // TODO: encoding will change from u128 to u64 let base_fee = ctx.accounts.prepared_slow_order.base_fee; - let amount = u64::try_from(order.amount_in()).unwrap() - base_fee; + let amount = order.amount_in() - base_fee; let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); redeemer_message.write_all(order.redeemer_message().into())?; diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 01398142..8cd06042 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -115,9 +115,6 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { .unwrap() .to_fast_fill_unchecked(); - // This is safe because we know the amount is within u64 range. - let amount = u64::try_from(fast_fill.amount()).unwrap(); - let fill = fast_fill.fill(); // Set prepared fill data. @@ -129,7 +126,7 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { fill_type: FillType::FastFill, source_chain: fill.source_chain(), order_sender: fill.order_sender(), - amount, + amount: fast_fill.amount(), }); // Done. diff --git a/solana/ts/src/messages/index.ts b/solana/ts/src/messages/index.ts index 29a1d997..dce06e5c 100644 --- a/solana/ts/src/messages/index.ts +++ b/solana/ts/src/messages/index.ts @@ -8,26 +8,24 @@ export const ID_FAST_FILL = 12; export const ID_FAST_MARKET_ORDER = 13; export type FastFill = { - fill: Fill; - // u128 + // u64 amount: bigint; + fill: Fill; }; export type FastMarketOrder = { - // u128 + // u64 amountIn: bigint; - // u128 + // u64 minAmountOut: bigint; targetChain: number; destinationCctpDomain: number; redeemer: Array; sender: Array; refundAddress: Array; - slowSequence: bigint; - slowEmitter: Array; - // u128 + // u64 maxFee: bigint; - // u128 + // u64 initAuctionFee: bigint; deadline: number; redeemerMessage: Buffer; @@ -64,6 +62,8 @@ export class LiquidityLayerMessage { }; } case ID_FAST_FILL: { + const amount = buf.readBigUInt64BE(offset); + offset += 8; const sourceChain = buf.readUInt16BE(offset); offset += 2; const orderSender = Array.from(buf.subarray(offset, (offset += 32))); @@ -71,9 +71,6 @@ export class LiquidityLayerMessage { const redeemerMessageLen = buf.readUInt32BE(offset); offset += 4; const redeemerMessage = buf.subarray(offset, (offset += redeemerMessageLen)); - const amount = BigInt( - new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() - ); return { deposit: undefined, fastFill: { @@ -84,12 +81,10 @@ export class LiquidityLayerMessage { }; } case ID_FAST_MARKET_ORDER: { - const amountIn = BigInt( - new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() - ); - const minAmountOut = BigInt( - new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() - ); + const amountIn = buf.readBigUInt64BE(offset); + offset += 8; + const minAmountOut = buf.readBigUInt64BE(offset); + offset += 8; const targetChain = buf.readUInt16BE(offset); offset += 2; const destinationCctpDomain = buf.readUInt32BE(offset); @@ -97,15 +92,9 @@ export class LiquidityLayerMessage { const redeemer = Array.from(buf.subarray(offset, (offset += 32))); const sender = Array.from(buf.subarray(offset, (offset += 32))); const refundAddress = Array.from(buf.subarray(offset, (offset += 32))); - const slowSequence = buf.readBigUInt64BE(offset); + const maxFee = buf.readBigInt64BE(offset); offset += 8; - const slowEmitter = Array.from(buf.subarray(offset, (offset += 32))); - const maxFee = BigInt( - new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() - ); - const initAuctionFee = BigInt( - new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() - ); + const initAuctionFee = buf.readBigInt64BE(offset); const deadline = buf.readUInt32BE(offset); offset += 4; const redeemerMessageLen = buf.readUInt32BE(offset); @@ -122,8 +111,6 @@ export class LiquidityLayerMessage { redeemer, sender, refundAddress, - slowSequence, - slowEmitter, maxFee, initAuctionFee, deadline, @@ -150,9 +137,12 @@ export class LiquidityLayerMessage { const { fill, amount } = fastFill; const { sourceChain, orderSender, redeemer, redeemerMessage } = fill; - const messageBuf = Buffer.alloc(1 + 86 + redeemerMessage.length); + const messageBuf = Buffer.alloc(1 + 78 + redeemerMessage.length); let offset = 0; + const encodedAmount = new BN(amount.toString()).toBuffer("be", 8); + messageBuf.set(encodedAmount, offset); + offset += encodedAmount.length; offset = messageBuf.writeUInt8(ID_FAST_FILL, offset); offset = messageBuf.writeUInt16BE(sourceChain, offset); messageBuf.set(orderSender, offset); @@ -162,9 +152,6 @@ export class LiquidityLayerMessage { offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); messageBuf.set(redeemerMessage, offset); offset += redeemerMessage.length; - const encodedAmount = new BN(amount.toString()).toBuffer("be", 16); - messageBuf.set(encodedAmount, offset); - offset += encodedAmount.length; return messageBuf; } else if (fastMarketOrder !== undefined) { @@ -176,22 +163,20 @@ export class LiquidityLayerMessage { redeemer, sender, refundAddress, - slowSequence, - slowEmitter, maxFee, initAuctionFee, deadline, redeemerMessage, } = fastMarketOrder; - const messageBuf = Buffer.alloc(1 + 214 + redeemerMessage.length); + const messageBuf = Buffer.alloc(1 + 142 + redeemerMessage.length); let offset = 0; offset = messageBuf.writeUInt8(ID_FAST_MARKET_ORDER, offset); - const encodedAmountIn = new BN(amountIn.toString()).toBuffer("be", 16); + const encodedAmountIn = new BN(amountIn.toString()).toBuffer("be", 8); messageBuf.set(encodedAmountIn, offset); offset += encodedAmountIn.length; - const encodedMinAmountOut = new BN(minAmountOut.toString()).toBuffer("be", 16); + const encodedMinAmountOut = new BN(minAmountOut.toString()).toBuffer("be", 8); messageBuf.set(encodedMinAmountOut, offset); offset += encodedMinAmountOut.length; offset = messageBuf.writeUInt16BE(targetChain, offset); @@ -202,13 +187,10 @@ export class LiquidityLayerMessage { offset += sender.length; messageBuf.set(refundAddress, offset); offset += refundAddress.length; - offset = messageBuf.writeBigUInt64BE(slowSequence, offset); - messageBuf.set(slowEmitter, offset); - offset += slowEmitter.length; - const encodedMaxFee = new BN(maxFee.toString()).toBuffer("be", 16); + const encodedMaxFee = new BN(maxFee.toString()).toBuffer("be", 8); messageBuf.set(encodedMaxFee, offset); offset += encodedMaxFee.length; - const encodedInitAuctionFee = new BN(initAuctionFee.toString()).toBuffer("be", 16); + const encodedInitAuctionFee = new BN(initAuctionFee.toString()).toBuffer("be", 8); messageBuf.set(encodedInitAuctionFee, offset); offset += encodedInitAuctionFee.length; offset = messageBuf.writeUInt32BE(deadline, offset); diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 0be0fcea..63855e35 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -30,7 +30,6 @@ import { postLiquidityLayerVaa, } from "./helpers"; import { - FastMarketOrder, calculateDynamicPenalty, getTokenBalance, postFastTransferVaa, @@ -41,6 +40,7 @@ import { } from "./helpers/matching_engine_utils"; import { CctpTokenBurnMessage, + FastMarketOrder, FastFill, LiquidityLayerDeposit, LiquidityLayerMessage, @@ -717,12 +717,10 @@ describe("Matching Engine", function () { amountIn: 50000000000n, minAmountOut: 0n, targetChain: arbChain, - targetDomain: arbDomain, - redeemer: Buffer.alloc(32, "deadbeef", "hex"), - sender: Buffer.alloc(32, "beefdead", "hex"), - refundAddress: Buffer.alloc(32, "beef", "hex"), - slowSequence: 0n, - slowEmitter: Buffer.alloc(32, "dead", "hex"), + destinationCctpDomain: arbDomain, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + sender: Array.from(Buffer.alloc(32, "beefdead", "hex")), + refundAddress: Array.from(Buffer.alloc(32, "beef", "hex")), maxFee: 1000000n, initAuctionFee: 100n, deadline: 0, @@ -1744,7 +1742,7 @@ describe("Matching Engine", function () { it("Execute Fast Order Within Grace Period (Target == Solana)", async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.targetDomain = solanaDomain; + fastOrder.destinationCctpDomain = solanaDomain; // Start the auction with offer two so that we can // check that the initial offer is refunded. @@ -2238,7 +2236,7 @@ describe("Matching Engine", function () { it(`Cannot Execute Fast Order (Invalid Chain)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.targetDomain = solanaDomain; + fastOrder.destinationCctpDomain = solanaDomain; const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, @@ -2526,7 +2524,7 @@ describe("Matching Engine", function () { it(`Cannot Execute Fast Order Solana (Vaa Hash Mismatch)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.targetDomain = solanaDomain; + fastOrder.destinationCctpDomain = solanaDomain; const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, @@ -2583,7 +2581,7 @@ describe("Matching Engine", function () { it(`Cannot Execute Fast Order Solana (Invalid Best Offer Token Account)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.targetDomain = solanaDomain; + fastOrder.destinationCctpDomain = solanaDomain; const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, @@ -2622,7 +2620,7 @@ describe("Matching Engine", function () { it(`Cannot Execute Fast Order Solana (Invalid Initial Offer Token Account)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.targetDomain = solanaDomain; + fastOrder.destinationCctpDomain = solanaDomain; const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, @@ -2661,7 +2659,7 @@ describe("Matching Engine", function () { it(`Cannot Execute Fast Order Solana (Auction Not Active)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.targetDomain = solanaDomain; + fastOrder.destinationCctpDomain = solanaDomain; const [vaaKey, signedVaa] = await placeInitialOfferForTest( connection, @@ -2746,8 +2744,6 @@ describe("Matching Engine", function () { redeemer: Array.from(redeemer.publicKey.toBuffer()), sender: new Array(32).fill(0), refundAddress: new Array(32).fill(0), - slowSequence: 0n, // TODO: will be removed - slowEmitter: new Array(32).fill(0), // TODO: will be removed maxFee: 42069n, initAuctionFee: 2000n, deadline: 2, diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index f82c0a7c..773f67f5 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -11,10 +11,9 @@ import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormh import { Connection, Keypair, PublicKey } from "@solana/web3.js"; import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; import { WORMHOLE_CONTRACTS, USDC_MINT_ADDRESS, MAX_BPS_FEE } from "../../tests/helpers"; -import { AuctionConfig, MatchingEngineProgram } from "../../src/matchingEngine"; +import { AuctionConfig } from "../../src/matchingEngine"; import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; -import { ethers } from "ethers"; -import { Fill, LiquidityLayerMessage } from "../../src"; +import { Fill, LiquidityLayerMessage, FastMarketOrder } from "../../src"; import { expect } from "chai"; @@ -42,96 +41,19 @@ export async function postVaa( ); } -export interface FastMarketOrder { - amountIn: bigint; - minAmountOut: bigint; - targetChain: number; - targetDomain: number; - redeemer: Buffer; - sender: Buffer; - refundAddress: Buffer; - slowSequence: bigint; - slowEmitter: Buffer; - maxFee: bigint; - initAuctionFee: bigint; - deadline: number; - redeemerMessage: Buffer; -} - export function encodeFastMarketOrder(order: FastMarketOrder): Buffer { - const buf = Buffer.alloc(214); - - let offset = 0; - - const amountIn = ethers.utils.arrayify(ethers.BigNumber.from(order.amountIn).toHexString()); - buf.set(amountIn, (offset += 16) - amountIn.length); - - const minAmountOut = ethers.utils.arrayify( - ethers.BigNumber.from(order.minAmountOut).toHexString() - ); - buf.set(minAmountOut, (offset += 16) - minAmountOut.length); - - offset = buf.writeUInt16BE(order.targetChain, offset); - offset = buf.writeUInt32BE(order.targetDomain, offset); - - buf.set(order.redeemer, offset); - offset += 32; - - buf.set(order.sender, offset); - offset += 32; - - buf.set(order.refundAddress, offset); - offset += 32; - - offset = buf.writeBigUInt64BE(order.slowSequence, offset); - - buf.set(order.slowEmitter, offset); - offset += 32; - - const maxFee = ethers.utils.arrayify(ethers.BigNumber.from(order.maxFee).toHexString()); - buf.set(maxFee, (offset += 16) - maxFee.length); - - const initAuctionfee = ethers.utils.arrayify( - ethers.BigNumber.from(order.initAuctionFee).toHexString() - ); - buf.set(initAuctionfee, (offset += 16) - initAuctionfee.length); - - offset = buf.writeUInt32BE(order.deadline, offset); - offset = buf.writeUInt32BE(order.redeemerMessage.length, offset); - - return Buffer.concat([Buffer.alloc(1, 13), buf, order.redeemerMessage]); -} - -function takePayloadId(buf: Buffer, expectedId: number): Buffer { - if (buf.readUInt8(0) != expectedId) { - throw new Error("Invalid payload ID"); - } - - return buf.subarray(1); + const encodedFastOrder = new LiquidityLayerMessage({ fastMarketOrder: order }).encode(); + return encodedFastOrder; } export function decodeFastMarketOrder(buf: Buffer): FastMarketOrder { - let order = {} as FastMarketOrder; + const order = LiquidityLayerMessage.decode(buf); - buf = takePayloadId(buf, 13); - - order.amountIn = BigInt(ethers.BigNumber.from(buf.subarray(0, 16)).toString()); - order.minAmountOut = BigInt(ethers.BigNumber.from(buf.subarray(16, 32)).toString()); - order.targetChain = buf.readUInt16BE(32); - order.targetDomain = buf.readUInt32BE(34); - order.redeemer = buf.subarray(38, 70); - order.sender = buf.subarray(70, 102); - order.refundAddress = buf.subarray(102, 134); - order.slowSequence = buf.readBigUint64BE(134); - order.slowEmitter = buf.subarray(142, 174); - order.maxFee = BigInt(ethers.BigNumber.from(buf.subarray(174, 190)).toString()); - order.initAuctionFee = BigInt(ethers.BigNumber.from(buf.subarray(190, 206)).toString()); - order.deadline = buf.readUInt32BE(206); - - const redeemerMsgLen = buf.readUInt32BE(210); - order.redeemerMessage = buf.subarray(214, 214 + redeemerMsgLen); + if (order.fastMarketOrder === undefined) { + throw new Error("Invalid message type"); + } - return order; + return order.fastMarketOrder; } export async function postVaaWithMessage( @@ -147,6 +69,7 @@ export async function postVaaWithMessage( emitterChain = CHAIN_ID_ETH; } + console.log(payload.toString("hex")); const foreignEmitter = new MockEmitter( tryNativeToHexString(emitterAddress, emitterChain), emitterChain, From a3bb74cd74ef6cce54994f1faf9e4d7084e4952d Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 23 Jan 2024 16:16:49 -0600 Subject: [PATCH 084/126] solana: fix serde --- .../common/src/messages/{ => deposit}/fill.rs | 0 .../common/src/messages/deposit/mod.rs | 5 ++ .../{ => deposit}/slow_order_response.rs | 0 .../modules/common/src/messages/fast_fill.rs | 2 +- solana/modules/common/src/messages/mod.rs | 9 +-- .../common/src/messages/raw/deposit.rs | 12 ++-- solana/modules/common/src/messages/raw/mod.rs | 14 ++--- solana/ts/src/messages/deposit.ts | 16 ++--- solana/ts/src/messages/index.ts | 61 ++++++++----------- solana/ts/tests/02__tokenRouter.ts | 16 ++++- .../ts/tests/helpers/matching_engine_utils.ts | 9 +-- 11 files changed, 68 insertions(+), 76 deletions(-) rename solana/modules/common/src/messages/{ => deposit}/fill.rs (100%) create mode 100644 solana/modules/common/src/messages/deposit/mod.rs rename solana/modules/common/src/messages/{ => deposit}/slow_order_response.rs (100%) diff --git a/solana/modules/common/src/messages/fill.rs b/solana/modules/common/src/messages/deposit/fill.rs similarity index 100% rename from solana/modules/common/src/messages/fill.rs rename to solana/modules/common/src/messages/deposit/fill.rs diff --git a/solana/modules/common/src/messages/deposit/mod.rs b/solana/modules/common/src/messages/deposit/mod.rs new file mode 100644 index 00000000..fb53d439 --- /dev/null +++ b/solana/modules/common/src/messages/deposit/mod.rs @@ -0,0 +1,5 @@ +mod fill; +pub use fill::*; + +mod slow_order_response; +pub use slow_order_response::*; diff --git a/solana/modules/common/src/messages/slow_order_response.rs b/solana/modules/common/src/messages/deposit/slow_order_response.rs similarity index 100% rename from solana/modules/common/src/messages/slow_order_response.rs rename to solana/modules/common/src/messages/deposit/slow_order_response.rs diff --git a/solana/modules/common/src/messages/fast_fill.rs b/solana/modules/common/src/messages/fast_fill.rs index f99ab530..db8b6a6b 100644 --- a/solana/modules/common/src/messages/fast_fill.rs +++ b/solana/modules/common/src/messages/fast_fill.rs @@ -26,7 +26,7 @@ impl Readable for FastFill { impl Writeable for FastFill { fn written_size(&self) -> usize { - self.fill.written_size() + 8 + 8 + self.fill.written_size() } fn write(&self, writer: &mut W) -> std::io::Result<()> diff --git a/solana/modules/common/src/messages/mod.rs b/solana/modules/common/src/messages/mod.rs index 4aec7c8a..d54607b0 100644 --- a/solana/modules/common/src/messages/mod.rs +++ b/solana/modules/common/src/messages/mod.rs @@ -1,13 +1,10 @@ +mod deposit; +pub use deposit::*; + mod fast_fill; pub use fast_fill::*; mod fast_market_order; pub use fast_market_order::*; -mod fill; -pub use fill::*; - pub mod raw; - -mod slow_order_response; -pub use slow_order_response::*; diff --git a/solana/modules/common/src/messages/raw/deposit.rs b/solana/modules/common/src/messages/raw/deposit.rs index 4f5a439d..6a6bbb2e 100644 --- a/solana/modules/common/src/messages/raw/deposit.rs +++ b/solana/modules/common/src/messages/raw/deposit.rs @@ -63,8 +63,8 @@ impl<'a> LiquidityLayerDepositMessage<'a> { } match span[0] { - 11 => Ok(Self::Fill(Fill::parse(&span[1..])?)), - 14 => Ok(Self::SlowOrderResponse(SlowOrderResponse::parse( + 1 => Ok(Self::Fill(Fill::parse(&span[1..])?)), + 2 => Ok(Self::SlowOrderResponse(SlowOrderResponse::parse( &span[1..], )?)), _ => Err("Unknown LiquidityLayerDepositMessage type"), @@ -128,13 +128,13 @@ impl<'a> AsRef<[u8]> for SlowOrderResponse<'a> { } impl<'a> SlowOrderResponse<'a> { - pub fn base_fee(&self) -> u128 { - u128::from_be_bytes(self.0[..16].try_into().unwrap()) + pub fn base_fee(&self) -> u64 { + u64::from_be_bytes(self.0[..8].try_into().unwrap()) } pub fn parse(span: &'a [u8]) -> Result { - if span.len() != 16 { - return Err("SlowOrderResponse span too short. Need exactly 16 bytes"); + if span.len() != 8 { + return Err("SlowOrderResponse span too short. Need exactly 8 bytes"); } Ok(Self(span)) diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index 100784aa..209c227c 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -48,8 +48,8 @@ impl<'a> LiquidityLayerPayload<'a> { #[derive(Debug, Copy, Clone, PartialEq, Eq, Hash)] pub enum LiquidityLayerMessage<'a> { Deposit(Deposit<'a>), - FastFill(FastFill<'a>), FastMarketOrder(FastMarketOrder<'a>), + FastFill(FastFill<'a>), } impl<'a> TryFrom> for LiquidityLayerMessage<'a> { @@ -64,8 +64,8 @@ impl<'a> AsRef<[u8]> for LiquidityLayerMessage<'a> { fn as_ref(&self) -> &[u8] { match self { Self::Deposit(inner) => inner.as_ref(), - Self::FastFill(inner) => inner.as_ref(), Self::FastMarketOrder(inner) => inner.as_ref(), + Self::FastFill(inner) => inner.as_ref(), } } } @@ -124,8 +124,8 @@ impl<'a> LiquidityLayerMessage<'a> { match span[0] { 1 => Ok(Self::Deposit(Deposit::parse(&span[1..])?)), - 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), 11 => Ok(Self::FastMarketOrder(FastMarketOrder::parse(&span[1..])?)), + 12 => Ok(Self::FastFill(FastFill::parse(&span[1..])?)), _ => Err("Unknown LiquidityLayerMessage type"), } } @@ -141,12 +141,12 @@ impl<'a> AsRef<[u8]> for FastFill<'a> { } impl<'a> FastFill<'a> { - pub fn fill(&'a self) -> Fill<'a> { - Fill::parse(&self.0[78..]).unwrap() + pub fn amount(&self) -> u64 { + u64::from_be_bytes(self.0[..8].try_into().unwrap()) } - pub fn amount(&self) -> u64 { - u64::from_be_bytes(self.0[66..74].try_into().unwrap()) + pub fn fill(&'a self) -> Fill<'a> { + Fill::parse(&self.0[8..]).unwrap() } pub fn parse(span: &'a [u8]) -> Result { diff --git a/solana/ts/src/messages/deposit.ts b/solana/ts/src/messages/deposit.ts index 0975b2d8..b883dd2d 100644 --- a/solana/ts/src/messages/deposit.ts +++ b/solana/ts/src/messages/deposit.ts @@ -3,8 +3,8 @@ import { ethers } from "ethers"; export const ID_DEPOSIT = 1; -export const ID_DEPOSIT_FILL = 11; -export const ID_DEPOSIT_SLOW_ORDER_RESPONSE = 14; +export const ID_DEPOSIT_FILL = 1; +export const ID_DEPOSIT_SLOW_ORDER_RESPONSE = 2; export type DepositHeader = { tokenAddress: Array; @@ -24,7 +24,7 @@ export type Fill = { }; export type SlowOrderResponse = { - // u128 + // u64 baseFee: bigint; }; @@ -88,9 +88,7 @@ export class LiquidityLayerDeposit { }; } case ID_DEPOSIT_SLOW_ORDER_RESPONSE: { - const baseFee = BigInt( - new BN(buf.subarray(offset, (offset += 16)), undefined, "be").toString() - ); + const baseFee = buf.readBigUInt64BE(offset); return { slowOrderResponse: { baseFee }, }; @@ -168,12 +166,10 @@ export class LiquidityLayerDeposit { } else if (slowOrderResponse !== undefined) { const { baseFee } = slowOrderResponse; - const messageBuf = Buffer.alloc(1 + 16); + const messageBuf = Buffer.alloc(1 + 8); let offset = 0; offset = messageBuf.writeUInt8(ID_DEPOSIT_SLOW_ORDER_RESPONSE, offset); - const encodedBaseFee = new BN(baseFee.toString()).toBuffer("be", 16); - messageBuf.set(encodedBaseFee, offset); - offset += encodedBaseFee.length; + offset = messageBuf.writeBigUInt64BE(baseFee, offset); return messageBuf; } else { diff --git a/solana/ts/src/messages/index.ts b/solana/ts/src/messages/index.ts index dce06e5c..586cc9ff 100644 --- a/solana/ts/src/messages/index.ts +++ b/solana/ts/src/messages/index.ts @@ -1,11 +1,10 @@ import { BN } from "@coral-xyz/anchor"; -import { ethers } from "ethers"; import { Fill, ID_DEPOSIT, LiquidityLayerDeposit } from "./deposit"; export * from "./deposit"; +export const ID_FAST_MARKET_ORDER = 11; export const ID_FAST_FILL = 12; -export const ID_FAST_MARKET_ORDER = 13; export type FastFill = { // u64 @@ -61,25 +60,6 @@ export class LiquidityLayerMessage { fastMarketOrder: undefined, }; } - case ID_FAST_FILL: { - const amount = buf.readBigUInt64BE(offset); - offset += 8; - const sourceChain = buf.readUInt16BE(offset); - offset += 2; - const orderSender = Array.from(buf.subarray(offset, (offset += 32))); - const redeemer = Array.from(buf.subarray(offset, (offset += 32))); - const redeemerMessageLen = buf.readUInt32BE(offset); - offset += 4; - const redeemerMessage = buf.subarray(offset, (offset += redeemerMessageLen)); - return { - deposit: undefined, - fastFill: { - fill: { sourceChain, orderSender, redeemer, redeemerMessage }, - amount, - } as FastFill, - fastMarketOrder: undefined, - }; - } case ID_FAST_MARKET_ORDER: { const amountIn = buf.readBigUInt64BE(offset); offset += 8; @@ -118,6 +98,25 @@ export class LiquidityLayerMessage { } as FastMarketOrder, }; } + case ID_FAST_FILL: { + const amount = buf.readBigUInt64BE(offset); + offset += 8; + const sourceChain = buf.readUInt16BE(offset); + offset += 2; + const orderSender = Array.from(buf.subarray(offset, (offset += 32))); + const redeemer = Array.from(buf.subarray(offset, (offset += 32))); + const redeemerMessageLen = buf.readUInt32BE(offset); + offset += 4; + const redeemerMessage = buf.subarray(offset, (offset += redeemerMessageLen)); + return { + deposit: undefined, + fastFill: { + amount, + fill: { sourceChain, orderSender, redeemer, redeemerMessage }, + } as FastFill, + fastMarketOrder: undefined, + }; + } default: { throw new Error("Invalid Liquidity Layer message"); } @@ -140,10 +139,8 @@ export class LiquidityLayerMessage { const messageBuf = Buffer.alloc(1 + 78 + redeemerMessage.length); let offset = 0; - const encodedAmount = new BN(amount.toString()).toBuffer("be", 8); - messageBuf.set(encodedAmount, offset); - offset += encodedAmount.length; offset = messageBuf.writeUInt8(ID_FAST_FILL, offset); + offset = messageBuf.writeBigUInt64BE(amount, offset); offset = messageBuf.writeUInt16BE(sourceChain, offset); messageBuf.set(orderSender, offset); offset += orderSender.length; @@ -173,12 +170,8 @@ export class LiquidityLayerMessage { let offset = 0; offset = messageBuf.writeUInt8(ID_FAST_MARKET_ORDER, offset); - const encodedAmountIn = new BN(amountIn.toString()).toBuffer("be", 8); - messageBuf.set(encodedAmountIn, offset); - offset += encodedAmountIn.length; - const encodedMinAmountOut = new BN(minAmountOut.toString()).toBuffer("be", 8); - messageBuf.set(encodedMinAmountOut, offset); - offset += encodedMinAmountOut.length; + offset = messageBuf.writeBigUInt64BE(amountIn, offset); + offset = messageBuf.writeBigUInt64BE(minAmountOut, offset); offset = messageBuf.writeUInt16BE(targetChain, offset); offset = messageBuf.writeUInt32BE(destinationCctpDomain, offset); messageBuf.set(redeemer, offset); @@ -187,12 +180,8 @@ export class LiquidityLayerMessage { offset += sender.length; messageBuf.set(refundAddress, offset); offset += refundAddress.length; - const encodedMaxFee = new BN(maxFee.toString()).toBuffer("be", 8); - messageBuf.set(encodedMaxFee, offset); - offset += encodedMaxFee.length; - const encodedInitAuctionFee = new BN(initAuctionFee.toString()).toBuffer("be", 8); - messageBuf.set(encodedInitAuctionFee, offset); - offset += encodedInitAuctionFee.length; + offset = messageBuf.writeBigUInt64BE(maxFee, offset); + offset = messageBuf.writeBigUInt64BE(initAuctionFee, offset); offset = messageBuf.writeUInt32BE(deadline, offset); offset = messageBuf.writeUInt32BE(redeemerMessage.length, offset); messageBuf.set(redeemerMessage, offset); diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 47803c00..23b967d5 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -1238,12 +1238,22 @@ describe("Token Router", function () { } ); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress ); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidDepositMessage", { - addressLookupTableAccounts: [lookupTableAccount!], - }); + await expectIxErr( + connection, + [computeIx, ix], + [payer], + "Error Code: InvalidDepositMessage", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); }); it("Cannot Redeem Fill with Invalid Payload ID", async function () { diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index 773f67f5..8e28c846 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -18,12 +18,8 @@ import { Fill, LiquidityLayerMessage, FastMarketOrder } from "../../src"; import { expect } from "chai"; export async function getTokenBalance(connection: Connection, address: PublicKey) { - return ( - await getAccount( - connection, - await getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, address) - ) - ).amount; + return (await getAccount(connection, getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, address))) + .amount; } export async function postVaa( @@ -69,7 +65,6 @@ export async function postVaaWithMessage( emitterChain = CHAIN_ID_ETH; } - console.log(payload.toString("hex")); const foreignEmitter = new MockEmitter( tryNativeToHexString(emitterAddress, emitterChain), emitterChain, From 543cd76a346244b07fd9a34bfedb8e7c2d6decd4 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 23 Jan 2024 16:18:29 -0600 Subject: [PATCH 085/126] solana: reorganize; tests WIP --- solana/programs/matching-engine/src/lib.rs | 28 +- .../local.rs} | 0 .../mod.rs} | 3 + .../src/processor/auction/mod.rs | 16 +- .../{improve_offer.rs => offer/improve.rs} | 0 .../src/processor/auction/offer/mod.rs | 5 + .../place_initial.rs} | 0 .../prepare_settlement}/cctp.rs | 26 +- .../prepare_settlement}/mod.rs | 0 .../settle/active_cctp.rs} | 31 +- .../settle/complete.rs} | 28 +- .../src/processor/auction/settle/mod.rs | 8 + .../settle/none_cctp.rs} | 27 +- ...eem_fast_fill.rs => complete_fast_fill.rs} | 6 +- .../src/processor/execute_slow_order/mod.rs | 8 - .../matching-engine/src/processor/mod.rs | 10 +- .../programs/matching-engine/src/state/mod.rs | 4 +- ...rder.rs => prepared_auction_settlement.rs} | 9 +- solana/programs/token-router/src/error.rs | 7 +- .../src/processor/close_prepared_order.rs | 8 +- .../src/processor/consume_prepared_fill.rs | 2 + .../src/processor/market_order/place_cctp.rs | 13 +- .../src/processor/market_order/prepare.rs | 16 +- .../src/processor/redeem_fill/cctp.rs | 8 +- .../src/processor/redeem_fill/fast.rs | 14 +- .../token-router/src/state/prepared_fill.rs | 2 +- .../token-router/src/state/prepared_order.rs | 2 +- solana/ts/src/matchingEngine/index.ts | 333 +++++++++++++++--- ...wOrder.ts => PreparedAuctionSettlement.ts} | 10 +- solana/ts/src/matchingEngine/state/index.ts | 2 + solana/ts/src/tokenRouter/index.ts | 20 +- .../ts/src/tokenRouter/state/PreparedFill.ts | 6 +- .../ts/src/tokenRouter/state/PreparedOrder.ts | 2 +- solana/ts/tests/01__matchingEngine.ts | 20 +- solana/ts/tests/02__tokenRouter.ts | 12 +- 35 files changed, 479 insertions(+), 207 deletions(-) rename solana/programs/matching-engine/src/processor/auction/{execute_fast_order_solana.rs => execute_fast_order/local.rs} (100%) rename solana/programs/matching-engine/src/processor/auction/{execute_fast_order.rs => execute_fast_order/mod.rs} (99%) rename solana/programs/matching-engine/src/processor/auction/{improve_offer.rs => offer/improve.rs} (100%) create mode 100644 solana/programs/matching-engine/src/processor/auction/offer/mod.rs rename solana/programs/matching-engine/src/processor/auction/{place_initial_offer.rs => offer/place_initial.rs} (100%) rename solana/programs/matching-engine/src/processor/{prepare_slow_order => auction/prepare_settlement}/cctp.rs (93%) rename solana/programs/matching-engine/src/processor/{prepare_slow_order => auction/prepare_settlement}/mod.rs (100%) rename solana/programs/matching-engine/src/processor/{execute_slow_order/auction_active_cctp.rs => auction/settle/active_cctp.rs} (94%) rename solana/programs/matching-engine/src/processor/{execute_slow_order/auction_complete.rs => auction/settle/complete.rs} (83%) create mode 100644 solana/programs/matching-engine/src/processor/auction/settle/mod.rs rename solana/programs/matching-engine/src/processor/{execute_slow_order/no_auction_cctp.rs => auction/settle/none_cctp.rs} (94%) rename solana/programs/matching-engine/src/processor/{redeem_fast_fill.rs => complete_fast_fill.rs} (95%) delete mode 100644 solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs rename solana/programs/matching-engine/src/state/{prepared_slow_order.rs => prepared_auction_settlement.rs} (59%) rename solana/ts/src/matchingEngine/state/{PreparedSlowOrder.ts => PreparedAuctionSettlement.ts} (70%) diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 3d8a9472..bc214080 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -26,33 +26,27 @@ cfg_if::cfg_if! { pub mod matching_engine { use super::*; - pub fn redeem_fast_fill(ctx: Context) -> Result<()> { - processor::redeem_fast_fill(ctx) + pub fn complete_fast_fill(ctx: Context) -> Result<()> { + processor::complete_fast_fill(ctx) } - pub fn prepare_slow_order_cctp( - ctx: Context, + pub fn prepare_auction_settlement_cctp( + ctx: Context, args: CctpMessageArgs, ) -> Result<()> { - processor::prepare_slow_order_cctp(ctx, args) + processor::prepare_auction_settlement_cctp(ctx, args) } - pub fn execute_slow_order_auction_complete( - ctx: Context, - ) -> Result<()> { - processor::execute_slow_order_auction_complete(ctx) + pub fn settle_auction_complete(ctx: Context) -> Result<()> { + processor::settle_auction_complete(ctx) } - pub fn execute_slow_order_no_auction_cctp( - ctx: Context, - ) -> Result<()> { - processor::execute_slow_order_no_auction_cctp(ctx) + pub fn settle_auction_none_cctp(ctx: Context) -> Result<()> { + processor::settle_auction_none_cctp(ctx) } - pub fn execute_slow_order_auction_active_cctp( - ctx: Context, - ) -> Result<()> { - processor::execute_slow_order_auction_active_cctp(ctx) + pub fn settle_auction_active_cctp(ctx: Context) -> Result<()> { + processor::settle_auction_active_cctp(ctx) } /// This instruction is be used to generate your program's config. diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs similarity index 100% rename from solana/programs/matching-engine/src/processor/auction/execute_fast_order_solana.rs rename to solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs similarity index 99% rename from solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs rename to solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index 1567e4b1..e5e0fdd8 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -1,3 +1,6 @@ +mod local; +pub use local::*; + use crate::{ error::MatchingEngineError, handle_fast_order_execution, send_cctp, diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 43e964d5..491345dc 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -1,14 +1,14 @@ -mod place_initial_offer; -pub use place_initial_offer::*; - -mod improve_offer; -pub use improve_offer::*; - mod execute_fast_order; pub use execute_fast_order::*; -mod execute_fast_order_solana; -pub use execute_fast_order_solana::*; +mod offer; +pub use offer::*; + +mod prepare_settlement; +pub use prepare_settlement::*; + +mod settle; +pub use settle::*; use anchor_lang::prelude::*; use anchor_spl::token; diff --git a/solana/programs/matching-engine/src/processor/auction/improve_offer.rs b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs similarity index 100% rename from solana/programs/matching-engine/src/processor/auction/improve_offer.rs rename to solana/programs/matching-engine/src/processor/auction/offer/improve.rs diff --git a/solana/programs/matching-engine/src/processor/auction/offer/mod.rs b/solana/programs/matching-engine/src/processor/auction/offer/mod.rs new file mode 100644 index 00000000..5f270a6c --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/offer/mod.rs @@ -0,0 +1,5 @@ +mod improve; +pub use improve::*; + +mod place_initial; +pub use place_initial::*; diff --git a/solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs similarity index 100% rename from solana/programs/matching-engine/src/processor/auction/place_initial_offer.rs rename to solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs similarity index 93% rename from solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs rename to solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index 11168ff3..43aa7b0e 100644 --- a/solana/programs/matching-engine/src/processor/prepare_slow_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::MatchingEngineError, - state::{Custodian, PreparedSlowOrder}, + state::{Custodian, PreparedAuctionSettlement}, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -11,7 +11,7 @@ use wormhole_cctp_solana::{ }; #[derive(Accounts)] -pub struct PrepareSlowOrderCctp<'info> { +pub struct PrepareAuctionSettlementCctp<'info> { #[account(mut)] payer: Signer<'info>, @@ -36,15 +36,15 @@ pub struct PrepareSlowOrderCctp<'info> { #[account( init, payer = payer, - space = 8 + PreparedSlowOrder::INIT_SPACE, + space = 8 + PreparedAuctionSettlement::INIT_SPACE, seeds = [ - PreparedSlowOrder::SEED_PREFIX, + PreparedAuctionSettlement::SEED_PREFIX, payer.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump, )] - prepared_slow_order: Account<'info, PreparedSlowOrder>, + prepared_auction_settlement: Account<'info, PreparedAuctionSettlement>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -109,8 +109,8 @@ pub struct CctpMessageArgs { pub cctp_attestation: Vec, } -pub fn prepare_slow_order_cctp( - ctx: Context, +pub fn prepare_auction_settlement_cctp( + ctx: Context, args: CctpMessageArgs, ) -> Result<()> { let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); @@ -202,15 +202,15 @@ pub fn prepare_slow_order_cctp( // Write to the prepared slow order account, which will be closed by one of the following // instructions: - // * execute_slow_order_auction_active_cctp - // * execute_slow_order_auction_complete + // * settle_auction_active_cctp + // * settle_auction_complete // * execute_slow_order_no_auction ctx.accounts - .prepared_slow_order - .set_inner(PreparedSlowOrder { - bump: ctx.bumps["prepared_slow_order"], - prepared_by: ctx.accounts.payer.key(), + .prepared_auction_settlement + .set_inner(PreparedAuctionSettlement { + bump: ctx.bumps["prepared_auction_settlement"], fast_vaa_hash: fast_vaa.try_digest().unwrap().0, + prepared_by: ctx.accounts.payer.key(), source_chain, base_fee: slow_order_response.base_fee().try_into().unwrap(), }); diff --git a/solana/programs/matching-engine/src/processor/prepare_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/mod.rs similarity index 100% rename from solana/programs/matching-engine/src/processor/prepare_slow_order/mod.rs rename to solana/programs/matching-engine/src/processor/auction/prepare_settlement/mod.rs diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active_cctp.rs similarity index 94% rename from solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs rename to solana/programs/matching-engine/src/processor/auction/settle/active_cctp.rs index b8d4e223..5df45575 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_active_cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active_cctp.rs @@ -3,7 +3,8 @@ use std::io::Write; use crate::{ error::MatchingEngineError, state::{ - AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedSlowOrder, RouterEndpoint, + AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedAuctionSettlement, + RouterEndpoint, }, }; use anchor_lang::prelude::*; @@ -14,8 +15,9 @@ use wormhole_cctp_solana::{ wormhole::core_bridge_program::{self, VaaAccount}, }; +/// Accounts required for [settle_auction_active_cctp]. #[derive(Accounts)] -pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { +pub struct SettleAuctionActiveCctp<'info> { #[account(mut)] payer: Signer<'info>, @@ -45,7 +47,8 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be the account that created the prepared slow order. + /// CHECK: Must be the account that created the prepared slow order. This account will most + /// likely be the same as the payer. #[account(mut)] prepared_by: AccountInfo<'info>, @@ -53,20 +56,20 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { mut, close = prepared_by, seeds = [ - PreparedSlowOrder::SEED_PREFIX, + PreparedAuctionSettlement::SEED_PREFIX, prepared_by.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], - bump = prepared_slow_order.bump, + bump = prepared_auction_settlement.bump, )] - prepared_slow_order: Box>, + prepared_auction_settlement: Box>, /// There should be no account data here because an auction was never created. #[account( mut, seeds = [ AuctionData::SEED_PREFIX, - prepared_slow_order.fast_vaa_hash.as_ref(), + prepared_auction_settlement.fast_vaa_hash.as_ref(), ], bump = auction_data.bump, has_one = best_offer_token, // TODO: add error @@ -104,10 +107,7 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { /// /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP /// Token Messenger Minter program's local token account. - #[account( - mut, - address = common::constants::usdc::id(), - )] + #[account(mut)] mint: AccountInfo<'info>, /// Seeds must be \["endpoint", chain.to_be_bytes()\]. @@ -199,9 +199,8 @@ pub struct ExecuteSlowOrderAuctionActiveCctp<'info> { rent: AccountInfo<'info>, } -pub fn execute_slow_order_auction_active_cctp( - ctx: Context, -) -> Result<()> { +/// TODO: add docstring +pub fn settle_auction_active_cctp(ctx: Context) -> Result<()> { let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) .unwrap() @@ -222,7 +221,7 @@ pub fn execute_slow_order_auction_active_cctp( ) .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; - let base_fee = ctx.accounts.prepared_slow_order.base_fee; + let base_fee = ctx.accounts.prepared_auction_settlement.base_fee; ( AuctionStatus::Settled { base_fee, @@ -321,7 +320,7 @@ pub fn execute_slow_order_auction_active_cctp( mint_recipient: ctx.accounts.to_router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, payload: common::messages::Fill { - source_chain: ctx.accounts.prepared_slow_order.source_chain, + source_chain: ctx.accounts.prepared_auction_settlement.source_chain, order_sender: order.sender(), redeemer: order.redeemer(), redeemer_message: redeemer_message.into(), diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs b/solana/programs/matching-engine/src/processor/auction/settle/complete.rs similarity index 83% rename from solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs rename to solana/programs/matching-engine/src/processor/auction/settle/complete.rs index b82fb42b..6bf3c6c7 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/auction_complete.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/complete.rs @@ -1,13 +1,9 @@ -use crate::state::{AuctionData, AuctionStatus, Custodian, PreparedSlowOrder}; +use crate::state::{AuctionData, AuctionStatus, Custodian, PreparedAuctionSettlement}; use anchor_lang::prelude::*; use anchor_spl::token; #[derive(Accounts)] -pub struct ExecuteSlowOrderAuctionComplete<'info> { - /// CHECK: Must be the account that created the prepared slow order. - #[account(mut)] - prepared_by: AccountInfo<'info>, - +pub struct SettleAuctionComplete<'info> { /// This program's Wormhole (Core Bridge) emitter authority. /// /// CHECK: Seeds must be \["emitter"\]. @@ -17,22 +13,26 @@ pub struct ExecuteSlowOrderAuctionComplete<'info> { )] custodian: Account<'info, Custodian>, + /// CHECK: Must be the account that created the prepared slow order. + #[account(mut)] + prepared_by: AccountInfo<'info>, + #[account( mut, close = prepared_by, seeds = [ - PreparedSlowOrder::SEED_PREFIX, + PreparedAuctionSettlement::SEED_PREFIX, prepared_by.key().as_ref(), - prepared_slow_order.fast_vaa_hash.as_ref() + prepared_auction_settlement.fast_vaa_hash.as_ref() ], - bump = prepared_slow_order.bump, + bump = prepared_auction_settlement.bump, )] - prepared_slow_order: Account<'info, PreparedSlowOrder>, + prepared_auction_settlement: Account<'info, PreparedAuctionSettlement>, #[account( seeds = [ AuctionData::SEED_PREFIX, - prepared_slow_order.fast_vaa_hash.as_ref(), + prepared_auction_settlement.fast_vaa_hash.as_ref(), ], bump = auction_data.bump, has_one = best_offer_token, // TODO: add error @@ -65,11 +65,9 @@ pub struct ExecuteSlowOrderAuctionComplete<'info> { token_program: Program<'info, token::Token>, } -pub fn execute_slow_order_auction_complete( - ctx: Context, -) -> Result<()> { +pub fn settle_auction_complete(ctx: Context) -> Result<()> { ctx.accounts.auction_data.status = AuctionStatus::Settled { - base_fee: ctx.accounts.prepared_slow_order.base_fee, + base_fee: ctx.accounts.prepared_auction_settlement.base_fee, penalty: None, }; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/mod.rs new file mode 100644 index 00000000..fd6ef7ab --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/settle/mod.rs @@ -0,0 +1,8 @@ +mod active_cctp; +pub use active_cctp::*; + +mod complete; +pub use complete::*; + +mod none_cctp; +pub use none_cctp::*; diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none_cctp.rs similarity index 94% rename from solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs rename to solana/programs/matching-engine/src/processor/auction/settle/none_cctp.rs index 84ea4299..f7f003cf 100644 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/no_auction_cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none_cctp.rs @@ -1,7 +1,7 @@ use std::io::Write; use crate::state::{ - AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedSlowOrder, RouterEndpoint, + AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedAuctionSettlement, RouterEndpoint, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -11,8 +11,9 @@ use wormhole_cctp_solana::{ wormhole::core_bridge_program::{self, VaaAccount}, }; +/// Accounts required for [settle_auction_none_cctp]. #[derive(Accounts)] -pub struct ExecuteSlowOrderNoAuctionCctp<'info> { +pub struct SettleAuctionNoneCctp<'info> { #[account(mut)] payer: Signer<'info>, @@ -43,7 +44,8 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be the account that created the prepared slow order. + /// CHECK: Must be the account that created the prepared slow order. This account will most + /// likely be the same as the payer. #[account(mut)] prepared_by: AccountInfo<'info>, @@ -51,13 +53,13 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { mut, close = prepared_by, seeds = [ - PreparedSlowOrder::SEED_PREFIX, + PreparedAuctionSettlement::SEED_PREFIX, prepared_by.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], - bump = prepared_slow_order.bump, + bump = prepared_auction_settlement.bump, )] - prepared_slow_order: Account<'info, PreparedSlowOrder>, + prepared_auction_settlement: Account<'info, PreparedAuctionSettlement>, /// There should be no account data here because an auction was never created. #[account( @@ -66,7 +68,7 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { space = 8 + AuctionData::INIT_SPACE, seeds = [ AuctionData::SEED_PREFIX, - prepared_slow_order.fast_vaa_hash.as_ref(), + prepared_auction_settlement.fast_vaa_hash.as_ref(), ], bump )] @@ -187,9 +189,8 @@ pub struct ExecuteSlowOrderNoAuctionCctp<'info> { rent: AccountInfo<'info>, } -pub fn execute_slow_order_no_auction_cctp( - ctx: Context, -) -> Result<()> { +/// TODO: add docstring +pub fn settle_auction_none_cctp(ctx: Context) -> Result<()> { let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) .unwrap() @@ -206,7 +207,7 @@ pub fn execute_slow_order_no_auction_cctp( let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; - let base_fee = ctx.accounts.prepared_slow_order.base_fee; + let base_fee = ctx.accounts.prepared_auction_settlement.base_fee; let amount = order.amount_in() - base_fee; let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); redeemer_message.write_all(order.redeemer_message().into())?; @@ -281,7 +282,7 @@ pub fn execute_slow_order_no_auction_cctp( mint_recipient: ctx.accounts.to_router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, payload: common::messages::Fill { - source_chain: ctx.accounts.prepared_slow_order.source_chain, + source_chain: ctx.accounts.prepared_auction_settlement.source_chain, order_sender: order.sender(), redeemer: order.redeemer(), redeemer_message: redeemer_message.into(), @@ -315,6 +316,6 @@ pub fn execute_slow_order_no_auction_cctp( &[custodian_seeds], ), // TODO: encoding will change from u128 to u64 - ctx.accounts.prepared_slow_order.base_fee, + ctx.accounts.prepared_auction_settlement.base_fee, ) } diff --git a/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs similarity index 95% rename from solana/programs/matching-engine/src/processor/redeem_fast_fill.rs rename to solana/programs/matching-engine/src/processor/complete_fast_fill.rs index c8fc703a..df450947 100644 --- a/solana/programs/matching-engine/src/processor/redeem_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -8,8 +8,9 @@ use crate::{ state::{Custodian, RedeemedFastFill, RouterEndpoint}, }; +/// Accounts required for [complete_fast_fill]. #[derive(Accounts)] -pub struct RedeemFastFill<'info> { +pub struct CompleteFastFill<'info> { #[account(mut)] payer: Signer<'info>, @@ -74,7 +75,8 @@ pub struct RedeemFastFill<'info> { system_program: Program<'info, System>, } -pub fn redeem_fast_fill(ctx: Context) -> Result<()> { +/// TODO: docstring +pub fn complete_fast_fill(ctx: Context) -> Result<()> { let vaa = core_bridge_program::VaaAccount::load(&ctx.accounts.vaa).unwrap(); // Emitter must be the matching engine (this program). diff --git a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs b/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs deleted file mode 100644 index e492e0a6..00000000 --- a/solana/programs/matching-engine/src/processor/execute_slow_order/mod.rs +++ /dev/null @@ -1,8 +0,0 @@ -mod auction_active_cctp; -pub use auction_active_cctp::*; - -mod auction_complete; -pub use auction_complete::*; - -mod no_auction_cctp; -pub use no_auction_cctp::*; diff --git a/solana/programs/matching-engine/src/processor/mod.rs b/solana/programs/matching-engine/src/processor/mod.rs index 68acb961..b1ecfa3a 100644 --- a/solana/programs/matching-engine/src/processor/mod.rs +++ b/solana/programs/matching-engine/src/processor/mod.rs @@ -4,11 +4,5 @@ pub use admin::*; mod auction; pub use auction::*; -mod execute_slow_order; -pub use execute_slow_order::*; - -mod prepare_slow_order; -pub use prepare_slow_order::*; - -mod redeem_fast_fill; -pub use redeem_fast_fill::*; +mod complete_fast_fill; +pub use complete_fast_fill::*; diff --git a/solana/programs/matching-engine/src/state/mod.rs b/solana/programs/matching-engine/src/state/mod.rs index c444b4cf..162364ed 100644 --- a/solana/programs/matching-engine/src/state/mod.rs +++ b/solana/programs/matching-engine/src/state/mod.rs @@ -7,8 +7,8 @@ pub use custodian::*; mod payer_sequence; pub use payer_sequence::*; -mod prepared_slow_order; -pub use prepared_slow_order::*; +mod prepared_auction_settlement; +pub use prepared_auction_settlement::*; mod redeemed_fast_fill; pub use redeemed_fast_fill::*; diff --git a/solana/programs/matching-engine/src/state/prepared_slow_order.rs b/solana/programs/matching-engine/src/state/prepared_auction_settlement.rs similarity index 59% rename from solana/programs/matching-engine/src/state/prepared_slow_order.rs rename to solana/programs/matching-engine/src/state/prepared_auction_settlement.rs index d8f875e0..ca8d12aa 100644 --- a/solana/programs/matching-engine/src/state/prepared_slow_order.rs +++ b/solana/programs/matching-engine/src/state/prepared_auction_settlement.rs @@ -2,15 +2,16 @@ use anchor_lang::prelude::*; #[account] #[derive(Debug, InitSpace)] -pub struct PreparedSlowOrder { +pub struct PreparedAuctionSettlement { pub bump: u8, - pub prepared_by: Pubkey, pub fast_vaa_hash: [u8; 32], + pub prepared_by: Pubkey, + pub source_chain: u16, pub base_fee: u64, } -impl PreparedSlowOrder { - pub const SEED_PREFIX: &'static [u8] = b"prepared"; +impl PreparedAuctionSettlement { + pub const SEED_PREFIX: &'static [u8] = b"auction-settlement"; } diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index d267cc67..643a0c6a 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -56,8 +56,8 @@ pub enum TokenRouterError { #[msg("MinAmountOutTooHigh")] MinAmountOutTooHigh = 0x102, - #[msg("PayerMismatch")] - PayerMismatch = 0x120, + #[msg("PreparedByMismatch")] + PreparedByMismatch = 0x120, #[msg("OrderSenderMismatch")] OrderSenderMismatch = 0x122, @@ -65,6 +65,9 @@ pub enum TokenRouterError { #[msg("RefundTokenMismatch")] RefundTokenMismatch = 0x124, + #[msg("PayerNotPreparer")] + PayerNotPreparer = 0x126, + #[msg("InvalidSourceRouter")] InvalidSourceRouter = 0x200, diff --git a/solana/programs/token-router/src/processor/close_prepared_order.rs b/solana/programs/token-router/src/processor/close_prepared_order.rs index 8ed6399f..3c4a69c1 100644 --- a/solana/programs/token-router/src/processor/close_prepared_order.rs +++ b/solana/programs/token-router/src/processor/close_prepared_order.rs @@ -6,6 +6,7 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; +/// Accounts required for [close_prepared_order]. #[derive(Accounts)] pub struct ClosePreparedOrder<'info> { /// Custodian, but does not need to be deserialized. @@ -22,12 +23,12 @@ pub struct ClosePreparedOrder<'info> { /// CHECK: This payer must be the same one encoded in the prepared order. #[account(mut)] - payer: AccountInfo<'info>, + prepared_by: AccountInfo<'info>, #[account( mut, - close = payer, - has_one = payer @ TokenRouterError::PayerMismatch, + close = prepared_by, + has_one = prepared_by @ TokenRouterError::PreparedByMismatch, has_one = order_sender @ TokenRouterError::OrderSenderMismatch, has_one = refund_token @ TokenRouterError::RefundTokenMismatch, )] @@ -51,6 +52,7 @@ pub struct ClosePreparedOrder<'info> { token_program: Program<'info, token::Token>, } +/// TODO: add docstring pub fn close_prepared_order(ctx: Context) -> Result<()> { token::transfer( CpiContext::new_with_signer( diff --git a/solana/programs/token-router/src/processor/consume_prepared_fill.rs b/solana/programs/token-router/src/processor/consume_prepared_fill.rs index 1b104b7c..b4105d06 100644 --- a/solana/programs/token-router/src/processor/consume_prepared_fill.rs +++ b/solana/programs/token-router/src/processor/consume_prepared_fill.rs @@ -6,6 +6,7 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; +/// Accounts required for [consume_prepared_fill]. #[derive(Accounts)] pub struct ConsumePreparedFill<'info> { /// Custodian, but does not need to be deserialized. @@ -56,6 +57,7 @@ pub struct ConsumePreparedFill<'info> { token_program: Program<'info, token::Token>, } +/// TODO: add docstring pub fn consume_prepared_fill(ctx: Context) -> Result<()> { token::transfer( CpiContext::new_with_signer( diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index d7a26af3..0427ce62 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -11,9 +11,10 @@ use wormhole_cctp_solana::{ wormhole::core_bridge_program, }; -/// Account context to invoke [place_market_order_cctp]. +/// Accounts required for [place_market_order_cctp]. #[derive(Accounts)] pub struct PlaceMarketOrderCctp<'info> { + /// This account must be the same pubkey as the one who prepared the order. #[account(mut)] payer: Signer<'info>, @@ -42,8 +43,16 @@ pub struct PlaceMarketOrderCctp<'info> { #[account( mut, close = payer, - has_one = payer @ TokenRouterError::PayerMismatch, has_one = order_sender @ TokenRouterError::OrderSenderMismatch, + constraint = { + // We use require here so the revert shows left vs right. + require_keys_eq!( + payer.key(), + prepared_order.prepared_by, + TokenRouterError::PayerNotPreparer + ); + true + }, )] prepared_order: Account<'info, PreparedOrder>, diff --git a/solana/programs/token-router/src/processor/market_order/prepare.rs b/solana/programs/token-router/src/processor/market_order/prepare.rs index 26ff7c60..62e62a2a 100644 --- a/solana/programs/token-router/src/processor/market_order/prepare.rs +++ b/solana/programs/token-router/src/processor/market_order/prepare.rs @@ -7,6 +7,7 @@ use crate::{ CUSTODY_TOKEN_BUMP, }; +/// Accounts required for [prepare_market_order]. #[derive(Accounts)] #[instruction(args: PrepareMarketOrderArgs)] pub struct PrepareMarketOrder<'info> { @@ -48,23 +49,28 @@ pub struct PrepareMarketOrder<'info> { system_program: Program<'info, System>, } +/// Arguments for [prepare_market_order]. #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] pub struct PrepareMarketOrderArgs { - /// Transfer amount. + /// Amount of tokens to transfer. pub amount_in: u64, - // If provided, amount of tokens expected to be received on the target chain. + /// If provided, minimum amount of tokens to receive in exchange for + /// [amount_in](Self::amount_in). pub min_amount_out: Option, + /// The Wormhole chain ID of the network to transfer tokens to. pub target_chain: u16, + /// The address of the redeeming contract on the target chain. pub redeemer: [u8; 32], - /// Arbitrary payload, which can be used to encode instructions or data for another network's - /// smart contract. + /// Arbitrary payload to be sent to the [redeemer](Self::redeemer), which can be used to encode + /// instructions or data for another network's smart contract. pub redeemer_message: Vec, } +/// TODO: add docstring pub fn prepare_market_order( ctx: Context, args: PrepareMarketOrderArgs, @@ -94,7 +100,7 @@ pub fn prepare_market_order( ctx.accounts.prepared_order.set_inner(PreparedOrder { info: Box::new(PreparedOrderInfo { order_sender: ctx.accounts.order_sender.key(), - payer: ctx.accounts.payer.key(), + prepared_by: ctx.accounts.payer.key(), order_type: OrderType::Market { min_amount_out }, order_token: ctx.accounts.order_token.key(), refund_token: ctx.accounts.refund_token.key(), diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 6b7cb9fd..51f7f10f 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -13,13 +13,13 @@ use wormhole_cctp_solana::{ wormhole::core_bridge_program::VaaAccount, }; -/// Account context to invoke [redeem_cctp_fill]. +/// Accounts required for [redeem_cctp_fill]. #[derive(Accounts)] pub struct RedeemCctpFill<'info> { #[account(mut)] payer: Signer<'info>, - /// This program's Wormhole (Core Bridge) emitter authority. + /// Custodian, but does not need to be deserialized. /// /// CHECK: Seeds must be \["emitter"\]. #[account( @@ -113,7 +113,7 @@ pub struct RedeemCctpFill<'info> { system_program: Program<'info, System>, } -/// Arguments used to invoke [redeem_cctp_fill]. +/// Arguments for [redeem_cctp_fill]. #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] pub struct CctpMessageArgs { /// CCTP message. @@ -210,7 +210,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) vaa_hash: vaa.try_digest().unwrap().0, bump: ctx.bumps["prepared_fill"], redeemer: Pubkey::from(fill.redeemer()), - payer: ctx.accounts.payer.key(), + prepared_by: ctx.accounts.payer.key(), fill_type: FillType::WormholeCctpDeposit, source_chain: fill.source_chain(), order_sender: fill.order_sender(), diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 8cd06042..5d1e564f 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -7,13 +7,13 @@ use anchor_spl::token; use common::messages::raw::LiquidityLayerMessage; use wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}; -/// Account context to invoke [redeem_fast_fill]. +/// Accounts required for [redeem_fast_fill]. #[derive(Accounts)] pub struct RedeemFastFill<'info> { #[account(mut)] payer: Signer<'info>, - /// This program's Wormhole (Core Bridge) emitter authority. + /// Custodian, but does not need to be deserialized. /// /// CHECK: Seeds must be \["emitter"\]. #[account( @@ -43,13 +43,13 @@ pub struct RedeemFastFill<'info> { /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message /// from its custody account to this account. /// - /// Mutable. Seeds must be \["custody"\]. + /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], bump = CUSTODY_TOKEN_BUMP, )] - custody_token: Account<'info, token::TokenAccount>, + custody_token: AccountInfo<'info>, /// CHECK: Seeds must be \["emitter"] (Matching Engine program). #[account(mut)] @@ -85,9 +85,9 @@ pub fn redeem_fast_fill(ctx: Context) -> Result<()> { fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; - matching_engine::cpi::redeem_fast_fill(CpiContext::new_with_signer( + matching_engine::cpi::complete_fast_fill(CpiContext::new_with_signer( ctx.accounts.matching_engine_program.to_account_info(), - matching_engine::cpi::accounts::RedeemFastFill { + matching_engine::cpi::accounts::CompleteFastFill { payer: ctx.accounts.payer.to_account_info(), custodian: ctx.accounts.matching_engine_custodian.to_account_info(), vaa: ctx.accounts.vaa.to_account_info(), @@ -122,7 +122,7 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { vaa_hash: vaa.try_digest().unwrap().0, bump: ctx.bumps["prepared_fill"], redeemer: Pubkey::from(fill.redeemer()), - payer: ctx.accounts.payer.key(), + prepared_by: ctx.accounts.payer.key(), fill_type: FillType::FastFill, source_chain: fill.source_chain(), order_sender: fill.order_sender(), diff --git a/solana/programs/token-router/src/state/prepared_fill.rs b/solana/programs/token-router/src/state/prepared_fill.rs index acfc6a54..ff926f38 100644 --- a/solana/programs/token-router/src/state/prepared_fill.rs +++ b/solana/programs/token-router/src/state/prepared_fill.rs @@ -14,7 +14,7 @@ pub struct PreparedFill { pub bump: u8, pub redeemer: Pubkey, - pub payer: Pubkey, + pub prepared_by: Pubkey, pub fill_type: FillType, pub source_chain: u16, diff --git a/solana/programs/token-router/src/state/prepared_order.rs b/solana/programs/token-router/src/state/prepared_order.rs index cce660b4..575be9f3 100644 --- a/solana/programs/token-router/src/state/prepared_order.rs +++ b/solana/programs/token-router/src/state/prepared_order.rs @@ -8,7 +8,7 @@ pub enum OrderType { #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace)] pub struct PreparedOrderInfo { pub order_sender: Pubkey, - pub payer: Pubkey, + pub prepared_by: Pubkey, pub order_type: OrderType, pub order_token: Pubkey, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index d4b4a6a3..12a739b9 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -5,13 +5,21 @@ import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; -import { AuctionConfig, Custodian, RouterEndpoint, PayerSequence, RedeemedFastFill } from "./state"; -import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; -import { AuctionData } from "./state/AuctionData"; -import { MessageTransmitterProgram, TokenMessengerMinterProgram } from "../cctp"; import { USDC_MINT_ADDRESS } from "../../tests/helpers"; +import { MessageTransmitterProgram, TokenMessengerMinterProgram } from "../cctp"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; -import { PreparedSlowOrder } from "./state/PreparedSlowOrder"; +import { + AuctionConfig, + AuctionData, + Custodian, + PayerSequence, + PreparedAuctionSettlement, + RedeemedFastFill, + RouterEndpoint, +} from "./state"; +import { DepositForBurnWithCallerAccounts } from "../cctp/tokenMessengerMinter"; +import { LiquidityLayerMessage } from "../messages"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; @@ -24,10 +32,33 @@ export type AddRouterEndpointArgs = { }; export type PublishMessageAccounts = { + custodian: PublicKey; + payerSequence: PublicKey; + coreMessage: PublicKey; + coreBridgeConfig: PublicKey; + coreEmitterSequence: PublicKey; + coreFeeCollector: PublicKey; + coreBridgeProgram: PublicKey; +}; + +export type BurnAndPublishAccounts = { + custodian: PublicKey; + payerSequence: PublicKey; + routerEndpoint: PublicKey; + coreMessage: PublicKey; coreBridgeConfig: PublicKey; coreEmitterSequence: PublicKey; coreFeeCollector: PublicKey; coreBridgeProgram: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + tokenMessenger: PublicKey; + remoteTokenMessenger: PublicKey; + tokenMinter: PublicKey; + localToken: PublicKey; + messageTransmitterProgram: PublicKey; + tokenMessengerMinterProgram: PublicKey; + tokenProgram: PublicKey; }; export type RedeemFastFillAccounts = { @@ -117,18 +148,15 @@ export class MatchingEngineProgram { return this.program.account.redeemedFastFill.fetch(addr); } - preparedSlowOrderAddress( + preparedAuctionSettlementAddress( payer: PublicKey, fastVaaHash: Array | Buffer | Uint8Array ): PublicKey { - return PublicKey.findProgramAddressSync( - [Buffer.from("prepared"), payer.toBuffer(), Buffer.from(fastVaaHash)], - this.ID - )[0]; + return PreparedAuctionSettlement.address(this.ID, payer, fastVaaHash); } - fetchPreparedSlowOrder(addr: PublicKey): Promise { - return this.program.account.preparedSlowOrder.fetch(addr); + fetchPreparedAuctionSettlement(addr: PublicKey): Promise { + return this.program.account.preparedAuctionSettlement.fetch(addr); } async getBestOfferTokenAccount(vaaHash: Buffer | Uint8Array): Promise { @@ -376,7 +404,7 @@ export class MatchingEngineProgram { .instruction(); } - async prepareSlowOrderCctpIx( + async prepareAuctionSettlementCctpIx( accounts: { payer: PublicKey; fastVaa: PublicKey; @@ -404,13 +432,16 @@ export class MatchingEngineProgram { } = this.messageTransmitterProgram().receiveMessageAccounts(mint, encodedCctpMessage); return this.program.methods - .prepareSlowOrderCctp(args) + .prepareAuctionSettlementCctp(args) .accounts({ payer, custodian: this.custodianAddress(), fastVaa, finalizedVaa, - preparedSlowOrder: this.preparedSlowOrderAddress(payer, fastVaaAcct.digest()), + preparedAuctionSettlement: this.preparedAuctionSettlementAddress( + payer, + fastVaaAcct.digest() + ), custodyToken: this.custodyTokenAccountAddress(), messageTransmitterAuthority, messageTransmitterConfig, @@ -428,6 +459,151 @@ export class MatchingEngineProgram { .instruction(); } + async settleAuctionCompleteIx(accounts: { + preparedAuctionSettlement: PublicKey; + auctionData?: PublicKey; + preparedBy?: PublicKey; + bestOfferToken?: PublicKey; + }) { + const { + preparedAuctionSettlement, + auctionData: inputAuctionData, + preparedBy: inputPreparedBy, + bestOfferToken: inputBestOfferToken, + } = accounts; + + const { preparedBy, auctionData } = await (async () => { + if (inputPreparedBy !== undefined && inputAuctionData !== undefined) { + return { + preparedBy: inputPreparedBy, + auctionData: inputAuctionData, + }; + } else { + const { preparedBy, fastVaaHash } = await this.fetchPreparedAuctionSettlement( + preparedAuctionSettlement + ); + return { + preparedBy, + auctionData: this.auctionDataAddress(fastVaaHash), + }; + } + })(); + + const bestOfferToken = await (async () => { + if (inputBestOfferToken !== undefined) { + return inputBestOfferToken; + } else { + const { bestOfferToken } = await this.fetchAuctionData( + await this.fetchPreparedAuctionSettlement(preparedAuctionSettlement).then( + (acct) => acct.fastVaaHash + ) + ); + return bestOfferToken; + } + })(); + + return this.program.methods + .settleAuctionComplete() + .accounts({ + custodian: this.custodianAddress(), + preparedBy, + preparedAuctionSettlement, + auctionData, + bestOfferToken, + custodyToken: this.custodyTokenAccountAddress(), + tokenProgram: splToken.TOKEN_PROGRAM_ID, + }) + .instruction(); + } + + // async settleAuctionActiveCctpIx( + // accounts: { + // payer: PublicKey; + // fastVaa: PublicKey; + // liquidatorToken: PublicKey; + // preparedAuctionSettlement?: PublicKey; + // auctionData?: PublicKey; + // preparedBy?: PublicKey; + // }, + // args: { targetChain: wormholeSdk.ChainId; remoteDomain?: number } + // ) { + // const { + // payer, + // fastVaa, + // liquidatorToken, + // preparedAuctionSettlement: inputPreparedAuctionSettlement, + // auctionData: inputAuctionData, + // preparedBy: inputPreparedBy, + // } = accounts; + + // const { mint } = await splToken.getAccount( + // this.program.provider.connection, + // liquidatorToken + // ); + + // const { targetChain, remoteDomain: inputRemoteDomain } = args; + // const destinationCctpDomain = await (async () => { + // if (inputRemoteDomain !== undefined) { + // return inputRemoteDomain; + // } else { + // const message = await VaaAccount.fetch( + // this.program.provider.connection, + // fastVaa + // ).then((vaa) => LiquidityLayerMessage.decode(vaa.payload())); + // if (message.fastMarketOrder === undefined) { + // throw new Error("Message not FastMarketOrder"); + // } + // return message.fastMarketOrder.destinationCctpDomain; + // } + // })(); + + // const { + // custodian, + // payerSequence, + // routerEndpoint: toRouterEndpoint, + // coreMessage, + // coreBridgeConfig, + // coreEmitterSequence, + // coreFeeCollector, + // coreBridgeProgram, + // tokenMessengerMinterSenderAuthority, + // messageTransmitterConfig, + // tokenMessenger, + // remoteTokenMessenger, + // tokenMinter, + // localToken, + // messageTransmitterProgram, + // tokenMessengerMinterProgram, + // tokenProgram, + // } = await this.burnAndPublishAccounts( + // { payer, mint }, + // { targetChain, destinationCctpDomain } + // ); + + // return this.program.methods + // .settleAuctionActiveCctp() + // .accounts({ + // payer, + // payerSequence, + // custodian, + // fastVaa, + // preparedBy, + // preparedAuctionSettlement, + // auctionData, + // liquidatorToken, + // }) + // .instruction(); + // } + + async settleAuctionNoneCctpIx() { + return this.program.methods + .settleAuctionNoneCctp() + .accounts({ + custodian: this.custodianAddress(), + }) + .instruction(); + } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { switch (this._programId) { case testnet(): { @@ -469,7 +645,7 @@ export class MatchingEngineProgram { } async executeFastOrderIx( - toChain: wormholeSdk.ChainId, + targetChain: wormholeSdk.ChainId, remoteDomain: number, vaaHash: Buffer, accounts: { @@ -493,7 +669,15 @@ export class MatchingEngineProgram { bestOfferToken ); const { - senderAuthority: tokenMessengerMinterSenderAuthority, + custodian, + payerSequence, + routerEndpoint: toRouterEndpoint, + coreMessage, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessengerMinterSenderAuthority, messageTransmitterConfig, tokenMessenger, remoteTokenMessenger, @@ -502,14 +686,9 @@ export class MatchingEngineProgram { messageTransmitterProgram, tokenMessengerMinterProgram, tokenProgram, - } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); - - const custodian = this.custodianAddress(); - const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - this.publishMessageAccounts(custodian); - const payerSequence = this.payerSequenceAddress(payer); - const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => - this.coreMessageAddress(payer, value) + } = await this.burnAndPublishAccounts( + { payer, mint }, + { targetChain, destinationCctpDomain: remoteDomain } ); return this.program.methods @@ -518,13 +697,13 @@ export class MatchingEngineProgram { payer, custodian, auctionData: this.auctionDataAddress(vaaHash), - toRouterEndpoint: this.routerEndpointAddress(toChain), + toRouterEndpoint, executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), bestOfferToken, initialOfferToken, custodyToken: this.custodyTokenAccountAddress(), vaa, - mint: USDC_MINT_ADDRESS, + mint, payerSequence, coreBridgeConfig, coreMessage, @@ -573,13 +752,15 @@ export class MatchingEngineProgram { bestOfferToken! ); - const custodian = this.custodianAddress(); - const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - this.publishMessageAccounts(custodian); - const payerSequence = this.payerSequenceAddress(payer); - const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => - this.coreMessageAddress(payer, value) - ); + const { + custodian, + payerSequence, + coreMessage, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + } = await this.publishMessageAccounts(payer); return this.program.methods .executeFastOrderSolana() @@ -606,34 +787,41 @@ export class MatchingEngineProgram { async redeemFastFillAccounts( vaa: PublicKey - ): Promise<{ vaaHash: Uint8Array; accounts: RedeemFastFillAccounts }> { - const custodyToken = this.custodyTokenAccountAddress(); - const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); - const vaaHash = vaaAcct.digest(); + ): Promise<{ vaaAccount: VaaAccount; accounts: RedeemFastFillAccounts }> { + const vaaAccount = await VaaAccount.fetch(this.program.provider.connection, vaa); return { - vaaHash, + vaaAccount, accounts: { custodian: this.custodianAddress(), - redeemedFastFill: this.redeemedFastFillAddress(vaaHash), + redeemedFastFill: this.redeemedFastFillAddress(vaaAccount.digest()), routerEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), - custodyToken, + custodyToken: this.custodyTokenAccountAddress(), matchingEngineProgram: this.ID, tokenProgram: splToken.TOKEN_PROGRAM_ID, }, }; } - publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { + async publishMessageAccounts(payer: PublicKey): Promise { + const payerSequence = this.payerSequenceAddress(payer); + const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => + this.coreMessageAddress(payer, value) + ); + const coreBridgeProgram = this.coreBridgeProgramId(); + const custodian = this.custodianAddress(); return { + custodian, + payerSequence, + coreMessage, coreBridgeConfig: PublicKey.findProgramAddressSync( [Buffer.from("Bridge")], coreBridgeProgram )[0], coreEmitterSequence: PublicKey.findProgramAddressSync( - [Buffer.from("Sequence"), emitter.toBuffer()], + [Buffer.from("Sequence"), custodian.toBuffer()], coreBridgeProgram )[0], coreFeeCollector: PublicKey.findProgramAddressSync( @@ -644,6 +832,65 @@ export class MatchingEngineProgram { }; } + async burnAndPublishAccounts( + base: { + payer: PublicKey; + mint: PublicKey; + }, + args: { + targetChain: wormholeSdk.ChainId; + destinationCctpDomain: number; + } + ): Promise { + const { payer, mint } = base; + const { targetChain, destinationCctpDomain } = args; + + const { + senderAuthority: tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + messageTransmitterProgram, + tokenMessengerMinterProgram, + tokenProgram, + } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts( + mint, + destinationCctpDomain + ); + + const { + custodian, + payerSequence, + coreMessage, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + } = await this.publishMessageAccounts(payer); + + return { + custodian, + payerSequence, + routerEndpoint: this.routerEndpointAddress(targetChain), + coreMessage, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + messageTransmitterProgram, + tokenMessengerMinterProgram, + tokenProgram, + }; + } + coreBridgeProgramId(): PublicKey { switch (this._programId) { case testnet(): { diff --git a/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts b/solana/ts/src/matchingEngine/state/PreparedAuctionSettlement.ts similarity index 70% rename from solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts rename to solana/ts/src/matchingEngine/state/PreparedAuctionSettlement.ts index 748fc80e..2777fa37 100644 --- a/solana/ts/src/matchingEngine/state/PreparedSlowOrder.ts +++ b/solana/ts/src/matchingEngine/state/PreparedAuctionSettlement.ts @@ -1,7 +1,7 @@ import { BN } from "@coral-xyz/anchor"; import { PublicKey } from "@solana/web3.js"; -export class PreparedSlowOrder { +export class PreparedAuctionSettlement { bump: number; preparedBy: PublicKey; fastVaaHash: Array; @@ -22,9 +22,13 @@ export class PreparedSlowOrder { this.baseFee = baseFee; } - static address(programId: PublicKey, payer: PublicKey, fastVaaHash: Array) { + static address( + programId: PublicKey, + payer: PublicKey, + fastVaaHash: Array | Buffer | Uint8Array + ) { return PublicKey.findProgramAddressSync( - [Buffer.from("prepared"), payer.toBuffer(), Buffer.from(fastVaaHash)], + [Buffer.from("auction-settlement"), payer.toBuffer(), Buffer.from(fastVaaHash)], programId )[0]; } diff --git a/solana/ts/src/matchingEngine/state/index.ts b/solana/ts/src/matchingEngine/state/index.ts index 17eb5621..8a3ac9ae 100644 --- a/solana/ts/src/matchingEngine/state/index.ts +++ b/solana/ts/src/matchingEngine/state/index.ts @@ -1,4 +1,6 @@ +export * from "./AuctionData"; export * from "./Custodian"; export * from "./PayerSequence"; +export * from "./PreparedAuctionSettlement"; export * from "./RedeemedFastFill"; export * from "./RouterEndpoint"; diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index dc9e5ad3..26c16c4e 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -276,35 +276,35 @@ export class TokenRouterProgram { async closePreparedOrderIx(accounts: { preparedOrder: PublicKey; - payer?: PublicKey; + preparedBy?: PublicKey; orderSender?: PublicKey; refundToken?: PublicKey; }): Promise { const { preparedOrder, - payer: inputPayer, + preparedBy: inputPreparedBy, orderSender: inputOrderSender, refundToken: inputRefundToken, } = accounts; - const { payer, orderSender, refundToken } = await (async () => { + const { preparedBy, orderSender, refundToken } = await (async () => { if ( - inputPayer === undefined || + inputPreparedBy === undefined || inputOrderSender === undefined || inputRefundToken === undefined ) { const { - info: { payer, orderSender, refundToken }, + info: { preparedBy, orderSender, refundToken }, } = await this.fetchPreparedOrder(preparedOrder); return { - payer: inputPayer ?? payer, + preparedBy: inputPreparedBy ?? preparedBy, orderSender: inputOrderSender ?? orderSender, refundToken: inputRefundToken ?? refundToken, }; } else { return { - payer: inputPayer, + preparedBy: inputPreparedBy, orderSender: inputOrderSender, refundToken: inputRefundToken, }; @@ -314,7 +314,7 @@ export class TokenRouterProgram { return this.program.methods .closePreparedOrder() .accounts({ - payer, + preparedBy, custodian: this.custodianAddress(), orderSender, preparedOrder, @@ -602,7 +602,7 @@ export class TokenRouterProgram { async redeemFastFillAccounts(vaa: PublicKey): Promise { const { - vaaHash, + vaaAccount, accounts: { custodian: matchingEngineCustodian, redeemedFastFill: matchingEngineRedeemedFastFill, @@ -615,7 +615,7 @@ export class TokenRouterProgram { return { custodian: this.custodianAddress(), - preparedFill: this.preparedFillAddress(vaaHash), + preparedFill: this.preparedFillAddress(vaaAccount.digest()), custodyToken: this.custodyTokenAccountAddress(), matchingEngineCustodian, matchingEngineRedeemedFastFill, diff --git a/solana/ts/src/tokenRouter/state/PreparedFill.ts b/solana/ts/src/tokenRouter/state/PreparedFill.ts index 5dde63e7..916ce6e5 100644 --- a/solana/ts/src/tokenRouter/state/PreparedFill.ts +++ b/solana/ts/src/tokenRouter/state/PreparedFill.ts @@ -11,7 +11,7 @@ export class PreparedFill { vaaHash: Array; bump: number; redeemer: PublicKey; - payer: PublicKey; + preparedBy: PublicKey; fillType: FillType; sourceChain: number; orderSender: Array; @@ -21,7 +21,7 @@ export class PreparedFill { vaaHash: Array, bump: number, redeemer: PublicKey, - payer: PublicKey, + preparedBy: PublicKey, fillType: FillType, sourceChain: number, orderSender: Array, @@ -30,7 +30,7 @@ export class PreparedFill { this.vaaHash = vaaHash; this.bump = bump; this.redeemer = redeemer; - this.payer = payer; + this.preparedBy = preparedBy; this.fillType = fillType; this.sourceChain = sourceChain; this.orderSender = orderSender; diff --git a/solana/ts/src/tokenRouter/state/PreparedOrder.ts b/solana/ts/src/tokenRouter/state/PreparedOrder.ts index 232326a2..c28dda4c 100644 --- a/solana/ts/src/tokenRouter/state/PreparedOrder.ts +++ b/solana/ts/src/tokenRouter/state/PreparedOrder.ts @@ -9,7 +9,7 @@ export type OrderType = { export type PreparedOrderInfo = { orderSender: PublicKey; - payer: PublicKey; + preparedBy: PublicKey; orderType: OrderType; orderToken: PublicKey; refundToken: PublicKey; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 63855e35..a9f13af7 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -2713,7 +2713,7 @@ describe("Matching Engine", function () { }); }); - describe("Prepare Slow Order", function () { + describe("Prepare Auction Settlement", function () { let testCctpNonce = 2n ** 64n - 1n; // Hack to prevent math overflow error when invoking CCTP programs. @@ -2723,7 +2723,7 @@ describe("Matching Engine", function () { // TODO: add negative tests - it("Prepare Slow Order", async function () { + it("Prepare Auction Settlement", async function () { const redeemer = Keypair.generate(); const sourceCctpDomain = 0; @@ -2789,7 +2789,7 @@ describe("Matching Engine", function () { finalizedMessage ); - const ix = await engine.prepareSlowOrderCctpIx( + const ix = await engine.prepareAuctionSettlementCctpIx( { payer: payer.publicKey, fastVaa, @@ -2812,28 +2812,30 @@ describe("Matching Engine", function () { const fastVaaHash = await VaaAccount.fetch(connection, fastVaa).then((vaa) => vaa.digest() ); - const preparedSlowOrder = engine.preparedSlowOrderAddress( + const preparedAuctionSettlement = engine.preparedAuctionSettlementAddress( payer.publicKey, fastVaaHash ); // Save for later. localVariables.set("ix", ix); - localVariables.set("preparedSlowOrder", preparedSlowOrder); + localVariables.set("preparedAuctionSettlement", preparedAuctionSettlement); }); - it("Cannot Prepare Slow Order for Same VAAs", async function () { + it("Cannot Prepare Auction Settlement for Same VAAs", async function () { const ix = localVariables.get("ix") as TransactionInstruction; expect(localVariables.delete("ix")).is.true; - const preparedSlowOrder = localVariables.get("preparedSlowOrder") as PublicKey; - expect(localVariables.delete("preparedSlowOrder")).is.true; + const preparedAuctionSettlement = localVariables.get( + "preparedAuctionSettlement" + ) as PublicKey; + expect(localVariables.delete("preparedAuctionSettlement")).is.true; await expectIxErr( connection, [ix], [payer], - `Allocate: account Address { address: ${preparedSlowOrder.toString()}, base: None } already in use` + `Allocate: account Address { address: ${preparedAuctionSettlement.toString()}, base: None } already in use` ); }); }); diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 23b967d5..2d79ebea 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -1,4 +1,6 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; +import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; +import { BN } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { AddressLookupTableProgram, @@ -6,7 +8,6 @@ import { Connection, Keypair, PublicKey, - SYSVAR_RENT_PUBKEY, SystemProgram, } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; @@ -25,9 +26,6 @@ import { expectIxOk, postLiquidityLayerVaa, } from "./helpers"; -import { BN } from "@coral-xyz/anchor"; -import { VaaAccount } from "../src/wormhole"; -import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; chaiUse(chaiAsPromised); @@ -563,7 +561,7 @@ describe("Token Router", function () { new PreparedOrder( { orderSender: orderSender.publicKey, - payer: payer.publicKey, + preparedBy: payer.publicKey, orderType: { market: { minAmountOut: (() => { @@ -643,14 +641,14 @@ describe("Token Router", function () { const ix = await tokenRouter.closePreparedOrderIx({ preparedOrder, - payer: ownerAssistant.publicKey, + preparedBy: ownerAssistant.publicKey, }); await expectIxErr( connection, [ix], [ownerAssistant, orderSender], - "Error Code: PayerMismatch" + "Error Code: PreparedByMismatch" ); }); From dccaf72eb78e7b3416118e642cb4001db30a495a Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 23 Jan 2024 20:31:40 -0600 Subject: [PATCH 086/126] solana: rename execute fast order cctp; even faster tests --- solana/Anchor.toml | 2 +- solana/programs/matching-engine/src/lib.rs | 4 +- .../auction/execute_fast_order/cctp.rs | 227 +++++++++++++++++ .../auction/execute_fast_order/mod.rs | 229 +----------------- solana/ts/src/matchingEngine/index.ts | 4 +- solana/ts/tests/01__matchingEngine.ts | 48 ++-- .../ts/tests/helpers/matching_engine_utils.ts | 22 +- 7 files changed, 269 insertions(+), 267 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs diff --git a/solana/Anchor.toml b/solana/Anchor.toml index e81869d4..b0488013 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -34,7 +34,7 @@ url = "https://api.devnet.solana.com" ### At 160 ticks/s, 64 ticks per slot implies that leader rotation and voting will happen ### every 400 ms. A fast voting cadence ensures faster finality and convergence -ticks_per_slot = 32 +ticks_per_slot = 8 ### Wormhole Core Bridge Program [[test.validator.clone]] diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index bc214080..7197f7f0 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -105,8 +105,8 @@ pub mod matching_engine { processor::improve_offer(ctx, fee_offer) } - pub fn execute_fast_order(ctx: Context) -> Result<()> { - processor::execute_fast_order(ctx) + pub fn execute_fast_order_cctp(ctx: Context) -> Result<()> { + processor::execute_fast_order_cctp(ctx) } pub fn execute_fast_order_solana(ctx: Context) -> Result<()> { diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs new file mode 100644 index 00000000..5cac9c89 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -0,0 +1,227 @@ +use crate::{ + error::MatchingEngineError, + handle_fast_order_execution, send_cctp, + state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, + CctpAccounts, ExecuteFastOrderAccounts, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::wormhole_io::TypePrefixedPayload; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use wormhole_cctp_solana::{ + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, +}; + +/// Accounts required for [execute_fast_order_cctp]. +#[derive(Accounts)] +pub struct ExecuteFastOrderCctp<'info> { + #[account(mut)] + payer: Signer<'info>, + + /// This program's Wormhole (Core Bridge) emitter authority. This is also the burn-source + /// authority for CCTP transfers. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = custodian.bump, + )] + custodian: Box>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. + #[account( + owner = core_bridge_program::id(), + constraint = { + VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash + } @ MatchingEngineError::MismatchedVaaHash + )] + vaa: AccountInfo<'info>, + + #[account( + mut, + seeds = [ + AuctionData::SEED_PREFIX, + auction_data.vaa_hash.as_ref() + ], + bump = auction_data.bump, + has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, + has_one = initial_offer_token @ MatchingEngineError::InvalidTokenAccount, + constraint = { + auction_data.status == AuctionStatus::Active + } @ MatchingEngineError::AuctionNotActive + )] + auction_data: Box>, + + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + to_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + constraint = { + to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain + )] + to_router_endpoint: Account<'info, RouterEndpoint>, + + #[account( + mut, + associated_token::mint = mint, + associated_token::authority = payer + )] + executor_token: Account<'info, token::TokenAccount>, + + /// CHECK: Mutable. Must equal [best_offer](AuctionData::best_offer). + #[account(mut)] + best_offer_token: AccountInfo<'info>, + + /// CHECK: Mutable. Must equal [initial_offer](AuctionData::initial_offer). + #[account(mut)] + initial_offer_token: AccountInfo<'info>, + + /// Also the burn_source token account. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + #[account( + mut, + seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], + bump = custodian.custody_token_bump, + )] + custody_token: AccountInfo<'info>, + + /// Circle-supported mint. + /// + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account( + mut, + address = common::constants::usdc::id(), + )] + mint: AccountInfo<'info>, + + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_sender_authority: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + #[account(mut)] + message_transmitter_config: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Local token account, which this program uses to validate the `mint` used to burn. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + token_messenger_minter_program: + Program<'info, token_messenger_minter_program::TokenMessengerMinter>, + message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, + system_program: Program<'info, System>, + token_program: Program<'info, token::Token>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +/// TODO: add docstring +pub fn execute_fast_order_cctp(ctx: Context) -> Result<()> { + let cctp_args = handle_fast_order_execution(ExecuteFastOrderAccounts { + custodian: &ctx.accounts.custodian, + vaa: &ctx.accounts.vaa, + auction_data: &mut ctx.accounts.auction_data, + custody_token: &ctx.accounts.custody_token, + executor_token: &ctx.accounts.executor_token, + best_offer_token: &ctx.accounts.best_offer_token, + initial_offer_token: &ctx.accounts.initial_offer_token, + token_program: &ctx.accounts.token_program, + })?; + + // Send the CCTP message to the destination chain. + send_cctp( + CctpAccounts { + payer: &ctx.accounts.payer, + custodian: &ctx.accounts.custodian, + to_router_endpoint: &ctx.accounts.to_router_endpoint, + custody_token: &ctx.accounts.custody_token, + mint: &ctx.accounts.mint, + payer_sequence: &mut ctx.accounts.payer_sequence, + core_bridge_config: &ctx.accounts.core_bridge_config, + core_message: &ctx.accounts.core_message, + core_emitter_sequence: &mut ctx.accounts.core_emitter_sequence, + core_fee_collector: &ctx.accounts.core_fee_collector, + token_messenger_minter_sender_authority: &ctx + .accounts + .token_messenger_minter_sender_authority, + message_transmitter_config: &ctx.accounts.message_transmitter_config, + token_messenger: &ctx.accounts.token_messenger, + remote_token_messenger: &ctx.accounts.remote_token_messenger, + token_minter: &ctx.accounts.token_minter, + local_token: &ctx.accounts.local_token, + core_bridge_program: &ctx.accounts.core_bridge_program, + token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, + message_transmitter_program: &ctx.accounts.message_transmitter_program, + token_program: &ctx.accounts.token_program, + system_program: &ctx.accounts.system_program, + clock: &ctx.accounts.clock, + rent: &ctx.accounts.rent, + }, + cctp_args.transfer_amount, + cctp_args.cctp_destination_domain, + cctp_args.fill.to_vec_payload(), + ctx.bumps["core_message"], + )?; + + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index e5e0fdd8..c5e1534f 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -1,228 +1,5 @@ +mod cctp; +pub use cctp::*; + mod local; pub use local::*; - -use crate::{ - error::MatchingEngineError, - handle_fast_order_execution, send_cctp, - state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, - CctpAccounts, ExecuteFastOrderAccounts, -}; -use anchor_lang::prelude::*; -use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, -}; - -#[derive(Accounts)] -pub struct ExecuteFastOrder<'info> { - #[account(mut)] - payer: Signer<'info>, - - /// This program's Wormhole (Core Bridge) emitter authority. This is also the burn-source - /// authority for CCTP transfers. - /// - /// CHECK: Seeds must be \["emitter"\]. - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - )] - custodian: Box>, - - /// CHECK: Must be owned by the Wormhole Core Bridge program. - #[account( - owner = core_bridge_program::id(), - constraint = { - VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash - } @ MatchingEngineError::MismatchedVaaHash - )] - vaa: AccountInfo<'info>, - - #[account( - mut, - seeds = [ - AuctionData::SEED_PREFIX, - auction_data.vaa_hash.as_ref() - ], - bump = auction_data.bump, - has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, - has_one = initial_offer_token @ MatchingEngineError::InvalidTokenAccount, - constraint = { - auction_data.status == AuctionStatus::Active - } @ MatchingEngineError::AuctionNotActive - )] - auction_data: Box>, - - #[account( - seeds = [ - RouterEndpoint::SEED_PREFIX, - to_router_endpoint.chain.to_be_bytes().as_ref(), - ], - bump = to_router_endpoint.bump, - constraint = { - to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN - } @ MatchingEngineError::InvalidChain - )] - to_router_endpoint: Account<'info, RouterEndpoint>, - - #[account( - mut, - associated_token::mint = mint, - associated_token::authority = payer - )] - executor_token: Account<'info, token::TokenAccount>, - - /// CHECK: Mutable. Must equal [best_offer](AuctionData::best_offer). - #[account(mut)] - best_offer_token: AccountInfo<'info>, - - /// CHECK: Mutable. Must equal [initial_offer](AuctionData::initial_offer). - #[account(mut)] - initial_offer_token: AccountInfo<'info>, - - /// Also the burn_source token account. - /// - /// CHECK: Mutable. Seeds must be \["custody"\]. - #[account( - mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, - )] - custody_token: AccountInfo<'info>, - - /// Circle-supported mint. - /// - /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP - /// Token Messenger Minter program's local token account. - #[account( - mut, - address = common::constants::usdc::id(), - )] - mint: AccountInfo<'info>, - - #[account( - init_if_needed, - payer = payer, - space = 8 + PayerSequence::INIT_SPACE, - seeds = [ - PayerSequence::SEED_PREFIX, - payer.key().as_ref() - ], - bump, - )] - payer_sequence: Account<'info, PayerSequence>, - - /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). - #[account(mut)] - core_bridge_config: UncheckedAccount<'info>, - - /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. - #[account( - mut, - seeds = [ - common::constants::CORE_MESSAGE_SEED_PREFIX, - payer.key().as_ref(), - payer_sequence.value.to_be_bytes().as_ref(), - ], - bump, - )] - core_message: AccountInfo<'info>, - - /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). - #[account(mut)] - core_emitter_sequence: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). - #[account(mut)] - core_fee_collector: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). - token_messenger_minter_sender_authority: UncheckedAccount<'info>, - - /// CHECK: Mutable. Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). - #[account(mut)] - message_transmitter_config: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). - token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token - /// Messenger Minter program). - remote_token_messenger: UncheckedAccount<'info>, - - /// CHECK Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). - token_minter: UncheckedAccount<'info>, - - /// Local token account, which this program uses to validate the `mint` used to burn. - /// - /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - local_token: UncheckedAccount<'info>, - - core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, - token_messenger_minter_program: - Program<'info, token_messenger_minter_program::TokenMessengerMinter>, - message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, - system_program: Program<'info, System>, - token_program: Program<'info, token::Token>, - - /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. - #[account(address = solana_program::sysvar::clock::id())] - clock: AccountInfo<'info>, - - /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. - #[account(address = solana_program::sysvar::rent::id())] - rent: AccountInfo<'info>, -} - -pub fn execute_fast_order(ctx: Context) -> Result<()> { - let cctp_args = handle_fast_order_execution(ExecuteFastOrderAccounts { - custodian: &ctx.accounts.custodian, - vaa: &ctx.accounts.vaa, - auction_data: &mut ctx.accounts.auction_data, - custody_token: &ctx.accounts.custody_token, - executor_token: &ctx.accounts.executor_token, - best_offer_token: &ctx.accounts.best_offer_token, - initial_offer_token: &ctx.accounts.initial_offer_token, - token_program: &ctx.accounts.token_program, - })?; - - // Send the CCTP message to the destination chain. - send_cctp( - CctpAccounts { - payer: &ctx.accounts.payer, - custodian: &ctx.accounts.custodian, - to_router_endpoint: &ctx.accounts.to_router_endpoint, - custody_token: &ctx.accounts.custody_token, - mint: &ctx.accounts.mint, - payer_sequence: &mut ctx.accounts.payer_sequence, - core_bridge_config: &ctx.accounts.core_bridge_config, - core_message: &ctx.accounts.core_message, - core_emitter_sequence: &mut ctx.accounts.core_emitter_sequence, - core_fee_collector: &ctx.accounts.core_fee_collector, - token_messenger_minter_sender_authority: &ctx - .accounts - .token_messenger_minter_sender_authority, - message_transmitter_config: &ctx.accounts.message_transmitter_config, - token_messenger: &ctx.accounts.token_messenger, - remote_token_messenger: &ctx.accounts.remote_token_messenger, - token_minter: &ctx.accounts.token_minter, - local_token: &ctx.accounts.local_token, - core_bridge_program: &ctx.accounts.core_bridge_program, - token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, - message_transmitter_program: &ctx.accounts.message_transmitter_program, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - clock: &ctx.accounts.clock, - rent: &ctx.accounts.rent, - }, - cctp_args.transfer_amount, - cctp_args.cctp_destination_domain, - cctp_args.fill.to_vec_payload(), - ctx.bumps["core_message"], - )?; - - Ok(()) -} diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 12a739b9..07ef8ee2 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -644,7 +644,7 @@ export class MatchingEngineProgram { } } - async executeFastOrderIx( + async executeFastOrderCctpIx( targetChain: wormholeSdk.ChainId, remoteDomain: number, vaaHash: Buffer, @@ -692,7 +692,7 @@ export class MatchingEngineProgram { ); return this.program.methods - .executeFastOrder() + .executeFastOrderCctp() .accounts({ payer, custodian, diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index a9f13af7..6dfc4598 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -34,7 +34,7 @@ import { getTokenBalance, postFastTransferVaa, postVaaWithMessage, - skip_slots, + waitBySlots, verifyFastFillMessage, verifyFillMessage, } from "./helpers/matching_engine_utils"; @@ -1474,7 +1474,7 @@ describe("Matching Engine", function () { const newOffer = baseFastOrder.maxFee - 100n; const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - await skip_slots(connection, 3); + await waitBySlots(connection, 3); await expectIxErr( connection, @@ -1550,13 +1550,13 @@ describe("Matching Engine", function () { const newOffer = baseFastOrder.maxFee - 100n; const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - await skip_slots(connection, 3); + await waitBySlots(connection, 4); // Excute the fast order so that the auction status changes. await expectIxOk( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, }), @@ -1674,12 +1674,12 @@ describe("Matching Engine", function () { bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); // Fast forward into the grace period. - await skip_slots(connection, 2); + await waitBySlots(connection, 3); const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); await expectIxOk( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -1798,7 +1798,7 @@ describe("Matching Engine", function () { bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); // Fast forward into the grace period. - await skip_slots(connection, 2); + await waitBySlots(connection, 3); const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); await expectIxOk( connection, @@ -1891,12 +1891,12 @@ describe("Matching Engine", function () { const auctionDataBefore = await engine.fetchAuctionData(vaaHash); // Fast forward into the grace period. - await skip_slots(connection, 7); + await waitBySlots(connection, 7); const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); const txnSignature = await expectIxOk( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -2012,14 +2012,14 @@ describe("Matching Engine", function () { const auctionDataBefore = await engine.fetchAuctionData(vaaHash); // Fast forward into tge penalty period. - await skip_slots(connection, 10); + await waitBySlots(connection, 10); // Execute the fast order with the liquidator (offerAuthorityTwo). const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); const txnSignature = await expectIxOk( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityTwo.publicKey, vaa: vaaKey, bestOfferToken, @@ -2138,14 +2138,14 @@ describe("Matching Engine", function () { const auctionDataBefore = await engine.fetchAuctionData(vaaHash); // Fast forward past the penalty period. - await skip_slots(connection, 15); + await waitBySlots(connection, 15); // Execute the fast order with the liquidator (offerAuthorityTwo). const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); const txnSignature = await expectIxOk( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityTwo.publicKey, vaa: vaaKey, bestOfferToken, @@ -2260,7 +2260,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, [ - await engine.executeFastOrderIx(solanaChain, solanaDomain, vaaHash, { + await engine.executeFastOrderCctpIx(solanaChain, solanaDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -2308,12 +2308,12 @@ describe("Matching Engine", function () { const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward past the penalty period. - await skip_slots(connection, 15); + await waitBySlots(connection, 15); await expectIxErr( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash2, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash2, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -2348,7 +2348,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken: engine.custodyTokenAccountAddress(), @@ -2383,7 +2383,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -2416,12 +2416,12 @@ describe("Matching Engine", function () { const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward into the grace period. - await skip_slots(connection, 4); + await waitBySlots(connection, 4); await expectIxOk( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -2435,7 +2435,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -2473,7 +2473,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, [ - await engine.executeFastOrderIx(arbChain, arbDomain, vaaHash, { + await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, vaa: vaaKey, bestOfferToken, @@ -2561,7 +2561,7 @@ describe("Matching Engine", function () { const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward past the penalty period. - await skip_slots(connection, 15); + await waitBySlots(connection, 15); await expectIxErr( connection, @@ -2681,7 +2681,7 @@ describe("Matching Engine", function () { const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); // Fast forward into the grace period. - await skip_slots(connection, 4); + await waitBySlots(connection, 4); await expectIxOk( connection, diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index 8e28c846..a66c2047 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -104,18 +104,16 @@ export async function postFastTransferVaa( ); } -const sleep = (ms = 0) => new Promise((resolve) => setTimeout(resolve, ms)); - -export async function skip_slots(connection: Connection, slots: number): Promise { - const start = await connection.getSlot(); - - while (true) { - const lastSlot = await connection.getSlot(); - if (lastSlot >= start + slots) { - return lastSlot + 1; - } - await sleep(500); - } +export async function waitBySlots(connection: Connection, numSlots: number) { + const targetSlot = await connection.getSlot().then((slot) => slot + numSlots); + return new Promise((resolve, _) => { + const sub = connection.onSlotChange((slot) => { + if (slot.slot >= targetSlot) { + connection.removeSlotChangeListener(sub); + resolve(slot.slot); + } + }); + }); } export async function calculateDynamicPenalty( From 267f1712eb023c9d9a4d0fda754907d516e190d5 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 24 Jan 2024 07:33:33 -0600 Subject: [PATCH 087/126] solana: fix linter errors --- .../auction/execute_fast_order/local.rs | 5 +--- .../auction/prepare_settlement/cctp.rs | 2 +- .../src/processor/complete_fast_fill.rs | 2 +- .../programs/matching-engine/src/utils/mod.rs | 30 +++++++------------ 4 files changed, 13 insertions(+), 26 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index 9ae8dc41..bf249d9f 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -171,10 +171,7 @@ pub fn execute_fast_order_solana(ctx: Context) -> Result rent: ctx.accounts.rent.to_account_info(), }, &[ - &[ - Custodian::SEED_PREFIX.as_ref(), - &[ctx.accounts.custodian.bump], - ], + &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]], &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index 43aa7b0e..aaa85dae 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -212,7 +212,7 @@ pub fn prepare_auction_settlement_cctp( fast_vaa_hash: fast_vaa.try_digest().unwrap().0, prepared_by: ctx.accounts.payer.key(), source_chain, - base_fee: slow_order_response.base_fee().try_into().unwrap(), + base_fee: slow_order_response.base_fee(), }); // Done. diff --git a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs index df450947..de48c38f 100644 --- a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -121,6 +121,6 @@ pub fn complete_fast_fill(ctx: Context) -> Result<()> { }, &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], ), - fast_fill.amount().try_into().unwrap(), + fast_fill.amount(), ) } diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 8e19291d..84617595 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -90,8 +90,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period - 1; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 0); assert_eq!(reward, 0); @@ -102,8 +101,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_penalty_slots + config.auction_grace_period; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 7500000); assert_eq!(reward, 2500000); @@ -114,8 +112,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 1; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 1087500); assert_eq!(reward, 362500); @@ -126,8 +123,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 10; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 4125000); assert_eq!(reward, 1375000); @@ -138,8 +134,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 19; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 7162500); assert_eq!(reward, 2387500); @@ -152,8 +147,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 10; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 3750000); assert_eq!(reward, 1250000); @@ -166,8 +160,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 10; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 5000000); assert_eq!(reward, 0); @@ -181,8 +174,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 5; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 5000000); assert_eq!(reward, 5000000); @@ -196,8 +188,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 10; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 0); assert_eq!(reward, 7500000); @@ -212,8 +203,7 @@ mod test { let amount = 10000000; let slots_elapsed = config.auction_grace_period + 10; let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, u64::try_from(slots_elapsed).unwrap()) - .unwrap(); + calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); assert_eq!(penalty, 5000000); assert_eq!(reward, 5000000); From 41e22b05010484b4fca34b3b6eaa05182794f3dd Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 24 Jan 2024 09:28:59 -0600 Subject: [PATCH 088/126] solana: slow it down --- solana/Anchor.toml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/solana/Anchor.toml b/solana/Anchor.toml index b0488013..77329f35 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -34,7 +34,7 @@ url = "https://api.devnet.solana.com" ### At 160 ticks/s, 64 ticks per slot implies that leader rotation and voting will happen ### every 400 ms. A fast voting cadence ensures faster finality and convergence -ticks_per_slot = 8 +ticks_per_slot = 16 ### Wormhole Core Bridge Program [[test.validator.clone]] From 7cdc1e1f4a89dcf5055df7a9a3b6eca27dd4799f Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 24 Jan 2024 09:46:06 -0600 Subject: [PATCH 089/126] solana: add serde unit tests --- .../common/src/messages/deposit/fill.rs | 49 +++++++-------- .../messages/deposit/slow_order_response.rs | 24 ++++++++ .../modules/common/src/messages/fast_fill.rs | 60 ++++++++++--------- .../common/src/messages/fast_market_order.rs | 50 ++++++++++++++++ 4 files changed, 127 insertions(+), 56 deletions(-) diff --git a/solana/modules/common/src/messages/deposit/fill.rs b/solana/modules/common/src/messages/deposit/fill.rs index 8fd694a6..f2fda4f5 100644 --- a/solana/modules/common/src/messages/deposit/fill.rs +++ b/solana/modules/common/src/messages/deposit/fill.rs @@ -51,38 +51,31 @@ impl TypePrefixedPayload for Fill { #[cfg(test)] mod test { - // use hex_literal::hex; + use hex_literal::hex; + use wormhole_io::Writeable; - // use super::*; + use crate::messages; - // #[test] - // fn transfer_tokens_with_relay() { - // let msg = TransferTokensWithRelay { - // target_relayer_fee: U256::from(69u64), - // to_native_token_amount: U256::from(420u64), - // target_recipient_wallet: hex!( - // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" - // ), - // }; + #[test] + fn serde() { + let fill = messages::Fill { + source_chain: 69, + order_sender: hex!("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"), + redeemer: hex!("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"), + redeemer_message: b"All your base are belong to us.".to_vec().into(), + }; - // let mut bytes = Vec::with_capacity(msg.payload_written_size()); - // msg.write_typed(&mut bytes).unwrap(); - // assert_eq!(bytes.len(), msg.payload_written_size()); - // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + let encoded = fill.to_vec(); - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); - // assert_eq!(recovered, msg); - // } + let parsed = messages::raw::Fill::parse(&encoded).unwrap(); - // #[test] - // fn invalid_message_type() { - // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + let expected = messages::Fill { + source_chain: parsed.source_chain(), + order_sender: parsed.order_sender(), + redeemer: parsed.redeemer(), + redeemer_message: parsed.redeemer_message().as_ref().to_vec().into(), + }; - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let err = TransferTokensWithRelay::read_typed(&mut cursor) - // .err() - // .unwrap(); - // matches!(err.kind(), std::io::ErrorKind::InvalidData); - // } + assert_eq!(fill, expected); + } } diff --git a/solana/modules/common/src/messages/deposit/slow_order_response.rs b/solana/modules/common/src/messages/deposit/slow_order_response.rs index 61ef3097..8577556a 100644 --- a/solana/modules/common/src/messages/deposit/slow_order_response.rs +++ b/solana/modules/common/src/messages/deposit/slow_order_response.rs @@ -39,3 +39,27 @@ impl Writeable for SlowOrderResponse { impl TypePrefixedPayload for SlowOrderResponse { const TYPE: Option = Some(2); } + +#[cfg(test)] +mod test { + use wormhole_io::Writeable; + + use crate::messages; + + #[test] + fn serde() { + let slow_order_response = messages::SlowOrderResponse { + base_fee: 1234567890, + }; + + let encoded = slow_order_response.to_vec(); + + let parsed = messages::raw::SlowOrderResponse::parse(&encoded).unwrap(); + + let expected = messages::SlowOrderResponse { + base_fee: parsed.base_fee(), + }; + + assert_eq!(slow_order_response, expected); + } +} diff --git a/solana/modules/common/src/messages/fast_fill.rs b/solana/modules/common/src/messages/fast_fill.rs index db8b6a6b..72620940 100644 --- a/solana/modules/common/src/messages/fast_fill.rs +++ b/solana/modules/common/src/messages/fast_fill.rs @@ -46,38 +46,42 @@ impl TypePrefixedPayload for FastFill { #[cfg(test)] mod test { - // use hex_literal::hex; + use hex_literal::hex; + use messages::raw; - // use super::*; + use crate::messages; - // #[test] - // fn transfer_tokens_with_relay() { - // let msg = TransferTokensWithRelay { - // target_relayer_fee: U256::from(69u64), - // to_native_token_amount: U256::from(420u64), - // target_recipient_wallet: hex!( - // "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" - // ), - // }; + use super::*; - // let mut bytes = Vec::with_capacity(msg.payload_written_size()); - // msg.write_typed(&mut bytes).unwrap(); - // assert_eq!(bytes.len(), msg.payload_written_size()); - // assert_eq!(bytes, hex!("01000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef")); + #[test] + fn serde() { + let fast_fill = FastFill { + amount: 1234567890, + fill: Fill { + source_chain: 69, + order_sender: hex!( + "deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef" + ), + redeemer: hex!("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"), + redeemer_message: b"All your base are belong to us.".to_vec().into(), + }, + }; - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let recovered = TransferTokensWithRelay::read_payload(&mut cursor).unwrap(); - // assert_eq!(recovered, msg); - // } + let encoded = fast_fill.to_vec_payload(); - // #[test] - // fn invalid_message_type() { - // let mut bytes = hex!("45000000000000000000000000000000000000000000000000000000000000004500000000000000000000000000000000000000000000000000000000000001a4deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"); + let msg = raw::LiquidityLayerMessage::parse(&encoded).unwrap(); + let parsed = msg.to_fast_fill_unchecked(); - // let mut cursor = std::io::Cursor::new(&mut bytes); - // let err = TransferTokensWithRelay::read_typed(&mut cursor) - // .err() - // .unwrap(); - // matches!(err.kind(), std::io::ErrorKind::InvalidData); - // } + let expected = FastFill { + amount: parsed.amount(), + fill: Fill { + source_chain: parsed.fill().source_chain(), + order_sender: parsed.fill().order_sender(), + redeemer: parsed.fill().redeemer(), + redeemer_message: parsed.fill().redeemer_message().as_ref().to_vec().into(), + }, + }; + + assert_eq!(fast_fill, expected); + } } diff --git a/solana/modules/common/src/messages/fast_market_order.rs b/solana/modules/common/src/messages/fast_market_order.rs index a15e2e3e..0394104b 100644 --- a/solana/modules/common/src/messages/fast_market_order.rs +++ b/solana/modules/common/src/messages/fast_market_order.rs @@ -69,3 +69,53 @@ impl Writeable for FastMarketOrder { impl TypePrefixedPayload for FastMarketOrder { const TYPE: Option = Some(11); } + +#[cfg(test)] +mod test { + use hex_literal::hex; + use messages::raw; + + use crate::messages; + + use super::*; + + #[test] + fn serde() { + let fast_market_order = FastMarketOrder { + amount_in: 1234567890, + min_amount_out: 69420, + target_chain: 69, + destination_cctp_domain: 420, + redeemer: hex!("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"), + sender: hex!("beefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdead"), + refund_address: hex!( + "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" + ), + max_fee: 1234567890, + init_auction_fee: 69420, + deadline: 420, + redeemer_message: b"All your base are belong to us.".to_vec().into(), + }; + + let encoded = fast_market_order.to_vec_payload(); + + let msg = raw::LiquidityLayerMessage::parse(&encoded).unwrap(); + let parsed = msg.to_fast_market_order_unchecked(); + + let expected = FastMarketOrder { + amount_in: parsed.amount_in(), + min_amount_out: parsed.min_amount_out(), + target_chain: parsed.target_chain(), + destination_cctp_domain: parsed.destination_cctp_domain(), + redeemer: parsed.redeemer(), + sender: parsed.sender(), + refund_address: parsed.refund_address(), + max_fee: parsed.max_fee(), + init_auction_fee: parsed.init_auction_fee(), + deadline: parsed.deadline(), + redeemer_message: parsed.redeemer_message().as_ref().to_vec().into(), + }; + + assert_eq!(fast_market_order, expected); + } +} From 28f827c4e4af908b8c94e5a0d0124aa34a558d62 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 24 Jan 2024 11:07:46 -0600 Subject: [PATCH 090/126] evm: update cctp library --- evm/src/shared/WormholeCctpMessages.sol | 108 +++++++++++++++++- evm/src/shared/WormholeCctpTokenMessenger.sol | 39 ++++++- 2 files changed, 137 insertions(+), 10 deletions(-) diff --git a/evm/src/shared/WormholeCctpMessages.sol b/evm/src/shared/WormholeCctpMessages.sol index b62e3d28..1c249df0 100644 --- a/evm/src/shared/WormholeCctpMessages.sol +++ b/evm/src/shared/WormholeCctpMessages.sol @@ -11,13 +11,28 @@ library WormholeCctpMessages { using BytesParsing for bytes; // Payload IDs. - uint8 private constant DEPOSIT = 0x1; + // + // NOTE: This library reserves payloads 1 through 10 for future use. When using this library, + // please consider starting your own Wormhole message payloads at 11. + uint8 private constant DEPOSIT = 1; + uint8 private constant RESERVED_2 = 2; + uint8 private constant RESERVED_3 = 3; + uint8 private constant RESERVED_4 = 4; + uint8 private constant RESERVED_5 = 5; + uint8 private constant RESERVED_6 = 6; + uint8 private constant RESERVED_7 = 7; + uint8 private constant RESERVED_8 = 8; + uint8 private constant RESERVED_9 = 9; + uint8 private constant RESERVED_10 = 10; error MissingPayload(); error PayloadTooLarge(uint256); error InvalidMessage(); error UnexpectedMessageLength(uint256, uint256); + /** + * @dev NOTE: This method encodes the Wormhole message payload assuming the payload ID == 1. + */ function encodeDeposit( address token, uint256 amount, @@ -30,6 +45,7 @@ library WormholeCctpMessages { ) internal pure returns (bytes memory encoded) { encoded = encodeDeposit( token.toUniversalAddress(), + DEPOSIT, amount, sourceCctpDomain, targetCctpDomain, @@ -40,6 +56,9 @@ library WormholeCctpMessages { ); } + /** + * @dev NOTE: This method encodes the Wormhole message payload assuming the payload ID == 1. + */ function encodeDeposit( bytes32 universalTokenAddress, uint256 amount, @@ -49,6 +68,54 @@ library WormholeCctpMessages { bytes32 burnSource, bytes32 mintRecipient, bytes memory payload + ) internal pure returns (bytes memory encoded) { + encoded = encodeDeposit( + universalTokenAddress, + DEPOSIT, + amount, + sourceCctpDomain, + targetCctpDomain, + cctpNonce, + burnSource, + mintRecipient, + payload + ); + } + + function encodeDeposit( + address token, + uint8 payloadId, + uint256 amount, + uint32 sourceCctpDomain, + uint32 targetCctpDomain, + uint64 cctpNonce, + bytes32 burnSource, + bytes32 mintRecipient, + bytes memory payload + ) internal pure returns (bytes memory encoded) { + encoded = encodeDeposit( + token.toUniversalAddress(), + payloadId, + amount, + sourceCctpDomain, + targetCctpDomain, + cctpNonce, + burnSource, + mintRecipient, + payload + ); + } + + function encodeDeposit( + bytes32 universalTokenAddress, + uint8 payloadId, + uint256 amount, + uint32 sourceCctpDomain, + uint32 targetCctpDomain, + uint64 cctpNonce, + bytes32 burnSource, + bytes32 mintRecipient, + bytes memory payload ) internal pure returns (bytes memory encoded) { uint256 payloadLen = payload.length; if (payloadLen == 0) { @@ -58,7 +125,7 @@ library WormholeCctpMessages { } encoded = abi.encodePacked( - DEPOSIT, + payloadId, universalTokenAddress, amount, sourceCctpDomain, @@ -71,6 +138,9 @@ library WormholeCctpMessages { ); } + /** + * @dev NOTE: This method decodes the VAA payload assuming the payload ID == 1. + */ function decodeDeposit(IWormhole.VM memory vaa) internal pure @@ -94,10 +164,36 @@ library WormholeCctpMessages { burnSource, mintRecipient, payload - ) = decodeDeposit(vaa, true); + ) = decodeDeposit(vaa, DEPOSIT, true); + } + + function decodeDeposit(IWormhole.VM memory vaa, uint8 payloadId) + internal + pure + returns ( + bytes32 token, + uint256 amount, + uint32 sourceCctpDomain, + uint32 targetCctpDomain, + uint64 cctpNonce, + bytes32 burnSource, + bytes32 mintRecipient, + bytes memory payload + ) + { + ( + token, + amount, + sourceCctpDomain, + targetCctpDomain, + cctpNonce, + burnSource, + mintRecipient, + payload + ) = decodeDeposit(vaa, payloadId, true); } - function decodeDeposit(IWormhole.VM memory vaa, bool revertCustomErrors) + function decodeDeposit(IWormhole.VM memory vaa, uint8 payloadId, bool revertCustomErrors) internal pure returns ( @@ -112,7 +208,7 @@ library WormholeCctpMessages { ) { bytes memory encoded = vaa.payload; - uint256 offset = _checkPayloadId(encoded, 0, DEPOSIT, revertCustomErrors); + uint256 offset = _checkPayloadId(encoded, 0, payloadId, revertCustomErrors); (token, offset) = encoded.asBytes32Unchecked(offset); (amount, offset) = encoded.asUint256Unchecked(offset); @@ -165,4 +261,4 @@ library WormholeCctpMessages { } } } -} \ No newline at end of file +} diff --git a/evm/src/shared/WormholeCctpTokenMessenger.sol b/evm/src/shared/WormholeCctpTokenMessenger.sol index ede5602d..481e0b88 100644 --- a/evm/src/shared/WormholeCctpTokenMessenger.sol +++ b/evm/src/shared/WormholeCctpTokenMessenger.sol @@ -38,6 +38,11 @@ abstract contract WormholeCctpTokenMessenger { */ error CctpVaaMismatch(uint32, uint32, uint64); + /** + * @dev The emitter of the VAA must match the expected emitter. + */ + error UnexpectedEmitter(bytes32, bytes32); + /** * @dev Wormhole message finality. This value indicates a "finalized" consistency level, where * finalized means the transaction where this message (event) lives will not be rolled back. @@ -139,8 +144,9 @@ abstract contract WormholeCctpTokenMessenger { /** * @dev Method to verify and reconcile CCTP and Wormhole messages in order to mint tokens for * the encoded mint recipient. This method will revert with custom errors. - * NOTE: This method requires the caller to be the mint recipient. The caller is NOT the - * contract inheriting this abstract to use this internal method, but is msg.sender. + * NOTE: This method does not require the caller to be the mint recipient. If your contract + * requires that the mint recipient is the caller, you should add a check after calling this + * method to see if msg.sender.toUniversalAddress() == mintRecipient. */ function verifyVaaAndMint( bytes calldata encodedCctpMessage, @@ -194,8 +200,9 @@ abstract contract WormholeCctpTokenMessenger { * @dev PLEASE USE `verifyVaaAndMint` INSTEAD. Method to verify and reconcile CCTP and Wormhole * messages in order to mint tokens for the encoded mint recipient. This method will revert with * Solidity's built-in Error(string). - * NOTE: This method requires the caller to be the mint recipient. The caller is NOT the - * contract inheriting this abstract to use this internal method, but is msg.sender. + * NOTE: This method does not require the caller to be the mint recipient. If your contract + * requires that the mint recipient is the caller, you should add a check after calling this + * method to see if msg.sender.toUniversalAddress() == mintRecipient. */ function verifyVaaAndMintLegacy( bytes calldata encodedCctpMessage, @@ -259,6 +266,30 @@ abstract contract WormholeCctpTokenMessenger { ).toUniversalAddress(); } + /** + * @dev We encourage an integrator to use this method to make sure the VAA is emitted from one + * that his contract trusts. Usually foreign emitters are stored in a mapping keyed off by + * Wormhole Chain ID (uint16). + * + * NOTE: Reverts with `UnexpectedEmitter(bytes32, bytes32)`. + */ + function requireEmitter(IWormhole.VM memory vaa, bytes32 expectedEmitter) internal pure { + if (expectedEmitter != 0 && vaa.emitterAddress != expectedEmitter) { + revert UnexpectedEmitter(vaa.emitterAddress, expectedEmitter); + } + } + + /** + * @dev We encourage an integrator to use this method to make sure the VAA is emitted from one + * that his contract trusts. Usually foreign emitters are stored in a mapping keyed off by + * Wormhole Chain ID (uint16). + * + * NOTE: Reverts with built-in Error(string). + */ + function requireEmitterLegacy(IWormhole.VM memory vaa, bytes32 expectedEmitter) internal pure { + require(expectedEmitter != 0 && vaa.emitterAddress == expectedEmitter, "unknown emitter"); + } + // private function _parseAndVerifyVaa(bytes calldata encodedVaa, bool revertCustomErrors) From d574a3502ab0c8c93ea2a5363ade73ba52682187 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 24 Jan 2024 23:14:52 -0600 Subject: [PATCH 091/126] solana: refactor --- solana/Cargo.lock | 1 + solana/Cargo.toml | 8 +- solana/modules/common/Cargo.toml | 4 +- solana/modules/common/src/burn_and_publish.rs | 86 + solana/modules/common/src/constants/usdc.rs | 6 +- solana/modules/common/src/lib.rs | 1 + .../matching-engine/src/custody_token.rs | 27 + solana/programs/matching-engine/src/error.rs | 37 +- solana/programs/matching-engine/src/lib.rs | 45 +- .../src/processor/admin/close_proposal.rs | 42 + .../src/processor/admin/initialize.rs | 71 +- .../src/processor/admin/mod.rs | 6 + .../ownership_transfer_request/cancel.rs | 4 +- .../ownership_transfer_request/confirm.rs | 4 +- .../ownership_transfer_request/submit.rs | 4 +- .../admin/propose/auction_parameters.rs | 59 + .../src/processor/admin/propose/mod.rs | 44 + .../admin/router_endpoint/add/local.rs | 34 +- .../admin/router_endpoint/add/mod.rs | 15 +- .../processor/admin/router_endpoint/remove.rs | 2 +- .../admin/update/auction_parameters.rs | 85 + ...ee_recipient.rs => fee_recipient_token.rs} | 11 +- .../src/processor/admin/update/mod.rs | 7 +- .../processor/admin/update/owner_assistant.rs | 6 +- .../auction/execute_fast_order/cctp.rs | 188 +- .../auction/execute_fast_order/local.rs | 114 +- .../auction/execute_fast_order/mod.rs | 133 + .../src/processor/auction/mod.rs | 278 --- .../src/processor/auction/offer/improve.rs | 73 +- .../processor/auction/offer/place_initial.rs | 75 +- .../auction/prepare_settlement/cctp.rs | 27 +- .../settle/{active_cctp.rs => active/cctp.rs} | 156 +- .../processor/auction/settle/active/local.rs | 210 ++ .../processor/auction/settle/active/mod.rs | 137 ++ .../src/processor/auction/settle/complete.rs | 49 +- .../src/processor/auction/settle/mod.rs | 8 +- .../settle/{none_cctp.rs => none/cctp.rs} | 131 +- .../processor/auction/settle/none/local.rs | 212 ++ .../src/processor/auction/settle/none/mod.rs | 108 + .../src/processor/complete_fast_fill.rs | 7 +- .../matching-engine/src/state/auction.rs | 73 + .../src/state/auction_config.rs | 43 + .../matching-engine/src/state/auction_data.rs | 44 - .../matching-engine/src/state/custodian.rs | 55 +- .../programs/matching-engine/src/state/mod.rs | 14 +- ...ttlement.rs => prepared_order_response.rs} | 6 +- .../matching-engine/src/state/proposal.rs | 31 + .../matching-engine/src/utils/math.rs | 307 +++ .../programs/matching-engine/src/utils/mod.rs | 213 +- .../token-router/src/custody_token.rs | 27 + solana/programs/token-router/src/error.rs | 6 + solana/programs/token-router/src/lib.rs | 3 +- .../src/processor/admin/initialize.rs | 8 +- .../ownership_transfer_request/cancel.rs | 6 +- .../ownership_transfer_request/confirm.rs | 6 +- .../ownership_transfer_request/submit.rs | 6 +- .../admin/router_endpoint/add_cctp.rs | 16 +- .../processor/admin/router_endpoint/remove.rs | 3 +- .../src/processor/admin/set_pause.rs | 4 +- .../processor/admin/update/owner_assistant.rs | 4 +- .../src/processor/close_prepared_order.rs | 8 +- .../src/processor/consume_prepared_fill.rs | 8 +- .../src/processor/market_order/place_cctp.rs | 29 +- .../src/processor/market_order/prepare.rs | 25 +- .../src/processor/redeem_fill/cctp.rs | 10 +- .../src/processor/redeem_fill/fast.rs | 11 +- .../token-router/src/state/custodian.rs | 21 + solana/ts/src/matchingEngine/index.ts | 685 ++++-- .../state/{AuctionData.ts => Auction.ts} | 46 +- .../src/matchingEngine/state/AuctionConfig.ts | 28 + .../ts/src/matchingEngine/state/Custodian.ts | 32 +- ...Settlement.ts => PreparedOrderResponse.ts} | 11 +- .../matchingEngine/state/RouterEndpoint.ts | 3 +- solana/ts/src/matchingEngine/state/index.ts | 5 +- solana/ts/src/messages/deposit.ts | 2 +- solana/ts/src/tokenRouter/index.ts | 86 +- .../src/tokenRouter/state/RouterEndpoint.ts | 3 +- solana/ts/tests/01__matchingEngine.ts | 2135 +++++++++-------- solana/ts/tests/02__tokenRouter.ts | 98 +- solana/ts/tests/04__interaction.ts | 58 +- solana/ts/tests/helpers/consts.ts | 4 - .../ts/tests/helpers/matching_engine_utils.ts | 147 +- solana/ts/tests/helpers/mock.ts | 1 + solana/ts/tests/helpers/utils.ts | 26 + 84 files changed, 4171 insertions(+), 2701 deletions(-) create mode 100644 solana/modules/common/src/burn_and_publish.rs create mode 100644 solana/programs/matching-engine/src/custody_token.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/close_proposal.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/propose/mod.rs create mode 100644 solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs rename solana/programs/matching-engine/src/processor/admin/update/{fee_recipient.rs => fee_recipient_token.rs} (72%) rename solana/programs/matching-engine/src/processor/auction/settle/{active_cctp.rs => active/cctp.rs} (70%) create mode 100644 solana/programs/matching-engine/src/processor/auction/settle/active/local.rs create mode 100644 solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs rename solana/programs/matching-engine/src/processor/auction/settle/{none_cctp.rs => none/cctp.rs} (74%) create mode 100644 solana/programs/matching-engine/src/processor/auction/settle/none/local.rs create mode 100644 solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs create mode 100644 solana/programs/matching-engine/src/state/auction.rs create mode 100644 solana/programs/matching-engine/src/state/auction_config.rs delete mode 100644 solana/programs/matching-engine/src/state/auction_data.rs rename solana/programs/matching-engine/src/state/{prepared_auction_settlement.rs => prepared_order_response.rs} (59%) create mode 100644 solana/programs/matching-engine/src/state/proposal.rs create mode 100644 solana/programs/matching-engine/src/utils/math.rs create mode 100644 solana/programs/token-router/src/custody_token.rs rename solana/ts/src/matchingEngine/state/{AuctionData.ts => Auction.ts} (52%) create mode 100644 solana/ts/src/matchingEngine/state/AuctionConfig.ts rename solana/ts/src/matchingEngine/state/{PreparedAuctionSettlement.ts => PreparedOrderResponse.ts} (70%) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 18af3664..88b5653f 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1177,6 +1177,7 @@ dependencies = [ "hex-literal", "ruint", "solana-program", + "wormhole-cctp-solana", "wormhole-io", "wormhole-raw-vaas", ] diff --git a/solana/Cargo.toml b/solana/Cargo.toml index a79b2a71..77e342b3 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -39,13 +39,15 @@ ruint = "1.9.0" cfg-if = "1.0" hex-literal = "0.4.1" -anyhow = "1.0" -thiserror = "1.0" - ### https://github.com/coral-xyz/anchor/issues/2755 ### This dependency must be added for each program. ahash = "=0.8.6" +[profile.release] +overflow-checks = true +lto = "fat" +codegen-units = 1 + [profile.release.build-override] opt-level = 3 incremental = false diff --git a/solana/modules/common/Cargo.toml b/solana/modules/common/Cargo.toml index e627fdf3..762a0e74 100644 --- a/solana/modules/common/Cargo.toml +++ b/solana/modules/common/Cargo.toml @@ -10,10 +10,10 @@ repository.workspace = true # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html [features] -testnet = [] -mainnet = [] +testnet = ["wormhole-cctp-solana/testnet"] [dependencies] +wormhole-cctp-solana.workspace = true wormhole-io.workspace = true wormhole-raw-vaas.workspace = true diff --git a/solana/modules/common/src/burn_and_publish.rs b/solana/modules/common/src/burn_and_publish.rs new file mode 100644 index 00000000..0dff67bd --- /dev/null +++ b/solana/modules/common/src/burn_and_publish.rs @@ -0,0 +1,86 @@ +use anchor_lang::prelude::*; + +pub struct BurnAndPublishFillArgs {} + +pub fn burn_and_publish_fill( + cctp_ctx: CpiContext< + '_, + '_, + '_, + 'info, + cctp::token_messenger_minter_program::cpi::DepositForBurnWithCaller<'info>, + >, + wormhole_ctx: CpiContext<'_, '_, '_, 'info, core_bridge_program::cpi::PostMessage<'info>>, + args: BurnAndPublishArgs, +) -> Result { + wormhole_cctp_solana::cpi::burn_and_publish( + CpiContext::new_with_signer( + ctx.accounts + .token_messenger_minter_program + .to_account_info(), + wormhole_cctp_solana::cpi::DepositForBurnWithCaller { + src_token_owner: ctx.accounts.custodian.to_account_info(), + token_messenger_minter_sender_authority: ctx + .accounts + .token_messenger_minter_sender_authority + .to_account_info(), + src_token: ctx.accounts.custody_token.to_account_info(), + message_transmitter_config: ctx + .accounts + .message_transmitter_config + .to_account_info(), + token_messenger: ctx.accounts.token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.token_minter.to_account_info(), + local_token: ctx.accounts.local_token.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + message_transmitter_program: ctx + .accounts + .message_transmitter_program + .to_account_info(), + token_messenger_minter_program: ctx + .accounts + .token_messenger_minter_program + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]], + ], + ], + ), + wormhole_cctp_solana::cpi::BurnAndPublishArgs { + burn_source: None, + destination_caller: ctx.accounts.to_router_endpoint.address, + destination_cctp_domain: order.destination_cctp_domain(), + amount: user_amount, + mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, + wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: fill.to_vec_payload(), + }, + ) +} diff --git a/solana/modules/common/src/constants/usdc.rs b/solana/modules/common/src/constants/usdc.rs index cf31bd39..604ed7b7 100644 --- a/solana/modules/common/src/constants/usdc.rs +++ b/solana/modules/common/src/constants/usdc.rs @@ -1,7 +1,7 @@ cfg_if::cfg_if! { - if #[cfg(feature = "mainnet")] { - anchor_lang::declare_id!("EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v"); - } else if #[cfg(feature = "testnet")] { + if #[cfg(feature = "testnet")] { anchor_lang::declare_id!("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + } else if #[cfg(feature = "mainnet")] { + anchor_lang::declare_id!("EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v"); } } diff --git a/solana/modules/common/src/lib.rs b/solana/modules/common/src/lib.rs index 7c13cb48..161a94db 100644 --- a/solana/modules/common/src/lib.rs +++ b/solana/modules/common/src/lib.rs @@ -1,3 +1,4 @@ +pub use wormhole_cctp_solana; pub use wormhole_io; pub mod admin; diff --git a/solana/programs/matching-engine/src/custody_token.rs b/solana/programs/matching-engine/src/custody_token.rs new file mode 100644 index 00000000..39c97abf --- /dev/null +++ b/solana/programs/matching-engine/src/custody_token.rs @@ -0,0 +1,27 @@ +use anchor_lang::prelude::declare_id; + +cfg_if::cfg_if! { + if #[cfg(feature = "testnet")] { + declare_id!("5T6PsQ8m8xtU5sX51LGKV2EXwHzX5pF6nKoKndp7QUNQ"); + } +} + +#[cfg(test)] +mod test { + use solana_program::pubkey::Pubkey; + + #[test] + fn test_ata_address() { + let custodian = + Pubkey::create_program_address(crate::state::Custodian::SIGNER_SEEDS, &crate::id()) + .unwrap(); + assert_eq!( + super::id(), + anchor_spl::associated_token::get_associated_token_address( + &custodian, + &common::constants::usdc::id() + ), + "custody ata mismatch" + ); + } +} diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index b25cad5b..f805725d 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -1,7 +1,15 @@ #[anchor_lang::prelude::error_code] pub enum MatchingEngineError { - #[msg("Overflow")] - Overflow = 0x2, + /// Only the program's owner is permitted. + #[msg("OwnerOnly")] + OwnerOnly = 0x2, + + // Only the program's owner or assistant is permitted. + #[msg("OwnerOrAssistantOnly")] + OwnerOrAssistantOnly = 0x4, + + #[msg("InvalidCustodyToken")] + InvalidCustodyToken = 0x6, #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x100, @@ -15,10 +23,6 @@ pub enum MatchingEngineError { #[msg("NotUsdc")] NotUsdc = 0x103, - /// Only the program's owner is permitted. - #[msg("OwnerOnly")] - OwnerOnly = 0x200, - #[msg("InvalidNewOwner")] InvalidNewOwner = 0x202, @@ -43,15 +47,15 @@ pub enum MatchingEngineError { #[msg("InvalidTokenAccount")] InvalidTokenAccount, - #[msg("OwnerOrAssistantOnly")] - OwnerOrAssistantOnly, - #[msg("ChainNotAllowed")] ChainNotAllowed, #[msg("InvalidEndpoint")] InvalidEndpoint, + #[msg("InvalidMintRecipient")] + InvalidMintRecipient, + #[msg("ErrInvalidSourceRouter")] ErrInvalidSourceRouter, @@ -126,4 +130,19 @@ pub enum MatchingEngineError { #[msg("MismatchedVaaHash")] MismatchedVaaHash, + + #[msg("BestOfferTokenMismatch")] + BestOfferTokenMismatch, + + #[msg("InitialOfferTokenMismatch")] + InitialOfferTokenMismatch, + + #[msg("FeeRecipientTokenMismatch")] + FeeRecipientTokenMismatch, + + #[msg("AuctionNotCompleted")] + AuctionNotCompleted, + + #[msg("AuctionConfigMismatch")] + AuctionConfigMismatch, } diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 7197f7f0..8fa2ad40 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -1,6 +1,8 @@ #![doc = include_str!("../README.md")] #![allow(clippy::result_large_err)] +pub mod custody_token; + pub mod error; mod processor; @@ -13,12 +15,10 @@ pub mod utils; use anchor_lang::prelude::*; cfg_if::cfg_if! { - if #[cfg(feature = "mainnet")] { - // Placeholder. - declare_id!("MatchingEngine11111111111111111111111111111"); - } else if #[cfg(feature = "testnet")] { + if #[cfg(feature = "testnet")] { // Placeholder. declare_id!("MatchingEngine11111111111111111111111111111"); + const CUSTODIAN_BUMP: u8 = 254; } } @@ -30,11 +30,11 @@ pub mod matching_engine { processor::complete_fast_fill(ctx) } - pub fn prepare_auction_settlement_cctp( - ctx: Context, + pub fn prepare_order_response_cctp( + ctx: Context, args: CctpMessageArgs, ) -> Result<()> { - processor::prepare_auction_settlement_cctp(ctx, args) + processor::prepare_order_response_cctp(ctx, args) } pub fn settle_auction_complete(ctx: Context) -> Result<()> { @@ -45,15 +45,23 @@ pub mod matching_engine { processor::settle_auction_none_cctp(ctx) } + pub fn settle_auction_none_local(ctx: Context) -> Result<()> { + processor::settle_auction_none_local(ctx) + } + pub fn settle_auction_active_cctp(ctx: Context) -> Result<()> { processor::settle_auction_active_cctp(ctx) } + pub fn settle_auction_active_local(ctx: Context) -> Result<()> { + processor::settle_auction_active_local(ctx) + } + /// This instruction is be used to generate your program's config. /// And for convenience, we will store Wormhole-related PDAs in the /// config so we can verify these accounts with a simple == constraint. - pub fn initialize(ctx: Context, auction_config: AuctionConfig) -> Result<()> { - processor::initialize(ctx, auction_config) + pub fn initialize(ctx: Context, auction_params: AuctionParameters) -> Result<()> { + processor::initialize(ctx, auction_params) } pub fn add_router_endpoint( @@ -89,6 +97,17 @@ pub mod matching_engine { processor::cancel_ownership_transfer_request(ctx) } + pub fn propose_auction_parameters( + ctx: Context, + params: AuctionParameters, + ) -> Result<()> { + processor::propose_auction_parameters(ctx, params) + } + + pub fn update_auction_parameters(ctx: Context) -> Result<()> { + processor::update_auction_parameters(ctx) + } + pub fn update_owner_assistant(ctx: Context) -> Result<()> { processor::update_owner_assistant(ctx) } @@ -109,7 +128,11 @@ pub mod matching_engine { processor::execute_fast_order_cctp(ctx) } - pub fn execute_fast_order_solana(ctx: Context) -> Result<()> { - processor::execute_fast_order_solana(ctx) + pub fn execute_fast_order_local(ctx: Context) -> Result<()> { + processor::execute_fast_order_local(ctx) + } + + pub fn close_proposal(ctx: Context) -> Result<()> { + processor::close_proposal(ctx) } } diff --git a/solana/programs/matching-engine/src/processor/admin/close_proposal.rs b/solana/programs/matching-engine/src/processor/admin/close_proposal.rs new file mode 100644 index 00000000..337881ba --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/close_proposal.rs @@ -0,0 +1,42 @@ +use crate::{ + error::MatchingEngineError, + state::{Custodian, Proposal}, +}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct CloseProposal<'info> { + #[account(mut)] + owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + has_one = owner @ MatchingEngineError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + /// CHECK: This account must equal proposal.by pubkey. + #[account( + mut, + address = proposal.by + )] + proposed_by: AccountInfo<'info>, + + #[account( + mut, + close = proposed_by, + seeds = [ + Proposal::SEED_PREFIX, + proposal.id.to_be_bytes().as_ref(), + ], + bump = proposal.bump, + constraint = proposal.slot_enacted_at.is_none() @ ErrorCode::InstructionMissing, // TODO: add err ProposalAlreadyEnacted + )] + proposal: Account<'info, Proposal>, +} + +pub fn close_proposal(_ctx: Context) -> Result<()> { + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 9d1b54c4..820f7133 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -1,11 +1,13 @@ -use crate::{error::MatchingEngineError, state::Custodian}; +use crate::{ + error::MatchingEngineError, + state::{AuctionConfig, Custodian}, +}; use anchor_lang::prelude::*; use anchor_spl::token; -use common::constants::FEE_PRECISION_MAX; use solana_program::bpf_loader_upgradeable; // Because this is used as the args for initialize, we'll make it public here. -pub use crate::state::AuctionConfig; +pub use crate::state::AuctionParameters; #[derive(Accounts)] pub struct Initialize<'info> { @@ -24,7 +26,20 @@ pub struct Initialize<'info> { /// instructions. custodian: Account<'info, Custodian>, + #[account( + init, + payer = owner, + space = 8 + AuctionConfig::INIT_SPACE, + seeds = [ + AuctionConfig::SEED_PREFIX, + u32::default().to_be_bytes().as_ref() + ], + bump, + )] + auction_config: Account<'info, AuctionConfig>, + /// CHECK: This account must not be the zero pubkey. + /// TODO: do we prevent the owner from being the owner assistant? #[account( owner = Pubkey::default(), constraint = { @@ -42,13 +57,18 @@ pub struct Initialize<'info> { )] fee_recipient: AccountInfo<'info>, + #[account( + associated_token::mint = mint, + associated_token::authority = fee_recipient, + )] + fee_recipient_token: Account<'info, token::TokenAccount>, + #[account( init, payer = owner, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump, - token::mint = mint, - token::authority = custodian + associated_token::mint = mint, + associated_token::authority = custodian, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: Account<'info, token::TokenAccount>, @@ -70,26 +90,32 @@ pub struct Initialize<'info> { system_program: Program<'info, System>, token_program: Program<'info, token::Token>, + associated_token_program: Program<'info, anchor_spl::associated_token::AssociatedToken>, } -#[access_control(check_constraints(&ctx, &auction_config))] -pub fn initialize(ctx: Context, auction_config: AuctionConfig) -> Result<()> { +#[access_control(check_constraints(&ctx, &auction_params))] +pub fn initialize(ctx: Context, auction_params: AuctionParameters) -> Result<()> { let owner: Pubkey = ctx.accounts.owner.key(); + let auction_config_id = 0; ctx.accounts.custodian.set_inner(Custodian { - bump: ctx.bumps["custodian"], - custody_token_bump: ctx.bumps["custody_token"], owner, pending_owner: None, owner_assistant: ctx.accounts.owner_assistant.key(), - fee_recipient: ctx.accounts.fee_recipient.key(), - auction_config, + fee_recipient_token: ctx.accounts.fee_recipient_token.key(), + auction_config_id, + next_proposal_id: Default::default(), + }); + + ctx.accounts.auction_config.set_inner(AuctionConfig { + id: auction_config_id, + parameters: auction_params, }); // Done. Ok(()) } -fn check_constraints(ctx: &Context, config: &AuctionConfig) -> Result<()> { +fn check_constraints(ctx: &Context, params: &AuctionParameters) -> Result<()> { // We need to check that the upgrade authority is the owner passed into the account context. #[cfg(not(feature = "integration-test"))] { @@ -105,22 +131,7 @@ fn check_constraints(ctx: &Context, config: &AuctionConfig) -> Resul // This prevents the unused variables warning popping up when this program is built. let _ = ctx; - require!( - config.auction_duration > 0, - MatchingEngineError::InvalidAuctionDuration - ); - require!( - config.auction_grace_period > config.auction_duration, - MatchingEngineError::InvalidAuctionGracePeriod - ); - require!( - config.user_penalty_reward_bps <= FEE_PRECISION_MAX, - MatchingEngineError::UserPenaltyTooLarge - ); - require!( - config.initial_penalty_bps <= FEE_PRECISION_MAX, - MatchingEngineError::InitialPenaltyTooLarge - ); + crate::utils::math::require_valid_auction_parameters(params)?; // Done. Ok(()) diff --git a/solana/programs/matching-engine/src/processor/admin/mod.rs b/solana/programs/matching-engine/src/processor/admin/mod.rs index ab17905d..65335eeb 100644 --- a/solana/programs/matching-engine/src/processor/admin/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/mod.rs @@ -1,9 +1,15 @@ +mod close_proposal; +pub use close_proposal::*; + mod initialize; pub use initialize::*; mod ownership_transfer_request; pub use ownership_transfer_request::*; +mod propose; +pub use propose::*; + mod router_endpoint; pub use router_endpoint::*; diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs index 12ab7e25..0daa0a98 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs @@ -11,7 +11,7 @@ pub struct CancelOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -50,7 +50,7 @@ pub fn cancel_ownership_transfer_request( current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.owner.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[Custodian::SIGNER_SEEDS], ), crate::ID, )?; diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs index 7b30088e..82dff4e8 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs @@ -12,7 +12,7 @@ pub struct ConfirmOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, constraint = { custodian.pending_owner.is_some() } @ MatchingEngineError::NoTransferOwnershipRequest, @@ -56,7 +56,7 @@ pub fn confirm_ownership_transfer_request( current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.pending_owner.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[Custodian::SIGNER_SEEDS], ), crate::ID, )?; diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs index 92f26c5f..87d71546 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs @@ -11,7 +11,7 @@ pub struct SubmitOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -63,7 +63,7 @@ pub fn submit_ownership_transfer_request( current_authority: ctx.accounts.owner.to_account_info(), new_authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[Custodian::SIGNER_SEEDS], ), crate::ID, )?; diff --git a/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs new file mode 100644 index 00000000..f79c4176 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs @@ -0,0 +1,59 @@ +use crate::{ + error::MatchingEngineError, + state::{AuctionParameters, Custodian, Proposal, ProposalAction}, +}; +use anchor_lang::prelude::*; +use common::admin::utils::assistant::only_authorized; + +#[derive(Accounts)] +pub struct ProposeAuctionParameters<'info> { + #[account( + mut, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, + )] + owner_or_assistant: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + )] + custodian: Account<'info, Custodian>, + + #[account( + init, + payer = owner_or_assistant, + space = 8 + Proposal::INIT_SPACE, + seeds = [ + Proposal::SEED_PREFIX, + custodian.next_proposal_id.to_be_bytes().as_ref() + ], + bump, + )] + proposal: Account<'info, Proposal>, + + system_program: Program<'info, System>, + + epoch_schedule: Sysvar<'info, EpochSchedule>, +} + +pub fn propose_auction_parameters( + ctx: Context, + parameters: AuctionParameters, +) -> Result<()> { + crate::utils::math::require_valid_auction_parameters(¶meters)?; + + let id = ctx.accounts.custodian.auction_config_id + 1; + super::propose( + super::Propose { + custodian: &mut ctx.accounts.custodian, + proposal: &mut ctx.accounts.proposal, + by: &ctx.accounts.owner_or_assistant, + epoch_schedule: &ctx.accounts.epoch_schedule, + }, + ProposalAction::UpdateAuctionParameters { id, parameters }, + ctx.bumps["proposal"], + ) +} diff --git a/solana/programs/matching-engine/src/processor/admin/propose/mod.rs b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs new file mode 100644 index 00000000..06b59f51 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs @@ -0,0 +1,44 @@ +mod auction_parameters; +pub use auction_parameters::*; + +use crate::state::{Custodian, Proposal, ProposalAction}; +use anchor_lang::prelude::*; + +struct Propose<'ctx, 'info> { + custodian: &'ctx mut Account<'info, Custodian>, + proposal: &'ctx mut Account<'info, Proposal>, + by: &'ctx AccountInfo<'info>, + epoch_schedule: &'ctx Sysvar<'info, EpochSchedule>, +} + +fn propose(accounts: Propose, action: ProposalAction, proposal_bump_seed: u8) -> Result<()> { + let Propose { + custodian, + proposal, + by, + epoch_schedule, + } = accounts; + + let Clock { + slot: slot_proposed_at, + .. + } = Clock::get()?; + + // Create the proposal. + proposal.set_inner(Proposal { + id: custodian.next_proposal_id, + bump: proposal_bump_seed, + action, + by: by.key(), + owner: custodian.owner.key(), + slot_proposed_at, + slot_enact_by: slot_proposed_at + epoch_schedule.slots_per_epoch, + slot_enacted_at: None, + }); + + // Uptick the next proposal ID. + custodian.next_proposal_id += 1; + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs index efb04c2c..45baf774 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -3,6 +3,7 @@ use crate::{ state::{Custodian, RouterEndpoint}, }; use anchor_lang::prelude::*; +use anchor_spl::token; use common::admin::utils::assistant::only_authorized; use wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN; @@ -18,7 +19,7 @@ pub struct AddLocalRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] custodian: Account<'info, Custodian>, @@ -39,26 +40,31 @@ pub struct AddLocalRouterEndpoint<'info> { #[account(executable)] token_router_program: AccountInfo<'info>, + /// CHECK: The Token Router program's emitter PDA (a.k.a. its custodian) will have account data. + #[account( + seeds = [b"emitter"], + bump, + seeds::program = token_router_program, + owner = token_router_program.key() @ MatchingEngineError::InvalidEndpoint, + constraint = !token_router_emitter.data_is_empty() @ MatchingEngineError::InvalidEndpoint, + )] + token_router_emitter: AccountInfo<'info>, + + #[account( + associated_token::mint = common::constants::usdc::id(), + associated_token::authority = token_router_emitter, + )] + token_router_custody_token: Account<'info, token::TokenAccount>, + system_program: Program<'info, System>, } pub fn add_local_router_endpoint(ctx: Context) -> Result<()> { - let program_id = &ctx.accounts.token_router_program.key(); - - // This PDA address is the router's emitter address, which is used to publish its Wormhole - // messages. - let (emitter, _) = Pubkey::find_program_address(&[b"emitter"], program_id); - ctx.accounts.router_endpoint.set_inner(RouterEndpoint { bump: ctx.bumps["router_endpoint"], chain: SOLANA_CHAIN, - address: emitter.to_bytes(), - mint_recipient: Pubkey::find_program_address( - &[common::constants::CUSTODY_TOKEN_SEED_PREFIX], - program_id, - ) - .0 - .to_bytes(), + address: ctx.accounts.token_router_emitter.key().to_bytes(), + mint_recipient: ctx.accounts.token_router_custody_token.key().to_bytes(), }); // Done. diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs index 117697c5..83a89d84 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs @@ -16,7 +16,7 @@ pub struct AddRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, constraint = { only_authorized(&custodian, &owner_or_assistant.key()) } @ MatchingEngineError::OwnerOrAssistantOnly, @@ -62,11 +62,22 @@ pub fn add_router_endpoint( require!(address != [0; 32], MatchingEngineError::InvalidEndpoint); + let mint_recipient = match mint_recipient { + Some(mint_recipient) => { + require!( + mint_recipient != [0; 32], + MatchingEngineError::InvalidMintRecipient + ); + mint_recipient + } + None => address, + }; + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { bump: ctx.bumps["router_endpoint"], chain, address, - mint_recipient: mint_recipient.unwrap_or(address), + mint_recipient, }); // Done. diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs index 2c2af8dd..d36b1b30 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs @@ -17,7 +17,7 @@ pub struct RemoveRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs new file mode 100644 index 00000000..127f052a --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs @@ -0,0 +1,85 @@ +use crate::{ + error::MatchingEngineError, + state::{AuctionConfig, Custodian, Proposal, ProposalAction}, +}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct UpdateAuctionParameters<'info> { + #[account(mut)] + owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + has_one = owner @ MatchingEngineError::OwnerOnly, + )] + custodian: Account<'info, Custodian>, + + #[account( + mut, + seeds = [ + Proposal::SEED_PREFIX, + proposal.id.to_be_bytes().as_ref(), + ], + bump = proposal.bump, + has_one = owner, + constraint = { + require!( + proposal.slot_enacted_at.is_none(), + ErrorCode::InstructionMissing, + // TODO: add err + ); + + match &proposal.action { + ProposalAction::UpdateAuctionParameters { id, .. } => { + require_eq!( + *id, + custodian.auction_config_id + 1, + // TODO: add err + ); + }, + _ => return err!(ErrorCode::InstructionMissing), + }; + + true + } + )] + proposal: Account<'info, Proposal>, + + #[account( + init, + payer = owner, + space = 8 + AuctionConfig::INIT_SPACE, + seeds = [ + AuctionConfig::SEED_PREFIX, + (custodian.auction_config_id + 1).to_be_bytes().as_ref() + ], + bump, + )] + auction_config: Account<'info, AuctionConfig>, + + system_program: Program<'info, System>, +} + +pub fn update_auction_parameters(ctx: Context) -> Result<()> { + if let ProposalAction::UpdateAuctionParameters { id, parameters } = ctx.accounts.proposal.action + { + ctx.accounts + .auction_config + .set_inner(AuctionConfig { id, parameters }); + } else { + unreachable!(); + } + + // Update the auction config ID. + ctx.accounts.custodian.auction_config_id += 1; + + // Set the slot enacted at so it cannot be replayed. + let Clock { slot, .. } = Clock::get()?; + ctx.accounts.proposal.slot_enacted_at = Some(slot); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient_token.rs similarity index 72% rename from solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs rename to solana/programs/matching-engine/src/processor/admin/update/fee_recipient_token.rs index bd54d75c..512f4e22 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient_token.rs @@ -1,5 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; +use anchor_spl::token; use common::admin::utils::assistant::only_authorized; #[derive(Accounts)] @@ -15,10 +16,16 @@ pub struct UpdateFeeRecipient<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] custodian: Account<'info, Custodian>, + #[account( + associated_token::mint = common::constants::usdc::id(), + associated_token::authority = new_fee_recipient, + )] + new_fee_recipient_token: Account<'info, token::TokenAccount>, + /// New Fee Recipient. /// /// CHECK: Must not be zero pubkey. @@ -32,7 +39,7 @@ pub struct UpdateFeeRecipient<'info> { pub fn update_fee_recipient(ctx: Context) -> Result<()> { // Update the fee_recipient key. - ctx.accounts.custodian.fee_recipient = ctx.accounts.new_fee_recipient.key(); + ctx.accounts.custodian.fee_recipient_token = ctx.accounts.new_fee_recipient_token.key(); Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/admin/update/mod.rs b/solana/programs/matching-engine/src/processor/admin/update/mod.rs index c97d7c9f..c04204dc 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/mod.rs @@ -1,5 +1,8 @@ -mod fee_recipient; -pub use fee_recipient::*; +mod auction_parameters; +pub use auction_parameters::*; + +mod fee_recipient_token; +pub use fee_recipient_token::*; mod owner_assistant; pub use owner_assistant::*; diff --git a/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs index 97016bb8..1aa7a27d 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/owner_assistant.rs @@ -1,6 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; -use common::admin::utils::{assistant, ownable::only_owner}; +use common::admin::utils::assistant; #[derive(Accounts)] pub struct UpdateOwnerAssistant<'info> { @@ -10,8 +10,8 @@ pub struct UpdateOwnerAssistant<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, + bump = Custodian::BUMP, + has_one = owner @ MatchingEngineError::OwnerOnly, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index 5cac9c89..1fd9348d 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -1,8 +1,7 @@ use crate::{ error::MatchingEngineError, - handle_fast_order_execution, send_cctp, - state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, - CctpAccounts, ExecuteFastOrderAccounts, + state::{Auction, AuctionConfig, Custodian, PayerSequence, RouterEndpoint}, + utils, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -19,39 +18,49 @@ pub struct ExecuteFastOrderCctp<'info> { #[account(mut)] payer: Signer<'info>, + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + /// This program's Wormhole (Core Bridge) emitter authority. This is also the burn-source /// authority for CCTP transfers. /// /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] - custodian: Box>, + custodian: AccountInfo<'info>, + + auction_config: Box>, /// CHECK: Must be owned by the Wormhole Core Bridge program. - #[account( - owner = core_bridge_program::id(), - constraint = { - VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash - } @ MatchingEngineError::MismatchedVaaHash - )] - vaa: AccountInfo<'info>, + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, #[account( mut, seeds = [ - AuctionData::SEED_PREFIX, - auction_data.vaa_hash.as_ref() + Auction::SEED_PREFIX, + VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], - bump = auction_data.bump, - has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, - has_one = initial_offer_token @ MatchingEngineError::InvalidTokenAccount, - constraint = { - auction_data.status == AuctionStatus::Active - } @ MatchingEngineError::AuctionNotActive + bump = auction.bump, + constraint = utils::is_valid_active_auction( + &auction_config, + &auction, + Some(best_offer_token.key()), + Some(initial_offer_token.key()), + )? )] - auction_data: Box>, + auction: Box>, #[account( seeds = [ @@ -65,18 +74,19 @@ pub struct ExecuteFastOrderCctp<'info> { )] to_router_endpoint: Account<'info, RouterEndpoint>, + // TODO: add executor in case contract executes? #[account( mut, associated_token::mint = mint, associated_token::authority = payer )] - executor_token: Account<'info, token::TokenAccount>, + executor_token: Box>, - /// CHECK: Mutable. Must equal [best_offer](AuctionData::best_offer). + /// CHECK: Mutable. Must equal [best_offer](Auction::best_offer). #[account(mut)] best_offer_token: AccountInfo<'info>, - /// CHECK: Mutable. Must equal [initial_offer](AuctionData::initial_offer). + /// CHECK: Mutable. Must equal [initial_offer](Auction::initial_offer). #[account(mut)] initial_offer_token: AccountInfo<'info>, @@ -85,8 +95,7 @@ pub struct ExecuteFastOrderCctp<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -94,24 +103,9 @@ pub struct ExecuteFastOrderCctp<'info> { /// /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP /// Token Messenger Minter program's local token account. - #[account( - mut, - address = common::constants::usdc::id(), - )] + #[account(mut)] mint: AccountInfo<'info>, - #[account( - init_if_needed, - payer = payer, - space = 8 + PayerSequence::INIT_SPACE, - seeds = [ - PayerSequence::SEED_PREFIX, - payer.key().as_ref() - ], - bump, - )] - payer_sequence: Account<'info, PayerSequence>, - /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] core_bridge_config: UncheckedAccount<'info>, @@ -177,10 +171,15 @@ pub struct ExecuteFastOrderCctp<'info> { /// TODO: add docstring pub fn execute_fast_order_cctp(ctx: Context) -> Result<()> { - let cctp_args = handle_fast_order_execution(ExecuteFastOrderAccounts { + let super::PreparedFastExecution { + transfer_amount: amount, + destination_cctp_domain, + fill, + } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, - vaa: &ctx.accounts.vaa, - auction_data: &mut ctx.accounts.auction_data, + auction_config: &ctx.accounts.auction_config, + fast_vaa: &ctx.accounts.fast_vaa, + auction: &mut ctx.accounts.auction, custody_token: &ctx.accounts.custody_token, executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, @@ -189,38 +188,75 @@ pub fn execute_fast_order_cctp(ctx: Context) -> Result<()> })?; // Send the CCTP message to the destination chain. - send_cctp( - CctpAccounts { - payer: &ctx.accounts.payer, - custodian: &ctx.accounts.custodian, - to_router_endpoint: &ctx.accounts.to_router_endpoint, - custody_token: &ctx.accounts.custody_token, - mint: &ctx.accounts.mint, - payer_sequence: &mut ctx.accounts.payer_sequence, - core_bridge_config: &ctx.accounts.core_bridge_config, - core_message: &ctx.accounts.core_message, - core_emitter_sequence: &mut ctx.accounts.core_emitter_sequence, - core_fee_collector: &ctx.accounts.core_fee_collector, - token_messenger_minter_sender_authority: &ctx - .accounts - .token_messenger_minter_sender_authority, - message_transmitter_config: &ctx.accounts.message_transmitter_config, - token_messenger: &ctx.accounts.token_messenger, - remote_token_messenger: &ctx.accounts.remote_token_messenger, - token_minter: &ctx.accounts.token_minter, - local_token: &ctx.accounts.local_token, - core_bridge_program: &ctx.accounts.core_bridge_program, - token_messenger_minter_program: &ctx.accounts.token_messenger_minter_program, - message_transmitter_program: &ctx.accounts.message_transmitter_program, - token_program: &ctx.accounts.token_program, - system_program: &ctx.accounts.system_program, - clock: &ctx.accounts.clock, - rent: &ctx.accounts.rent, + wormhole_cctp_solana::cpi::burn_and_publish( + CpiContext::new_with_signer( + ctx.accounts + .token_messenger_minter_program + .to_account_info(), + wormhole_cctp_solana::cpi::DepositForBurnWithCaller { + src_token_owner: ctx.accounts.custodian.to_account_info(), + token_messenger_minter_sender_authority: ctx + .accounts + .token_messenger_minter_sender_authority + .to_account_info(), + src_token: ctx.accounts.custody_token.to_account_info(), + message_transmitter_config: ctx + .accounts + .message_transmitter_config + .to_account_info(), + token_messenger: ctx.accounts.token_messenger.to_account_info(), + remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), + token_minter: ctx.accounts.token_minter.to_account_info(), + local_token: ctx.accounts.local_token.to_account_info(), + mint: ctx.accounts.mint.to_account_info(), + message_transmitter_program: ctx + .accounts + .message_transmitter_program + .to_account_info(), + token_messenger_minter_program: ctx + .accounts + .token_messenger_minter_program + .to_account_info(), + token_program: ctx.accounts.token_program.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]], + ], + ], + ), + wormhole_cctp_solana::cpi::BurnAndPublishArgs { + burn_source: None, + destination_caller: ctx.accounts.to_router_endpoint.address, + destination_cctp_domain, + amount, + mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, + wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: fill.to_vec_payload(), }, - cctp_args.transfer_amount, - cctp_args.cctp_destination_domain, - cctp_args.fill.to_vec_payload(), - ctx.bumps["core_message"], )?; Ok(()) diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index bf249d9f..d848a9a6 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -1,8 +1,7 @@ use crate::{ error::MatchingEngineError, - handle_fast_order_execution, - state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, - ExecuteFastOrderAccounts, + state::{Auction, AuctionConfig, Custodian, PayerSequence, RouterEndpoint}, + utils, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -11,68 +10,75 @@ use wormhole_cctp_solana::wormhole::core_bridge_program; use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; #[derive(Accounts)] -pub struct ExecuteFastOrderSolana<'info> { +pub struct ExecuteFastOrderLocal<'info> { #[account(mut)] payer: Signer<'info>, + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + /// This program's Wormhole (Core Bridge) emitter authority. This is also the burn-source /// authority for CCTP transfers. /// /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] - custodian: Box>, + custodian: AccountInfo<'info>, + + auction_config: Box>, /// CHECK: Must be owned by the Wormhole Core Bridge program. - #[account( - owner = core_bridge_program::id(), - constraint = { - VaaAccount::load(&vaa)?.try_digest()?.0 == auction_data.vaa_hash - } @ MatchingEngineError::MismatchedVaaHash - )] - vaa: AccountInfo<'info>, + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, #[account( mut, seeds = [ - AuctionData::SEED_PREFIX, - auction_data.vaa_hash.as_ref() + Auction::SEED_PREFIX, + VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], - bump = auction_data.bump, - has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, - has_one = initial_offer_token @ MatchingEngineError::InvalidTokenAccount, - constraint = { - auction_data.status == AuctionStatus::Active - } @ MatchingEngineError::AuctionNotActive + bump = auction.bump, + constraint = utils::is_valid_active_auction( + &auction_config, + &auction, + Some(best_offer_token.key()), + Some(initial_offer_token.key()), + )? )] - auction_data: Box>, + auction: Box>, #[account( seeds = [ RouterEndpoint::SEED_PREFIX, - to_router_endpoint.chain.to_be_bytes().as_ref(), + core_bridge_program::SOLANA_CHAIN.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, - constraint = { - to_router_endpoint.chain == core_bridge_program::SOLANA_CHAIN - } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Account<'info, RouterEndpoint>, #[account( mut, - associated_token::mint = mint, + associated_token::mint = common::constants::usdc::id(), associated_token::authority = payer )] executor_token: Account<'info, token::TokenAccount>, - /// CHECK: Mutable. Must equal [best_offer](AuctionData::best_offer). + /// CHECK: Mutable. Must equal [best_offer](Auction::best_offer). #[account(mut)] best_offer_token: AccountInfo<'info>, - /// CHECK: Mutable. Must equal [initial_offer](AuctionData::initial_offer). + /// CHECK: Mutable. Must equal [initial_offer](Auction::initial_offer). #[account(mut)] initial_offer_token: AccountInfo<'info>, @@ -81,31 +87,10 @@ pub struct ExecuteFastOrderSolana<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, - /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP - /// Token Messenger Minter program's local token account. - #[account( - mut, - address = common::constants::usdc::id(), - )] - mint: AccountInfo<'info>, - - #[account( - init_if_needed, - payer = payer, - space = 8 + PayerSequence::INIT_SPACE, - seeds = [ - PayerSequence::SEED_PREFIX, - payer.key().as_ref() - ], - bump, - )] - payer_sequence: Account<'info, PayerSequence>, - /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] core_bridge_config: UncheckedAccount<'info>, @@ -143,11 +128,16 @@ pub struct ExecuteFastOrderSolana<'info> { rent: AccountInfo<'info>, } -pub fn execute_fast_order_solana(ctx: Context) -> Result<()> { - let wormhole_args = handle_fast_order_execution(ExecuteFastOrderAccounts { +pub fn execute_fast_order_local(ctx: Context) -> Result<()> { + let super::PreparedFastExecution { + transfer_amount: amount, + destination_cctp_domain: _, + fill, + } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, - vaa: &ctx.accounts.vaa, - auction_data: &mut ctx.accounts.auction_data, + auction_config: &ctx.accounts.auction_config, + fast_vaa: &ctx.accounts.fast_vaa, + auction: &mut ctx.accounts.auction, custody_token: &ctx.accounts.custody_token, executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, @@ -171,7 +161,7 @@ pub fn execute_fast_order_solana(ctx: Context) -> Result rent: ctx.accounts.rent.to_account_info(), }, &[ - &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]], + Custodian::SIGNER_SEEDS, &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), @@ -185,15 +175,9 @@ pub fn execute_fast_order_solana(ctx: Context) -> Result ], ), core_bridge_program::cpi::PostMessageArgs { - nonce: 0, // Always zero. - payload: common::messages::FastFill { - amount: wormhole_args.transfer_amount, - fill: wormhole_args.fill, - } - .to_vec_payload(), + nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: common::messages::FastFill { amount, fill }.to_vec_payload(), commitment: core_bridge_program::Commitment::Finalized, }, - )?; - - Ok(()) + ) } diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index c5e1534f..cdf48880 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -3,3 +3,136 @@ pub use cctp::*; mod local; pub use local::*; + +use crate::{ + error::MatchingEngineError, + state::{Auction, AuctionConfig, AuctionStatus, Custodian}, + utils::{self, math::DepositPenalty}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::{raw::LiquidityLayerPayload, Fill}; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; + +struct PrepareFastExecution<'ctx, 'info> { + custodian: &'ctx AccountInfo<'info>, + auction_config: &'ctx Account<'info, AuctionConfig>, + fast_vaa: &'ctx AccountInfo<'info>, + auction: &'ctx mut Box>, + custody_token: &'ctx AccountInfo<'info>, + executor_token: &'ctx Account<'info, token::TokenAccount>, + best_offer_token: &'ctx AccountInfo<'info>, + initial_offer_token: &'ctx AccountInfo<'info>, + token_program: &'ctx Program<'info, token::Token>, +} + +struct PreparedFastExecution { + pub transfer_amount: u64, + pub destination_cctp_domain: u32, + pub fill: Fill, +} + +fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result { + // Create zero copy reference to `FastMarketOrder` payload. + let fast_vaa = VaaAccount::load(accounts.fast_vaa).unwrap(); + let order = LiquidityLayerPayload::try_from(fast_vaa.try_payload().unwrap()) + .map_err(|_| MatchingEngineError::InvalidVaa)? + .message() + .to_fast_market_order_unchecked(); + + let (new_status, transfer_amount) = { + let auction_info = accounts.auction.info.as_ref().unwrap(); + + let Clock { + slot: current_slot, .. + } = Clock::get()?; + require!( + current_slot > auction_info.end_slot, + MatchingEngineError::AuctionPeriodNotExpired + ); + + let DepositPenalty { + penalty, + user_reward, + } = utils::math::compute_deposit_penalty( + accounts.auction_config, + auction_info, + current_slot, + ); + + let mut reimbursement = + auction_info.offer_price + auction_info.security_deposit - user_reward; + + if penalty > 0 && accounts.best_offer_token.key() != accounts.executor_token.key() { + // Pay the liquidator the penalty. + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.executor_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + penalty, + )?; + + reimbursement -= penalty; + } + + let init_auction_fee = order.init_auction_fee(); + if accounts.best_offer_token.key() != accounts.initial_offer_token.key() { + // Pay the auction initiator their fee. + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.initial_offer_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + init_auction_fee, + )?; + } else { + // Add it to the reimbursement. + reimbursement += init_auction_fee; + } + + // Return the security deposit and the fee to the highest bidder. + token::transfer( + CpiContext::new_with_signer( + accounts.token_program.to_account_info(), + anchor_spl::token::Transfer { + from: accounts.custody_token.to_account_info(), + to: accounts.best_offer_token.to_account_info(), + authority: accounts.custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + reimbursement, + )?; + + ( + AuctionStatus::Completed { slot: current_slot }, + // TODO: fix this + auction_info.amount_in - auction_info.offer_price - init_auction_fee + user_reward, + ) + }; + + // Set the auction status to completed. + accounts.auction.status = new_status; + + Ok(PreparedFastExecution { + transfer_amount, + destination_cctp_domain: order.destination_cctp_domain(), + fill: Fill { + source_chain: fast_vaa.try_emitter_chain()?, + order_sender: order.sender(), + redeemer: order.redeemer(), + redeemer_message: <&[u8]>::from(order.redeemer_message()).to_vec().into(), + }, + }) +} diff --git a/solana/programs/matching-engine/src/processor/auction/mod.rs b/solana/programs/matching-engine/src/processor/auction/mod.rs index 491345dc..3748c8ac 100644 --- a/solana/programs/matching-engine/src/processor/auction/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/mod.rs @@ -9,281 +9,3 @@ pub use prepare_settlement::*; mod settle; pub use settle::*; - -use anchor_lang::prelude::*; -use anchor_spl::token; - -use crate::{ - error::MatchingEngineError, - state::{AuctionData, AuctionStatus, Custodian, PayerSequence, RouterEndpoint}, -}; -use common::messages::raw::LiquidityLayerPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, -}; - -pub struct CctpAccounts<'ctx, 'info> { - payer: &'ctx Signer<'info>, - custodian: &'ctx Account<'info, Custodian>, - to_router_endpoint: &'ctx Account<'info, RouterEndpoint>, - custody_token: &'ctx AccountInfo<'info>, - mint: &'ctx AccountInfo<'info>, - payer_sequence: &'ctx mut Account<'info, PayerSequence>, - core_bridge_config: &'ctx UncheckedAccount<'info>, - core_message: &'ctx AccountInfo<'info>, - core_emitter_sequence: &'ctx UncheckedAccount<'info>, - core_fee_collector: &'ctx UncheckedAccount<'info>, - token_messenger_minter_sender_authority: &'ctx UncheckedAccount<'info>, - message_transmitter_config: &'ctx UncheckedAccount<'info>, - token_messenger: &'ctx UncheckedAccount<'info>, - remote_token_messenger: &'ctx UncheckedAccount<'info>, - token_minter: &'ctx UncheckedAccount<'info>, - local_token: &'ctx UncheckedAccount<'info>, - core_bridge_program: &'ctx Program<'info, core_bridge_program::CoreBridge>, - token_messenger_minter_program: - &'ctx Program<'info, token_messenger_minter_program::TokenMessengerMinter>, - message_transmitter_program: - &'ctx Program<'info, message_transmitter_program::MessageTransmitter>, - token_program: &'ctx Program<'info, token::Token>, - system_program: &'ctx Program<'info, System>, - clock: &'ctx AccountInfo<'info>, - rent: &'ctx AccountInfo<'info>, -} - -pub struct ExecuteFastOrderAccounts<'ctx, 'info> { - custodian: &'ctx Account<'info, Custodian>, - vaa: &'ctx AccountInfo<'info>, - auction_data: &'ctx mut Box>, - custody_token: &'ctx AccountInfo<'info>, - executor_token: &'ctx Account<'info, token::TokenAccount>, - best_offer_token: &'ctx AccountInfo<'info>, - initial_offer_token: &'ctx AccountInfo<'info>, - token_program: &'ctx Program<'info, token::Token>, -} - -pub struct ReturnArgs { - pub transfer_amount: u64, - pub cctp_destination_domain: u32, - pub fill: common::messages::Fill, -} - -pub fn handle_fast_order_execution(accounts: ExecuteFastOrderAccounts) -> Result { - let slots_elapsed = Clock::get()?.slot - accounts.auction_data.start_slot; - let auction_config = &accounts.custodian.auction_config; - require!( - slots_elapsed > auction_config.auction_duration.into(), - MatchingEngineError::AuctionPeriodNotExpired - ); - - // Create zero copy reference to `FastMarketOrder` payload. - let vaa = VaaAccount::load(accounts.vaa)?; - let msg = LiquidityLayerPayload::try_from(vaa.try_payload()?) - .map_err(|_| MatchingEngineError::InvalidVaa)? - .message(); - let fast_order = msg - .fast_market_order() - .ok_or(MatchingEngineError::NotFastMarketOrder)?; - let auction_data = accounts.auction_data; - - // Save the custodian seeds to sign transfers with. - let custodian_seeds = &[Custodian::SEED_PREFIX, &[accounts.custodian.bump]]; - - // We need to save the reward for the user so we include it when sending the CCTP transfer. - let mut user_reward: u64 = 0; - - if slots_elapsed > auction_config.auction_grace_period.into() { - let (penalty, reward) = crate::utils::calculate_dynamic_penalty( - &accounts.custodian.auction_config, - auction_data.security_deposit, - slots_elapsed, - ) - .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; - - // Save user reward for CCTP transfer. - user_reward = reward; - - // If caller passes in the same token account, only perform one transfer. - if accounts.best_offer_token.key() == accounts.executor_token.key() { - token::transfer( - CpiContext::new_with_signer( - accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: accounts.custody_token.to_account_info(), - to: accounts.best_offer_token.to_account_info(), - authority: accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - auction_data - .offer_price - .checked_add(auction_data.security_deposit) - .unwrap() - .checked_sub(reward) - .unwrap(), - )?; - } else { - // Pay the liquidator the penalty. - if penalty > 0 { - token::transfer( - CpiContext::new_with_signer( - accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: accounts.custody_token.to_account_info(), - to: accounts.executor_token.to_account_info(), - authority: accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - penalty, - )?; - } - - token::transfer( - CpiContext::new_with_signer( - accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: accounts.custody_token.to_account_info(), - to: accounts.best_offer_token.to_account_info(), - authority: accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - auction_data - .offer_price - .checked_add(auction_data.security_deposit) - .unwrap() - .checked_sub(reward) - .unwrap() - .checked_sub(penalty) - .unwrap(), - )?; - } - } else { - // Return the security deposit and the fee to the highest bidder. - token::transfer( - CpiContext::new_with_signer( - accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: accounts.custody_token.to_account_info(), - to: accounts.best_offer_token.to_account_info(), - authority: accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - auction_data - .offer_price - .checked_add(auction_data.security_deposit) - .unwrap(), - )?; - } - - // Pay the auction initiator their fee. - token::transfer( - CpiContext::new_with_signer( - accounts.token_program.to_account_info(), - anchor_spl::token::Transfer { - from: accounts.custody_token.to_account_info(), - to: accounts.initial_offer_token.to_account_info(), - authority: accounts.custodian.to_account_info(), - }, - &[&custodian_seeds[..]], - ), - fast_order.init_auction_fee(), - )?; - - // Set the auction status to completed. - auction_data.status = AuctionStatus::Completed; - - Ok(ReturnArgs { - transfer_amount: auction_data - .amount - .checked_sub(auction_data.offer_price) - .unwrap() - .checked_sub(fast_order.init_auction_fee()) - .unwrap() - .checked_add(user_reward) - .unwrap(), - cctp_destination_domain: fast_order.destination_cctp_domain(), - fill: common::messages::Fill { - source_chain: vaa.try_emitter_chain()?, - order_sender: fast_order.sender(), - redeemer: fast_order.redeemer(), - redeemer_message: <&[u8]>::from(fast_order.redeemer_message()).to_vec().into(), - }, - }) -} - -pub fn send_cctp( - accounts: CctpAccounts, - amount: u64, - destination_cctp_domain: u32, - payload: Vec, - core_message_bump: u8, -) -> Result<()> { - let authority_seeds = &[Custodian::SEED_PREFIX, &[accounts.custodian.bump]]; - - wormhole_cctp_solana::cpi::burn_and_publish( - CpiContext::new_with_signer( - accounts.token_messenger_minter_program.to_account_info(), - wormhole_cctp_solana::cpi::DepositForBurnWithCaller { - src_token_owner: accounts.custodian.to_account_info(), - token_messenger_minter_sender_authority: accounts - .token_messenger_minter_sender_authority - .to_account_info(), - src_token: accounts.custody_token.to_account_info(), - message_transmitter_config: accounts.message_transmitter_config.to_account_info(), - token_messenger: accounts.token_messenger.to_account_info(), - remote_token_messenger: accounts.remote_token_messenger.to_account_info(), - token_minter: accounts.token_minter.to_account_info(), - local_token: accounts.local_token.to_account_info(), - mint: accounts.mint.to_account_info(), - message_transmitter_program: accounts.message_transmitter_program.to_account_info(), - token_messenger_minter_program: accounts - .token_messenger_minter_program - .to_account_info(), - token_program: accounts.token_program.to_account_info(), - }, - &[authority_seeds], - ), - CpiContext::new_with_signer( - accounts.core_bridge_program.to_account_info(), - wormhole_cctp_solana::cpi::PostMessage { - payer: accounts.payer.to_account_info(), - message: accounts.core_message.to_account_info(), - emitter: accounts.custodian.to_account_info(), - config: accounts.core_bridge_config.to_account_info(), - emitter_sequence: accounts.core_emitter_sequence.to_account_info(), - fee_collector: accounts.core_fee_collector.to_account_info(), - system_program: accounts.system_program.to_account_info(), - clock: accounts.clock.to_account_info(), - rent: accounts.rent.to_account_info(), - }, - &[ - authority_seeds, - &[ - common::constants::CORE_MESSAGE_SEED_PREFIX, - accounts.payer.key().as_ref(), - accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[core_message_bump], - ], - ], - ), - wormhole_cctp_solana::cpi::BurnAndPublishArgs { - burn_source: None, - destination_caller: accounts.to_router_endpoint.address, - destination_cctp_domain, - amount, - mint_recipient: accounts.to_router_endpoint.address, - wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload, - }, - )?; - - Ok(()) -} diff --git a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs index 3ddac6a7..2f437cc2 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs @@ -1,77 +1,88 @@ use crate::{ error::MatchingEngineError, - state::{AuctionData, AuctionStatus, Custodian}, + state::{Auction, AuctionConfig, Custodian}, + utils, }; use anchor_lang::prelude::*; use anchor_spl::token; #[derive(Accounts)] pub struct ImproveOffer<'info> { - offer_authority: Signer<'info>, - - /// This program's Wormhole (Core Bridge) emitter authority. + /// This program's Wormhole (Core Bridge) emitter authority. This is also the burn-source + /// authority for CCTP transfers. /// /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] - custodian: Account<'info, Custodian>, + custodian: AccountInfo<'info>, + + auction_config: Account<'info, AuctionConfig>, + + offer_authority: Signer<'info>, #[account( mut, seeds = [ - AuctionData::SEED_PREFIX, - auction_data.vaa_hash.as_ref(), + Auction::SEED_PREFIX, + auction.vaa_hash.as_ref(), ], - bump = auction_data.bump, - has_one = best_offer_token @ MatchingEngineError::InvalidTokenAccount, - constraint = { - auction_data.status == AuctionStatus::Active - } @ MatchingEngineError::AuctionNotActive + bump = auction.bump, + constraint = utils::is_valid_active_auction( + &auction_config, + &auction, + Some(best_offer_token.key()), + None, + )? )] - auction_data: Account<'info, AuctionData>, + auction: Account<'info, Auction>, #[account( mut, - associated_token::mint = custody_token.mint, + associated_token::mint = common::constants::usdc::id(), associated_token::authority = offer_authority )] offer_token: Account<'info, token::TokenAccount>, + /// CHECK: Mutable. Must have the same key in auction data. #[account(mut)] - best_offer_token: Account<'info, token::TokenAccount>, + best_offer_token: AccountInfo<'info>, + /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: Account<'info, token::TokenAccount>, + custody_token: AccountInfo<'info>, token_program: Program<'info, token::Token>, } pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { - let auction_data = &mut ctx.accounts.auction_data; + let auction = ctx.accounts.auction.info.as_mut().unwrap(); - // Push this to the stack to enhance readability. - let auction_duration = ctx.accounts.custodian.auction_config.auction_duration; - require!( - Clock::get()?.slot.saturating_sub(auction_duration.into()) < auction_data.start_slot, - MatchingEngineError::AuctionPeriodExpired - ); + { + let Clock { slot, .. } = Clock::get()?; + require!( + slot <= auction.end_slot, + MatchingEngineError::AuctionPeriodExpired + ); + } // Make sure the new offer is less than the previous offer. require!( - fee_offer < auction_data.offer_price, + fee_offer < auction.offer_price, MatchingEngineError::OfferPriceNotImproved ); // Transfer funds from the `best_offer` token account to the `offer_token` token account, // but only if the pubkeys are different. + // + // TODO: change authority to custodian. Authority must be delegated to custodian before this + // can work. let offer_token = ctx.accounts.offer_token.key(); - if auction_data.best_offer_token != offer_token { + if auction.best_offer_token != offer_token { token::transfer( CpiContext::new( ctx.accounts.token_program.to_account_info(), @@ -81,14 +92,14 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { authority: ctx.accounts.offer_authority.to_account_info(), }, ), - auction_data.amount + auction_data.security_deposit, + auction.amount_in + auction.security_deposit, )?; // Update the `best_offer` token account and `amount` fields. - auction_data.best_offer_token = offer_token; + auction.best_offer_token = offer_token; } - auction_data.offer_price = fee_offer; + auction.offer_price = fee_offer; Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index ff008bfc..94ec5356 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -6,7 +6,7 @@ use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; use crate::{ error::MatchingEngineError, - state::{AuctionData, AuctionStatus, Custodian, RouterEndpoint}, + state::{Auction, AuctionConfig, AuctionInfo, AuctionStatus, Custodian, RouterEndpoint}, }; #[derive(Accounts)] @@ -22,27 +22,39 @@ pub struct PlaceInitialOffer<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] custodian: Account<'info, Custodian>, + #[account( + constraint = { + require_eq!( + auction_config.id, + custodian.auction_config_id, + MatchingEngineError::AuctionConfigMismatch, + ); + true + } + )] + auction_config: Account<'info, AuctionConfig>, + /// CHECK: Must be owned by the Wormhole Core Bridge program. #[account(owner = core_bridge_program::id())] - vaa: AccountInfo<'info>, + fast_vaa: AccountInfo<'info>, /// This account should only be created once, and should never be changed to /// init_if_needed. Otherwise someone can game an existing auction. #[account( init, payer = payer, - space = 8 + AuctionData::INIT_SPACE, + space = 8 + Auction::INIT_SPACE, seeds = [ - AuctionData::SEED_PREFIX, - VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + Auction::SEED_PREFIX, + VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), ], bump )] - auction_data: Account<'info, AuctionData>, + auction: Box>, #[account( seeds = [ @@ -71,8 +83,7 @@ pub struct PlaceInitialOffer<'info> { #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: Account<'info, token::TokenAccount>, @@ -82,8 +93,8 @@ pub struct PlaceInitialOffer<'info> { pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> Result<()> { // Create zero copy reference to `FastMarketOrder` payload. - let vaa = VaaAccount::load(&ctx.accounts.vaa)?; - let msg = LiquidityLayerPayload::try_from(vaa.try_payload()?) + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa)?; + let msg = LiquidityLayerPayload::try_from(fast_vaa.try_payload()?) .map_err(|_| MatchingEngineError::InvalidVaa)? .message(); let fast_order = msg @@ -91,12 +102,16 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R .ok_or(MatchingEngineError::NotFastMarketOrder)?; // We need to fetch clock values for a couple of operations in this instruction. - let clock = Clock::get()?; + let Clock { + slot, + unix_timestamp, + .. + } = Clock::get()?; // Check to see if the deadline has expired. let deadline = i64::from(fast_order.deadline()); require!( - deadline == 0 || clock.unix_timestamp < deadline, + deadline == 0 || unix_timestamp < deadline, MatchingEngineError::FastMarketOrderExpired, ); @@ -105,16 +120,19 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R // Verify that the to and from router endpoints are valid. crate::utils::verify_router_path( - &vaa, + &fast_vaa, &ctx.accounts.from_router_endpoint, &ctx.accounts.to_router_endpoint, fast_order.target_chain(), )?; // Parse the transfer amount from the VAA. - let amount = fast_order.amount_in(); + let amount_in = fast_order.amount_in(); // Transfer tokens from the offer authority's token account to the custodian. + // + // TODO: change authority to custodian. Authority must be delegated to custodian before this + // can work. token::transfer( CpiContext::new( ctx.accounts.token_program.to_account_info(), @@ -124,21 +142,26 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R authority: ctx.accounts.payer.to_account_info(), }, ), - amount + max_fee, + amount_in + max_fee, )?; - // Set up the AuctionData account for this auction. + // Set up the Auction account for this auction. let initial_offer_token = ctx.accounts.offer_token.key(); - ctx.accounts.auction_data.set_inner(AuctionData { - bump: ctx.bumps["auction_data"], - vaa_hash: vaa.try_digest().unwrap().0, + ctx.accounts.auction.set_inner(Auction { + bump: ctx.bumps["auction"], + vaa_hash: fast_vaa.try_digest().unwrap().0, status: AuctionStatus::Active, - best_offer_token: initial_offer_token, - initial_offer_token, - start_slot: clock.slot, - amount, - security_deposit: max_fee, - offer_price: fee_offer, + info: Some(AuctionInfo { + config_id: ctx.accounts.auction_config.id, + best_offer_token: initial_offer_token, + initial_offer_token, + start_slot: slot, + end_slot: slot + u64::from(ctx.accounts.auction_config.duration), + amount_in, + security_deposit: max_fee, + offer_price: fee_offer, + amount_out: amount_in, + }), }); Ok(()) diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index aaa85dae..a12afe41 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::MatchingEngineError, - state::{Custodian, PreparedAuctionSettlement}, + state::{Custodian, PreparedOrderResponse}, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -11,7 +11,7 @@ use wormhole_cctp_solana::{ }; #[derive(Accounts)] -pub struct PrepareAuctionSettlementCctp<'info> { +pub struct PrepareOrderResponseCctp<'info> { #[account(mut)] payer: Signer<'info>, @@ -20,7 +20,7 @@ pub struct PrepareAuctionSettlementCctp<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] custodian: Box>, @@ -36,15 +36,15 @@ pub struct PrepareAuctionSettlementCctp<'info> { #[account( init, payer = payer, - space = 8 + PreparedAuctionSettlement::INIT_SPACE, + space = 8 + PreparedOrderResponse::INIT_SPACE, seeds = [ - PreparedAuctionSettlement::SEED_PREFIX, + PreparedOrderResponse::SEED_PREFIX, payer.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump, )] - prepared_auction_settlement: Account<'info, PreparedAuctionSettlement>, + prepared_order_response: Account<'info, PreparedOrderResponse>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -55,8 +55,7 @@ pub struct PrepareAuctionSettlementCctp<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -109,8 +108,8 @@ pub struct CctpMessageArgs { pub cctp_attestation: Vec, } -pub fn prepare_auction_settlement_cctp( - ctx: Context, +pub fn prepare_order_response_cctp( + ctx: Context, args: CctpMessageArgs, ) -> Result<()> { let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); @@ -148,7 +147,7 @@ pub fn prepare_auction_settlement_cctp( .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[Custodian::SIGNER_SEEDS], ), wormhole_cctp_solana::cpi::ReceiveMessageArgs { encoded_message: args.encoded_cctp_message, @@ -206,9 +205,9 @@ pub fn prepare_auction_settlement_cctp( // * settle_auction_complete // * execute_slow_order_no_auction ctx.accounts - .prepared_auction_settlement - .set_inner(PreparedAuctionSettlement { - bump: ctx.bumps["prepared_auction_settlement"], + .prepared_order_response + .set_inner(PreparedOrderResponse { + bump: ctx.bumps["prepared_order_response"], fast_vaa_hash: fast_vaa.try_digest().unwrap().0, prepared_by: ctx.accounts.payer.key(), source_chain, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active_cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs similarity index 70% rename from solana/programs/matching-engine/src/processor/auction/settle/active_cctp.rs rename to solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index 5df45575..5b150b91 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active_cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -1,15 +1,13 @@ -use std::io::Write; - use crate::{ error::MatchingEngineError, state::{ - AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedAuctionSettlement, - RouterEndpoint, + Auction, AuctionConfig, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint, }, + utils, }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::{messages::raw::LiquidityLayerMessage, wormhole_io::TypePrefixedPayload}; +use common::wormhole_io::TypePrefixedPayload; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, wormhole::core_bridge_program::{self, VaaAccount}, @@ -31,16 +29,18 @@ pub struct SettleAuctionActiveCctp<'info> { ], bump, )] - payer_sequence: Account<'info, PayerSequence>, + payer_sequence: Box>, /// This program's Wormhole (Core Bridge) emitter authority. /// /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] - custodian: Box>, + custodian: AccountInfo<'info>, + + auction_config: Box>, /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. @@ -56,26 +56,30 @@ pub struct SettleAuctionActiveCctp<'info> { mut, close = prepared_by, seeds = [ - PreparedAuctionSettlement::SEED_PREFIX, + PreparedOrderResponse::SEED_PREFIX, prepared_by.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], - bump = prepared_auction_settlement.bump, + bump = prepared_order_response.bump, )] - prepared_auction_settlement: Box>, + prepared_order_response: Box>, /// There should be no account data here because an auction was never created. #[account( mut, seeds = [ - AuctionData::SEED_PREFIX, - prepared_auction_settlement.fast_vaa_hash.as_ref(), + Auction::SEED_PREFIX, + prepared_order_response.fast_vaa_hash.as_ref(), ], - bump = auction_data.bump, - has_one = best_offer_token, // TODO: add error - constraint = auction_data.status == AuctionStatus::Active // TODO: add error + bump = auction.bump, + constraint = utils::is_valid_active_auction( + &auction_config, + &auction, + Some(best_offer_token.key()), + None, + )? )] - auction_data: Box>, + auction: Box>, /// CHECK: Must equal the best offer token in the auction data account. #[account(mut)] @@ -98,18 +102,10 @@ pub struct SettleAuctionActiveCctp<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, - /// Circle-supported mint. - /// - /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP - /// Token Messenger Minter program's local token account. - #[account(mut)] - mint: AccountInfo<'info>, - /// Seeds must be \["endpoint", chain.to_be_bytes()\]. #[account( seeds = [ @@ -117,9 +113,19 @@ pub struct SettleAuctionActiveCctp<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = { + to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Box>, + /// Circle-supported mint. + /// + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account(mut)] + mint: AccountInfo<'info>, + /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). message_transmitter_authority: UncheckedAccount<'info>, @@ -202,53 +208,24 @@ pub struct SettleAuctionActiveCctp<'info> { /// TODO: add docstring pub fn settle_auction_active_cctp(ctx: Context) -> Result<()> { let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); - let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) - .unwrap() - .to_fast_market_order_unchecked(); - - let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; - - // This means the slow message beat the fast message. We need to refund the bidder and - // (potentially) take a penalty for not fulfilling their obligation. The `penalty` CAN be zero - // in this case, since the auction grace period might not have ended yet. - let (final_status, liquidator_amount, best_offer_amount, cctp_amount) = { - let auction = &ctx.accounts.auction_data; - let slots_elapsed = Clock::get().map(|clock| clock.slot - auction.start_slot)?; - let (penalty, reward) = crate::utils::calculate_dynamic_penalty( - &ctx.accounts.custodian.auction_config, - auction.security_deposit, - slots_elapsed, - ) - .ok_or(MatchingEngineError::PenaltyCalculationFailed)?; - - let base_fee = ctx.accounts.prepared_auction_settlement.base_fee; - ( - AuctionStatus::Settled { - base_fee, - penalty: Some(penalty), - }, - penalty + base_fee, - auction.amount + auction.security_deposit - penalty - reward, - auction.amount - base_fee + reward, - ) - }; - - // Transfer to the best offer token what he deserves. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.best_offer_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - best_offer_amount, - )?; - let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); - redeemer_message.write_all(order.redeemer_message().into())?; + let super::SettledActive { + order, + user_amount: amount, + fill, + } = super::settle_active_and_prepare_fill( + super::SettleActiveAndPrepareFill { + custodian: &ctx.accounts.custodian, + auction_config: &ctx.accounts.auction_config, + prepared_order_response: &ctx.accounts.prepared_order_response, + liquidator_token: &ctx.accounts.liquidator_token, + best_offer_token: &ctx.accounts.best_offer_token, + custody_token: &ctx.accounts.custody_token, + token_program: &ctx.accounts.token_program, + }, + &fast_vaa, + &mut ctx.accounts.auction, + )?; // This returns the CCTP nonce, but we do not need it. wormhole_cctp_solana::cpi::burn_and_publish( @@ -282,7 +259,7 @@ pub fn settle_auction_active_cctp(ctx: Context) -> Resu .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), }, - &[custodian_seeds], + &[Custodian::SIGNER_SEEDS], ), CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), @@ -298,7 +275,7 @@ pub fn settle_auction_active_cctp(ctx: Context) -> Resu rent: ctx.accounts.rent.to_account_info(), }, &[ - custodian_seeds, + Custodian::SIGNER_SEEDS, &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), @@ -315,35 +292,12 @@ pub fn settle_auction_active_cctp(ctx: Context) -> Resu burn_source: None, destination_caller: ctx.accounts.to_router_endpoint.address, destination_cctp_domain: order.destination_cctp_domain(), - amount: cctp_amount, - // TODO: add mint recipient to the router endpoint account to future proof this? - mint_recipient: ctx.accounts.to_router_endpoint.address, + amount, + mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: common::messages::Fill { - source_chain: ctx.accounts.prepared_auction_settlement.source_chain, - order_sender: order.sender(), - redeemer: order.redeemer(), - redeemer_message: redeemer_message.into(), - } - .to_vec_payload(), + payload: fill.to_vec_payload(), }, )?; - // Everyone's whole, set the auction as completed. - ctx.accounts.auction_data.status = final_status; - - // Transfer the penalty amount to the caller. The caller also earns the base fee for relaying - // the slow VAA. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.liquidator_token.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - liquidator_amount, - ) + Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs new file mode 100644 index 00000000..e5c1178f --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -0,0 +1,210 @@ +use crate::{ + error::MatchingEngineError, + state::{ + Auction, AuctionConfig, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint, + }, + utils, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::wormhole_io::TypePrefixedPayload; +use wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}; + +/// Accounts required for [settle_auction_active_local]. +#[derive(Accounts)] +pub struct SettleAuctionActiveLocal<'info> { + #[account(mut)] + payer: Signer<'info>, + + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Account<'info, PayerSequence>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + )] + custodian: AccountInfo<'info>, + + auction_config: Box>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + /// CHECK: Must be the account that created the prepared slow order. This account will most + /// likely be the same as the payer. + #[account(mut)] + prepared_by: AccountInfo<'info>, + + #[account( + mut, + close = prepared_by, + seeds = [ + PreparedOrderResponse::SEED_PREFIX, + prepared_by.key().as_ref(), + core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + ], + bump = prepared_order_response.bump, + )] + prepared_order_response: Box>, + + /// There should be no account data here because an auction was never created. + #[account( + mut, + seeds = [ + Auction::SEED_PREFIX, + prepared_order_response.fast_vaa_hash.as_ref(), + ], + bump = auction.bump, + constraint = utils::is_valid_active_auction( + &auction_config, + &auction, + Some(best_offer_token.key()), + None, + )? + )] + auction: Box>, + + /// Seeds must be \["endpoint", chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + core_bridge_program::SOLANA_CHAIN.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + )] + to_router_endpoint: Box>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + liquidator_token: AccountInfo<'info>, + + /// CHECK: Must equal the best offer token in the auction data account. + #[account(mut)] + best_offer_token: AccountInfo<'info>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + )] + custody_token: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +/// TODO: add docstring +pub fn settle_auction_active_local(ctx: Context) -> Result<()> { + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + + let super::SettledActive { + order: _, + user_amount: amount, + fill, + } = super::settle_active_and_prepare_fill( + super::SettleActiveAndPrepareFill { + custodian: &ctx.accounts.custodian, + auction_config: &ctx.accounts.auction_config, + prepared_order_response: &ctx.accounts.prepared_order_response, + liquidator_token: &ctx.accounts.liquidator_token, + best_offer_token: &ctx.accounts.best_offer_token, + custody_token: &ctx.accounts.custody_token, + token_program: &ctx.accounts.token_program, + }, + &fast_vaa, + &mut ctx.accounts.auction, + )?; + + // Publish message via Core Bridge. + core_bridge_program::cpi::post_message( + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]], + ], + ], + ), + core_bridge_program::cpi::PostMessageArgs { + nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: common::messages::FastFill { amount, fill }.to_vec_payload(), + commitment: core_bridge_program::Commitment::Finalized, + }, + ) +} diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs new file mode 100644 index 00000000..303e530b --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -0,0 +1,137 @@ +mod cctp; +pub use cctp::*; + +mod local; +pub use local::*; + +use crate::{ + state::{Auction, AuctionConfig, AuctionStatus, Custodian, PreparedOrderResponse}, + utils::{self, math::DepositPenalty}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::{ + raw::{FastMarketOrder, LiquidityLayerMessage}, + Fill, +}; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; + +struct SettleActiveAndPrepareFill<'ctx, 'info> { + custodian: &'ctx AccountInfo<'info>, + auction_config: &'ctx Account<'info, AuctionConfig>, + prepared_order_response: &'ctx Account<'info, PreparedOrderResponse>, + liquidator_token: &'ctx AccountInfo<'info>, + best_offer_token: &'ctx AccountInfo<'info>, + custody_token: &'ctx AccountInfo<'info>, + token_program: &'ctx Program<'info, token::Token>, +} + +struct SettledActive<'ctx> { + order: FastMarketOrder<'ctx>, + user_amount: u64, + fill: Fill, +} + +fn settle_active_and_prepare_fill<'ctx>( + accounts: SettleActiveAndPrepareFill<'ctx, '_>, + fast_vaa: &'ctx VaaAccount<'ctx>, + auction: &'ctx mut Auction, +) -> Result> { + let SettleActiveAndPrepareFill { + custodian, + auction_config, + prepared_order_response, + liquidator_token, + best_offer_token, + custody_token, + token_program, + } = accounts; + + let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) + .unwrap() + .to_fast_market_order_unchecked(); + + // This means the slow message beat the fast message. We need to refund the bidder and + // (potentially) take a penalty for not fulfilling their obligation. The `penalty` CAN be zero + // in this case, since the auction grace period might not have ended yet. + let (liquidator_amount, mut best_offer_amount, user_amount, final_status) = { + let auction_info = auction.info.as_ref().unwrap(); + + let DepositPenalty { + penalty, + user_reward, + } = utils::math::compute_deposit_penalty( + auction_config, + auction.info.as_ref().unwrap(), + Clock::get().map(|clock| clock.slot)?, + ); + + // TODO: do math to adjust base fee and reward by amount_out / amount_in. + let base_fee = accounts.prepared_order_response.base_fee; + + // NOTE: The sum of all amounts should be 2 * amount_in + security_deposit. + // * amount_in + security_deposit comes from the auction participation. + // * amount_in comes from the inbound transfer. + ( + penalty + base_fee, + auction_info.amount_in + auction_info.security_deposit - penalty - user_reward, + auction_info.amount_in + user_reward - base_fee, + AuctionStatus::Settled { + base_fee, + penalty: Some(penalty), + }, + ) + }; + + if liquidator_token.key() != best_offer_token.key() { + // Transfer the penalty amount to the caller. The caller also earns the base fee for relaying + // the slow VAA. + token::transfer( + CpiContext::new_with_signer( + token_program.to_account_info(), + token::Transfer { + from: custody_token.to_account_info(), + to: liquidator_token.to_account_info(), + authority: custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + liquidator_amount, + )?; + } else { + best_offer_amount += liquidator_amount; + } + + // Transfer to the best offer token what he deserves. + token::transfer( + CpiContext::new_with_signer( + token_program.to_account_info(), + token::Transfer { + from: custody_token.to_account_info(), + to: best_offer_token.to_account_info(), + authority: custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + best_offer_amount, + )?; + + let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); + as std::io::Write>::write_all(&mut redeemer_message, order.redeemer_message().into())?; + + let fill = Fill { + source_chain: prepared_order_response.source_chain, + order_sender: order.sender(), + redeemer: order.redeemer(), + redeemer_message: redeemer_message.into(), + }; + + // Everyone's whole, set the auction as completed. + auction.status = final_status; + + Ok(SettledActive { + order, + user_amount, + fill, + }) +} diff --git a/solana/programs/matching-engine/src/processor/auction/settle/complete.rs b/solana/programs/matching-engine/src/processor/auction/settle/complete.rs index 6bf3c6c7..48cc9024 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/complete.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/complete.rs @@ -1,4 +1,7 @@ -use crate::state::{AuctionData, AuctionStatus, Custodian, PreparedAuctionSettlement}; +use crate::{ + error::MatchingEngineError, + state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse}, +}; use anchor_lang::prelude::*; use anchor_spl::token; @@ -9,7 +12,7 @@ pub struct SettleAuctionComplete<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] custodian: Account<'info, Custodian>, @@ -21,24 +24,35 @@ pub struct SettleAuctionComplete<'info> { mut, close = prepared_by, seeds = [ - PreparedAuctionSettlement::SEED_PREFIX, + PreparedOrderResponse::SEED_PREFIX, prepared_by.key().as_ref(), - prepared_auction_settlement.fast_vaa_hash.as_ref() + prepared_order_response.fast_vaa_hash.as_ref() ], - bump = prepared_auction_settlement.bump, + bump = prepared_order_response.bump, )] - prepared_auction_settlement: Account<'info, PreparedAuctionSettlement>, + prepared_order_response: Account<'info, PreparedOrderResponse>, #[account( seeds = [ - AuctionData::SEED_PREFIX, - prepared_auction_settlement.fast_vaa_hash.as_ref(), + Auction::SEED_PREFIX, + prepared_order_response.fast_vaa_hash.as_ref(), ], - bump = auction_data.bump, - has_one = best_offer_token, // TODO: add error - constraint = auction_data.status == AuctionStatus::Completed // TODO: add error + bump = auction.bump, + constraint = { + require!( + matches!(auction.status, AuctionStatus::Completed { .. }), + MatchingEngineError::AuctionNotCompleted, + ); + + require_keys_eq!( + best_offer_token.key(), + auction.info.as_ref().unwrap().best_offer_token, + MatchingEngineError::BestOfferTokenMismatch, + ); + true + } )] - auction_data: Account<'info, AuctionData>, + auction: Account<'info, Auction>, /// Destination token account, which the redeemer may not own. But because the redeemer is a /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent @@ -57,8 +71,7 @@ pub struct SettleAuctionComplete<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: Account<'info, token::TokenAccount>, @@ -66,8 +79,8 @@ pub struct SettleAuctionComplete<'info> { } pub fn settle_auction_complete(ctx: Context) -> Result<()> { - ctx.accounts.auction_data.status = AuctionStatus::Settled { - base_fee: ctx.accounts.prepared_auction_settlement.base_fee, + ctx.accounts.auction.status = AuctionStatus::Settled { + base_fee: ctx.accounts.prepared_order_response.base_fee, penalty: None, }; @@ -80,8 +93,8 @@ pub fn settle_auction_complete(ctx: Context) -> Result<() to: ctx.accounts.best_offer_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[Custodian::SIGNER_SEEDS], ), - ctx.accounts.auction_data.amount, + ctx.accounts.auction.info.as_ref().unwrap().amount_in, ) } diff --git a/solana/programs/matching-engine/src/processor/auction/settle/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/mod.rs index fd6ef7ab..9f3ec74f 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/mod.rs @@ -1,8 +1,8 @@ -mod active_cctp; -pub use active_cctp::*; +mod active; +pub use active::*; mod complete; pub use complete::*; -mod none_cctp; -pub use none_cctp::*; +mod none; +pub use none::*; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none_cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs similarity index 74% rename from solana/programs/matching-engine/src/processor/auction/settle/none_cctp.rs rename to solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs index f7f003cf..fbd5f915 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none_cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs @@ -1,11 +1,10 @@ -use std::io::Write; - -use crate::state::{ - AuctionData, AuctionStatus, Custodian, PayerSequence, PreparedAuctionSettlement, RouterEndpoint, +use crate::{ + error::MatchingEngineError, + state::{Auction, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint}, }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::{messages::raw::LiquidityLayerMessage, wormhole_io::TypePrefixedPayload}; +use common::wormhole_io::TypePrefixedPayload; use wormhole_cctp_solana::{ cctp::{message_transmitter_program, token_messenger_minter_program}, wormhole::core_bridge_program::{self, VaaAccount}, @@ -34,8 +33,8 @@ pub struct SettleAuctionNoneCctp<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, - has_one = fee_recipient, // TODO: add error + bump = Custodian::BUMP, + has_one = fee_recipient_token @ MatchingEngineError::FeeRecipientTokenMismatch, )] custodian: Box>, @@ -53,26 +52,26 @@ pub struct SettleAuctionNoneCctp<'info> { mut, close = prepared_by, seeds = [ - PreparedAuctionSettlement::SEED_PREFIX, + PreparedOrderResponse::SEED_PREFIX, prepared_by.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], - bump = prepared_auction_settlement.bump, + bump = prepared_order_response.bump, )] - prepared_auction_settlement: Account<'info, PreparedAuctionSettlement>, + prepared_order_response: Account<'info, PreparedOrderResponse>, /// There should be no account data here because an auction was never created. #[account( init, payer = payer, - space = 8 + AuctionData::INIT_SPACE, + space = 8 + Auction::INIT_SPACE_NO_AUCTION, seeds = [ - AuctionData::SEED_PREFIX, - prepared_auction_settlement.fast_vaa_hash.as_ref(), + Auction::SEED_PREFIX, + prepared_order_response.fast_vaa_hash.as_ref(), ], bump )] - auction_data: Box>, + auction: Box>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -83,8 +82,7 @@ pub struct SettleAuctionNoneCctp<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -94,17 +92,7 @@ pub struct SettleAuctionNoneCctp<'info> { /// /// CHECK: This token account must already exist. #[account(mut)] - fee_recipient: AccountInfo<'info>, - - /// Circle-supported mint. - /// - /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP - /// Token Messenger Minter program's local token account. - #[account( - mut, - address = common::constants::usdc::id(), - )] - mint: AccountInfo<'info>, + fee_recipient_token: AccountInfo<'info>, /// Seeds must be \["endpoint", chain.to_be_bytes()\]. #[account( @@ -113,6 +101,9 @@ pub struct SettleAuctionNoneCctp<'info> { from_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = from_router_endpoint.bump, + constraint = { + to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain )] from_router_endpoint: Box>, @@ -123,9 +114,22 @@ pub struct SettleAuctionNoneCctp<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = { + to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Box>, + /// Circle-supported mint. + /// + /// CHECK: Mutable. This token account's mint must be the same as the one found in the CCTP + /// Token Messenger Minter program's local token account. + #[account( + mut, + address = common::constants::usdc::id(), + )] + mint: AccountInfo<'info>, + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] core_bridge_config: UncheckedAccount<'info>, @@ -192,26 +196,26 @@ pub struct SettleAuctionNoneCctp<'info> { /// TODO: add docstring pub fn settle_auction_none_cctp(ctx: Context) -> Result<()> { let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); - let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) - .unwrap() - .to_fast_market_order_unchecked(); - // NOTE: We need to verify the router path, since an auction was never created and this check is - // done in the `place_initial_offer` instruction. - crate::utils::verify_router_path( + let super::SettledNone { + order, + user_amount: amount, + fill, + } = super::settle_none_and_prepare_fill( + super::SettleNoneAndPrepareFill { + custodian: &ctx.accounts.custodian, + prepared_order_response: &ctx.accounts.prepared_order_response, + from_router_endpoint: &ctx.accounts.from_router_endpoint, + to_router_endpoint: &ctx.accounts.to_router_endpoint, + fee_recipient_token: &ctx.accounts.fee_recipient_token, + custody_token: &ctx.accounts.custody_token, + token_program: &ctx.accounts.token_program, + }, &fast_vaa, - &ctx.accounts.from_router_endpoint, - &ctx.accounts.to_router_endpoint, - order.target_chain(), + &mut ctx.accounts.auction, + ctx.bumps["auction"], )?; - let custodian_seeds = &[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]; - - let base_fee = ctx.accounts.prepared_auction_settlement.base_fee; - let amount = order.amount_in() - base_fee; - let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); - redeemer_message.write_all(order.redeemer_message().into())?; - // This returns the CCTP nonce, but we do not need it. wormhole_cctp_solana::cpi::burn_and_publish( CpiContext::new_with_signer( @@ -244,7 +248,7 @@ pub fn settle_auction_none_cctp(ctx: Context) -> Result<( .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), }, - &[custodian_seeds], + &[Custodian::SIGNER_SEEDS], ), CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), @@ -260,7 +264,7 @@ pub fn settle_auction_none_cctp(ctx: Context) -> Result<( rent: ctx.accounts.rent.to_account_info(), }, &[ - custodian_seeds, + Custodian::SIGNER_SEEDS, &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), @@ -281,41 +285,10 @@ pub fn settle_auction_none_cctp(ctx: Context) -> Result<( // TODO: add mint recipient to the router endpoint account to future proof this? mint_recipient: ctx.accounts.to_router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: common::messages::Fill { - source_chain: ctx.accounts.prepared_auction_settlement.source_chain, - order_sender: order.sender(), - redeemer: order.redeemer(), - redeemer_message: redeemer_message.into(), - } - .to_vec_payload(), + payload: fill.to_vec_payload(), }, )?; - // This is a necessary security check. This will prevent a relayer from starting an auction with - // the fast transfer VAA, even though the slow relayer already delivered the slow VAA. Not - // setting this could lead to trapped funds (which would require an upgrade to fix). - // - // NOTE: We do not bother setting the other fields in this account. The existence of this - // accounts ensures the security defined in the previous paragraph. - ctx.accounts.auction_data.status = AuctionStatus::Settled { - base_fee, - penalty: None, - }; - - // Pay the `fee_recipient` the base fee. This ensures that the protocol relayer is paid for - // relaying slow VAAs that do not have an associated auction. This prevents the protocol relayer - // from any MEV attacks. - token::transfer( - CpiContext::new_with_signer( - ctx.accounts.token_program.to_account_info(), - token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), - to: ctx.accounts.fee_recipient.to_account_info(), - authority: ctx.accounts.custodian.to_account_info(), - }, - &[custodian_seeds], - ), - // TODO: encoding will change from u128 to u64 - ctx.accounts.prepared_auction_settlement.base_fee, - ) + // Done. + Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs new file mode 100644 index 00000000..d40ca044 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -0,0 +1,212 @@ +use crate::{ + error::MatchingEngineError, + state::{Auction, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::wormhole_io::TypePrefixedPayload; +use wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}; + +/// Accounts required for [settle_auction_none_local]. +#[derive(Accounts)] +pub struct SettleAuctionNoneLocal<'info> { + #[account(mut)] + payer: Signer<'info>, + + #[account( + init_if_needed, + payer = payer, + space = 8 + PayerSequence::INIT_SPACE, + seeds = [ + PayerSequence::SEED_PREFIX, + payer.key().as_ref() + ], + bump, + )] + payer_sequence: Box>, + + /// This program's Wormhole (Core Bridge) emitter authority. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + has_one = fee_recipient_token @ MatchingEngineError::FeeRecipientTokenMismatch, + )] + custodian: Box>, + + /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via + /// zero-copy using the [VaaAccount](core_bridge_program::sdk::VaaAccount) reader. + #[account(owner = core_bridge_program::id())] + fast_vaa: AccountInfo<'info>, + + /// CHECK: Must be the account that created the prepared slow order. This account will most + /// likely be the same as the payer. + #[account(mut)] + prepared_by: AccountInfo<'info>, + + #[account( + mut, + close = prepared_by, + seeds = [ + PreparedOrderResponse::SEED_PREFIX, + prepared_by.key().as_ref(), + core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + ], + bump = prepared_order_response.bump, + )] + prepared_order_response: Account<'info, PreparedOrderResponse>, + + /// There should be no account data here because an auction was never created. + #[account( + init, + payer = payer, + space = 8 + Auction::INIT_SPACE_NO_AUCTION, + seeds = [ + Auction::SEED_PREFIX, + prepared_order_response.fast_vaa_hash.as_ref(), + ], + bump + )] + auction: Box>, + + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. + /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message + /// from its custody account to this account. + /// + /// CHECK: Mutable. Seeds must be \["custody"\]. + /// + /// NOTE: This account must be encoded as the mint recipient in the CCTP message. + #[account( + mut, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + )] + custody_token: AccountInfo<'info>, + + /// Destination token account, which the redeemer may not own. But because the redeemer is a + /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent + /// to any account he chooses (this one). + /// + /// CHECK: This token account must already exist. + #[account(mut)] + fee_recipient_token: AccountInfo<'info>, + + /// Seeds must be \["endpoint", chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + from_router_endpoint.chain.to_be_bytes().as_ref(), + ], + bump = from_router_endpoint.bump, + constraint = { + to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain + )] + from_router_endpoint: Box>, + + /// Seeds must be \["endpoint", chain.to_be_bytes()\]. + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + core_bridge_program::SOLANA_CHAIN.to_be_bytes().as_ref(), + ], + bump = to_router_endpoint.bump, + )] + to_router_endpoint: Box>, + + /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). + #[account(mut)] + core_bridge_config: UncheckedAccount<'info>, + + /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CORE_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + core_message: AccountInfo<'info>, + + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). + #[account(mut)] + core_emitter_sequence: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["fee_collector"\] (Wormhole Core Bridge program). + #[account(mut)] + core_fee_collector: UncheckedAccount<'info>, + + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, + token_program: Program<'info, token::Token>, + system_program: Program<'info, System>, + + /// CHECK: Wormhole Core Bridge needs the clock sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, + + /// CHECK: Wormhole Core Bridge needs the rent sysvar based on its legacy implementation. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, +} + +/// TODO: add docstring +pub fn settle_auction_none_local(ctx: Context) -> Result<()> { + let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + + let super::SettledNone { + order: _, + user_amount: amount, + fill, + } = super::settle_none_and_prepare_fill( + super::SettleNoneAndPrepareFill { + custodian: &ctx.accounts.custodian, + prepared_order_response: &ctx.accounts.prepared_order_response, + from_router_endpoint: &ctx.accounts.from_router_endpoint, + to_router_endpoint: &ctx.accounts.to_router_endpoint, + fee_recipient_token: &ctx.accounts.fee_recipient_token, + custody_token: &ctx.accounts.custody_token, + token_program: &ctx.accounts.token_program, + }, + &fast_vaa, + &mut ctx.accounts.auction, + ctx.bumps["auction"], + )?; + + // Publish message via Core Bridge. + core_bridge_program::cpi::post_message( + CpiContext::new_with_signer( + ctx.accounts.core_bridge_program.to_account_info(), + wormhole_cctp_solana::cpi::PostMessage { + payer: ctx.accounts.payer.to_account_info(), + message: ctx.accounts.core_message.to_account_info(), + emitter: ctx.accounts.custodian.to_account_info(), + config: ctx.accounts.core_bridge_config.to_account_info(), + emitter_sequence: ctx.accounts.core_emitter_sequence.to_account_info(), + fee_collector: ctx.accounts.core_fee_collector.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + }, + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CORE_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + ctx.accounts + .payer_sequence + .take_and_uptick() + .to_be_bytes() + .as_ref(), + &[ctx.bumps["core_message"]], + ], + ], + ), + core_bridge_program::cpi::PostMessageArgs { + nonce: common::constants::WORMHOLE_MESSAGE_NONCE, + payload: common::messages::FastFill { amount, fill }.to_vec_payload(), + commitment: core_bridge_program::Commitment::Finalized, + }, + ) +} diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs new file mode 100644 index 00000000..9dd4467a --- /dev/null +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -0,0 +1,108 @@ +mod cctp; +pub use cctp::*; + +mod local; +pub use local::*; + +use crate::state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, RouterEndpoint}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::messages::{ + raw::{FastMarketOrder, LiquidityLayerMessage}, + Fill, +}; +use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; + +struct SettleNoneAndPrepareFill<'ctx, 'info> { + custodian: &'ctx Account<'info, Custodian>, + prepared_order_response: &'ctx Account<'info, PreparedOrderResponse>, + from_router_endpoint: &'ctx Account<'info, RouterEndpoint>, + to_router_endpoint: &'ctx Account<'info, RouterEndpoint>, + fee_recipient_token: &'ctx AccountInfo<'info>, + custody_token: &'ctx AccountInfo<'info>, + token_program: &'ctx Program<'info, token::Token>, +} + +struct SettledNone<'ctx> { + order: FastMarketOrder<'ctx>, + user_amount: u64, + fill: Fill, +} + +fn settle_none_and_prepare_fill<'ctx>( + accounts: SettleNoneAndPrepareFill<'ctx, '_>, + fast_vaa: &'ctx VaaAccount<'ctx>, + auction: &'ctx mut Auction, + auction_bump_seed: u8, +) -> Result> { + let SettleNoneAndPrepareFill { + custodian, + prepared_order_response, + from_router_endpoint, + to_router_endpoint, + fee_recipient_token, + custody_token, + token_program, + } = accounts; + + let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) + .unwrap() + .to_fast_market_order_unchecked(); + + // NOTE: We need to verify the router path, since an auction was never created and this check is + // done in the `place_initial_offer` instruction. + crate::utils::verify_router_path( + fast_vaa, + from_router_endpoint, + to_router_endpoint, + order.target_chain(), + )?; + + // Pay the `fee_recipient` the base fee. This ensures that the protocol relayer is paid for + // relaying slow VAAs that do not have an associated auction. This prevents the protocol relayer + // from any MEV attacks. + let base_fee = prepared_order_response.base_fee; + token::transfer( + CpiContext::new_with_signer( + token_program.to_account_info(), + token::Transfer { + from: custody_token.to_account_info(), + to: fee_recipient_token.to_account_info(), + authority: custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + base_fee, + )?; + + let user_amount = order.amount_in() - base_fee; + + let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); + as std::io::Write>::write_all(&mut redeemer_message, order.redeemer_message().into())?; + + let fill = Fill { + source_chain: prepared_order_response.source_chain, + order_sender: order.sender(), + redeemer: order.redeemer(), + redeemer_message: redeemer_message.into(), + }; + + // This is a necessary security check. This will prevent a relayer from starting an auction with + // the fast transfer VAA, even though the slow relayer already delivered the slow VAA. Not + // setting this could lead to trapped funds (which would require an upgrade to fix). + *auction = Auction { + bump: auction_bump_seed, + vaa_hash: fast_vaa.try_digest().unwrap().0, + status: AuctionStatus::Settled { + base_fee, + penalty: None, + }, + info: None, + }; + + Ok(SettledNone { + order, + user_amount, + fill, + }) +} diff --git a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs index de48c38f..c094a40e 100644 --- a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -19,7 +19,7 @@ pub struct CompleteFastFill<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = custodian.bump, + bump = Custodian::BUMP, )] custodian: Account<'info, Custodian>, @@ -66,8 +66,7 @@ pub struct CompleteFastFill<'info> { /// Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = custodian.custody_token_bump, + address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, )] custody_token: Account<'info, token::TokenAccount>, @@ -119,7 +118,7 @@ pub fn complete_fast_fill(ctx: Context) -> Result<()> { to: ctx.accounts.token_router_custody_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[ctx.accounts.custodian.bump]]], + &[Custodian::SIGNER_SEEDS], ), fast_fill.amount(), ) diff --git a/solana/programs/matching-engine/src/state/auction.rs b/solana/programs/matching-engine/src/state/auction.rs new file mode 100644 index 00000000..6fbafd71 --- /dev/null +++ b/solana/programs/matching-engine/src/state/auction.rs @@ -0,0 +1,73 @@ +use anchor_lang::prelude::*; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace, PartialEq, Eq)] +pub enum AuctionStatus { + NotStarted, + Active, + Completed { slot: u64 }, + Settled { base_fee: u64, penalty: Option }, +} + +impl std::fmt::Display for AuctionStatus { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + match self { + AuctionStatus::NotStarted => write!(f, "NotStarted"), + AuctionStatus::Active => write!(f, "Active"), + AuctionStatus::Completed { slot } => write!(f, "Completed {{ slot: {} }}", slot), + AuctionStatus::Settled { base_fee, penalty } => { + write!( + f, + "Settled {{ base_fee: {}, penalty: {:?} }}", + base_fee, penalty + ) + } + } + } +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace)] +pub struct AuctionInfo { + pub config_id: u32, + + /// The highest bidder of the auction. + pub best_offer_token: Pubkey, + + /// The initial bidder of the auction. + pub initial_offer_token: Pubkey, + + /// The slot when the auction started. + pub start_slot: u64, + + // TODO: remove + pub end_slot: u64, + + pub amount_in: u64, + + /// The additional deposit made by the highest bidder. + pub security_deposit: u64, + + /// The offer price of the auction. + pub offer_price: u64, + + /// The amount of tokens to be sent to the user. + pub amount_out: u64, +} + +#[account] +#[derive(Debug, InitSpace)] +pub struct Auction { + pub bump: u8, + + /// VAA hash of the auction. + pub vaa_hash: [u8; 32], + + /// Auction status. + pub status: AuctionStatus, + + pub info: Option, +} + +impl Auction { + pub const SEED_PREFIX: &'static [u8] = b"auction"; + pub const INIT_SPACE_NO_AUCTION: usize = Self::INIT_SPACE - AuctionInfo::INIT_SPACE; +} diff --git a/solana/programs/matching-engine/src/state/auction_config.rs b/solana/programs/matching-engine/src/state/auction_config.rs new file mode 100644 index 00000000..6e5eb2aa --- /dev/null +++ b/solana/programs/matching-engine/src/state/auction_config.rs @@ -0,0 +1,43 @@ +use anchor_lang::prelude::*; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, InitSpace, Clone, Copy, PartialEq, Eq)] +pub struct AuctionParameters { + // The percentage of the penalty that is awarded to the user when the auction is completed. + pub user_penalty_reward_bps: u32, + + // The initial penalty percentage that is incurred once the grace period is over. + pub initial_penalty_bps: u32, + + // The duration of the auction in slots. About 500ms on Solana. + pub duration: u16, + + /** + * The grace period of the auction in slots. This is the number of slots the highest bidder + * has to execute the fast order before incurring a penalty. About 15 seconds on Avalanche. + * This value INCLUDES the `_auctionDuration`. + */ + pub grace_period: u16, + + // The `securityDeposit` decays over the `penaltyslots` slots period. + pub penalty_slots: u16, +} + +#[account] +#[derive(Debug, InitSpace, Copy)] +pub struct AuctionConfig { + pub id: u32, + + pub parameters: AuctionParameters, +} + +impl AuctionConfig { + pub const SEED_PREFIX: &'static [u8] = b"auction-config"; +} + +impl std::ops::Deref for AuctionConfig { + type Target = AuctionParameters; + + fn deref(&self) -> &Self::Target { + &self.parameters + } +} diff --git a/solana/programs/matching-engine/src/state/auction_data.rs b/solana/programs/matching-engine/src/state/auction_data.rs deleted file mode 100644 index e33f30b6..00000000 --- a/solana/programs/matching-engine/src/state/auction_data.rs +++ /dev/null @@ -1,44 +0,0 @@ -use anchor_lang::prelude::*; -use borsh::{BorshDeserialize, BorshSerialize}; - -#[derive(BorshSerialize, BorshDeserialize, Clone, Copy, Debug, InitSpace, PartialEq, Eq)] -pub enum AuctionStatus { - NotStarted, - Active, - Completed, - Settled { base_fee: u64, penalty: Option }, -} - -#[account] -#[derive(Debug, InitSpace)] -pub struct AuctionData { - pub bump: u8, - - /// VAA hash of the auction. - pub vaa_hash: [u8; 32], - - /// Auction status. - pub status: AuctionStatus, - - /// The highest bidder of the auction. - pub best_offer_token: Pubkey, - - /// The initial bidder of the auction. - pub initial_offer_token: Pubkey, - - /// The slot at which the auction started. - pub start_slot: u64, - - /// The amount of tokens to be sent to the user. - pub amount: u64, - - /// The additional deposit made by the highest bidder. - pub security_deposit: u64, - - /// The offer price of the auction. - pub offer_price: u64, -} - -impl AuctionData { - pub const SEED_PREFIX: &'static [u8] = b"auction"; -} diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index dc8fe941..fc0743e4 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -1,33 +1,8 @@ use anchor_lang::prelude::*; -#[derive(AnchorSerialize, AnchorDeserialize, Clone, Debug, InitSpace)] -pub struct AuctionConfig { - // The percentage of the penalty that is awarded to the user when the auction is completed. - pub user_penalty_reward_bps: u32, - - // The initial penalty percentage that is incurred once the grace period is over. - pub initial_penalty_bps: u32, - - // The duration of the auction in slots. About 500ms on Solana. - pub auction_duration: u16, - - /** - * The grace period of the auction in slots. This is the number of slots the highest bidder - * has to execute the fast order before incurring a penalty. About 15 seconds on Avalanche. - * This value INCLUDES the `_auctionDuration`. - */ - pub auction_grace_period: u16, - - // The `securityDeposit` decays over the `penaltyslots` slots period. - pub auction_penalty_slots: u16, -} - #[account] #[derive(Debug, InitSpace)] pub struct Custodian { - pub bump: u8, - pub custody_token_bump: u8, - /// Program's owner. pub owner: Pubkey, pub pending_owner: Option, @@ -36,14 +11,17 @@ pub struct Custodian { pub owner_assistant: Pubkey, // Recipient of `SlowOrderResponse` relay fees. - pub fee_recipient: Pubkey, + pub fee_recipient_token: Pubkey, + + pub auction_config_id: u32, - /// Auction config. - pub auction_config: AuctionConfig, + pub next_proposal_id: u64, } impl Custodian { - pub const SEED_PREFIX: &'static [u8] = b"custodian"; + pub const SEED_PREFIX: &'static [u8] = b"emitter"; + pub const BUMP: u8 = crate::CUSTODIAN_BUMP; + pub const SIGNER_SEEDS: &'static [&'static [u8]] = &[Self::SEED_PREFIX, &[Self::BUMP]]; } impl common::admin::Ownable for Custodian { @@ -75,3 +53,22 @@ impl common::admin::OwnerAssistant for Custodian { &mut self.owner_assistant } } + +#[cfg(test)] +mod test { + use solana_program::pubkey::Pubkey; + + use super::*; + + #[test] + fn test_bump() { + let (custodian, bump) = + Pubkey::find_program_address(&[Custodian::SEED_PREFIX], &crate::id()); + assert_eq!(Custodian::BUMP, bump, "bump mismatch"); + assert_eq!( + custodian, + Pubkey::create_program_address(Custodian::SIGNER_SEEDS, &crate::id()).unwrap(), + "custodian mismatch", + ); + } +} diff --git a/solana/programs/matching-engine/src/state/mod.rs b/solana/programs/matching-engine/src/state/mod.rs index 162364ed..f5bd65d8 100644 --- a/solana/programs/matching-engine/src/state/mod.rs +++ b/solana/programs/matching-engine/src/state/mod.rs @@ -1,5 +1,8 @@ -mod auction_data; -pub use auction_data::*; +mod auction_config; +pub use auction_config::*; + +mod auction; +pub use auction::*; mod custodian; pub use custodian::*; @@ -7,8 +10,11 @@ pub use custodian::*; mod payer_sequence; pub use payer_sequence::*; -mod prepared_auction_settlement; -pub use prepared_auction_settlement::*; +mod prepared_order_response; +pub use prepared_order_response::*; + +mod proposal; +pub use proposal::*; mod redeemed_fast_fill; pub use redeemed_fast_fill::*; diff --git a/solana/programs/matching-engine/src/state/prepared_auction_settlement.rs b/solana/programs/matching-engine/src/state/prepared_order_response.rs similarity index 59% rename from solana/programs/matching-engine/src/state/prepared_auction_settlement.rs rename to solana/programs/matching-engine/src/state/prepared_order_response.rs index ca8d12aa..37be8c37 100644 --- a/solana/programs/matching-engine/src/state/prepared_auction_settlement.rs +++ b/solana/programs/matching-engine/src/state/prepared_order_response.rs @@ -2,7 +2,7 @@ use anchor_lang::prelude::*; #[account] #[derive(Debug, InitSpace)] -pub struct PreparedAuctionSettlement { +pub struct PreparedOrderResponse { pub bump: u8, pub fast_vaa_hash: [u8; 32], @@ -12,6 +12,6 @@ pub struct PreparedAuctionSettlement { pub base_fee: u64, } -impl PreparedAuctionSettlement { - pub const SEED_PREFIX: &'static [u8] = b"auction-settlement"; +impl PreparedOrderResponse { + pub const SEED_PREFIX: &'static [u8] = b"order-response"; } diff --git a/solana/programs/matching-engine/src/state/proposal.rs b/solana/programs/matching-engine/src/state/proposal.rs new file mode 100644 index 00000000..da5759b3 --- /dev/null +++ b/solana/programs/matching-engine/src/state/proposal.rs @@ -0,0 +1,31 @@ +use anchor_lang::prelude::*; + +use crate::AuctionParameters; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace, PartialEq, Eq)] +pub enum ProposalAction { + None, + UpdateAuctionParameters { + id: u32, + parameters: AuctionParameters, + }, +} + +#[account] +#[derive(Debug, InitSpace)] +pub struct Proposal { + pub id: u64, + pub bump: u8, + + pub action: ProposalAction, + pub by: Pubkey, + pub owner: Pubkey, + + pub slot_proposed_at: u64, + pub slot_enact_by: u64, + pub slot_enacted_at: Option, +} + +impl Proposal { + pub const SEED_PREFIX: &'static [u8] = b"proposal"; +} diff --git a/solana/programs/matching-engine/src/utils/math.rs b/solana/programs/matching-engine/src/utils/math.rs new file mode 100644 index 00000000..59b5976b --- /dev/null +++ b/solana/programs/matching-engine/src/utils/math.rs @@ -0,0 +1,307 @@ +use crate::{ + error::MatchingEngineError, + state::{AuctionInfo, AuctionParameters}, +}; +use anchor_lang::prelude::*; +use common::constants::FEE_PRECISION_MAX; + +#[derive(Debug, Default)] +pub struct DepositPenalty { + pub penalty: u64, + pub user_reward: u64, +} + +pub fn compute_deposit_penalty( + auction_params: &AuctionParameters, + auction_info: &AuctionInfo, + current_slot: u64, +) -> DepositPenalty { + let slots_elapsed = + current_slot.saturating_sub(auction_info.start_slot + auction_params.duration as u64); + + if slots_elapsed <= auction_params.grace_period as u64 { + Default::default() + } else { + let deposit = auction_info.security_deposit; + let penalty_period = slots_elapsed - auction_params.grace_period as u64; + if penalty_period >= auction_params.penalty_slots as u64 + || auction_params.initial_penalty_bps == FEE_PRECISION_MAX + { + split_user_penalty_reward(auction_params, deposit) + } else { + let base_penalty = mul_bps_unsafe(deposit, auction_params.initial_penalty_bps); + + // Adjust the base amount to determine scaled penalty. + let scaled = (((deposit - base_penalty) as u128 * penalty_period as u128) + / auction_params.penalty_slots as u128) as u64; + + split_user_penalty_reward(auction_params, base_penalty + scaled) + } + } +} + +pub fn require_valid_auction_parameters(params: &AuctionParameters) -> Result<()> { + require!( + params.duration > 0, + MatchingEngineError::InvalidAuctionDuration + ); + require!( + params.grace_period > 0, + MatchingEngineError::InvalidAuctionGracePeriod + ); + require!( + params.user_penalty_reward_bps <= FEE_PRECISION_MAX, + MatchingEngineError::UserPenaltyTooLarge + ); + require!( + params.initial_penalty_bps <= FEE_PRECISION_MAX, + MatchingEngineError::InitialPenaltyTooLarge + ); + + Ok(()) +} + +#[inline] +fn split_user_penalty_reward(params: &AuctionParameters, amount: u64) -> DepositPenalty { + let user_reward = mul_bps_unsafe(amount, params.user_penalty_reward_bps); + + DepositPenalty { + penalty: amount - user_reward, + user_reward, + } +} + +#[inline] +fn mul_bps_unsafe(amount: u64, bps: u32) -> u64 { + const FEE_PRECISION_MAX: u128 = common::constants::FEE_PRECISION_MAX as u128; + ((amount as u128 * bps as u128) / FEE_PRECISION_MAX) as u64 +} + +#[cfg(test)] +mod test { + use crate::state::AuctionParameters; + + use super::*; + + #[test] + fn still_in_grace_period() { + let params = params_for_test(); + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period - 1; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 0); + assert_eq!(user_reward, 0); + } + + #[test] + fn penalty_period_is_over() { + let params = params_for_test(); + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + params.penalty_slots; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 7500000); + assert_eq!(user_reward, 2500000); + } + + #[test] + fn one_slot_into_penalty_period() { + let params = params_for_test(); + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + 1; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 1087500); + assert_eq!(user_reward, 362500); + } + + #[test] + fn half_way_through_penalty_period() { + let params = params_for_test(); + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 4125000); + assert_eq!(user_reward, 1375000); + } + + #[test] + fn mostly_through_penalty_period() { + let params = params_for_test(); + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + params.penalty_slots - 1; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 7162500); + assert_eq!(user_reward, 2387500); + } + + #[test] + fn initial_penalty_zero_halfway_through_penalty_period() { + let params = AuctionParameters { + initial_penalty_bps: 0, + ..params_for_test() + }; + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 3750000); + assert_eq!(user_reward, 1250000); + } + + #[test] + fn user_reward_zero_initial_penalty_zero() { + let params = AuctionParameters { + user_penalty_reward_bps: 0, + initial_penalty_bps: 0, + ..params_for_test() + }; + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 5000000); + assert_eq!(user_reward, 0); + } + + #[test] + fn initial_penalty_max_user_penalty_half() { + let params = AuctionParameters { + user_penalty_reward_bps: common::constants::FEE_PRECISION_MAX / 2, + initial_penalty_bps: common::constants::FEE_PRECISION_MAX, + ..params_for_test() + }; + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + 5; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 5000000); + assert_eq!(user_reward, 5000000); + } + + #[test] + fn user_penalty_max_initial_penalty_half() { + let params = AuctionParameters { + user_penalty_reward_bps: common::constants::FEE_PRECISION_MAX, + initial_penalty_bps: common::constants::FEE_PRECISION_MAX / 2, + ..params_for_test() + }; + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 0); + assert_eq!(user_reward, 7500000); + } + + #[test] + fn penalty_slots_zero() { + let params = AuctionParameters { + user_penalty_reward_bps: common::constants::FEE_PRECISION_MAX / 2, + initial_penalty_bps: common::constants::FEE_PRECISION_MAX / 2, + penalty_slots: 0, + ..params_for_test() + }; + + let amount = 10000000; + let slots_elapsed = params.duration + params.grace_period + 10; + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + + let DepositPenalty { + penalty, + user_reward, + } = compute_deposit_penalty(¶ms, &info, current_slot); + + assert_eq!(penalty, 5000000); + assert_eq!(user_reward, 5000000); + } + + fn set_up(security_deposit: u64, slots_elapsed: Option) -> (AuctionInfo, u64) { + const START: u64 = 69; + ( + AuctionInfo { + security_deposit, + start_slot: START, + end_slot: 420, + config_id: Default::default(), + best_offer_token: Default::default(), + initial_offer_token: Default::default(), + amount_in: Default::default(), + offer_price: Default::default(), + amount_out: Default::default(), + }, + START + slots_elapsed.unwrap_or_default(), + ) + } + + fn params_for_test() -> AuctionParameters { + let params = AuctionParameters { + user_penalty_reward_bps: 250000, // 25% + initial_penalty_bps: 100000, // 10% + duration: 2, + grace_period: 4, + penalty_slots: 20, + }; + + require_valid_auction_parameters(¶ms).unwrap(); + + params + } +} diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 84617595..72f662c5 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -1,9 +1,10 @@ +pub mod math; + use crate::{ error::MatchingEngineError, - state::{AuctionConfig, RouterEndpoint}, + state::{Auction, AuctionConfig, AuctionStatus, RouterEndpoint}, }; use anchor_lang::prelude::*; -use common::constants::FEE_PRECISION_MAX; use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; pub fn verify_router_path( @@ -31,184 +32,38 @@ pub fn verify_router_path( Ok(()) } -pub fn calculate_dynamic_penalty( +pub fn is_valid_active_auction( config: &AuctionConfig, - amount: u64, - slots_elapsed: u64, -) -> Option<(u64, u64)> { - let grace_period = config.auction_grace_period.into(); - let auction_penalty_slots = config.auction_penalty_slots.into(); - let user_penalty_reward_bps = config.user_penalty_reward_bps.into(); - let fee_precision = FEE_PRECISION_MAX.into(); - - if slots_elapsed <= grace_period { - return Some((0, 0)); - } - - let penalty_period = slots_elapsed - grace_period; - if penalty_period >= auction_penalty_slots || config.initial_penalty_bps == FEE_PRECISION_MAX { - let reward = amount - .checked_mul(user_penalty_reward_bps)? - .checked_div(fee_precision)?; - - Some((amount.checked_sub(reward)?, reward)) - } else { - let base_penalty = amount - .checked_mul(config.initial_penalty_bps.into())? - .checked_div(fee_precision)?; - let penalty = base_penalty.checked_add( - (amount.checked_sub(base_penalty)?) - .checked_mul(penalty_period)? - .checked_div(auction_penalty_slots)?, - )?; - let reward = penalty - .checked_mul(user_penalty_reward_bps)? - .checked_div(fee_precision)?; - - Some((penalty.checked_sub(reward).unwrap(), reward)) - } -} - -#[cfg(test)] -mod test { - use super::*; - use anchor_lang::prelude::Result; - - #[test] - fn test_calculate_dynamic_penalty() -> Result<()> { - // Create test AuctionConfig struct. - let mut config = AuctionConfig { - user_penalty_reward_bps: 250000, - initial_penalty_bps: 100000, - auction_duration: 2, - auction_grace_period: 6, - auction_penalty_slots: 20, - }; - - // Still in grace period. - { - let amount = 10000000; - let slots_elapsed = config.auction_grace_period - 1; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 0); - assert_eq!(reward, 0); + auction: &Auction, + best_offer_token: Option, + initial_offer_token: Option, +) -> Result { + match (&auction.status, &auction.info) { + (AuctionStatus::Active, Some(info)) => { + require_eq!( + info.config_id, + config.id, + MatchingEngineError::AuctionConfigMismatch + ); + + if let Some(best_offer_token) = best_offer_token { + require_keys_eq!( + best_offer_token, + info.best_offer_token, + MatchingEngineError::BestOfferTokenMismatch, + ); + } + + if let Some(initial_offer_token) = initial_offer_token { + require_keys_eq!( + initial_offer_token, + info.initial_offer_token, + MatchingEngineError::InitialOfferTokenMismatch, + ); + } + + Ok(true) } - - // Penalty period is over. - { - let amount = 10000000; - let slots_elapsed = config.auction_penalty_slots + config.auction_grace_period; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 7500000); - assert_eq!(reward, 2500000); - } - - // One slot into the penalty period. - { - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 1; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 1087500); - assert_eq!(reward, 362500); - } - - // 50% of the way through the penalty period. - { - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 10; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 4125000); - assert_eq!(reward, 1375000); - } - - // Penalty period (19/20 slots). - { - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 19; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 7162500); - assert_eq!(reward, 2387500); - } - - // Update the initial penalty to 0%. 50% of the way through the penalty period. - { - config.initial_penalty_bps = 0; - - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 10; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 3750000); - assert_eq!(reward, 1250000); - } - - // Set the user reward to 0%. - { - config.user_penalty_reward_bps = 0; - - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 10; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 5000000); - assert_eq!(reward, 0); - } - - // Set the initial penalty to 100% and user penalty to 50%. - { - config.initial_penalty_bps = FEE_PRECISION_MAX; - config.user_penalty_reward_bps = 500000; - - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 5; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 5000000); - assert_eq!(reward, 5000000); - } - - // Set the user penalty to 100% and initial penalty to 50%. - { - config.initial_penalty_bps = 500000; - config.user_penalty_reward_bps = FEE_PRECISION_MAX; - - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 10; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 0); - assert_eq!(reward, 7500000); - } - - // Set the penalty blocks to zero. - { - config.initial_penalty_bps = 500000; - config.user_penalty_reward_bps = 500000; - config.auction_penalty_slots = 0; - - let amount = 10000000; - let slots_elapsed = config.auction_grace_period + 10; - let (penalty, reward) = - calculate_dynamic_penalty(&config, amount, slots_elapsed.into()).unwrap(); - - assert_eq!(penalty, 5000000); - assert_eq!(reward, 5000000); - } - - Ok(()) + _ => err!(MatchingEngineError::AuctionNotActive), } } diff --git a/solana/programs/token-router/src/custody_token.rs b/solana/programs/token-router/src/custody_token.rs new file mode 100644 index 00000000..23022a54 --- /dev/null +++ b/solana/programs/token-router/src/custody_token.rs @@ -0,0 +1,27 @@ +use anchor_lang::prelude::declare_id; + +cfg_if::cfg_if! { + if #[cfg(feature = "testnet")] { + declare_id!("EkC51gZDovMhsZCN8KYYY7GoVs3Pi5WQ1hfUw1kR7462"); + } +} + +#[cfg(test)] +mod test { + use solana_program::pubkey::Pubkey; + + #[test] + fn test_ata_address() { + let custodian = + Pubkey::create_program_address(crate::state::Custodian::SIGNER_SEEDS, &crate::id()) + .unwrap(); + assert_eq!( + super::id(), + anchor_spl::associated_token::get_associated_token_address( + &custodian, + &common::constants::usdc::id() + ), + "custody ata mismatch" + ); + } +} diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 643a0c6a..a7ce9327 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -8,6 +8,9 @@ pub enum TokenRouterError { #[msg("OwnerOrAssistantOnly")] OwnerOrAssistantOnly = 0x4, + #[msg("InvalidCustodyToken")] + InvalidCustodyToken = 0x6, + #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x20, @@ -41,6 +44,9 @@ pub enum TokenRouterError { #[msg("InvalidEndpoint")] InvalidEndpoint = 0x42, + #[msg("InvalidMintRecipient")] + InvalidMintRecipient = 0x43, + #[msg("CctpRemoteTokenMessengerRequired")] CctpRemoteTokenMessengerRequired = 0x44, diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index fc1e426a..4bfd722d 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -1,6 +1,8 @@ #![doc = include_str!("../README.md")] #![allow(clippy::result_large_err)] +pub mod custody_token; + pub mod error; mod processor; @@ -15,7 +17,6 @@ cfg_if::cfg_if! { // Placeholder. declare_id!("TokenRouter11111111111111111111111111111111"); const CUSTODIAN_BUMP: u8 = 253; - const CUSTODY_TOKEN_BUMP: u8 = 254; } } diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index cf367ea6..f5166392 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -34,10 +34,9 @@ pub struct Initialize<'info> { #[account( init, payer = owner, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump, - token::mint = mint, - token::authority = custodian + associated_token::mint = mint, + associated_token::authority = custodian, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, )] custody_token: Account<'info, token::TokenAccount>, @@ -59,6 +58,7 @@ pub struct Initialize<'info> { system_program: Program<'info, System>, token_program: Program<'info, token::Token>, + associated_token_program: Program<'info, anchor_spl::associated_token::AssociatedToken>, } pub fn initialize(ctx: Context) -> Result<()> { diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs index a854ae63..f2811372 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; +use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use solana_program::bpf_loader_upgradeable; @@ -10,7 +10,7 @@ pub struct CancelOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, has_one = owner @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -49,7 +49,7 @@ pub fn cancel_ownership_transfer_request( current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.owner.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], + &[Custodian::SIGNER_SEEDS], ), crate::ID, )?; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs index 50527ede..580c19f8 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; +use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use common::admin::utils::pending_owner; use solana_program::bpf_loader_upgradeable; @@ -12,7 +12,7 @@ pub struct ConfirmOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, constraint = { custodian.pending_owner.is_some() } @ TokenRouterError::NoTransferOwnershipRequest, @@ -56,7 +56,7 @@ pub fn confirm_ownership_transfer_request( current_authority: ctx.accounts.custodian.to_account_info(), new_authority: ctx.accounts.pending_owner.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], + &[Custodian::SIGNER_SEEDS], ), crate::ID, )?; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs index a321dce1..65eeca0c 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; +use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use solana_program::bpf_loader_upgradeable; @@ -10,7 +10,7 @@ pub struct SubmitOwnershipTransferRequest<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, has_one = owner @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, @@ -62,7 +62,7 @@ pub fn submit_ownership_transfer_request( current_authority: ctx.accounts.owner.to_account_info(), new_authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], + &[Custodian::SIGNER_SEEDS], ), crate::ID, )?; diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs index d3dddb6c..993bff08 100644 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs @@ -1,7 +1,6 @@ use crate::{ error::TokenRouterError, state::{Custodian, MessageProtocol, RouterEndpoint}, - CUSTODIAN_BUMP, }; use anchor_lang::prelude::*; use common::admin::utils::assistant::only_authorized; @@ -18,7 +17,7 @@ pub struct AddCctpRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, constraint = { only_authorized(&custodian, &owner_or_assistant.key()) } @ TokenRouterError::OwnerOrAssistantOnly, @@ -78,11 +77,22 @@ pub fn add_cctp_router_endpoint( require!(address != [0; 32], TokenRouterError::InvalidEndpoint); + let mint_recipient = match mint_recipient { + Some(mint_recipient) => { + require!( + mint_recipient != [0; 32], + TokenRouterError::InvalidMintRecipient + ); + mint_recipient + } + None => address, + }; + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { bump: ctx.bumps["router_endpoint"], chain, address, - mint_recipient: mint_recipient.unwrap_or(address), + mint_recipient, protocol: MessageProtocol::Cctp { domain }, }); diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs index 71cf36f3..37cb7b9d 100644 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs @@ -1,7 +1,6 @@ use crate::{ error::TokenRouterError, state::{Custodian, RouterEndpoint}, - CUSTODIAN_BUMP, }; use anchor_lang::prelude::*; use common::admin::utils::assistant::only_authorized; @@ -18,7 +17,7 @@ pub struct RemoveRouterEndpoint<'info> { #[account( seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/token-router/src/processor/admin/set_pause.rs b/solana/programs/token-router/src/processor/admin/set_pause.rs index 42f3008e..9ea27597 100644 --- a/solana/programs/token-router/src/processor/admin/set_pause.rs +++ b/solana/programs/token-router/src/processor/admin/set_pause.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; +use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use common::admin::utils::assistant::only_authorized; @@ -9,7 +9,7 @@ pub struct SetPause<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, constraint = { only_authorized(&custodian, &owner_or_assistant.key()) } @ TokenRouterError::OwnerOrAssistantOnly, diff --git a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs index e6957c4f..d099b365 100644 --- a/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs +++ b/solana/programs/token-router/src/processor/admin/update/owner_assistant.rs @@ -1,4 +1,4 @@ -use crate::{error::TokenRouterError, state::Custodian, CUSTODIAN_BUMP}; +use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; #[derive(Accounts)] @@ -9,7 +9,7 @@ pub struct UpdateOwnerAssistant<'info> { #[account( mut, seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, has_one = owner @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, diff --git a/solana/programs/token-router/src/processor/close_prepared_order.rs b/solana/programs/token-router/src/processor/close_prepared_order.rs index 3c4a69c1..eed44c6d 100644 --- a/solana/programs/token-router/src/processor/close_prepared_order.rs +++ b/solana/programs/token-router/src/processor/close_prepared_order.rs @@ -1,7 +1,6 @@ use crate::{ error::TokenRouterError, state::{Custodian, PreparedOrder}, - CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -14,7 +13,7 @@ pub struct ClosePreparedOrder<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, )] custodian: AccountInfo<'info>, @@ -44,8 +43,7 @@ pub struct ClosePreparedOrder<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = CUSTODY_TOKEN_BUMP, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -62,7 +60,7 @@ pub fn close_prepared_order(ctx: Context) -> Result<()> { to: ctx.accounts.refund_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], + &[Custodian::SIGNER_SEEDS], ), ctx.accounts.prepared_order.amount_in, ) diff --git a/solana/programs/token-router/src/processor/consume_prepared_fill.rs b/solana/programs/token-router/src/processor/consume_prepared_fill.rs index b4105d06..254dfca0 100644 --- a/solana/programs/token-router/src/processor/consume_prepared_fill.rs +++ b/solana/programs/token-router/src/processor/consume_prepared_fill.rs @@ -1,7 +1,6 @@ use crate::{ error::TokenRouterError, state::{Custodian, PreparedFill}, - CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -14,7 +13,7 @@ pub struct ConsumePreparedFill<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, )] custodian: AccountInfo<'info>, @@ -49,8 +48,7 @@ pub struct ConsumePreparedFill<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = CUSTODY_TOKEN_BUMP, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -67,7 +65,7 @@ pub fn consume_prepared_fill(ctx: Context) -> Result<()> { to: ctx.accounts.dst_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, - &[&[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]], + &[Custodian::SIGNER_SEEDS], ), ctx.accounts.prepared_fill.amount, ) diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index 0427ce62..f1ba614b 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -1,7 +1,6 @@ use crate::{ error::TokenRouterError, state::{Custodian, MessageProtocol, PayerSequence, PreparedOrder, RouterEndpoint}, - CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -15,7 +14,10 @@ use wormhole_cctp_solana::{ #[derive(Accounts)] pub struct PlaceMarketOrderCctp<'info> { /// This account must be the same pubkey as the one who prepared the order. - #[account(mut)] + #[account( + mut, + address = prepared_order.prepared_by @ TokenRouterError::PayerNotPreparer, + )] payer: Signer<'info>, #[account( @@ -35,7 +37,7 @@ pub struct PlaceMarketOrderCctp<'info> { /// Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, constraint = !custodian.paused @ TokenRouterError::Paused, )] custodian: Account<'info, Custodian>, @@ -44,20 +46,10 @@ pub struct PlaceMarketOrderCctp<'info> { mut, close = payer, has_one = order_sender @ TokenRouterError::OrderSenderMismatch, - constraint = { - // We use require here so the revert shows left vs right. - require_keys_eq!( - payer.key(), - prepared_order.prepared_by, - TokenRouterError::PayerNotPreparer - ); - true - }, )] prepared_order: Account<'info, PreparedOrder>, - /// Signer who must have the authority (either as the owner or has been delegated authority) - /// over the `burn_source` token account. + /// Signer who must be the same one encoded in the prepared order. order_sender: Signer<'info>, /// Circle-supported mint. @@ -74,8 +66,7 @@ pub struct PlaceMarketOrderCctp<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = CUSTODY_TOKEN_BUMP, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -174,8 +165,6 @@ fn handle_place_market_order_cctp( ctx: Context, destination_cctp_domain: u32, ) -> Result<()> { - let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; - let redeemer_message = std::mem::take(&mut ctx.accounts.prepared_order.redeemer_message); // This returns the CCTP nonce, but we do not need it. @@ -210,7 +199,7 @@ fn handle_place_market_order_cctp( .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), }, - &[custodian_seeds], + &[Custodian::SIGNER_SEEDS], ), CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), @@ -226,7 +215,7 @@ fn handle_place_market_order_cctp( rent: ctx.accounts.rent.to_account_info(), }, &[ - custodian_seeds, + Custodian::SIGNER_SEEDS, &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), diff --git a/solana/programs/token-router/src/processor/market_order/prepare.rs b/solana/programs/token-router/src/processor/market_order/prepare.rs index 62e62a2a..3c551b86 100644 --- a/solana/programs/token-router/src/processor/market_order/prepare.rs +++ b/solana/programs/token-router/src/processor/market_order/prepare.rs @@ -3,8 +3,7 @@ use anchor_spl::token; use crate::{ error::TokenRouterError, - state::{OrderType, PreparedOrder, PreparedOrderInfo}, - CUSTODY_TOKEN_BUMP, + state::{Custodian, OrderType, PreparedOrder, PreparedOrderInfo}, }; /// Accounts required for [prepare_market_order]. @@ -14,6 +13,17 @@ pub struct PrepareMarketOrder<'info> { #[account(mut)] payer: Signer<'info>, + /// Custodian, but does not need to be deserialized. + /// + /// CHECK: Seeds must be \["emitter"\]. + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + )] + custodian: AccountInfo<'info>, + + /// This signer will be encoded in the prepared order. He will also need to be present when + /// invoking any of the place market order instructions. order_sender: Signer<'info>, #[account( @@ -28,6 +38,9 @@ pub struct PrepareMarketOrder<'info> { /// /// CHECK: This account must have delegated authority or be owned by the /// [burn_source_authority](Self::burn_source_authority). Its mint must be USDC. + /// + /// NOTE: This token account must have delegated transfer authority to the custodian prior to + /// invoking this instruction. #[account(mut)] order_token: AccountInfo<'info>, @@ -40,8 +53,7 @@ pub struct PrepareMarketOrder<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = CUSTODY_TOKEN_BUMP, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -113,13 +125,14 @@ pub fn prepare_market_order( // Finally transfer amount to custody token account. token::transfer( - CpiContext::new( + CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), token::Transfer { from: ctx.accounts.order_token.to_account_info(), to: ctx.accounts.custody_token.to_account_info(), - authority: ctx.accounts.order_sender.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), }, + &[Custodian::SIGNER_SEEDS], ), amount_in, ) diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 51f7f10f..7846e077 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -1,7 +1,6 @@ use crate::{ error::TokenRouterError, state::{Custodian, FillType, PreparedFill, RouterEndpoint}, - CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -24,7 +23,7 @@ pub struct RedeemCctpFill<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, )] custodian: AccountInfo<'info>, @@ -53,8 +52,7 @@ pub struct RedeemCctpFill<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = CUSTODY_TOKEN_BUMP, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -135,8 +133,6 @@ pub fn redeem_cctp_fill(ctx: Context, args: CctpMessageArgs) -> } fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) -> Result<()> { - let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; - let vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( &ctx.accounts.vaa, CpiContext::new_with_signer( @@ -170,7 +166,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), }, - &[custodian_seeds], + &[Custodian::SIGNER_SEEDS], ), ReceiveMessageArgs { encoded_message: args.encoded_cctp_message, diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 5d1e564f..590f69cb 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -1,6 +1,6 @@ use crate::{ + error::TokenRouterError, state::{Custodian, FillType, PreparedFill}, - CUSTODIAN_BUMP, CUSTODY_TOKEN_BUMP, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -18,7 +18,7 @@ pub struct RedeemFastFill<'info> { /// CHECK: Seeds must be \["emitter"\]. #[account( seeds = [Custodian::SEED_PREFIX], - bump = CUSTODIAN_BUMP, + bump = Custodian::BUMP, )] custodian: AccountInfo<'info>, @@ -46,8 +46,7 @@ pub struct RedeemFastFill<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - seeds = [common::constants::CUSTODY_TOKEN_SEED_PREFIX], - bump = CUSTODY_TOKEN_BUMP, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, )] custody_token: AccountInfo<'info>, @@ -83,8 +82,6 @@ pub fn redeem_fast_fill(ctx: Context) -> Result<()> { } fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { - let custodian_seeds = &[Custodian::SEED_PREFIX, &[CUSTODIAN_BUMP]]; - matching_engine::cpi::complete_fast_fill(CpiContext::new_with_signer( ctx.accounts.matching_engine_program.to_account_info(), matching_engine::cpi::accounts::CompleteFastFill { @@ -105,7 +102,7 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { token_program: ctx.accounts.token_program.to_account_info(), system_program: ctx.accounts.system_program.to_account_info(), }, - &[custodian_seeds], + &[Custodian::SIGNER_SEEDS], ))?; let vaa = diff --git a/solana/programs/token-router/src/state/custodian.rs b/solana/programs/token-router/src/state/custodian.rs index 579939d4..8611c6c4 100644 --- a/solana/programs/token-router/src/state/custodian.rs +++ b/solana/programs/token-router/src/state/custodian.rs @@ -20,6 +20,8 @@ pub struct Custodian { impl Custodian { pub const SEED_PREFIX: &'static [u8] = b"emitter"; + pub const BUMP: u8 = crate::CUSTODIAN_BUMP; + pub const SIGNER_SEEDS: &'static [&'static [u8]] = &[Self::SEED_PREFIX, &[Self::BUMP]]; } impl common::admin::Ownable for Custodian { @@ -51,3 +53,22 @@ impl common::admin::OwnerAssistant for Custodian { &mut self.owner_assistant } } + +#[cfg(test)] +mod test { + use solana_program::pubkey::Pubkey; + + use super::*; + + #[test] + fn test_bump() { + let (custodian, bump) = + Pubkey::find_program_address(&[Custodian::SEED_PREFIX], &crate::id()); + assert_eq!(Custodian::BUMP, bump, "bump mismatch"); + assert_eq!( + custodian, + Pubkey::create_program_address(Custodian::SIGNER_SEEDS, &crate::id()).unwrap(), + "custodian mismatch", + ); + } +} diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 07ef8ee2..7ab5d2b7 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -11,20 +11,25 @@ import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; import { AuctionConfig, - AuctionData, + Auction, Custodian, PayerSequence, - PreparedAuctionSettlement, + PreparedOrderResponse, RedeemedFastFill, RouterEndpoint, + AuctionParameters, + AuctionInfo, } from "./state"; -import { DepositForBurnWithCallerAccounts } from "../cctp/tokenMessengerMinter"; import { LiquidityLayerMessage } from "../messages"; export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; +export const FEE_PRECISION_MAX = 1_000_000n; + export type ProgramId = (typeof PROGRAM_IDS)[number]; +export type VaaHash = Array | Buffer | Uint8Array; + export type AddRouterEndpointArgs = { chain: wormholeSdk.ChainId; address: Array; @@ -58,7 +63,6 @@ export type BurnAndPublishAccounts = { localToken: PublicKey; messageTransmitterProgram: PublicKey; tokenMessengerMinterProgram: PublicKey; - tokenProgram: PublicKey; }; export type RedeemFastFillAccounts = { @@ -67,7 +71,6 @@ export type RedeemFastFillAccounts = { routerEndpoint: PublicKey; custodyToken: PublicKey; matchingEngineProgram: PublicKey; - tokenProgram: PublicKey; }; export type CctpMessageArgs = { @@ -77,11 +80,13 @@ export type CctpMessageArgs = { export class MatchingEngineProgram { private _programId: ProgramId; + private _mint: PublicKey; program: Program; - constructor(connection: Connection, programId?: ProgramId) { - this._programId = programId ?? testnet(); + constructor(connection: Connection, programId: ProgramId, mint: PublicKey) { + this._programId = programId; + this._mint = mint; this.program = new Program(IDL as any, new PublicKey(this._programId), { connection, }); @@ -91,102 +96,125 @@ export class MatchingEngineProgram { return this.program.programId; } + get mint(): PublicKey { + return this._mint; + } + custodianAddress(): PublicKey { return Custodian.address(this.ID); } - async fetchCustodian(addr: PublicKey): Promise { + async fetchCustodian(input?: { address: PublicKey }): Promise { + const addr = input === undefined ? this.custodianAddress() : input.address; return this.program.account.custodian.fetch(addr); } - custodyTokenAccountAddress(): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; + auctionConfigAddress(id: number): PublicKey { + return AuctionConfig.address(this.ID, id); } - async fetchPayerSequence(addr: PublicKey): Promise { - return this.program.account.payerSequence.fetch(addr); + async fetchAuctionConfig(input: number | { address: PublicKey }): Promise { + const addr = typeof input === "number" ? this.auctionConfigAddress(input) : input.address; + return this.program.account.auctionConfig.fetch(addr); + } + + async fetchAuctionParameters(id?: number): Promise { + if (id === undefined) { + const { auctionConfigId } = await this.fetchCustodian(); + id = auctionConfigId; + } + return this.fetchAuctionConfig(id).then((config) => config.parameters); + } + + custodyTokenAccountAddress(): PublicKey { + return splToken.getAssociatedTokenAddressSync(this.mint, this.custodianAddress(), true); } - routerEndpointAddress(chain: wormholeSdk.ChainId): PublicKey { + routerEndpointAddress(chain: number): PublicKey { return RouterEndpoint.address(this.ID, chain); } - async fetchRouterEndpoint(addr: PublicKey): Promise { + async fetchRouterEndpoint(input: number | { address: PublicKey }): Promise { + const addr = typeof input === "number" ? this.routerEndpointAddress(input) : input.address; return this.program.account.routerEndpoint.fetch(addr); } - auctionDataAddress(vaaHash: Array | Buffer | Uint8Array): PublicKey { - return AuctionData.address(this.ID, vaaHash); + auctionAddress(vaaHash: VaaHash): PublicKey { + return Auction.address(this.ID, vaaHash); } - async fetchAuctionData(vaaHash: Array | Buffer | Uint8Array): Promise { - return this.program.account.auctionData.fetch(this.auctionDataAddress(vaaHash)); + async fetchAuction(input: VaaHash | { address: PublicKey }): Promise { + const addr = "address" in input ? input.address : this.auctionAddress(input); + return this.program.account.auction.fetch(addr); } payerSequenceAddress(payer: PublicKey): PublicKey { return PayerSequence.address(this.ID, payer); } - async fetchPayerSequenceValue(addr: PublicKey): Promise { - return this.fetchPayerSequence(addr) - .then((acct) => acct.value) - .catch((_) => new BN(0)); + async fetchPayerSequence(input: PublicKey | { address: PublicKey }): Promise { + const addr = "address" in input ? input.address : this.payerSequenceAddress(input); + return this.program.account.payerSequence.fetch(addr); + } + + async fetchPayerSequenceValue(input: PublicKey | { address: PublicKey }): Promise { + return this.fetchPayerSequence(input) + .then((acct) => BigInt(acct.value.toString())) + .catch((_) => 0n); } - coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { + coreMessageAddress(payer: PublicKey, payerSequenceValue: bigint): PublicKey { + const encodedPayerSequenceValue = Buffer.alloc(8); + encodedPayerSequenceValue.writeBigUInt64BE(payerSequenceValue); return PublicKey.findProgramAddressSync( - [Buffer.from("msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], + [Buffer.from("msg"), payer.toBuffer(), encodedPayerSequenceValue], this.ID )[0]; } - redeemedFastFillAddress(vaaHash: Array | Buffer | Uint8Array): PublicKey { + redeemedFastFillAddress(vaaHash: VaaHash): PublicKey { return RedeemedFastFill.address(this.ID, vaaHash); } - fetchRedeemedFastFill(addr: PublicKey): Promise { + fetchRedeemedFastFill(input: VaaHash | { address: PublicKey }): Promise { + const addr = "address" in input ? input.address : this.redeemedFastFillAddress(input); return this.program.account.redeemedFastFill.fetch(addr); } - preparedAuctionSettlementAddress( - payer: PublicKey, - fastVaaHash: Array | Buffer | Uint8Array - ): PublicKey { - return PreparedAuctionSettlement.address(this.ID, payer, fastVaaHash); - } - - fetchPreparedAuctionSettlement(addr: PublicKey): Promise { - return this.program.account.preparedAuctionSettlement.fetch(addr); - } - - async getBestOfferTokenAccount(vaaHash: Buffer | Uint8Array): Promise { - return (await this.fetchAuctionData(vaaHash)).bestOfferToken; + preparedOrderResponseAddress(preparedBy: PublicKey, fastVaaHash: VaaHash): PublicKey { + return PreparedOrderResponse.address(this.ID, preparedBy, fastVaaHash); } - async getInitialOfferTokenAccount(vaaHash: Buffer): Promise { - return (await this.fetchAuctionData(vaaHash)).bestOfferToken; + fetchPreparedOrderResponse( + input: [PublicKey, VaaHash] | { address: PublicKey } + ): Promise { + const addr = + "address" in input ? input.address : this.preparedOrderResponseAddress(...input); + return this.program.account.preparedOrderResponse.fetch(addr); } async initializeIx( - auctionConfig: AuctionConfig, + auctionParams: AuctionParameters, accounts: { owner: PublicKey; ownerAssistant: PublicKey; feeRecipient: PublicKey; - mint: PublicKey; + mint?: PublicKey; } ): Promise { - const { owner, ownerAssistant, feeRecipient, mint } = accounts; + const { owner, ownerAssistant, feeRecipient, mint: inputMint } = accounts; return this.program.methods - .initialize(auctionConfig) + .initialize(auctionParams) .accounts({ owner, custodian: this.custodianAddress(), + auctionConfig: this.auctionConfigAddress(0), ownerAssistant, feeRecipient, + feeRecipientToken: splToken.getAssociatedTokenAddressSync(this.mint, feeRecipient), custodyToken: this.custodyTokenAccountAddress(), - mint, + mint: inputMint ?? this.mint, programData: getProgramData(this.ID), }) .instruction(); @@ -294,6 +322,10 @@ export class MatchingEngineProgram { custodian: inputCustodian, routerEndpoint: inputRouterEndpoint, } = accounts; + const [tokenRouterEmitter] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + tokenRouterProgram + ); return this.program.methods .addLocalRouterEndpoint() .accounts({ @@ -302,6 +334,12 @@ export class MatchingEngineProgram { routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), tokenRouterProgram, + tokenRouterEmitter, + tokenRouterCustodyToken: splToken.getAssociatedTokenAddressSync( + this.mint, + tokenRouterEmitter, + true + ), }) .instruction(); } @@ -331,47 +369,123 @@ export class MatchingEngineProgram { async updateFeeRecipientIx(accounts: { ownerOrAssistant: PublicKey; - custodian?: PublicKey; newFeeRecipient: PublicKey; + custodian?: PublicKey; }): Promise { - const { ownerOrAssistant, custodian: inputCustodian, newFeeRecipient } = accounts; + const { ownerOrAssistant, newFeeRecipient, custodian: inputCustodian } = accounts; + return this.program.methods .updateFeeRecipient() .accounts({ ownerOrAssistant, custodian: inputCustodian ?? this.custodianAddress(), newFeeRecipient, + newFeeRecipientToken: splToken.getAssociatedTokenAddressSync( + this.mint, + newFeeRecipient + ), }) .instruction(); } - async getCoreMessage(payer: PublicKey): Promise { - const payerSequence = this.payerSequenceAddress(payer); - const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => - this.coreMessageAddress(payer, value) + async getCoreMessage(payer: PublicKey, payerSequenceValue?: bigint): Promise { + const value = payerSequenceValue ?? (await this.fetchPayerSequenceValue(payer)); + return this.coreMessageAddress(payer, value); + } + + async fetchCustodyTokenAccount(): Promise { + return splToken.getAccount( + this.program.provider.connection, + this.custodyTokenAccountAddress() ); - return coreMessage; } async placeInitialOfferIx( - feeOffer: bigint, - fromChain: wormholeSdk.ChainId, - toChain: wormholeSdk.ChainId, - vaaHash: Buffer, - accounts: { payer: PublicKey; vaa: PublicKey; mint: PublicKey } + accounts: { + payer: PublicKey; + fastVaa: PublicKey; + offerToken?: PublicKey; + auction?: PublicKey; + auctionConfig?: PublicKey; + fromRouterEndpoint?: PublicKey; + toRouterEndpoint?: PublicKey; + }, + feeOffer: bigint ): Promise { - const { payer, vaa, mint } = accounts; + const { + payer, + fastVaa, + offerToken: inputOfferToken, + auction: inputAuction, + auctionConfig: inputAuctionConfig, + fromRouterEndpoint: inputFromRouterEndpoint, + toRouterEndpoint: inputToRouterEndpoint, + } = accounts; + + const custodyToken = this.custodyTokenAccountAddress(); + + const offerToken = await (async () => { + if (inputOfferToken !== undefined) { + return inputOfferToken; + } else { + return splToken.getAssociatedTokenAddressSync(this.mint, payer); + } + })(); + + const { auction, fromRouterEndpoint, toRouterEndpoint } = await (async () => { + if ( + inputAuction === undefined || + inputFromRouterEndpoint === undefined || + inputToRouterEndpoint === undefined + ) { + const vaaAccount = await VaaAccount.fetch( + this.program.provider.connection, + fastVaa + ); + const { fastMarketOrder } = LiquidityLayerMessage.decode(vaaAccount.payload()); + if (fastMarketOrder === undefined) { + throw new Error("Message not FastMarketOrder"); + } + + return { + auction: inputAuction ?? this.auctionAddress(vaaAccount.digest()), + fromRouterEndpoint: + inputFromRouterEndpoint ?? + this.routerEndpointAddress(vaaAccount.emitterInfo().chain), + toRouterEndpoint: + inputToRouterEndpoint ?? + this.routerEndpointAddress(fastMarketOrder.targetChain), + }; + } else { + return { + auction: inputAuction, + fromRouterEndpoint: inputFromRouterEndpoint, + toRouterEndpoint: inputToRouterEndpoint, + }; + } + })(); + + const auctionConfig = await (async () => { + if (inputAuctionConfig === undefined) { + const { auctionConfigId } = await this.fetchCustodian(); + return this.auctionConfigAddress(auctionConfigId); + } else { + return inputAuctionConfig; + } + })(); + return this.program.methods .placeInitialOffer(new BN(feeOffer.toString())) .accounts({ payer, custodian: this.custodianAddress(), - auctionData: this.auctionDataAddress(vaaHash), - fromRouterEndpoint: this.routerEndpointAddress(fromChain), - toRouterEndpoint: this.routerEndpointAddress(toChain), - offerToken: splToken.getAssociatedTokenAddressSync(mint, payer), - custodyToken: this.custodyTokenAccountAddress(), - vaa, + auctionConfig, + auction, + fromRouterEndpoint, + toRouterEndpoint, + offerToken, + custodyToken, + fastVaa, }) .instruction(); } @@ -379,41 +493,62 @@ export class MatchingEngineProgram { async improveOfferIx( feeOffer: bigint, vaaHash: Buffer | Uint8Array, - accounts: { offerAuthority: PublicKey; bestOfferToken?: PublicKey } + accounts: { + offerAuthority: PublicKey; + auction?: PublicKey; + auctionConfig?: PublicKey; + bestOfferToken?: PublicKey; + } ) { - let { offerAuthority, bestOfferToken } = accounts; + const { + offerAuthority, + auction, + auctionConfig: inputAuctionConfig, + bestOfferToken: inputBestOfferToken, + } = accounts; - if (bestOfferToken === undefined) { - bestOfferToken = await this.getBestOfferTokenAccount(vaaHash); - } + const bestOfferToken = await (async () => { + if (inputBestOfferToken !== undefined) { + return inputBestOfferToken; + } else { + const { info } = await this.fetchAuction(vaaHash); + if (info === null) { + throw new Error("no auction info found"); + } + + return info.bestOfferToken; + } + })(); + + // TODO: fix this + const { info } = await this.fetchAuction(vaaHash); + const auctionConfig = this.auctionConfigAddress(info!.configId); - const { mint } = await splToken.getAccount( - this.program.provider.connection, - bestOfferToken - ); return this.program.methods .improveOffer(new BN(feeOffer.toString())) .accounts({ offerAuthority, custodian: this.custodianAddress(), - auctionData: this.auctionDataAddress(vaaHash), - offerToken: splToken.getAssociatedTokenAddressSync(mint, offerAuthority), + auctionConfig, + auction: this.auctionAddress(vaaHash), + offerToken: splToken.getAssociatedTokenAddressSync(this.mint, offerAuthority), bestOfferToken, custodyToken: this.custodyTokenAccountAddress(), }) .instruction(); } - async prepareAuctionSettlementCctpIx( + async prepareOrderResponseCctpIx( accounts: { payer: PublicKey; fastVaa: PublicKey; finalizedVaa: PublicKey; - mint: PublicKey; + mint?: PublicKey; }, args: CctpMessageArgs ): Promise { - const { payer, fastVaa, finalizedVaa, mint } = accounts; + const { payer, fastVaa, finalizedVaa, mint: inputMint } = accounts; + const fastVaaAcct = await VaaAccount.fetch(this.program.provider.connection, fastVaa); const { encodedCctpMessage } = args; const { @@ -428,17 +563,19 @@ export class MatchingEngineProgram { tokenPair, custodyToken: tokenMessengerMinterCustodyToken, messageTransmitterProgram, - tokenProgram, - } = this.messageTransmitterProgram().receiveMessageAccounts(mint, encodedCctpMessage); + } = this.messageTransmitterProgram().receiveMessageAccounts( + inputMint ?? this.mint, + encodedCctpMessage + ); return this.program.methods - .prepareAuctionSettlementCctp(args) + .prepareOrderResponseCctp(args) .accounts({ payer, custodian: this.custodianAddress(), fastVaa, finalizedVaa, - preparedAuctionSettlement: this.preparedAuctionSettlementAddress( + preparedOrderResponse: this.preparedOrderResponseAddress( payer, fastVaaAcct.digest() ), @@ -454,37 +591,36 @@ export class MatchingEngineProgram { tokenMessengerMinterCustodyToken, tokenMessengerMinterProgram, messageTransmitterProgram, - tokenProgram, }) .instruction(); } async settleAuctionCompleteIx(accounts: { - preparedAuctionSettlement: PublicKey; - auctionData?: PublicKey; + preparedOrderResponse: PublicKey; + auction?: PublicKey; preparedBy?: PublicKey; bestOfferToken?: PublicKey; }) { const { - preparedAuctionSettlement, - auctionData: inputAuctionData, + preparedOrderResponse, + auction: inputAuction, preparedBy: inputPreparedBy, bestOfferToken: inputBestOfferToken, } = accounts; - const { preparedBy, auctionData } = await (async () => { - if (inputPreparedBy !== undefined && inputAuctionData !== undefined) { + const { preparedBy, auction } = await (async () => { + if (inputPreparedBy !== undefined && inputAuction !== undefined) { return { preparedBy: inputPreparedBy, - auctionData: inputAuctionData, + auction: inputAuction, }; } else { - const { preparedBy, fastVaaHash } = await this.fetchPreparedAuctionSettlement( - preparedAuctionSettlement - ); + const { preparedBy, fastVaaHash } = await this.fetchPreparedOrderResponse({ + address: preparedOrderResponse, + }); return { - preparedBy, - auctionData: this.auctionDataAddress(fastVaaHash), + preparedBy: inputPreparedBy ?? preparedBy, + auction: inputAuction ?? this.auctionAddress(fastVaaHash), }; } })(); @@ -493,12 +629,11 @@ export class MatchingEngineProgram { if (inputBestOfferToken !== undefined) { return inputBestOfferToken; } else { - const { bestOfferToken } = await this.fetchAuctionData( - await this.fetchPreparedAuctionSettlement(preparedAuctionSettlement).then( - (acct) => acct.fastVaaHash - ) - ); - return bestOfferToken; + const { info } = await this.fetchAuction({ address: auction }); + if (info === null) { + throw new Error("no auction info found"); + } + return info.bestOfferToken; } })(); @@ -507,11 +642,10 @@ export class MatchingEngineProgram { .accounts({ custodian: this.custodianAddress(), preparedBy, - preparedAuctionSettlement, - auctionData, + preparedOrderResponse, + auction, bestOfferToken, custodyToken: this.custodyTokenAccountAddress(), - tokenProgram: splToken.TOKEN_PROGRAM_ID, }) .instruction(); } @@ -521,8 +655,8 @@ export class MatchingEngineProgram { // payer: PublicKey; // fastVaa: PublicKey; // liquidatorToken: PublicKey; - // preparedAuctionSettlement?: PublicKey; - // auctionData?: PublicKey; + // preparedOrderResponse?: PublicKey; + // auction?: PublicKey; // preparedBy?: PublicKey; // }, // args: { targetChain: wormholeSdk.ChainId; remoteDomain?: number } @@ -531,8 +665,8 @@ export class MatchingEngineProgram { // payer, // fastVaa, // liquidatorToken, - // preparedAuctionSettlement: inputPreparedAuctionSettlement, - // auctionData: inputAuctionData, + // preparedOrderResponse: inputPreparedAuctionSettlement, + // auction: inputAuction, // preparedBy: inputPreparedBy, // } = accounts; @@ -574,7 +708,6 @@ export class MatchingEngineProgram { // localToken, // messageTransmitterProgram, // tokenMessengerMinterProgram, - // tokenProgram, // } = await this.burnAndPublishAccounts( // { payer, mint }, // { targetChain, destinationCctpDomain } @@ -588,14 +721,14 @@ export class MatchingEngineProgram { // custodian, // fastVaa, // preparedBy, - // preparedAuctionSettlement, - // auctionData, + // preparedOrderResponse, + // auction, // liquidatorToken, // }) // .instruction(); // } - async settleAuctionNoneCctpIx() { + async settleAuctionNoneLocalIx() { return this.program.methods .settleAuctionNoneCctp() .accounts({ @@ -604,70 +737,125 @@ export class MatchingEngineProgram { .instruction(); } - tokenMessengerMinterProgram(): TokenMessengerMinterProgram { - switch (this._programId) { - case testnet(): { - return new TokenMessengerMinterProgram( - this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" - ); - } - case mainnet(): { - return new TokenMessengerMinterProgram( - this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" - ); - } - default: { - throw new Error("unsupported network"); - } - } - } + async settleAuctionNoneCctpIx(accounts: { + payer: PublicKey; + fastVaa: PublicKey; + preparedOrderResponse: PublicKey; + }) { + const { payer, fastVaa, preparedOrderResponse } = accounts; - messageTransmitterProgram(): MessageTransmitterProgram { - switch (this._programId) { - case testnet(): { - return new MessageTransmitterProgram( - this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" - ); - } - case mainnet(): { - return new MessageTransmitterProgram( - this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" - ); - } - default: { - throw new Error("unsupported network"); - } + const fastVaaAccount = await VaaAccount.fetch(this.program.provider.connection, fastVaa); + const { fastMarketOrder } = LiquidityLayerMessage.decode(fastVaaAccount.payload()); + if (fastMarketOrder === undefined) { + throw new Error("Message not FastMarketOrder"); } + + const { targetChain, destinationCctpDomain } = fastMarketOrder; + + const { preparedBy } = await this.fetchPreparedOrderResponse({ + address: preparedOrderResponse, + }); + + const { + custodian, + payerSequence, + routerEndpoint: toRouterEndpoint, + coreMessage, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + messageTransmitterProgram, + tokenMessengerMinterProgram, + } = await this.burnAndPublishAccounts({ payer }, { targetChain, destinationCctpDomain }); + + const { feeRecipientToken } = await this.fetchCustodian(); + + return this.program.methods + .settleAuctionNoneCctp() + .accounts({ + payer, + payerSequence, + custodian, + fastVaa, + preparedBy, + preparedOrderResponse, + auction: this.auctionAddress(fastVaaAccount.digest()), + custodyToken: this.custodyTokenAccountAddress(), + feeRecipientToken, + mint: this.mint, + fromRouterEndpoint: this.routerEndpointAddress(fastVaaAccount.emitterInfo().chain), + toRouterEndpoint, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreFeeCollector, + tokenMessengerMinterSenderAuthority, + messageTransmitterConfig, + tokenMessenger, + remoteTokenMessenger, + tokenMinter, + localToken, + coreBridgeProgram, + tokenMessengerMinterProgram, + messageTransmitterProgram, + }) + .instruction(); } async executeFastOrderCctpIx( - targetChain: wormholeSdk.ChainId, + targetChain: number, remoteDomain: number, - vaaHash: Buffer, + vaaHash: VaaHash, accounts: { payer: PublicKey; - vaa: PublicKey; + fastVaa: PublicKey; + auctionConfig?: PublicKey; bestOfferToken?: PublicKey; initialOfferToken?: PublicKey; } ) { - let { payer, vaa, bestOfferToken, initialOfferToken } = accounts; + const { + payer, + fastVaa, + auctionConfig: inputAuctionConfig, + bestOfferToken: inputBestOfferToken, + initialOfferToken: inputInitialOfferToken, + } = accounts; - if (bestOfferToken === undefined) { - bestOfferToken = await this.getBestOfferTokenAccount(vaaHash); - } + const auction = this.auctionAddress(vaaHash); + + const { auctionConfig, initialOfferToken, bestOfferToken } = await (async () => { + if ( + inputAuctionConfig === undefined || + inputInitialOfferToken === undefined || + inputBestOfferToken === undefined + ) { + const { info } = await this.fetchAuction({ address: auction }); + if (info === null) { + throw new Error("no auction info found"); + } + const { configId, initialOfferToken, bestOfferToken } = info; + return { + auctionConfig: inputAuctionConfig ?? this.auctionConfigAddress(configId), + initialOfferToken: inputInitialOfferToken ?? initialOfferToken, + bestOfferToken: inputBestOfferToken ?? bestOfferToken, + }; + } else { + return { + auctionConfig: inputAuctionConfig, + initialOfferToken: inputInitialOfferToken, + bestOfferToken: inputBestOfferToken, + }; + } + })(); - if (initialOfferToken === undefined) { - initialOfferToken = await this.getInitialOfferTokenAccount(vaaHash); - } - const { mint } = await splToken.getAccount( - this.program.provider.connection, - bestOfferToken - ); const { custodian, payerSequence, @@ -685,24 +873,25 @@ export class MatchingEngineProgram { localToken, messageTransmitterProgram, tokenMessengerMinterProgram, - tokenProgram, } = await this.burnAndPublishAccounts( - { payer, mint }, + { payer }, { targetChain, destinationCctpDomain: remoteDomain } ); + const mint = this.mint; return this.program.methods .executeFastOrderCctp() .accounts({ payer, custodian, - auctionData: this.auctionDataAddress(vaaHash), + auctionConfig, + fastVaa, + auction, toRouterEndpoint, executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), bestOfferToken, initialOfferToken, custodyToken: this.custodyTokenAccountAddress(), - vaa, mint, payerSequence, coreBridgeConfig, @@ -718,39 +907,56 @@ export class MatchingEngineProgram { coreBridgeProgram, tokenMessengerMinterProgram, messageTransmitterProgram, - tokenProgram, }) .instruction(); } - async executeFastOrderSolanaIx( - vaaHash: Buffer, + async executeFastOrderLocalIx( + vaaHash: VaaHash, accounts: { payer: PublicKey; - vaa: PublicKey; + fastVaa: PublicKey; + auctionConfig?: PublicKey; bestOfferToken?: PublicKey; initialOfferToken?: PublicKey; toRouterEndpoint?: PublicKey; } ) { - let { payer, vaa, bestOfferToken, initialOfferToken, toRouterEndpoint } = accounts; - - if (bestOfferToken === undefined) { - bestOfferToken = await this.getBestOfferTokenAccount(vaaHash); - } - - if (initialOfferToken === undefined) { - initialOfferToken = await this.getInitialOfferTokenAccount(vaaHash); - } - - if (toRouterEndpoint === undefined) { - toRouterEndpoint = this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA); - } + const { + payer, + fastVaa, + auctionConfig: inputAuctionConfig, + bestOfferToken: inputBestOfferToken, + initialOfferToken: inputInitialOfferToken, + toRouterEndpoint: inputToRouterEndpoint, + } = accounts; - const { mint } = await splToken.getAccount( - this.program.provider.connection, - bestOfferToken! - ); + const auction = this.auctionAddress(vaaHash); + + const { auctionConfig, initialOfferToken, bestOfferToken } = await (async () => { + if ( + inputAuctionConfig === undefined || + inputInitialOfferToken === undefined || + inputBestOfferToken === undefined + ) { + const { info } = await this.fetchAuction({ address: auction }); + if (info === null) { + throw new Error("no auction info found"); + } + const { configId, initialOfferToken, bestOfferToken } = info; + return { + auctionConfig: inputAuctionConfig ?? this.auctionConfigAddress(configId), + initialOfferToken: inputInitialOfferToken ?? initialOfferToken, + bestOfferToken: inputBestOfferToken ?? bestOfferToken, + }; + } else { + return { + auctionConfig: inputAuctionConfig, + initialOfferToken: inputInitialOfferToken, + bestOfferToken: inputBestOfferToken, + }; + } + })(); const { custodian, @@ -763,18 +969,20 @@ export class MatchingEngineProgram { } = await this.publishMessageAccounts(payer); return this.program.methods - .executeFastOrderSolana() + .executeFastOrderLocal() .accounts({ payer, custodian, - auctionData: this.auctionDataAddress(vaaHash), - toRouterEndpoint, - executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), + auctionConfig, + fastVaa, + auction, + toRouterEndpoint: + inputToRouterEndpoint ?? + this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + executorToken: splToken.getAssociatedTokenAddressSync(this.mint, payer), bestOfferToken, initialOfferToken, custodyToken: this.custodyTokenAccountAddress(), - vaa, - mint: USDC_MINT_ADDRESS, payerSequence, coreBridgeConfig, coreMessage, @@ -798,15 +1006,14 @@ export class MatchingEngineProgram { routerEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), custodyToken: this.custodyTokenAccountAddress(), matchingEngineProgram: this.ID, - tokenProgram: splToken.TOKEN_PROGRAM_ID, }, }; } async publishMessageAccounts(payer: PublicKey): Promise { const payerSequence = this.payerSequenceAddress(payer); - const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => - this.coreMessageAddress(payer, value) + const coreMessage = await this.fetchPayerSequenceValue({ address: payerSequence }).then( + (value) => this.coreMessageAddress(payer, value) ); const coreBridgeProgram = this.coreBridgeProgramId(); @@ -835,14 +1042,14 @@ export class MatchingEngineProgram { async burnAndPublishAccounts( base: { payer: PublicKey; - mint: PublicKey; + mint?: PublicKey; }, args: { - targetChain: wormholeSdk.ChainId; + targetChain: number; destinationCctpDomain: number; } ): Promise { - const { payer, mint } = base; + const { payer, mint: inputMint } = base; const { targetChain, destinationCctpDomain } = args; const { @@ -854,9 +1061,8 @@ export class MatchingEngineProgram { localToken, messageTransmitterProgram, tokenMessengerMinterProgram, - tokenProgram, } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts( - mint, + inputMint ?? this.mint, destinationCctpDomain ); @@ -887,10 +1093,49 @@ export class MatchingEngineProgram { localToken, messageTransmitterProgram, tokenMessengerMinterProgram, - tokenProgram, }; } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { + switch (this._programId) { + case testnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + case mainnet(): { + return new TokenMessengerMinterProgram( + this.program.provider.connection, + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + messageTransmitterProgram(): MessageTransmitterProgram { + switch (this._programId) { + case testnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + case mainnet(): { + return new MessageTransmitterProgram( + this.program.provider.connection, + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + coreBridgeProgramId(): PublicKey { switch (this._programId) { case testnet(): { @@ -904,6 +1149,40 @@ export class MatchingEngineProgram { } } } + + async calculateDynamicPenalty( + auctionInfo: AuctionInfo, + currentSlot: bigint, + configId?: number + ): Promise<{ penalty: bigint; reward: bigint }> { + const auctionParams = await this.fetchAuctionParameters(configId); + + const gracePeriod = BigInt(auctionParams.gracePeriod); + const slotsElapsed = + currentSlot - BigInt(auctionInfo.startSlot.toString()) - BigInt(auctionParams.duration); + if (slotsElapsed <= gracePeriod) { + return { penalty: 0n, reward: 0n }; + } + + const amount = BigInt(auctionInfo.securityDeposit.toString()); + + const penaltyPeriod = slotsElapsed - gracePeriod; + const auctionPenaltySlots = BigInt(auctionParams.penaltySlots); + const initialPenaltyBps = BigInt(auctionParams.initialPenaltyBps); + const userPenaltyRewardBps = BigInt(auctionParams.userPenaltyRewardBps); + + if (penaltyPeriod >= auctionPenaltySlots || initialPenaltyBps == FEE_PRECISION_MAX) { + const userReward = (amount * userPenaltyRewardBps) / FEE_PRECISION_MAX; + return { penalty: amount - userReward, reward: userReward }; + } else { + const basePenalty = (amount * initialPenaltyBps) / FEE_PRECISION_MAX; + const penalty = + basePenalty + ((amount - basePenalty) * penaltyPeriod) / auctionPenaltySlots; + const userReward = (penalty * userPenaltyRewardBps) / FEE_PRECISION_MAX; + + return { penalty: penalty - userReward, reward: userReward }; + } + } } export function testnet(): ProgramId { diff --git a/solana/ts/src/matchingEngine/state/AuctionData.ts b/solana/ts/src/matchingEngine/state/Auction.ts similarity index 52% rename from solana/ts/src/matchingEngine/state/AuctionData.ts rename to solana/ts/src/matchingEngine/state/Auction.ts index 1a22d2e0..e8d24ca6 100644 --- a/solana/ts/src/matchingEngine/state/AuctionData.ts +++ b/solana/ts/src/matchingEngine/state/Auction.ts @@ -1,37 +1,39 @@ import { PublicKey } from "@solana/web3.js"; import { BN } from "@coral-xyz/anchor"; -export class AuctionData { - bump: number; - vaaHash: number[]; - status: Object; +export type AuctionStatus = { + notStarted?: {}; + active?: {}; + completed?: { slot: BN }; + settled?: { + baseFee: BN; + penalty: BN | null; + }; +}; + +export type AuctionInfo = { + configId: number; bestOfferToken: PublicKey; initialOfferToken: PublicKey; startSlot: BN; - amount: BN; + endSlot: BN; + amountIn: BN; securityDeposit: BN; offerPrice: BN; + amountOut: BN | null; +}; + +export class Auction { + bump: number; + vaaHash: number[]; + status: Object; + info: AuctionInfo | null; - constructor( - bump: number, - vaaHash: number[], - status: Object, - bestOfferToken: PublicKey, - initialOfferToken: PublicKey, - start_slot: BN, - amount: BN, - security_deposit: BN, - offer_price: BN - ) { + constructor(bump: number, vaaHash: number[], status: AuctionStatus, info: AuctionInfo | null) { this.bump = bump; this.vaaHash = vaaHash; this.status = status; - this.bestOfferToken = bestOfferToken; - this.initialOfferToken = initialOfferToken; - this.startSlot = start_slot; - this.amount = amount; - this.securityDeposit = security_deposit; - this.offerPrice = offer_price; + this.info = info; } static address(programId: PublicKey, vaaHash: Array | Buffer | Uint8Array) { diff --git a/solana/ts/src/matchingEngine/state/AuctionConfig.ts b/solana/ts/src/matchingEngine/state/AuctionConfig.ts new file mode 100644 index 00000000..f1cd62ec --- /dev/null +++ b/solana/ts/src/matchingEngine/state/AuctionConfig.ts @@ -0,0 +1,28 @@ +import { PublicKey } from "@solana/web3.js"; + +export type AuctionParameters = { + userPenaltyRewardBps: number; + initialPenaltyBps: number; + duration: number; + gracePeriod: number; + penaltySlots: number; +}; + +export class AuctionConfig { + id: number; + parameters: AuctionParameters; + + constructor(id: number, parameters: AuctionParameters) { + this.id = id; + this.parameters = parameters; + } + + static address(programId: PublicKey, id: number) { + const encodedId = Buffer.alloc(4); + encodedId.writeUInt32BE(id); + return PublicKey.findProgramAddressSync( + [Buffer.from("auction-config"), encodedId], + programId + )[0]; + } +} diff --git a/solana/ts/src/matchingEngine/state/Custodian.ts b/solana/ts/src/matchingEngine/state/Custodian.ts index 3d0937b4..cdb618ed 100644 --- a/solana/ts/src/matchingEngine/state/Custodian.ts +++ b/solana/ts/src/matchingEngine/state/Custodian.ts @@ -1,41 +1,31 @@ +import { BN } from "@coral-xyz/anchor"; import { PublicKey } from "@solana/web3.js"; -export interface AuctionConfig { - userPenaltyRewardBps: number; - initialPenaltyBps: number; - auctionDuration: number; - auctionGracePeriod: number; - auctionPenaltySlots: number; -} - export class Custodian { - bump: number; - custodyTokenBump: number; owner: PublicKey; pendingOwner: PublicKey | null; ownerAssistant: PublicKey; - feeRecipient: PublicKey; - auctionConfig: AuctionConfig; + feeRecipientToken: PublicKey; + auctionConfigId: number; + nextProposalId: BN; constructor( - bump: number, - custodyTokenBump: number, owner: PublicKey, pendingOwner: PublicKey | null, ownerAssistant: PublicKey, - feeRecipient: PublicKey, - auctionConfig: AuctionConfig + feeRecipientToken: PublicKey, + auctionConfigId: number, + nextProposalId: BN ) { - this.bump = bump; - this.custodyTokenBump = custodyTokenBump; this.owner = owner; this.pendingOwner = pendingOwner; this.ownerAssistant = ownerAssistant; - this.feeRecipient = feeRecipient; - this.auctionConfig = auctionConfig; + this.feeRecipientToken = feeRecipientToken; + this.auctionConfigId = auctionConfigId; + this.nextProposalId = nextProposalId; } static address(programId: PublicKey) { - return PublicKey.findProgramAddressSync([Buffer.from("custodian")], programId)[0]; + return PublicKey.findProgramAddressSync([Buffer.from("emitter")], programId)[0]; } } diff --git a/solana/ts/src/matchingEngine/state/PreparedAuctionSettlement.ts b/solana/ts/src/matchingEngine/state/PreparedOrderResponse.ts similarity index 70% rename from solana/ts/src/matchingEngine/state/PreparedAuctionSettlement.ts rename to solana/ts/src/matchingEngine/state/PreparedOrderResponse.ts index 2777fa37..59ee6762 100644 --- a/solana/ts/src/matchingEngine/state/PreparedAuctionSettlement.ts +++ b/solana/ts/src/matchingEngine/state/PreparedOrderResponse.ts @@ -1,7 +1,8 @@ import { BN } from "@coral-xyz/anchor"; import { PublicKey } from "@solana/web3.js"; +import { VaaHash } from ".."; -export class PreparedAuctionSettlement { +export class PreparedOrderResponse { bump: number; preparedBy: PublicKey; fastVaaHash: Array; @@ -22,13 +23,9 @@ export class PreparedAuctionSettlement { this.baseFee = baseFee; } - static address( - programId: PublicKey, - payer: PublicKey, - fastVaaHash: Array | Buffer | Uint8Array - ) { + static address(programId: PublicKey, preparedBy: PublicKey, fastVaaHash: VaaHash) { return PublicKey.findProgramAddressSync( - [Buffer.from("auction-settlement"), payer.toBuffer(), Buffer.from(fastVaaHash)], + [Buffer.from("order-response"), preparedBy.toBuffer(), Buffer.from(fastVaaHash)], programId )[0]; } diff --git a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts index 8501f301..943590f4 100644 --- a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts +++ b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts @@ -1,4 +1,3 @@ -import { ChainId } from "@certusone/wormhole-sdk"; import { PublicKey } from "@solana/web3.js"; export class RouterEndpoint { @@ -14,7 +13,7 @@ export class RouterEndpoint { this.mintRecipient = mintRecipient; } - static address(programId: PublicKey, chain: ChainId) { + static address(programId: PublicKey, chain: number) { const encodedChain = Buffer.alloc(2); encodedChain.writeUInt16BE(chain); return PublicKey.findProgramAddressSync( diff --git a/solana/ts/src/matchingEngine/state/index.ts b/solana/ts/src/matchingEngine/state/index.ts index 8a3ac9ae..9c5044f9 100644 --- a/solana/ts/src/matchingEngine/state/index.ts +++ b/solana/ts/src/matchingEngine/state/index.ts @@ -1,6 +1,7 @@ -export * from "./AuctionData"; +export * from "./Auction"; +export * from "./AuctionConfig"; export * from "./Custodian"; export * from "./PayerSequence"; -export * from "./PreparedAuctionSettlement"; +export * from "./PreparedOrderResponse"; export * from "./RedeemedFastFill"; export * from "./RouterEndpoint"; diff --git a/solana/ts/src/messages/deposit.ts b/solana/ts/src/messages/deposit.ts index b883dd2d..b829ae8a 100644 --- a/solana/ts/src/messages/deposit.ts +++ b/solana/ts/src/messages/deposit.ts @@ -88,7 +88,7 @@ export class LiquidityLayerDeposit { }; } case ID_DEPOSIT_SLOW_ORDER_RESPONSE: { - const baseFee = buf.readBigUInt64BE(offset); + const baseFee = payload.readBigUInt64BE(offset); return { slowOrderResponse: { baseFee }, }; diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 26c16c4e..657cb6ce 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -1,6 +1,5 @@ export * from "./state"; -import * as wormholeSdk from "@certusone/wormhole-sdk"; import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { @@ -25,17 +24,10 @@ export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as co export type ProgramId = (typeof PROGRAM_IDS)[number]; -export type PlaceMarketOrderCctpArgs = { - amountIn: bigint; - targetChain: wormholeSdk.ChainId; - redeemer: Array; - redeemerMessage: Buffer; -}; - export type PrepareMarketOrderArgs = { amountIn: bigint; minAmountOut: bigint | null; - targetChain: wormholeSdk.ChainId; + targetChain: number; redeemer: Array; redeemerMessage: Buffer; }; @@ -61,9 +53,9 @@ export type TokenRouterCommonAccounts = PublishMessageAccounts & { messageTransmitterConfig: PublicKey; messageTransmitterProgram: PublicKey; tokenProgram: PublicKey; - mint?: PublicKey; - localToken?: PublicKey; - tokenMessengerMinterCustodyToken?: PublicKey; + mint: PublicKey; + localToken: PublicKey; + tokenMessengerMinterCustodyToken: PublicKey; }; export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { @@ -115,37 +107,22 @@ export type RedeemFastFillAccounts = { }; export type AddCctpRouterEndpointArgs = { - chain: wormholeSdk.ChainId; + chain: number; cctpDomain: number; address: Array; mintRecipient: Array | null; }; -export type RegisterContractArgs = { - chain: wormholeSdk.ChainId; - address: Array; -}; - -export type RegisterAssetArgs = { - chain: wormholeSdk.ChainId; - relayerFee: BN; - nativeSwapRate: BN; - maxNativeSwapAmount: BN; -}; - -export type UpdateRelayerFeeArgs = { - chain: wormholeSdk.ChainId; - relayerFee: BN; -}; - export class TokenRouterProgram { private _programId: ProgramId; + private _mint: PublicKey; program: Program; // TODO: fix this - constructor(connection: Connection, programId?: ProgramId) { - this._programId = programId ?? testnet(); + constructor(connection: Connection, programId: ProgramId, mint: PublicKey) { + this._programId = programId; + this._mint = mint; this.program = new Program(IDL, new PublicKey(this._programId), { connection, }); @@ -155,16 +132,21 @@ export class TokenRouterProgram { return this.program.programId; } + get mint(): PublicKey { + return this._mint; + } + custodianAddress(): PublicKey { return Custodian.address(this.ID); } - async fetchCustodian(addr: PublicKey): Promise { + async fetchCustodian(input?: { address: PublicKey }): Promise { + const addr = input === undefined ? this.custodianAddress() : input.address; return this.program.account.custodian.fetch(addr); } custodyTokenAccountAddress(): PublicKey { - return PublicKey.findProgramAddressSync([Buffer.from("custody")], this.ID)[0]; + return splToken.getAssociatedTokenAddressSync(this.mint, this.custodianAddress(), true); } coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { @@ -188,7 +170,7 @@ export class TokenRouterProgram { .catch((_) => new BN(0)); } - routerEndpointAddress(chain: wormholeSdk.ChainId): PublicKey { + routerEndpointAddress(chain: number): PublicKey { return RouterEndpoint.address(this.ID, chain); } @@ -217,7 +199,7 @@ export class TokenRouterProgram { const messageTransmitterProgram = this.messageTransmitterProgram(); const custodyToken = this.custodyTokenAccountAddress(); - const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); + const mint = this.mint; return { tokenRouterProgram: this.ID, @@ -264,6 +246,7 @@ export class TokenRouterProgram { }) .accounts({ payer, + custodian: this.custodianAddress(), orderSender, preparedOrder, orderToken, @@ -348,7 +331,7 @@ export class TokenRouterProgram { } async placeMarketOrderCctpAccounts( - targetChain: wormholeSdk.ChainId, + targetChain: number, overrides: { remoteDomain?: number; } = {} @@ -370,7 +353,7 @@ export class TokenRouterProgram { })(); const custodyToken = this.custodyTokenAccountAddress(); - const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); + const mint = this.mint; const { senderAuthority: tokenMessengerMinterSenderAuthority, @@ -427,9 +410,7 @@ export class TokenRouterProgram { routerEndpoint: inputRouterEndpoint, } = accounts; const { orderSender, targetChain } = await (async () => { - if (inputOrderSender !== undefined && args !== undefined) { - return { orderSender: inputOrderSender, targetChain: args.targetChain }; - } else { + if (inputOrderSender === undefined || args === undefined) { const { info: { orderSender, targetChain }, } = await this.fetchPreparedOrder(preparedOrder).catch((_) => { @@ -438,6 +419,8 @@ export class TokenRouterProgram { ); }); return { orderSender, targetChain }; + } else { + return { orderSender: inputOrderSender, targetChain: args.targetChain }; } })(); @@ -463,7 +446,7 @@ export class TokenRouterProgram { tokenMessengerMinterProgram, messageTransmitterProgram, tokenProgram, - } = await this.placeMarketOrderCctpAccounts(targetChain as wormholeSdk.ChainId); + } = await this.placeMarketOrderCctpAccounts(targetChain); return this.program.methods .placeMarketOrderCctp() @@ -500,7 +483,6 @@ export class TokenRouterProgram { ): Promise { const msg = CctpTokenBurnMessage.from(cctpMessage); const custodyToken = this.custodyTokenAccountAddress(); - const { mint } = await splToken.getAccount(this.program.provider.connection, custodyToken); const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); const { chain } = vaaAcct.emitterInfo(); @@ -519,13 +501,13 @@ export class TokenRouterProgram { tokenPair, custodyToken: tokenMessengerMinterCustodyToken, tokenProgram, - } = messageTransmitterProgram.receiveMessageAccounts(mint, msg); + } = messageTransmitterProgram.receiveMessageAccounts(this.mint, msg); return { custodian: this.custodianAddress(), preparedFill, custodyToken, - routerEndpoint: this.routerEndpointAddress(chain as wormholeSdk.ChainId), // yikes + routerEndpoint: this.routerEndpointAddress(chain), messageTransmitterAuthority, messageTransmitterConfig, usedNonces, @@ -664,16 +646,16 @@ export class TokenRouterProgram { async initializeIx(accounts: { owner: PublicKey; ownerAssistant: PublicKey; - mint: PublicKey; + mint?: PublicKey; }): Promise { - const { owner, ownerAssistant, mint } = accounts; + const { owner, ownerAssistant, mint: inputMint } = accounts; return this.program.methods .initialize() .accounts({ owner, custodian: this.custodianAddress(), ownerAssistant, - mint, + mint: inputMint ?? this.mint, custodyToken: this.custodyTokenAccountAddress(), programData: getProgramData(this.ID), }) @@ -783,7 +765,7 @@ export class TokenRouterProgram { custodian?: PublicKey; routerEndpoint?: PublicKey; }, - chain: wormholeSdk.ChainId + chain: number ): Promise { const { ownerOrAssistant, @@ -861,13 +843,15 @@ export class TokenRouterProgram { case testnet(): { return new matchingEngineSdk.MatchingEngineProgram( this.program.provider.connection, - matchingEngineSdk.testnet() + matchingEngineSdk.testnet(), + this.mint ); } case mainnet(): { return new matchingEngineSdk.MatchingEngineProgram( this.program.provider.connection, - matchingEngineSdk.mainnet() + matchingEngineSdk.mainnet(), + this.mint ); } default: { diff --git a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts index 788e28f3..a17ec5db 100644 --- a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts +++ b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts @@ -1,4 +1,3 @@ -import { ChainId } from "@certusone/wormhole-sdk"; import { PublicKey } from "@solana/web3.js"; export type MessageProtocol = { @@ -27,7 +26,7 @@ export class RouterEndpoint { this.protocol = protocol; } - static address(programId: PublicKey, chain: ChainId) { + static address(programId: PublicKey, chain: number) { const encodedChain = Buffer.alloc(2); encodedChain.writeUInt16BE(chain); return PublicKey.findProgramAddressSync( diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 6dfc4598..da739e6e 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -8,15 +8,25 @@ import { SYSVAR_RENT_PUBKEY, SystemProgram, TransactionInstruction, + VersionedTransactionResponse, } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { + CctpTokenBurnMessage, + FastMarketOrder, + LiquidityLayerDeposit, + LiquidityLayerMessage, +} from "../src"; +import { + Auction, AuctionConfig, + AuctionParameters, Custodian, MatchingEngineProgram, RouterEndpoint, } from "../src/matchingEngine"; +import { VaaAccount } from "../src/wormhole"; import { CircleAttester, ETHEREUM_USDC_ADDRESS, @@ -25,39 +35,37 @@ import { OWNER_ASSISTANT_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, + bigintToU64BN, expectIxErr, expectIxOk, + expectIxOkDetails, + numberToU64BN, postLiquidityLayerVaa, + waitBySlots, + waitUntilSlot, } from "./helpers"; import { - calculateDynamicPenalty, - getTokenBalance, - postFastTransferVaa, - postVaaWithMessage, - waitBySlots, + getUsdcAtaBalance, verifyFastFillMessage, verifyFillMessage, } from "./helpers/matching_engine_utils"; -import { - CctpTokenBurnMessage, - FastMarketOrder, - FastFill, - LiquidityLayerDeposit, - LiquidityLayerMessage, -} from "../src"; -import { VaaAccount } from "../src/wormhole"; chaiUse(chaiAsPromised); describe("Matching Engine", function () { - const connection = new Connection(LOCALHOST, "processed"); + const connection = new Connection(LOCALHOST, "confirmed"); + // owner is also the recipient in all tests const payer = PAYER_KEYPAIR; const owner = Keypair.generate(); const relayer = Keypair.generate(); const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; - const feeRecipient = Keypair.generate(); - const newFeeRecipient = Keypair.generate(); + const feeRecipient = Keypair.generate().publicKey; + const feeRecipientToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + feeRecipient + ); + const newFeeRecipient = Keypair.generate().publicKey; const offerAuthorityOne = Keypair.generate(); const offerAuthorityTwo = Keypair.generate(); @@ -73,16 +81,20 @@ describe("Matching Engine", function () { const solanaDomain = 5; // Matching Engine program. - const engine = new MatchingEngineProgram(connection); + const engine = new MatchingEngineProgram( + connection, + "MatchingEngine11111111111111111111111111111", + USDC_MINT_ADDRESS + ); describe("Admin", function () { describe("Initialize", function () { - const auctionConfig: AuctionConfig = { + const auctionParams: AuctionParameters = { userPenaltyRewardBps: 250000, initialPenaltyBps: 250000, - auctionDuration: 2, - auctionGracePeriod: 4, - auctionPenaltySlots: 10, + duration: 2, + gracePeriod: 5, // 2 + 5 slots after end. TODO: fix this + penaltySlots: 10, }; const createInitializeIx = (opts?: { @@ -90,21 +102,32 @@ describe("Matching Engine", function () { feeRecipient?: PublicKey; mint?: PublicKey; }) => - engine.initializeIx(auctionConfig, { + engine.initializeIx(auctionParams, { owner: payer.publicKey, ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, - feeRecipient: opts?.feeRecipient ?? feeRecipient.publicKey, + feeRecipient: opts?.feeRecipient ?? feeRecipient, mint: opts?.mint ?? USDC_MINT_ADDRESS, }); it("Cannot Initialize without USDC Mint", async function () { const mint = await splToken.createMint(connection, payer, payer.publicKey, null, 6); + const ix = await engine.initializeIx(auctionParams, { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint, + }); + const unknownAta = splToken.getAssociatedTokenAddressSync( + mint, + engine.custodianAddress(), + true + ); await expectIxErr( connection, - [await createInitializeIx({ mint })], + [ix], [payer], - "NotUsdc" + `Instruction references an unknown account ${unknownAta.toString()}` ); }); @@ -117,7 +140,7 @@ describe("Matching Engine", function () { }), ], [payer], - "AssistantZeroPubkey" + "Error Code: AssistantZeroPubkey" ); }); @@ -130,100 +153,106 @@ describe("Matching Engine", function () { }), ], [payer], - "FeeRecipientZeroPubkey" + "Error Code: FeeRecipientZeroPubkey" ); }); it("Cannot Initialize with Invalid Auction Duration", async function () { - const newAuctionConfig = { ...auctionConfig } as AuctionConfig; - newAuctionConfig.auctionDuration = 0; + const newAuctionParams: AuctionParameters = { ...auctionParams }; + newAuctionParams.duration = 0; await expectIxErr( connection, [ - await engine.initializeIx(newAuctionConfig, { + await engine.initializeIx(newAuctionParams, { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, - feeRecipient: feeRecipient.publicKey, + feeRecipient, mint: USDC_MINT_ADDRESS, }), ], [payer], - "InvalidAuctionDuration" + "Error Code: InvalidAuctionDuration" ); }); it("Cannot Initialize with Invalid Auction Grace Period", async function () { - const newAuctionConfig = { ...auctionConfig } as AuctionConfig; - newAuctionConfig.auctionGracePeriod = auctionConfig.auctionDuration - 1; + const newAuctionParams: AuctionParameters = { ...auctionParams }; + newAuctionParams.gracePeriod = 0; await expectIxErr( connection, [ - await engine.initializeIx(newAuctionConfig, { + await engine.initializeIx(newAuctionParams, { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, - feeRecipient: feeRecipient.publicKey, + feeRecipient, mint: USDC_MINT_ADDRESS, }), ], [payer], - "InvalidAuctionGracePeriod" + "Error Code: InvalidAuctionGracePeriod" ); }); it("Cannot Initialize with Invalid User Penalty", async function () { - const newAuctionConfig = { ...auctionConfig } as AuctionConfig; - newAuctionConfig.userPenaltyRewardBps = 4294967295; + const newAuctionParams: AuctionParameters = { ...auctionParams }; + newAuctionParams.userPenaltyRewardBps = 4294967295; await expectIxErr( connection, [ - await engine.initializeIx(newAuctionConfig, { + await engine.initializeIx(newAuctionParams, { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, - feeRecipient: feeRecipient.publicKey, + feeRecipient, mint: USDC_MINT_ADDRESS, }), ], [payer], - "UserPenaltyTooLarge" + "Error Code: UserPenaltyTooLarge" ); }); it("Cannot Initialize with Invalid Initial Penalty", async function () { - const newAuctionConfig = { ...auctionConfig } as AuctionConfig; - newAuctionConfig.initialPenaltyBps = 4294967295; + const newAuctionParams: AuctionParameters = { ...auctionParams }; + newAuctionParams.initialPenaltyBps = 4294967295; await expectIxErr( connection, [ - await engine.initializeIx(newAuctionConfig, { + await engine.initializeIx(newAuctionParams, { owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, - feeRecipient: feeRecipient.publicKey, + feeRecipient, mint: USDC_MINT_ADDRESS, }), ], [payer], - "InitialPenaltyTooLarge" + "Error Code: InitialPenaltyTooLarge" ); }); it("Finally Initialize Program", async function () { await expectIxOk(connection, [await createInitializeIx()], [payer]); - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - const expectedCustodianData = { - bump: 255, - custodyTokenBump: 254, - owner: payer.publicKey, - pendingOwner: null, - ownerAssistant: ownerAssistant.publicKey, - feeRecipient: feeRecipient.publicKey, - auctionConfig: auctionConfig, - } as Custodian; - expect(custodianData).to.eql(expectedCustodianData); + const expectedAuctionConfigId = 0; + const custodianData = await engine.fetchCustodian(); + expect(custodianData).to.eql( + new Custodian( + payer.publicKey, + null, + ownerAssistant.publicKey, + feeRecipientToken, + expectedAuctionConfigId, + bigintToU64BN(0n) + ) + ); + + const auctionConfigData = await engine.fetchAuctionConfig(0); + expect(auctionConfigData).to.eql( + new AuctionConfig(expectedAuctionConfigId, auctionParams) + ); }); it("Cannot Call Instruction Again: initialize", async function () { @@ -235,6 +264,29 @@ describe("Matching Engine", function () { ); }); + before("Set up Token Accounts", async function () { + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + feeRecipient + ); + + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + PublicKey.default + ); + + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + SystemProgram.programId + ); + }); + after("Transfer Lamports to Owner and Owner Assistant", async function () { await expectIxOk( connection, @@ -293,9 +345,9 @@ describe("Matching Engine", function () { ); // Confirm that the pending owner variable is set in the owner config. - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); + const custodianData = await engine.fetchCustodian(); - expect(custodianData.pendingOwner).deep.equals(owner.publicKey); + expect(custodianData.pendingOwner).to.eql(owner.publicKey); }); it("Confirm Ownership Transfer Request as Pending Owner", async function () { @@ -307,9 +359,9 @@ describe("Matching Engine", function () { // Confirm that the owner config reflects the current ownership status. { - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.owner).deep.equals(owner.publicKey); - expect(custodianData.pendingOwner).deep.equals(null); + const custodianData = await engine.fetchCustodian(); + expect(custodianData.owner).to.eql(owner.publicKey); + expect(custodianData.pendingOwner).to.eql(null); } }); @@ -360,8 +412,8 @@ describe("Matching Engine", function () { ); // Confirm that the pending owner variable is set in the owner config. - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); + const custodianData = await engine.fetchCustodian(); + expect(custodianData.pendingOwner).to.eql(relayer.publicKey); }); it("Cannot Confirm Ownership Transfer Request as Non Pending Owner", async function () { @@ -386,9 +438,9 @@ describe("Matching Engine", function () { // Confirm that the owner config reflects the current ownership status. { - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.owner).deep.equals(relayer.publicKey); - expect(custodianData.pendingOwner).deep.equals(null); + const custodianData = await engine.fetchCustodian(); + expect(custodianData.owner).to.eql(relayer.publicKey); + expect(custodianData.pendingOwner).to.eql(null); } // Set the owner back to the payer key. @@ -411,9 +463,9 @@ describe("Matching Engine", function () { // Confirm that the payer is the owner again. { - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.owner).deep.equals(owner.publicKey); - expect(custodianData.pendingOwner).deep.equals(null); + const custodianData = await engine.fetchCustodian(); + expect(custodianData.owner).to.eql(owner.publicKey); + expect(custodianData.pendingOwner).to.eql(null); } }); @@ -427,8 +479,8 @@ describe("Matching Engine", function () { // Confirm that the pending owner variable is set in the owner config. { - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.pendingOwner).deep.equals(relayer.publicKey); + const custodianData = await engine.fetchCustodian(); + expect(custodianData.pendingOwner).to.eql(relayer.publicKey); } // Confirm that the cancel ownership transfer request fails. @@ -448,8 +500,8 @@ describe("Matching Engine", function () { ); // Confirm the pending owner field was reset. - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.pendingOwner).deep.equals(null); + const custodianData = await engine.fetchCustodian(); + expect(custodianData.pendingOwner).to.eql(null); }); }); @@ -490,8 +542,8 @@ describe("Matching Engine", function () { ); // Confirm the assistant field was updated. - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.ownerAssistant).deep.equals(relayer.publicKey); + const custodianData = await engine.fetchCustodian(); + expect(custodianData.ownerAssistant).to.eql(relayer.publicKey); // Set the assistant back to the assistant key. await expectIxOk( @@ -564,9 +616,7 @@ describe("Matching Engine", function () { ); await expectIxOk(connection, [ix], [ownerAssistant]); - const routerEndpointData = await engine.fetchRouterEndpoint( - engine.routerEndpointAddress(ethChain) - ); + const routerEndpointData = await engine.fetchRouterEndpoint(ethChain); expect(routerEndpointData).to.eql( new RouterEndpoint(255, ethChain, contractAddress, mintRecipient) ); @@ -584,9 +634,7 @@ describe("Matching Engine", function () { await expectIxOk(connection, [ix], [owner]); - const routerEndpointData = await engine.fetchRouterEndpoint( - engine.routerEndpointAddress(ethChain) - ); + const routerEndpointData = await engine.fetchRouterEndpoint(ethChain); expect(routerEndpointData).to.eql( new RouterEndpoint(255, ethChain, ethRouter, ethRouter) ); @@ -594,14 +642,24 @@ describe("Matching Engine", function () { }); describe("Add Local Router Endpoint", function () { - const expectedEndpointBump = 254; - it("Cannot Add Local Router Endpoint without Executable", async function () { const ix = await engine.addLocalRouterEndpointIx({ ownerOrAssistant: ownerAssistant.publicKey, tokenRouterProgram: SYSVAR_RENT_PUBKEY, }); + const [bogusEmitter] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + SYSVAR_RENT_PUBKEY + ); + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + bogusEmitter, + true + ); + await expectIxErr( connection, [ix], @@ -610,107 +668,108 @@ describe("Matching Engine", function () { ); }); - it("Add Local Router Endpoint using System Program", async function () { + it("Cannot Add Local Router Endpoint using System Program", async function () { const ix = await engine.addLocalRouterEndpointIx({ ownerOrAssistant: ownerAssistant.publicKey, tokenRouterProgram: SystemProgram.programId, }); - await expectIxOk(connection, [ix], [ownerAssistant]); - - const routerEndpointData = await engine.fetchRouterEndpoint( - engine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) - ); - const [expectedAddress] = PublicKey.findProgramAddressSync( + const [bogusEmitter] = PublicKey.findProgramAddressSync( [Buffer.from("emitter")], SystemProgram.programId ); - const [expectedMintRecipient] = PublicKey.findProgramAddressSync( - [Buffer.from("custody")], - SystemProgram.programId - ); - expect(routerEndpointData).to.eql( - new RouterEndpoint( - expectedEndpointBump, - wormholeSdk.CHAIN_ID_SOLANA, - Array.from(expectedAddress.toBuffer()), - Array.from(expectedMintRecipient.toBuffer()) - ) + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + bogusEmitter, + true ); - }); - - it("Update Local Router Endpoint using SPL Token Program", async function () { - const ix = await engine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: splToken.TOKEN_PROGRAM_ID, - }); - - await expectIxOk(connection, [ix], [ownerAssistant]); - const routerEndpointData = await engine.fetchRouterEndpoint( - engine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) - ); - const [expectedAddress] = PublicKey.findProgramAddressSync( - [Buffer.from("emitter")], - splToken.TOKEN_PROGRAM_ID - ); - const [expectedMintRecipient] = PublicKey.findProgramAddressSync( - [Buffer.from("custody")], - splToken.TOKEN_PROGRAM_ID - ); - expect(routerEndpointData).to.eql( - new RouterEndpoint( - expectedEndpointBump, - wormholeSdk.CHAIN_ID_SOLANA, - Array.from(expectedAddress.toBuffer()), - Array.from(expectedMintRecipient.toBuffer()) - ) + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: InvalidEndpoint" ); }); }); describe("Update Fee Recipient", async function () { - const createUpdateFeeRecipientIx = (opts?: { - sender?: PublicKey; - newFeeRecipient?: PublicKey; - }) => - engine.updateFeeRecipientIx({ - ownerOrAssistant: opts?.sender ?? owner.publicKey, - newFeeRecipient: opts?.newFeeRecipient ?? newFeeRecipient.publicKey, + const localVariables = new Map(); + + it("Cannot Update Fee Recipient with Non-Existent ATA", async function () { + const ix = await engine.updateFeeRecipientIx({ + ownerOrAssistant: ownerAssistant.publicKey, + newFeeRecipient, }); - it("Cannot Update Fee Recipient as Non-Owner and Non-Assistant", async function () { await expectIxErr( connection, - [await createUpdateFeeRecipientIx({ sender: payer.publicKey })], - [payer], - "OwnerOrAssistantOnly" + [ix], + [ownerAssistant], + "new_fee_recipient_token. Error Code: AccountNotInitialized" ); - }); - it("Cannot Update Fee Recipient to Address(0)", async function () { - await expectIxErr( - connection, - [await createUpdateFeeRecipientIx({ newFeeRecipient: PublicKey.default })], - [owner], - "FeeRecipientZeroPubkey" - ); + localVariables.set("ix", ix); }); it("Update Fee Recipient as Owner Assistant", async function () { - await expectIxOk( + const ix = localVariables.get("ix") as TransactionInstruction; + expect(localVariables.delete("ix")).is.true; + + await splToken.getOrCreateAssociatedTokenAccount( connection, - [await createUpdateFeeRecipientIx({ sender: ownerAssistant.publicKey })], - [ownerAssistant] + payer, + USDC_MINT_ADDRESS, + newFeeRecipient + ); + + await expectIxOk(connection, [ix], [ownerAssistant]); + + const custodianData = await engine.fetchCustodian(); + expect(custodianData.feeRecipientToken).to.eql( + splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, newFeeRecipient) ); + }); + + it("Cannot Update Fee Recipient without Owner or Assistant", async function () { + const ix = await engine.updateFeeRecipientIx({ + ownerOrAssistant: payer.publicKey, + newFeeRecipient: feeRecipient, + }); + + await expectIxErr(connection, [ix], [payer], "Error Code: OwnerOrAssistantOnly"); + }); + + it("Cannot Update Fee Recipient to Default Pubkey", async function () { + const ix = await engine.updateFeeRecipientIx({ + ownerOrAssistant: ownerAssistant.publicKey, + newFeeRecipient: PublicKey.default, + }); + + await expectIxErr(connection, [ix], [ownerAssistant], "FeeRecipientZeroPubkey"); + }); - const custodianData = await engine.fetchCustodian(engine.custodianAddress()); - expect(custodianData.feeRecipient).deep.equals(newFeeRecipient.publicKey); + it("Update Fee Recipient as Owner", async function () { + const ix = await engine.updateFeeRecipientIx({ + ownerOrAssistant: owner.publicKey, + newFeeRecipient: feeRecipient, + }); + await expectIxOk(connection, [ix], [owner]); + + const custodianData = await engine.fetchCustodian(); + expect(custodianData.feeRecipientToken).to.eql(feeRecipientToken); }); }); }); describe("Business Logic", function () { + let testCctpNonce = 2n ** 64n - 1n; + + // Hack to prevent math overflow error when invoking CCTP programs. + testCctpNonce -= 10n * 6400n; + let wormholeSequence = 0n; const baseFastOrder: FastMarketOrder = { @@ -767,7 +826,7 @@ describe("Matching Engine", function () { before("Create ATAs For Offer Authorities", async function () { for (const wallet of [offerAuthorityOne, offerAuthorityTwo]) { - await splToken.getOrCreateAssociatedTokenAccount( + const destination = await splToken.createAccount( connection, wallet, USDC_MINT_ADDRESS, @@ -775,11 +834,7 @@ describe("Matching Engine", function () { ); // Mint USDC. - const mintAmount = 100000n * 100000000n; - const destination = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - wallet.publicKey - ); + const mintAmount = 10_000_000n * 1_000_000n; await expect( splToken.mintTo( @@ -801,132 +856,74 @@ describe("Matching Engine", function () { for (const offerPrice of [0n, baseFastOrder.maxFee / 2n, baseFastOrder.maxFee]) { it(`Place Initial Offer (Price == ${offerPrice})`, async function () { // Fetch the balances before. - const offerBalanceBefore = await getTokenBalance( + const offerBalanceBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; + const { amount: custodyBalanceBefore } = + await engine.fetchCustodyTokenAccount(); - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, txDetails } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: offerPrice, - fromChain: ethChain, - toChain: arbChain, - } + offerPrice ); // Validate balance changes. - const offerBalanceAfter = await getTokenBalance( + const offerBalanceAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - - expect(offerBalanceAfter).equals( - offerBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn - ); - expect(custodyAfter).equals( - custodyBefore + baseFastOrder.maxFee + baseFastOrder.amountIn - ); + const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + const balanceChange = baseFastOrder.amountIn + baseFastOrder.maxFee; - // Confirm the auction data. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const auctionData = await engine.fetchAuctionData(vaaHash); - const slot = await connection.getSlot(); - const offerToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - offerAuthorityOne.publicKey - ); + expect(offerBalanceAfter).equals(offerBalanceBefore - balanceChange); + expect(custodyBalanceAfter).equals(custodyBalanceBefore + balanceChange); - expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionData.status).to.eql({ active: {} }); - expect(auctionData.bestOfferToken).to.eql(offerToken); - expect(auctionData.initialOfferToken).to.eql(offerToken); - expect(auctionData.startSlot.toString()).to.eql(slot.toString()); - expect(auctionData.amount.toString()).to.eql(baseFastOrder.amountIn.toString()); - expect(auctionData.securityDeposit.toString()).to.eql( - baseFastOrder.maxFee.toString() - ); - expect(auctionData.offerPrice.toString()).to.eql(offerPrice.toString()); + await checkAfterEffects({ txDetails, fastVaa, offerPrice }); }); } - it(`Place Initial Offer (Offer Price == ${ - baseFastOrder.amountIn - 1n - })`, async function () { + it(`Place Initial Offer (Offer == Max Fee; Max Fee == Amount Minus 1)`, async function () { const fastOrder = { ...baseFastOrder } as FastMarketOrder; - - // Set the deadline to 10 slots from now. fastOrder.maxFee = fastOrder.amountIn - 1n; + const { maxFee: offerPrice } = fastOrder; // Fetch the balances before. - const offerBalanceBefore = await getTokenBalance( + const offerBalanceBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; + const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, txDetails } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + offerPrice ); // Validate balance changes. - const offerBalanceAfter = await getTokenBalance( + const offerBalanceAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - - expect(offerBalanceAfter).equals( - offerBalanceBefore - fastOrder.maxFee - fastOrder.amountIn - ); - expect(custodyAfter).equals(custodyBefore + fastOrder.maxFee + fastOrder.amountIn); - - // Confirm the auction data. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const auctionData = await engine.fetchAuctionData(vaaHash); - const slot = await connection.getSlot(); - const offerToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - offerAuthorityOne.publicKey - ); + const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + const balanceChange = fastOrder.amountIn + fastOrder.maxFee; + expect(offerBalanceAfter).equals(offerBalanceBefore - balanceChange); + expect(custodyBalanceAfter).equals(custodyBalanceBefore + balanceChange); - expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionData.status).to.eql({ active: {} }); - expect(auctionData.bestOfferToken).to.eql(offerToken); - expect(auctionData.initialOfferToken).to.eql(offerToken); - expect(auctionData.startSlot.toString()).to.eql(slot.toString()); - expect(auctionData.amount.toString()).to.eql(fastOrder.amountIn.toString()); - expect(auctionData.securityDeposit.toString()).to.eql(fastOrder.maxFee.toString()); - expect(auctionData.offerPrice.toString()).to.eql(fastOrder.maxFee.toString()); + await checkAfterEffects({ txDetails, fastVaa, offerPrice }); }); it(`Place Initial Offer (With Deadline)`, async function () { const fastOrder = { ...baseFastOrder } as FastMarketOrder; + const { maxFee: offerPrice } = fastOrder; // Set the deadline to 10 slots from now. const currTime = await connection.getBlockTime(await connection.getSlot()); @@ -936,84 +933,60 @@ describe("Matching Engine", function () { fastOrder.deadline = currTime + 10; // Fetch the balances before. - const offerBalanceBefore = await getTokenBalance( + const offerBalanceBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; + const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, txDetails } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + offerPrice ); // Validate balance changes. - const offerBalanceAfter = await getTokenBalance( + const offerBalanceAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - - expect(offerBalanceAfter).equals( - offerBalanceBefore - fastOrder.maxFee - fastOrder.amountIn - ); - expect(custodyAfter).equals(custodyBefore + fastOrder.maxFee + fastOrder.amountIn); - - // Confirm the auction data. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const auctionData = await engine.fetchAuctionData(vaaHash); - const slot = await connection.getSlot(); - const offerToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - offerAuthorityOne.publicKey - ); + const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + const balanceChange = fastOrder.amountIn + fastOrder.maxFee; + expect(offerBalanceAfter).equals(offerBalanceBefore - balanceChange); + expect(custodyBalanceAfter).equals(custodyBalanceBefore + balanceChange); - expect(auctionData.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionData.status).to.eql({ active: {} }); - expect(auctionData.bestOfferToken).to.eql(offerToken); - expect(auctionData.initialOfferToken).to.eql(offerToken); - expect(auctionData.startSlot.toString()).to.eql(slot.toString()); - expect(auctionData.amount.toString()).to.eql(fastOrder.amountIn.toString()); - expect(auctionData.securityDeposit.toString()).to.eql(fastOrder.maxFee.toString()); - expect(auctionData.offerPrice.toString()).to.eql(fastOrder.maxFee.toString()); + await checkAfterEffects({ txDetails, fastVaa, offerPrice }); }); it(`Cannot Place Initial Offer (Invalid VAA)`, async function () { - const [vaaKey, signedVaa] = await postVaaWithMessage( + const fastVaa = await postLiquidityLayerVaa( connection, offerAuthorityOne, MOCK_GUARDIANS, + ethRouter, wormholeSequence++, - Buffer.from("deadbeef", "hex"), - "0x" + Buffer.from(ethRouter).toString("hex") + Buffer.from("deadbeef", "hex") + ); + + const auction = await VaaAccount.fetch(connection, fastVaa).then((vaa) => + engine.auctionAddress(vaa.digest()) ); await expectIxErr( connection, [ await engine.placeInitialOfferIx( - baseFastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } + fastVaa, + auction, + fromRouterEndpoint: engine.routerEndpointAddress(ethChain), + toRouterEndpoint: engine.routerEndpointAddress(arbChain), + }, + baseFastOrder.maxFee ), ], [offerAuthorityOne], @@ -1022,39 +995,44 @@ describe("Matching Engine", function () { }); it(`Cannot Place Initial Offer (Invalid Payload)`, async function () { - const fastFill = { - fill: { - sourceChain: ethChain, - orderSender: Array.from(baseFastOrder.sender), - redeemer: Array.from(baseFastOrder.redeemer), - redeemerMessage: baseFastOrder.redeemerMessage, + const message = new LiquidityLayerMessage({ + fastFill: { + amount: 1000n, + fill: { + sourceChain: ethChain, + orderSender: Array.from(baseFastOrder.sender), + redeemer: Array.from(baseFastOrder.redeemer), + redeemerMessage: baseFastOrder.redeemerMessage, + }, }, - amount: 1000n, - } as FastFill; - const payload = new LiquidityLayerMessage({ fastFill: fastFill }).encode(); + }); - const [vaaKey, signedVaa] = await postVaaWithMessage( + const fastVaa = await postLiquidityLayerVaa( connection, offerAuthorityOne, MOCK_GUARDIANS, + ethRouter, wormholeSequence++, - payload, - "0x" + Buffer.from(ethRouter).toString("hex") + message ); + const auction = await VaaAccount.fetch(connection, fastVaa).then((vaa) => + engine.auctionAddress(vaa.digest()) + ); + + const { maxFee: offerPrice } = baseFastOrder; await expectIxErr( connection, [ await engine.placeInitialOfferIx( - baseFastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } + fastVaa, + auction, + fromRouterEndpoint: engine.routerEndpointAddress(ethChain), + toRouterEndpoint: engine.routerEndpointAddress(arbChain), + }, + offerPrice ), ], [offerAuthorityOne], @@ -1063,37 +1041,33 @@ describe("Matching Engine", function () { }); it(`Cannot Place Initial Offer (Deadline Exceeded)`, async function () { - const fastOrder = { ...baseFastOrder } as FastMarketOrder; + const fastMarketOrder = { ...baseFastOrder } as FastMarketOrder; // Set the deadline to the previous block timestamp. - const currTime = await connection.getBlockTime(await connection.getSlot()); - if (currTime === null) { - throw new Error("Failed to get current block time"); - } - fastOrder.deadline = currTime + -1; + fastMarketOrder.deadline = await connection + .getSlot() + .then((slot) => connection.getBlockTime(slot)) + .then((blockTime) => blockTime! - 1); - const [vaaKey, signedVaa] = await postFastTransferVaa( + const fastVaa = await postLiquidityLayerVaa( connection, offerAuthorityOne, MOCK_GUARDIANS, + ethRouter, wormholeSequence++, - fastOrder, - "0x" + Buffer.from(ethRouter).toString("hex") + new LiquidityLayerMessage({ fastMarketOrder }) ); + const { maxFee: offerPrice } = fastMarketOrder; await expectIxErr( connection, [ await engine.placeInitialOfferIx( - fastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } + fastVaa, + }, + offerPrice ), ], [offerAuthorityOne], @@ -1102,30 +1076,26 @@ describe("Matching Engine", function () { }); it(`Cannot Place Initial Offer (Offer Price Too High)`, async function () { - const feeOffer = baseFastOrder.maxFee + 1n; + const offerPrice = baseFastOrder.maxFee + 1n; - const [vaaKey, signedVaa] = await postFastTransferVaa( + const fastVaa = await postLiquidityLayerVaa( connection, offerAuthorityOne, MOCK_GUARDIANS, + ethRouter, wormholeSequence++, - baseFastOrder, - "0x" + Buffer.from(ethRouter).toString("hex") + new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) ); await expectIxErr( connection, [ await engine.placeInitialOfferIx( - feeOffer, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } + fastVaa, + }, + offerPrice ), ], [offerAuthorityOne], @@ -1134,29 +1104,27 @@ describe("Matching Engine", function () { }); it(`Cannot Place Initial Offer (Invalid Emitter Chain)`, async function () { - const [vaaKey, signedVaa] = await postFastTransferVaa( + const fastVaa = await postLiquidityLayerVaa( connection, - offerAuthorityOne, + payer, MOCK_GUARDIANS, + ethRouter, wormholeSequence++, - baseFastOrder, - "0x" + Buffer.from(ethRouter).toString("hex"), - wormholeSdk.CHAINS.acala // Pass invalid emitter chain. + new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }), + "acala" ); + const { maxFee: offerPrice } = baseFastOrder; await expectIxErr( connection, [ await engine.placeInitialOfferIx( - baseFastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } + fastVaa, + fromRouterEndpoint: engine.routerEndpointAddress(ethChain), + }, + offerPrice ), ], [offerAuthorityOne], @@ -1165,28 +1133,25 @@ describe("Matching Engine", function () { }); it(`Cannot Place Initial Offer (Invalid Emitter Address)`, async function () { - const [vaaKey, signedVaa] = await postFastTransferVaa( + const fastVaa = await postLiquidityLayerVaa( connection, - offerAuthorityOne, + payer, MOCK_GUARDIANS, + arbRouter, wormholeSequence++, - baseFastOrder, - "0x" + Buffer.from(arbRouter).toString("hex") // Pass arbRouter instead of ethRouter. + new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) ); + const { maxFee: offerPrice } = baseFastOrder; await expectIxErr( connection, [ await engine.placeInitialOfferIx( - baseFastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } + fastVaa, + }, + offerPrice ), ], [offerAuthorityOne], @@ -1196,31 +1161,29 @@ describe("Matching Engine", function () { it(`Cannot Place Initial Offer (Invalid Target Router Chain)`, async function () { // Change the fast order chain Id. - const fastOrder = { ...baseFastOrder } as FastMarketOrder; - fastOrder.targetChain = wormholeSdk.CHAINS.acala; + const fastMarketOrder = { ...baseFastOrder } as FastMarketOrder; + fastMarketOrder.targetChain = wormholeSdk.CHAINS.acala; - const [vaaKey, signedVaa] = await postFastTransferVaa( + const fastVaa = await postLiquidityLayerVaa( connection, - offerAuthorityOne, + payer, MOCK_GUARDIANS, + ethRouter, wormholeSequence++, - fastOrder, - "0x" + Buffer.from(ethRouter).toString("hex") + new LiquidityLayerMessage({ fastMarketOrder }) ); + const { maxFee: offerPrice } = fastMarketOrder; await expectIxErr( connection, [ await engine.placeInitialOfferIx( - fastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } + fastVaa, + toRouterEndpoint: engine.routerEndpointAddress(arbChain), + }, + offerPrice ), ], [offerAuthorityOne], @@ -1229,126 +1192,139 @@ describe("Matching Engine", function () { }); it(`Cannot Place Initial Offer Again`, async function () { - const [vaaKey, signedVaa] = await postFastTransferVaa( + const fastVaa = await postLiquidityLayerVaa( connection, - offerAuthorityOne, + payer, MOCK_GUARDIANS, + ethRouter, wormholeSequence++, - baseFastOrder, - "0x" + Buffer.from(ethRouter).toString("hex") + new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) ); - await expectIxOk( - connection, - [ - await engine.placeInitialOfferIx( - baseFastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } - ), - ], - [offerAuthorityOne] - ); - - await expectIxErr( - connection, - [ - await engine.placeInitialOfferIx( - baseFastOrder.maxFee, - ethChain, - arbChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } - ), - ], - [offerAuthorityOne], - "already in use" + const { maxFee: offerPrice } = baseFastOrder; + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + }, + offerPrice ); + await expectIxOk(connection, [ix], [offerAuthorityOne]); + + // TODO: find specific address already in use + await expectIxErr(connection, [ix], [offerAuthorityOne], "already in use"); }); + + async function checkAfterEffects(args: { + txDetails: VersionedTransactionResponse; + fastVaa: PublicKey; + offerPrice: bigint; + }) { + const { txDetails, fastVaa, offerPrice } = args; + + // Confirm the auction data. + const vaaAccount = await VaaAccount.fetch(connection, fastVaa); + const { fastMarketOrder } = LiquidityLayerMessage.decode(vaaAccount.payload()); + + const vaaHash = vaaAccount.digest(); + const auctionData = await engine.fetchAuction(vaaHash); + const { bump } = auctionData; + + const { duration } = await engine.fetchAuctionParameters(); + const offerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + offerAuthorityOne.publicKey + ); + + expect(fastMarketOrder).is.not.undefined; + const { amountIn, maxFee } = fastMarketOrder!; + + const expectedAmountIn = bigintToU64BN(amountIn); + expect(auctionData).to.eql( + new Auction( + bump, + Array.from(vaaHash), + { active: {} }, + { + configId: 0, + bestOfferToken: offerToken, + initialOfferToken: offerToken, + startSlot: numberToU64BN(txDetails.slot), + endSlot: numberToU64BN(txDetails.slot + duration), + amountIn: expectedAmountIn, + securityDeposit: bigintToU64BN(maxFee), + offerPrice: bigintToU64BN(offerPrice), + amountOut: expectedAmountIn, + } + ) + ); + } }); describe("Improve Offer", function () { for (const newOffer of [0n, baseFastOrder.maxFee / 2n, baseFastOrder.maxFee - 1n]) { it(`Improve Offer (Price == ${newOffer})`, async function () { - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); - const initialOfferBalanceBefore = await getTokenBalance( + const initialOfferBalanceBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const newOfferBalanceBefore = await getTokenBalance( + const newOfferBalanceBefore = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; + const { amount: custodyBalanceBefore } = + await engine.fetchCustodyTokenAccount(); // New Offer from offerAuthorityTwo. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const auctionDataBefore = await engine.fetchAuction(vaaHash); + const { info: infoBefore } = auctionDataBefore; + expect(infoBefore).is.not.null; + const { bestOfferToken } = infoBefore!; await expectIxOk( connection, [ - await engine.improveOfferIx( - newOffer, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - offerAuthority: offerAuthorityTwo.publicKey, - bestOfferToken, - } - ), + await engine.improveOfferIx(newOffer, vaaHash, { + offerAuthority: offerAuthorityTwo.publicKey, + bestOfferToken, + }), ], [offerAuthorityTwo] ); // Validate balance changes. - const initialOfferBalanceAfter = await getTokenBalance( + const initialOfferBalanceAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const newOfferBalanceAfter = await getTokenBalance( + const newOfferBalanceAfter = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; + const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); - expect(newOfferBalanceAfter).equals( - newOfferBalanceBefore - baseFastOrder.maxFee - baseFastOrder.amountIn - ); + const balanceChange = baseFastOrder.maxFee + baseFastOrder.amountIn; + expect(newOfferBalanceAfter).equals(newOfferBalanceBefore - balanceChange); expect(initialOfferBalanceAfter).equals( - initialOfferBalanceBefore + baseFastOrder.maxFee + baseFastOrder.amountIn + initialOfferBalanceBefore + balanceChange ); - expect(custodyAfter).equals(custodyBefore); + expect(custodyBalanceAfter).equals(custodyBalanceBefore); // Confirm the auction data. - const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + const auctionDataAfter = await engine.fetchAuction(vaaHash); + const { info: infoAfter } = auctionDataAfter; + expect(infoAfter).is.not.null; + const newOfferToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityTwo.publicKey @@ -1358,81 +1334,73 @@ describe("Matching Engine", function () { offerAuthorityOne.publicKey ); + // TODO: clean up to check deep equal Auction vs Auction expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ active: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(newOfferToken); - expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); - expect(auctionDataAfter.startSlot.toString()).to.eql( - auctionDataBefore.startSlot.toString() - ); - expect(auctionDataAfter.amount.toString()).to.eql( - auctionDataBefore.amount.toString() + expect(infoAfter!.bestOfferToken).to.eql(newOfferToken); + expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + expect(infoAfter!.startSlot.toString()).to.eql( + infoBefore!.startSlot.toString() ); - expect(auctionDataAfter.securityDeposit.toString()).to.eql( - auctionDataBefore.securityDeposit.toString() + expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + expect(infoAfter!.securityDeposit.toString()).to.eql( + infoBefore!.securityDeposit.toString() ); - expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); }); } it(`Improve Offer With Highest Offer Account`, async function () { - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); - const initialOfferBalanceBefore = await getTokenBalance( + const initialOfferBalanceBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; + const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); // New Offer from offerAuthorityOne. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const vaaHash = fastVaaAccount.digest(); const newOffer = baseFastOrder.maxFee - 100n; - const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const auctionDataBefore = await engine.fetchAuction(vaaHash); + const { info: infoBefore } = auctionDataBefore; + expect(infoBefore).is.not.null; + + const { bestOfferToken } = infoBefore!; await expectIxOk( connection, [ - await engine.improveOfferIx( - newOffer, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - } - ), + await engine.improveOfferIx(newOffer, vaaHash, { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + }), ], [offerAuthorityOne] ); // Validate balance changes (nothing should change). - const initialOfferBalanceAfter = await getTokenBalance( + const initialOfferBalanceAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; + const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); expect(initialOfferBalanceAfter).equals(initialOfferBalanceBefore); - expect(custodyAfter).equals(custodyBefore); + expect(custodyBalanceAfter).equals(custodyBalanceBefore); // Confirm the auction data. - const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + const auctionDataAfter = await engine.fetchAuction(vaaHash); + const { info: infoAfter } = auctionDataAfter; + expect(infoAfter).is.not.null; + const initialOfferToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityOne.publicKey @@ -1440,117 +1408,96 @@ describe("Matching Engine", function () { expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ active: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(auctionDataAfter.bestOfferToken); - expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); - expect(auctionDataAfter.startSlot.toString()).to.eql( - auctionDataBefore.startSlot.toString() + expect(infoAfter!.bestOfferToken).to.eql(infoBefore!.bestOfferToken); + expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); + expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + expect(infoAfter!.securityDeposit.toString()).to.eql( + infoBefore!.securityDeposit.toString() ); - expect(auctionDataAfter.amount.toString()).to.eql( - auctionDataBefore.amount.toString() - ); - expect(auctionDataAfter.securityDeposit.toString()).to.eql( - auctionDataBefore.securityDeposit.toString() - ); - expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); }); it(`Cannot Improve Offer (Auction Expired)`, async function () { - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // New Offer from offerAuthorityOne. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const vaaHash = fastVaaAccount.digest(); const newOffer = baseFastOrder.maxFee - 100n; - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; - await waitBySlots(connection, 3); + const { endSlot, bestOfferToken } = info!; + + await waitUntilSlot(connection, endSlot.toNumber() + 3); await expectIxErr( connection, [ - await engine.improveOfferIx( - newOffer, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - } - ), + await engine.improveOfferIx(newOffer, vaaHash, { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + }), ], [offerAuthorityOne], - "AuctionPeriodExpired" + "Error Code: AuctionPeriodExpired" ); }); it(`Cannot Improve Offer (Invalid Best Offer Token Account)`, async function () { - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // New Offer from offerAuthorityOne. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const vaaHash = fastVaaAccount.digest(); const newOffer = baseFastOrder.maxFee - 100n; // Pass the wrong address for the best offer token account. await expectIxErr( connection, [ - await engine.improveOfferIx( - newOffer, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken: engine.custodyTokenAccountAddress(), - } - ), + await engine.improveOfferIx(newOffer, vaaHash, { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken: engine.custodyTokenAccountAddress(), + }), ], [offerAuthorityOne], - "InvalidTokenAccount" + "Error Code: BestOfferTokenMismatch" ); }); it(`Cannot Improve Offer (Auction Not Active)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); + await waitBySlots(connection, 5); + // New Offer from offerAuthorityOne. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + const vaaHash = fastVaaAccount.digest(); const newOffer = baseFastOrder.maxFee - 100n; - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; - await waitBySlots(connection, 4); + const { bestOfferToken } = info!; // Excute the fast order so that the auction status changes. await expectIxOk( @@ -1558,7 +1505,7 @@ describe("Matching Engine", function () { [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, + fastVaa, }), ], [offerAuthorityOne] @@ -1567,45 +1514,39 @@ describe("Matching Engine", function () { await expectIxErr( connection, [ - await engine.improveOfferIx( - newOffer, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - } - ), + await engine.improveOfferIx(newOffer, vaaHash, { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken, + }), ], [offerAuthorityOne], - "AuctionNotActive" + "Error Code: AuctionNotActive" ); }); it(`Cannot Improve Offer (Offer Price Not Improved)`, async function () { - const [, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // New Offer from offerAuthorityOne. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; + + const { bestOfferToken } = info!; await expectIxErr( connection, [ await engine.improveOfferIx( baseFastOrder.maxFee, // Offer price not improved. - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), + vaaHash, { offerAuthority: offerAuthorityOne.publicKey, bestOfferToken, @@ -1613,7 +1554,7 @@ describe("Matching Engine", function () { ), ], [offerAuthorityOne], - "OfferPriceNotImproved" + "Error Code: OfferPriceNotImproved" ); }); }); @@ -1622,84 +1563,91 @@ describe("Matching Engine", function () { it("Execute Fast Order Within Grace Period", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityTwo, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - let bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; + + const { bestOfferToken: firstBestOfferToken, initialOfferToken } = info!; const newOffer = baseFastOrder.maxFee - 100n; // Improve the bid with offer one. await expectIxOk( connection, [ - await engine.improveOfferIx( - newOffer, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - } - ), + await engine.improveOfferIx(newOffer, vaaHash, { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken: firstBestOfferToken, + }), ], [offerAuthorityOne] ); // Fetch the balances before. - const highestOfferBefore = await getTokenBalance( + const highestOfferBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const initialBefore = await getTokenBalance( + const initialBefore = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); - const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const { info: infoBefore } = await engine.fetchAuction(vaaHash); + expect(infoBefore).is.not.null; + + const { endSlot, bestOfferToken } = infoBefore!; // Fast forward into the grace period. - await waitBySlots(connection, 3); + await waitUntilSlot(connection, endSlot.toNumber() + 2); + const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); - await expectIxOk( + const txDetails = await expectIxOkDetails( connection, [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken, initialOfferToken, }), ], [offerAuthorityOne] ); + const auctionDataAfter = await engine.fetchAuction(vaaHash); + const { info: infoAfter } = auctionDataAfter; + expect(infoAfter).is.not.null; // Validate balance changes. - const highestOfferAfter = await getTokenBalance( + const highestOfferAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const initialAfter = await getTokenBalance(connection, offerAuthorityTwo.publicKey); - const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + const initialAfter = await getUsdcAtaBalance( + connection, + offerAuthorityTwo.publicKey + ); + // console.log( + // "sometimes this fails?", + // initialBefore, + // initialAfter, + // baseFastOrder.initAuctionFee + // ); expect(initialAfter - initialBefore).equals(baseFastOrder.initAuctionFee); expect(highestOfferAfter - highestOfferBefore).equals( baseFastOrder.maxFee + newOffer @@ -1708,21 +1656,19 @@ describe("Matching Engine", function () { baseFastOrder.amountIn + baseFastOrder.maxFee ); + const slot = bigintToU64BN(BigInt(txDetails!.slot)); + // Validate auction data account. expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ completed: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); - expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); - expect(auctionDataAfter.startSlot.toString()).to.eql( - auctionDataBefore.startSlot.toString() - ); - expect(auctionDataAfter.amount.toString()).to.eql( - auctionDataBefore.amount.toString() - ); - expect(auctionDataAfter.securityDeposit.toString()).to.eql( - auctionDataBefore.securityDeposit.toString() + expect(auctionDataAfter.status).to.eql({ completed: { slot } }); + expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); + expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); + expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + expect(infoAfter!.securityDeposit.toString()).to.eql( + infoBefore!.securityDeposit.toString() ); - expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); // Validate the core message. await verifyFillMessage( @@ -1739,63 +1685,59 @@ describe("Matching Engine", function () { ); }); - it("Execute Fast Order Within Grace Period (Target == Solana)", async function () { + it.skip("Execute Fast Order Within Grace Period (Target == Solana)", async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; fastOrder.destinationCctpDomain = solanaDomain; // Start the auction with offer two so that we can // check that the initial offer is refunded. - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityTwo, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: solanaChain, - } + fastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - let bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; + + const { bestOfferToken: firstBestOfferToken, initialOfferToken } = info!; const newOffer = fastOrder.maxFee - 100n; // Improve the bid with offer one. await expectIxOk( connection, [ - await engine.improveOfferIx( - newOffer, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - } - ), + await engine.improveOfferIx(newOffer, vaaHash, { + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken: firstBestOfferToken, + }), ], [offerAuthorityOne] ); // Fetch the balances before. - const highestOfferBefore = await getTokenBalance( + const highestOfferBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const initialBefore = await getTokenBalance( + const initialBefore = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); - const auctionDataBefore = await engine.fetchAuctionData(vaaHash); - bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const auctionDataBefore = await engine.fetchAuction(vaaHash); + const { info: infoBefore } = auctionDataBefore; + expect(infoBefore).is.not.null; + + const { bestOfferToken } = infoBefore!; // Fast forward into the grace period. await waitBySlots(connection, 3); @@ -1803,9 +1745,9 @@ describe("Matching Engine", function () { await expectIxOk( connection, [ - await engine.executeFastOrderSolanaIx(vaaHash, { + await engine.executeFastOrderLocalIx(vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken, initialOfferToken, }), @@ -1814,15 +1756,20 @@ describe("Matching Engine", function () { ); // Validate balance changes. - const highestOfferAfter = await getTokenBalance( + const highestOfferAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const initialAfter = await getTokenBalance(connection, offerAuthorityTwo.publicKey); - const auctionDataAfter = await engine.fetchAuctionData(vaaHash); + const initialAfter = await getUsdcAtaBalance( + connection, + offerAuthorityTwo.publicKey + ); + const auctionDataAfter = await engine.fetchAuction(vaaHash); + const { info: infoAfter } = auctionDataAfter; + expect(infoAfter).is.not.null; expect(initialAfter - initialBefore).equals(fastOrder.initAuctionFee); expect(highestOfferAfter - highestOfferBefore).equals(fastOrder.maxFee + newOffer); @@ -1833,18 +1780,14 @@ describe("Matching Engine", function () { // Validate auction data account. expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); expect(auctionDataAfter.status).to.eql({ completed: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); - expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); - expect(auctionDataAfter.startSlot.toString()).to.eql( - auctionDataBefore.startSlot.toString() + expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); + expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); + expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + expect(infoAfter!.securityDeposit.toString()).to.eql( + infoBefore!.securityDeposit.toString() ); - expect(auctionDataAfter.amount.toString()).to.eql( - auctionDataBefore.amount.toString() - ); - expect(auctionDataAfter.securityDeposit.toString()).to.eql( - auctionDataBefore.securityDeposit.toString() - ); - expect(auctionDataAfter.offerPrice.toString()).to.eql(newOffer.toString()); + expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); // Validate the core message. await verifyFastFillMessage( @@ -1861,72 +1804,67 @@ describe("Matching Engine", function () { }); it("Execute Fast Order After Grace Period", async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info: infoBefore } = await engine.fetchAuction(vaaHash); + expect(infoBefore).is.not.null; + + const { bestOfferToken, initialOfferToken } = infoBefore!; // Fetch the balances before. - const highestOfferBefore = await getTokenBalance( + const highestOfferBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + const auctionDataBefore = await engine.fetchAuction(vaaHash); // Fast forward into the grace period. await waitBySlots(connection, 7); const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); - const txnSignature = await expectIxOk( + const txDetails = await expectIxOkDetails( connection, [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken, initialOfferToken, }), ], [offerAuthorityOne] ); - const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { - return status.value!.slot; - }); + const { slot: txSlot } = txDetails!; + + const auctionDataAfter = await engine.fetchAuction(vaaHash); + const { info: infoAfter } = auctionDataAfter; + expect(infoAfter).is.not.null; // Compute the expected penalty and user reward. - const [, expectedReward] = await calculateDynamicPenalty( - ( - await engine.fetchCustodian(engine.custodianAddress()) - ).auctionConfig, - Number(baseFastOrder.maxFee), - txnSlot - Number(auctionDataBefore.startSlot) + const { reward: expectedReward } = await engine.calculateDynamicPenalty( + infoAfter!, + BigInt(txSlot) ); // Validate balance changes. - const highestOfferAfter = await getTokenBalance( + const highestOfferAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const auctionDataAfter = await engine.fetchAuctionData(vaaHash); // The highest bidder is also the initial bidder in this case. The highest bidder // is also executing the fast order after the grace period has ended, so they will @@ -1943,21 +1881,17 @@ describe("Matching Engine", function () { // Validate auction data account. expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ completed: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); - expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); - expect(auctionDataAfter.startSlot.toString()).to.eql( - auctionDataBefore.startSlot.toString() - ); - expect(auctionDataAfter.amount.toString()).to.eql( - auctionDataBefore.amount.toString() - ); - expect(auctionDataAfter.securityDeposit.toString()).to.eql( - auctionDataBefore.securityDeposit.toString() - ); - expect(auctionDataAfter.offerPrice.toString()).to.eql( - baseFastOrder.maxFee.toString() + expect(auctionDataAfter.status).to.eql({ + completed: { slot: bigintToU64BN(BigInt(txSlot)) }, + }); + expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); + expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); + expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + expect(infoAfter!.securityDeposit.toString()).to.eql( + infoBefore!.securityDeposit.toString() ); + expect(infoAfter!.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); // Validate the core message. await verifyFillMessage( @@ -1978,38 +1912,34 @@ describe("Matching Engine", function () { }); it(`Execute Fast Order With Liquidator (Within Penalty Period)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info: infoBefore } = await engine.fetchAuction(vaaHash); + expect(infoBefore).is.not.null; + const { bestOfferToken, initialOfferToken } = infoBefore!; // Fetch the balances before. - const highestOfferBefore = await getTokenBalance( + const highestOfferBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const liquidatorBefore = await getTokenBalance( + const liquidatorBefore = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); - const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + const auctionDataBefore = await engine.fetchAuction(vaaHash); // Fast forward into tge penalty period. await waitBySlots(connection, 10); @@ -2021,7 +1951,7 @@ describe("Matching Engine", function () { [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityTwo.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken, initialOfferToken, }), @@ -2031,29 +1961,26 @@ describe("Matching Engine", function () { const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { return status.value!.slot; }); + const auctionDataAfter = await engine.fetchAuction(vaaHash); + const { info: infoAfter } = auctionDataAfter; + expect(infoAfter).is.not.null; // Compute the expected penalty and user reward. - const [expectedPenalty, expectedReward] = await calculateDynamicPenalty( - ( - await engine.fetchCustodian(engine.custodianAddress()) - ).auctionConfig, - Number(baseFastOrder.maxFee), - txnSlot - Number(auctionDataBefore.startSlot) - ); + const { penalty: expectedPenalty, reward: expectedReward } = + await engine.calculateDynamicPenalty(infoAfter!, BigInt(txnSlot)); // Validate balance changes. - const highestOfferAfter = await getTokenBalance( + const highestOfferAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const liquidatorAfter = await getTokenBalance( + const liquidatorAfter = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const auctionDataAfter = await engine.fetchAuctionData(vaaHash); expect(highestOfferAfter - highestOfferBefore).equals( baseFastOrder.maxFee + @@ -2069,21 +1996,17 @@ describe("Matching Engine", function () { // Validate auction data account. expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ completed: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); - expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); - expect(auctionDataAfter.startSlot.toString()).to.eql( - auctionDataBefore.startSlot.toString() - ); - expect(auctionDataAfter.amount.toString()).to.eql( - auctionDataBefore.amount.toString() - ); - expect(auctionDataAfter.securityDeposit.toString()).to.eql( - auctionDataBefore.securityDeposit.toString() - ); - expect(auctionDataAfter.offerPrice.toString()).to.eql( - baseFastOrder.maxFee.toString() + expect(auctionDataAfter.status).to.eql({ + completed: { slot: bigintToU64BN(BigInt(txnSlot)) }, + }); + expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); + expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); + expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + expect(infoAfter!.securityDeposit.toString()).to.eql( + infoBefore!.securityDeposit.toString() ); + expect(infoAfter!.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); // Validate the core message. await verifyFillMessage( @@ -2104,41 +2027,38 @@ describe("Matching Engine", function () { }); it(`Execute Fast Order With Liquidator (Post Penalty Period)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info: infoBefore } = await engine.fetchAuction(vaaHash); + expect(infoBefore).is.not.null; + + const { bestOfferToken, initialOfferToken } = infoBefore!; // Fetch the balances before. - const highestOfferBefore = await getTokenBalance( + const highestOfferBefore = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); const custodyBefore = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const liquidatorBefore = await getTokenBalance( + const liquidatorBefore = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); - const auctionDataBefore = await engine.fetchAuctionData(vaaHash); + const auctionDataBefore = await engine.fetchAuction(vaaHash); // Fast forward past the penalty period. - await waitBySlots(connection, 15); + await waitBySlots(connection, 20); // Execute the fast order with the liquidator (offerAuthorityTwo). const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); @@ -2147,7 +2067,7 @@ describe("Matching Engine", function () { [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityTwo.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken, initialOfferToken, }), @@ -2157,33 +2077,30 @@ describe("Matching Engine", function () { const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { return status.value!.slot; }); + const auctionDataAfter = await engine.fetchAuction(vaaHash); + const { info: infoAfter } = auctionDataAfter; + expect(infoAfter).is.not.null; // Compute the expected penalty and user reward. - const [expectedPenalty, expectedReward] = await calculateDynamicPenalty( - ( - await engine.fetchCustodian(engine.custodianAddress()) - ).auctionConfig, - Number(baseFastOrder.maxFee), - txnSlot - Number(auctionDataBefore.startSlot) - ); + const { penalty: expectedPenalty, reward: expectedReward } = + await engine.calculateDynamicPenalty(infoAfter!, BigInt(txnSlot)); // Since we are beyond the penalty period, the entire security deposit // is divided between the highest bidder and the liquidator. - expect(baseFastOrder.maxFee).equals(BigInt(expectedReward + expectedPenalty)); + expect(baseFastOrder.maxFee).equals(expectedReward + expectedPenalty); // Validate balance changes. - const highestOfferAfter = await getTokenBalance( + const highestOfferAfter = await getUsdcAtaBalance( connection, offerAuthorityOne.publicKey ); - const liquidatorAfter = await getTokenBalance( + const liquidatorAfter = await getUsdcAtaBalance( connection, offerAuthorityTwo.publicKey ); const custodyAfter = ( await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) ).amount; - const auctionDataAfter = await engine.fetchAuctionData(vaaHash); expect(highestOfferAfter - highestOfferBefore).equals( baseFastOrder.maxFee + @@ -2199,21 +2116,17 @@ describe("Matching Engine", function () { // Validate auction data account. expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ completed: {} }); - expect(auctionDataAfter.bestOfferToken).to.eql(bestOfferToken); - expect(auctionDataAfter.initialOfferToken).to.eql(initialOfferToken); - expect(auctionDataAfter.startSlot.toString()).to.eql( - auctionDataBefore.startSlot.toString() - ); - expect(auctionDataAfter.amount.toString()).to.eql( - auctionDataBefore.amount.toString() - ); - expect(auctionDataAfter.securityDeposit.toString()).to.eql( - auctionDataBefore.securityDeposit.toString() - ); - expect(auctionDataAfter.offerPrice.toString()).to.eql( - baseFastOrder.maxFee.toString() + expect(auctionDataAfter.status).to.eql({ + completed: { slot: bigintToU64BN(BigInt(txnSlot)) }, + }); + expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); + expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); + expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + expect(infoAfter!.securityDeposit.toString()).to.eql( + infoBefore!.securityDeposit.toString() ); + expect(infoAfter!.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); // Validate the core message. await verifyFillMessage( @@ -2233,116 +2146,98 @@ describe("Matching Engine", function () { ); }); - it(`Cannot Execute Fast Order (Invalid Chain)`, async function () { + it.skip(`Cannot Execute Fast Order (Invalid Chain)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; fastOrder.destinationCctpDomain = solanaDomain; - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: solanaChain, - } + fastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; + + const { bestOfferToken, initialOfferToken } = info!; await expectIxErr( connection, [ await engine.executeFastOrderCctpIx(solanaChain, solanaDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken, initialOfferToken, }), ], [offerAuthorityOne], - "InvalidChain" + "Error Code: InvalidChain" ); }); - it(`Cannot Execute Fast Order (Vaa Hash Mismatch)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + it.skip(`Cannot Execute Fast Order (Vaa Hash Mismatch)`, async function () { + const { fastVaa } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); - const [vaaKey2, signedVaa2] = await placeInitialOfferForTest( - connection, + const { fastVaa: anotherFastVaa } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); - // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + // TODO: This should be a constraint seeds error. - // Fast forward past the penalty period. - await waitBySlots(connection, 15); - - await expectIxErr( - connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash2, { - payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, - }), - ], - [offerAuthorityOne], - "MismatchedVaaHash" - ); + // Accounts for the instruction. + // const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + // const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); + // const { bestOfferToken, initialOfferToken } = await engine.fetchAuction(vaaHash); + + // // Fast forward past the penalty period. + // await waitBySlots(connection, 15); + + // await expectIxErr( + // connection, + // [ + // await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash2, { + // payer: offerAuthorityOne.publicKey, + // vaa: vaaKey, + // bestOfferToken, + // initialOfferToken, + // }), + // ], + // [offerAuthorityOne], + // "MismatchedVaaHash" + // ); }); it(`Cannot Execute Fast Order (Invalid Best Offer Token Account)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); // Pass the wrong address for the best offer token account. await expectIxErr( @@ -2350,34 +2245,27 @@ describe("Matching Engine", function () { [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken: engine.custodyTokenAccountAddress(), - initialOfferToken, }), ], [offerAuthorityOne], - "InvalidTokenAccount" + "Error Code: BestOfferTokenMismatch" ); }); it(`Cannot Execute Fast Order (Invalid Initial Offer Token Account)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); // Pass the wrong address for the initial offer token account. await expectIxErr( @@ -2385,47 +2273,41 @@ describe("Matching Engine", function () { [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, + fastVaa, initialOfferToken: engine.custodyTokenAccountAddress(), }), ], [offerAuthorityOne], - "InvalidTokenAccount" + "Error Code: InitialOfferTokenMismatch" ); }); it(`Cannot Execute Fast Order (Auction Not Active)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; + + const { endSlot } = info!; // Fast forward into the grace period. - await waitBySlots(connection, 4); + await waitUntilSlot(connection, endSlot.addn(2).toNumber()); await expectIxOk( connection, [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, + fastVaa, }), ], [offerAuthorityOne] @@ -2437,35 +2319,26 @@ describe("Matching Engine", function () { [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, + fastVaa, }), ], [offerAuthorityOne], - "AuctionNotActive" + "Error Code: AuctionNotActive" ); }); it(`Cannot Execute Fast Order (Auction Period Not Expired)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); // Do not fast forward into the grace period. @@ -2475,222 +2348,183 @@ describe("Matching Engine", function () { [ await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, + fastVaa, }), ], [offerAuthorityOne], - "AuctionPeriodNotExpired" + "Error Code: AuctionPeriodNotExpired" ); }); - it(`Cannot Execute Fast Order Solana (Invalid Chain)`, async function () { - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + it.skip(`Cannot Execute Fast Order Solana (Invalid Chain)`, async function () { + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: arbChain, - } + baseFastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); await expectIxErr( connection, [ - await engine.executeFastOrderSolanaIx(vaaHash, { + await engine.executeFastOrderLocalIx(vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, + fastVaa, toRouterEndpoint: engine.routerEndpointAddress(arbChain), }), ], [offerAuthorityOne], - "InvalidChain" + "Error Code: InvalidChain" ); }); - it(`Cannot Execute Fast Order Solana (Vaa Hash Mismatch)`, async function () { + it.skip(`Cannot Execute Fast Order Solana (Vaa Hash Mismatch)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; fastOrder.destinationCctpDomain = solanaDomain; - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: baseFastOrder.maxFee, - fromChain: ethChain, - toChain: solanaChain, - } + baseFastOrder.maxFee ); - const [vaaKey2, signedVaa2] = await placeInitialOfferForTest( - connection, + const { fastVaa: anotherFastVaa } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: solanaChain, - } + fastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); - - // Fast forward past the penalty period. - await waitBySlots(connection, 15); - - await expectIxErr( - connection, - [ - await engine.executeFastOrderSolanaIx(vaaHash2, { - payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, - }), - ], - [offerAuthorityOne], - "MismatchedVaaHash" - ); - }); - - it(`Cannot Execute Fast Order Solana (Invalid Best Offer Token Account)`, async function () { + // const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); + // const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); + // const { bestOfferToken, initialOfferToken } = await engine.fetchAuction(vaaHash); + + // // Fast forward past the penalty period. + // await waitBySlots(connection, 15); + + // await expectIxErr( + // connection, + // [ + // await engine.executeFastOrderLocalIx(vaaHash2, { + // payer: offerAuthorityOne.publicKey, + // vaa: vaaKey, + // bestOfferToken, + // initialOfferToken, + // }), + // ], + // [offerAuthorityOne], + // "MismatchedVaaHash" + // ); + }); + + it.skip(`Cannot Execute Fast Order Solana (Invalid Best Offer Token Account)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; fastOrder.destinationCctpDomain = solanaDomain; - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: solanaChain, - } + fastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); // Pass the wrong address for the best offer token account. await expectIxErr( connection, [ - await engine.executeFastOrderSolanaIx(vaaHash, { + await engine.executeFastOrderLocalIx(vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, + fastVaa, bestOfferToken: engine.custodyTokenAccountAddress(), - initialOfferToken, }), ], [offerAuthorityOne], - "InvalidTokenAccount" + "Error Code: BestOfferTokenMismatch" ); }); - it(`Cannot Execute Fast Order Solana (Invalid Initial Offer Token Account)`, async function () { + it.skip(`Cannot Execute Fast Order Solana (Invalid Initial Offer Token Account)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; fastOrder.destinationCctpDomain = solanaDomain; - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: solanaChain, - } + fastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); + const vaaHash = fastVaaAccount.digest(); // Pass the wrong address for the initial offer token account. await expectIxErr( connection, [ - await engine.executeFastOrderSolanaIx(vaaHash, { + await engine.executeFastOrderLocalIx(vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, + fastVaa, initialOfferToken: engine.custodyTokenAccountAddress(), }), ], [offerAuthorityOne], - "InvalidTokenAccount" + "Error Code: InitialOfferTokenMismatch" ); }); - it(`Cannot Execute Fast Order Solana (Auction Not Active)`, async function () { + it.skip(`Cannot Execute Fast Order Solana (Auction Not Active)`, async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; fastOrder.destinationCctpDomain = solanaDomain; - const [vaaKey, signedVaa] = await placeInitialOfferForTest( - connection, + const { fastVaa } = await placeInitialOfferForTest( + engine, offerAuthorityOne, wormholeSequence++, fastOrder, ethRouter, - engine, - { - feeOffer: fastOrder.maxFee, - fromChain: ethChain, - toChain: solanaChain, - } + fastOrder.maxFee ); // Accounts for the instruction. - const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - const bestOfferToken = await engine.getBestOfferTokenAccount(vaaHash); - const initialOfferToken = await engine.getInitialOfferTokenAccount(vaaHash); + const vaaHash = await VaaAccount.fetch(connection, fastVaa).then((vaa) => + vaa.digest() + ); + const { info } = await engine.fetchAuction(vaaHash); + expect(info).is.not.null; + + const { endSlot } = info!; // Fast forward into the grace period. - await waitBySlots(connection, 4); + await waitUntilSlot(connection, endSlot.addn(2).toNumber()); await expectIxOk( connection, [ - await engine.executeFastOrderSolanaIx(vaaHash, { + await engine.executeFastOrderLocalIx(vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, + fastVaa, }), ], [offerAuthorityOne] @@ -2700,30 +2534,23 @@ describe("Matching Engine", function () { await expectIxErr( connection, [ - await engine.executeFastOrderSolanaIx(vaaHash, { + await engine.executeFastOrderLocalIx(vaaHash, { payer: offerAuthorityOne.publicKey, - vaa: vaaKey, - bestOfferToken, - initialOfferToken, + fastVaa, }), ], [offerAuthorityOne], - "AuctionNotActive" + "Error Code: AuctionNotActive" ); }); }); - describe("Prepare Auction Settlement", function () { - let testCctpNonce = 2n ** 64n - 1n; - - // Hack to prevent math overflow error when invoking CCTP programs. - testCctpNonce -= 10n * 6400n; - + describe("Prepare Order Response", function () { const localVariables = new Map(); // TODO: add negative tests - it("Prepare Auction Settlement", async function () { + it("Prepare Order Response", async function () { const redeemer = Keypair.generate(); const sourceCctpDomain = 0; @@ -2789,7 +2616,7 @@ describe("Matching Engine", function () { finalizedMessage ); - const ix = await engine.prepareAuctionSettlementCctpIx( + const ix = await engine.prepareOrderResponseCctpIx( { payer: payer.publicKey, fastVaa, @@ -2812,78 +2639,316 @@ describe("Matching Engine", function () { const fastVaaHash = await VaaAccount.fetch(connection, fastVaa).then((vaa) => vaa.digest() ); - const preparedAuctionSettlement = engine.preparedAuctionSettlementAddress( + const preparedOrderResponse = engine.preparedOrderResponseAddress( payer.publicKey, fastVaaHash ); // Save for later. localVariables.set("ix", ix); - localVariables.set("preparedAuctionSettlement", preparedAuctionSettlement); + localVariables.set("preparedOrderResponse", preparedOrderResponse); }); - it("Cannot Prepare Auction Settlement for Same VAAs", async function () { + it("Cannot Prepare Order Response for Same VAAs", async function () { const ix = localVariables.get("ix") as TransactionInstruction; expect(localVariables.delete("ix")).is.true; - const preparedAuctionSettlement = localVariables.get( - "preparedAuctionSettlement" + const preparedOrderResponse = localVariables.get( + "preparedOrderResponse" ) as PublicKey; - expect(localVariables.delete("preparedAuctionSettlement")).is.true; + expect(localVariables.delete("preparedOrderResponse")).is.true; await expectIxErr( connection, [ix], [payer], - `Allocate: account Address { address: ${preparedAuctionSettlement.toString()}, base: None } already in use` + `Allocate: account Address { address: ${preparedOrderResponse.toString()}, base: None } already in use` ); }); }); + + describe("Settle Auction", function () { + describe("Auction Complete", function () { + it("Cannot Settle Auction in Active Status", async function () { + const { prepareIx, preparedOrderResponse, auction } = + await prepareOrderResponse({ + initAuction: true, + executeOrder: false, + prepareOrderRespsonse: false, + }); + + const settleIx = await engine.settleAuctionCompleteIx({ + preparedOrderResponse, + preparedBy: payer.publicKey, + auction, + }); + + await expectIxErr( + connection, + [prepareIx!, settleIx], + [payer], + "Error Code: AuctionNotCompleted" + ); + }); + + it.skip("Prepare and Settle", async function () { + const { + fastVaa, + fastVaaAccount, + finalizedVaa, + prepareIx, + preparedOrderResponse, + auction, + } = await prepareOrderResponse({ + initAuction: true, + executeOrder: true, + prepareOrderRespsonse: false, + }); + + const settleIx = await engine.settleAuctionCompleteIx({ + preparedOrderResponse, + preparedBy: payer.publicKey, + auction, + }); + + await expectIxOk(connection, [prepareIx!, settleIx], [payer]); + }); + }); + + describe("Settle No Auction (CCTP)", function () { + const localVariables = new Map(); + + it("Settle", async function () { + const { fastVaa, fastVaaAccount, finalizedVaaAccount, preparedOrderResponse } = + await prepareOrderResponse({ + initAuction: false, + executeOrder: false, + prepareOrderRespsonse: true, + }); + + const settleIx = await engine.settleAuctionNoneCctpIx({ + payer: payer.publicKey, + fastVaa, + preparedOrderResponse, + }); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + + const { amount: feeBalanceBefore } = await splToken.getAccount( + connection, + feeRecipientToken + ); + const { amount: custodyBalanceBefore } = + await engine.fetchCustodyTokenAccount(); + + await expectIxOk(connection, [computeIx, settleIx], [payer]); + + const deposit = LiquidityLayerMessage.decode(finalizedVaaAccount.payload()) + .deposit!; + + const { baseFee } = deposit.message.slowOrderResponse!; + const { amount: feeBalanceAfter } = await splToken.getAccount( + connection, + feeRecipientToken + ); + expect(feeBalanceAfter).equals(feeBalanceBefore + baseFee); + + const { amount } = deposit.header; + const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + expect(custodyBalanceAfter).equals(custodyBalanceBefore - amount); + + const fastVaaHash = fastVaaAccount.digest(); + const auctionData = await engine.fetchAuction(fastVaaHash); + const { bump } = auctionData; + expect(auctionData).to.eql( + new Auction( + bump, + Array.from(fastVaaHash), + { + settled: { + baseFee: bigintToU64BN(baseFee), + penalty: null, + }, + }, + null + ) + ); + }); + }); + + async function prepareOrderResponse(args: { + initAuction: boolean; + executeOrder: boolean; + prepareOrderRespsonse: boolean; + }) { + const { initAuction, executeOrder, prepareOrderRespsonse } = args; + + const redeemer = Keypair.generate(); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage(engine, sourceCctpDomain, cctpNonce, amountIn); + + const maxFee = 42069n; + const currTime = await connection.getBlockTime(await connection.getSlot()); + const fastMessage = new LiquidityLayerMessage({ + fastMarketOrder: { + amountIn, + minAmountOut: 0n, + targetChain: arbChain, + destinationCctpDomain: arbDomain, + redeemer: Array.from(redeemer.publicKey.toBuffer()), + sender: new Array(32).fill(0), + refundAddress: new Array(32).fill(0), + maxFee, + initAuctionFee: 2000n, + deadline: currTime! + 2, + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + }); + + const finalizedMessage = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount: amountIn, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: Array.from( + engine.custodyTokenAccountAddress().toBuffer() + ), + }, + { + slowOrderResponse: { + baseFee: 420n, + }, + } + ), + }); + + const fastVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + fastMessage + ); + const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); + + const finalizedVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + finalizedMessage + ); + const finalizedVaaAccount = await VaaAccount.fetch(connection, finalizedVaa); + + const prepareIx = await engine.prepareOrderResponseCctpIx( + { + payer: payer.publicKey, + fastVaa, + finalizedVaa, + }, + { + encodedCctpMessage, + cctpAttestation, + } + ); + + const fastVaaHash = fastVaaAccount.digest(); + const preparedBy = payer.publicKey; + const preparedOrderResponse = engine.preparedOrderResponseAddress( + preparedBy, + fastVaaHash + ); + const auction = engine.auctionAddress(fastVaaHash); + + if (initAuction) { + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + }, + maxFee + ); + await expectIxOk(connection, [ix], [offerAuthorityOne]); + + if (executeOrder) { + // TODO + } + } + + if (prepareOrderRespsonse) { + await expectIxOk(connection, [prepareIx], [payer]); + } + + return { + fastVaa, + fastVaaAccount, + finalizedVaa, + finalizedVaaAccount, + prepareIx: prepareOrderRespsonse ? null : prepareIx, + preparedOrderResponse, + auction, + preparedBy, + }; + } + }); }); }); async function placeInitialOfferForTest( - connection: Connection, + engine: MatchingEngineProgram, offerAuthority: Keypair, sequence: bigint, - fastOrder: FastMarketOrder, + fastMarketOrder: FastMarketOrder, emitter: number[], - engine: MatchingEngineProgram, - args: { - feeOffer: bigint; - fromChain: wormholeSdk.ChainId; - toChain: wormholeSdk.ChainId; - } -): Promise<[PublicKey, Buffer]> { - const [vaaKey, signedVaa] = await postFastTransferVaa( + feeOffer: bigint, + chainName?: wormholeSdk.ChainName +): Promise<{ + fastVaa: PublicKey; + fastVaaAccount: VaaAccount; + txDetails: VersionedTransactionResponse; +}> { + const connection = engine.program.provider.connection; + const fastVaa = await postLiquidityLayerVaa( connection, offerAuthority, MOCK_GUARDIANS, + emitter, sequence, - fastOrder, - "0x" + Buffer.from(emitter).toString("hex") + new LiquidityLayerMessage({ fastMarketOrder }), + chainName ); // Place the initial offer. - await expectIxOk( - connection, - [ - await engine.placeInitialOfferIx( - args.feeOffer, - args.fromChain, - args.toChain, - wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash), - { - payer: offerAuthority.publicKey, - vaa: vaaKey, - mint: USDC_MINT_ADDRESS, - } - ), - ], - [offerAuthority] + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthority.publicKey, + fastVaa, + }, + feeOffer ); - return [vaaKey, signedVaa]; + const txDetails = await expectIxOkDetails(connection, [ix], [offerAuthority]); + if (txDetails === null) { + throw new Error("Transaction details is null"); + } + + const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); + + return { fastVaa, fastVaaAccount, txDetails }; } async function craftCctpTokenBurnMessage( diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 2d79ebea..8fbaa4dd 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -1,6 +1,5 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; -import { BN } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { AddressLookupTableProgram, @@ -22,6 +21,7 @@ import { OWNER_ASSISTANT_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, + bigintToU64BN, expectIxErr, expectIxOk, postLiquidityLayerVaa, @@ -42,7 +42,11 @@ describe("Token Router", function () { const foreignEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const foreignCctpDomain = 0; const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); - const tokenRouter = new TokenRouterProgram(connection); + const tokenRouter = new TokenRouterProgram( + connection, + "TokenRouter11111111111111111111111111111111", + USDC_MINT_ADDRESS + ); let lookupTableAddress: PublicKey; @@ -56,14 +60,23 @@ describe("Token Router", function () { ownerAssistant: ownerAssistant.publicKey, mint, }); - await expectIxErr(connection, [ix], [payer], "Error Code: NotUsdc"); + const unknownAta = splToken.getAssociatedTokenAddressSync( + mint, + tokenRouter.custodianAddress(), + true + ); + await expectIxErr( + connection, + [ix], + [payer], + `Instruction references an unknown account ${unknownAta.toString()}` + ); }); it("Cannot Initialize with Default Owner Assistant", async function () { const ix = await tokenRouter.initializeIx({ owner: payer.publicKey, ownerAssistant: PublicKey.default, - mint: USDC_MINT_ADDRESS, }); await expectIxErr(connection, [ix], [payer], "Error Code: AssistantZeroPubkey"); @@ -73,14 +86,11 @@ describe("Token Router", function () { const ix = await tokenRouter.initializeIx({ owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, - mint: USDC_MINT_ADDRESS, }); await expectIxOk(connection, [ix], [payer]); - const custodianData = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const custodianData = await tokenRouter.fetchCustodian(); expect(custodianData).to.eql( new Custodian( false, // paused @@ -102,7 +112,6 @@ describe("Token Router", function () { const ix = await tokenRouter.initializeIx({ owner: payer.publicKey, ownerAssistant: ownerAssistant.publicKey, - mint: USDC_MINT_ADDRESS, }); await expectIxErr( @@ -179,9 +188,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer]); // Confirm that the pending owner variable is set in the owner config. - const { pendingOwner } = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const { pendingOwner } = await tokenRouter.fetchCustodian(); expect(pendingOwner).deep.equals(owner.publicKey); }); @@ -202,9 +209,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer]); // Confirm the pending owner field was reset. - const { pendingOwner } = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const { pendingOwner } = await tokenRouter.fetchCustodian(); expect(pendingOwner).deep.equals(null); }); @@ -217,9 +222,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer]); // Confirm that the pending owner variable is set in the owner config. - const { pendingOwner } = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const { pendingOwner } = await tokenRouter.fetchCustodian(); expect(pendingOwner).deep.equals(owner.publicKey); }); @@ -246,9 +249,7 @@ describe("Token Router", function () { // Confirm that the owner config reflects the current ownership status. { - const { owner: actualOwner, pendingOwner } = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const { owner: actualOwner, pendingOwner } = await tokenRouter.fetchCustodian(); expect(actualOwner).deep.equals(owner.publicKey); expect(pendingOwner).deep.equals(null); } @@ -310,9 +311,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [payer, owner]); // Confirm the assistant field was updated. - const { ownerAssistant: actualOwnerAssistant } = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const { ownerAssistant: actualOwnerAssistant } = await tokenRouter.fetchCustodian(); expect(actualOwnerAssistant).to.eql(relayer.publicKey); // Set the assistant back to the assistant key. @@ -470,9 +469,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [ownerAssistant]); - const { paused: actualPaused, pausedSetBy } = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const { paused: actualPaused, pausedSetBy } = await tokenRouter.fetchCustodian(); expect(actualPaused).equals(paused); expect(pausedSetBy).eql(ownerAssistant.publicKey); }); @@ -488,9 +485,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [owner]); - const { paused: actualPaused, pausedSetBy } = await tokenRouter.fetchCustodian( - tokenRouter.custodianAddress() - ); + const { paused: actualPaused, pausedSetBy } = await tokenRouter.fetchCustodian(); expect(actualPaused).equals(paused); expect(pausedSetBy).eql(owner.publicKey); }); @@ -498,6 +493,13 @@ describe("Token Router", function () { }); describe("Business Logic", function () { + let testCctpNonce = 2n ** 64n - 1n; + + // Hack to prevent math overflow error when invoking CCTP programs. + testCctpNonce -= 20n * 6400n; + + let wormholeSequence = 2000n; + describe("Preparing Order", function () { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, @@ -514,6 +516,10 @@ describe("Token Router", function () { // TODO }); + it.skip("Cannot Prepare Market Order without Delegating Authority to Custodian", async function () { + // TODO + }); + it("Prepare Market Order with Some Min Amount Out", async function () { const orderSender = Keypair.generate(); const preparedOrder = Keypair.generate(); @@ -542,7 +548,7 @@ describe("Token Router", function () { const approveIx = splToken.createApproveInstruction( payerToken, - orderSender.publicKey, + tokenRouter.custodianAddress(), payer.publicKey, amountIn ); @@ -564,20 +570,12 @@ describe("Token Router", function () { preparedBy: payer.publicKey, orderType: { market: { - minAmountOut: (() => { - const buf = Buffer.alloc(8); - buf.writeBigUInt64BE(minAmountOut); - return new BN(buf); - })(), + minAmountOut: bigintToU64BN(minAmountOut), }, }, orderToken: payerToken, refundToken: payerToken, - amountIn: (() => { - const buf = Buffer.alloc(8); - buf.writeBigUInt64BE(amountIn); - return new BN(buf); - })(), + amountIn: bigintToU64BN(amountIn), targetChain, redeemer, }, @@ -610,7 +608,7 @@ describe("Token Router", function () { const approveIx = splToken.createApproveInstruction( payerToken, - orderSender.publicKey, + tokenRouter.custodianAddress(), payer.publicKey, amountIn ); @@ -968,7 +966,7 @@ describe("Token Router", function () { const approveIx = splToken.createApproveInstruction( payerToken, - orderSender.publicKey, + tokenRouter.custodianAddress(), payer.publicKey, amountIn ); @@ -1049,13 +1047,6 @@ describe("Token Router", function () { const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); const redeemer = Keypair.generate(); - let testCctpNonce = 2n ** 64n - 1n; - - // Hack to prevent math overflow error when invoking CCTP programs. - testCctpNonce -= 20n * 6400n; - - let wormholeSequence = 2000n; - const localVariables = new Map(); it("Cannot Redeem Fill from Invalid Source Router Chain", async function () { @@ -1482,13 +1473,6 @@ describe("Token Router", function () { describe("Consume Prepared Fill", function () { const redeemer = Keypair.generate(); - let testCctpNonce = 2n ** 64n - 1n; - - // Hack to prevent math overflow error when invoking CCTP programs. - testCctpNonce -= 21n * 6400n; - - let wormholeSequence = 2100n; - const localVariables = new Map(); it.skip("Redeem Fill (CCTP)", async function () { diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 01690b01..0c20c66c 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -14,6 +14,7 @@ import { OWNER_ASSISTANT_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, + bigintToU64BN, expectIxErr, expectIxOk, postLiquidityLayerVaa, @@ -28,8 +29,16 @@ describe("Matching Engine <> Token Router", function () { const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const foreignChain = wormholeSdk.CHAINS.ethereum; - const tokenRouter = new tokenRouterSdk.TokenRouterProgram(connection); - const matchingEngine = new matchingEngineSdk.MatchingEngineProgram(connection); + const matchingEngine = new matchingEngineSdk.MatchingEngineProgram( + connection, + "MatchingEngine11111111111111111111111111111", + USDC_MINT_ADDRESS + ); + const tokenRouter = new tokenRouterSdk.TokenRouterProgram( + connection, + "TokenRouter11111111111111111111111111111111", + matchingEngine.mint + ); describe("Redeem Fast Fill", function () { const payerToken = splToken.getAssociatedTokenAddressSync( @@ -44,7 +53,7 @@ describe("Matching Engine <> Token Router", function () { const localVariables = new Map(); - it("Token Router ..... Cannot Redeem Fast Fill as Unregistered Token Router", async function () { + it("Token Router ..... Cannot Redeem Fast Fill without Local Router Endpoint", async function () { const amount = 69n; const message = new LiquidityLayerMessage({ fastFill: { @@ -67,44 +76,19 @@ describe("Matching Engine <> Token Router", function () { message, "solana" ); + const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, vaa, }); - await expectIxErr(connection, [ix], [payer], "Error Code: ConstraintAddress"); + await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized"); // Save for later. localVariables.set("vaa", vaa); localVariables.set("amount", amount); }); - it("Matching Engine .. Remove Local Router Endpoint", async function () { - const ix = await matchingEngine.removeRouterEndpointIx( - { - ownerOrAssistant: ownerAssistant.publicKey, - }, - wormholeSdk.CHAIN_ID_SOLANA - ); - await expectIxOk(connection, [ix], [ownerAssistant]); - - const accInfo = await connection.getAccountInfo( - matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) - ); - expect(accInfo).is.null; - }); - - it("Token Router ..... Cannot Redeem Fast Fill without Local Router Endpoint", async function () { - const vaa = localVariables.get("vaa") as PublicKey; - - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, - }); - - await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized"); - }); - it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { const ix = await matchingEngine.addLocalRouterEndpointIx({ ownerOrAssistant: ownerAssistant.publicKey, @@ -113,7 +97,7 @@ describe("Matching Engine <> Token Router", function () { await expectIxOk(connection, [ix], [ownerAssistant]); const routerEndpointData = await matchingEngine.fetchRouterEndpoint( - matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA) + wormholeSdk.CHAIN_ID_SOLANA ); expect(routerEndpointData).to.eql( new matchingEngineSdk.RouterEndpoint( @@ -148,9 +132,9 @@ describe("Matching Engine <> Token Router", function () { // Check redeemed fast fill account. const redeemedFastFill = matchingEngine.redeemedFastFillAddress(vaaHash); - const redeemedFastFillData = await matchingEngine.fetchRedeemedFastFill( - redeemedFastFill - ); + const redeemedFastFillData = await matchingEngine.fetchRedeemedFastFill({ + address: redeemedFastFill, + }); // The VAA hash can change depending on the message (sequence is usually the reason for // this). So we just take the bump from the fetched data and move on with our lives. @@ -177,11 +161,7 @@ describe("Matching Engine <> Token Router", function () { { fastFill: {} }, foreignChain, orderSender, - (() => { - const buf = Buffer.alloc(8); - buf.writeBigUInt64BE(amount); - return new BN(buf); - })() + bigintToU64BN(amount) ) ); } diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts index 918ed1f4..e3ef7a96 100644 --- a/solana/ts/tests/helpers/consts.ts +++ b/solana/ts/tests/helpers/consts.ts @@ -2,10 +2,6 @@ import { PublicKey, Keypair } from "@solana/web3.js"; import { CONTRACTS } from "@certusone/wormhole-sdk"; import { MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; -export const SWAP_RATE_PRECISION = 10 ** 8; - -export const MAX_BPS_FEE = 1_000_000; - export const WORMHOLE_CONTRACTS = CONTRACTS.TESTNET; export const CORE_BRIDGE_PID = new PublicKey(WORMHOLE_CONTRACTS.solana.core); diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts index a66c2047..9b86f9e3 100644 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ b/solana/ts/tests/helpers/matching_engine_utils.ts @@ -1,147 +1,16 @@ -import { - CHAIN_ID_ETH, - ChainId, - coalesceChainId, - parseVaa, - tryNativeToHexString, -} from "@certusone/wormhole-sdk"; -import { MockEmitter, MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; -import { getAssociatedTokenAddressSync, getAccount } from "@solana/spl-token"; -import { derivePostedVaaKey } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; -import { Connection, Keypair, PublicKey } from "@solana/web3.js"; -import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; -import { WORMHOLE_CONTRACTS, USDC_MINT_ADDRESS, MAX_BPS_FEE } from "../../tests/helpers"; -import { AuctionConfig } from "../../src/matchingEngine"; import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; -import { Fill, LiquidityLayerMessage, FastMarketOrder } from "../../src"; - +import { getAccount, getAssociatedTokenAddressSync } from "@solana/spl-token"; +import { Connection, PublicKey } from "@solana/web3.js"; import { expect } from "chai"; +import { Fill, LiquidityLayerMessage } from "../../src"; +import { USDC_MINT_ADDRESS } from "../../tests/helpers"; -export async function getTokenBalance(connection: Connection, address: PublicKey) { - return (await getAccount(connection, getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, address))) - .amount; -} - -export async function postVaa( - connection: Connection, - payer: Keypair, - vaaBuf: Buffer, - coreBridgeAddress?: PublicKey -) { - await postVaaSolana( +export async function getUsdcAtaBalance(connection: Connection, owner: PublicKey) { + const { amount } = await getAccount( connection, - new wormSolana.NodeWallet(payer).signTransaction, - coreBridgeAddress ?? WORMHOLE_CONTRACTS.solana.core, - payer.publicKey, - vaaBuf - ); -} - -export function encodeFastMarketOrder(order: FastMarketOrder): Buffer { - const encodedFastOrder = new LiquidityLayerMessage({ fastMarketOrder: order }).encode(); - return encodedFastOrder; -} - -export function decodeFastMarketOrder(buf: Buffer): FastMarketOrder { - const order = LiquidityLayerMessage.decode(buf); - - if (order.fastMarketOrder === undefined) { - throw new Error("Invalid message type"); - } - - return order.fastMarketOrder; -} - -export async function postVaaWithMessage( - connection: Connection, - payer: Keypair, - guardians: MockGuardians, - sequence: bigint, - payload: Buffer, - emitterAddress: string, - emitterChain?: ChainId -): Promise<[PublicKey, Buffer]> { - if (emitterChain === undefined) { - emitterChain = CHAIN_ID_ETH; - } - - const foreignEmitter = new MockEmitter( - tryNativeToHexString(emitterAddress, emitterChain), - emitterChain, - Number(sequence) + getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, owner) ); - - const published = foreignEmitter.publishMessage( - 0, // nonce, - payload, - 200, // consistencyLevel - 12345678 // timestamp - ); - const vaaBuf = guardians.addSignatures(published, [0]); - - await postVaa(connection, payer, vaaBuf); - - return [derivePostedVaaKey(WORMHOLE_CONTRACTS.solana.core, parseVaa(vaaBuf).hash), vaaBuf]; -} - -export async function postFastTransferVaa( - connection: Connection, - payer: Keypair, - guardians: MockGuardians, - sequence: bigint, - fastMessage: FastMarketOrder, - emitterAddress: string, - emitterChain?: ChainId -): Promise<[PublicKey, Buffer]> { - return postVaaWithMessage( - connection, - payer, - guardians, - sequence, - encodeFastMarketOrder(fastMessage), - emitterAddress, - emitterChain - ); -} - -export async function waitBySlots(connection: Connection, numSlots: number) { - const targetSlot = await connection.getSlot().then((slot) => slot + numSlots); - return new Promise((resolve, _) => { - const sub = connection.onSlotChange((slot) => { - if (slot.slot >= targetSlot) { - connection.removeSlotChangeListener(sub); - resolve(slot.slot); - } - }); - }); -} - -export async function calculateDynamicPenalty( - auctionConfig: AuctionConfig, - amount: number, - slotsElapsed: number -): Promise<[number, number]> { - if (slotsElapsed <= auctionConfig.auctionGracePeriod) { - return [0, 0]; - } - - const penaltyPeriod = slotsElapsed - auctionConfig.auctionGracePeriod; - if ( - penaltyPeriod >= auctionConfig.auctionPenaltySlots || - auctionConfig.initialPenaltyBps == 0 - ) { - const userReward = Math.floor((amount * auctionConfig.userPenaltyRewardBps) / MAX_BPS_FEE); - return [amount - userReward, userReward]; - } else { - const basePenalty = Math.floor(amount * auctionConfig.initialPenaltyBps) / MAX_BPS_FEE; - const penalty = Math.floor( - basePenalty + - ((amount - basePenalty) * penaltyPeriod) / auctionConfig.auctionPenaltySlots - ); - const userReward = Math.floor((penalty * auctionConfig.userPenaltyRewardBps) / MAX_BPS_FEE); - - return [penalty - userReward, userReward]; - } + return amount; } export async function verifyFillMessage( diff --git a/solana/ts/tests/helpers/mock.ts b/solana/ts/tests/helpers/mock.ts index c594b1fc..ddf7a705 100644 --- a/solana/ts/tests/helpers/mock.ts +++ b/solana/ts/tests/helpers/mock.ts @@ -7,6 +7,7 @@ import { LiquidityLayerMessage } from "../../src"; import { CORE_BRIDGE_PID, GUARDIAN_KEY } from "./consts"; import { postVaa } from "./utils"; +// TODO: return VaaAccount, too export async function postLiquidityLayerVaa( connection: Connection, payer: Keypair, diff --git a/solana/ts/tests/helpers/utils.ts b/solana/ts/tests/helpers/utils.ts index 009f31c1..493c2a21 100644 --- a/solana/ts/tests/helpers/utils.ts +++ b/solana/ts/tests/helpers/utils.ts @@ -210,3 +210,29 @@ export function getRandomBN(numBytes: number, range?: { min: BN; max: BN }) { return new BN(result.toArray("le", numBytes), undefined, "le"); } } + +export function bigintToU64BN(value: bigint): BN { + const buf = Buffer.alloc(8); + buf.writeBigUInt64BE(value); + return new BN(buf); +} + +export function numberToU64BN(value: number): BN { + return bigintToU64BN(BigInt(value)); +} + +export async function waitBySlots(connection: Connection, numSlots: number) { + const targetSlot = await connection.getSlot().then((slot) => slot + numSlots); + return waitUntilSlot(connection, targetSlot); +} + +export async function waitUntilSlot(connection: Connection, targetSlot: number) { + return new Promise((resolve, _) => { + const sub = connection.onSlotChange((slot) => { + if (slot.slot >= targetSlot) { + connection.removeSlotChangeListener(sub); + resolve(slot.slot); + } + }); + }); +} From 3434503498c33b809ea16f9999ea677dd8edd0e9 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 09:05:47 -0600 Subject: [PATCH 092/126] solana: remove owner req; clean up tests --- .../src/processor/admin/initialize.rs | 2 +- .../admin/propose/auction_parameters.rs | 2 +- .../src/processor/admin/propose/mod.rs | 5 +- .../admin/update/auction_parameters.rs | 3 +- .../auction/execute_fast_order/cctp.rs | 8 +- .../auction/execute_fast_order/local.rs | 9 +- .../auction/execute_fast_order/mod.rs | 78 +- .../src/processor/auction/offer/improve.rs | 16 +- .../processor/auction/offer/place_initial.rs | 1 - .../processor/auction/settle/active/cctp.rs | 14 +- .../processor/auction/settle/active/local.rs | 14 +- .../processor/auction/settle/active/mod.rs | 12 +- .../matching-engine/src/state/auction.rs | 35 +- .../src/utils/{math.rs => auction.rs} | 34 +- .../programs/matching-engine/src/utils/mod.rs | 2 +- solana/ts/src/matchingEngine/index.ts | 120 +- solana/ts/src/matchingEngine/state/Auction.ts | 2 +- solana/ts/tests/01__matchingEngine.ts | 1866 +++++++---------- .../ts/tests/helpers/matching_engine_utils.ts | 42 - solana/ts/tests/helpers/utils.ts | 17 +- 20 files changed, 970 insertions(+), 1312 deletions(-) rename solana/programs/matching-engine/src/utils/{math.rs => auction.rs} (88%) delete mode 100644 solana/ts/tests/helpers/matching_engine_utils.ts diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 820f7133..717e9be8 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -131,7 +131,7 @@ fn check_constraints(ctx: &Context, params: &AuctionParameters) -> R // This prevents the unused variables warning popping up when this program is built. let _ = ctx; - crate::utils::math::require_valid_auction_parameters(params)?; + crate::utils::auction::require_valid_parameters(params)?; // Done. Ok(()) diff --git a/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs index f79c4176..4345b1da 100644 --- a/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs +++ b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs @@ -43,7 +43,7 @@ pub fn propose_auction_parameters( ctx: Context, parameters: AuctionParameters, ) -> Result<()> { - crate::utils::math::require_valid_auction_parameters(¶meters)?; + crate::utils::auction::require_valid_parameters(¶meters)?; let id = ctx.accounts.custodian.auction_config_id + 1; super::propose( diff --git a/solana/programs/matching-engine/src/processor/admin/propose/mod.rs b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs index 06b59f51..0f8ea7bb 100644 --- a/solana/programs/matching-engine/src/processor/admin/propose/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs @@ -19,10 +19,7 @@ fn propose(accounts: Propose, action: ProposalAction, proposal_bump_seed: u8) -> epoch_schedule, } = accounts; - let Clock { - slot: slot_proposed_at, - .. - } = Clock::get()?; + let slot_proposed_at = Clock::get().map(|clock| clock.slot)?; // Create the proposal. proposal.set_inner(Proposal { diff --git a/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs index 127f052a..7e1f54b3 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs @@ -77,8 +77,7 @@ pub fn update_auction_parameters(ctx: Context) -> Resul ctx.accounts.custodian.auction_config_id += 1; // Set the slot enacted at so it cannot be replayed. - let Clock { slot, .. } = Clock::get()?; - ctx.accounts.proposal.slot_enacted_at = Some(slot); + ctx.accounts.proposal.slot_enacted_at = Some(Clock::get().map(|clock| clock.slot)?); // Done. Ok(()) diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index 1fd9348d..e404d711 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -74,11 +74,9 @@ pub struct ExecuteFastOrderCctp<'info> { )] to_router_endpoint: Account<'info, RouterEndpoint>, - // TODO: add executor in case contract executes? #[account( mut, - associated_token::mint = mint, - associated_token::authority = payer + token::mint = mint, )] executor_token: Box>, @@ -172,9 +170,9 @@ pub struct ExecuteFastOrderCctp<'info> { /// TODO: add docstring pub fn execute_fast_order_cctp(ctx: Context) -> Result<()> { let super::PreparedFastExecution { - transfer_amount: amount, - destination_cctp_domain, + user_amount: amount, fill, + destination_cctp_domain, } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index d848a9a6..3dea4f09 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -69,10 +69,9 @@ pub struct ExecuteFastOrderLocal<'info> { #[account( mut, - associated_token::mint = common::constants::usdc::id(), - associated_token::authority = payer + token::mint = common::constants::usdc::id(), )] - executor_token: Account<'info, token::TokenAccount>, + executor_token: Box>, /// CHECK: Mutable. Must equal [best_offer](Auction::best_offer). #[account(mut)] @@ -130,9 +129,9 @@ pub struct ExecuteFastOrderLocal<'info> { pub fn execute_fast_order_local(ctx: Context) -> Result<()> { let super::PreparedFastExecution { - transfer_amount: amount, - destination_cctp_domain: _, + user_amount: amount, fill, + .. } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index cdf48880..f5b6a4f9 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -7,7 +7,7 @@ pub use local::*; use crate::{ error::MatchingEngineError, state::{Auction, AuctionConfig, AuctionStatus, Custodian}, - utils::{self, math::DepositPenalty}, + utils::{self, auction::DepositPenalty}, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -27,70 +27,76 @@ struct PrepareFastExecution<'ctx, 'info> { } struct PreparedFastExecution { - pub transfer_amount: u64, - pub destination_cctp_domain: u32, + pub user_amount: u64, pub fill: Fill, + pub destination_cctp_domain: u32, } fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result { + let PrepareFastExecution { + custodian, + auction_config, + fast_vaa, + auction, + custody_token, + executor_token, + best_offer_token, + initial_offer_token, + token_program, + } = accounts; + // Create zero copy reference to `FastMarketOrder` payload. - let fast_vaa = VaaAccount::load(accounts.fast_vaa).unwrap(); + let fast_vaa = VaaAccount::load(fast_vaa).unwrap(); let order = LiquidityLayerPayload::try_from(fast_vaa.try_payload().unwrap()) .map_err(|_| MatchingEngineError::InvalidVaa)? .message() .to_fast_market_order_unchecked(); - let (new_status, transfer_amount) = { - let auction_info = accounts.auction.info.as_ref().unwrap(); + let (user_amount, new_status) = { + let auction_info = auction.info.as_ref().unwrap(); - let Clock { - slot: current_slot, .. - } = Clock::get()?; + let current_slot = Clock::get().map(|clock| clock.slot)?; require!( - current_slot > auction_info.end_slot, + current_slot > auction_info.auction_end_slot(auction_config), MatchingEngineError::AuctionPeriodNotExpired ); let DepositPenalty { penalty, user_reward, - } = utils::math::compute_deposit_penalty( - accounts.auction_config, - auction_info, - current_slot, - ); + } = utils::auction::compute_deposit_penalty(auction_config, auction_info, current_slot); - let mut reimbursement = + let mut deposit_and_fee = auction_info.offer_price + auction_info.security_deposit - user_reward; - if penalty > 0 && accounts.best_offer_token.key() != accounts.executor_token.key() { + if penalty > 0 && best_offer_token.key() != executor_token.key() { // Pay the liquidator the penalty. token::transfer( CpiContext::new_with_signer( - accounts.token_program.to_account_info(), + token_program.to_account_info(), anchor_spl::token::Transfer { - from: accounts.custody_token.to_account_info(), - to: accounts.executor_token.to_account_info(), - authority: accounts.custodian.to_account_info(), + from: custody_token.to_account_info(), + to: executor_token.to_account_info(), + authority: custodian.to_account_info(), }, &[Custodian::SIGNER_SEEDS], ), penalty, )?; - reimbursement -= penalty; + deposit_and_fee -= penalty; } let init_auction_fee = order.init_auction_fee(); - if accounts.best_offer_token.key() != accounts.initial_offer_token.key() { + if best_offer_token.key() != initial_offer_token.key() { // Pay the auction initiator their fee. token::transfer( CpiContext::new_with_signer( - accounts.token_program.to_account_info(), + token_program.to_account_info(), anchor_spl::token::Transfer { - from: accounts.custody_token.to_account_info(), - to: accounts.initial_offer_token.to_account_info(), - authority: accounts.custodian.to_account_info(), + from: custody_token.to_account_info(), + to: initial_offer_token.to_account_info(), + authority: custodian.to_account_info(), }, &[Custodian::SIGNER_SEEDS], ), @@ -98,35 +104,35 @@ fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result { } pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { - let auction = ctx.accounts.auction.info.as_mut().unwrap(); + let auction_info = ctx.accounts.auction.info.as_mut().unwrap(); { - let Clock { slot, .. } = Clock::get()?; + let current_slot = Clock::get().map(|clock| clock.slot)?; require!( - slot <= auction.end_slot, + current_slot <= auction_info.auction_end_slot(&ctx.accounts.auction_config), MatchingEngineError::AuctionPeriodExpired ); } // Make sure the new offer is less than the previous offer. require!( - fee_offer < auction.offer_price, + fee_offer < auction_info.offer_price, MatchingEngineError::OfferPriceNotImproved ); @@ -82,7 +82,7 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { // TODO: change authority to custodian. Authority must be delegated to custodian before this // can work. let offer_token = ctx.accounts.offer_token.key(); - if auction.best_offer_token != offer_token { + if auction_info.best_offer_token != offer_token { token::transfer( CpiContext::new( ctx.accounts.token_program.to_account_info(), @@ -92,14 +92,14 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { authority: ctx.accounts.offer_authority.to_account_info(), }, ), - auction.amount_in + auction.security_deposit, + auction_info.amount_in + auction_info.security_deposit, )?; // Update the `best_offer` token account and `amount` fields. - auction.best_offer_token = offer_token; + auction_info.best_offer_token = offer_token; } - auction.offer_price = fee_offer; + auction_info.offer_price = fee_offer; Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index 94ec5356..469abc5e 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -156,7 +156,6 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R best_offer_token: initial_offer_token, initial_offer_token, start_slot: slot, - end_slot: slot + u64::from(ctx.accounts.auction_config.duration), amount_in, security_deposit: max_fee, offer_price: fee_offer, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index 5b150b91..e1db17ce 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -85,13 +85,11 @@ pub struct SettleAuctionActiveCctp<'info> { #[account(mut)] best_offer_token: AccountInfo<'info>, - /// Destination token account, which the redeemer may not own. But because the redeemer is a - /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent - /// to any account he chooses (this one). - /// - /// CHECK: This token account must already exist. - #[account(mut)] - liquidator_token: AccountInfo<'info>, + #[account( + mut, + token::mint = common::constants::usdc::id(), + )] + executor_token: Box>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -218,7 +216,7 @@ pub fn settle_auction_active_cctp(ctx: Context) -> Resu custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, prepared_order_response: &ctx.accounts.prepared_order_response, - liquidator_token: &ctx.accounts.liquidator_token, + executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, custody_token: &ctx.accounts.custody_token, token_program: &ctx.accounts.token_program, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs index e5c1178f..aee1b217 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -88,13 +88,11 @@ pub struct SettleAuctionActiveLocal<'info> { )] to_router_endpoint: Box>, - /// Destination token account, which the redeemer may not own. But because the redeemer is a - /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent - /// to any account he chooses (this one). - /// - /// CHECK: This token account must already exist. - #[account(mut)] - liquidator_token: AccountInfo<'info>, + #[account( + mut, + token::mint = common::constants::usdc::id(), + )] + executor_token: Box>, /// CHECK: Must equal the best offer token in the auction data account. #[account(mut)] @@ -163,7 +161,7 @@ pub fn settle_auction_active_local(ctx: Context) -> Re custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, prepared_order_response: &ctx.accounts.prepared_order_response, - liquidator_token: &ctx.accounts.liquidator_token, + executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, custody_token: &ctx.accounts.custody_token, token_program: &ctx.accounts.token_program, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index 303e530b..faa4a901 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -6,7 +6,7 @@ pub use local::*; use crate::{ state::{Auction, AuctionConfig, AuctionStatus, Custodian, PreparedOrderResponse}, - utils::{self, math::DepositPenalty}, + utils::{self, auction::DepositPenalty}, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -20,7 +20,7 @@ struct SettleActiveAndPrepareFill<'ctx, 'info> { custodian: &'ctx AccountInfo<'info>, auction_config: &'ctx Account<'info, AuctionConfig>, prepared_order_response: &'ctx Account<'info, PreparedOrderResponse>, - liquidator_token: &'ctx AccountInfo<'info>, + executor_token: &'ctx Account<'info, token::TokenAccount>, best_offer_token: &'ctx AccountInfo<'info>, custody_token: &'ctx AccountInfo<'info>, token_program: &'ctx Program<'info, token::Token>, @@ -41,7 +41,7 @@ fn settle_active_and_prepare_fill<'ctx>( custodian, auction_config, prepared_order_response, - liquidator_token, + executor_token, best_offer_token, custody_token, token_program, @@ -60,7 +60,7 @@ fn settle_active_and_prepare_fill<'ctx>( let DepositPenalty { penalty, user_reward, - } = utils::math::compute_deposit_penalty( + } = utils::auction::compute_deposit_penalty( auction_config, auction.info.as_ref().unwrap(), Clock::get().map(|clock| clock.slot)?, @@ -83,7 +83,7 @@ fn settle_active_and_prepare_fill<'ctx>( ) }; - if liquidator_token.key() != best_offer_token.key() { + if executor_token.key() != best_offer_token.key() { // Transfer the penalty amount to the caller. The caller also earns the base fee for relaying // the slow VAA. token::transfer( @@ -91,7 +91,7 @@ fn settle_active_and_prepare_fill<'ctx>( token_program.to_account_info(), token::Transfer { from: custody_token.to_account_info(), - to: liquidator_token.to_account_info(), + to: executor_token.to_account_info(), authority: custodian.to_account_info(), }, &[Custodian::SIGNER_SEEDS], diff --git a/solana/programs/matching-engine/src/state/auction.rs b/solana/programs/matching-engine/src/state/auction.rs index 6fbafd71..a95d6c49 100644 --- a/solana/programs/matching-engine/src/state/auction.rs +++ b/solana/programs/matching-engine/src/state/auction.rs @@ -1,3 +1,4 @@ +use crate::state::AuctionParameters; use anchor_lang::prelude::*; #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace, PartialEq, Eq)] @@ -38,9 +39,8 @@ pub struct AuctionInfo { /// The slot when the auction started. pub start_slot: u64, - // TODO: remove - pub end_slot: u64, - + /// The amount reflecting the amount of assets transferred into the matching engine. This plus + /// and the security deposit are used to participate in the auction. pub amount_in: u64, /// The additional deposit made by the highest bidder. @@ -49,10 +49,37 @@ pub struct AuctionInfo { /// The offer price of the auction. pub offer_price: u64, - /// The amount of tokens to be sent to the user. + /// The amount of tokens to be sent to the user. For CCTP fast transfers, this amount will equal + /// the [amount_in](Self::amount_in). pub amount_out: u64, } +impl AuctionInfo { + /// Compute start slot + duration. + #[inline] + pub fn auction_end_slot(&self, params: &AuctionParameters) -> u64 { + self.start_slot + u64::from(params.duration) + } + + /// Compute start slot + duration + grace period. + #[inline] + pub fn grace_period_end_slot(&self, params: &AuctionParameters) -> u64 { + self.auction_end_slot(params) + u64::from(params.grace_period) + } + + /// Compute start slot + duration + grace period + penalty slots. + #[inline] + pub fn penalty_period_end_slot(&self, params: &AuctionParameters) -> u64 { + self.grace_period_end_slot(params) + u64::from(params.penalty_slots) + } + + /// Compute amount in + security deposit. + #[inline] + pub fn total_deposit(&self) -> u64 { + self.amount_in + self.security_deposit + } +} + #[account] #[derive(Debug, InitSpace)] pub struct Auction { diff --git a/solana/programs/matching-engine/src/utils/math.rs b/solana/programs/matching-engine/src/utils/auction.rs similarity index 88% rename from solana/programs/matching-engine/src/utils/math.rs rename to solana/programs/matching-engine/src/utils/auction.rs index 59b5976b..e8590dff 100644 --- a/solana/programs/matching-engine/src/utils/math.rs +++ b/solana/programs/matching-engine/src/utils/auction.rs @@ -11,36 +11,36 @@ pub struct DepositPenalty { pub user_reward: u64, } +#[inline] pub fn compute_deposit_penalty( - auction_params: &AuctionParameters, - auction_info: &AuctionInfo, + params: &AuctionParameters, + info: &AuctionInfo, current_slot: u64, ) -> DepositPenalty { - let slots_elapsed = - current_slot.saturating_sub(auction_info.start_slot + auction_params.duration as u64); + let slots_elapsed = current_slot.saturating_sub(info.start_slot + params.duration as u64); - if slots_elapsed <= auction_params.grace_period as u64 { + if slots_elapsed <= params.grace_period as u64 { Default::default() } else { - let deposit = auction_info.security_deposit; - let penalty_period = slots_elapsed - auction_params.grace_period as u64; - if penalty_period >= auction_params.penalty_slots as u64 - || auction_params.initial_penalty_bps == FEE_PRECISION_MAX + let deposit = info.security_deposit; + let penalty_period = slots_elapsed - params.grace_period as u64; + if penalty_period >= params.penalty_slots as u64 + || params.initial_penalty_bps == FEE_PRECISION_MAX { - split_user_penalty_reward(auction_params, deposit) + split_user_penalty_reward(params, deposit) } else { - let base_penalty = mul_bps_unsafe(deposit, auction_params.initial_penalty_bps); + let base_penalty = mul_bps_unsafe(deposit, params.initial_penalty_bps); // Adjust the base amount to determine scaled penalty. let scaled = (((deposit - base_penalty) as u128 * penalty_period as u128) - / auction_params.penalty_slots as u128) as u64; + / params.penalty_slots as u128) as u64; - split_user_penalty_reward(auction_params, base_penalty + scaled) + split_user_penalty_reward(params, base_penalty + scaled) } } } -pub fn require_valid_auction_parameters(params: &AuctionParameters) -> Result<()> { +pub fn require_valid_parameters(params: &AuctionParameters) -> Result<()> { require!( params.duration > 0, MatchingEngineError::InvalidAuctionDuration @@ -73,8 +73,7 @@ fn split_user_penalty_reward(params: &AuctionParameters, amount: u64) -> Deposit #[inline] fn mul_bps_unsafe(amount: u64, bps: u32) -> u64 { - const FEE_PRECISION_MAX: u128 = common::constants::FEE_PRECISION_MAX as u128; - ((amount as u128 * bps as u128) / FEE_PRECISION_MAX) as u64 + ((amount as u128 * bps as u128) / FEE_PRECISION_MAX as u128) as u64 } #[cfg(test)] @@ -279,7 +278,6 @@ mod test { AuctionInfo { security_deposit, start_slot: START, - end_slot: 420, config_id: Default::default(), best_offer_token: Default::default(), initial_offer_token: Default::default(), @@ -300,7 +298,7 @@ mod test { penalty_slots: 20, }; - require_valid_auction_parameters(¶ms).unwrap(); + require_valid_parameters(¶ms).unwrap(); params } diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 72f662c5..9f93d3f9 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -1,4 +1,4 @@ -pub mod math; +pub mod auction; use crate::{ error::MatchingEngineError, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 7ab5d2b7..9ebf9680 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -389,7 +389,15 @@ export class MatchingEngineProgram { } async getCoreMessage(payer: PublicKey, payerSequenceValue?: bigint): Promise { - const value = payerSequenceValue ?? (await this.fetchPayerSequenceValue(payer)); + const value = await (async () => { + if (payerSequenceValue === undefined) { + // Fetch the latest. + const { value } = await this.fetchPayerSequence(payer); + return BigInt(value.subn(1).toString()); + } else { + return payerSequenceValue; + } + })(); return this.coreMessageAddress(payer, value); } @@ -491,14 +499,13 @@ export class MatchingEngineProgram { } async improveOfferIx( - feeOffer: bigint, - vaaHash: Buffer | Uint8Array, accounts: { + auction: PublicKey; offerAuthority: PublicKey; - auction?: PublicKey; auctionConfig?: PublicKey; bestOfferToken?: PublicKey; - } + }, + feeOffer: bigint ) { const { offerAuthority, @@ -507,30 +514,32 @@ export class MatchingEngineProgram { bestOfferToken: inputBestOfferToken, } = accounts; - const bestOfferToken = await (async () => { - if (inputBestOfferToken !== undefined) { - return inputBestOfferToken; - } else { - const { info } = await this.fetchAuction(vaaHash); + const { auctionConfig, bestOfferToken } = await (async () => { + if (inputAuctionConfig === undefined || inputBestOfferToken === undefined) { + const { info } = await this.fetchAuction({ address: auction }); if (info === null) { throw new Error("no auction info found"); } - return info.bestOfferToken; + return { + auctionConfig: inputAuctionConfig ?? this.auctionConfigAddress(info.configId), + bestOfferToken: inputBestOfferToken ?? info.bestOfferToken, + }; + } else { + return { + auctionConfig: inputAuctionConfig, + bestOfferToken: inputBestOfferToken, + }; } })(); - // TODO: fix this - const { info } = await this.fetchAuction(vaaHash); - const auctionConfig = this.auctionConfigAddress(info!.configId); - return this.program.methods .improveOffer(new BN(feeOffer.toString())) .accounts({ offerAuthority, custodian: this.custodianAddress(), auctionConfig, - auction: this.auctionAddress(vaaHash), + auction, offerToken: splToken.getAssociatedTokenAddressSync(this.mint, offerAuthority), bestOfferToken, custodyToken: this.custodyTokenAccountAddress(), @@ -809,27 +818,33 @@ export class MatchingEngineProgram { .instruction(); } - async executeFastOrderCctpIx( - targetChain: number, - remoteDomain: number, - vaaHash: VaaHash, - accounts: { - payer: PublicKey; - fastVaa: PublicKey; - auctionConfig?: PublicKey; - bestOfferToken?: PublicKey; - initialOfferToken?: PublicKey; - } - ) { + async executeFastOrderCctpIx(accounts: { + payer: PublicKey; + fastVaa: PublicKey; + executorToken?: PublicKey; + auction?: PublicKey; + auctionConfig?: PublicKey; + bestOfferToken?: PublicKey; + initialOfferToken?: PublicKey; + }) { const { payer, fastVaa, + executorToken: inputExecutorToken, + auction: inputAuction, auctionConfig: inputAuctionConfig, bestOfferToken: inputBestOfferToken, initialOfferToken: inputInitialOfferToken, } = accounts; - const auction = this.auctionAddress(vaaHash); + // TODO: Think of a way to not have to do this fetch. + const vaaAccount = await VaaAccount.fetch(this.program.provider.connection, fastVaa); + const { fastMarketOrder } = LiquidityLayerMessage.decode(vaaAccount.payload()); + if (fastMarketOrder === undefined) { + throw new Error("Message not FastMarketOrder"); + } + + const auction = inputAuction ?? this.auctionAddress(vaaAccount.digest()); const { auctionConfig, initialOfferToken, bestOfferToken } = await (async () => { if ( @@ -873,10 +888,7 @@ export class MatchingEngineProgram { localToken, messageTransmitterProgram, tokenMessengerMinterProgram, - } = await this.burnAndPublishAccounts( - { payer }, - { targetChain, destinationCctpDomain: remoteDomain } - ); + } = await this.burnAndPublishAccounts({ payer }, fastMarketOrder); const mint = this.mint; return this.program.methods @@ -888,7 +900,8 @@ export class MatchingEngineProgram { fastVaa, auction, toRouterEndpoint, - executorToken: splToken.getAssociatedTokenAddressSync(mint, payer), + executorToken: + inputExecutorToken ?? splToken.getAssociatedTokenAddressSync(mint, payer), bestOfferToken, initialOfferToken, custodyToken: this.custodyTokenAccountAddress(), @@ -911,27 +924,29 @@ export class MatchingEngineProgram { .instruction(); } - async executeFastOrderLocalIx( - vaaHash: VaaHash, - accounts: { - payer: PublicKey; - fastVaa: PublicKey; - auctionConfig?: PublicKey; - bestOfferToken?: PublicKey; - initialOfferToken?: PublicKey; - toRouterEndpoint?: PublicKey; - } - ) { + async executeFastOrderLocalIx(accounts: { + payer: PublicKey; + fastVaa: PublicKey; + executorToken?: PublicKey; + auction?: PublicKey; + auctionConfig?: PublicKey; + bestOfferToken?: PublicKey; + initialOfferToken?: PublicKey; + toRouterEndpoint?: PublicKey; + }) { const { payer, fastVaa, + executorToken: inputExecutorToken, + auction: inputAuction, auctionConfig: inputAuctionConfig, bestOfferToken: inputBestOfferToken, initialOfferToken: inputInitialOfferToken, toRouterEndpoint: inputToRouterEndpoint, } = accounts; - const auction = this.auctionAddress(vaaHash); + const vaaAccount = await VaaAccount.fetch(this.program.provider.connection, fastVaa); + const auction = inputAuction ?? this.auctionAddress(vaaAccount.digest()); const { auctionConfig, initialOfferToken, bestOfferToken } = await (async () => { if ( @@ -979,7 +994,8 @@ export class MatchingEngineProgram { toRouterEndpoint: inputToRouterEndpoint ?? this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), - executorToken: splToken.getAssociatedTokenAddressSync(this.mint, payer), + executorToken: + inputExecutorToken ?? splToken.getAssociatedTokenAddressSync(this.mint, payer), bestOfferToken, initialOfferToken, custodyToken: this.custodyTokenAccountAddress(), @@ -1150,18 +1166,18 @@ export class MatchingEngineProgram { } } - async calculateDynamicPenalty( + async computeDepositPenalty( auctionInfo: AuctionInfo, currentSlot: bigint, configId?: number - ): Promise<{ penalty: bigint; reward: bigint }> { + ): Promise<{ penalty: bigint; userReward: bigint }> { const auctionParams = await this.fetchAuctionParameters(configId); const gracePeriod = BigInt(auctionParams.gracePeriod); const slotsElapsed = currentSlot - BigInt(auctionInfo.startSlot.toString()) - BigInt(auctionParams.duration); if (slotsElapsed <= gracePeriod) { - return { penalty: 0n, reward: 0n }; + return { penalty: 0n, userReward: 0n }; } const amount = BigInt(auctionInfo.securityDeposit.toString()); @@ -1173,14 +1189,14 @@ export class MatchingEngineProgram { if (penaltyPeriod >= auctionPenaltySlots || initialPenaltyBps == FEE_PRECISION_MAX) { const userReward = (amount * userPenaltyRewardBps) / FEE_PRECISION_MAX; - return { penalty: amount - userReward, reward: userReward }; + return { penalty: amount - userReward, userReward }; } else { const basePenalty = (amount * initialPenaltyBps) / FEE_PRECISION_MAX; const penalty = basePenalty + ((amount - basePenalty) * penaltyPeriod) / auctionPenaltySlots; const userReward = (penalty * userPenaltyRewardBps) / FEE_PRECISION_MAX; - return { penalty: penalty - userReward, reward: userReward }; + return { penalty: penalty - userReward, userReward }; } } } diff --git a/solana/ts/src/matchingEngine/state/Auction.ts b/solana/ts/src/matchingEngine/state/Auction.ts index e8d24ca6..dff95083 100644 --- a/solana/ts/src/matchingEngine/state/Auction.ts +++ b/solana/ts/src/matchingEngine/state/Auction.ts @@ -1,5 +1,6 @@ import { PublicKey } from "@solana/web3.js"; import { BN } from "@coral-xyz/anchor"; +import { AuctionParameters } from "./AuctionConfig"; export type AuctionStatus = { notStarted?: {}; @@ -16,7 +17,6 @@ export type AuctionInfo = { bestOfferToken: PublicKey; initialOfferToken: PublicKey; startSlot: BN; - endSlot: BN; amountIn: BN; securityDeposit: BN; offerPrice: BN; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index da739e6e..bd8928c2 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,4 +1,5 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; +import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import * as splToken from "@solana/spl-token"; import { ComputeBudgetProgram, @@ -15,6 +16,7 @@ import chaiAsPromised from "chai-as-promised"; import { CctpTokenBurnMessage, FastMarketOrder, + Fill, LiquidityLayerDeposit, LiquidityLayerMessage, } from "../src"; @@ -39,16 +41,11 @@ import { expectIxErr, expectIxOk, expectIxOkDetails, + getUsdcAtaBalance, numberToU64BN, postLiquidityLayerVaa, - waitBySlots, waitUntilSlot, } from "./helpers"; -import { - getUsdcAtaBalance, - verifyFastFillMessage, - verifyFillMessage, -} from "./helpers/matching_engine_utils"; chaiUse(chaiAsPromised); @@ -68,6 +65,7 @@ describe("Matching Engine", function () { const newFeeRecipient = Keypair.generate().publicKey; const offerAuthorityOne = Keypair.generate(); const offerAuthorityTwo = Keypair.generate(); + const liquidator = Keypair.generate(); // Foreign endpoints. const ethChain = wormholeSdk.CHAINS.ethereum; @@ -93,7 +91,7 @@ describe("Matching Engine", function () { userPenaltyRewardBps: 250000, initialPenaltyBps: 250000, duration: 2, - gracePeriod: 5, // 2 + 5 slots after end. TODO: fix this + gracePeriod: 5, penaltySlots: 10, }; @@ -603,7 +601,7 @@ describe("Matching Engine", function () { await expectIxErr(connection, [ix], [owner], "InvalidEndpoint"); }); - it(`Add Router Endpoint as Owner Assistant`, async function () { + it("Add Router Endpoint as Owner Assistant", async function () { const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); const mintRecipient = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const ix = await engine.addRouterEndpointIx( @@ -622,7 +620,7 @@ describe("Matching Engine", function () { ); }); - it(`Update Router Endpoint as Owner`, async function () { + it("Update Router Endpoint as Owner", async function () { const ix = await engine.addRouterEndpointIx( { ownerOrAssistant: owner.publicKey }, { @@ -819,13 +817,18 @@ describe("Matching Engine", function () { toPubkey: offerAuthorityTwo.publicKey, lamports: 1000000000, }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: liquidator.publicKey, + lamports: 1000000000, + }), ], [payer] ); }); before("Create ATAs For Offer Authorities", async function () { - for (const wallet of [offerAuthorityOne, offerAuthorityTwo]) { + for (const wallet of [offerAuthorityOne, offerAuthorityTwo, liquidator]) { const destination = await splToken.createAccount( connection, wallet, @@ -864,7 +867,6 @@ describe("Matching Engine", function () { await engine.fetchCustodyTokenAccount(); const { fastVaa, txDetails } = await placeInitialOfferForTest( - engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, @@ -887,10 +889,9 @@ describe("Matching Engine", function () { }); } - it(`Place Initial Offer (Offer == Max Fee; Max Fee == Amount Minus 1)`, async function () { + it("Place Initial Offer (Offer == Max Fee; Max Fee == Amount Minus 1)", async function () { const fastOrder = { ...baseFastOrder } as FastMarketOrder; fastOrder.maxFee = fastOrder.amountIn - 1n; - const { maxFee: offerPrice } = fastOrder; // Fetch the balances before. const offerBalanceBefore = await getUsdcAtaBalance( @@ -900,12 +901,10 @@ describe("Matching Engine", function () { const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); const { fastVaa, txDetails } = await placeInitialOfferForTest( - engine, offerAuthorityOne, wormholeSequence++, fastOrder, - ethRouter, - offerPrice + ethRouter ); // Validate balance changes. @@ -918,10 +917,10 @@ describe("Matching Engine", function () { expect(offerBalanceAfter).equals(offerBalanceBefore - balanceChange); expect(custodyBalanceAfter).equals(custodyBalanceBefore + balanceChange); - await checkAfterEffects({ txDetails, fastVaa, offerPrice }); + await checkAfterEffects({ txDetails, fastVaa, offerPrice: fastOrder.maxFee }); }); - it(`Place Initial Offer (With Deadline)`, async function () { + it("Place Initial Offer (With Deadline)", async function () { const fastOrder = { ...baseFastOrder } as FastMarketOrder; const { maxFee: offerPrice } = fastOrder; @@ -940,7 +939,6 @@ describe("Matching Engine", function () { const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); const { fastVaa, txDetails } = await placeInitialOfferForTest( - engine, offerAuthorityOne, wormholeSequence++, fastOrder, @@ -961,7 +959,7 @@ describe("Matching Engine", function () { await checkAfterEffects({ txDetails, fastVaa, offerPrice }); }); - it(`Cannot Place Initial Offer (Invalid VAA)`, async function () { + it("Cannot Place Initial Offer (Invalid VAA)", async function () { const fastVaa = await postLiquidityLayerVaa( connection, offerAuthorityOne, @@ -975,26 +973,20 @@ describe("Matching Engine", function () { engine.auctionAddress(vaa.digest()) ); - await expectIxErr( - connection, - [ - await engine.placeInitialOfferIx( - { - payer: offerAuthorityOne.publicKey, - fastVaa, - auction, - fromRouterEndpoint: engine.routerEndpointAddress(ethChain), - toRouterEndpoint: engine.routerEndpointAddress(arbChain), - }, - baseFastOrder.maxFee - ), - ], - [offerAuthorityOne], - "InvalidVaa" + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + auction, + fromRouterEndpoint: engine.routerEndpointAddress(ethChain), + toRouterEndpoint: engine.routerEndpointAddress(arbChain), + }, + baseFastOrder.maxFee ); + await expectIxErr(connection, [ix], [offerAuthorityOne], "InvalidVaa"); }); - it(`Cannot Place Initial Offer (Invalid Payload)`, async function () { + it("Cannot Place Initial Offer (Invalid Payload)", async function () { const message = new LiquidityLayerMessage({ fastFill: { amount: 1000n, @@ -1020,27 +1012,20 @@ describe("Matching Engine", function () { engine.auctionAddress(vaa.digest()) ); - const { maxFee: offerPrice } = baseFastOrder; - await expectIxErr( - connection, - [ - await engine.placeInitialOfferIx( - { - payer: offerAuthorityOne.publicKey, - fastVaa, - auction, - fromRouterEndpoint: engine.routerEndpointAddress(ethChain), - toRouterEndpoint: engine.routerEndpointAddress(arbChain), - }, - offerPrice - ), - ], - [offerAuthorityOne], - "NotFastMarketOrder" + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + auction, + fromRouterEndpoint: engine.routerEndpointAddress(ethChain), + toRouterEndpoint: engine.routerEndpointAddress(arbChain), + }, + baseFastOrder.maxFee ); + await expectIxErr(connection, [ix], [offerAuthorityOne], "NotFastMarketOrder"); }); - it(`Cannot Place Initial Offer (Deadline Exceeded)`, async function () { + it("Cannot Place Initial Offer (Deadline Exceeded)", async function () { const fastMarketOrder = { ...baseFastOrder } as FastMarketOrder; // Set the deadline to the previous block timestamp. @@ -1058,24 +1043,18 @@ describe("Matching Engine", function () { new LiquidityLayerMessage({ fastMarketOrder }) ); - const { maxFee: offerPrice } = fastMarketOrder; - await expectIxErr( - connection, - [ - await engine.placeInitialOfferIx( - { - payer: offerAuthorityOne.publicKey, - fastVaa, - }, - offerPrice - ), - ], - [offerAuthorityOne], - "FastMarketOrderExpired" + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + }, + fastMarketOrder.maxFee ); + + await expectIxErr(connection, [ix], [offerAuthorityOne], "FastMarketOrderExpired"); }); - it(`Cannot Place Initial Offer (Offer Price Too High)`, async function () { + it("Cannot Place Initial Offer (Offer Price Too High)", async function () { const offerPrice = baseFastOrder.maxFee + 1n; const fastVaa = await postLiquidityLayerVaa( @@ -1087,23 +1066,17 @@ describe("Matching Engine", function () { new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) ); - await expectIxErr( - connection, - [ - await engine.placeInitialOfferIx( - { - payer: offerAuthorityOne.publicKey, - fastVaa, - }, - offerPrice - ), - ], - [offerAuthorityOne], - "OfferPriceTooHigh" + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + }, + offerPrice ); + await expectIxErr(connection, [ix], [offerAuthorityOne], "OfferPriceTooHigh"); }); - it(`Cannot Place Initial Offer (Invalid Emitter Chain)`, async function () { + it("Cannot Place Initial Offer (Invalid Emitter Chain)", async function () { const fastVaa = await postLiquidityLayerVaa( connection, payer, @@ -1132,7 +1105,7 @@ describe("Matching Engine", function () { ); }); - it(`Cannot Place Initial Offer (Invalid Emitter Address)`, async function () { + it("Cannot Place Initial Offer (Invalid Emitter Address)", async function () { const fastVaa = await postLiquidityLayerVaa( connection, payer, @@ -1159,7 +1132,7 @@ describe("Matching Engine", function () { ); }); - it(`Cannot Place Initial Offer (Invalid Target Router Chain)`, async function () { + it("Cannot Place Initial Offer (Invalid Target Router Chain)", async function () { // Change the fast order chain Id. const fastMarketOrder = { ...baseFastOrder } as FastMarketOrder; fastMarketOrder.targetChain = wormholeSdk.CHAINS.acala; @@ -1191,7 +1164,7 @@ describe("Matching Engine", function () { ); }); - it(`Cannot Place Initial Offer Again`, async function () { + it("Cannot Place Initial Offer Again", async function () { const fastVaa = await postLiquidityLayerVaa( connection, payer, @@ -1230,7 +1203,6 @@ describe("Matching Engine", function () { const auctionData = await engine.fetchAuction(vaaHash); const { bump } = auctionData; - const { duration } = await engine.fetchAuctionParameters(); const offerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityOne.publicKey @@ -1250,7 +1222,6 @@ describe("Matching Engine", function () { bestOfferToken: offerToken, initialOfferToken: offerToken, startSlot: numberToU64BN(txDetails.slot), - endSlot: numberToU64BN(txDetails.slot + duration), amountIn: expectedAmountIn, securityDeposit: bigintToU64BN(maxFee), offerPrice: bigintToU64BN(offerPrice), @@ -1264,13 +1235,11 @@ describe("Matching Engine", function () { describe("Improve Offer", function () { for (const newOffer of [0n, baseFastOrder.maxFee / 2n, baseFastOrder.maxFee - 1n]) { it(`Improve Offer (Price == ${newOffer})`, async function () { - const { fastVaaAccount } = await placeInitialOfferForTest( - engine, + const { auction, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); const initialOfferBalanceBefore = await getUsdcAtaBalance( @@ -1284,80 +1253,82 @@ describe("Matching Engine", function () { const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); - // New Offer from offerAuthorityTwo. - const vaaHash = fastVaaAccount.digest(); - const auctionDataBefore = await engine.fetchAuction(vaaHash); - const { info: infoBefore } = auctionDataBefore; - expect(infoBefore).is.not.null; - const { bestOfferToken } = infoBefore!; - - await expectIxOk( - connection, - [ - await engine.improveOfferIx(newOffer, vaaHash, { - offerAuthority: offerAuthorityTwo.publicKey, - bestOfferToken, - }), - ], - [offerAuthorityTwo] - ); - - // Validate balance changes. - const initialOfferBalanceAfter = await getUsdcAtaBalance( - connection, - offerAuthorityOne.publicKey - ); - const newOfferBalanceAfter = await getUsdcAtaBalance( - connection, - offerAuthorityTwo.publicKey - ); - const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); - - const balanceChange = baseFastOrder.maxFee + baseFastOrder.amountIn; - expect(newOfferBalanceAfter).equals(newOfferBalanceBefore - balanceChange); - expect(initialOfferBalanceAfter).equals( - initialOfferBalanceBefore + balanceChange + const ix = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthorityTwo.publicKey, + }, + newOffer ); - expect(custodyBalanceAfter).equals(custodyBalanceBefore); - // Confirm the auction data. - const auctionDataAfter = await engine.fetchAuction(vaaHash); - const { info: infoAfter } = auctionDataAfter; - expect(infoAfter).is.not.null; + await expectIxOk(connection, [ix], [offerAuthorityTwo]); - const newOfferToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - offerAuthorityTwo.publicKey - ); - const initialOfferToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - offerAuthorityOne.publicKey + await checkAfterEffects( + auction, + offerAuthorityTwo.publicKey, + newOffer, + auctionDataBefore, + { + custodyToken: custodyBalanceBefore, + bestOfferToken: newOfferBalanceBefore, + prevBestOfferToken: initialOfferBalanceBefore, + } ); - // TODO: clean up to check deep equal Auction vs Auction - expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ active: {} }); - expect(infoAfter!.bestOfferToken).to.eql(newOfferToken); - expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - expect(infoAfter!.startSlot.toString()).to.eql( - infoBefore!.startSlot.toString() - ); - expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - expect(infoAfter!.securityDeposit.toString()).to.eql( - infoBefore!.securityDeposit.toString() - ); - expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); + // Validate balance changes. + // const initialOfferBalanceAfter = await getUsdcAtaBalance( + // connection, + // offerAuthorityOne.publicKey + // ); + // const newOfferBalanceAfter = await getUsdcAtaBalance( + // connection, + // offerAuthorityTwo.publicKey + // ); + // const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + + // const balanceChange = baseFastOrder.maxFee + baseFastOrder.amountIn; + // expect(newOfferBalanceAfter).equals(newOfferBalanceBefore - balanceChange); + // expect(initialOfferBalanceAfter).equals( + // initialOfferBalanceBefore + balanceChange + // ); + // expect(custodyBalanceAfter).equals(custodyBalanceBefore); + + // // Confirm the auction data. + // const auctionDataAfter = await engine.fetchAuction(vaaHash); + // const { info: infoAfter } = auctionDataAfter; + // expect(infoAfter).is.not.null; + + // const newOfferToken = splToken.getAssociatedTokenAddressSync( + // USDC_MINT_ADDRESS, + // offerAuthorityTwo.publicKey + // ); + // const initialOfferToken = splToken.getAssociatedTokenAddressSync( + // USDC_MINT_ADDRESS, + // offerAuthorityOne.publicKey + // ); + + // // TODO: clean up to check deep equal Auction vs Auction + // expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); + // expect(auctionDataAfter.status).to.eql({ active: {} }); + // expect(infoAfter!.bestOfferToken).to.eql(newOfferToken); + // expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); + // expect(infoAfter!.startSlot.toString()).to.eql( + // infoBefore!.startSlot.toString() + // ); + // expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); + // expect(infoAfter!.securityDeposit.toString()).to.eql( + // infoBefore!.securityDeposit.toString() + // ); + // expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); }); } - it(`Improve Offer With Highest Offer Account`, async function () { - const { fastVaaAccount } = await placeInitialOfferForTest( - engine, + it("Improve Offer With Same Best Offer Token Account", async function () { + const { auction, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); const initialOfferBalanceBefore = await getUsdcAtaBalance( @@ -1367,1182 +1338,842 @@ describe("Matching Engine", function () { const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); // New Offer from offerAuthorityOne. - const vaaHash = fastVaaAccount.digest(); - const newOffer = baseFastOrder.maxFee - 100n; - const auctionDataBefore = await engine.fetchAuction(vaaHash); - const { info: infoBefore } = auctionDataBefore; - expect(infoBefore).is.not.null; - - const { bestOfferToken } = infoBefore!; - - await expectIxOk( - connection, - [ - await engine.improveOfferIx(newOffer, vaaHash, { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - }), - ], - [offerAuthorityOne] - ); + const newOffer = BigInt(auctionDataBefore.info!.offerPrice.subn(100).toString()); - // Validate balance changes (nothing should change). - const initialOfferBalanceAfter = await getUsdcAtaBalance( - connection, - offerAuthorityOne.publicKey + const ix = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthorityOne.publicKey, + }, + newOffer ); - const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); - expect(initialOfferBalanceAfter).equals(initialOfferBalanceBefore); - expect(custodyBalanceAfter).equals(custodyBalanceBefore); - - // Confirm the auction data. - const auctionDataAfter = await engine.fetchAuction(vaaHash); - const { info: infoAfter } = auctionDataAfter; - expect(infoAfter).is.not.null; - - const initialOfferToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - offerAuthorityOne.publicKey - ); + await expectIxOk(connection, [ix], [offerAuthorityOne]); - expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ active: {} }); - expect(infoAfter!.bestOfferToken).to.eql(infoBefore!.bestOfferToken); - expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); - expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - expect(infoAfter!.securityDeposit.toString()).to.eql( - infoBefore!.securityDeposit.toString() + await checkAfterEffects( + auction, + offerAuthorityOne.publicKey, + newOffer, + auctionDataBefore, + { + custodyToken: custodyBalanceBefore, + bestOfferToken: initialOfferBalanceBefore, + } ); - expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); }); - it(`Cannot Improve Offer (Auction Expired)`, async function () { - const { fastVaaAccount } = await placeInitialOfferForTest( - engine, + it("Cannot Improve Offer (Auction Expired)", async function () { + const { auction, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // New Offer from offerAuthorityOne. - const vaaHash = fastVaaAccount.digest(); - const newOffer = baseFastOrder.maxFee - 100n; - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; + const { startSlot, offerPrice } = auctionDataBefore.info!; + const { duration, gracePeriod } = await engine.fetchAuctionParameters(); + await waitUntilSlot( + connection, + startSlot.addn(duration + gracePeriod - 1).toNumber() + ); - const { endSlot, bestOfferToken } = info!; + // New Offer from offerAuthorityOne. + const newOffer = BigInt(offerPrice.subn(100).toString()); - await waitUntilSlot(connection, endSlot.toNumber() + 3); + const ix = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthorityOne.publicKey, + }, + newOffer + ); await expectIxErr( connection, - [ - await engine.improveOfferIx(newOffer, vaaHash, { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - }), - ], + [ix], [offerAuthorityOne], "Error Code: AuctionPeriodExpired" ); }); - it(`Cannot Improve Offer (Invalid Best Offer Token Account)`, async function () { - const { fastVaaAccount } = await placeInitialOfferForTest( - engine, + it("Cannot Improve Offer (Invalid Best Offer Token Account)", async function () { + const { auction, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); // New Offer from offerAuthorityOne. - const vaaHash = fastVaaAccount.digest(); - const newOffer = baseFastOrder.maxFee - 100n; + const newOffer = BigInt(auctionDataBefore.info!.offerPrice.subn(100).toString()); - // Pass the wrong address for the best offer token account. + const ix = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthorityOne.publicKey, + bestOfferToken: engine.custodyTokenAccountAddress(), + }, + newOffer + ); await expectIxErr( connection, - [ - await engine.improveOfferIx(newOffer, vaaHash, { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken: engine.custodyTokenAccountAddress(), - }), - ], + [ix], [offerAuthorityOne], "Error Code: BestOfferTokenMismatch" ); }); - it(`Cannot Improve Offer (Auction Not Active)`, async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, + it("Cannot Improve Offer (Offer Price Not Improved)", async function () { + const { auction, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - await waitBySlots(connection, 5); - - // New Offer from offerAuthorityOne. - const vaaHash = fastVaaAccount.digest(); - const newOffer = baseFastOrder.maxFee - 100n; - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; - - const { bestOfferToken } = info!; - - // Excute the fast order so that the auction status changes. - await expectIxOk( - connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - }), - ], - [offerAuthorityOne] + const newOffer = BigInt(auctionDataBefore.info!.offerPrice.toString()); + const ix = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthorityTwo.publicKey, + }, + newOffer ); await expectIxErr( connection, - [ - await engine.improveOfferIx(newOffer, vaaHash, { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - }), - ], - [offerAuthorityOne], - "Error Code: AuctionNotActive" + [ix], + [offerAuthorityTwo], + "Error Code: OfferPriceNotImproved" ); }); - it(`Cannot Improve Offer (Offer Price Not Improved)`, async function () { - const { fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - baseFastOrder, - ethRouter, - baseFastOrder.maxFee + async function checkAfterEffects( + auction: PublicKey, + newOfferAuthority: PublicKey, + offerPrice: bigint, + auctionDataBefore: Auction, + balancesBefore: { + custodyToken: bigint; + bestOfferToken: bigint; + prevBestOfferToken?: bigint; + } + ) { + const { + custodyToken: custodyTokenBefore, + bestOfferToken: bestOfferTokenBefore, + prevBestOfferToken: prevBestOfferTokenBefore, + } = balancesBefore; + + const bestOfferToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + newOfferAuthority + ); + + const { bump, vaaHash, status, info } = auctionDataBefore; + const { + configId, + bestOfferToken: prevBestOfferToken, + initialOfferToken, + startSlot, + amountIn, + securityDeposit, + offerPrice: prevOfferPrice, + amountOut, + } = info!; + expect(offerPrice).not.equals(BigInt(prevOfferPrice.toString())); + + const auctionDataAfter = await engine.fetchAuction({ address: auction }); + expect(auctionDataAfter).to.eql( + new Auction(bump, vaaHash, status, { + configId, + bestOfferToken, + initialOfferToken, + startSlot, + amountIn, + securityDeposit, + offerPrice: bigintToU64BN(offerPrice), + amountOut, + }) ); - // New Offer from offerAuthorityOne. - const vaaHash = fastVaaAccount.digest(); - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; + // Custody token should be unchanged. + const { amount: custodyTokenAfter } = await engine.fetchCustodyTokenAccount(); + expect(custodyTokenAfter).equals(custodyTokenBefore); - const { bestOfferToken } = info!; + const balanceChange = BigInt(amountIn.add(securityDeposit).toString()); - await expectIxErr( - connection, - [ - await engine.improveOfferIx( - baseFastOrder.maxFee, // Offer price not improved. - vaaHash, - { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken, - } - ), - ], - [offerAuthorityOne], - "Error Code: OfferPriceNotImproved" - ); - }); + if (prevBestOfferTokenBefore !== undefined) { + expect(bestOfferToken).to.not.eql(prevBestOfferToken); + + // New offer change. + const { amount: bestOfferTokenAfter } = await splToken.getAccount( + connection, + bestOfferToken + ); + expect(bestOfferTokenAfter).equals(bestOfferTokenBefore - balanceChange); + + // Previous offer refunded. + const { amount: prevBestOfferTokenAfter } = await splToken.getAccount( + connection, + prevBestOfferToken + ); + expect(prevBestOfferTokenAfter).equals( + prevBestOfferTokenBefore + balanceChange + ); + } else { + expect(bestOfferToken).to.eql(prevBestOfferToken); + + // Should be no change. + const { amount: bestOfferTokenAfter } = await splToken.getAccount( + connection, + bestOfferToken + ); + expect(bestOfferTokenAfter).equals(bestOfferTokenBefore); + } + } }); describe("Execute Fast Order", function () { + const localVariables = new Map(); + it("Execute Fast Order Within Grace Period", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, + const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; - - const { bestOfferToken: firstBestOfferToken, initialOfferToken } = info!; - const newOffer = baseFastOrder.maxFee - 100n; - - // Improve the bid with offer one. - await expectIxOk( - connection, - [ - await engine.improveOfferIx(newOffer, vaaHash, { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken: firstBestOfferToken, - }), - ], - [offerAuthorityOne] + const { auctionDataBefore } = await improveOfferForTest( + auction, + offerAuthorityOne, + 100 ); + const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. - const highestOfferBefore = await getUsdcAtaBalance( + const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - offerAuthorityOne.publicKey + bestOfferToken ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - const initialBefore = await getUsdcAtaBalance( + const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - offerAuthorityTwo.publicKey + initialOfferToken ); - const { info: infoBefore } = await engine.fetchAuction(vaaHash); - expect(infoBefore).is.not.null; - - const { endSlot, bestOfferToken } = infoBefore!; + const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); - // Fast forward into the grace period. - await waitUntilSlot(connection, endSlot.toNumber() + 2); - - const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); - const txDetails = await expectIxOkDetails( + const { duration, gracePeriod } = await engine.fetchAuctionParameters(); + await waitUntilSlot( connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - bestOfferToken, - initialOfferToken, - }), - ], - [offerAuthorityOne] + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 1).toNumber() ); - const auctionDataAfter = await engine.fetchAuction(vaaHash); - const { info: infoAfter } = auctionDataAfter; - expect(infoAfter).is.not.null; - // Validate balance changes. - const highestOfferAfter = await getUsdcAtaBalance( - connection, - offerAuthorityOne.publicKey - ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - const initialAfter = await getUsdcAtaBalance( - connection, - offerAuthorityTwo.publicKey - ); + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa, + }); - // console.log( - // "sometimes this fails?", - // initialBefore, - // initialAfter, - // baseFastOrder.initAuctionFee - // ); - expect(initialAfter - initialBefore).equals(baseFastOrder.initAuctionFee); - expect(highestOfferAfter - highestOfferBefore).equals( - baseFastOrder.maxFee + newOffer - ); - expect(custodyBefore - custodyAfter).equals( - baseFastOrder.amountIn + baseFastOrder.maxFee + const txDetails = await expectIxOkDetails(connection, [ix], [offerAuthorityOne]); + + await checkAfterEffects( + txDetails!, + auction, + auctionDataBefore, + { + custodyToken: custodyTokenBefore, + bestOfferToken: bestOfferTokenBefore, + initialOfferToken: initialOfferTokenBefore, + }, + offerAuthorityOne.publicKey, + false, // hasPenalty + "ethereum", + "arbitrum" ); - const slot = bigintToU64BN(BigInt(txDetails!.slot)); + localVariables.set("auction", auction); + }); + + it("Cannot Improve Offer", async function () { + const auction = localVariables.get("auction") as PublicKey; + expect(localVariables.delete("auction")).is.true; - // Validate auction data account. - expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ completed: { slot } }); - expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); - expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); - expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - expect(infoAfter!.securityDeposit.toString()).to.eql( - infoBefore!.securityDeposit.toString() + const ix = await engine.improveOfferIx( + { + offerAuthority: offerAuthorityOne.publicKey, + auction, + }, + baseFastOrder.maxFee ); - expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); - // Validate the core message. - await verifyFillMessage( + await expectIxErr( connection, - message, - baseFastOrder.amountIn - newOffer - baseFastOrder.initAuctionFee, - arbDomain, - { - sourceChain: ethChain, - orderSender: Array.from(baseFastOrder.sender), - redeemer: Array.from(baseFastOrder.redeemer), - redeemerMessage: baseFastOrder.redeemerMessage, - } + [ix], + [offerAuthorityOne], + "Error Code: AuctionNotActive" ); }); - it.skip("Execute Fast Order Within Grace Period (Target == Solana)", async function () { - const fastOrder = { ...baseFastOrder }; - fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.destinationCctpDomain = solanaDomain; - + it("Execute Fast Order After Grace Period", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, + const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( offerAuthorityTwo, wormholeSequence++, - fastOrder, - ethRouter, - fastOrder.maxFee + baseFastOrder, + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; - - const { bestOfferToken: firstBestOfferToken, initialOfferToken } = info!; - const newOffer = fastOrder.maxFee - 100n; - - // Improve the bid with offer one. - await expectIxOk( - connection, - [ - await engine.improveOfferIx(newOffer, vaaHash, { - offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken: firstBestOfferToken, - }), - ], - [offerAuthorityOne] + const { auctionDataBefore } = await improveOfferForTest( + auction, + offerAuthorityOne, + 100 ); + const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. - const highestOfferBefore = await getUsdcAtaBalance( + const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - offerAuthorityOne.publicKey + bestOfferToken ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - const initialBefore = await getUsdcAtaBalance( + const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - offerAuthorityTwo.publicKey + initialOfferToken ); - const auctionDataBefore = await engine.fetchAuction(vaaHash); - const { info: infoBefore } = auctionDataBefore; - expect(infoBefore).is.not.null; - - const { bestOfferToken } = infoBefore!; + const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); - // Fast forward into the grace period. - await waitBySlots(connection, 3); - const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); - await expectIxOk( + const { duration, gracePeriod, penaltySlots } = + await engine.fetchAuctionParameters(); + await waitUntilSlot( connection, - [ - await engine.executeFastOrderLocalIx(vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - bestOfferToken, - initialOfferToken, - }), - ], - [offerAuthorityOne] - ); - - // Validate balance changes. - const highestOfferAfter = await getUsdcAtaBalance( - connection, - offerAuthorityOne.publicKey - ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - const initialAfter = await getUsdcAtaBalance( - connection, - offerAuthorityTwo.publicKey + auctionDataBefore + .info!.startSlot.addn(duration + gracePeriod + penaltySlots / 2) + .toNumber() ); - const auctionDataAfter = await engine.fetchAuction(vaaHash); - const { info: infoAfter } = auctionDataAfter; - expect(infoAfter).is.not.null; - expect(initialAfter - initialBefore).equals(fastOrder.initAuctionFee); - expect(highestOfferAfter - highestOfferBefore).equals(fastOrder.maxFee + newOffer); - expect(custodyBefore - custodyAfter).equals( - fastOrder.maxFee + newOffer + fastOrder.initAuctionFee - ); + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa, + }); - // Validate auction data account. - expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ completed: {} }); - expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); - expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); - expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - expect(infoAfter!.securityDeposit.toString()).to.eql( - infoBefore!.securityDeposit.toString() - ); - expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); + const txDetails = await expectIxOkDetails(connection, [ix], [offerAuthorityOne]); - // Validate the core message. - await verifyFastFillMessage( - connection, - message, - fastOrder.amountIn - newOffer - fastOrder.initAuctionFee, + await checkAfterEffects( + txDetails!, + auction, + auctionDataBefore, { - sourceChain: ethChain, - orderSender: Array.from(fastOrder.sender), - redeemer: Array.from(fastOrder.redeemer), - redeemerMessage: fastOrder.redeemerMessage, - } + custodyToken: custodyTokenBefore, + bestOfferToken: bestOfferTokenBefore, + initialOfferToken: initialOfferTokenBefore, + }, + offerAuthorityOne.publicKey, + true, // hasPenalty + "ethereum", + "arbitrum" ); }); - it("Execute Fast Order After Grace Period", async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, + it("Execute Fast Order After Grace Period with Liquidator", async function () { + // Start the auction with offer two so that we can + // check that the initial offer is refunded. + const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( + offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - const { info: infoBefore } = await engine.fetchAuction(vaaHash); - expect(infoBefore).is.not.null; - - const { bestOfferToken, initialOfferToken } = infoBefore!; + const { auctionDataBefore } = await improveOfferForTest( + auction, + offerAuthorityOne, + 100 + ); + const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. - const highestOfferBefore = await getUsdcAtaBalance( + const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - offerAuthorityOne.publicKey + bestOfferToken ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - const auctionDataBefore = await engine.fetchAuction(vaaHash); - - // Fast forward into the grace period. - await waitBySlots(connection, 7); - const message = await engine.getCoreMessage(offerAuthorityOne.publicKey); - const txDetails = await expectIxOkDetails( + const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - bestOfferToken, - initialOfferToken, - }), - ], - [offerAuthorityOne] + initialOfferToken ); - const { slot: txSlot } = txDetails!; - - const auctionDataAfter = await engine.fetchAuction(vaaHash); - const { info: infoAfter } = auctionDataAfter; - expect(infoAfter).is.not.null; + const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); - // Compute the expected penalty and user reward. - const { reward: expectedReward } = await engine.calculateDynamicPenalty( - infoAfter!, - BigInt(txSlot) + const liquidatorToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + liquidator.publicKey ); - - // Validate balance changes. - const highestOfferAfter = await getUsdcAtaBalance( + const { amount: executorTokenBefore } = await splToken.getAccount( connection, - offerAuthorityOne.publicKey + liquidatorToken ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - // The highest bidder is also the initial bidder in this case. The highest bidder - // is also executing the fast order after the grace period has ended, so they will - // be penalized by the expected user reward portion of the penalty. - expect(highestOfferAfter - highestOfferBefore).equals( - baseFastOrder.maxFee + - baseFastOrder.maxFee + - baseFastOrder.initAuctionFee - - BigInt(expectedReward) - ); - expect(custodyBefore - custodyAfter).equals( - baseFastOrder.amountIn + baseFastOrder.maxFee + const { duration, gracePeriod, penaltySlots } = + await engine.fetchAuctionParameters(); + await waitUntilSlot( + connection, + auctionDataBefore + .info!.startSlot.addn(duration + gracePeriod + penaltySlots / 2) + .toNumber() ); - // Validate auction data account. - expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ - completed: { slot: bigintToU64BN(BigInt(txSlot)) }, + const ix = await engine.executeFastOrderCctpIx({ + payer: liquidator.publicKey, + fastVaa, }); - expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); - expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); - expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - expect(infoAfter!.securityDeposit.toString()).to.eql( - infoBefore!.securityDeposit.toString() - ); - expect(infoAfter!.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); - // Validate the core message. - await verifyFillMessage( - connection, - message, - baseFastOrder.amountIn - - baseFastOrder.maxFee - - baseFastOrder.initAuctionFee + - BigInt(expectedReward), - arbDomain, + const txDetails = await expectIxOkDetails(connection, [ix], [liquidator]); + + await checkAfterEffects( + txDetails!, + auction, + auctionDataBefore, { - sourceChain: ethChain, - orderSender: Array.from(baseFastOrder.sender), - redeemer: Array.from(baseFastOrder.redeemer), - redeemerMessage: baseFastOrder.redeemerMessage, - } + custodyToken: custodyTokenBefore, + bestOfferToken: bestOfferTokenBefore, + initialOfferToken: initialOfferTokenBefore, + executorToken: executorTokenBefore, + }, + liquidator.publicKey, + true, // hasPenalty + "ethereum", + "arbitrum" ); }); - it(`Execute Fast Order With Liquidator (Within Penalty Period)`, async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, + it("Execute Fast Order After Penalty Period with Liquidator", async function () { + // Start the auction with offer two so that we can + // check that the initial offer is refunded. + const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( + offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - const { info: infoBefore } = await engine.fetchAuction(vaaHash); - expect(infoBefore).is.not.null; - const { bestOfferToken, initialOfferToken } = infoBefore!; + const { auctionDataBefore } = await improveOfferForTest( + auction, + offerAuthorityOne, + 100 + ); + const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. - const highestOfferBefore = await getUsdcAtaBalance( + const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - offerAuthorityOne.publicKey + bestOfferToken ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - const liquidatorBefore = await getUsdcAtaBalance( + const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - offerAuthorityTwo.publicKey + initialOfferToken ); - const auctionDataBefore = await engine.fetchAuction(vaaHash); - - // Fast forward into tge penalty period. - await waitBySlots(connection, 10); + const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); - // Execute the fast order with the liquidator (offerAuthorityTwo). - const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); - const txnSignature = await expectIxOk( - connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityTwo.publicKey, - fastVaa, - bestOfferToken, - initialOfferToken, - }), - ], - [offerAuthorityTwo] - ); - const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { - return status.value!.slot; - }); - const auctionDataAfter = await engine.fetchAuction(vaaHash); - const { info: infoAfter } = auctionDataAfter; - expect(infoAfter).is.not.null; - - // Compute the expected penalty and user reward. - const { penalty: expectedPenalty, reward: expectedReward } = - await engine.calculateDynamicPenalty(infoAfter!, BigInt(txnSlot)); - - // Validate balance changes. - const highestOfferAfter = await getUsdcAtaBalance( - connection, - offerAuthorityOne.publicKey + const liquidatorToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + liquidator.publicKey ); - const liquidatorAfter = await getUsdcAtaBalance( + const { amount: executorTokenBefore } = await splToken.getAccount( connection, - offerAuthorityTwo.publicKey + liquidatorToken ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - expect(highestOfferAfter - highestOfferBefore).equals( - baseFastOrder.maxFee + - baseFastOrder.maxFee + - baseFastOrder.initAuctionFee - - BigInt(expectedReward) - - BigInt(expectedPenalty) - ); - expect(liquidatorAfter - liquidatorBefore).equals(BigInt(expectedPenalty)); - expect(custodyBefore - custodyAfter).equals( - baseFastOrder.amountIn + baseFastOrder.maxFee + const { duration, gracePeriod, penaltySlots } = + await engine.fetchAuctionParameters(); + await waitUntilSlot( + connection, + auctionDataBefore + .info!.startSlot.addn(duration + gracePeriod + penaltySlots + 2) + .toNumber() ); - // Validate auction data account. - expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ - completed: { slot: bigintToU64BN(BigInt(txnSlot)) }, + const ix = await engine.executeFastOrderCctpIx({ + payer: liquidator.publicKey, + fastVaa, }); - expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); - expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); - expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - expect(infoAfter!.securityDeposit.toString()).to.eql( - infoBefore!.securityDeposit.toString() - ); - expect(infoAfter!.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); - // Validate the core message. - await verifyFillMessage( - connection, - message, - baseFastOrder.amountIn - - baseFastOrder.maxFee - - baseFastOrder.initAuctionFee + - BigInt(expectedReward), - arbDomain, + const txDetails = await expectIxOkDetails(connection, [ix], [liquidator]); + + await checkAfterEffects( + txDetails!, + auction, + auctionDataBefore, { - sourceChain: ethChain, - orderSender: Array.from(baseFastOrder.sender), - redeemer: Array.from(baseFastOrder.redeemer), - redeemerMessage: baseFastOrder.redeemerMessage, - } + custodyToken: custodyTokenBefore, + bestOfferToken: bestOfferTokenBefore, + initialOfferToken: initialOfferTokenBefore, + executorToken: executorTokenBefore, + }, + liquidator.publicKey, + true, // hasPenalty + "ethereum", + "arbitrum" ); }); - it(`Execute Fast Order With Liquidator (Post Penalty Period)`, async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, + // Cannot perform this test w/o solana endpoint. + it.skip("Cannot Execute Fast Order (Invalid Chain)", async function () { + const fastOrder = { ...baseFastOrder }; + fastOrder.targetChain = ethChain; + fastOrder.destinationCctpDomain = ethDomain; + + const { fastVaa, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, - baseFastOrder, - ethRouter, - baseFastOrder.maxFee + fastOrder, + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - const { info: infoBefore } = await engine.fetchAuction(vaaHash); - expect(infoBefore).is.not.null; - - const { bestOfferToken, initialOfferToken } = infoBefore!; - - // Fetch the balances before. - const highestOfferBefore = await getUsdcAtaBalance( - connection, - offerAuthorityOne.publicKey - ); - const custodyBefore = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - const liquidatorBefore = await getUsdcAtaBalance( + const { duration, gracePeriod } = await engine.fetchAuctionParameters(); + await waitUntilSlot( connection, - offerAuthorityTwo.publicKey + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 2).toNumber() ); - const auctionDataBefore = await engine.fetchAuction(vaaHash); - - // Fast forward past the penalty period. - await waitBySlots(connection, 20); - // Execute the fast order with the liquidator (offerAuthorityTwo). - const message = await engine.getCoreMessage(offerAuthorityTwo.publicKey); - const txnSignature = await expectIxOk( + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa, + }); + await expectIxErr( connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityTwo.publicKey, - fastVaa, - bestOfferToken, - initialOfferToken, - }), - ], - [offerAuthorityTwo] + [ix], + [offerAuthorityOne], + "Error Code: InvalidChain" ); - const txnSlot = await connection.getSignatureStatus(txnSignature).then((status) => { - return status.value!.slot; - }); - const auctionDataAfter = await engine.fetchAuction(vaaHash); - const { info: infoAfter } = auctionDataAfter; - expect(infoAfter).is.not.null; + }); - // Compute the expected penalty and user reward. - const { penalty: expectedPenalty, reward: expectedReward } = - await engine.calculateDynamicPenalty(infoAfter!, BigInt(txnSlot)); + it("Cannot Execute Fast Order with VAA Hash Mismatch", async function () { + const { fastVaaAccount, auction, auctionDataBefore } = + await placeInitialOfferForTest( + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + baseFastOrder.maxFee + ); - // Since we are beyond the penalty period, the entire security deposit - // is divided between the highest bidder and the liquidator. - expect(baseFastOrder.maxFee).equals(expectedReward + expectedPenalty); + const { fastVaa: anotherFastVaa, fastVaaAccount: anotherFastVaaAccount } = + await placeInitialOfferForTest( + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + baseFastOrder.maxFee + ); + expect(fastVaaAccount.digest()).to.not.eql(anotherFastVaaAccount.digest()); - // Validate balance changes. - const highestOfferAfter = await getUsdcAtaBalance( + const { duration, gracePeriod } = await engine.fetchAuctionParameters(); + await waitUntilSlot( connection, - offerAuthorityOne.publicKey - ); - const liquidatorAfter = await getUsdcAtaBalance( - connection, - offerAuthorityTwo.publicKey - ); - const custodyAfter = ( - await splToken.getAccount(connection, engine.custodyTokenAccountAddress()) - ).amount; - - expect(highestOfferAfter - highestOfferBefore).equals( - baseFastOrder.maxFee + - baseFastOrder.maxFee + - baseFastOrder.initAuctionFee - - BigInt(expectedReward) - - BigInt(expectedPenalty) - ); - expect(liquidatorAfter - liquidatorBefore).equals(BigInt(expectedPenalty)); - expect(custodyBefore - custodyAfter).equals( - baseFastOrder.amountIn + baseFastOrder.maxFee + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 2).toNumber() ); - // Validate auction data account. - expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - expect(auctionDataAfter.status).to.eql({ - completed: { slot: bigintToU64BN(BigInt(txnSlot)) }, + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa: anotherFastVaa, + auction, }); - expect(infoAfter!.bestOfferToken).to.eql(bestOfferToken); - expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - expect(infoAfter!.startSlot.toString()).to.eql(infoBefore!.startSlot.toString()); - expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - expect(infoAfter!.securityDeposit.toString()).to.eql( - infoBefore!.securityDeposit.toString() - ); - expect(infoAfter!.offerPrice.toString()).to.eql(baseFastOrder.maxFee.toString()); - - // Validate the core message. - await verifyFillMessage( - connection, - message, - baseFastOrder.amountIn - - baseFastOrder.maxFee - - baseFastOrder.initAuctionFee + - BigInt(expectedReward), - arbDomain, - { - sourceChain: ethChain, - orderSender: Array.from(baseFastOrder.sender), - redeemer: Array.from(baseFastOrder.redeemer), - redeemerMessage: baseFastOrder.redeemerMessage, - } - ); - }); - - it.skip(`Cannot Execute Fast Order (Invalid Chain)`, async function () { - const fastOrder = { ...baseFastOrder }; - fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.destinationCctpDomain = solanaDomain; - - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - fastOrder, - ethRouter, - fastOrder.maxFee - ); - - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; - - const { bestOfferToken, initialOfferToken } = info!; await expectIxErr( connection, - [ - await engine.executeFastOrderCctpIx(solanaChain, solanaDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - bestOfferToken, - initialOfferToken, - }), - ], + [ix], [offerAuthorityOne], - "Error Code: InvalidChain" + "account: auction. Error Code: ConstraintSeeds" ); }); - it.skip(`Cannot Execute Fast Order (Vaa Hash Mismatch)`, async function () { - const { fastVaa } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - baseFastOrder, - ethRouter, - baseFastOrder.maxFee - ); - - const { fastVaa: anotherFastVaa } = await placeInitialOfferForTest( - engine, + it("Cannot Execute Fast Order (Invalid Best Offer Token Account)", async function () { + const { fastVaa, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // TODO: This should be a constraint seeds error. + const bogusToken = engine.custodyTokenAccountAddress(); - // Accounts for the instruction. - // const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - // const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); - // const { bestOfferToken, initialOfferToken } = await engine.fetchAuction(vaaHash); - - // // Fast forward past the penalty period. - // await waitBySlots(connection, 15); - - // await expectIxErr( - // connection, - // [ - // await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash2, { - // payer: offerAuthorityOne.publicKey, - // vaa: vaaKey, - // bestOfferToken, - // initialOfferToken, - // }), - // ], - // [offerAuthorityOne], - // "MismatchedVaaHash" - // ); - }); - - it(`Cannot Execute Fast Order (Invalid Best Offer Token Account)`, async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - baseFastOrder, - ethRouter, - baseFastOrder.maxFee - ); + const { bestOfferToken } = auctionDataBefore.info!; + expect(bogusToken).to.not.eql(bestOfferToken); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa, + bestOfferToken: bogusToken, + }); // Pass the wrong address for the best offer token account. await expectIxErr( connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - bestOfferToken: engine.custodyTokenAccountAddress(), - }), - ], + [ix], [offerAuthorityOne], "Error Code: BestOfferTokenMismatch" ); }); - it(`Cannot Execute Fast Order (Invalid Initial Offer Token Account)`, async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, + it("Cannot Execute Fast Order (Invalid Initial Offer Token Account)", async function () { + const { fastVaa, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); + const bogusToken = engine.custodyTokenAccountAddress(); - // Pass the wrong address for the initial offer token account. + const { initialOfferToken } = auctionDataBefore.info!; + expect(bogusToken).to.not.eql(initialOfferToken); + + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa, + initialOfferToken: bogusToken, + }); + + // Pass the wrong address for the best offer token account. await expectIxErr( connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - initialOfferToken: engine.custodyTokenAccountAddress(), - }), - ], + [ix], [offerAuthorityOne], "Error Code: InitialOfferTokenMismatch" ); }); - it(`Cannot Execute Fast Order (Auction Not Active)`, async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, + it("Execute Fast Order", async function () { + // Start the auction with offer two so that we can + // check that the initial offer is refunded. + const { fastVaa, auctionDataBefore } = await placeInitialOfferForTest( + offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; + const { duration, gracePeriod } = await engine.fetchAuctionParameters(); + await waitUntilSlot( + connection, + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 1).toNumber() + ); - const { endSlot } = info!; + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa, + }); - // Fast forward into the grace period. - await waitUntilSlot(connection, endSlot.addn(2).toNumber()); + await expectIxOk(connection, [ix], [offerAuthorityOne]); - await expectIxOk( - connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - }), - ], - [offerAuthorityOne] - ); + localVariables.set("ix", ix); + }); + + it("Cannot Execute Fast Order on Auction Completed", async function () { + const ix = localVariables.get("ix") as TransactionInstruction; + expect(localVariables.delete("ix")).is.true; - // Should already be completed. await expectIxErr( connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - }), - ], + [ix], [offerAuthorityOne], "Error Code: AuctionNotActive" ); }); - it(`Cannot Execute Fast Order (Auction Period Not Expired)`, async function () { - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, + it("Cannot Execute Fast Order (Auction Period Not Expired)", async function () { + const { fastVaa } = await placeInitialOfferForTest( offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - - // Do not fast forward into the grace period. + const ix = await engine.executeFastOrderCctpIx({ + payer: offerAuthorityOne.publicKey, + fastVaa, + }); - // Pass the wrong address for the initial offer token account. await expectIxErr( connection, - [ - await engine.executeFastOrderCctpIx(arbChain, arbDomain, vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - }), - ], + [ix], [offerAuthorityOne], "Error Code: AuctionPeriodNotExpired" ); }); - it.skip(`Cannot Execute Fast Order Solana (Invalid Chain)`, async function () { + it("Cannot Execute Fast Order Solana (Invalid Chain)", async function () { const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter, - baseFastOrder.maxFee + ethRouter ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - await expectIxErr( connection, [ - await engine.executeFastOrderLocalIx(vaaHash, { + await engine.executeFastOrderLocalIx({ payer: offerAuthorityOne.publicKey, fastVaa, toRouterEndpoint: engine.routerEndpointAddress(arbChain), }), ], [offerAuthorityOne], - "Error Code: InvalidChain" - ); - }); - - it.skip(`Cannot Execute Fast Order Solana (Vaa Hash Mismatch)`, async function () { - const fastOrder = { ...baseFastOrder }; - fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.destinationCctpDomain = solanaDomain; - - const { fastVaa } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - fastOrder, - ethRouter, - baseFastOrder.maxFee - ); - - const { fastVaa: anotherFastVaa } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - fastOrder, - ethRouter, - fastOrder.maxFee + "Error Code: ConstraintSeeds" + ); + }); + + async function checkAfterEffects( + txDetails: VersionedTransactionResponse, + auction: PublicKey, + auctionDataBefore: Auction, + balancesBefore: { + custodyToken: bigint; + bestOfferToken: bigint; + initialOfferToken: bigint; + executorToken?: bigint; + }, + executor: PublicKey, + hasPenalty: boolean, + fromChainName: wormholeSdk.ChainName, + toChainName: wormholeSdk.ChainName + ) { + const { + custodyToken: custodyTokenBefore, + bestOfferToken: bestOfferTokenBefore, + initialOfferToken: initialOfferTokenBefore, + executorToken: executorTokenBefore, + } = balancesBefore; + + const { bump, vaaHash, info } = auctionDataBefore; + + const auctionDataAfter = await engine.fetchAuction({ address: auction }); + expect(auctionDataAfter).to.eql( + new Auction( + bump, + vaaHash, + { completed: { slot: bigintToU64BN(BigInt(txDetails.slot)) } }, + info + ) ); - // Accounts for the instruction. - // const vaaHash = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa).hash); - // const vaaHash2 = wormholeSdk.keccak256(wormholeSdk.parseVaa(signedVaa2).hash); - // const { bestOfferToken, initialOfferToken } = await engine.fetchAuction(vaaHash); - - // // Fast forward past the penalty period. - // await waitBySlots(connection, 15); - - // await expectIxErr( - // connection, - // [ - // await engine.executeFastOrderLocalIx(vaaHash2, { - // payer: offerAuthorityOne.publicKey, - // vaa: vaaKey, - // bestOfferToken, - // initialOfferToken, - // }), - // ], - // [offerAuthorityOne], - // "MismatchedVaaHash" - // ); - }); + const { bestOfferToken, initialOfferToken, securityDeposit, amountIn, offerPrice } = + info!; - it.skip(`Cannot Execute Fast Order Solana (Invalid Best Offer Token Account)`, async function () { - const fastOrder = { ...baseFastOrder }; - fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.destinationCctpDomain = solanaDomain; - - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - fastOrder, - ethRouter, - fastOrder.maxFee + // Validate balance changes. + const { amount: bestOfferTokenAfter } = await splToken.getAccount( + connection, + bestOfferToken ); - - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); - - // Pass the wrong address for the best offer token account. - await expectIxErr( + const { amount: initialOfferTokenAfter } = await splToken.getAccount( connection, - [ - await engine.executeFastOrderLocalIx(vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - bestOfferToken: engine.custodyTokenAccountAddress(), - }), - ], - [offerAuthorityOne], - "Error Code: BestOfferTokenMismatch" + initialOfferToken ); - }); - - it.skip(`Cannot Execute Fast Order Solana (Invalid Initial Offer Token Account)`, async function () { - const fastOrder = { ...baseFastOrder }; - fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.destinationCctpDomain = solanaDomain; - const { fastVaa, fastVaaAccount } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - fastOrder, - ethRouter, - fastOrder.maxFee + const { penalty, userReward } = await engine.computeDepositPenalty( + info!, + BigInt(txDetails.slot), + info!.configId ); - // Accounts for the instruction. - const vaaHash = fastVaaAccount.digest(); + const { + initAuctionFee, + destinationCctpDomain, + sender: orderSender, + redeemer, + redeemerMessage, + } = baseFastOrder; - // Pass the wrong address for the initial offer token account. - await expectIxErr( - connection, - [ - await engine.executeFastOrderLocalIx(vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - initialOfferToken: engine.custodyTokenAccountAddress(), - }), - ], - [offerAuthorityOne], - "Error Code: InitialOfferTokenMismatch" - ); - }); + if (hasPenalty) { + expect(penalty > 0n).is.true; + expect(userReward > 0n).is.true; - it.skip(`Cannot Execute Fast Order Solana (Auction Not Active)`, async function () { - const fastOrder = { ...baseFastOrder }; - fastOrder.targetChain = wormholeSdk.CHAIN_ID_SOLANA; - fastOrder.destinationCctpDomain = solanaDomain; + let depositAndFee = + BigInt(offerPrice.add(securityDeposit).toString()) - userReward; + const executorToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + executor + ); + if (!executorToken.equals(bestOfferToken)) { + depositAndFee -= penalty; + + const { amount: executorTokenAfter } = await splToken.getAccount( + connection, + executorToken + ); + expect(executorTokenAfter).equals(executorTokenBefore! + penalty); + } - const { fastVaa } = await placeInitialOfferForTest( - engine, - offerAuthorityOne, - wormholeSequence++, - fastOrder, - ethRouter, - fastOrder.maxFee - ); + if (bestOfferToken.equals(initialOfferToken)) { + expect(bestOfferTokenAfter).equals( + bestOfferTokenBefore + depositAndFee + initAuctionFee + ); + } else { + expect(bestOfferTokenAfter).equals(bestOfferTokenBefore + depositAndFee); + expect(initialOfferTokenAfter).equals( + initialOfferTokenBefore + initAuctionFee + ); + } + } else { + expect(penalty).equals(0n); + expect(userReward).equals(0n); + + const depositAndFee = BigInt(offerPrice.add(securityDeposit).toString()); + + if (bestOfferToken.equals(initialOfferToken)) { + expect(bestOfferTokenAfter).equals( + bestOfferTokenBefore + depositAndFee + initAuctionFee + ); + } else { + expect(bestOfferTokenAfter).equals(bestOfferTokenBefore + depositAndFee); + expect(initialOfferTokenAfter).equals( + initialOfferTokenBefore + initAuctionFee + ); + } + } - // Accounts for the instruction. - const vaaHash = await VaaAccount.fetch(connection, fastVaa).then((vaa) => - vaa.digest() + const { amount: custodyTokenAfter } = await engine.fetchCustodyTokenAccount(); + expect(custodyTokenAfter).equals( + custodyTokenBefore - BigInt(amountIn.add(securityDeposit).toString()) ); - const { info } = await engine.fetchAuction(vaaHash); - expect(info).is.not.null; - const { endSlot } = info!; + // Validate the core message. + const message = await engine.getCoreMessage(executor); + const { + message: { payload }, + } = await getPostedMessage(connection, message); + const parsed = LiquidityLayerMessage.decode(payload); + expect(parsed.deposit?.message.fill).is.not.undefined; + + const { + header: { + amount: actualAmount, + destinationCctpDomain: actualDestinationCctpDomain, + mintRecipient, + }, + message: { fill }, + } = parsed.deposit!; - // Fast forward into the grace period. - await waitUntilSlot(connection, endSlot.addn(2).toNumber()); + const userAmount = + BigInt(amountIn.sub(offerPrice).toString()) - initAuctionFee + userReward; + expect(actualAmount).equals(userAmount); + expect(actualDestinationCctpDomain).equals(destinationCctpDomain); - await expectIxOk( - connection, - [ - await engine.executeFastOrderLocalIx(vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - }), - ], - [offerAuthorityOne] + const sourceChain = wormholeSdk.coalesceChainId(fromChainName); + const { mintRecipient: expectedMintRecipient } = await engine.fetchRouterEndpoint( + wormholeSdk.coalesceChainId(toChainName) ); + expect(mintRecipient).to.eql(expectedMintRecipient); - // Should already be completed. - await expectIxErr( - connection, - [ - await engine.executeFastOrderLocalIx(vaaHash, { - payer: offerAuthorityOne.publicKey, - fastVaa, - }), - ], - [offerAuthorityOne], - "Error Code: AuctionNotActive" - ); - }); + const expectedFill: Fill = { + sourceChain, + orderSender, + redeemer, + redeemerMessage, + }; + expect(fill).to.eql(expectedFill); + } }); describe("Prepare Order Response", function () { @@ -2906,50 +2537,79 @@ describe("Matching Engine", function () { } }); }); -}); -async function placeInitialOfferForTest( - engine: MatchingEngineProgram, - offerAuthority: Keypair, - sequence: bigint, - fastMarketOrder: FastMarketOrder, - emitter: number[], - feeOffer: bigint, - chainName?: wormholeSdk.ChainName -): Promise<{ - fastVaa: PublicKey; - fastVaaAccount: VaaAccount; - txDetails: VersionedTransactionResponse; -}> { - const connection = engine.program.provider.connection; - const fastVaa = await postLiquidityLayerVaa( - connection, - offerAuthority, - MOCK_GUARDIANS, - emitter, - sequence, - new LiquidityLayerMessage({ fastMarketOrder }), - chainName - ); + async function placeInitialOfferForTest( + offerAuthority: Keypair, + sequence: bigint, + fastMarketOrder: FastMarketOrder, + emitter: number[], + feeOffer?: bigint, + chainName?: wormholeSdk.ChainName + ): Promise<{ + fastVaa: PublicKey; + fastVaaAccount: VaaAccount; + txDetails: VersionedTransactionResponse; + auction: PublicKey; + auctionDataBefore: Auction; + }> { + const fastVaa = await postLiquidityLayerVaa( + connection, + offerAuthority, + MOCK_GUARDIANS, + emitter, + sequence, + new LiquidityLayerMessage({ fastMarketOrder }), + chainName + ); - // Place the initial offer. - const ix = await engine.placeInitialOfferIx( - { - payer: offerAuthority.publicKey, - fastVaa, - }, - feeOffer - ); + // Place the initial offer. + const ix = await engine.placeInitialOfferIx( + { + payer: offerAuthority.publicKey, + fastVaa, + }, + feeOffer ?? fastMarketOrder.maxFee + ); - const txDetails = await expectIxOkDetails(connection, [ix], [offerAuthority]); - if (txDetails === null) { - throw new Error("Transaction details is null"); + const txDetails = await expectIxOkDetails(connection, [ix], [offerAuthority]); + if (txDetails === null) { + throw new Error("Transaction details is null"); + } + + const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); + const auction = engine.auctionAddress(fastVaaAccount.digest()); + const auctionDataBefore = await engine.fetchAuction({ address: auction }); + + return { fastVaa, fastVaaAccount, txDetails, auction, auctionDataBefore }; } - const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); + async function improveOfferForTest( + auction: PublicKey, + offerAuthority: Keypair, + improveBy: number + ) { + const auctionData = await engine.fetchAuction({ address: auction }); + const newOffer = BigInt(auctionData.info!.offerPrice.subn(improveBy).toString()); + + const improveIx = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthority.publicKey, + }, + newOffer + ); + + // Improve the bid with offer one. + await expectIxOk(connection, [improveIx], [offerAuthority]); - return { fastVaa, fastVaaAccount, txDetails }; -} + const auctionDataBefore = await engine.fetchAuction({ address: auction }); + expect(BigInt(auctionDataBefore.info!.offerPrice.toString())).equals(newOffer); + + return { + auctionDataBefore, + }; + } +}); async function craftCctpTokenBurnMessage( engine: MatchingEngineProgram, diff --git a/solana/ts/tests/helpers/matching_engine_utils.ts b/solana/ts/tests/helpers/matching_engine_utils.ts deleted file mode 100644 index 9b86f9e3..00000000 --- a/solana/ts/tests/helpers/matching_engine_utils.ts +++ /dev/null @@ -1,42 +0,0 @@ -import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; -import { getAccount, getAssociatedTokenAddressSync } from "@solana/spl-token"; -import { Connection, PublicKey } from "@solana/web3.js"; -import { expect } from "chai"; -import { Fill, LiquidityLayerMessage } from "../../src"; -import { USDC_MINT_ADDRESS } from "../../tests/helpers"; - -export async function getUsdcAtaBalance(connection: Connection, owner: PublicKey) { - const { amount } = await getAccount( - connection, - getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, owner) - ); - return amount; -} - -export async function verifyFillMessage( - connection: Connection, - message: PublicKey, - amount: bigint, - targetDomain: number, - expectedFill: Fill -) { - const fillPayload = (await getPostedMessage(connection, message)).message.payload; - const parsed = LiquidityLayerMessage.decode(fillPayload); - - expect(parsed.deposit?.header.amount).to.equal(amount); - expect(parsed.deposit?.header.destinationCctpDomain).to.equal(targetDomain); - expect(parsed.deposit?.message.fill).to.deep.equal(expectedFill); -} - -export async function verifyFastFillMessage( - connection: Connection, - message: PublicKey, - amount: bigint, - expectedFill: Fill -) { - const fillPayload = (await getPostedMessage(connection, message)).message.payload; - const parsed = LiquidityLayerMessage.decode(fillPayload); - - expect(parsed.fastFill?.fill).to.deep.equal(expectedFill); - expect(parsed.fastFill?.amount).to.equal(amount); -} diff --git a/solana/ts/tests/helpers/utils.ts b/solana/ts/tests/helpers/utils.ts index 493c2a21..7fe19c82 100644 --- a/solana/ts/tests/helpers/utils.ts +++ b/solana/ts/tests/helpers/utils.ts @@ -1,4 +1,6 @@ import { postVaaSolana, solana as wormSolana } from "@certusone/wormhole-sdk"; +import { BN } from "@coral-xyz/anchor"; +import * as splToken from "@solana/spl-token"; import { AddressLookupTableAccount, ConfirmOptions, @@ -13,12 +15,7 @@ import { import { expect } from "chai"; import { execSync } from "child_process"; import { Err, Ok } from "ts-results"; -import { CORE_BRIDGE_PID } from "./consts"; -import { BN } from "@coral-xyz/anchor"; - -export function expectDeepEqual(a: T, b: T) { - expect(JSON.stringify(a)).to.equal(JSON.stringify(b)); -} +import { CORE_BRIDGE_PID, USDC_MINT_ADDRESS } from "./consts"; async function confirmLatest(connection: Connection, signature: string) { return connection.getLatestBlockhash().then(({ blockhash, lastValidBlockHeight }) => @@ -236,3 +233,11 @@ export async function waitUntilSlot(connection: Connection, targetSlot: number) }); }); } + +export async function getUsdcAtaBalance(connection: Connection, owner: PublicKey) { + const { amount } = await splToken.getAccount( + connection, + splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, owner) + ); + return amount; +} From 11678389ea5aa398bdcf59dd5acebdd537150503 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 11:24:06 -0600 Subject: [PATCH 093/126] solana: add localnet feature --- solana/Cargo.lock | 2 - solana/Makefile | 10 ++- solana/modules/common/Cargo.toml | 3 +- solana/modules/common/src/constants/usdc.rs | 8 ++- solana/programs/matching-engine/Cargo.toml | 8 +-- .../matching-engine/src/custody_token.rs | 2 + solana/programs/matching-engine/src/lib.rs | 3 + .../admin/router_endpoint/add/local.rs | 6 +- .../admin/router_endpoint/add/mod.rs | 3 +- .../auction/execute_fast_order/cctp.rs | 12 ++-- .../auction/execute_fast_order/local.rs | 9 +-- .../auction/execute_fast_order/mod.rs | 6 +- .../processor/auction/offer/place_initial.rs | 7 +- .../auction/prepare_settlement/cctp.rs | 11 +-- .../processor/auction/settle/active/cctp.rs | 11 +-- .../processor/auction/settle/active/local.rs | 8 ++- .../processor/auction/settle/active/mod.rs | 10 +-- .../src/processor/auction/settle/none/cctp.rs | 11 +-- .../processor/auction/settle/none/local.rs | 8 ++- .../src/processor/auction/settle/none/mod.rs | 10 +-- .../src/processor/complete_fast_fill.rs | 5 +- .../programs/matching-engine/src/utils/mod.rs | 2 +- solana/programs/token-router/Cargo.toml | 8 +-- .../token-router/src/custody_token.rs | 2 + solana/programs/token-router/src/lib.rs | 4 +- .../admin/router_endpoint/add_cctp.rs | 13 ++-- .../src/processor/market_order/place_cctp.rs | 11 +-- .../src/processor/redeem_fill/cctp.rs | 15 ++-- .../src/processor/redeem_fill/fast.rs | 10 +-- solana/ts/src/matchingEngine/index.ts | 17 +++-- solana/ts/src/tokenRouter/index.ts | 68 +++++++++---------- solana/ts/tests/01__matchingEngine.ts | 7 +- solana/ts/tests/02__tokenRouter.ts | 14 ++-- solana/ts/tests/04__interaction.ts | 6 +- solana/ts/tests/helpers/consts.ts | 2 +- 35 files changed, 191 insertions(+), 141 deletions(-) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 88b5653f..a339a7cb 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1211,7 +1211,6 @@ dependencies = [ "liquidity-layer-common-solana", "ruint", "solana-program", - "wormhole-cctp-solana", ] [[package]] @@ -2159,7 +2158,6 @@ dependencies = [ "matching-engine", "ruint", "solana-program", - "wormhole-cctp-solana", ] [[package]] diff --git a/solana/Makefile b/solana/Makefile index afb8948e..8ef4f34e 100644 --- a/solana/Makefile +++ b/solana/Makefile @@ -5,7 +5,7 @@ out_mainnet=artifacts-mainnet out_testnet=artifacts-testnet out_localnet=artifacts-localnet -.PHONY: all clean check build test lint ci +.PHONY: all clean check build test lint ci cargo-test all: check @@ -19,8 +19,11 @@ clean: node_modules: npm ci +cargo-test $(NETWORK): + cargo test --features "$(NETWORK)" --no-default-features + build: $(out_$(NETWORK)) -$(out_$(NETWORK)): +$(out_$(NETWORK)): cargo-test ifdef out_$(NETWORK) anchor build -p token_router --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features anchor build -p matching_engine --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features @@ -29,7 +32,8 @@ ifdef out_$(NETWORK) endif test: node_modules - cargo test --all-features + NETWORK=localnet $(MAKE) cargo-test + NETWORK=testnet $(MAKE) cargo-test anchor build -p token_router --arch sbf -- --features testnet mkdir -p ts/tests/artifacts && cp target/deploy/token_router.so ts/tests/artifacts/testnet_token_router.so anchor build -p matching_engine --arch sbf -- --features testnet diff --git a/solana/modules/common/Cargo.toml b/solana/modules/common/Cargo.toml index 762a0e74..0c854b59 100644 --- a/solana/modules/common/Cargo.toml +++ b/solana/modules/common/Cargo.toml @@ -11,9 +11,10 @@ repository.workspace = true [features] testnet = ["wormhole-cctp-solana/testnet"] +localnet = ["wormhole-cctp-solana/testnet"] [dependencies] -wormhole-cctp-solana.workspace = true +wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true wormhole-raw-vaas.workspace = true diff --git a/solana/modules/common/src/constants/usdc.rs b/solana/modules/common/src/constants/usdc.rs index 604ed7b7..fa5b5b19 100644 --- a/solana/modules/common/src/constants/usdc.rs +++ b/solana/modules/common/src/constants/usdc.rs @@ -1,7 +1,9 @@ cfg_if::cfg_if! { - if #[cfg(feature = "testnet")] { - anchor_lang::declare_id!("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); - } else if #[cfg(feature = "mainnet")] { + if #[cfg(feature = "mainnet")] { anchor_lang::declare_id!("EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v"); + } else if #[cfg(feature = "testnet")] { + anchor_lang::declare_id!("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + } else if #[cfg(feature = "localnet")] { + anchor_lang::declare_id!("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); } } diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index ecfda710..bd0b105a 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -12,17 +12,17 @@ repository.workspace = true crate-type = ["cdylib", "lib"] [features] -default = ["testnet", "no-idl"] +default = ["localnet", "no-idl"] no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["common/testnet", "wormhole-cctp-solana/testnet"] -integration-test = ["testnet"] +testnet = ["common/testnet"] +localnet = ["common/localnet"] +integration-test = ["localnet"] [dependencies] common.workspace = true -wormhole-cctp-solana = { workspace = true, features = ["cpi"] } anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true diff --git a/solana/programs/matching-engine/src/custody_token.rs b/solana/programs/matching-engine/src/custody_token.rs index 39c97abf..b64d8526 100644 --- a/solana/programs/matching-engine/src/custody_token.rs +++ b/solana/programs/matching-engine/src/custody_token.rs @@ -2,6 +2,8 @@ use anchor_lang::prelude::declare_id; cfg_if::cfg_if! { if #[cfg(feature = "testnet")] { + declare_id!("6yKmqWarCry3c8ntYKzM4WiS2fVypxLbENE2fP8onJje"); + } else if #[cfg(feature = "localnet")] { declare_id!("5T6PsQ8m8xtU5sX51LGKV2EXwHzX5pF6nKoKndp7QUNQ"); } } diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 8fa2ad40..9c1113fa 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -17,6 +17,9 @@ use anchor_lang::prelude::*; cfg_if::cfg_if! { if #[cfg(feature = "testnet")] { // Placeholder. + declare_id!("mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS"); + const CUSTODIAN_BUMP: u8 = 254; + } else if #[cfg(feature = "localnet")] { declare_id!("MatchingEngine11111111111111111111111111111"); const CUSTODIAN_BUMP: u8 = 254; } diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs index 45baf774..f0235c1a 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -4,8 +4,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::admin::utils::assistant::only_authorized; -use wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN; +use common::{ + admin::utils::assistant::only_authorized, + wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, +}; #[derive(Accounts)] pub struct AddLocalRouterEndpoint<'info> { diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs index 83a89d84..e6ec05a5 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs @@ -56,7 +56,8 @@ pub fn add_router_endpoint( } = args; require!( - chain != 0 && chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + chain != 0 + && chain != common::wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, MatchingEngineError::ChainNotAllowed ); diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index e404d711..202de535 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -5,11 +5,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [execute_fast_order_cctp]. diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index 3dea4f09..58980734 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -5,9 +5,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use common::{ + wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, + wormhole_io::TypePrefixedPayload, +}; #[derive(Accounts)] pub struct ExecuteFastOrderLocal<'info> { @@ -148,7 +149,7 @@ pub fn execute_fast_order_local(ctx: Context) -> Result<( core_bridge_program::cpi::post_message( CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), - wormhole_cctp_solana::cpi::PostMessage { + core_bridge_program::cpi::PostMessage { payer: ctx.accounts.payer.to_account_info(), message: ctx.accounts.core_message.to_account_info(), emitter: ctx.accounts.custodian.to_account_info(), diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index f5b6a4f9..c41d92d7 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -11,8 +11,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::{raw::LiquidityLayerPayload, Fill}; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use common::{ + messages::{raw::LiquidityLayerPayload, Fill}, + wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, +}; struct PrepareFastExecution<'ctx, 'info> { custodian: &'ctx AccountInfo<'info>, diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index 469abc5e..9e4f2b2a 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -1,8 +1,9 @@ use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::raw::LiquidityLayerPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use common::{ + messages::raw::LiquidityLayerPayload, + wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, +}; use crate::{ error::MatchingEngineError, diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index a12afe41..e0575514 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -4,10 +4,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::raw::{LiquidityLayerDepositMessage, LiquidityLayerMessage}; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, +use common::{ + messages::raw::{LiquidityLayerDepositMessage, LiquidityLayerMessage}, + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, + }, }; #[derive(Accounts)] diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index e1db17ce..b08597de 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -7,10 +7,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_active_cctp]. diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs index aee1b217..8875ae2a 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -7,8 +7,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}; +use common::{ + wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, + wormhole_io::TypePrefixedPayload, +}; /// Accounts required for [settle_auction_active_local]. #[derive(Accounts)] @@ -174,7 +176,7 @@ pub fn settle_auction_active_local(ctx: Context) -> Re core_bridge_program::cpi::post_message( CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), - wormhole_cctp_solana::cpi::PostMessage { + core_bridge_program::cpi::PostMessage { payer: ctx.accounts.payer.to_account_info(), message: ctx.accounts.core_message.to_account_info(), emitter: ctx.accounts.custodian.to_account_info(), diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index faa4a901..996c1b8d 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -10,11 +10,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::{ - raw::{FastMarketOrder, LiquidityLayerMessage}, - Fill, +use common::{ + messages::{ + raw::{FastMarketOrder, LiquidityLayerMessage}, + Fill, + }, + wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, }; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; struct SettleActiveAndPrepareFill<'ctx, 'info> { custodian: &'ctx AccountInfo<'info>, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs index fbd5f915..b6fc7815 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs @@ -4,10 +4,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_none_cctp]. diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs index d40ca044..d39f4320 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -4,8 +4,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}; +use common::{ + wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, + wormhole_io::TypePrefixedPayload, +}; /// Accounts required for [settle_auction_none_local]. #[derive(Accounts)] @@ -178,7 +180,7 @@ pub fn settle_auction_none_local(ctx: Context) -> Result core_bridge_program::cpi::post_message( CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), - wormhole_cctp_solana::cpi::PostMessage { + core_bridge_program::cpi::PostMessage { payer: ctx.accounts.payer.to_account_info(), message: ctx.accounts.core_message.to_account_info(), emitter: ctx.accounts.custodian.to_account_info(), diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs index 9dd4467a..c8d00c3d 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -7,11 +7,13 @@ pub use local::*; use crate::state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, RouterEndpoint}; use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::{ - raw::{FastMarketOrder, LiquidityLayerMessage}, - Fill, +use common::{ + messages::{ + raw::{FastMarketOrder, LiquidityLayerMessage}, + Fill, + }, + wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, }; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; struct SettleNoneAndPrepareFill<'ctx, 'info> { custodian: &'ctx Account<'info, Custodian>, diff --git a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs index c094a40e..f38d9afa 100644 --- a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -1,7 +1,8 @@ use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::raw::LiquidityLayerMessage; -use wormhole_cctp_solana::wormhole::core_bridge_program; +use common::{ + messages::raw::LiquidityLayerMessage, wormhole_cctp_solana::wormhole::core_bridge_program, +}; use crate::{ error::MatchingEngineError, diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 9f93d3f9..3b605765 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -5,7 +5,7 @@ use crate::{ state::{Auction, AuctionConfig, AuctionStatus, RouterEndpoint}, }; use anchor_lang::prelude::*; -use wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use common::wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; pub fn verify_router_path( vaa: &VaaAccount<'_>, diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index 18476ad8..a7548a80 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -12,18 +12,18 @@ repository.workspace = true crate-type = ["cdylib", "lib"] [features] -default = ["testnet", "no-idl"] +default = ["localnet", "no-idl"] no-entrypoint = [] no-idl = [] no-log-ix-name = [] cpi = ["no-entrypoint"] -testnet = ["common/testnet", "wormhole-cctp-solana/testnet", "matching-engine/testnet"] -integration-test = ["testnet"] +testnet = ["common/testnet", "matching-engine/testnet"] +localnet = ["common/localnet", "matching-engine/localnet"] +integration-test = ["localnet"] [dependencies] common.workspace = true matching-engine = { workspace = true, features = ["cpi"] } -wormhole-cctp-solana = { workspace = true, features = ["cpi"] } anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true diff --git a/solana/programs/token-router/src/custody_token.rs b/solana/programs/token-router/src/custody_token.rs index 23022a54..a351322a 100644 --- a/solana/programs/token-router/src/custody_token.rs +++ b/solana/programs/token-router/src/custody_token.rs @@ -2,6 +2,8 @@ use anchor_lang::prelude::declare_id; cfg_if::cfg_if! { if #[cfg(feature = "testnet")] { + declare_id!("EPEpG3P1Vvak3stx7RnwQD9vWFLpWzpXnbfXc1owrD7o"); + } else if #[cfg(feature = "localnet")] { declare_id!("EkC51gZDovMhsZCN8KYYY7GoVs3Pi5WQ1hfUw1kR7462"); } } diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 4bfd722d..1e1a5cf2 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -14,7 +14,9 @@ use anchor_lang::prelude::*; cfg_if::cfg_if! { if #[cfg(feature = "testnet")] { - // Placeholder. + declare_id!("tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md"); + const CUSTODIAN_BUMP: u8 = 255; + } else if #[cfg(feature = "localnet")] { declare_id!("TokenRouter11111111111111111111111111111111"); const CUSTODIAN_BUMP: u8 = 253; } diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs index 993bff08..0616f8bb 100644 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs +++ b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs @@ -3,10 +3,13 @@ use crate::{ state::{Custodian, MessageProtocol, RouterEndpoint}, }; use anchor_lang::prelude::*; -use common::admin::utils::assistant::only_authorized; -use wormhole_cctp_solana::{ - cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, - utils::ExternalAccount, +use common::{ + admin::utils::assistant::only_authorized, + wormhole_cctp_solana::{ + cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, + utils::ExternalAccount, + wormhole::core_bridge_program, + }, }; #[derive(Accounts)] @@ -71,7 +74,7 @@ pub fn add_cctp_router_endpoint( } = args; require!( - chain != 0 && chain != wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + chain != 0 && chain != core_bridge_program::SOLANA_CHAIN, TokenRouterError::ChainNotAllowed ); diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index f1ba614b..a8dab036 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -4,10 +4,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_io::TypePrefixedPayload; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [place_market_order_cctp]. diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 7846e077..17c6f2b8 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -4,12 +4,15 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::raw::LiquidityLayerDepositMessage; -use wormhole_cctp_solana::{ - cctp::{message_transmitter_program, token_messenger_minter_program}, - cpi::ReceiveMessageArgs, - utils::WormholeCctpPayload, - wormhole::core_bridge_program::VaaAccount, +use common::{ + messages::raw::LiquidityLayerDepositMessage, + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + cpi::ReceiveMessageArgs, + utils::WormholeCctpPayload, + wormhole::core_bridge_program::VaaAccount, + }, }; /// Accounts required for [redeem_cctp_fill]. diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 590f69cb..9b2f0548 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -4,8 +4,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::messages::raw::LiquidityLayerMessage; -use wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}; +use common::{ + messages::raw::LiquidityLayerMessage, + wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, +}; /// Accounts required for [redeem_fast_fill]. #[derive(Accounts)] @@ -105,9 +107,7 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { &[Custodian::SIGNER_SEEDS], ))?; - let vaa = - wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount::load(&ctx.accounts.vaa) - .unwrap(); + let vaa = VaaAccount::load(&ctx.accounts.vaa).unwrap(); let fast_fill = LiquidityLayerMessage::try_from(vaa.try_payload().unwrap()) .unwrap() .to_fast_fill_unchecked(); diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 9ebf9680..69888920 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -22,7 +22,10 @@ import { } from "./state"; import { LiquidityLayerMessage } from "../messages"; -export const PROGRAM_IDS = ["MatchingEngine11111111111111111111111111111"] as const; +export const PROGRAM_IDS = [ + "MatchingEngine11111111111111111111111111111", + "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS", +] as const; export const FEE_PRECISION_MAX = 1_000_000n; @@ -1120,7 +1123,7 @@ export class MatchingEngineProgram { "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" ); } - case mainnet(): { + case localnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" @@ -1140,7 +1143,7 @@ export class MatchingEngineProgram { "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" ); } - case mainnet(): { + case localnet(): { return new MessageTransmitterProgram( this.program.provider.connection, "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" @@ -1157,8 +1160,8 @@ export class MatchingEngineProgram { case testnet(): { return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); } - case mainnet(): { - return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); + case localnet(): { + return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); } default: { throw new Error("unsupported network"); @@ -1202,9 +1205,9 @@ export class MatchingEngineProgram { } export function testnet(): ProgramId { - return "MatchingEngine11111111111111111111111111111"; + return "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS"; } -export function mainnet(): ProgramId { +export function localnet(): ProgramId { return "MatchingEngine11111111111111111111111111111"; } diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 657cb6ce..dbe938f3 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -20,7 +20,10 @@ import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; import { Custodian, PayerSequence, PreparedFill, PreparedOrder, RouterEndpoint } from "./state"; -export const PROGRAM_IDS = ["TokenRouter11111111111111111111111111111111"] as const; +export const PROGRAM_IDS = [ + "TokenRouter11111111111111111111111111111111", + "tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md", +] as const; export type ProgramId = (typeof PROGRAM_IDS)[number]; @@ -103,7 +106,6 @@ export type RedeemFastFillAccounts = { matchingEngineRouterEndpoint: PublicKey; matchingEngineCustodyToken: PublicKey; matchingEngineProgram: PublicKey; - tokenProgram: PublicKey; }; export type AddCctpRouterEndpointArgs = { @@ -591,7 +593,6 @@ export class TokenRouterProgram { routerEndpoint: matchingEngineRouterEndpoint, custodyToken: matchingEngineCustodyToken, matchingEngineProgram, - tokenProgram, }, } = await this.matchingEngineProgram().redeemFastFillAccounts(vaa); @@ -604,7 +605,6 @@ export class TokenRouterProgram { matchingEngineRouterEndpoint, matchingEngineCustodyToken, matchingEngineProgram, - tokenProgram, }; } @@ -622,7 +622,6 @@ export class TokenRouterProgram { matchingEngineRouterEndpoint, matchingEngineCustodyToken, matchingEngineProgram, - tokenProgram, } = await this.redeemFastFillAccounts(vaa); return this.program.methods @@ -638,7 +637,6 @@ export class TokenRouterProgram { matchingEngineRouterEndpoint, matchingEngineCustodyToken, matchingEngineProgram, - tokenProgram, }) .instruction(); } @@ -798,6 +796,26 @@ export class TokenRouterProgram { .instruction(); } + publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { + const coreBridgeProgram = this.coreBridgeProgramId(); + + return { + coreBridgeConfig: PublicKey.findProgramAddressSync( + [Buffer.from("Bridge")], + coreBridgeProgram + )[0], + coreEmitterSequence: PublicKey.findProgramAddressSync( + [Buffer.from("Sequence"), emitter.toBuffer()], + coreBridgeProgram + )[0], + coreFeeCollector: PublicKey.findProgramAddressSync( + [Buffer.from("fee_collector")], + coreBridgeProgram + )[0], + coreBridgeProgram, + }; + } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { switch (this._programId) { case testnet(): { @@ -806,7 +824,7 @@ export class TokenRouterProgram { "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" ); } - case mainnet(): { + case localnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" @@ -826,7 +844,7 @@ export class TokenRouterProgram { "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" ); } - case mainnet(): { + case localnet(): { return new MessageTransmitterProgram( this.program.provider.connection, "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" @@ -847,10 +865,10 @@ export class TokenRouterProgram { this.mint ); } - case mainnet(): { + case localnet(): { return new matchingEngineSdk.MatchingEngineProgram( this.program.provider.connection, - matchingEngineSdk.mainnet(), + matchingEngineSdk.localnet(), this.mint ); } @@ -860,33 +878,13 @@ export class TokenRouterProgram { } } - publishMessageAccounts(emitter: PublicKey): PublishMessageAccounts { - const coreBridgeProgram = this.coreBridgeProgramId(); - - return { - coreBridgeConfig: PublicKey.findProgramAddressSync( - [Buffer.from("Bridge")], - coreBridgeProgram - )[0], - coreEmitterSequence: PublicKey.findProgramAddressSync( - [Buffer.from("Sequence"), emitter.toBuffer()], - coreBridgeProgram - )[0], - coreFeeCollector: PublicKey.findProgramAddressSync( - [Buffer.from("fee_collector")], - coreBridgeProgram - )[0], - coreBridgeProgram, - }; - } - coreBridgeProgramId(): PublicKey { switch (this._programId) { case testnet(): { return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); } - case mainnet(): { - return new PublicKey("worm2ZoG2kUd4vFXhvjh93UUH596ayRfgQ2MgjNMTth"); + case localnet(): { + return new PublicKey("3u8hJUVTA4jH1wYAyUur7FFZVQ8H635K3tSHHF4ssjQ5"); } default: { throw new Error("unsupported network"); @@ -895,10 +893,10 @@ export class TokenRouterProgram { } } -export function testnet(): ProgramId { +export function localnet(): ProgramId { return "TokenRouter11111111111111111111111111111111"; } -export function mainnet(): ProgramId { - return "TokenRouter11111111111111111111111111111111"; +export function testnet(): ProgramId { + return "tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md"; } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index bd8928c2..84d0486d 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -27,6 +27,7 @@ import { Custodian, MatchingEngineProgram, RouterEndpoint, + localnet, } from "../src/matchingEngine"; import { VaaAccount } from "../src/wormhole"; import { @@ -79,11 +80,7 @@ describe("Matching Engine", function () { const solanaDomain = 5; // Matching Engine program. - const engine = new MatchingEngineProgram( - connection, - "MatchingEngine11111111111111111111111111111", - USDC_MINT_ADDRESS - ); + const engine = new MatchingEngineProgram(connection, localnet(), USDC_MINT_ADDRESS); describe("Admin", function () { describe("Initialize", function () { diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 8fbaa4dd..5775f906 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -12,7 +12,13 @@ import { import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { CctpTokenBurnMessage, LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; -import { Custodian, PreparedOrder, RouterEndpoint, TokenRouterProgram } from "../src/tokenRouter"; +import { + Custodian, + PreparedOrder, + RouterEndpoint, + TokenRouterProgram, + localnet, +} from "../src/tokenRouter"; import { CircleAttester, ETHEREUM_USDC_ADDRESS, @@ -42,11 +48,7 @@ describe("Token Router", function () { const foreignEndpointAddress = Array.from(Buffer.alloc(32, "deadbeef", "hex")); const foreignCctpDomain = 0; const unregisteredContractAddress = Buffer.alloc(32, "deafbeef", "hex"); - const tokenRouter = new TokenRouterProgram( - connection, - "TokenRouter11111111111111111111111111111111", - USDC_MINT_ADDRESS - ); + const tokenRouter = new TokenRouterProgram(connection, localnet(), USDC_MINT_ADDRESS); let lookupTableAddress: PublicKey; diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 0c20c66c..393a5fdc 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -1,7 +1,7 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import { BN } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; -import { Connection, Keypair, PublicKey, SYSVAR_RENT_PUBKEY } from "@solana/web3.js"; +import { Connection, Keypair, PublicKey } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; @@ -31,12 +31,12 @@ describe("Matching Engine <> Token Router", function () { const foreignChain = wormholeSdk.CHAINS.ethereum; const matchingEngine = new matchingEngineSdk.MatchingEngineProgram( connection, - "MatchingEngine11111111111111111111111111111", + matchingEngineSdk.localnet(), USDC_MINT_ADDRESS ); const tokenRouter = new tokenRouterSdk.TokenRouterProgram( connection, - "TokenRouter11111111111111111111111111111111", + tokenRouterSdk.localnet(), matchingEngine.mint ); diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts index e3ef7a96..73490e80 100644 --- a/solana/ts/tests/helpers/consts.ts +++ b/solana/ts/tests/helpers/consts.ts @@ -5,7 +5,7 @@ import { MockGuardians } from "@certusone/wormhole-sdk/lib/cjs/mock"; export const WORMHOLE_CONTRACTS = CONTRACTS.TESTNET; export const CORE_BRIDGE_PID = new PublicKey(WORMHOLE_CONTRACTS.solana.core); -export const TOKEN_ROUTER_PID = new PublicKey("TokenRouter11111111111111111111111111111111"); +export const TOKEN_ROUTER_PID = new PublicKey("tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md"); export const LOCALHOST = "http://localhost:8899"; From c9f19798baa4aead2753f79d67eec0b3c6068936 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 14:30:20 -0600 Subject: [PATCH 094/126] solana: prep solana devnet; fix endpoint registration on engine --- solana/Anchor.toml | 4 + solana/package-lock.json | 26 ++- solana/package.json | 2 +- solana/programs/matching-engine/src/error.rs | 3 + solana/programs/matching-engine/src/lib.rs | 8 +- .../admin/router_endpoint/add/cctp.rs | 104 +++++++++ .../admin/router_endpoint/add/local.rs | 3 + .../admin/router_endpoint/add/mod.rs | 87 +------ .../auction/execute_fast_order/cctp.rs | 16 +- .../auction/execute_fast_order/local.rs | 1 - .../auction/execute_fast_order/mod.rs | 2 - .../processor/auction/offer/place_initial.rs | 2 +- .../processor/auction/settle/active/cctp.rs | 45 ++-- .../processor/auction/settle/active/local.rs | 30 +-- .../processor/auction/settle/active/mod.rs | 27 +-- .../src/processor/auction/settle/none/cctp.rs | 27 ++- .../processor/auction/settle/none/local.rs | 10 +- .../src/processor/auction/settle/none/mod.rs | 35 ++- .../src/state/router_endpoint.rs | 15 ++ .../programs/matching-engine/src/utils/mod.rs | 2 +- .../confirm_ownership_transfer_request.ts | 57 ----- solana/ts/scripts/create_ata.ts | 52 ----- solana/ts/scripts/deregister_token.ts | 64 ------ solana/ts/scripts/helpers/consts.ts | 11 - solana/ts/scripts/helpers/utils.ts | 104 --------- solana/ts/scripts/initialize.ts | 69 ------ .../ts/scripts/register_foreign_contracts.ts | 134 ----------- solana/ts/scripts/register_tokens.ts | 110 --------- solana/ts/scripts/setUpTestnetTokenRouter.ts | 212 ++++++++++++++++++ solana/ts/scripts/set_pause_for_transfer.ts | 65 ------ solana/ts/scripts/set_relayer_fees.ts | 102 --------- .../submit_ownership_transfer_request.ts | 70 ------ .../test/complete_transfer_with_relay.ts | 161 ------------- .../test/transfer_tokens_with_relay.ts | 122 ---------- solana/ts/scripts/update_fee_assistant.ts | 68 ------ solana/ts/scripts/update_owner_assistant.ts | 68 ------ solana/ts/scripts/update_token_info.ts | 134 ----------- solana/ts/src/matchingEngine/index.ts | 19 +- .../matchingEngine/state/RouterEndpoint.ts | 16 +- solana/ts/src/tokenRouter/index.ts | 6 +- solana/ts/tests/01__matchingEngine.ts | 62 +++-- solana/ts/tests/02__tokenRouter.ts | 12 +- solana/ts/tests/04__interaction.ts | 6 +- 43 files changed, 528 insertions(+), 1645 deletions(-) create mode 100644 solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs delete mode 100644 solana/ts/scripts/confirm_ownership_transfer_request.ts delete mode 100644 solana/ts/scripts/create_ata.ts delete mode 100644 solana/ts/scripts/deregister_token.ts delete mode 100644 solana/ts/scripts/helpers/consts.ts delete mode 100644 solana/ts/scripts/helpers/utils.ts delete mode 100644 solana/ts/scripts/initialize.ts delete mode 100644 solana/ts/scripts/register_foreign_contracts.ts delete mode 100644 solana/ts/scripts/register_tokens.ts create mode 100644 solana/ts/scripts/setUpTestnetTokenRouter.ts delete mode 100644 solana/ts/scripts/set_pause_for_transfer.ts delete mode 100644 solana/ts/scripts/set_relayer_fees.ts delete mode 100644 solana/ts/scripts/submit_ownership_transfer_request.ts delete mode 100644 solana/ts/scripts/test/complete_transfer_with_relay.ts delete mode 100644 solana/ts/scripts/test/transfer_tokens_with_relay.ts delete mode 100644 solana/ts/scripts/update_fee_assistant.ts delete mode 100644 solana/ts/scripts/update_owner_assistant.ts delete mode 100644 solana/ts/scripts/update_token_info.ts diff --git a/solana/Anchor.toml b/solana/Anchor.toml index 77329f35..be3f7baa 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -16,6 +16,10 @@ members = [ token_router = "TokenRouter11111111111111111111111111111111" matching_engine = "MatchingEngine11111111111111111111111111111" +[programs.devnet] +token_router = "tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md" +matching_engine = "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS" + [registry] url = "https://api.apr.dev" diff --git a/solana/package-lock.json b/solana/package-lock.json index 2581f067..8a61166f 100644 --- a/solana/package-lock.json +++ b/solana/package-lock.json @@ -5,7 +5,7 @@ "packages": { "": { "dependencies": { - "@certusone/wormhole-sdk": "^0.10.5", + "@certusone/wormhole-sdk": "^0.10.10", "@coral-xyz/anchor": "^0.29.0", "@solana/spl-token": "^0.3.9", "@solana/web3.js": "^1.87.6", @@ -86,11 +86,11 @@ "integrity": "sha512-srw17NI0TUWHuGa5CFGGmhfNIeja30WMBfbslPNhf6JrqQlLN5gcrvig1oqPxiVaXb0oW0XRKtH6Nngs5lKCIA==" }, "node_modules/@certusone/wormhole-sdk": { - "version": "0.10.5", - "resolved": "https://registry.npmjs.org/@certusone/wormhole-sdk/-/wormhole-sdk-0.10.5.tgz", - "integrity": "sha512-wKONuigkakoFx9HplBt2Jh5KPxc7xgtDJVrIb2/SqYWbFrdpiZrMC4H6kTZq2U4+lWtqaCa1aJ1q+3GOTNx2CQ==", + "version": "0.10.10", + "resolved": "https://registry.npmjs.org/@certusone/wormhole-sdk/-/wormhole-sdk-0.10.10.tgz", + "integrity": "sha512-2pYQ2/+cSfh/LVtOTXQDrTeZdXHgzq/hjkTevzW5+rEqITE54qUlnMhcVtSJQe+Yvgg3awrP2mIfDW3nvwPIPA==", "dependencies": { - "@certusone/wormhole-sdk-proto-web": "0.0.6", + "@certusone/wormhole-sdk-proto-web": "0.0.7", "@certusone/wormhole-sdk-wasm": "^0.0.1", "@coral-xyz/borsh": "0.2.6", "@mysten/sui.js": "0.32.2", @@ -116,8 +116,9 @@ } }, "node_modules/@certusone/wormhole-sdk-proto-web": { - "version": "0.0.6", - "license": "Apache-2.0", + "version": "0.0.7", + "resolved": "https://registry.npmjs.org/@certusone/wormhole-sdk-proto-web/-/wormhole-sdk-proto-web-0.0.7.tgz", + "integrity": "sha512-GCe1/bcqMS0Mt+hsWp4SE4NLL59pWmK0lhQXO0oqAKl0G9AuuTdudySMDF/sLc7z5H2w34bSuSrIEKvPuuSC+w==", "dependencies": { "@improbable-eng/grpc-web": "^0.15.0", "protobufjs": "^7.0.0", @@ -126,7 +127,8 @@ }, "node_modules/@certusone/wormhole-sdk-proto-web/node_modules/@improbable-eng/grpc-web": { "version": "0.15.0", - "license": "Apache-2.0", + "resolved": "https://registry.npmjs.org/@improbable-eng/grpc-web/-/grpc-web-0.15.0.tgz", + "integrity": "sha512-ERft9/0/8CmYalqOVnJnpdDry28q+j+nAlFFARdjyxXDJ+Mhgv9+F600QC8BR9ygOfrXRlAk6CvST2j+JCpQPg==", "dependencies": { "browser-headers": "^0.4.1" }, @@ -136,12 +138,14 @@ }, "node_modules/@certusone/wormhole-sdk-proto-web/node_modules/long": { "version": "5.2.3", - "license": "Apache-2.0" + "resolved": "https://registry.npmjs.org/long/-/long-5.2.3.tgz", + "integrity": "sha512-lcHwpNoggQTObv5apGNCTdJrO69eHOZMi4BNC+rTLER8iHAqGrUVeLh/irVIM7zTw2bOXA8T6uNPeujwOLg/2Q==" }, "node_modules/@certusone/wormhole-sdk-proto-web/node_modules/protobufjs": { - "version": "7.2.3", + "version": "7.2.6", + "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.6.tgz", + "integrity": "sha512-dgJaEDDL6x8ASUZ1YqWciTRrdOuYNzoOf27oHNfdyvKqHr5i0FV7FSLU+aIeFjyFgVxrpTOtQUi0BLLBymZaBw==", "hasInstallScript": true, - "license": "BSD-3-Clause", "dependencies": { "@protobufjs/aspromise": "^1.1.2", "@protobufjs/base64": "^1.1.2", diff --git a/solana/package.json b/solana/package.json index 2ce7214a..2ce3dd67 100644 --- a/solana/package.json +++ b/solana/package.json @@ -8,7 +8,7 @@ "set-relayer-fees": "npx ts-node ts/scripts/set_relayer_fees.ts" }, "dependencies": { - "@certusone/wormhole-sdk": "^0.10.5", + "@certusone/wormhole-sdk": "^0.10.10", "@coral-xyz/anchor": "^0.29.0", "@solana/spl-token": "^0.3.9", "@solana/web3.js": "^1.87.6", diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index f805725d..35dbb20e 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -145,4 +145,7 @@ pub enum MatchingEngineError { #[msg("AuctionConfigMismatch")] AuctionConfigMismatch, + + #[msg("InvalidCctpEndpoint")] + InvalidCctpEndpoint, } diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 9c1113fa..da308b4f 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -67,11 +67,11 @@ pub mod matching_engine { processor::initialize(ctx, auction_params) } - pub fn add_router_endpoint( - ctx: Context, - args: AddRouterEndpointArgs, + pub fn add_cctp_router_endpoint( + ctx: Context, + args: AddCctpRouterEndpointArgs, ) -> Result<()> { - processor::add_router_endpoint(ctx, args) + processor::add_cctp_router_endpoint(ctx, args) } pub fn add_local_router_endpoint(ctx: Context) -> Result<()> { diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs new file mode 100644 index 00000000..f0d7e9e2 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs @@ -0,0 +1,104 @@ +use crate::{ + error::MatchingEngineError, + state::{Custodian, MessageProtocol, RouterEndpoint}, +}; +use anchor_lang::prelude::*; +use common::{ + admin::utils::assistant::only_authorized, + wormhole_cctp_solana::{ + cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, + utils::ExternalAccount, + wormhole::core_bridge_program, + }, +}; + +#[derive(Accounts)] +#[instruction(chain: u16, cctp_domain: u32)] +pub struct AddCctpRouterEndpoint<'info> { + #[account(mut)] + owner_or_assistant: Signer<'info>, + + #[account( + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + constraint = { + only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, + )] + custodian: Account<'info, Custodian>, + + #[account( + init_if_needed, + payer = owner_or_assistant, + space = 8 + RouterEndpoint::INIT_SPACE, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &chain.to_be_bytes() + ], + bump, + )] + router_endpoint: Account<'info, RouterEndpoint>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + #[account( + seeds = [ + RemoteTokenMessenger::SEED_PREFIX, + cctp_domain.to_string().as_ref() + ], + bump, + seeds::program = token_messenger_minter_program::id(), + )] + remote_token_messenger: Account<'info, ExternalAccount>, + + system_program: Program<'info, System>, +} + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct AddCctpRouterEndpointArgs { + pub chain: u16, + pub cctp_domain: u32, + pub address: [u8; 32], + pub mint_recipient: Option<[u8; 32]>, +} + +pub fn add_cctp_router_endpoint( + ctx: Context, + args: AddCctpRouterEndpointArgs, +) -> Result<()> { + let AddCctpRouterEndpointArgs { + chain, + cctp_domain: domain, + address, + mint_recipient, + } = args; + + require!( + chain != 0 && chain != core_bridge_program::SOLANA_CHAIN, + MatchingEngineError::ChainNotAllowed + ); + + require!(address != [0; 32], MatchingEngineError::InvalidEndpoint); + + let mint_recipient = match mint_recipient { + Some(mint_recipient) => { + require!( + mint_recipient != [0; 32], + MatchingEngineError::InvalidMintRecipient + ); + mint_recipient + } + None => address, + }; + + ctx.accounts.router_endpoint.set_inner(RouterEndpoint { + bump: ctx.bumps["router_endpoint"], + chain, + address, + mint_recipient, + protocol: MessageProtocol::Cctp { domain }, + }); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs index f0235c1a..1604f9bc 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -67,6 +67,9 @@ pub fn add_local_router_endpoint(ctx: Context) -> Result chain: SOLANA_CHAIN, address: ctx.accounts.token_router_emitter.key().to_bytes(), mint_recipient: ctx.accounts.token_router_custody_token.key().to_bytes(), + protocol: crate::state::MessageProtocol::Local { + program_id: ctx.accounts.token_router_program.key(), + }, }); // Done. diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs index e6ec05a5..c5e1534f 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/mod.rs @@ -1,86 +1,5 @@ +mod cctp; +pub use cctp::*; + mod local; pub use local::*; - -use crate::{ - error::MatchingEngineError, - state::{Custodian, RouterEndpoint}, -}; -use anchor_lang::prelude::*; -use common::admin::utils::assistant::only_authorized; - -#[derive(Accounts)] -#[instruction(chain: u16)] -pub struct AddRouterEndpoint<'info> { - #[account(mut)] - owner_or_assistant: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ MatchingEngineError::OwnerOrAssistantOnly, - )] - custodian: Account<'info, Custodian>, - - #[account( - init_if_needed, - payer = owner_or_assistant, - space = 8 + RouterEndpoint::INIT_SPACE, - seeds = [ - RouterEndpoint::SEED_PREFIX, - &chain.to_be_bytes() - ], - bump, - )] - router_endpoint: Account<'info, RouterEndpoint>, - - system_program: Program<'info, System>, -} - -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct AddRouterEndpointArgs { - pub chain: u16, - pub address: [u8; 32], - pub mint_recipient: Option<[u8; 32]>, -} - -pub fn add_router_endpoint( - ctx: Context, - args: AddRouterEndpointArgs, -) -> Result<()> { - let AddRouterEndpointArgs { - chain, - address, - mint_recipient, - } = args; - - require!( - chain != 0 - && chain != common::wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, - MatchingEngineError::ChainNotAllowed - ); - - require!(address != [0; 32], MatchingEngineError::InvalidEndpoint); - - let mint_recipient = match mint_recipient { - Some(mint_recipient) => { - require!( - mint_recipient != [0; 32], - MatchingEngineError::InvalidMintRecipient - ); - mint_recipient - } - None => address, - }; - - ctx.accounts.router_endpoint.set_inner(RouterEndpoint { - bump: ctx.bumps["router_endpoint"], - chain, - address, - mint_recipient, - }); - - // Done. - Ok(()) -} diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index 202de535..a5810b64 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::MatchingEngineError, - state::{Auction, AuctionConfig, Custodian, PayerSequence, RouterEndpoint}, + state::{Auction, AuctionConfig, Custodian, MessageProtocol, PayerSequence, RouterEndpoint}, utils, }; use anchor_lang::prelude::*; @@ -70,9 +70,6 @@ pub struct ExecuteFastOrderCctp<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, - constraint = { - to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN - } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Account<'info, RouterEndpoint>, @@ -171,10 +168,19 @@ pub struct ExecuteFastOrderCctp<'info> { /// TODO: add docstring pub fn execute_fast_order_cctp(ctx: Context) -> Result<()> { + match ctx.accounts.to_router_endpoint.protocol { + MessageProtocol::Cctp { domain } => handle_execute_fast_order_cctp(ctx, domain), + _ => err!(MatchingEngineError::InvalidCctpEndpoint), + } +} + +pub fn handle_execute_fast_order_cctp( + ctx: Context, + destination_cctp_domain: u32, +) -> Result<()> { let super::PreparedFastExecution { user_amount: amount, fill, - destination_cctp_domain, } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index 58980734..8a880e55 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -132,7 +132,6 @@ pub fn execute_fast_order_local(ctx: Context) -> Result<( let super::PreparedFastExecution { user_amount: amount, fill, - .. } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index c41d92d7..49dca85f 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -31,7 +31,6 @@ struct PrepareFastExecution<'ctx, 'info> { struct PreparedFastExecution { pub user_amount: u64, pub fill: Fill, - pub destination_cctp_domain: u32, } fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result { @@ -135,7 +134,6 @@ fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result, fee_offer: u64) -> R require!(fee_offer <= max_fee, MatchingEngineError::OfferPriceTooHigh); // Verify that the to and from router endpoints are valid. - crate::utils::verify_router_path( + crate::utils::require_valid_router_path( &fast_vaa, &ctx.accounts.from_router_endpoint, &ctx.accounts.to_router_endpoint, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index b08597de..fd095089 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -1,7 +1,8 @@ use crate::{ error::MatchingEngineError, state::{ - Auction, AuctionConfig, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint, + Auction, AuctionConfig, Custodian, MessageProtocol, PayerSequence, PreparedOrderResponse, + RouterEndpoint, }, utils, }; @@ -11,7 +12,7 @@ use common::{ wormhole_cctp_solana::{ self, cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, + wormhole::core_bridge_program, }, wormhole_io::TypePrefixedPayload, }; @@ -114,9 +115,6 @@ pub struct SettleAuctionActiveCctp<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, - constraint = { - to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN - } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Box>, @@ -208,25 +206,30 @@ pub struct SettleAuctionActiveCctp<'info> { /// TODO: add docstring pub fn settle_auction_active_cctp(ctx: Context) -> Result<()> { - let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + match ctx.accounts.to_router_endpoint.protocol { + MessageProtocol::Cctp { domain } => handle_settle_auction_active_cctp(ctx, domain), + _ => err!(MatchingEngineError::InvalidCctpEndpoint), + } +} +fn handle_settle_auction_active_cctp( + ctx: Context, + destination_cctp_domain: u32, +) -> Result<()> { let super::SettledActive { - order, user_amount: amount, fill, - } = super::settle_active_and_prepare_fill( - super::SettleActiveAndPrepareFill { - custodian: &ctx.accounts.custodian, - auction_config: &ctx.accounts.auction_config, - prepared_order_response: &ctx.accounts.prepared_order_response, - executor_token: &ctx.accounts.executor_token, - best_offer_token: &ctx.accounts.best_offer_token, - custody_token: &ctx.accounts.custody_token, - token_program: &ctx.accounts.token_program, - }, - &fast_vaa, - &mut ctx.accounts.auction, - )?; + } = super::settle_active_and_prepare_fill(super::SettleActiveAndPrepareFill { + custodian: &ctx.accounts.custodian, + auction_config: &ctx.accounts.auction_config, + fast_vaa: &ctx.accounts.fast_vaa, + auction: &mut ctx.accounts.auction, + prepared_order_response: &ctx.accounts.prepared_order_response, + executor_token: &ctx.accounts.executor_token, + best_offer_token: &ctx.accounts.best_offer_token, + custody_token: &ctx.accounts.custody_token, + token_program: &ctx.accounts.token_program, + })?; // This returns the CCTP nonce, but we do not need it. wormhole_cctp_solana::cpi::burn_and_publish( @@ -292,7 +295,7 @@ pub fn settle_auction_active_cctp(ctx: Context) -> Resu wormhole_cctp_solana::cpi::BurnAndPublishArgs { burn_source: None, destination_caller: ctx.accounts.to_router_endpoint.address, - destination_cctp_domain: order.destination_cctp_domain(), + destination_cctp_domain, amount, mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs index 8875ae2a..6db2bded 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -8,8 +8,7 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, - wormhole_io::TypePrefixedPayload, + wormhole_cctp_solana::wormhole::core_bridge_program, wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_active_local]. @@ -152,25 +151,20 @@ pub struct SettleAuctionActiveLocal<'info> { /// TODO: add docstring pub fn settle_auction_active_local(ctx: Context) -> Result<()> { - let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); - let super::SettledActive { - order: _, user_amount: amount, fill, - } = super::settle_active_and_prepare_fill( - super::SettleActiveAndPrepareFill { - custodian: &ctx.accounts.custodian, - auction_config: &ctx.accounts.auction_config, - prepared_order_response: &ctx.accounts.prepared_order_response, - executor_token: &ctx.accounts.executor_token, - best_offer_token: &ctx.accounts.best_offer_token, - custody_token: &ctx.accounts.custody_token, - token_program: &ctx.accounts.token_program, - }, - &fast_vaa, - &mut ctx.accounts.auction, - )?; + } = super::settle_active_and_prepare_fill(super::SettleActiveAndPrepareFill { + custodian: &ctx.accounts.custodian, + auction_config: &ctx.accounts.auction_config, + fast_vaa: &ctx.accounts.fast_vaa, + auction: &mut ctx.accounts.auction, + prepared_order_response: &ctx.accounts.prepared_order_response, + executor_token: &ctx.accounts.executor_token, + best_offer_token: &ctx.accounts.best_offer_token, + custody_token: &ctx.accounts.custody_token, + token_program: &ctx.accounts.token_program, + })?; // Publish message via Core Bridge. core_bridge_program::cpi::post_message( diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index 996c1b8d..ff5734a3 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -11,16 +11,15 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - messages::{ - raw::{FastMarketOrder, LiquidityLayerMessage}, - Fill, - }, + messages::{raw::LiquidityLayerMessage, Fill}, wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, }; struct SettleActiveAndPrepareFill<'ctx, 'info> { custodian: &'ctx AccountInfo<'info>, auction_config: &'ctx Account<'info, AuctionConfig>, + fast_vaa: &'ctx AccountInfo<'info>, + auction: &'ctx mut Account<'info, Auction>, prepared_order_response: &'ctx Account<'info, PreparedOrderResponse>, executor_token: &'ctx Account<'info, token::TokenAccount>, best_offer_token: &'ctx AccountInfo<'info>, @@ -28,20 +27,19 @@ struct SettleActiveAndPrepareFill<'ctx, 'info> { token_program: &'ctx Program<'info, token::Token>, } -struct SettledActive<'ctx> { - order: FastMarketOrder<'ctx>, +struct SettledActive { user_amount: u64, fill: Fill, } -fn settle_active_and_prepare_fill<'ctx>( - accounts: SettleActiveAndPrepareFill<'ctx, '_>, - fast_vaa: &'ctx VaaAccount<'ctx>, - auction: &'ctx mut Auction, -) -> Result> { +fn settle_active_and_prepare_fill( + accounts: SettleActiveAndPrepareFill<'_, '_>, +) -> Result { let SettleActiveAndPrepareFill { custodian, auction_config, + fast_vaa, + auction, prepared_order_response, executor_token, best_offer_token, @@ -49,6 +47,7 @@ fn settle_active_and_prepare_fill<'ctx>( token_program, } = accounts; + let fast_vaa = VaaAccount::load(fast_vaa).unwrap(); let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) .unwrap() .to_fast_market_order_unchecked(); @@ -131,9 +130,5 @@ fn settle_active_and_prepare_fill<'ctx>( // Everyone's whole, set the auction as completed. auction.status = final_status; - Ok(SettledActive { - order, - user_amount, - fill, - }) + Ok(SettledActive { user_amount, fill }) } diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs index b6fc7815..984fad04 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs @@ -1,6 +1,8 @@ use crate::{ error::MatchingEngineError, - state::{Auction, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint}, + state::{ + Auction, Custodian, MessageProtocol, PayerSequence, PreparedOrderResponse, RouterEndpoint, + }, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -8,7 +10,7 @@ use common::{ wormhole_cctp_solana::{ self, cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, + wormhole::core_bridge_program, }, wormhole_io::TypePrefixedPayload, }; @@ -117,9 +119,6 @@ pub struct SettleAuctionNoneCctp<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, - constraint = { - to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN - } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Box>, @@ -198,24 +197,32 @@ pub struct SettleAuctionNoneCctp<'info> { /// TODO: add docstring pub fn settle_auction_none_cctp(ctx: Context) -> Result<()> { - let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + match ctx.accounts.to_router_endpoint.protocol { + MessageProtocol::Cctp { domain } => handle_settle_auction_none_cctp(ctx, domain), + _ => err!(MatchingEngineError::InvalidCctpEndpoint), + } +} +/// TODO: add docstring +fn handle_settle_auction_none_cctp( + ctx: Context, + destination_cctp_domain: u32, +) -> Result<()> { let super::SettledNone { - order, user_amount: amount, fill, } = super::settle_none_and_prepare_fill( super::SettleNoneAndPrepareFill { custodian: &ctx.accounts.custodian, prepared_order_response: &ctx.accounts.prepared_order_response, + fast_vaa: &ctx.accounts.fast_vaa, + auction: &mut ctx.accounts.auction, from_router_endpoint: &ctx.accounts.from_router_endpoint, to_router_endpoint: &ctx.accounts.to_router_endpoint, fee_recipient_token: &ctx.accounts.fee_recipient_token, custody_token: &ctx.accounts.custody_token, token_program: &ctx.accounts.token_program, }, - &fast_vaa, - &mut ctx.accounts.auction, ctx.bumps["auction"], )?; @@ -283,7 +290,7 @@ pub fn settle_auction_none_cctp(ctx: Context) -> Result<( wormhole_cctp_solana::cpi::BurnAndPublishArgs { burn_source: None, destination_caller: ctx.accounts.to_router_endpoint.address, - destination_cctp_domain: order.destination_cctp_domain(), + destination_cctp_domain, amount, // TODO: add mint recipient to the router endpoint account to future proof this? mint_recipient: ctx.accounts.to_router_endpoint.address, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs index d39f4320..22818f64 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -5,8 +5,7 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, - wormhole_io::TypePrefixedPayload, + wormhole_cctp_solana::wormhole::core_bridge_program, wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_none_local]. @@ -155,24 +154,21 @@ pub struct SettleAuctionNoneLocal<'info> { /// TODO: add docstring pub fn settle_auction_none_local(ctx: Context) -> Result<()> { - let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); - let super::SettledNone { - order: _, user_amount: amount, fill, } = super::settle_none_and_prepare_fill( super::SettleNoneAndPrepareFill { custodian: &ctx.accounts.custodian, prepared_order_response: &ctx.accounts.prepared_order_response, + fast_vaa: &ctx.accounts.fast_vaa, + auction: &mut ctx.accounts.auction, from_router_endpoint: &ctx.accounts.from_router_endpoint, to_router_endpoint: &ctx.accounts.to_router_endpoint, fee_recipient_token: &ctx.accounts.fee_recipient_token, custody_token: &ctx.accounts.custody_token, token_program: &ctx.accounts.token_program, }, - &fast_vaa, - &mut ctx.accounts.auction, ctx.bumps["auction"], )?; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs index c8d00c3d..2aa9cee2 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -8,16 +8,15 @@ use crate::state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, Rou use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - messages::{ - raw::{FastMarketOrder, LiquidityLayerMessage}, - Fill, - }, + messages::{raw::LiquidityLayerMessage, Fill}, wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, }; struct SettleNoneAndPrepareFill<'ctx, 'info> { custodian: &'ctx Account<'info, Custodian>, prepared_order_response: &'ctx Account<'info, PreparedOrderResponse>, + fast_vaa: &'ctx AccountInfo<'info>, + auction: &'ctx mut Account<'info, Auction>, from_router_endpoint: &'ctx Account<'info, RouterEndpoint>, to_router_endpoint: &'ctx Account<'info, RouterEndpoint>, fee_recipient_token: &'ctx AccountInfo<'info>, @@ -25,21 +24,20 @@ struct SettleNoneAndPrepareFill<'ctx, 'info> { token_program: &'ctx Program<'info, token::Token>, } -struct SettledNone<'ctx> { - order: FastMarketOrder<'ctx>, +struct SettledNone { user_amount: u64, fill: Fill, } -fn settle_none_and_prepare_fill<'ctx>( - accounts: SettleNoneAndPrepareFill<'ctx, '_>, - fast_vaa: &'ctx VaaAccount<'ctx>, - auction: &'ctx mut Auction, +fn settle_none_and_prepare_fill( + accounts: SettleNoneAndPrepareFill<'_, '_>, auction_bump_seed: u8, -) -> Result> { +) -> Result { let SettleNoneAndPrepareFill { custodian, prepared_order_response, + fast_vaa, + auction, from_router_endpoint, to_router_endpoint, fee_recipient_token, @@ -47,14 +45,15 @@ fn settle_none_and_prepare_fill<'ctx>( token_program, } = accounts; + let fast_vaa = VaaAccount::load(fast_vaa).unwrap(); let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) .unwrap() .to_fast_market_order_unchecked(); // NOTE: We need to verify the router path, since an auction was never created and this check is // done in the `place_initial_offer` instruction. - crate::utils::verify_router_path( - fast_vaa, + crate::utils::require_valid_router_path( + &fast_vaa, from_router_endpoint, to_router_endpoint, order.target_chain(), @@ -92,7 +91,7 @@ fn settle_none_and_prepare_fill<'ctx>( // This is a necessary security check. This will prevent a relayer from starting an auction with // the fast transfer VAA, even though the slow relayer already delivered the slow VAA. Not // setting this could lead to trapped funds (which would require an upgrade to fix). - *auction = Auction { + auction.set_inner(Auction { bump: auction_bump_seed, vaa_hash: fast_vaa.try_digest().unwrap().0, status: AuctionStatus::Settled { @@ -100,11 +99,7 @@ fn settle_none_and_prepare_fill<'ctx>( penalty: None, }, info: None, - }; + }); - Ok(SettledNone { - order, - user_amount, - fill, - }) + Ok(SettledNone { user_amount, fill }) } diff --git a/solana/programs/matching-engine/src/state/router_endpoint.rs b/solana/programs/matching-engine/src/state/router_endpoint.rs index 9ff33547..c31bfef3 100644 --- a/solana/programs/matching-engine/src/state/router_endpoint.rs +++ b/solana/programs/matching-engine/src/state/router_endpoint.rs @@ -1,5 +1,17 @@ use anchor_lang::prelude::*; +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, PartialEq, Eq, InitSpace)] +pub enum MessageProtocol { + Local { + program_id: Pubkey, + }, + Cctp { + /// CCTP domain, which is how CCTP registers identifies foreign networks. + domain: u32, + }, + Canonical, +} + #[account] #[derive(Debug, InitSpace)] /// Foreign emitter account data. @@ -15,6 +27,9 @@ pub struct RouterEndpoint { /// Future-proof field in case another network has token accounts to send assets to instead of /// sending to the address directly. pub mint_recipient: [u8; 32], + + /// Specific message protocol used to move assets. + pub protocol: MessageProtocol, } impl RouterEndpoint { diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 3b605765..27286f8f 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -7,7 +7,7 @@ use crate::{ use anchor_lang::prelude::*; use common::wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; -pub fn verify_router_path( +pub fn require_valid_router_path( vaa: &VaaAccount<'_>, source_endpoint: &RouterEndpoint, target_endpoint: &RouterEndpoint, diff --git a/solana/ts/scripts/confirm_ownership_transfer_request.ts b/solana/ts/scripts/confirm_ownership_transfer_request.ts deleted file mode 100644 index a3728973..00000000 --- a/solana/ts/scripts/confirm_ownership_transfer_request.ts +++ /dev/null @@ -1,57 +0,0 @@ -import { Keypair, Connection } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "New Owner Keypair", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv) { - return { - newOwnerKeyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function confirmOwnershipTransferRequest(connection: Connection, payer: Keypair) { - // Create the submit ownership transfer request transaction. - const confirmOwnershipTransferRequestIx = await tokenBridgeRelayer.confirmOwnershipTransferIx( - connection, - TOKEN_ROUTER_PID, - payer.publicKey - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, confirmOwnershipTransferRequestIx, payer); - - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { newOwnerKeyPair } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(newOwnerKeyPair)); - - // Confirm ownership transfer request. - await confirmOwnershipTransferRequest(connection, payer); -} - -main(); diff --git a/solana/ts/scripts/create_ata.ts b/solana/ts/scripts/create_ata.ts deleted file mode 100644 index 57216e56..00000000 --- a/solana/ts/scripts/create_ata.ts +++ /dev/null @@ -1,52 +0,0 @@ -import {Keypair, Connection, PublicKey} from "@solana/web3.js"; -import {getOrCreateAssociatedTokenAccount} from "@solana/spl-token"; -import {RPC} from "./helpers/consts"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - mint: { - alias: "m", - describe: "Mint", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "mint" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - mint: new PublicKey(argv.mint), - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const {keyPair, mint} = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Create associated token account. - const tx = await getOrCreateAssociatedTokenAccount( - connection, - payer, - mint, - payer.publicKey - ); - - console.log("ATA", tx); -} - -main(); diff --git a/solana/ts/scripts/deregister_token.ts b/solana/ts/scripts/deregister_token.ts deleted file mode 100644 index 3a0587e7..00000000 --- a/solana/ts/scripts/deregister_token.ts +++ /dev/null @@ -1,64 +0,0 @@ -import { Keypair, Connection, PublicKey } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - mint: { - alias: "m", - describe: "Mint", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "mint" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - mint: new PublicKey(argv.mint), - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function deregister_token(connection: Connection, payer: Keypair, mint: PublicKey) { - // Create the deregister token instruction. - const deregisterTokenIx = await tokenBridgeRelayer.createDeregisterTokenInstruction( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - mint - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, deregisterTokenIx, payer); - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, mint } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Deregister token. - await deregister_token(connection, payer, mint); -} - -main(); diff --git a/solana/ts/scripts/helpers/consts.ts b/solana/ts/scripts/helpers/consts.ts deleted file mode 100644 index c39c5439..00000000 --- a/solana/ts/scripts/helpers/consts.ts +++ /dev/null @@ -1,11 +0,0 @@ -// rpc -export const RPC = process.env.RPC!; - -// program IDs -export const TOKEN_ROUTER_PID = process.env.TOKEN_ROUTER_PID!; -export const CORE_BRIDGE_PID = process.env.CORE_BRIDGE_PID!; -export const TOKEN_BRIDGE_PID = process.env.TOKEN_BRIDGE_PID!; - -// Init values -export const FEE_RECIPIENT = process.env.FEE_RECIPIENT!; -export const ASSISTANT = process.env.ASSISTANT!; diff --git a/solana/ts/scripts/helpers/utils.ts b/solana/ts/scripts/helpers/utils.ts deleted file mode 100644 index 198e24d0..00000000 --- a/solana/ts/scripts/helpers/utils.ts +++ /dev/null @@ -1,104 +0,0 @@ -import { - Connection, - TransactionInstruction, - sendAndConfirmTransaction, - Transaction, - Signer, - ComputeBudgetProgram, - ConfirmOptions, - PublicKeyInitData, - PublicKey, -} from "@solana/web3.js"; -import {deriveWrappedMintKey} from "@certusone/wormhole-sdk/lib/cjs/solana/tokenBridge"; -import { - postVaaSolanaWithRetry, - NodeWallet, -} from "@certusone/wormhole-sdk/lib/cjs/solana"; -import { - CHAIN_ID_SOLANA, - ChainId, - ParsedTokenTransferVaa, -} from "@certusone/wormhole-sdk"; -import {getOrCreateAssociatedTokenAccount} from "@solana/spl-token"; - -export class SendIxError extends Error { - logs: string; - - constructor(originalError: Error & {logs?: string[]}) { - // The newlines don't actually show up correctly in chai's assertion error, but at least - // we have all the information and can just replace '\n' with a newline manually to see - // what's happening without having to change the code. - const logs = originalError.logs?.join("\n") || "error had no logs"; - super(originalError.message + "\nlogs:\n" + logs); - this.stack = originalError.stack; - this.logs = logs; - } -} - -export const sendAndConfirmIx = async ( - connection: Connection, - ix: TransactionInstruction | Promise, - signer: Signer, - computeUnits?: number, - options?: ConfirmOptions -) => { - let [signers, units] = (() => { - if (signer) return [[signer], computeUnits]; - - return [Array.isArray(signer) ? signer : [signer], computeUnits]; - })(); - - if (options === undefined) { - options = {}; - } - options.maxRetries = 10; - - const tx = new Transaction().add(await ix); - if (units) tx.add(ComputeBudgetProgram.setComputeUnitLimit({units})); - try { - return await sendAndConfirmTransaction(connection, tx, signers, options); - } catch (error: any) { - console.log(error); - throw new SendIxError(error); - } -}; - -export async function postVaaOnSolana( - connection: Connection, - payer: Signer, - coreBridge: PublicKeyInitData, - signedMsg: Buffer -) { - const wallet = NodeWallet.fromSecretKey(payer.secretKey); - await postVaaSolanaWithRetry( - connection, - wallet.signTransaction, - coreBridge, - wallet.key(), - signedMsg - ); -} - -export async function createATAForRecipient( - connection: Connection, - payer: Signer, - tokenBridgeProgramId: PublicKeyInitData, - recipient: PublicKey, - tokenChain: ChainId, - tokenAddress: Buffer -) { - // Get the mint. - let mint; - if (tokenChain === CHAIN_ID_SOLANA) { - mint = new PublicKey(tokenAddress); - } else { - mint = deriveWrappedMintKey(tokenBridgeProgramId, tokenChain, tokenAddress); - } - - // Get or create the ATA. - try { - await getOrCreateAssociatedTokenAccount(connection, payer, mint, recipient); - } catch (error: any) { - throw new Error("Failed to create ATA: " + (error?.stack || error)); - } -} diff --git a/solana/ts/scripts/initialize.ts b/solana/ts/scripts/initialize.ts deleted file mode 100644 index 94e473e5..00000000 --- a/solana/ts/scripts/initialize.ts +++ /dev/null @@ -1,69 +0,0 @@ -import { Keypair, Connection } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { - RPC, - TOKEN_ROUTER_PID, - TOKEN_BRIDGE_PID, - CORE_BRIDGE_PID, - FEE_RECIPIENT, - ASSISTANT, -} from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - }; - } else { - throw Error("Invalid arguments"); - } -} - -// This function processes the initialize transaction for the token bridge relayer. -async function initialize(connection: Connection, payer: Keypair) { - // Create the initialization instruction. - const createInitializeIx = await tokenBridgeRelayer.initializeIx( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - TOKEN_BRIDGE_PID, - CORE_BRIDGE_PID, - FEE_RECIPIENT, - ASSISTANT - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, createInitializeIx, payer); - - if (tx !== undefined) { - console.log("Transaction signature:", tx); - } else { - console.log("Transaction failed"); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Create state. - await initialize(connection, payer); -} - -main(); diff --git a/solana/ts/scripts/register_foreign_contracts.ts b/solana/ts/scripts/register_foreign_contracts.ts deleted file mode 100644 index 949c373f..00000000 --- a/solana/ts/scripts/register_foreign_contracts.ts +++ /dev/null @@ -1,134 +0,0 @@ -import { Keypair, Connection } from "@solana/web3.js"; -import { ChainId } from "@certusone/wormhole-sdk"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID, TOKEN_BRIDGE_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import { BN } from "@coral-xyz/anchor"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - network: { - alias: "n", - describe: "Network", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "network" in argv) { - const network = argv.network; - if (network !== "mainnet" && network !== "testnet") { - throw Error("Invalid network"); - } - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - network: network, - }; - } else { - throw Error("Invalid arguments"); - } -} - -function validateContractAddress(address: string) { - if (address.length != 64 || address.substring(0, 2) == "0x") { - throw Error("Invalid contract address"); - } -} - -async function register_foreign_contract( - connection: Connection, - payer: Keypair, - foreignContract: ForeignContract[] -) { - for (const contract of foreignContract) { - // Validate contract addresses. - validateContractAddress(contract.relayerAddress); - validateContractAddress(contract.tokenBridgeAddress); - - // TODO: check current registration before creating instruction. - - // Create registration transaction. - const registerForeignContractIx = - await tokenBridgeRelayer.createRegisterForeignContractInstruction( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - TOKEN_BRIDGE_PID, - contract.chain, - Buffer.from(contract.relayerAddress, "hex"), - "0x" + contract.tokenBridgeAddress, - contract.relayerFee - ); - - console.log("\n Registering foreign contract:"); - console.log(contract); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, registerForeignContractIx, payer); - - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } - } -} - -interface ForeignContract { - chain: ChainId; - relayerAddress: string; - tokenBridgeAddress: string; - relayerFee: BN; -} - -function createConfig(contracts: any, fees: any): ForeignContract[] { - let config = [] as ForeignContract[]; - - for (let key of Object.keys(contracts)) { - let member = { - chain: Number(key) as ChainId, - relayerAddress: contracts[key]["relayer"], - tokenBridgeAddress: contracts[key]["tokenBridge"], - relayerFee: new BN(fees[key]), - }; - config.push(member); - } - - return config; -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, network } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Read in config file. - const deploymentConfig = JSON.parse( - fs.readFileSync(`${__dirname}/../../cfg/${network}Config.json`, "utf8") - ); - - // Convert to Config type. - const config = createConfig( - deploymentConfig["deployedContracts"], - deploymentConfig["relayerFeesInUsd"] - ); - if (config.length == undefined) { - throw Error("Deployed contracts not found"); - } - - // Register foreign contracts. - await register_foreign_contract(connection, payer, config); -} - -main(); diff --git a/solana/ts/scripts/register_tokens.ts b/solana/ts/scripts/register_tokens.ts deleted file mode 100644 index 733d3d2b..00000000 --- a/solana/ts/scripts/register_tokens.ts +++ /dev/null @@ -1,110 +0,0 @@ -import { Keypair, Connection, PublicKey } from "@solana/web3.js"; -import { BN } from "@coral-xyz/anchor"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - network: { - alias: "n", - describe: "Network", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "network" in argv) { - const network = argv.network; - if (network !== "mainnet" && network !== "testnet") { - throw Error("Invalid network"); - } - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - network: network, - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function register_tokens(connection: Connection, payer: Keypair, tokens: TokenConfig[]) { - for (const tokenConfig of tokens) { - // Create registration transaction. - const registerTokenIx = await tokenBridgeRelayer.createRegisterTokenInstruction( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - new PublicKey(tokenConfig.mint), - new BN(tokenConfig.swapRate), - new BN(tokenConfig.maxNativeSwapAmount) - ); - - console.log("\n", tokenConfig); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, registerTokenIx, payer); - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } - } -} - -interface TokenConfig { - symbol: string; - mint: string; - swapRate: string; - maxNativeSwapAmount: string; -} - -function createConfig(object: any) { - let config = [] as TokenConfig[]; - - for (const info of object) { - let member: TokenConfig = { - symbol: info.symbol as string, - mint: info.mint as string, - swapRate: info.swapRate as string, - maxNativeSwapAmount: info.maxNativeSwapAmount as string, - }; - - config.push(member); - } - - return config; -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, network } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Read in config file. - const deploymentConfig = JSON.parse( - fs.readFileSync(`${__dirname}/../../cfg/${network}Config.json`, "utf8") - ); - - // Convert to Config type. - const config = createConfig(deploymentConfig["acceptedTokensList"]); - if (config.length == undefined) { - throw Error("Tokens list not found"); - } - - // Register tokens. - await register_tokens(connection, payer, config); -} - -main(); diff --git a/solana/ts/scripts/setUpTestnetTokenRouter.ts b/solana/ts/scripts/setUpTestnetTokenRouter.ts new file mode 100644 index 00000000..3e46aeba --- /dev/null +++ b/solana/ts/scripts/setUpTestnetTokenRouter.ts @@ -0,0 +1,212 @@ +import { ChainName, coalesceChainId, tryNativeToUint8Array } from "@certusone/wormhole-sdk"; +import { + Connection, + Keypair, + PublicKey, + Transaction, + sendAndConfirmTransaction, +} from "@solana/web3.js"; +import "dotenv/config"; +import { TokenRouterProgram } from "../src/tokenRouter"; + +const PROGRAM_ID = "tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md"; +const USDC_MINT = new PublicKey("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + +// Here we go. +main(); + +// impl + +async function main() { + const connection = new Connection("https://api.devnet.solana.com", "confirmed"); + const tokenRouter = new TokenRouterProgram(connection, PROGRAM_ID, USDC_MINT); + + if (process.env.SOLANA_PRIVATE_KEY === undefined) { + throw new Error("SOLANA_PRIVATE_KEY is undefined"); + } + const payer = Keypair.fromSecretKey(Buffer.from(process.env.SOLANA_PRIVATE_KEY, "hex")); + + // Set up program. + await intialize(tokenRouter, payer); + + // Add endpoints. + // + // CCTP Domains listed here: https://developers.circle.com/stablecoins/docs/supported-domains. + { + // https://sepolia.etherscan.io/address/0x603541d1Cf7178C407aA7369b67CB7e0274952e2 + const foreignChain = "sepolia"; + const foreignEmitter = "0x603541d1Cf7178C407aA7369b67CB7e0274952e2"; + const cctpDomain = 0; + + await addCctpRouterEndpoint( + tokenRouter, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // https://testnet.snowtrace.io/address/0xdf5af760f3093034C7A6580FBd4CE66A8bEDd90A + const foreignChain = "avalanche"; + const foreignEmitter = "0xdf5af760f3093034C7A6580FBd4CE66A8bEDd90A"; + const cctpDomain = 1; + + await addCctpRouterEndpoint( + tokenRouter, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // https://sepolia-optimism.etherscan.io/address/0xc1Cf3501ef0b26c8A47759F738832563C7cB014A + const foreignChain = "optimism_sepolia"; + const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; + const cctpDomain = 2; + + await addCctpRouterEndpoint( + tokenRouter, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // https://sepolia.arbiscan.io/address/0xc1cf3501ef0b26c8a47759f738832563c7cb014a + const foreignChain = "arbitrum_sepolia"; + const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; + const cctpDomain = 3; + + await addCctpRouterEndpoint( + tokenRouter, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // TODO: This is a placeholder. + const foreignChain = "base_sepolia"; + const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; + const cctpDomain = 6; + + // await addCctpRouterEndpoint( + // tokenRouter, + // payer, + // foreignChain, + // cctpDomain, + // foreignEmitter, + // null + // ); + } + { + // https://mumbai.polygonscan.com/address/0x3Ce8a3aC230Eb4bCE3688f2A1ab21d986a0A0B06 + const foreignChain = "polygon"; + const foreignEmitter = "0x3Ce8a3aC230Eb4bCE3688f2A1ab21d986a0A0B06"; + const cctpDomain = 7; + + await addCctpRouterEndpoint( + tokenRouter, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } +} + +async function intialize(tokenRouter: TokenRouterProgram, payer: Keypair) { + const connection = tokenRouter.program.provider.connection; + + const custodian = tokenRouter.custodianAddress(); + console.log("custodian", custodian.toString()); + + const exists = await connection.getAccountInfo(custodian).then((acct) => acct != null); + if (exists) { + console.log("already initialized"); + return; + } + + const ix = await tokenRouter.initializeIx({ + owner: payer.publicKey, + ownerAssistant: payer.publicKey, + }); + + const txSig = await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]); + console.log("intialize", txSig); +} + +async function addCctpRouterEndpoint( + tokenRouter: TokenRouterProgram, + payer: Keypair, + foreignChain: ChainName, + cctpDomain: number, + foreignEmitter: string, + foreignMintRecipient: string | null +) { + const connection = tokenRouter.program.provider.connection; + + const chain = coalesceChainId(foreignChain); + const endpoint = tokenRouter.routerEndpointAddress(chain); + const exists = await connection.getAccountInfo(endpoint).then((acct) => acct != null); + + const endpointAddress = Array.from(tryNativeToUint8Array(foreignEmitter, foreignChain)); + const endpointMintRecipient = + foreignMintRecipient === null + ? null + : Array.from(tryNativeToUint8Array(foreignMintRecipient, foreignChain)); + + if (exists) { + const { address, mintRecipient } = await tokenRouter.fetchRouterEndpoint(chain); + if ( + Buffer.from(address).equals(Buffer.from(endpointAddress)) && + Buffer.from(mintRecipient).equals(Buffer.from(endpointMintRecipient ?? endpointAddress)) + ) { + console.log( + "already exists", + foreignChain, + "addr", + foreignEmitter, + "domain", + cctpDomain, + "mintRecipient", + foreignMintRecipient + ); + return; + } + } + + const ix = await tokenRouter.addCctpRouterEndpointIx( + { + ownerOrAssistant: payer.publicKey, + }, + { + chain, + address: endpointAddress, + mintRecipient: endpointMintRecipient, + cctpDomain, + } + ); + const txSig = await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]); + console.log( + "register emitter and domain", + txSig, + "chain", + foreignChain, + "addr", + foreignEmitter, + "domain", + cctpDomain, + "mintRecipient", + foreignMintRecipient + ); +} diff --git a/solana/ts/scripts/set_pause_for_transfer.ts b/solana/ts/scripts/set_pause_for_transfer.ts deleted file mode 100644 index bdb71cee..00000000 --- a/solana/ts/scripts/set_pause_for_transfer.ts +++ /dev/null @@ -1,65 +0,0 @@ -import { Keypair, Connection } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - pause: { - alias: "p", - describe: "Pause for transfer", - require: true, - boolean: true, - }, - }).argv; - - if ("keyPair" in argv && "pause" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - pause: argv.pause, - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function setPauseForTransfers(connection: Connection, payer: Keypair, pause: boolean) { - // Create the set pause for transfers transaction. - const setPauseIx = await tokenBridgeRelayer.setPauseForTransfersIx( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - pause - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, setPauseIx, payer); - - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, pause } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Set pause for transfers. - await setPauseForTransfers(connection, payer, pause); -} - -main(); diff --git a/solana/ts/scripts/set_relayer_fees.ts b/solana/ts/scripts/set_relayer_fees.ts deleted file mode 100644 index 80e2a352..00000000 --- a/solana/ts/scripts/set_relayer_fees.ts +++ /dev/null @@ -1,102 +0,0 @@ -import { Keypair, Connection } from "@solana/web3.js"; -import { ChainId } from "@certusone/wormhole-sdk"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import { BN } from "@coral-xyz/anchor"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - network: { - alias: "n", - describe: "Network", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "network" in argv) { - const network = argv.network; - if (network !== "mainnet" && network !== "testnet") { - throw Error("Invalid network"); - } - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - network: network, - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function set_relayer_fees(connection: Connection, payer: Keypair, relayerFees: RelayerFee[]) { - for (const target of relayerFees) { - // Create registration transaction. - const createSetRelayerFeeIx = await tokenBridgeRelayer.updateRelayerFeeIx( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - target.chain, - new BN(target.fee) - ); - - console.log(`\n Setting relayer fee, chain: ${target.chain}, fee: ${target.fee}`); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, createSetRelayerFeeIx, payer); - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } - } -} - -interface RelayerFee { - chain: ChainId; - fee: string; -} - -function createConfig(object: any) { - let config = [] as RelayerFee[]; - - for (let key of Object.keys(object)) { - let member = { chain: Number(key) as ChainId, fee: object[key] }; - config.push(member); - } - - return config; -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, network } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Read in config file. - const deploymentConfig = JSON.parse( - fs.readFileSync(`${__dirname}/../../cfg/${network}Config.json`, "utf8") - ); - - // Convert to Config type. - const config = createConfig(deploymentConfig["relayerFeesInUsd"]); - if (config.length == undefined) { - throw Error("Relayer fees not found"); - } - - // Set the relayer fees. - await set_relayer_fees(connection, payer, config); -} - -main(); diff --git a/solana/ts/scripts/submit_ownership_transfer_request.ts b/solana/ts/scripts/submit_ownership_transfer_request.ts deleted file mode 100644 index cd187aaa..00000000 --- a/solana/ts/scripts/submit_ownership_transfer_request.ts +++ /dev/null @@ -1,70 +0,0 @@ -import { Keypair, Connection } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; -import { PublicKey } from "@metaplex-foundation/js"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - newOwner: { - alias: "p", - describe: "New owner public key", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "newOwner" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - newOwner: new PublicKey(argv.newOwner), - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function submitOwnershipTransferRequest( - connection: Connection, - payer: Keypair, - newOwner: PublicKey -) { - // Create the submit ownership transfer request transaction. - const submitOwnershipTransferRequestIx = await tokenBridgeRelayer.submitOwnershipTransferIx( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - newOwner - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, submitOwnershipTransferRequestIx, payer); - - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, newOwner } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Submit ownership transfer request. - await submitOwnershipTransferRequest(connection, payer, newOwner); -} - -main(); diff --git a/solana/ts/scripts/test/complete_transfer_with_relay.ts b/solana/ts/scripts/test/complete_transfer_with_relay.ts deleted file mode 100644 index b2a06789..00000000 --- a/solana/ts/scripts/test/complete_transfer_with_relay.ts +++ /dev/null @@ -1,161 +0,0 @@ -import { Keypair, Connection, PublicKey } from "@solana/web3.js"; -import { - ChainId, - parseVaa, - parseTransferPayload, - CHAIN_ID_SOLANA, - getIsTransferCompletedSolana, -} from "@certusone/wormhole-sdk"; -import * as tokenBridgeRelayer from "../../src"; -import { - RPC, - TOKEN_BRIDGE_PID, - TOKEN_ROUTER_PID, - CORE_BRIDGE_PID, - FEE_RECIPIENT, -} from "../helpers/consts"; -import { sendAndConfirmIx, postVaaOnSolana, createATAForRecipient } from "../helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -// Token Bridge Relayer program ID. -const PROGRAM_ID = new PublicKey(TOKEN_ROUTER_PID); -const PROGRAM_ID_HEX = Buffer.from(PROGRAM_ID.toBytes()).toString("hex"); - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - vaa: { - alias: "vaa", - describe: "VAA to submit", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "vaa" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - vaa: argv.vaa, - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function relay(connection: Connection, payer: Keypair, vaa: string) { - // Convert VAA string to buffer. - const signedVaa = Buffer.from(vaa, "hex"); - - // Check to see if the VAA has been redeemed already. - const isRedeemed = await getIsTransferCompletedSolana( - new PublicKey(TOKEN_BRIDGE_PID), - signedVaa, - connection - ); - if (isRedeemed) { - console.log("VAA has already been redeemed"); - return; - } - - // Parse the VAA. - const parsedVaa = parseVaa(signedVaa); - - // Make sure it's a payload 3. - const payloadType = parsedVaa.payload.readUint8(0); - if (payloadType != 3) { - console.log("Not a payload 3"); - return; - } - - // Parse the payload. - const transferPayload = parseTransferPayload(parsedVaa.payload); - - // Confirm that the destination is the relayer contract. - if (transferPayload.targetAddress != PROGRAM_ID_HEX) { - console.log("Destination is not the relayer contract"); - return; - } - - // Confirm that the sender is a registered relayer contract. - const registeredForeignContract = await tokenBridgeRelayer.getForeignContractData( - connection, - TOKEN_ROUTER_PID, - parsedVaa.emitterChain as ChainId - ); - if (registeredForeignContract.address.toString("hex") !== transferPayload.fromAddress) { - console.log("Sender is not a registered relayer contract"); - return; - } - - // Post the VAA on chain. - try { - await postVaaOnSolana(connection, payer, new PublicKey(CORE_BRIDGE_PID), signedVaa); - } catch (e) { - console.log(e); - } - - // Parse the recipient address from the additional payload. - const recipientInPayload = parsedVaa.payload.subarray(198, 230); - const recipient = new PublicKey(recipientInPayload); - - // Create the associated token account for the recipient if it doesn't exist. - await createATAForRecipient( - connection, - payer, - new PublicKey(TOKEN_BRIDGE_PID), - recipient, - transferPayload.originChain as ChainId, - Buffer.from(transferPayload.originAddress, "hex") - ); - - // See if the token being transferred is native to Solana. - const isNative = transferPayload.originChain == CHAIN_ID_SOLANA; - - // Create the redemption instruction. There are two different instructions - // depending on whether the token is native or not. - const completeTransferIx = await (isNative - ? tokenBridgeRelayer.createCompleteNativeTransferWithRelayInstruction - : tokenBridgeRelayer.createCompleteWrappedTransferWithRelayInstruction)( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - new PublicKey(FEE_RECIPIENT), - TOKEN_BRIDGE_PID, - CORE_BRIDGE_PID, - signedVaa, - recipient - ); - - // Send the transaction. - const tx = await sendAndConfirmIx( - connection, - completeTransferIx, - payer, - 250000 // compute units - ); - if (tx === undefined) { - console.log("Transaction failed."); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, vaa } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Relay VAA. - await relay(connection, payer, vaa); -} - -main(); diff --git a/solana/ts/scripts/test/transfer_tokens_with_relay.ts b/solana/ts/scripts/test/transfer_tokens_with_relay.ts deleted file mode 100644 index 6494c205..00000000 --- a/solana/ts/scripts/test/transfer_tokens_with_relay.ts +++ /dev/null @@ -1,122 +0,0 @@ -import { Keypair, Connection, PublicKey } from "@solana/web3.js"; -import { ChainId } from "@certusone/wormhole-sdk"; -import * as tokenBridgeRelayer from "../../src"; -import { RPC, TOKEN_BRIDGE_PID, TOKEN_ROUTER_PID, CORE_BRIDGE_PID } from "../helpers/consts"; -import { sendAndConfirmIx } from "../helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function transfer_native( - connection: Connection, - payer: Keypair, - mint: PublicKey, - params: SendTokensParams -) { - // Create registration transaction. - const transferIx = await tokenBridgeRelayer.createTransferNativeTokensWithRelayInstruction( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - TOKEN_BRIDGE_PID, - CORE_BRIDGE_PID, - mint, - params - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, transferIx, payer, 250000); - if (tx === undefined) { - console.log("Transaction failed:", tx); - } else { - console.log("Transaction successful:", tx); - } -} - -async function transfer_wrapped( - connection: Connection, - payer: Keypair, - mint: PublicKey, - params: SendTokensParams -) { - // Create registration transaction. - const transferIx = await tokenBridgeRelayer.createTransferWrappedTokensWithRelayInstruction( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - TOKEN_ROUTER_PID, - CORE_BRIDGE_PID, - mint, - params - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, transferIx, payer, 250000); - if (tx === undefined) { - console.log("Transaction failed:", tx); - } else { - console.log("Transaction successful:", tx); - } -} - -export interface SendTokensParams { - amount: number; - toNativeTokenAmount: number; - recipientAddress: Buffer; - recipientChain: ChainId; - batchId: number; - wrapNative: boolean; -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Add transfer params here. - const sendParams: SendTokensParams = { - amount: 10000000, - toNativeTokenAmount: 0, - recipientAddress: Buffer.from( - "0000000000000000000000003278E0aE2bc9EC8754b67928e0F5ff8f99CE5934", - "hex" - ), - recipientChain: 6, // avax - batchId: 0, - wrapNative: true, - }; - - // Token mint. - const isWrapped = false; - const mint = new PublicKey("So11111111111111111111111111111111111111112"); - - // Do the transfer. - if (isWrapped) { - await transfer_native(connection, payer, mint, sendParams); - } else { - await transfer_native(connection, payer, mint, sendParams); - } -} - -main(); diff --git a/solana/ts/scripts/update_fee_assistant.ts b/solana/ts/scripts/update_fee_assistant.ts deleted file mode 100644 index c9ae6c82..00000000 --- a/solana/ts/scripts/update_fee_assistant.ts +++ /dev/null @@ -1,68 +0,0 @@ -import { Keypair, Connection, PublicKey } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - newFeeRecipient: { - alias: "n", - describe: "New Fee Recipient", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "newFeeRecipient" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - newFeeRecipient: new PublicKey(argv.newFeeRecipient), - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function update_fee_recipient( - connection: Connection, - payer: Keypair, - newFeeRecipient: PublicKey -) { - // Create the instruction. - const updateFeeRecipientIx = await tokenBridgeRelayer.updateFeeRecipientIx( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - newFeeRecipient - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, updateFeeRecipientIx, payer); - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, newFeeRecipient } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Update the fee recipient. - await update_fee_recipient(connection, payer, newFeeRecipient); -} - -main(); diff --git a/solana/ts/scripts/update_owner_assistant.ts b/solana/ts/scripts/update_owner_assistant.ts deleted file mode 100644 index 12176aed..00000000 --- a/solana/ts/scripts/update_owner_assistant.ts +++ /dev/null @@ -1,68 +0,0 @@ -import { Keypair, Connection, PublicKey } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "Signer Keypair", - require: true, - string: true, - }, - newAssistant: { - alias: "n", - describe: "New Owner Assistant", - require: true, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "newAssistant" in argv) { - return { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - newAssistant: new PublicKey(argv.newAssistant), - }; - } else { - throw Error("Invalid arguments"); - } -} - -async function update_owner_assistant( - connection: Connection, - payer: Keypair, - newAssistant: PublicKey -) { - // Create the instruction. - const deregisterTokenIx = await tokenBridgeRelayer.createUpdateAssistantInstruction( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - newAssistant - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, deregisterTokenIx, payer); - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const { keyPair, newAssistant } = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(keyPair)); - - // Update the owner assistant. - await update_owner_assistant(connection, payer, newAssistant); -} - -main(); diff --git a/solana/ts/scripts/update_token_info.ts b/solana/ts/scripts/update_token_info.ts deleted file mode 100644 index 79d22ec1..00000000 --- a/solana/ts/scripts/update_token_info.ts +++ /dev/null @@ -1,134 +0,0 @@ -import { Keypair, Connection } from "@solana/web3.js"; -import * as tokenBridgeRelayer from "../src"; -import { BN } from "@project-serum/anchor"; -import { RPC, TOKEN_ROUTER_PID } from "./helpers/consts"; -import { sendAndConfirmIx } from "./helpers/utils"; -import yargs from "yargs"; -import * as fs from "fs"; -import { PublicKey } from "@metaplex-foundation/js"; - -interface Args { - keyPair: Uint8Array; - mint: PublicKey; - swapRate: BN | undefined; - maxNativeSwapAmount: BN | undefined; -} - -export function getArgs() { - const argv = yargs.options({ - keyPair: { - alias: "k", - describe: "New Owner Keypair", - require: true, - string: true, - }, - mint: { - alias: "m", - describe: "Mint", - require: true, - string: true, - }, - swapRate: { - alias: "s", - describe: "Swap rate", - require: false, - string: true, - }, - maxNativeSwapAmount: { - alias: "n", - describe: "Max native swap amount", - require: false, - string: true, - }, - }).argv; - - if ("keyPair" in argv && "mint" in argv) { - const args: Args = { - keyPair: JSON.parse(fs.readFileSync(argv.keyPair, "utf8")), - mint: new PublicKey(argv.mint), - swapRate: undefined, - maxNativeSwapAmount: undefined, - }; - - if ("swapRate" in argv) { - args.swapRate = new BN(Number(argv.swapRate)); - } - - if ("maxNativeSwapAmount" in argv) { - args.maxNativeSwapAmount = new BN(Number(argv.maxNativeSwapAmount)); - } - - return args; - } else { - throw Error("Invalid arguments"); - } -} - -async function updateMaxNativeSwapAmount( - connection: Connection, - payer: Keypair, - mint: PublicKey, - maxNativeSwapAmount: BN -) { - // Create the instruction. - const updateMaxNativeSwapAmountIx = await tokenBridgeRelayer.updateMaxNativeSwapAmountIx( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - mint, - maxNativeSwapAmount - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, updateMaxNativeSwapAmountIx, payer); - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function updateSwapRate( - connection: Connection, - payer: Keypair, - mint: PublicKey, - swapRate: BN -) { - // Create the instruction. - const updateSwapRateIx = await tokenBridgeRelayer.createUpdateSwapRateInstruction( - connection, - TOKEN_ROUTER_PID, - payer.publicKey, - mint, - swapRate - ); - - // Send the transaction. - const tx = await sendAndConfirmIx(connection, updateSwapRateIx, payer); - if (tx === undefined) { - console.log("Transaction failed"); - } else { - console.log("Transaction successful:", tx); - } -} - -async function main() { - // Set up provider. - const connection = new Connection(RPC, "confirmed"); - - // Owner wallet. - const args = getArgs(); - const payer = Keypair.fromSecretKey(Uint8Array.from(args.keyPair)); - - // Update the swap rate. - if (args.swapRate !== undefined) { - await updateSwapRate(connection, payer, args.mint, args.swapRate); - } - - // Update the max native swap amount. - if (args.maxNativeSwapAmount !== undefined) { - await updateMaxNativeSwapAmount(connection, payer, args.mint, args.maxNativeSwapAmount); - } -} - -main(); diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 69888920..9ec9c6bc 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -33,8 +33,9 @@ export type ProgramId = (typeof PROGRAM_IDS)[number]; export type VaaHash = Array | Buffer | Uint8Array; -export type AddRouterEndpointArgs = { - chain: wormholeSdk.ChainId; +export type AddCctpRouterEndpointArgs = { + chain: number; + cctpDomain: number; address: Array; mintRecipient: Array | null; }; @@ -289,26 +290,32 @@ export class MatchingEngineProgram { .instruction(); } - async addRouterEndpointIx( + async addCctpRouterEndpointIx( accounts: { ownerOrAssistant: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; + remoteTokenMessenger?: PublicKey; }, - args: AddRouterEndpointArgs + args: AddCctpRouterEndpointArgs ): Promise { const { ownerOrAssistant, custodian: inputCustodian, routerEndpoint: inputRouterEndpoint, + remoteTokenMessenger: inputRemoteTokenMessenger, } = accounts; - const { chain } = args; + const { chain, cctpDomain } = args; + const derivedRemoteTokenMessenger = + this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); + return this.program.methods - .addRouterEndpoint(args) + .addCctpRouterEndpoint(args) .accounts({ ownerOrAssistant, custodian: inputCustodian ?? this.custodianAddress(), routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + remoteTokenMessenger: inputRemoteTokenMessenger ?? derivedRemoteTokenMessenger, }) .instruction(); } diff --git a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts index 943590f4..281f9ebf 100644 --- a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts +++ b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts @@ -1,16 +1,30 @@ import { PublicKey } from "@solana/web3.js"; +export type MessageProtocol = { + local?: { programId: PublicKey }; + cctp?: { domain: number }; + canonical?: {}; +}; + export class RouterEndpoint { bump: number; chain: number; address: Array; mintRecipient: Array; + protocol: MessageProtocol; - constructor(bump: number, chain: number, address: Array, mintRecipient: Array) { + constructor( + bump: number, + chain: number, + address: Array, + mintRecipient: Array, + protocol: MessageProtocol + ) { this.bump = bump; this.chain = chain; this.address = address; this.mintRecipient = mintRecipient; + this.protocol = protocol; } static address(programId: PublicKey, chain: number) { diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index dbe938f3..74e365fc 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -176,7 +176,8 @@ export class TokenRouterProgram { return RouterEndpoint.address(this.ID, chain); } - async fetchRouterEndpoint(addr: PublicKey): Promise { + async fetchRouterEndpoint(chain: number | { address: PublicKey }): Promise { + const addr = typeof chain === "number" ? this.routerEndpointAddress(chain) : chain.address; return this.program.account.routerEndpoint.fetch(addr); } @@ -188,6 +189,7 @@ export class TokenRouterProgram { return PreparedFill.address(this.ID, vaaHash); } + // TODO: fix async fetchPreparedFill(addr: PublicKey): Promise { return this.program.account.preparedFill.fetch(addr); } @@ -345,7 +347,7 @@ export class TokenRouterProgram { if (inputRemoteDomain !== undefined) { return inputRemoteDomain; } else { - const { protocol } = await this.fetchRouterEndpoint(routerEndpoint); + const { protocol } = await this.fetchRouterEndpoint({ address: routerEndpoint }); if (protocol.cctp !== undefined) { return protocol.cctp.domain; } else { diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 84d0486d..13422aa1 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -553,12 +553,13 @@ describe("Matching Engine", function () { }); }); - describe("Add Router Endpoint", function () { + describe("Add Router Endpoint (CCTP)", function () { it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { - const ix = await engine.addRouterEndpointIx( + const ix = await engine.addCctpRouterEndpointIx( { ownerOrAssistant: payer.publicKey }, { chain: ethChain, + cctpDomain: ethDomain, address: ethRouter, mintRecipient: null, } @@ -571,25 +572,20 @@ describe("Matching Engine", function () { it(`Cannot Register Chain ID == ${chain}`, async function () { const chain = 0; - await expectIxErr( - connection, - [ - await engine.addRouterEndpointIx( - { ownerOrAssistant: owner.publicKey }, - { chain, address: ethRouter, mintRecipient: null } - ), - ], - [owner], - "ChainNotAllowed" + const ix = await engine.addCctpRouterEndpointIx( + { ownerOrAssistant: owner.publicKey }, + { chain, cctpDomain: ethDomain, address: ethRouter, mintRecipient: null } ); + await expectIxErr(connection, [ix], [owner], "ChainNotAllowed"); }) ); it("Cannot Register Zero Address", async function () { - const ix = await engine.addRouterEndpointIx( + const ix = await engine.addCctpRouterEndpointIx( { ownerOrAssistant: owner.publicKey }, { chain: ethChain, + cctpDomain: ethDomain, address: new Array(32).fill(0), mintRecipient: null, } @@ -601,10 +597,11 @@ describe("Matching Engine", function () { it("Add Router Endpoint as Owner Assistant", async function () { const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); const mintRecipient = Array.from(Buffer.alloc(32, "deadbeef", "hex")); - const ix = await engine.addRouterEndpointIx( + const ix = await engine.addCctpRouterEndpointIx( { ownerOrAssistant: ownerAssistant.publicKey }, { chain: ethChain, + cctpDomain: ethDomain, address: contractAddress, mintRecipient, } @@ -613,15 +610,18 @@ describe("Matching Engine", function () { const routerEndpointData = await engine.fetchRouterEndpoint(ethChain); expect(routerEndpointData).to.eql( - new RouterEndpoint(255, ethChain, contractAddress, mintRecipient) + new RouterEndpoint(255, ethChain, contractAddress, mintRecipient, { + cctp: { domain: ethDomain }, + }) ); }); it("Update Router Endpoint as Owner", async function () { - const ix = await engine.addRouterEndpointIx( + const ix = await engine.addCctpRouterEndpointIx( { ownerOrAssistant: owner.publicKey }, { chain: ethChain, + cctpDomain: ethDomain, address: ethRouter, mintRecipient: null, } @@ -631,7 +631,9 @@ describe("Matching Engine", function () { const routerEndpointData = await engine.fetchRouterEndpoint(ethChain); expect(routerEndpointData).to.eql( - new RouterEndpoint(255, ethChain, ethRouter, ethRouter) + new RouterEndpoint(255, ethChain, ethRouter, ethRouter, { + cctp: { domain: ethDomain }, + }) ); }); }); @@ -782,22 +784,18 @@ describe("Matching Engine", function () { }; before("Register To Router Endpoints", async function () { - await expectIxOk( - connection, - [ - await engine.addRouterEndpointIx( - { - ownerOrAssistant: owner.publicKey, - }, - { - chain: arbChain, - address: arbRouter, - mintRecipient: null, - } - ), - ], - [owner] + const ix = await engine.addCctpRouterEndpointIx( + { + ownerOrAssistant: owner.publicKey, + }, + { + chain: arbChain, + cctpDomain: arbDomain, + address: arbRouter, + mintRecipient: null, + } ); + await expectIxOk(connection, [ix], [owner]); }); before("Transfer Lamports to Offer Authorities", async function () { diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 5775f906..03f4035a 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -404,9 +404,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [ownerAssistant]); - const routerEndpointData = await tokenRouter.fetchRouterEndpoint( - tokenRouter.routerEndpointAddress(foreignChain) - ); + const routerEndpointData = await tokenRouter.fetchRouterEndpoint(foreignChain); expect(routerEndpointData).to.eql( new RouterEndpoint( expectedEndpointBump, @@ -433,9 +431,7 @@ describe("Token Router", function () { await expectIxOk(connection, [ix], [owner]); - const routerEndpointData = await tokenRouter.fetchRouterEndpoint( - tokenRouter.routerEndpointAddress(foreignChain) - ); + const routerEndpointData = await tokenRouter.fetchRouterEndpoint(foreignChain); expect(routerEndpointData).to.eql( new RouterEndpoint( expectedEndpointBump, @@ -1004,9 +1000,7 @@ describe("Token Router", function () { const { protocol: { cctp: cctpProtocol }, - } = await tokenRouter.fetchRouterEndpoint( - tokenRouter.routerEndpointAddress(foreignChain) - ); + } = await tokenRouter.fetchRouterEndpoint(foreignChain); expect(cctpProtocol).is.not.null; const { domain: destinationCctpDomain } = cctpProtocol!; diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 393a5fdc..dd357357 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -99,12 +99,14 @@ describe("Matching Engine <> Token Router", function () { const routerEndpointData = await matchingEngine.fetchRouterEndpoint( wormholeSdk.CHAIN_ID_SOLANA ); + const { bump } = routerEndpointData; expect(routerEndpointData).to.eql( new matchingEngineSdk.RouterEndpoint( - 254, // bump + bump, wormholeSdk.CHAIN_ID_SOLANA, Array.from(tokenRouter.custodianAddress().toBuffer()), - Array.from(tokenRouter.custodyTokenAccountAddress().toBuffer()) + Array.from(tokenRouter.custodyTokenAccountAddress().toBuffer()), + { local: { programId: tokenRouter.ID } } ) ); }); From df47d3f306e18aee27690c9b01f10a3e77c30f6b Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 16:45:39 -0600 Subject: [PATCH 095/126] solana: remove endpoints from router --- solana/programs/token-router/src/lib.rs | 11 -- .../token-router/src/processor/admin/mod.rs | 3 - .../admin/router_endpoint/add_cctp.rs | 104 ------------- .../processor/admin/router_endpoint/mod.rs | 5 - .../processor/admin/router_endpoint/remove.rs | 39 ----- .../src/processor/market_order/place_cctp.rs | 11 +- .../src/processor/redeem_fill/cctp.rs | 7 +- solana/programs/token-router/src/state/mod.rs | 3 - .../token-router/src/state/router_endpoint.rs | 34 ----- solana/ts/src/tokenRouter/index.ts | 73 +-------- .../src/tokenRouter/state/RouterEndpoint.ts | 37 ----- solana/ts/src/tokenRouter/state/index.ts | 1 - solana/ts/tests/02__tokenRouter.ts | 140 ++---------------- 13 files changed, 29 insertions(+), 439 deletions(-) delete mode 100644 solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs delete mode 100644 solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs delete mode 100644 solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs delete mode 100644 solana/programs/token-router/src/state/router_endpoint.rs delete mode 100644 solana/ts/src/tokenRouter/state/RouterEndpoint.ts diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 1e1a5cf2..dac9b92f 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -126,17 +126,6 @@ pub mod token_router { processor::update_owner_assistant(ctx) } - pub fn add_cctp_router_endpoint( - ctx: Context, - args: AddCctpRouterEndpointArgs, - ) -> Result<()> { - processor::add_cctp_router_endpoint(ctx, args) - } - - pub fn remove_router_endpoint(ctx: Context) -> Result<()> { - processor::remove_router_endpoint(ctx) - } - /// This instruction updates the `paused` boolean in the `SenderConfig` /// account. This instruction is owner-only, meaning that only the owner /// of the program (defined in the [Config] account) can pause outbound diff --git a/solana/programs/token-router/src/processor/admin/mod.rs b/solana/programs/token-router/src/processor/admin/mod.rs index 25230ee3..9364992f 100644 --- a/solana/programs/token-router/src/processor/admin/mod.rs +++ b/solana/programs/token-router/src/processor/admin/mod.rs @@ -4,9 +4,6 @@ pub use initialize::*; mod ownership_transfer_request; pub use ownership_transfer_request::*; -mod router_endpoint; -pub use router_endpoint::*; - mod set_pause; pub use set_pause::*; diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs deleted file mode 100644 index 0616f8bb..00000000 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/add_cctp.rs +++ /dev/null @@ -1,104 +0,0 @@ -use crate::{ - error::TokenRouterError, - state::{Custodian, MessageProtocol, RouterEndpoint}, -}; -use anchor_lang::prelude::*; -use common::{ - admin::utils::assistant::only_authorized, - wormhole_cctp_solana::{ - cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, - utils::ExternalAccount, - wormhole::core_bridge_program, - }, -}; - -#[derive(Accounts)] -#[instruction(chain: u16, cctp_domain: u32)] -pub struct AddCctpRouterEndpoint<'info> { - #[account(mut)] - owner_or_assistant: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ TokenRouterError::OwnerOrAssistantOnly, - )] - custodian: Account<'info, Custodian>, - - #[account( - init_if_needed, - payer = owner_or_assistant, - space = 8 + RouterEndpoint::INIT_SPACE, - seeds = [ - RouterEndpoint::SEED_PREFIX, - &chain.to_be_bytes() - ], - bump, - )] - router_endpoint: Account<'info, RouterEndpoint>, - - /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token - /// Messenger Minter program). - #[account( - seeds = [ - RemoteTokenMessenger::SEED_PREFIX, - cctp_domain.to_string().as_ref() - ], - bump, - seeds::program = token_messenger_minter_program::id(), - )] - remote_token_messenger: Account<'info, ExternalAccount>, - - system_program: Program<'info, System>, -} - -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct AddCctpRouterEndpointArgs { - pub chain: u16, - pub cctp_domain: u32, - pub address: [u8; 32], - pub mint_recipient: Option<[u8; 32]>, -} - -pub fn add_cctp_router_endpoint( - ctx: Context, - args: AddCctpRouterEndpointArgs, -) -> Result<()> { - let AddCctpRouterEndpointArgs { - chain, - cctp_domain: domain, - address, - mint_recipient, - } = args; - - require!( - chain != 0 && chain != core_bridge_program::SOLANA_CHAIN, - TokenRouterError::ChainNotAllowed - ); - - require!(address != [0; 32], TokenRouterError::InvalidEndpoint); - - let mint_recipient = match mint_recipient { - Some(mint_recipient) => { - require!( - mint_recipient != [0; 32], - TokenRouterError::InvalidMintRecipient - ); - mint_recipient - } - None => address, - }; - - ctx.accounts.router_endpoint.set_inner(RouterEndpoint { - bump: ctx.bumps["router_endpoint"], - chain, - address, - mint_recipient, - protocol: MessageProtocol::Cctp { domain }, - }); - - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs deleted file mode 100644 index e7490deb..00000000 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/mod.rs +++ /dev/null @@ -1,5 +0,0 @@ -mod add_cctp; -pub use add_cctp::*; - -mod remove; -pub use remove::*; diff --git a/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs b/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs deleted file mode 100644 index 37cb7b9d..00000000 --- a/solana/programs/token-router/src/processor/admin/router_endpoint/remove.rs +++ /dev/null @@ -1,39 +0,0 @@ -use crate::{ - error::TokenRouterError, - state::{Custodian, RouterEndpoint}, -}; -use anchor_lang::prelude::*; -use common::admin::utils::assistant::only_authorized; - -#[derive(Accounts)] -pub struct RemoveRouterEndpoint<'info> { - #[account( - mut, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ TokenRouterError::OwnerOrAssistantOnly, - )] - owner_or_assistant: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - )] - custodian: Account<'info, Custodian>, - - #[account( - mut, - close = owner_or_assistant, - seeds = [ - RouterEndpoint::SEED_PREFIX, - &router_endpoint.chain.to_be_bytes() - ], - bump, - )] - router_endpoint: Account<'info, RouterEndpoint>, -} - -pub fn remove_router_endpoint(_ctx: Context) -> Result<()> { - // Done. - Ok(()) -} diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index a8dab036..73f0b4ee 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::TokenRouterError, - state::{Custodian, MessageProtocol, PayerSequence, PreparedOrder, RouterEndpoint}, + state::{Custodian, PayerSequence, PreparedOrder}, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -83,12 +83,13 @@ pub struct PlaceMarketOrderCctp<'info> { /// error is thrown (whereas here the account would not exist). #[account( seeds = [ - RouterEndpoint::SEED_PREFIX, + matching_engine::state::RouterEndpoint::SEED_PREFIX, router_endpoint.chain.to_be_bytes().as_ref(), ], bump = router_endpoint.bump, + seeds::program = matching_engine::id(), )] - router_endpoint: Account<'info, RouterEndpoint>, + router_endpoint: Account<'info, matching_engine::state::RouterEndpoint>, /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] @@ -159,7 +160,9 @@ pub struct PlaceMarketOrderCctp<'info> { /// See [burn_and_publish](wormhole_cctp_solana::cpi::burn_and_publish) for more details. pub fn place_market_order_cctp(ctx: Context) -> Result<()> { match ctx.accounts.router_endpoint.protocol { - MessageProtocol::Cctp { domain } => handle_place_market_order_cctp(ctx, domain), + matching_engine::state::MessageProtocol::Cctp { domain } => { + handle_place_market_order_cctp(ctx, domain) + } _ => err!(TokenRouterError::InvalidCctpEndpoint), } } diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 17c6f2b8..deb981ed 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::TokenRouterError, - state::{Custodian, FillType, PreparedFill, RouterEndpoint}, + state::{Custodian, FillType, PreparedFill}, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -64,12 +64,13 @@ pub struct RedeemCctpFill<'info> { /// Seeds must be \["registered_emitter", target_chain.to_be_bytes()\]. #[account( seeds = [ - RouterEndpoint::SEED_PREFIX, + matching_engine::state::RouterEndpoint::SEED_PREFIX, router_endpoint.chain.to_be_bytes().as_ref(), ], bump = router_endpoint.bump, + seeds::program = matching_engine::id(), )] - router_endpoint: Account<'info, RouterEndpoint>, + router_endpoint: Box>, /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). message_transmitter_authority: UncheckedAccount<'info>, diff --git a/solana/programs/token-router/src/state/mod.rs b/solana/programs/token-router/src/state/mod.rs index 93d1e04e..a19ba01a 100644 --- a/solana/programs/token-router/src/state/mod.rs +++ b/solana/programs/token-router/src/state/mod.rs @@ -9,6 +9,3 @@ pub use prepared_fill::*; mod prepared_order; pub use prepared_order::*; - -mod router_endpoint; -pub use router_endpoint::*; diff --git a/solana/programs/token-router/src/state/router_endpoint.rs b/solana/programs/token-router/src/state/router_endpoint.rs deleted file mode 100644 index 10d38812..00000000 --- a/solana/programs/token-router/src/state/router_endpoint.rs +++ /dev/null @@ -1,34 +0,0 @@ -use anchor_lang::prelude::*; - -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, PartialEq, Eq, InitSpace)] -pub enum MessageProtocol { - Cctp { - /// CCTP domain, which is how CCTP registers identifies foreign networks. - domain: u32, - }, - Canonical, -} - -#[account] -#[derive(Debug, InitSpace)] -/// Foreign emitter account data. -pub struct RouterEndpoint { - pub bump: u8, - - /// Emitter chain. Cannot equal `1` (Solana's Chain ID). - pub chain: u16, - - /// Emitter address. Cannot be zero address. - pub address: [u8; 32], - - /// Future-proof field in case another network has token accounts to send assets to instead of - /// sending to the address directly. - pub mint_recipient: [u8; 32], - - /// Specific message protocol used to move assets. - pub protocol: MessageProtocol, -} - -impl RouterEndpoint { - pub const SEED_PREFIX: &'static [u8] = b"endpoint"; -} diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 74e365fc..3cd4ab08 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -18,7 +18,7 @@ import { import * as matchingEngineSdk from "../matchingEngine"; import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; import { VaaAccount } from "../wormhole"; -import { Custodian, PayerSequence, PreparedFill, PreparedOrder, RouterEndpoint } from "./state"; +import { Custodian, PayerSequence, PreparedFill, PreparedOrder } from "./state"; export const PROGRAM_IDS = [ "TokenRouter11111111111111111111111111111111", @@ -172,15 +172,6 @@ export class TokenRouterProgram { .catch((_) => new BN(0)); } - routerEndpointAddress(chain: number): PublicKey { - return RouterEndpoint.address(this.ID, chain); - } - - async fetchRouterEndpoint(chain: number | { address: PublicKey }): Promise { - const addr = typeof chain === "number" ? this.routerEndpointAddress(chain) : chain.address; - return this.program.account.routerEndpoint.fetch(addr); - } - async fetchPreparedOrder(addr: PublicKey): Promise { return this.program.account.preparedOrder.fetch(addr); } @@ -342,12 +333,15 @@ export class TokenRouterProgram { ): Promise { const { remoteDomain: inputRemoteDomain } = overrides; - const routerEndpoint = this.routerEndpointAddress(targetChain); + const matchingEngine = this.matchingEngineProgram(); + const routerEndpoint = matchingEngine.routerEndpointAddress(targetChain); const remoteDomain = await (async () => { if (inputRemoteDomain !== undefined) { return inputRemoteDomain; } else { - const { protocol } = await this.fetchRouterEndpoint({ address: routerEndpoint }); + const { protocol } = await matchingEngine.fetchRouterEndpoint({ + address: routerEndpoint, + }); if (protocol.cctp !== undefined) { return protocol.cctp.domain; } else { @@ -511,7 +505,7 @@ export class TokenRouterProgram { custodian: this.custodianAddress(), preparedFill, custodyToken, - routerEndpoint: this.routerEndpointAddress(chain), + routerEndpoint: this.matchingEngineProgram().routerEndpointAddress(chain), messageTransmitterAuthority, messageTransmitterConfig, usedNonces, @@ -729,59 +723,6 @@ export class TokenRouterProgram { .instruction(); } - async addCctpRouterEndpointIx( - accounts: { - ownerOrAssistant: PublicKey; - custodian?: PublicKey; - routerEndpoint?: PublicKey; - remoteTokenMessenger?: PublicKey; - }, - args: AddCctpRouterEndpointArgs - ): Promise { - const { - ownerOrAssistant, - custodian: inputCustodian, - routerEndpoint: inputRouterEndpoint, - remoteTokenMessenger: inputRemoteTokenMessenger, - } = accounts; - const { chain, cctpDomain } = args; - const derivedRemoteTokenMessenger = - this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); - - return this.program.methods - .addCctpRouterEndpoint(args) - .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), - routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), - remoteTokenMessenger: inputRemoteTokenMessenger ?? derivedRemoteTokenMessenger, - }) - .instruction(); - } - - async removeRouterEndpointIx( - accounts: { - ownerOrAssistant: PublicKey; - custodian?: PublicKey; - routerEndpoint?: PublicKey; - }, - chain: number - ): Promise { - const { - ownerOrAssistant, - custodian: inputCustodian, - routerEndpoint: inputRouterEndpoint, - } = accounts; - return this.program.methods - .removeRouterEndpoint() - .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), - routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), - }) - .instruction(); - } - async updateOwnerAssistantIx(accounts: { owner: PublicKey; newOwnerAssistant: PublicKey; diff --git a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts b/solana/ts/src/tokenRouter/state/RouterEndpoint.ts deleted file mode 100644 index a17ec5db..00000000 --- a/solana/ts/src/tokenRouter/state/RouterEndpoint.ts +++ /dev/null @@ -1,37 +0,0 @@ -import { PublicKey } from "@solana/web3.js"; - -export type MessageProtocol = { - cctp?: { domain: number }; - canonical?: {}; -}; - -export class RouterEndpoint { - bump: number; - chain: number; - address: Array; - mintRecipient: Array; - protocol: MessageProtocol; - - constructor( - bump: number, - chain: number, - address: Array, - mintRecipient: Array, - protocol: MessageProtocol - ) { - this.bump = bump; - this.chain = chain; - this.address = address; - this.mintRecipient = mintRecipient; - this.protocol = protocol; - } - - static address(programId: PublicKey, chain: number) { - const encodedChain = Buffer.alloc(2); - encodedChain.writeUInt16BE(chain); - return PublicKey.findProgramAddressSync( - [Buffer.from("endpoint"), encodedChain], - programId - )[0]; - } -} diff --git a/solana/ts/src/tokenRouter/state/index.ts b/solana/ts/src/tokenRouter/state/index.ts index 8c5efe61..6298364a 100644 --- a/solana/ts/src/tokenRouter/state/index.ts +++ b/solana/ts/src/tokenRouter/state/index.ts @@ -2,7 +2,6 @@ export * from "./Custodian"; export * from "./PayerSequence"; export * from "./PreparedFill"; export * from "./PreparedOrder"; -export * from "./RouterEndpoint"; import { solana } from "@certusone/wormhole-sdk"; import { BN } from "@coral-xyz/anchor"; diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 03f4035a..bbef2d6c 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -12,13 +12,7 @@ import { import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; import { CctpTokenBurnMessage, LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; -import { - Custodian, - PreparedOrder, - RouterEndpoint, - TokenRouterProgram, - localnet, -} from "../src/tokenRouter"; +import { Custodian, PreparedOrder, TokenRouterProgram, localnet } from "../src/tokenRouter"; import { CircleAttester, ETHEREUM_USDC_ADDRESS, @@ -330,120 +324,6 @@ describe("Token Router", function () { }); }); - describe("Add CCTP Router Endpoint", function () { - const expectedEndpointBump = 255; - - it("Cannot Add CCTP Router Endpoint as Non-Owner and Non-Assistant", async function () { - const ix = await tokenRouter.addCctpRouterEndpointIx( - { - ownerOrAssistant: payer.publicKey, - }, - { - chain: foreignChain, - address: foreignEndpointAddress, - cctpDomain: foreignCctpDomain, - mintRecipient: null, - } - ); - - await expectIxErr(connection, [ix], [payer], "Error Code: OwnerOrAssistantOnly"); - }); - - [wormholeSdk.CHAINS.unset, wormholeSdk.CHAINS.solana].forEach((chain) => - it(`Cannot Register Chain ID == ${chain}`, async function () { - const ix = await tokenRouter.addCctpRouterEndpointIx( - { - ownerOrAssistant: ownerAssistant.publicKey, - }, - { - chain, - address: foreignEndpointAddress, - cctpDomain: foreignCctpDomain, - mintRecipient: null, - } - ); - - await expectIxErr( - connection, - [ix], - [ownerAssistant], - "Error Code: ChainNotAllowed" - ); - }) - ); - - it("Cannot Register Zero Address", async function () { - const ix = await tokenRouter.addCctpRouterEndpointIx( - { - ownerOrAssistant: owner.publicKey, - }, - { - chain: foreignChain, - address: new Array(32).fill(0), - cctpDomain: foreignCctpDomain, - mintRecipient: null, - } - ); - - await expectIxErr(connection, [ix], [owner], "Error Code: InvalidEndpoint"); - }); - - it(`Add CCTP Router Endpoint as Owner Assistant`, async function () { - const contractAddress = Array.from(Buffer.alloc(32, "fbadc0de", "hex")); - const ix = await tokenRouter.addCctpRouterEndpointIx( - { - ownerOrAssistant: ownerAssistant.publicKey, - }, - { - chain: foreignChain, - address: contractAddress, - cctpDomain: foreignCctpDomain, - mintRecipient: null, - } - ); - - await expectIxOk(connection, [ix], [ownerAssistant]); - - const routerEndpointData = await tokenRouter.fetchRouterEndpoint(foreignChain); - expect(routerEndpointData).to.eql( - new RouterEndpoint( - expectedEndpointBump, - foreignChain, - contractAddress, - contractAddress, - { cctp: { domain: foreignCctpDomain } } // protocol - ) - ); - }); - - it(`Update Router Endpoint as Owner`, async function () { - const ix = await tokenRouter.addCctpRouterEndpointIx( - { - ownerOrAssistant: owner.publicKey, - }, - { - chain: foreignChain, - address: foreignEndpointAddress, - cctpDomain: foreignCctpDomain, - mintRecipient: null, - } - ); - - await expectIxOk(connection, [ix], [owner]); - - const routerEndpointData = await tokenRouter.fetchRouterEndpoint(foreignChain); - expect(routerEndpointData).to.eql( - new RouterEndpoint( - expectedEndpointBump, - foreignChain, - foreignEndpointAddress, - foreignEndpointAddress, - { cctp: { domain: foreignCctpDomain } } // protocol - ) - ); - }); - }); - describe("Set Pause", async function () { it("Cannot Set Pause for Transfers as Non-Owner", async function () { const ix = await tokenRouter.setPauseIx( @@ -741,9 +621,9 @@ describe("Token Router", function () { it("Cannot Place Market Order with Unregistered Endpoint", async function () { const preparedOrder = localVariables.get("preparedOrder") as PublicKey; - const unregisteredEndpoint = tokenRouter.routerEndpointAddress( - wormholeSdk.CHAIN_ID_SOLANA - ); + const unregisteredEndpoint = tokenRouter + .matchingEngineProgram() + .routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA); const ix = await tokenRouter.placeMarketOrderCctpIx({ payer: payer.publicKey, preparedOrder, @@ -1000,7 +880,7 @@ describe("Token Router", function () { const { protocol: { cctp: cctpProtocol }, - } = await tokenRouter.fetchRouterEndpoint(foreignChain); + } = await tokenRouter.matchingEngineProgram().fetchRouterEndpoint(foreignChain); expect(cctpProtocol).is.not.null; const { domain: destinationCctpDomain } = cctpProtocol!; @@ -1091,7 +971,9 @@ describe("Token Router", function () { { payer: payer.publicKey, vaa, - routerEndpoint: tokenRouter.routerEndpointAddress(foreignChain), + routerEndpoint: tokenRouter + .matchingEngineProgram() + .routerEndpointAddress(foreignChain), }, { encodedCctpMessage, @@ -1301,8 +1183,8 @@ describe("Token Router", function () { }); }); - it("Remove Router Endpoint", async function () { - const ix = await tokenRouter.removeRouterEndpointIx( + it("Remove Router Endpoint on Matching Engine", async function () { + const ix = await tokenRouter.matchingEngineProgram().removeRouterEndpointIx( { ownerOrAssistant: ownerAssistant.publicKey, }, @@ -1380,7 +1262,7 @@ describe("Token Router", function () { }); it("Add Router Endpoint", async function () { - const ix = await tokenRouter.addCctpRouterEndpointIx( + const ix = await tokenRouter.matchingEngineProgram().addCctpRouterEndpointIx( { ownerOrAssistant: ownerAssistant.publicKey, }, From 7a90ac6e1969291cd12a5279382bf6f375c1b7b1 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 16:56:20 -0600 Subject: [PATCH 096/126] solana: uptick wormhole-cctp-solana to 0.0.1-alpha.9 --- solana/Cargo.lock | 8 ++++---- solana/Cargo.toml | 2 +- .../processor/auction/execute_fast_order/cctp.rs | 13 +++++-------- .../src/processor/auction/settle/active/cctp.rs | 13 +++++-------- .../src/processor/auction/settle/none/cctp.rs | 13 +++++-------- .../src/processor/market_order/place_cctp.rs | 14 +++++--------- 6 files changed, 25 insertions(+), 38 deletions(-) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index a339a7cb..54349117 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2414,9 +2414,9 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.0.1-alpha.7" +version = "0.0.1-alpha.9" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d566238cc3af7a9a451c6199f327213be31ba97534c28dc96b6ea6d009ce8695" +checksum = "239a8dcac183cc310a0a639e5077d835ce0ff1fb74a4378001f70728eeeb6c6e" dependencies = [ "anchor-lang", "anchor-spl", @@ -2446,9 +2446,9 @@ dependencies = [ [[package]] name = "wormhole-io" -version = "0.1.2" +version = "0.1.3" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "a08bfc5177a40f089539b640b29b7d4520aa3ce465733d10a68eb4e389f77162" +checksum = "b021a14ea7bcef9517ed9f81d4466c4a663dd90e726c5724707a976fa83ad8f3" [[package]] name = "wormhole-raw-vaas" diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 77e342b3..9e59f05d 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -21,7 +21,7 @@ path = "modules/common" path = "programs/matching-engine" [workspace.dependencies.wormhole-cctp-solana] -version = "0.0.1-alpha.7" +version = "0.0.1-alpha.9" default-features = false [workspace.dependencies.wormhole-raw-vaas] diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index a5810b64..cb873a74 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -5,13 +5,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::{ - wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, - }, - wormhole_io::TypePrefixedPayload, +use common::wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, }; /// Accounts required for [execute_fast_order_cctp]. @@ -261,7 +258,7 @@ pub fn handle_execute_fast_order_cctp( amount, mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: fill.to_vec_payload(), + payload: fill, }, )?; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index fd095089..bc05f16d 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -8,13 +8,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::{ - wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, - }, - wormhole_io::TypePrefixedPayload, +use common::wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, }; /// Accounts required for [settle_auction_active_cctp]. @@ -299,7 +296,7 @@ fn handle_settle_auction_active_cctp( amount, mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: fill.to_vec_payload(), + payload: fill, }, )?; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs index 984fad04..ad7b4baf 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs @@ -6,13 +6,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::{ - wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, - }, - wormhole_io::TypePrefixedPayload, +use common::wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, }; /// Accounts required for [settle_auction_none_cctp]. @@ -295,7 +292,7 @@ fn handle_settle_auction_none_cctp( // TODO: add mint recipient to the router endpoint account to future proof this? mint_recipient: ctx.accounts.to_router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: fill.to_vec_payload(), + payload: fill, }, )?; diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index 73f0b4ee..8ab0ddd5 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -4,13 +4,10 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::{ - wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, - }, - wormhole_io::TypePrefixedPayload, +use common::wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, }; /// Accounts required for [place_market_order_cctp]. @@ -246,8 +243,7 @@ fn handle_place_market_order_cctp( order_sender: ctx.accounts.order_sender.key().to_bytes(), redeemer: ctx.accounts.prepared_order.redeemer, redeemer_message: redeemer_message.into(), - } - .to_vec_payload(), + }, }, )?; From 498538e37d9da4c5035f11760270249412a9feb1 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 17:20:08 -0600 Subject: [PATCH 097/126] evm: remove target domain; move matching engine to deprecated --- .../forge/tests/MatchingEngine.t.sol | 0 .../mock/MockMatchingEngineImplementation.sol | 0 .../MatchingEngineImplementation.sol | 0 .../MatchingEngine/MatchingEngineSetup.sol | 0 .../src/MatchingEngine/assets/Errors.sol | 0 .../assets/MatchingEngineAdmin.sol | 0 .../assets/MatchingEngineFastOrders.sol | 0 .../src/MatchingEngine/assets/State.sol | 0 .../src/MatchingEngine/assets/Storage.sol | 0 .../src/TokenRouter/assets/RedeemFill.sol | 107 ++++++++++++++ .../src/interfaces/IMatchingEngine.sol | 0 .../src/interfaces/IMatchingEngineAdmin.sol | 0 .../interfaces/IMatchingEngineFastOrders.sol | 0 .../src/interfaces/IMatchingEngineState.sol | 0 .../src/interfaces/IMatchingEngineTypes.sol | 0 evm/forge/tests/TokenRouter.t.sol | 134 +++++++++--------- .../TokenRouter/assets/PlaceMarketOrder.sol | 1 - evm/src/TokenRouter/assets/RedeemFill.sol | 36 +---- evm/src/shared/Messages.sol | 3 - 19 files changed, 174 insertions(+), 107 deletions(-) rename evm/{ => deprecated}/forge/tests/MatchingEngine.t.sol (100%) rename evm/{ => deprecated}/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol (100%) rename evm/{ => deprecated}/src/MatchingEngine/MatchingEngineImplementation.sol (100%) rename evm/{ => deprecated}/src/MatchingEngine/MatchingEngineSetup.sol (100%) rename evm/{ => deprecated}/src/MatchingEngine/assets/Errors.sol (100%) rename evm/{ => deprecated}/src/MatchingEngine/assets/MatchingEngineAdmin.sol (100%) rename evm/{ => deprecated}/src/MatchingEngine/assets/MatchingEngineFastOrders.sol (100%) rename evm/{ => deprecated}/src/MatchingEngine/assets/State.sol (100%) rename evm/{ => deprecated}/src/MatchingEngine/assets/Storage.sol (100%) create mode 100644 evm/deprecated/src/TokenRouter/assets/RedeemFill.sol rename evm/{ => deprecated}/src/interfaces/IMatchingEngine.sol (100%) rename evm/{ => deprecated}/src/interfaces/IMatchingEngineAdmin.sol (100%) rename evm/{ => deprecated}/src/interfaces/IMatchingEngineFastOrders.sol (100%) rename evm/{ => deprecated}/src/interfaces/IMatchingEngineState.sol (100%) rename evm/{ => deprecated}/src/interfaces/IMatchingEngineTypes.sol (100%) diff --git a/evm/forge/tests/MatchingEngine.t.sol b/evm/deprecated/forge/tests/MatchingEngine.t.sol similarity index 100% rename from evm/forge/tests/MatchingEngine.t.sol rename to evm/deprecated/forge/tests/MatchingEngine.t.sol diff --git a/evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol b/evm/deprecated/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol similarity index 100% rename from evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol rename to evm/deprecated/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol diff --git a/evm/src/MatchingEngine/MatchingEngineImplementation.sol b/evm/deprecated/src/MatchingEngine/MatchingEngineImplementation.sol similarity index 100% rename from evm/src/MatchingEngine/MatchingEngineImplementation.sol rename to evm/deprecated/src/MatchingEngine/MatchingEngineImplementation.sol diff --git a/evm/src/MatchingEngine/MatchingEngineSetup.sol b/evm/deprecated/src/MatchingEngine/MatchingEngineSetup.sol similarity index 100% rename from evm/src/MatchingEngine/MatchingEngineSetup.sol rename to evm/deprecated/src/MatchingEngine/MatchingEngineSetup.sol diff --git a/evm/src/MatchingEngine/assets/Errors.sol b/evm/deprecated/src/MatchingEngine/assets/Errors.sol similarity index 100% rename from evm/src/MatchingEngine/assets/Errors.sol rename to evm/deprecated/src/MatchingEngine/assets/Errors.sol diff --git a/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol b/evm/deprecated/src/MatchingEngine/assets/MatchingEngineAdmin.sol similarity index 100% rename from evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol rename to evm/deprecated/src/MatchingEngine/assets/MatchingEngineAdmin.sol diff --git a/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol b/evm/deprecated/src/MatchingEngine/assets/MatchingEngineFastOrders.sol similarity index 100% rename from evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol rename to evm/deprecated/src/MatchingEngine/assets/MatchingEngineFastOrders.sol diff --git a/evm/src/MatchingEngine/assets/State.sol b/evm/deprecated/src/MatchingEngine/assets/State.sol similarity index 100% rename from evm/src/MatchingEngine/assets/State.sol rename to evm/deprecated/src/MatchingEngine/assets/State.sol diff --git a/evm/src/MatchingEngine/assets/Storage.sol b/evm/deprecated/src/MatchingEngine/assets/Storage.sol similarity index 100% rename from evm/src/MatchingEngine/assets/Storage.sol rename to evm/deprecated/src/MatchingEngine/assets/Storage.sol diff --git a/evm/deprecated/src/TokenRouter/assets/RedeemFill.sol b/evm/deprecated/src/TokenRouter/assets/RedeemFill.sol new file mode 100644 index 00000000..3e958a38 --- /dev/null +++ b/evm/deprecated/src/TokenRouter/assets/RedeemFill.sol @@ -0,0 +1,107 @@ +// SPDX-License-Identifier: Apache 2 + +pragma solidity ^0.8.19; + +import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; +import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; +import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; +import {IWormhole} from "wormhole-solidity/IWormhole.sol"; + +import {IMatchingEngine} from "../../interfaces/IMatchingEngine.sol"; + +import {Admin} from "../../shared/Admin.sol"; +import {Messages} from "../../shared/Messages.sol"; +import {Utils} from "../../shared/Utils.sol"; + +import "./Errors.sol"; +import {State} from "./State.sol"; + +import "../../interfaces/IRedeemFill.sol"; + +import "forge-std/console.sol"; + +abstract contract RedeemFill is IRedeemFill, Admin, State { + using Messages for *; + using Utils for *; + + /// @inheritdoc IRedeemFill + function redeemFill(OrderResponse calldata response) external returns (RedeemedFill memory) { + uint16 emitterChain = response.encodedWormholeMessage.unsafeEmitterChainFromVaa(); + bytes32 emitterAddress = response.encodedWormholeMessage.unsafeEmitterAddressFromVaa(); + + // If the emitter is the matching engine, and this TokenRouter is on the same chain + // as the matching engine, then this is a fast fill. + if ( + (emitterChain == _matchingEngineChain && _chainId == _matchingEngineChain) + && emitterAddress == _matchingEngineAddress + ) { + return _handleFastFill(response.encodedWormholeMessage); + } else { + return _handleFill(emitterChain, response); + } + } + + // ------------------------------- Private --------------------------------- + + function _handleFill(uint16 emitterChain, OrderResponse calldata response) + private + returns (RedeemedFill memory) + { + (IWormhole.VM memory vaa,, uint256 amount,,, bytes memory payload) = verifyVaaAndMint( + response.circleBridgeMessage, + response.circleAttestation, + response.encodedWormholeMessage + ); + + Messages.Fill memory fill = payload.decodeFill(); + + // Verify that the sender is a known router or the matching engine. + if (vaa.emitterAddress != _matchingEngineAddress || emitterChain != _matchingEngineChain) { + bytes32 fromRouter = getRouter(emitterChain); + if (vaa.emitterAddress != fromRouter) { + revert ErrInvalidSourceRouter(vaa.emitterAddress, fromRouter); + } + } + + _verifyRedeemer(fill.redeemer); + + // Transfer token amount to redeemer. + SafeERC20.safeTransfer(_orderToken, msg.sender, amount); + + return RedeemedFill({ + sender: fill.orderSender, + senderChain: fill.sourceChain, + token: address(_orderToken), + amount: amount, + message: fill.redeemerMessage + }); + } + + function _handleFastFill(bytes calldata fastFillVaa) private returns (RedeemedFill memory) { + // Call the Matching Engine to redeem the fill directly. + Messages.FastFill memory fastFill = IMatchingEngine( + _matchingEngineAddress.fromUniversalAddress() + ).redeemFastFill(fastFillVaa); + + _verifyRedeemer(fastFill.fill.redeemer); + + // Transfer token amount to redeemer. + SafeERC20.safeTransfer(_orderToken, msg.sender, fastFill.fillAmount); + + return RedeemedFill({ + sender: fastFill.fill.orderSender, + senderChain: fastFill.fill.sourceChain, + token: address(_orderToken), + amount: fastFill.fillAmount, + message: fastFill.fill.redeemerMessage + }); + } + + function _verifyRedeemer(bytes32 expectedRedeemer) private view { + // Make sure the redeemer is who we expect. + bytes32 redeemer = msg.sender.toUniversalAddress(); + if (redeemer != expectedRedeemer) { + revert ErrInvalidRedeemer(redeemer, expectedRedeemer); + } + } +} diff --git a/evm/src/interfaces/IMatchingEngine.sol b/evm/deprecated/src/interfaces/IMatchingEngine.sol similarity index 100% rename from evm/src/interfaces/IMatchingEngine.sol rename to evm/deprecated/src/interfaces/IMatchingEngine.sol diff --git a/evm/src/interfaces/IMatchingEngineAdmin.sol b/evm/deprecated/src/interfaces/IMatchingEngineAdmin.sol similarity index 100% rename from evm/src/interfaces/IMatchingEngineAdmin.sol rename to evm/deprecated/src/interfaces/IMatchingEngineAdmin.sol diff --git a/evm/src/interfaces/IMatchingEngineFastOrders.sol b/evm/deprecated/src/interfaces/IMatchingEngineFastOrders.sol similarity index 100% rename from evm/src/interfaces/IMatchingEngineFastOrders.sol rename to evm/deprecated/src/interfaces/IMatchingEngineFastOrders.sol diff --git a/evm/src/interfaces/IMatchingEngineState.sol b/evm/deprecated/src/interfaces/IMatchingEngineState.sol similarity index 100% rename from evm/src/interfaces/IMatchingEngineState.sol rename to evm/deprecated/src/interfaces/IMatchingEngineState.sol diff --git a/evm/src/interfaces/IMatchingEngineTypes.sol b/evm/deprecated/src/interfaces/IMatchingEngineTypes.sol similarity index 100% rename from evm/src/interfaces/IMatchingEngineTypes.sol rename to evm/deprecated/src/interfaces/IMatchingEngineTypes.sol diff --git a/evm/forge/tests/TokenRouter.t.sol b/evm/forge/tests/TokenRouter.t.sol index d6914c17..58fafe5d 100644 --- a/evm/forge/tests/TokenRouter.t.sol +++ b/evm/forge/tests/TokenRouter.t.sol @@ -592,7 +592,6 @@ contract TokenRouterTest is Test { amountIn: amountIn, minAmountOut: minAmountOut, targetChain: targetChain, - targetDomain: targetDomain, redeemer: redeemer, sender: sender, refundAddress: refundAddress, @@ -610,7 +609,6 @@ contract TokenRouterTest is Test { assertEq(decoded.amountIn, order.amountIn); assertEq(decoded.minAmountOut, order.minAmountOut); assertEq(decoded.targetChain, order.targetChain); - assertEq(decoded.targetDomain, order.targetDomain); assertEq(decoded.redeemer, order.redeemer); assertEq(decoded.sender, order.sender); assertEq(decoded.refundAddress, order.refundAddress); @@ -957,7 +955,6 @@ contract TokenRouterTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: ARB_CHAIN, - targetDomain: ARB_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), @@ -1013,7 +1010,6 @@ contract TokenRouterTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: ARB_CHAIN, - targetDomain: ARB_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(0).toUniversalAddress(), @@ -1059,71 +1055,71 @@ contract TokenRouterTest is Test { assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); } - function testPlaceFastMarketOrderTargetIsMatchingEngine( - uint64 amountIn, - uint64 maxFee, - uint32 deadline - ) public { - amountIn = uint64( - bound(amountIn, router.getMinTransferAmount() + 1, router.getMaxTransferAmount()) - ); - maxFee = uint64(bound(maxFee, router.getMinFee(), amountIn - 1)); - - _dealAndApproveUsdc(router, amountIn); - - // Register a router for the matching engine chain. - uint16 targetChain = matchingEngineChain; - Endpoint memory targetEndpoint = Endpoint({ - router: makeAddr("targetRouter").toUniversalAddress(), - mintRecipient: makeAddr("targetRouter").toUniversalAddress() - }); - - vm.prank(makeAddr("owner")); - router.addRouterEndpoint(targetChain, targetEndpoint, matchingEngineDomain); - - // Create a fast market order, this is actually the payload that will be encoded - // in the "slow message". - Messages.FastMarketOrder memory expectedFastMarketOrder = Messages.FastMarketOrder({ - amountIn: amountIn, - minAmountOut: 0, - targetChain: matchingEngineChain, - targetDomain: matchingEngineDomain, - redeemer: TEST_REDEEMER, - sender: address(this).toUniversalAddress(), - refundAddress: address(this).toUniversalAddress(), - maxFee: maxFee - router.getInitialAuctionFee(), - initAuctionFee: router.getInitialAuctionFee(), - deadline: deadline, - redeemerMessage: bytes("All your base are belong to us") - }); - - // Place the fast market order and store the two VAA payloads that were emitted. - (IWormhole.VM memory cctpMessage, IWormhole.VM memory fastMessage) = - _placeFastMarketOrder(router, expectedFastMarketOrder, maxFee); - - // Validate the fast message payload. - assertEq(fastMessage.payload, expectedFastMarketOrder.encode()); - - // Validate the slow message. - ( - bytes32 token, - uint256 amount, - uint32 sourceCctpDomain, - uint32 targetCctpDomain, - , - bytes32 burnSource, - bytes32 mintRecipient, - bytes memory payload - ) = cctpMessage.decodeDeposit(); - - assertEq(token, USDC_ADDRESS.toUniversalAddress()); - assertEq(amount, amountIn); - assertEq(sourceCctpDomain, AVAX_DOMAIN); - assertEq(targetCctpDomain, matchingEngineDomain); - assertEq(burnSource, address(this).toUniversalAddress()); - assertEq(mintRecipient, matchingEngineMintRecipient); - assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); - } + // function testPlaceFastMarketOrderTargetIsMatchingEngine( + // uint64 amountIn, + // uint64 maxFee, + // uint32 deadline + // ) public { + // amountIn = uint64( + // bound(amountIn, router.getMinTransferAmount() + 1, router.getMaxTransferAmount()) + // ); + // maxFee = uint64(bound(maxFee, router.getMinFee(), amountIn - 1)); + + // _dealAndApproveUsdc(router, amountIn); + + // // Register a router for the matching engine chain. + // uint16 targetChain = matchingEngineChain; + // Endpoint memory targetEndpoint = Endpoint({ + // router: makeAddr("targetRouter").toUniversalAddress(), + // mintRecipient: makeAddr("targetRouter").toUniversalAddress() + // }); + + // vm.prank(makeAddr("owner")); + // router.addRouterEndpoint(targetChain, targetEndpoint, matchingEngineDomain); + + // // Create a fast market order, this is actually the payload that will be encoded + // // in the "slow message". + // Messages.FastMarketOrder memory expectedFastMarketOrder = Messages.FastMarketOrder({ + // amountIn: amountIn, + // minAmountOut: 0, + // targetChain: matchingEngineChain, + // targetDomain: matchingEngineDomain, + // redeemer: TEST_REDEEMER, + // sender: address(this).toUniversalAddress(), + // refundAddress: address(this).toUniversalAddress(), + // maxFee: maxFee - router.getInitialAuctionFee(), + // initAuctionFee: router.getInitialAuctionFee(), + // deadline: deadline, + // redeemerMessage: bytes("All your base are belong to us") + // }); + + // // Place the fast market order and store the two VAA payloads that were emitted. + // (IWormhole.VM memory cctpMessage, IWormhole.VM memory fastMessage) = + // _placeFastMarketOrder(router, expectedFastMarketOrder, maxFee); + + // // Validate the fast message payload. + // assertEq(fastMessage.payload, expectedFastMarketOrder.encode()); + + // // Validate the slow message. + // ( + // bytes32 token, + // uint256 amount, + // uint32 sourceCctpDomain, + // uint32 targetCctpDomain, + // , + // bytes32 burnSource, + // bytes32 mintRecipient, + // bytes memory payload + // ) = cctpMessage.decodeDeposit(); + + // assertEq(token, USDC_ADDRESS.toUniversalAddress()); + // assertEq(amount, amountIn); + // assertEq(sourceCctpDomain, AVAX_DOMAIN); + // assertEq(targetCctpDomain, matchingEngineDomain); + // assertEq(burnSource, address(this).toUniversalAddress()); + // assertEq(mintRecipient, matchingEngineMintRecipient); + // assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); + // } /** * FILL REDEMPTION TESTS diff --git a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol index 7167bb28..b12e6de9 100644 --- a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol +++ b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol @@ -196,7 +196,6 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { amountIn: amountIn, minAmountOut: minAmountOut, targetChain: targetChain, - targetDomain: getCircleDomainsState().domains[targetChain], redeemer: redeemer, sender: msg.sender.toUniversalAddress(), refundAddress: refundAddress.toUniversalAddress(), diff --git a/evm/src/TokenRouter/assets/RedeemFill.sol b/evm/src/TokenRouter/assets/RedeemFill.sol index 3e958a38..51c97017 100644 --- a/evm/src/TokenRouter/assets/RedeemFill.sol +++ b/evm/src/TokenRouter/assets/RedeemFill.sol @@ -7,8 +7,6 @@ import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {IMatchingEngine} from "../../interfaces/IMatchingEngine.sol"; - import {Admin} from "../../shared/Admin.sol"; import {Messages} from "../../shared/Messages.sol"; import {Utils} from "../../shared/Utils.sol"; @@ -27,18 +25,8 @@ abstract contract RedeemFill is IRedeemFill, Admin, State { /// @inheritdoc IRedeemFill function redeemFill(OrderResponse calldata response) external returns (RedeemedFill memory) { uint16 emitterChain = response.encodedWormholeMessage.unsafeEmitterChainFromVaa(); - bytes32 emitterAddress = response.encodedWormholeMessage.unsafeEmitterAddressFromVaa(); - - // If the emitter is the matching engine, and this TokenRouter is on the same chain - // as the matching engine, then this is a fast fill. - if ( - (emitterChain == _matchingEngineChain && _chainId == _matchingEngineChain) - && emitterAddress == _matchingEngineAddress - ) { - return _handleFastFill(response.encodedWormholeMessage); - } else { - return _handleFill(emitterChain, response); - } + + return _handleFill(emitterChain, response); } // ------------------------------- Private --------------------------------- @@ -77,26 +65,6 @@ abstract contract RedeemFill is IRedeemFill, Admin, State { }); } - function _handleFastFill(bytes calldata fastFillVaa) private returns (RedeemedFill memory) { - // Call the Matching Engine to redeem the fill directly. - Messages.FastFill memory fastFill = IMatchingEngine( - _matchingEngineAddress.fromUniversalAddress() - ).redeemFastFill(fastFillVaa); - - _verifyRedeemer(fastFill.fill.redeemer); - - // Transfer token amount to redeemer. - SafeERC20.safeTransfer(_orderToken, msg.sender, fastFill.fillAmount); - - return RedeemedFill({ - sender: fastFill.fill.orderSender, - senderChain: fastFill.fill.sourceChain, - token: address(_orderToken), - amount: fastFill.fillAmount, - message: fastFill.fill.redeemerMessage - }); - } - function _verifyRedeemer(bytes32 expectedRedeemer) private view { // Make sure the redeemer is who we expect. bytes32 redeemer = msg.sender.toUniversalAddress(); diff --git a/evm/src/shared/Messages.sol b/evm/src/shared/Messages.sol index a0e71331..3489f9b7 100644 --- a/evm/src/shared/Messages.sol +++ b/evm/src/shared/Messages.sol @@ -38,7 +38,6 @@ library Messages { uint64 amountIn; uint64 minAmountOut; uint16 targetChain; - uint32 targetDomain; bytes32 redeemer; bytes32 sender; bytes32 refundAddress; @@ -79,7 +78,6 @@ library Messages { order.amountIn, order.minAmountOut, order.targetChain, - order.targetDomain, order.redeemer, order.sender, order.refundAddress, @@ -101,7 +99,6 @@ library Messages { (order.amountIn, offset) = encoded.asUint64Unchecked(offset); (order.minAmountOut, offset) = encoded.asUint64Unchecked(offset); (order.targetChain, offset) = encoded.asUint16Unchecked(offset); - (order.targetDomain, offset) = encoded.asUint32Unchecked(offset); (order.redeemer, offset) = encoded.asBytes32Unchecked(offset); (order.sender, offset) = encoded.asBytes32Unchecked(offset); (order.refundAddress, offset) = encoded.asBytes32Unchecked(offset); From a284940659214dfb16e47171b95156a60ab4baa0 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 17:32:41 -0600 Subject: [PATCH 098/126] solana: remove destination cctp domain --- .../common/src/messages/fast_market_order.rs | 5 ---- solana/modules/common/src/messages/raw/mod.rs | 24 ++++++++----------- solana/ts/scripts/setUpTestnetTokenRouter.ts | 4 ++-- solana/ts/src/matchingEngine/index.ts | 23 ++++++++++++++---- solana/ts/src/messages/index.ts | 8 +------ solana/ts/tests/01__matchingEngine.ts | 19 +++++++-------- 6 files changed, 40 insertions(+), 43 deletions(-) diff --git a/solana/modules/common/src/messages/fast_market_order.rs b/solana/modules/common/src/messages/fast_market_order.rs index 0394104b..79f7bec9 100644 --- a/solana/modules/common/src/messages/fast_market_order.rs +++ b/solana/modules/common/src/messages/fast_market_order.rs @@ -7,7 +7,6 @@ pub struct FastMarketOrder { pub amount_in: u64, pub min_amount_out: u64, pub target_chain: u16, - pub destination_cctp_domain: u32, pub redeemer: [u8; 32], pub sender: [u8; 32], pub refund_address: [u8; 32], @@ -29,7 +28,6 @@ impl Readable for FastMarketOrder { amount_in: Readable::read(reader)?, min_amount_out: Readable::read(reader)?, target_chain: Readable::read(reader)?, - destination_cctp_domain: Readable::read(reader)?, redeemer: Readable::read(reader)?, sender: Readable::read(reader)?, refund_address: Readable::read(reader)?, @@ -54,7 +52,6 @@ impl Writeable for FastMarketOrder { self.amount_in.write(writer)?; self.min_amount_out.write(writer)?; self.target_chain.write(writer)?; - self.destination_cctp_domain.write(writer)?; self.redeemer.write(writer)?; self.sender.write(writer)?; self.refund_address.write(writer)?; @@ -85,7 +82,6 @@ mod test { amount_in: 1234567890, min_amount_out: 69420, target_chain: 69, - destination_cctp_domain: 420, redeemer: hex!("deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef"), sender: hex!("beefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdead"), refund_address: hex!( @@ -106,7 +102,6 @@ mod test { amount_in: parsed.amount_in(), min_amount_out: parsed.min_amount_out(), target_chain: parsed.target_chain(), - destination_cctp_domain: parsed.destination_cctp_domain(), redeemer: parsed.redeemer(), sender: parsed.sender(), refund_address: parsed.refund_address(), diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index 209c227c..0645bb9c 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -188,45 +188,41 @@ impl<'a> FastMarketOrder<'a> { u16::from_be_bytes(self.0[16..18].try_into().unwrap()) } - pub fn destination_cctp_domain(&self) -> u32 { - u32::from_be_bytes(self.0[18..22].try_into().unwrap()) - } - pub fn redeemer(&self) -> [u8; 32] { - self.0[22..54].try_into().unwrap() + self.0[18..50].try_into().unwrap() } pub fn sender(&self) -> [u8; 32] { - self.0[54..86].try_into().unwrap() + self.0[50..82].try_into().unwrap() } pub fn refund_address(&self) -> [u8; 32] { - self.0[86..118].try_into().unwrap() + self.0[82..114].try_into().unwrap() } pub fn max_fee(&self) -> u64 { - u64::from_be_bytes(self.0[118..126].try_into().unwrap()) + u64::from_be_bytes(self.0[114..122].try_into().unwrap()) } pub fn init_auction_fee(&self) -> u64 { - u64::from_be_bytes(self.0[126..134].try_into().unwrap()) + u64::from_be_bytes(self.0[122..130].try_into().unwrap()) } pub fn deadline(&self) -> u32 { - u32::from_be_bytes(self.0[134..138].try_into().unwrap()) + u32::from_be_bytes(self.0[130..134].try_into().unwrap()) } pub fn redeemer_message_len(&self) -> u32 { - u32::from_be_bytes(self.0[138..142].try_into().unwrap()) + u32::from_be_bytes(self.0[134..138].try_into().unwrap()) } pub fn redeemer_message(&'a self) -> Payload<'a> { - Payload::parse(&self.0[142..]) + Payload::parse(&self.0[138..]) } pub fn parse(span: &'a [u8]) -> Result { - if span.len() < 142 { - return Err("FastMarketOrder span too short. Need at least 142 bytes"); + if span.len() < 138 { + return Err("FastMarketOrder span too short. Need at least 138 bytes"); } let fast_market_order = Self(span); diff --git a/solana/ts/scripts/setUpTestnetTokenRouter.ts b/solana/ts/scripts/setUpTestnetTokenRouter.ts index 3e46aeba..5b2304cf 100644 --- a/solana/ts/scripts/setUpTestnetTokenRouter.ts +++ b/solana/ts/scripts/setUpTestnetTokenRouter.ts @@ -48,9 +48,9 @@ async function main() { ); } { - // https://testnet.snowtrace.io/address/0xdf5af760f3093034C7A6580FBd4CE66A8bEDd90A + // https://testnet.snowtrace.io/address/0x7353B29FDc79435dcC7ECc9Ac9F9b61d83B4E0F4 const foreignChain = "avalanche"; - const foreignEmitter = "0xdf5af760f3093034C7A6580FBd4CE66A8bEDd90A"; + const foreignEmitter = "0x7353B29FDc79435dcC7ECc9Ac9F9b61d83B4E0F4"; const cctpDomain = 1; await addCctpRouterEndpoint( diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 9ec9c6bc..cc1f4d7c 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -760,6 +760,7 @@ export class MatchingEngineProgram { payer: PublicKey; fastVaa: PublicKey; preparedOrderResponse: PublicKey; + toRouterEndpoint?: PublicKey; }) { const { payer, fastVaa, preparedOrderResponse } = accounts; @@ -769,7 +770,7 @@ export class MatchingEngineProgram { throw new Error("Message not FastMarketOrder"); } - const { targetChain, destinationCctpDomain } = fastMarketOrder; + const { targetChain } = fastMarketOrder; const { preparedBy } = await this.fetchPreparedOrderResponse({ address: preparedOrderResponse, @@ -792,7 +793,7 @@ export class MatchingEngineProgram { localToken, messageTransmitterProgram, tokenMessengerMinterProgram, - } = await this.burnAndPublishAccounts({ payer }, { targetChain, destinationCctpDomain }); + } = await this.burnAndPublishAccounts({ payer }, { targetChain }); const { feeRecipientToken } = await this.fetchCustodian(); @@ -1072,11 +1073,25 @@ export class MatchingEngineProgram { }, args: { targetChain: number; - destinationCctpDomain: number; + destinationCctpDomain?: number; } ): Promise { const { payer, mint: inputMint } = base; - const { targetChain, destinationCctpDomain } = args; + const { targetChain, destinationCctpDomain: inputDestinationCctpDomain } = args; + + const destinationCctpDomain = await (async () => { + if (inputDestinationCctpDomain === undefined) { + const { + protocol: { cctp }, + } = await this.fetchRouterEndpoint(targetChain); + if (cctp === undefined) { + throw new Error("not CCTP endpoint"); + } + return cctp.domain; + } else { + return inputDestinationCctpDomain; + } + })(); const { senderAuthority: tokenMessengerMinterSenderAuthority, diff --git a/solana/ts/src/messages/index.ts b/solana/ts/src/messages/index.ts index 586cc9ff..5fb7f452 100644 --- a/solana/ts/src/messages/index.ts +++ b/solana/ts/src/messages/index.ts @@ -18,7 +18,6 @@ export type FastMarketOrder = { // u64 minAmountOut: bigint; targetChain: number; - destinationCctpDomain: number; redeemer: Array; sender: Array; refundAddress: Array; @@ -67,8 +66,6 @@ export class LiquidityLayerMessage { offset += 8; const targetChain = buf.readUInt16BE(offset); offset += 2; - const destinationCctpDomain = buf.readUInt32BE(offset); - offset += 4; const redeemer = Array.from(buf.subarray(offset, (offset += 32))); const sender = Array.from(buf.subarray(offset, (offset += 32))); const refundAddress = Array.from(buf.subarray(offset, (offset += 32))); @@ -87,7 +84,6 @@ export class LiquidityLayerMessage { amountIn, minAmountOut, targetChain, - destinationCctpDomain, redeemer, sender, refundAddress, @@ -156,7 +152,6 @@ export class LiquidityLayerMessage { amountIn, minAmountOut, targetChain, - destinationCctpDomain, redeemer, sender, refundAddress, @@ -166,14 +161,13 @@ export class LiquidityLayerMessage { redeemerMessage, } = fastMarketOrder; - const messageBuf = Buffer.alloc(1 + 142 + redeemerMessage.length); + const messageBuf = Buffer.alloc(1 + 138 + redeemerMessage.length); let offset = 0; offset = messageBuf.writeUInt8(ID_FAST_MARKET_ORDER, offset); offset = messageBuf.writeBigUInt64BE(amountIn, offset); offset = messageBuf.writeBigUInt64BE(minAmountOut, offset); offset = messageBuf.writeUInt16BE(targetChain, offset); - offset = messageBuf.writeUInt32BE(destinationCctpDomain, offset); messageBuf.set(redeemer, offset); offset += redeemer.length; messageBuf.set(sender, offset); diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 13422aa1..c09bf86f 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -773,7 +773,6 @@ describe("Matching Engine", function () { amountIn: 50000000000n, minAmountOut: 0n, targetChain: arbChain, - destinationCctpDomain: arbDomain, redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), sender: Array.from(Buffer.alloc(32, "beefdead", "hex")), refundAddress: Array.from(Buffer.alloc(32, "beef", "hex")), @@ -1815,7 +1814,6 @@ describe("Matching Engine", function () { it.skip("Cannot Execute Fast Order (Invalid Chain)", async function () { const fastOrder = { ...baseFastOrder }; fastOrder.targetChain = ethChain; - fastOrder.destinationCctpDomain = ethDomain; const { fastVaa, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, @@ -2073,8 +2071,8 @@ describe("Matching Engine", function () { ); const { + targetChain, initAuctionFee, - destinationCctpDomain, sender: orderSender, redeemer, redeemerMessage, @@ -2142,18 +2140,19 @@ describe("Matching Engine", function () { expect(parsed.deposit?.message.fill).is.not.undefined; const { - header: { - amount: actualAmount, - destinationCctpDomain: actualDestinationCctpDomain, - mintRecipient, - }, + protocol: { cctp }, + } = await engine.fetchRouterEndpoint(targetChain); + expect(cctp).is.not.undefined; + + const { + header: { amount: actualAmount, destinationCctpDomain, mintRecipient }, message: { fill }, } = parsed.deposit!; const userAmount = BigInt(amountIn.sub(offerPrice).toString()) - initAuctionFee + userReward; expect(actualAmount).equals(userAmount); - expect(actualDestinationCctpDomain).equals(destinationCctpDomain); + expect(destinationCctpDomain).equals(cctp!.domain); const sourceChain = wormholeSdk.coalesceChainId(fromChainName); const { mintRecipient: expectedMintRecipient } = await engine.fetchRouterEndpoint( @@ -2193,7 +2192,6 @@ describe("Matching Engine", function () { amountIn, minAmountOut: 0n, targetChain: wormholeSdk.CHAIN_ID_SOLANA as number, - destinationCctpDomain, redeemer: Array.from(redeemer.publicKey.toBuffer()), sender: new Array(32).fill(0), refundAddress: new Array(32).fill(0), @@ -2428,7 +2426,6 @@ describe("Matching Engine", function () { amountIn, minAmountOut: 0n, targetChain: arbChain, - destinationCctpDomain: arbDomain, redeemer: Array.from(redeemer.publicKey.toBuffer()), sender: new Array(32).fill(0), refundAddress: new Array(32).fill(0), From 3a71febc811d4d2ff6fa6ef1fd66f5115626dbdb Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 31 Jan 2024 09:25:52 -0600 Subject: [PATCH 099/126] solana: clean up --- .../src/processor/auction/offer/improve.rs | 2 +- .../processor/auction/settle/active/mod.rs | 28 +++++++++---------- .../src/processor/auction/settle/none/mod.rs | 27 +++++++++--------- .../programs/matching-engine/src/utils/mod.rs | 10 ++++++- 4 files changed, 36 insertions(+), 31 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs index b98833d9..6cb3ac16 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs @@ -92,7 +92,7 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { authority: ctx.accounts.offer_authority.to_account_info(), }, ), - auction_info.amount_in + auction_info.security_deposit, + auction_info.total_deposit(), )?; // Update the `best_offer` token account and `amount` fields. diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index ff5734a3..341651c2 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -55,7 +55,7 @@ fn settle_active_and_prepare_fill( // This means the slow message beat the fast message. We need to refund the bidder and // (potentially) take a penalty for not fulfilling their obligation. The `penalty` CAN be zero // in this case, since the auction grace period might not have ended yet. - let (liquidator_amount, mut best_offer_amount, user_amount, final_status) = { + let (executor_amount, mut best_offer_amount, user_amount, final_status) = { let auction_info = auction.info.as_ref().unwrap(); let DepositPenalty { @@ -75,7 +75,7 @@ fn settle_active_and_prepare_fill( // * amount_in comes from the inbound transfer. ( penalty + base_fee, - auction_info.amount_in + auction_info.security_deposit - penalty - user_reward, + auction_info.total_deposit() - penalty - user_reward, auction_info.amount_in + user_reward - base_fee, AuctionStatus::Settled { base_fee, @@ -97,10 +97,10 @@ fn settle_active_and_prepare_fill( }, &[Custodian::SIGNER_SEEDS], ), - liquidator_amount, + executor_amount, )?; } else { - best_offer_amount += liquidator_amount; + best_offer_amount += executor_amount; } // Transfer to the best offer token what he deserves. @@ -117,18 +117,16 @@ fn settle_active_and_prepare_fill( best_offer_amount, )?; - let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); - as std::io::Write>::write_all(&mut redeemer_message, order.redeemer_message().into())?; - - let fill = Fill { - source_chain: prepared_order_response.source_chain, - order_sender: order.sender(), - redeemer: order.redeemer(), - redeemer_message: redeemer_message.into(), - }; - // Everyone's whole, set the auction as completed. auction.status = final_status; - Ok(SettledActive { user_amount, fill }) + Ok(SettledActive { + user_amount, + fill: Fill { + source_chain: prepared_order_response.source_chain, + order_sender: order.sender(), + redeemer: order.redeemer(), + redeemer_message: utils::take_order_message(order).into(), + }, + }) } diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs index 2aa9cee2..0ec7ca6d 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -4,7 +4,10 @@ pub use cctp::*; mod local; pub use local::*; -use crate::state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, RouterEndpoint}; +use crate::{ + state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, RouterEndpoint}, + utils, +}; use anchor_lang::prelude::*; use anchor_spl::token; use common::{ @@ -76,18 +79,6 @@ fn settle_none_and_prepare_fill( base_fee, )?; - let user_amount = order.amount_in() - base_fee; - - let mut redeemer_message = Vec::with_capacity(order.redeemer_message_len().try_into().unwrap()); - as std::io::Write>::write_all(&mut redeemer_message, order.redeemer_message().into())?; - - let fill = Fill { - source_chain: prepared_order_response.source_chain, - order_sender: order.sender(), - redeemer: order.redeemer(), - redeemer_message: redeemer_message.into(), - }; - // This is a necessary security check. This will prevent a relayer from starting an auction with // the fast transfer VAA, even though the slow relayer already delivered the slow VAA. Not // setting this could lead to trapped funds (which would require an upgrade to fix). @@ -101,5 +92,13 @@ fn settle_none_and_prepare_fill( info: None, }); - Ok(SettledNone { user_amount, fill }) + Ok(SettledNone { + user_amount: order.amount_in() - base_fee, + fill: Fill { + source_chain: prepared_order_response.source_chain, + order_sender: order.sender(), + redeemer: order.redeemer(), + redeemer_message: utils::take_order_message(order).into(), + }, + }) } diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 27286f8f..3ae4840a 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -5,7 +5,9 @@ use crate::{ state::{Auction, AuctionConfig, AuctionStatus, RouterEndpoint}, }; use anchor_lang::prelude::*; -use common::wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use common::{ + messages::raw::FastMarketOrder, wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, +}; pub fn require_valid_router_path( vaa: &VaaAccount<'_>, @@ -67,3 +69,9 @@ pub fn is_valid_active_auction( _ => err!(MatchingEngineError::AuctionNotActive), } } + +#[inline] +pub fn take_order_message(order: FastMarketOrder<'_>) -> Vec { + let msg: &[_] = order.redeemer_message().into(); + msg.to_vec() +} From 4e5b45a2e6269f115f42fc23fa28a7057adbd102 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Wed, 31 Jan 2024 11:26:30 -0600 Subject: [PATCH 100/126] solana: fix setup; npm audit fix; add dotenv --- solana/package-lock.json | 78 +++-- solana/package.json | 1 + .../ts/scripts/setUpTestnetMatchingEngine.ts | 237 ++++++++++++++ solana/ts/scripts/setUpTestnetTokenRouter.ts | 171 +--------- solana/ts/src/matchingEngine/index.ts | 4 +- solana/ts/tests/01__matchingEngine.ts | 301 +++++++++--------- 6 files changed, 439 insertions(+), 353 deletions(-) create mode 100644 solana/ts/scripts/setUpTestnetMatchingEngine.ts diff --git a/solana/package-lock.json b/solana/package-lock.json index 8a61166f..58c7950c 100644 --- a/solana/package-lock.json +++ b/solana/package-lock.json @@ -4,11 +4,13 @@ "requires": true, "packages": { "": { + "name": "solana", "dependencies": { "@certusone/wormhole-sdk": "^0.10.10", "@coral-xyz/anchor": "^0.29.0", "@solana/spl-token": "^0.3.9", "@solana/web3.js": "^1.87.6", + "dotenv": "^16.4.1", "ethers": "^5.7.2", "yargs": "^17.7.2" }, @@ -1151,14 +1153,14 @@ } }, "node_modules/@injectivelabs/exceptions": { - "version": "1.14.4", - "resolved": "https://registry.npmjs.org/@injectivelabs/exceptions/-/exceptions-1.14.4.tgz", - "integrity": "sha512-mJVzDsw+anL85NzXl0l1Ortk7MEgHdD5EQwFp/XaI1U3cupsHKUfHpAuXjggD+XQVFeWoYOFzk4CJPCBgz6u+w==", + "version": "1.14.5", + "resolved": "https://registry.npmjs.org/@injectivelabs/exceptions/-/exceptions-1.14.5.tgz", + "integrity": "sha512-WQ+hxpKz4g4+ZXNTXLFKpf9D9uosleZLqC++2+wK81IQ/lcwi5GrTLYdasOhJeu3c+LKWxHQRHJfSsvt8TQWbA==", "hasInstallScript": true, "optional": true, "dependencies": { "@injectivelabs/grpc-web": "^0.0.1", - "@injectivelabs/ts-types": "^1.14.4", + "@injectivelabs/ts-types": "^1.14.5", "http-status-codes": "^2.2.0", "link-module-alias": "^1.2.0", "shx": "^0.3.2" @@ -1362,16 +1364,16 @@ } }, "node_modules/@injectivelabs/token-metadata": { - "version": "1.14.4", - "resolved": "https://registry.npmjs.org/@injectivelabs/token-metadata/-/token-metadata-1.14.4.tgz", - "integrity": "sha512-g0jrIFpEdQ4kjUUaMcXWmXWu5owpIGE6GQPj7Gx07kkPTDNDiIfcaHUQ0nzTmcG02h0AhFx1eSpkHZFLSwyG/Q==", + "version": "1.14.5", + "resolved": "https://registry.npmjs.org/@injectivelabs/token-metadata/-/token-metadata-1.14.5.tgz", + "integrity": "sha512-GiIiNDixfvbfEjzZG7ixtGYmJllFIcA2Xl1LnsK5yawT8Q+/SoSIJig4tE+0CC/AaGHS1GxDKySrIdMse7PZ0w==", "hasInstallScript": true, "optional": true, "dependencies": { - "@injectivelabs/exceptions": "^1.14.4", - "@injectivelabs/networks": "^1.14.4", - "@injectivelabs/ts-types": "^1.14.4", - "@injectivelabs/utils": "^1.14.4", + "@injectivelabs/exceptions": "^1.14.5", + "@injectivelabs/networks": "^1.14.5", + "@injectivelabs/ts-types": "^1.14.5", + "@injectivelabs/utils": "^1.14.5", "@types/lodash.values": "^4.3.6", "copyfiles": "^2.4.1", "jsonschema": "^1.4.0", @@ -1382,28 +1384,28 @@ } }, "node_modules/@injectivelabs/token-metadata/node_modules/@injectivelabs/networks": { - "version": "1.14.4", - "resolved": "https://registry.npmjs.org/@injectivelabs/networks/-/networks-1.14.4.tgz", - "integrity": "sha512-2DbbaiI/v5PY+X90zhFMstVcVokpxEytMWZZvRKls6YqSBERhE3lxUF696lk0TEecfZ37CikuxZ7E9hx+eXg2A==", + "version": "1.14.5", + "resolved": "https://registry.npmjs.org/@injectivelabs/networks/-/networks-1.14.5.tgz", + "integrity": "sha512-9GINd/pPBX6Jyc26pmlLC54s7nLlXsBLZ/1fo8a0nvHkrrODRDE4IldP6KsA9OLVomMPk5TyBUgYLGgM3ST9GA==", "hasInstallScript": true, "optional": true, "dependencies": { - "@injectivelabs/exceptions": "^1.14.4", - "@injectivelabs/ts-types": "^1.14.4", - "@injectivelabs/utils": "^1.14.4", + "@injectivelabs/exceptions": "^1.14.5", + "@injectivelabs/ts-types": "^1.14.5", + "@injectivelabs/utils": "^1.14.5", "link-module-alias": "^1.2.0", "shx": "^0.3.2" } }, "node_modules/@injectivelabs/token-metadata/node_modules/@injectivelabs/utils": { - "version": "1.14.4", - "resolved": "https://registry.npmjs.org/@injectivelabs/utils/-/utils-1.14.4.tgz", - "integrity": "sha512-eyx6XpgqdmEhEhdwNT4zEDYx+wXOhW01foCGC6e0Dmmrcxv5Bjd+R2BuLopKJ9h22OYNJm6dAX3ZtcoFwpFYbQ==", + "version": "1.14.5", + "resolved": "https://registry.npmjs.org/@injectivelabs/utils/-/utils-1.14.5.tgz", + "integrity": "sha512-L2ul/7rgop8RLJBhlXjt6Q/A6fXeRZ3hhCZFXGXmA63vz9RSqOFHILiRp6hAFsuZbiITjmVx0eubFPaQU0MymA==", "hasInstallScript": true, "optional": true, "dependencies": { - "@injectivelabs/exceptions": "^1.14.4", - "@injectivelabs/ts-types": "^1.14.4", + "@injectivelabs/exceptions": "^1.14.5", + "@injectivelabs/ts-types": "^1.14.5", "axios": "^0.21.1", "bignumber.js": "^9.0.1", "http-status-codes": "^2.2.0", @@ -1423,9 +1425,9 @@ } }, "node_modules/@injectivelabs/ts-types": { - "version": "1.14.4", - "resolved": "https://registry.npmjs.org/@injectivelabs/ts-types/-/ts-types-1.14.4.tgz", - "integrity": "sha512-c8g81bdrOQoi6S1CbeERRifkwNhjyLWB8lmF7liwRnPjyDciVHfHjikZjVWFLS9tJegNm44N9PWsM4RN9g0rXQ==", + "version": "1.14.5", + "resolved": "https://registry.npmjs.org/@injectivelabs/ts-types/-/ts-types-1.14.5.tgz", + "integrity": "sha512-dwmEJE90vMr1zkQhz5lX2280sBMe2GvAj98vOHoL2RLTo0OQkJZrirUHwsTkexJf7sFZIT2PlmLCfix9Ulcp5A==", "hasInstallScript": true, "optional": true, "dependencies": { @@ -2829,6 +2831,17 @@ "tslib": "^2.0.3" } }, + "node_modules/dotenv": { + "version": "16.4.1", + "resolved": "https://registry.npmjs.org/dotenv/-/dotenv-16.4.1.tgz", + "integrity": "sha512-CjA3y+Dr3FyFDOAMnxZEGtnW9KBR2M0JvvUtXNW+dYJL5ROWxP9DUHCwgFqpMk0OXCc0ljhaNTr2w/kutYIcHQ==", + "engines": { + "node": ">=12" + }, + "funding": { + "url": "https://github.com/motdotla/dotenv?sponsor=1" + } + }, "node_modules/drbg.js": { "version": "1.0.1", "resolved": "https://registry.npmjs.org/drbg.js/-/drbg.js-1.0.1.tgz", @@ -3195,14 +3208,15 @@ } }, "node_modules/follow-redirects": { - "version": "1.15.2", + "version": "1.15.5", + "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.5.tgz", + "integrity": "sha512-vSFWUON1B+yAw1VN4xMfxgn5fTUiaOzAJCKBwIIgT/+7CuGy9+r+5gITvP62j3RmaD5Ph65UaERdOSRGUzZtgw==", "funding": [ { "type": "individual", "url": "https://github.com/sponsors/RubenVerborgh" } ], - "license": "MIT", "engines": { "node": ">=4.0" }, @@ -3245,9 +3259,10 @@ } }, "node_modules/get-func-name": { - "version": "2.0.0", + "version": "2.0.2", + "resolved": "https://registry.npmjs.org/get-func-name/-/get-func-name-2.0.2.tgz", + "integrity": "sha512-8vXOvuE167CtIc3OyItco7N/dpRtBbYOsPsXCz7X/PMnlGjYjSGuZJgM1Y7mmew7BKf9BqvLX2tnOVy1BBUsxQ==", "dev": true, - "license": "MIT", "engines": { "node": "*" } @@ -4431,9 +4446,10 @@ } }, "node_modules/protobufjs": { - "version": "6.11.3", + "version": "6.11.4", + "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-6.11.4.tgz", + "integrity": "sha512-5kQWPaJHi1WoCpjTGszzQ32PG2F4+wRY6BmAT4Vfw56Q2FZ4YZzK20xUYQH4YkfehY1e6QSICrJquM6xXZNcrw==", "hasInstallScript": true, - "license": "BSD-3-Clause", "dependencies": { "@protobufjs/aspromise": "^1.1.2", "@protobufjs/base64": "^1.1.2", diff --git a/solana/package.json b/solana/package.json index 2ce3dd67..b26d4b98 100644 --- a/solana/package.json +++ b/solana/package.json @@ -12,6 +12,7 @@ "@coral-xyz/anchor": "^0.29.0", "@solana/spl-token": "^0.3.9", "@solana/web3.js": "^1.87.6", + "dotenv": "^16.4.1", "ethers": "^5.7.2", "yargs": "^17.7.2" }, diff --git a/solana/ts/scripts/setUpTestnetMatchingEngine.ts b/solana/ts/scripts/setUpTestnetMatchingEngine.ts new file mode 100644 index 00000000..8de5f16c --- /dev/null +++ b/solana/ts/scripts/setUpTestnetMatchingEngine.ts @@ -0,0 +1,237 @@ +import { ChainName, coalesceChainId, tryNativeToUint8Array } from "@certusone/wormhole-sdk"; +import * as splToken from "@solana/spl-token"; +import { + Connection, + Keypair, + PublicKey, + Transaction, + sendAndConfirmTransaction, +} from "@solana/web3.js"; +import "dotenv/config"; +import { AuctionParameters, MatchingEngineProgram } from "../src/matchingEngine"; + +const PROGRAM_ID = "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS"; +const USDC_MINT = new PublicKey("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + +const AUCTION_PARAMS: AuctionParameters = { + userPenaltyRewardBps: 400000, // 40% + initialPenaltyBps: 250000, // 25% + duration: 5, // slots + gracePeriod: 10, // slots + penaltySlots: 20, // slots +}; + +// Here we go. +main(); + +// impl + +async function main() { + const connection = new Connection("https://api.devnet.solana.com", "confirmed"); + const matchingEngine = new MatchingEngineProgram(connection, PROGRAM_ID, USDC_MINT); + + if (process.env.SOLANA_PRIVATE_KEY === undefined) { + throw new Error("SOLANA_PRIVATE_KEY is undefined"); + } + const payer = Keypair.fromSecretKey(Buffer.from(process.env.SOLANA_PRIVATE_KEY, "hex")); + + // Set up program. + await intialize(matchingEngine, payer); + + // Add endpoints. + // + // CCTP Domains listed here: https://developers.circle.com/stablecoins/docs/supported-domains. + { + // https://sepolia.etherscan.io/address/0x603541d1Cf7178C407aA7369b67CB7e0274952e2 + const foreignChain = "sepolia"; + const foreignEmitter = "0x603541d1Cf7178C407aA7369b67CB7e0274952e2"; + const cctpDomain = 0; + + await addCctpRouterEndpoint( + matchingEngine, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // https://testnet.snowtrace.io/address/0x7353B29FDc79435dcC7ECc9Ac9F9b61d83B4E0F4 + const foreignChain = "avalanche"; + const foreignEmitter = "0x7353B29FDc79435dcC7ECc9Ac9F9b61d83B4E0F4"; + const cctpDomain = 1; + + await addCctpRouterEndpoint( + matchingEngine, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // https://sepolia-optimism.etherscan.io/address/0xc1Cf3501ef0b26c8A47759F738832563C7cB014A + const foreignChain = "optimism_sepolia"; + const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; + const cctpDomain = 2; + + await addCctpRouterEndpoint( + matchingEngine, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // https://sepolia.arbiscan.io/address/0xc1cf3501ef0b26c8a47759f738832563c7cb014a + const foreignChain = "arbitrum_sepolia"; + const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; + const cctpDomain = 3; + + await addCctpRouterEndpoint( + matchingEngine, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } + { + // TODO: This is a placeholder. + const foreignChain = "base_sepolia"; + const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; + const cctpDomain = 6; + + // await addCctpRouterEndpoint( + // matchingEngine, + // payer, + // foreignChain, + // cctpDomain, + // foreignEmitter, + // null + // ); + } + { + // https://mumbai.polygonscan.com/address/0x3Ce8a3aC230Eb4bCE3688f2A1ab21d986a0A0B06 + const foreignChain = "polygon"; + const foreignEmitter = "0x3Ce8a3aC230Eb4bCE3688f2A1ab21d986a0A0B06"; + const cctpDomain = 7; + + await addCctpRouterEndpoint( + matchingEngine, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); + } +} + +async function intialize(matchingEngine: MatchingEngineProgram, payer: Keypair) { + const connection = matchingEngine.program.provider.connection; + + const custodian = matchingEngine.custodianAddress(); + console.log("custodian", custodian.toString()); + + const exists = await connection.getAccountInfo(custodian).then((acct) => acct != null); + if (exists) { + console.log("already initialized"); + return; + } + + const ix = await matchingEngine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: payer.publicKey, + feeRecipient: payer.publicKey, + }, + AUCTION_PARAMS + ); + + await splToken.getOrCreateAssociatedTokenAccount(connection, payer, USDC_MINT, payer.publicKey); + + await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]) + .catch((err) => { + console.log(err.logs); + throw err; + }) + .then((txSig) => { + console.log("intialize", txSig); + }); +} + +async function addCctpRouterEndpoint( + matchingEngine: MatchingEngineProgram, + payer: Keypair, + foreignChain: ChainName, + cctpDomain: number, + foreignEmitter: string, + foreignMintRecipient: string | null +) { + await matchingEngine.fetchCustodian().catch((_) => { + throw new Error("no custodian found"); + }); + + const connection = matchingEngine.program.provider.connection; + + const chain = coalesceChainId(foreignChain); + const endpoint = matchingEngine.routerEndpointAddress(chain); + const exists = await connection.getAccountInfo(endpoint).then((acct) => acct != null); + + const endpointAddress = Array.from(tryNativeToUint8Array(foreignEmitter, foreignChain)); + const endpointMintRecipient = + foreignMintRecipient === null + ? null + : Array.from(tryNativeToUint8Array(foreignMintRecipient, foreignChain)); + + if (exists) { + const { address, mintRecipient } = await matchingEngine.fetchRouterEndpoint(chain); + if ( + Buffer.from(address).equals(Buffer.from(endpointAddress)) && + Buffer.from(mintRecipient).equals(Buffer.from(endpointMintRecipient ?? endpointAddress)) + ) { + console.log( + "already exists", + foreignChain, + "addr", + foreignEmitter, + "domain", + cctpDomain, + "mintRecipient", + foreignMintRecipient + ); + return; + } + } + + const ix = await matchingEngine.addCctpRouterEndpointIx( + { + ownerOrAssistant: payer.publicKey, + }, + { + chain, + address: endpointAddress, + mintRecipient: endpointMintRecipient, + cctpDomain, + } + ); + const txSig = await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]); + console.log( + "register emitter and domain", + txSig, + "chain", + foreignChain, + "addr", + foreignEmitter, + "domain", + cctpDomain, + "mintRecipient", + foreignMintRecipient + ); +} diff --git a/solana/ts/scripts/setUpTestnetTokenRouter.ts b/solana/ts/scripts/setUpTestnetTokenRouter.ts index 5b2304cf..baeed737 100644 --- a/solana/ts/scripts/setUpTestnetTokenRouter.ts +++ b/solana/ts/scripts/setUpTestnetTokenRouter.ts @@ -1,4 +1,3 @@ -import { ChainName, coalesceChainId, tryNativeToUint8Array } from "@certusone/wormhole-sdk"; import { Connection, Keypair, @@ -28,100 +27,6 @@ async function main() { // Set up program. await intialize(tokenRouter, payer); - - // Add endpoints. - // - // CCTP Domains listed here: https://developers.circle.com/stablecoins/docs/supported-domains. - { - // https://sepolia.etherscan.io/address/0x603541d1Cf7178C407aA7369b67CB7e0274952e2 - const foreignChain = "sepolia"; - const foreignEmitter = "0x603541d1Cf7178C407aA7369b67CB7e0274952e2"; - const cctpDomain = 0; - - await addCctpRouterEndpoint( - tokenRouter, - payer, - foreignChain, - cctpDomain, - foreignEmitter, - null - ); - } - { - // https://testnet.snowtrace.io/address/0x7353B29FDc79435dcC7ECc9Ac9F9b61d83B4E0F4 - const foreignChain = "avalanche"; - const foreignEmitter = "0x7353B29FDc79435dcC7ECc9Ac9F9b61d83B4E0F4"; - const cctpDomain = 1; - - await addCctpRouterEndpoint( - tokenRouter, - payer, - foreignChain, - cctpDomain, - foreignEmitter, - null - ); - } - { - // https://sepolia-optimism.etherscan.io/address/0xc1Cf3501ef0b26c8A47759F738832563C7cB014A - const foreignChain = "optimism_sepolia"; - const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; - const cctpDomain = 2; - - await addCctpRouterEndpoint( - tokenRouter, - payer, - foreignChain, - cctpDomain, - foreignEmitter, - null - ); - } - { - // https://sepolia.arbiscan.io/address/0xc1cf3501ef0b26c8a47759f738832563c7cb014a - const foreignChain = "arbitrum_sepolia"; - const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; - const cctpDomain = 3; - - await addCctpRouterEndpoint( - tokenRouter, - payer, - foreignChain, - cctpDomain, - foreignEmitter, - null - ); - } - { - // TODO: This is a placeholder. - const foreignChain = "base_sepolia"; - const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; - const cctpDomain = 6; - - // await addCctpRouterEndpoint( - // tokenRouter, - // payer, - // foreignChain, - // cctpDomain, - // foreignEmitter, - // null - // ); - } - { - // https://mumbai.polygonscan.com/address/0x3Ce8a3aC230Eb4bCE3688f2A1ab21d986a0A0B06 - const foreignChain = "polygon"; - const foreignEmitter = "0x3Ce8a3aC230Eb4bCE3688f2A1ab21d986a0A0B06"; - const cctpDomain = 7; - - await addCctpRouterEndpoint( - tokenRouter, - payer, - foreignChain, - cctpDomain, - foreignEmitter, - null - ); - } } async function intialize(tokenRouter: TokenRouterProgram, payer: Keypair) { @@ -141,72 +46,12 @@ async function intialize(tokenRouter: TokenRouterProgram, payer: Keypair) { ownerAssistant: payer.publicKey, }); - const txSig = await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]); - console.log("intialize", txSig); -} - -async function addCctpRouterEndpoint( - tokenRouter: TokenRouterProgram, - payer: Keypair, - foreignChain: ChainName, - cctpDomain: number, - foreignEmitter: string, - foreignMintRecipient: string | null -) { - const connection = tokenRouter.program.provider.connection; - - const chain = coalesceChainId(foreignChain); - const endpoint = tokenRouter.routerEndpointAddress(chain); - const exists = await connection.getAccountInfo(endpoint).then((acct) => acct != null); - - const endpointAddress = Array.from(tryNativeToUint8Array(foreignEmitter, foreignChain)); - const endpointMintRecipient = - foreignMintRecipient === null - ? null - : Array.from(tryNativeToUint8Array(foreignMintRecipient, foreignChain)); - - if (exists) { - const { address, mintRecipient } = await tokenRouter.fetchRouterEndpoint(chain); - if ( - Buffer.from(address).equals(Buffer.from(endpointAddress)) && - Buffer.from(mintRecipient).equals(Buffer.from(endpointMintRecipient ?? endpointAddress)) - ) { - console.log( - "already exists", - foreignChain, - "addr", - foreignEmitter, - "domain", - cctpDomain, - "mintRecipient", - foreignMintRecipient - ); - return; - } - } - - const ix = await tokenRouter.addCctpRouterEndpointIx( - { - ownerOrAssistant: payer.publicKey, - }, - { - chain, - address: endpointAddress, - mintRecipient: endpointMintRecipient, - cctpDomain, - } - ); - const txSig = await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]); - console.log( - "register emitter and domain", - txSig, - "chain", - foreignChain, - "addr", - foreignEmitter, - "domain", - cctpDomain, - "mintRecipient", - foreignMintRecipient - ); + await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]) + .catch((err) => { + console.log(err.logs); + throw err; + }) + .then((txSig) => { + console.log("intialize", txSig); + }); } diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index cc1f4d7c..4092e5bf 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -198,13 +198,13 @@ export class MatchingEngineProgram { } async initializeIx( - auctionParams: AuctionParameters, accounts: { owner: PublicKey; ownerAssistant: PublicKey; feeRecipient: PublicKey; mint?: PublicKey; - } + }, + auctionParams: AuctionParameters ): Promise { const { owner, ownerAssistant, feeRecipient, mint: inputMint } = accounts; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index c09bf86f..5d3a82b2 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -92,27 +92,20 @@ describe("Matching Engine", function () { penaltySlots: 10, }; - const createInitializeIx = (opts?: { - ownerAssistant?: PublicKey; - feeRecipient?: PublicKey; - mint?: PublicKey; - }) => - engine.initializeIx(auctionParams, { - owner: payer.publicKey, - ownerAssistant: opts?.ownerAssistant ?? ownerAssistant.publicKey, - feeRecipient: opts?.feeRecipient ?? feeRecipient, - mint: opts?.mint ?? USDC_MINT_ADDRESS, - }); + const localVariables = new Map(); it("Cannot Initialize without USDC Mint", async function () { const mint = await splToken.createMint(connection, payer, payer.publicKey, null, 6); - const ix = await engine.initializeIx(auctionParams, { - owner: payer.publicKey, - ownerAssistant: ownerAssistant.publicKey, - feeRecipient, - mint, - }); + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint, + }, + auctionParams + ); const unknownAta = splToken.getAssociatedTokenAddressSync( mint, engine.custodianAddress(), @@ -127,109 +120,105 @@ describe("Matching Engine", function () { }); it("Cannot Initialize with Default Owner Assistant", async function () { - await expectIxErr( - connection, - [ - await createInitializeIx({ - ownerAssistant: PublicKey.default, - }), - ], - [payer], - "Error Code: AssistantZeroPubkey" + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: PublicKey.default, + feeRecipient, + }, + auctionParams ); + await expectIxErr(connection, [ix], [payer], "Error Code: AssistantZeroPubkey"); }); it("Cannot Initialize with Default Fee Recipient", async function () { - await expectIxErr( - connection, - [ - await createInitializeIx({ - feeRecipient: PublicKey.default, - }), - ], - [payer], - "Error Code: FeeRecipientZeroPubkey" + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient: PublicKey.default, + }, + auctionParams ); + await expectIxErr(connection, [ix], [payer], "Error Code: FeeRecipientZeroPubkey"); }); it("Cannot Initialize with Invalid Auction Duration", async function () { - const newAuctionParams: AuctionParameters = { ...auctionParams }; - newAuctionParams.duration = 0; + const { duration: _, ...remaining } = auctionParams; - await expectIxErr( - connection, - [ - await engine.initializeIx(newAuctionParams, { - owner: payer.publicKey, - ownerAssistant: ownerAssistant.publicKey, - feeRecipient, - mint: USDC_MINT_ADDRESS, - }), - ], - [payer], - "Error Code: InvalidAuctionDuration" + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint: USDC_MINT_ADDRESS, + }, + { duration: 0, ...remaining } ); + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidAuctionDuration"); }); it("Cannot Initialize with Invalid Auction Grace Period", async function () { - const newAuctionParams: AuctionParameters = { ...auctionParams }; - newAuctionParams.gracePeriod = 0; + const { gracePeriod: _, ...remaining } = auctionParams; + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint: USDC_MINT_ADDRESS, + }, + { gracePeriod: 0, ...remaining } + ); await expectIxErr( connection, - [ - await engine.initializeIx(newAuctionParams, { - owner: payer.publicKey, - ownerAssistant: ownerAssistant.publicKey, - feeRecipient, - mint: USDC_MINT_ADDRESS, - }), - ], + [ix], [payer], "Error Code: InvalidAuctionGracePeriod" ); }); it("Cannot Initialize with Invalid User Penalty", async function () { - const newAuctionParams: AuctionParameters = { ...auctionParams }; - newAuctionParams.userPenaltyRewardBps = 4294967295; + const { userPenaltyRewardBps: _, ...remaining } = auctionParams; - await expectIxErr( - connection, - [ - await engine.initializeIx(newAuctionParams, { - owner: payer.publicKey, - ownerAssistant: ownerAssistant.publicKey, - feeRecipient, - mint: USDC_MINT_ADDRESS, - }), - ], - [payer], - "Error Code: UserPenaltyTooLarge" + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint: USDC_MINT_ADDRESS, + }, + { userPenaltyRewardBps: 4294967295, ...remaining } ); + await expectIxErr(connection, [ix], [payer], "Error Code: UserPenaltyTooLarge"); }); it("Cannot Initialize with Invalid Initial Penalty", async function () { - const newAuctionParams: AuctionParameters = { ...auctionParams }; - newAuctionParams.initialPenaltyBps = 4294967295; + const { initialPenaltyBps: _, ...remaining } = auctionParams; - await expectIxErr( - connection, - [ - await engine.initializeIx(newAuctionParams, { - owner: payer.publicKey, - ownerAssistant: ownerAssistant.publicKey, - feeRecipient, - mint: USDC_MINT_ADDRESS, - }), - ], - [payer], - "Error Code: InitialPenaltyTooLarge" + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint: USDC_MINT_ADDRESS, + }, + { initialPenaltyBps: 4294967295, ...remaining } ); + await expectIxErr(connection, [ix], [payer], "Error Code: InitialPenaltyTooLarge"); }); it("Finally Initialize Program", async function () { - await expectIxOk(connection, [await createInitializeIx()], [payer]); + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint: USDC_MINT_ADDRESS, + }, + auctionParams + ); + await expectIxOk(connection, [ix], [payer]); const expectedAuctionConfigId = 0; const custodianData = await engine.fetchCustodian(); @@ -248,14 +237,21 @@ describe("Matching Engine", function () { expect(auctionConfigData).to.eql( new AuctionConfig(expectedAuctionConfigId, auctionParams) ); + + localVariables.set("ix", ix); }); it("Cannot Call Instruction Again: initialize", async function () { + const ix = localVariables.get("ix") as TransactionInstruction; + expect(localVariables.delete("ix")).is.true; + await expectIxErr( connection, - [await createInitializeIx({})], + [ix], [payer], - "already in use" + `Allocate: account Address { address: ${engine + .custodianAddress() + .toString()}, base: None } already in use` ); }); @@ -296,6 +292,21 @@ describe("Matching Engine", function () { toPubkey: ownerAssistant.publicKey, lamports: 1000000000, }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: offerAuthorityOne.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: offerAuthorityTwo.publicKey, + lamports: 1000000000, + }), + SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: liquidator.publicKey, + lamports: 1000000000, + }), ], [payer] ); @@ -782,73 +793,6 @@ describe("Matching Engine", function () { redeemerMessage: Buffer.from("All your base are belong to us."), }; - before("Register To Router Endpoints", async function () { - const ix = await engine.addCctpRouterEndpointIx( - { - ownerOrAssistant: owner.publicKey, - }, - { - chain: arbChain, - cctpDomain: arbDomain, - address: arbRouter, - mintRecipient: null, - } - ); - await expectIxOk(connection, [ix], [owner]); - }); - - before("Transfer Lamports to Offer Authorities", async function () { - await expectIxOk( - connection, - [ - SystemProgram.transfer({ - fromPubkey: payer.publicKey, - toPubkey: offerAuthorityOne.publicKey, - lamports: 1000000000, - }), - SystemProgram.transfer({ - fromPubkey: payer.publicKey, - toPubkey: offerAuthorityTwo.publicKey, - lamports: 1000000000, - }), - SystemProgram.transfer({ - fromPubkey: payer.publicKey, - toPubkey: liquidator.publicKey, - lamports: 1000000000, - }), - ], - [payer] - ); - }); - - before("Create ATAs For Offer Authorities", async function () { - for (const wallet of [offerAuthorityOne, offerAuthorityTwo, liquidator]) { - const destination = await splToken.createAccount( - connection, - wallet, - USDC_MINT_ADDRESS, - wallet.publicKey - ); - - // Mint USDC. - const mintAmount = 10_000_000n * 1_000_000n; - - await expect( - splToken.mintTo( - connection, - payer, - USDC_MINT_ADDRESS, - destination, - payer, - mintAmount - ) - ).to.be.fulfilled; - - const { amount } = await splToken.getAccount(connection, destination); - expect(amount).equals(mintAmount); - } - }); - describe("Place Initial Offer", function () { for (const offerPrice of [0n, baseFastOrder.maxFee / 2n, baseFastOrder.maxFee]) { it(`Place Initial Offer (Price == ${offerPrice})`, async function () { @@ -1224,6 +1168,49 @@ describe("Matching Engine", function () { ) ); } + + before("Register To Router Endpoints", async function () { + const ix = await engine.addCctpRouterEndpointIx( + { + ownerOrAssistant: owner.publicKey, + }, + { + chain: arbChain, + cctpDomain: arbDomain, + address: arbRouter, + mintRecipient: null, + } + ); + await expectIxOk(connection, [ix], [owner]); + }); + + before("Create ATAs For Offer Authorities", async function () { + for (const wallet of [offerAuthorityOne, offerAuthorityTwo, liquidator]) { + const destination = await splToken.createAccount( + connection, + wallet, + USDC_MINT_ADDRESS, + wallet.publicKey + ); + + // Mint USDC. + const mintAmount = 10_000_000n * 1_000_000n; + + await expect( + splToken.mintTo( + connection, + payer, + USDC_MINT_ADDRESS, + destination, + payer, + mintAmount + ) + ).to.be.fulfilled; + + const { amount } = await splToken.getAccount(connection, destination); + expect(amount).equals(mintAmount); + } + }); }); describe("Improve Offer", function () { From f219bf8e82c8b83a62396ef8d23dc70cb9a1b113 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 1 Feb 2024 10:12:22 -0600 Subject: [PATCH 101/126] evm: remove matching engine chain check --- evm/src/TokenRouter/assets/PlaceMarketOrder.sol | 6 ------ 1 file changed, 6 deletions(-) diff --git a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol index b12e6de9..4d666c5c 100644 --- a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol +++ b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol @@ -148,12 +148,6 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { uint64 maxFee, uint32 deadline ) private returns (uint64 sequence, uint64 fastSequence, uint256 protocolSequence) { - // The Matching Engine chain is a fast finality chain already, - // so we don't need to send a fast transfer message. - if (_chainId == _matchingEngineChain) { - revert ErrFastTransferNotSupported(); - } - // Verify the `amountIn` and specified auction price. FastTransferParameters memory fastParams = getFastTransferParametersState(); From 93d957538aee150725755a6abadab4db4581f011 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 30 Jan 2024 16:56:20 -0600 Subject: [PATCH 102/126] solana: implement SettleAuctionActiveCctp instruction builder and tests --- .../processor/auction/settle/active/cctp.rs | 1 + solana/ts/src/matchingEngine/index.ts | 286 +++++++++++++----- solana/ts/src/tokenRouter/index.ts | 11 + solana/ts/tests/01__matchingEngine.ts | 170 ++++++++++- 4 files changed, 378 insertions(+), 90 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index bc05f16d..9295eb4f 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -126,6 +126,7 @@ pub struct SettleAuctionActiveCctp<'info> { message_transmitter_authority: UncheckedAccount<'info>, /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + #[account(mut)] message_transmitter_config: UncheckedAccount<'info>, /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 4092e5bf..66fcc40e 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -3,7 +3,14 @@ export * from "./state"; import * as wormholeSdk from "@certusone/wormhole-sdk"; import { BN, Program } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; -import { Connection, PublicKey, TransactionInstruction } from "@solana/web3.js"; +import { + Connection, + PublicKey, + SYSVAR_CLOCK_PUBKEY, + SYSVAR_RENT_PUBKEY, + SystemProgram, + TransactionInstruction, +} from "@solana/web3.js"; import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; import { USDC_MINT_ADDRESS } from "../../tests/helpers"; import { MessageTransmitterProgram, TokenMessengerMinterProgram } from "../cctp"; @@ -40,16 +47,39 @@ export type AddCctpRouterEndpointArgs = { mintRecipient: Array | null; }; -export type PublishMessageAccounts = { - custodian: PublicKey; - payerSequence: PublicKey; - coreMessage: PublicKey; +export type WormholeCoreBridgeAccounts = { coreBridgeConfig: PublicKey; coreEmitterSequence: PublicKey; coreFeeCollector: PublicKey; coreBridgeProgram: PublicKey; }; +export type PublishMessageAccounts = WormholeCoreBridgeAccounts & { + custodian: PublicKey; + payerSequence: PublicKey; + coreMessage: PublicKey; +}; + +export type MatchingEngineCommonAccounts = WormholeCoreBridgeAccounts & { + matchingEngineProgram: PublicKey; + systemProgram: PublicKey; + rent: PublicKey; + clock: PublicKey; + custodian: PublicKey; + custodyToken: PublicKey; + tokenMessenger: PublicKey; + tokenMinter: PublicKey; + tokenMessengerMinterSenderAuthority: PublicKey; + tokenMessengerMinterProgram: PublicKey; + messageTransmitterAuthority: PublicKey; + messageTransmitterConfig: PublicKey; + messageTransmitterProgram: PublicKey; + tokenProgram: PublicKey; + mint: PublicKey; + localToken: PublicKey; + tokenMessengerMinterCustodyToken: PublicKey; +}; + export type BurnAndPublishAccounts = { custodian: PublicKey; payerSequence: PublicKey; @@ -197,6 +227,42 @@ export class MatchingEngineProgram { return this.program.account.preparedOrderResponse.fetch(addr); } + async commonAccounts(): Promise { + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + await this.publishMessageAccounts(custodian); + + const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); + const messageTransmitterProgram = this.messageTransmitterProgram(); + + const custodyToken = this.custodyTokenAccountAddress(); + const mint = this.mint; + + return { + matchingEngineProgram: this.ID, + systemProgram: SystemProgram.programId, + rent: SYSVAR_RENT_PUBKEY, + clock: SYSVAR_CLOCK_PUBKEY, + custodian, + custodyToken, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), + tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), + tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), + tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, + messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), + messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), + messageTransmitterProgram: messageTransmitterProgram.ID, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + mint, + localToken: tokenMessengerMinterProgram.localTokenAddress(mint), + tokenMessengerMinterCustodyToken: tokenMessengerMinterProgram.custodyTokenAddress(mint), + }; + } + async initializeIx( accounts: { owner: PublicKey; @@ -669,83 +735,139 @@ export class MatchingEngineProgram { .instruction(); } - // async settleAuctionActiveCctpIx( - // accounts: { - // payer: PublicKey; - // fastVaa: PublicKey; - // liquidatorToken: PublicKey; - // preparedOrderResponse?: PublicKey; - // auction?: PublicKey; - // preparedBy?: PublicKey; - // }, - // args: { targetChain: wormholeSdk.ChainId; remoteDomain?: number } - // ) { - // const { - // payer, - // fastVaa, - // liquidatorToken, - // preparedOrderResponse: inputPreparedAuctionSettlement, - // auction: inputAuction, - // preparedBy: inputPreparedBy, - // } = accounts; - - // const { mint } = await splToken.getAccount( - // this.program.provider.connection, - // liquidatorToken - // ); - - // const { targetChain, remoteDomain: inputRemoteDomain } = args; - // const destinationCctpDomain = await (async () => { - // if (inputRemoteDomain !== undefined) { - // return inputRemoteDomain; - // } else { - // const message = await VaaAccount.fetch( - // this.program.provider.connection, - // fastVaa - // ).then((vaa) => LiquidityLayerMessage.decode(vaa.payload())); - // if (message.fastMarketOrder === undefined) { - // throw new Error("Message not FastMarketOrder"); - // } - // return message.fastMarketOrder.destinationCctpDomain; - // } - // })(); - - // const { - // custodian, - // payerSequence, - // routerEndpoint: toRouterEndpoint, - // coreMessage, - // coreBridgeConfig, - // coreEmitterSequence, - // coreFeeCollector, - // coreBridgeProgram, - // tokenMessengerMinterSenderAuthority, - // messageTransmitterConfig, - // tokenMessenger, - // remoteTokenMessenger, - // tokenMinter, - // localToken, - // messageTransmitterProgram, - // tokenMessengerMinterProgram, - // } = await this.burnAndPublishAccounts( - // { payer, mint }, - // { targetChain, destinationCctpDomain } - // ); - - // return this.program.methods - // .settleAuctionActiveCctp() - // .accounts({ - // payer, - // payerSequence, - // custodian, - // fastVaa, - // preparedBy, - // preparedOrderResponse, - // auction, - // liquidatorToken, - // }) - // .instruction(); - // } + async settleAuctionActiveCctpIx( + accounts: { + payer: PublicKey; + executorToken: PublicKey; + preparedOrderResponse?: PublicKey; + auction?: PublicKey; + preparedBy?: PublicKey; + fastVaa: PublicKey; + fastVaaAccount: VaaAccount; + auctionConfig?: PublicKey; + bestOfferToken?: PublicKey; + encodedCctpMessage: Buffer; + }, + args: { targetChain: wormholeSdk.ChainId; remoteDomain?: number } + ) { + const { + payer, + auction: inputAuction, + executorToken, + preparedBy, + preparedOrderResponse, + fastVaa, + fastVaaAccount, + auctionConfig: inputAuctionConfig, + bestOfferToken: inputBestOfferToken, + encodedCctpMessage, + } = accounts; + const auctionAddress = inputAuction ?? this.auctionAddress(fastVaaAccount.digest()); + + const mint = this.mint; + + const { auctionConfig, bestOfferToken } = await (async () => { + if (inputAuctionConfig === undefined || inputBestOfferToken === undefined) { + const { info } = await this.fetchAuction({ address: auctionAddress }); + if (info === null) { + throw new Error("no auction info found"); + } + const { configId, bestOfferToken } = info; + return { + auctionConfig: inputAuctionConfig ?? this.auctionConfigAddress(configId), + bestOfferToken: inputBestOfferToken ?? bestOfferToken, + }; + } else { + return { + auctionConfig: inputAuctionConfig, + bestOfferToken: inputBestOfferToken, + }; + } + })(); + + const targetChain = await (async () => { + const message = LiquidityLayerMessage.decode(fastVaaAccount.payload()); + if (message.fastMarketOrder == undefined) { + throw new Error("Message not FastMarketOrder"); + } + + const targetChain = message.fastMarketOrder.targetChain; + + return targetChain; + })(); + + const { protocol: { cctp } } = await this.fetchRouterEndpoint(targetChain); + if (cctp === undefined ) { + throw new Error("CCTP domain is not undefined") + } + const destinationCctpDomain = cctp.domain; + + const { + authority: messageTransmitterAuthority, + usedNonces, + tokenPair, + custodyToken: tokenMessengerMinterCustodyToken, + tokenProgram, + } = this.messageTransmitterProgram().receiveMessageAccounts(mint, encodedCctpMessage); + + const routerEndpoint = this.routerEndpointAddress(targetChain); + const { + custodian, + payerSequence, + tokenMessengerMinterSenderAuthority, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + messageTransmitterConfig, + tokenMessengerMinterProgram, + tokenMinter, + localToken, + tokenMessenger, + messageTransmitterProgram, + } = await this.burnAndPublishAccounts( + { payer, mint }, + { targetChain, destinationCctpDomain } + ); + + return this.program.methods + .settleAuctionActiveCctp() + .accounts({ + payer, + payerSequence, + custodian, + fastVaa, + preparedBy, + preparedOrderResponse, + auction: auctionAddress, + executorToken, + custodyToken: this.custodyTokenAccountAddress(), + auctionConfig, + bestOfferToken, + toRouterEndpoint: routerEndpoint, + mint, + messageTransmitterAuthority, + messageTransmitterConfig, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreMessage, + localToken, + tokenMinter, + tokenMessenger, + tokenMessengerMinterProgram, + tokenMessengerMinterSenderAuthority, + usedNonces, + remoteTokenMessenger: this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(destinationCctpDomain), + tokenMessengerMinterCustodyToken, + tokenPair, + tokenProgram, + messageTransmitterProgram, + coreBridgeProgram, + }) + .instruction(); + } async settleAuctionNoneLocalIx() { return this.program.methods diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 3cd4ab08..40f7a137 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -5,6 +5,7 @@ import * as splToken from "@solana/spl-token"; import { Connection, PublicKey, + SYSVAR_CLOCK_PUBKEY, SYSVAR_RENT_PUBKEY, SystemProgram, TransactionInstruction, @@ -46,6 +47,7 @@ export type TokenRouterCommonAccounts = PublishMessageAccounts & { tokenRouterProgram: PublicKey; systemProgram: PublicKey; rent: PublicKey; + clock: PublicKey; custodian: PublicKey; custodyToken: PublicKey; tokenMessenger: PublicKey; @@ -59,6 +61,9 @@ export type TokenRouterCommonAccounts = PublishMessageAccounts & { mint: PublicKey; localToken: PublicKey; tokenMessengerMinterCustodyToken: PublicKey; + matchingEngineProgram: PublicKey; + matchingEngineCustodian: PublicKey; + matchingEngineCustodyToken: PublicKey; }; export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { @@ -196,10 +201,13 @@ export class TokenRouterProgram { const custodyToken = this.custodyTokenAccountAddress(); const mint = this.mint; + const matchingEngine = this.matchingEngineProgram(); + return { tokenRouterProgram: this.ID, systemProgram: SystemProgram.programId, rent: SYSVAR_RENT_PUBKEY, + clock: SYSVAR_CLOCK_PUBKEY, custodian, custodyToken, coreBridgeConfig, @@ -217,6 +225,9 @@ export class TokenRouterProgram { mint, localToken: tokenMessengerMinterProgram.localTokenAddress(mint), tokenMessengerMinterCustodyToken: tokenMessengerMinterProgram.custodyTokenAddress(mint), + matchingEngineProgram: matchingEngine.ID, + matchingEngineCustodian: matchingEngine.custodianAddress(), + matchingEngineCustodyToken: matchingEngine.custodyTokenAccountAddress(), }; } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 5d3a82b2..50638223 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -2,6 +2,7 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; import * as splToken from "@solana/spl-token"; import { + AddressLookupTableProgram, ComputeBudgetProgram, Connection, Keypair, @@ -82,6 +83,8 @@ describe("Matching Engine", function () { // Matching Engine program. const engine = new MatchingEngineProgram(connection, localnet(), USDC_MINT_ADDRESS); + let lookupTableAddress: PublicKey; + describe("Admin", function () { describe("Initialize", function () { const auctionParams: AuctionParameters = { @@ -278,6 +281,35 @@ describe("Matching Engine", function () { ); }); + after("Setup Lookup Table", async function () { + // Create. + const [createIx, lookupTable] = await connection.getSlot("finalized").then((slot) => + AddressLookupTableProgram.createLookupTable({ + authority: payer.publicKey, + payer: payer.publicKey, + recentSlot: slot, + }) + ); + + await expectIxOk(connection, [createIx], [payer]); + + const usdcCommonAccounts = await engine.commonAccounts(); + + // Extend. + const extendIx = AddressLookupTableProgram.extendLookupTable({ + payer: payer.publicKey, + authority: payer.publicKey, + lookupTable, + addresses: Object.values(usdcCommonAccounts).filter((key) => key !== undefined), + }); + + await expectIxOk(connection, [extendIx], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + + lookupTableAddress = lookupTable; + }); + after("Transfer Lamports to Owner and Owner Assistant", async function () { await expectIxOk( connection, @@ -2285,7 +2317,7 @@ describe("Matching Engine", function () { await prepareOrderResponse({ initAuction: true, executeOrder: false, - prepareOrderRespsonse: false, + prepareOrderResponse: false, }); const settleIx = await engine.settleAuctionCompleteIx({ @@ -2313,7 +2345,7 @@ describe("Matching Engine", function () { } = await prepareOrderResponse({ initAuction: true, executeOrder: true, - prepareOrderRespsonse: false, + prepareOrderResponse: false, }); const settleIx = await engine.settleAuctionCompleteIx({ @@ -2326,6 +2358,110 @@ describe("Matching Engine", function () { }); }); + describe("Active Auction", function () { + it("Cannot Settle Executed Auction", async function () { + const { auction, fastVaa, fastVaaAccount, prepareIx, preparedOrderResponse } = + await prepareOrderResponse({ + executeOrder: true, + initAuction: true, + prepareOrderResponse: false, + }); + expect(prepareIx).is.not.null; + + const liquidatorToken = await splToken.getAssociatedTokenAddress( + USDC_MINT_ADDRESS, + liquidator.publicKey + ); + + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + const { encodedCctpMessage } = await craftCctpTokenBurnMessage( + engine, + sourceCctpDomain, + cctpNonce, + amountIn + ); + + const settleIx = await engine.settleAuctionActiveCctpIx( + { + payer: payer.publicKey, + fastVaa, + fastVaaAccount, + preparedOrderResponse, + executorToken: liquidatorToken, + auction, + preparedBy: payer.publicKey, + encodedCctpMessage, + }, + { targetChain: ethChain, remoteDomain: solanaChain } + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 500_000, + }); + await expectIxErr( + connection, + [prepareIx!, settleIx, computeIx], + [payer], + "Error Code: AuctionNotActive", + { + addressLookupTableAccounts: [lookupTableAccount!], + } + ); + }); + it("Settle", async function () { + const { auction, fastVaa, fastVaaAccount, prepareIx, preparedOrderResponse } = + await prepareOrderResponse({ + executeOrder: false, + initAuction: true, + prepareOrderResponse: false, + }); + expect(prepareIx).is.not.null; + + const liquidatorToken = await splToken.getAssociatedTokenAddress( + USDC_MINT_ADDRESS, + liquidator.publicKey + ); + + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + const { encodedCctpMessage } = await craftCctpTokenBurnMessage( + engine, + sourceCctpDomain, + cctpNonce, + amountIn + ); + const settleIx = await engine.settleAuctionActiveCctpIx( + { + payer: payer.publicKey, + fastVaa, + fastVaaAccount, + preparedOrderResponse, + executorToken: liquidatorToken, + auction, + preparedBy: payer.publicKey, + encodedCctpMessage, + }, + { targetChain: ethChain, remoteDomain: solanaChain } + ); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress + ); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 500_000, + }); + await expectIxOk(connection, [prepareIx!, settleIx, computeIx], [payer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + }); + }); + describe("Settle No Auction (CCTP)", function () { const localVariables = new Map(); @@ -2334,7 +2470,7 @@ describe("Matching Engine", function () { await prepareOrderResponse({ initAuction: false, executeOrder: false, - prepareOrderRespsonse: true, + prepareOrderResponse: true, }); const settleIx = await engine.settleAuctionNoneCctpIx({ @@ -2392,9 +2528,9 @@ describe("Matching Engine", function () { async function prepareOrderResponse(args: { initAuction: boolean; executeOrder: boolean; - prepareOrderRespsonse: boolean; + prepareOrderResponse: boolean; }) { - const { initAuction, executeOrder, prepareOrderRespsonse } = args; + const { initAuction, executeOrder, prepareOrderResponse } = args; const redeemer = Keypair.generate(); const sourceCctpDomain = 0; @@ -2495,11 +2631,29 @@ describe("Matching Engine", function () { await expectIxOk(connection, [ix], [offerAuthorityOne]); if (executeOrder) { - // TODO + const { info } = await engine.fetchAuction({ address: auction }); + if (info === null) { + throw new Error("No auction info found"); + } + const { configId, bestOfferToken, initialOfferToken, startSlot } = info; + const auctionConfig = engine.auctionConfigAddress(configId); + const duration = (await engine.fetchAuctionConfig(configId)).parameters.duration; + + await new Promise((f) => setTimeout(f, startSlot.toNumber() + duration + 200)); + + const ix = await engine.executeFastOrderCctpIx({ + payer: payer.publicKey, + fastVaa, + auction, + auctionConfig, + bestOfferToken, + initialOfferToken, + }); + await expectIxOk(connection, [ix], [payer]); } } - if (prepareOrderRespsonse) { + if (prepareOrderResponse) { await expectIxOk(connection, [prepareIx], [payer]); } @@ -2508,7 +2662,7 @@ describe("Matching Engine", function () { fastVaaAccount, finalizedVaa, finalizedVaaAccount, - prepareIx: prepareOrderRespsonse ? null : prepareIx, + prepareIx: prepareOrderResponse ? null : prepareIx, preparedOrderResponse, auction, preparedBy, From 50aa18bf1f7a63619169a4e502037756be367af4 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 1 Feb 2024 12:03:21 -0600 Subject: [PATCH 103/126] solana: fix sequence check --- .../auction/prepare_settlement/cctp.rs | 4 +-- solana/ts/tests/01__matchingEngine.ts | 27 ++++++++++--------- 2 files changed, 17 insertions(+), 14 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index e0575514..8efdf4fd 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -172,8 +172,8 @@ pub fn prepare_order_response_cctp( MatchingEngineError::VaaMismatch ); require_eq!( - fast_emitter.sequence + 1, - finalized_emitter.sequence, + fast_emitter.sequence, + finalized_emitter.sequence + 1, MatchingEngineError::VaaMismatch ); require!( diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 50638223..7f89cab1 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -2242,21 +2242,21 @@ describe("Matching Engine", function () { ), }); - const fastVaa = await postLiquidityLayerVaa( + const finalizedVaa = await postLiquidityLayerVaa( connection, payer, MOCK_GUARDIANS, ethRouter, wormholeSequence++, - fastMessage + finalizedMessage ); - const finalizedVaa = await postLiquidityLayerVaa( + const fastVaa = await postLiquidityLayerVaa( connection, payer, MOCK_GUARDIANS, ethRouter, wormholeSequence++, - finalizedMessage + fastMessage ); const ix = await engine.prepareOrderResponseCctpIx( @@ -2580,25 +2580,25 @@ describe("Matching Engine", function () { ), }); - const fastVaa = await postLiquidityLayerVaa( + const finalizedVaa = await postLiquidityLayerVaa( connection, payer, MOCK_GUARDIANS, ethRouter, wormholeSequence++, - fastMessage + finalizedMessage ); - const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); + const finalizedVaaAccount = await VaaAccount.fetch(connection, finalizedVaa); - const finalizedVaa = await postLiquidityLayerVaa( + const fastVaa = await postLiquidityLayerVaa( connection, payer, MOCK_GUARDIANS, ethRouter, wormholeSequence++, - finalizedMessage + fastMessage ); - const finalizedVaaAccount = await VaaAccount.fetch(connection, finalizedVaa); + const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); const prepareIx = await engine.prepareOrderResponseCctpIx( { @@ -2637,9 +2637,12 @@ describe("Matching Engine", function () { } const { configId, bestOfferToken, initialOfferToken, startSlot } = info; const auctionConfig = engine.auctionConfigAddress(configId); - const duration = (await engine.fetchAuctionConfig(configId)).parameters.duration; + const duration = (await engine.fetchAuctionConfig(configId)).parameters + .duration; - await new Promise((f) => setTimeout(f, startSlot.toNumber() + duration + 200)); + await new Promise((f) => + setTimeout(f, startSlot.toNumber() + duration + 200) + ); const ix = await engine.executeFastOrderCctpIx({ payer: payer.publicKey, From cd0a88c8c255b6dbaa7efff511ba7958447630a5 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 5 Feb 2024 07:38:29 -0600 Subject: [PATCH 104/126] evm: uncomment test in TokenRouter.t.sol --- evm/forge/tests/TokenRouter.t.sol | 130 +++++++++++++++--------------- 1 file changed, 64 insertions(+), 66 deletions(-) diff --git a/evm/forge/tests/TokenRouter.t.sol b/evm/forge/tests/TokenRouter.t.sol index 58fafe5d..114b7dab 100644 --- a/evm/forge/tests/TokenRouter.t.sol +++ b/evm/forge/tests/TokenRouter.t.sol @@ -579,7 +579,6 @@ contract TokenRouterTest is Test { uint64 amountIn, uint64 minAmountOut, uint16 targetChain, - uint32 targetDomain, bytes32 redeemer, bytes32 sender, bytes32 refundAddress, @@ -1055,71 +1054,70 @@ contract TokenRouterTest is Test { assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); } - // function testPlaceFastMarketOrderTargetIsMatchingEngine( - // uint64 amountIn, - // uint64 maxFee, - // uint32 deadline - // ) public { - // amountIn = uint64( - // bound(amountIn, router.getMinTransferAmount() + 1, router.getMaxTransferAmount()) - // ); - // maxFee = uint64(bound(maxFee, router.getMinFee(), amountIn - 1)); - - // _dealAndApproveUsdc(router, amountIn); - - // // Register a router for the matching engine chain. - // uint16 targetChain = matchingEngineChain; - // Endpoint memory targetEndpoint = Endpoint({ - // router: makeAddr("targetRouter").toUniversalAddress(), - // mintRecipient: makeAddr("targetRouter").toUniversalAddress() - // }); - - // vm.prank(makeAddr("owner")); - // router.addRouterEndpoint(targetChain, targetEndpoint, matchingEngineDomain); - - // // Create a fast market order, this is actually the payload that will be encoded - // // in the "slow message". - // Messages.FastMarketOrder memory expectedFastMarketOrder = Messages.FastMarketOrder({ - // amountIn: amountIn, - // minAmountOut: 0, - // targetChain: matchingEngineChain, - // targetDomain: matchingEngineDomain, - // redeemer: TEST_REDEEMER, - // sender: address(this).toUniversalAddress(), - // refundAddress: address(this).toUniversalAddress(), - // maxFee: maxFee - router.getInitialAuctionFee(), - // initAuctionFee: router.getInitialAuctionFee(), - // deadline: deadline, - // redeemerMessage: bytes("All your base are belong to us") - // }); - - // // Place the fast market order and store the two VAA payloads that were emitted. - // (IWormhole.VM memory cctpMessage, IWormhole.VM memory fastMessage) = - // _placeFastMarketOrder(router, expectedFastMarketOrder, maxFee); - - // // Validate the fast message payload. - // assertEq(fastMessage.payload, expectedFastMarketOrder.encode()); - - // // Validate the slow message. - // ( - // bytes32 token, - // uint256 amount, - // uint32 sourceCctpDomain, - // uint32 targetCctpDomain, - // , - // bytes32 burnSource, - // bytes32 mintRecipient, - // bytes memory payload - // ) = cctpMessage.decodeDeposit(); - - // assertEq(token, USDC_ADDRESS.toUniversalAddress()); - // assertEq(amount, amountIn); - // assertEq(sourceCctpDomain, AVAX_DOMAIN); - // assertEq(targetCctpDomain, matchingEngineDomain); - // assertEq(burnSource, address(this).toUniversalAddress()); - // assertEq(mintRecipient, matchingEngineMintRecipient); - // assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); - // } + function testPlaceFastMarketOrderTargetIsMatchingEngine( + uint64 amountIn, + uint64 maxFee, + uint32 deadline + ) public { + amountIn = uint64( + bound(amountIn, router.getMinTransferAmount() + 1, router.getMaxTransferAmount()) + ); + maxFee = uint64(bound(maxFee, router.getMinFee(), amountIn - 1)); + + _dealAndApproveUsdc(router, amountIn); + + // Register a router for the matching engine chain. + uint16 targetChain = matchingEngineChain; + Endpoint memory targetEndpoint = Endpoint({ + router: makeAddr("targetRouter").toUniversalAddress(), + mintRecipient: makeAddr("targetRouter").toUniversalAddress() + }); + + vm.prank(makeAddr("owner")); + router.addRouterEndpoint(targetChain, targetEndpoint, matchingEngineDomain); + + // Create a fast market order, this is actually the payload that will be encoded + // in the "slow message". + Messages.FastMarketOrder memory expectedFastMarketOrder = Messages.FastMarketOrder({ + amountIn: amountIn, + minAmountOut: 0, + targetChain: matchingEngineChain, + redeemer: TEST_REDEEMER, + sender: address(this).toUniversalAddress(), + refundAddress: address(this).toUniversalAddress(), + maxFee: maxFee - router.getInitialAuctionFee(), + initAuctionFee: router.getInitialAuctionFee(), + deadline: deadline, + redeemerMessage: bytes("All your base are belong to us") + }); + + // Place the fast market order and store the two VAA payloads that were emitted. + (IWormhole.VM memory cctpMessage, IWormhole.VM memory fastMessage) = + _placeFastMarketOrder(router, expectedFastMarketOrder, maxFee); + + // Validate the fast message payload. + assertEq(fastMessage.payload, expectedFastMarketOrder.encode()); + + // Validate the slow message. + ( + bytes32 token, + uint256 amount, + uint32 sourceCctpDomain, + uint32 targetCctpDomain, + , + bytes32 burnSource, + bytes32 mintRecipient, + bytes memory payload + ) = cctpMessage.decodeDeposit(); + + assertEq(token, USDC_ADDRESS.toUniversalAddress()); + assertEq(amount, amountIn); + assertEq(sourceCctpDomain, AVAX_DOMAIN); + assertEq(targetCctpDomain, matchingEngineDomain); + assertEq(burnSource, address(this).toUniversalAddress()); + assertEq(mintRecipient, matchingEngineMintRecipient); + assertEq(payload, Messages.SlowOrderResponse({baseFee: router.getBaseFee()}).encode()); + } /** * FILL REDEMPTION TESTS From 78fcc42e6f7da57cfa6b1c0e1ac30de94630c4da Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 5 Feb 2024 13:26:49 -0600 Subject: [PATCH 105/126] evm: remove deprecated --- .../src/TokenRouter/assets/RedeemFill.sol | 107 ------------------ .../forge/tests/MatchingEngine.t.sol | 35 +++--- .../mock/MockMatchingEngineImplementation.sol | 0 .../MatchingEngineImplementation.sol | 0 .../MatchingEngine/MatchingEngineSetup.sol | 0 .../src/MatchingEngine/assets/Errors.sol | 0 .../assets/MatchingEngineAdmin.sol | 5 +- .../assets/MatchingEngineFastOrders.sol | 5 +- .../src/MatchingEngine/assets/State.sol | 8 +- .../src/MatchingEngine/assets/Storage.sol | 13 +++ .../TokenRouter/assets/PlaceMarketOrder.sol | 6 + evm/src/TokenRouter/assets/RedeemFill.sol | 36 +++++- .../src/interfaces/IMatchingEngine.sol | 0 .../src/interfaces/IMatchingEngineAdmin.sol | 4 +- .../interfaces/IMatchingEngineFastOrders.sol | 0 .../src/interfaces/IMatchingEngineState.sol | 6 + .../src/interfaces/IMatchingEngineTypes.sol | 5 + evm/ts/src/MatchingEngine/evm.ts | 5 +- evm/ts/src/MatchingEngine/index.ts | 3 +- evm/ts/src/messages.ts | 21 ++-- evm/ts/tests/01__registration.ts | 12 +- 21 files changed, 120 insertions(+), 151 deletions(-) delete mode 100644 evm/deprecated/src/TokenRouter/assets/RedeemFill.sol rename evm/{deprecated => }/forge/tests/MatchingEngine.t.sol (99%) rename evm/{deprecated => }/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol (100%) rename evm/{deprecated => }/src/MatchingEngine/MatchingEngineImplementation.sol (100%) rename evm/{deprecated => }/src/MatchingEngine/MatchingEngineSetup.sol (100%) rename evm/{deprecated => }/src/MatchingEngine/assets/Errors.sol (100%) rename evm/{deprecated => }/src/MatchingEngine/assets/MatchingEngineAdmin.sol (87%) rename evm/{deprecated => }/src/MatchingEngine/assets/MatchingEngineFastOrders.sol (99%) rename evm/{deprecated => }/src/MatchingEngine/assets/State.sol (97%) rename evm/{deprecated => }/src/MatchingEngine/assets/Storage.sol (79%) rename evm/{deprecated => }/src/interfaces/IMatchingEngine.sol (100%) rename evm/{deprecated => }/src/interfaces/IMatchingEngineAdmin.sol (88%) rename evm/{deprecated => }/src/interfaces/IMatchingEngineFastOrders.sol (100%) rename evm/{deprecated => }/src/interfaces/IMatchingEngineState.sol (96%) rename evm/{deprecated => }/src/interfaces/IMatchingEngineTypes.sol (92%) diff --git a/evm/deprecated/src/TokenRouter/assets/RedeemFill.sol b/evm/deprecated/src/TokenRouter/assets/RedeemFill.sol deleted file mode 100644 index 3e958a38..00000000 --- a/evm/deprecated/src/TokenRouter/assets/RedeemFill.sol +++ /dev/null @@ -1,107 +0,0 @@ -// SPDX-License-Identifier: Apache 2 - -pragma solidity ^0.8.19; - -import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; - -import {IMatchingEngine} from "../../interfaces/IMatchingEngine.sol"; - -import {Admin} from "../../shared/Admin.sol"; -import {Messages} from "../../shared/Messages.sol"; -import {Utils} from "../../shared/Utils.sol"; - -import "./Errors.sol"; -import {State} from "./State.sol"; - -import "../../interfaces/IRedeemFill.sol"; - -import "forge-std/console.sol"; - -abstract contract RedeemFill is IRedeemFill, Admin, State { - using Messages for *; - using Utils for *; - - /// @inheritdoc IRedeemFill - function redeemFill(OrderResponse calldata response) external returns (RedeemedFill memory) { - uint16 emitterChain = response.encodedWormholeMessage.unsafeEmitterChainFromVaa(); - bytes32 emitterAddress = response.encodedWormholeMessage.unsafeEmitterAddressFromVaa(); - - // If the emitter is the matching engine, and this TokenRouter is on the same chain - // as the matching engine, then this is a fast fill. - if ( - (emitterChain == _matchingEngineChain && _chainId == _matchingEngineChain) - && emitterAddress == _matchingEngineAddress - ) { - return _handleFastFill(response.encodedWormholeMessage); - } else { - return _handleFill(emitterChain, response); - } - } - - // ------------------------------- Private --------------------------------- - - function _handleFill(uint16 emitterChain, OrderResponse calldata response) - private - returns (RedeemedFill memory) - { - (IWormhole.VM memory vaa,, uint256 amount,,, bytes memory payload) = verifyVaaAndMint( - response.circleBridgeMessage, - response.circleAttestation, - response.encodedWormholeMessage - ); - - Messages.Fill memory fill = payload.decodeFill(); - - // Verify that the sender is a known router or the matching engine. - if (vaa.emitterAddress != _matchingEngineAddress || emitterChain != _matchingEngineChain) { - bytes32 fromRouter = getRouter(emitterChain); - if (vaa.emitterAddress != fromRouter) { - revert ErrInvalidSourceRouter(vaa.emitterAddress, fromRouter); - } - } - - _verifyRedeemer(fill.redeemer); - - // Transfer token amount to redeemer. - SafeERC20.safeTransfer(_orderToken, msg.sender, amount); - - return RedeemedFill({ - sender: fill.orderSender, - senderChain: fill.sourceChain, - token: address(_orderToken), - amount: amount, - message: fill.redeemerMessage - }); - } - - function _handleFastFill(bytes calldata fastFillVaa) private returns (RedeemedFill memory) { - // Call the Matching Engine to redeem the fill directly. - Messages.FastFill memory fastFill = IMatchingEngine( - _matchingEngineAddress.fromUniversalAddress() - ).redeemFastFill(fastFillVaa); - - _verifyRedeemer(fastFill.fill.redeemer); - - // Transfer token amount to redeemer. - SafeERC20.safeTransfer(_orderToken, msg.sender, fastFill.fillAmount); - - return RedeemedFill({ - sender: fastFill.fill.orderSender, - senderChain: fastFill.fill.sourceChain, - token: address(_orderToken), - amount: fastFill.fillAmount, - message: fastFill.fill.redeemerMessage - }); - } - - function _verifyRedeemer(bytes32 expectedRedeemer) private view { - // Make sure the redeemer is who we expect. - bytes32 redeemer = msg.sender.toUniversalAddress(); - if (redeemer != expectedRedeemer) { - revert ErrInvalidRedeemer(redeemer, expectedRedeemer); - } - } -} diff --git a/evm/deprecated/forge/tests/MatchingEngine.t.sol b/evm/forge/tests/MatchingEngine.t.sol similarity index 99% rename from evm/deprecated/forge/tests/MatchingEngine.t.sol rename to evm/forge/tests/MatchingEngine.t.sol index b5fdbd35..50ebb5c6 100644 --- a/evm/deprecated/forge/tests/MatchingEngine.t.sol +++ b/evm/forge/tests/MatchingEngine.t.sol @@ -57,6 +57,7 @@ contract MatchingEngineTest is Test { uint16 constant ETH_CHAIN = 2; uint32 constant ARB_DOMAIN = 3; uint32 constant ETH_DOMAIN = 0; + uint32 constant AVAX_DOMAIN = 1; // Environment variables. uint256 immutable TESTING_SIGNER = uint256(vm.envBytes32("TESTING_DEVNET_GUARDIAN")); @@ -139,10 +140,10 @@ contract MatchingEngineTest is Test { // Set up the router endpoints. engine.addRouterEndpoint( - ARB_CHAIN, RouterEndpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}) + ARB_CHAIN, RouterEndpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}), ARB_DOMAIN ); engine.addRouterEndpoint( - ETH_CHAIN, RouterEndpoint({router: ETH_ROUTER, mintRecipient: ETH_ROUTER}) + ETH_CHAIN, RouterEndpoint({router: ETH_ROUTER, mintRecipient: ETH_ROUTER}), ETH_DOMAIN ); vm.stopPrank(); @@ -283,28 +284,32 @@ contract MatchingEngineTest is Test { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + uint32 domain = 1; assertEq(engine.getRouter(chain), bytes32(0)); assertEq(engine.getMintRecipient(chain), bytes32(0)); + assertEq(engine.getDomain(chain), 0); vm.prank(makeAddr("owner")); engine.addRouterEndpoint( - chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain ); assertEq(engine.getRouter(chain), routerEndpoint); assertEq(engine.getMintRecipient(chain), mintRecipient); + assertEq(engine.getDomain(chain), domain); } function testCannotAddRouterEndpointChainIdZero() public { uint16 chain = 0; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + uint32 domain = 1; vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrChainNotAllowed(uint16)", chain)); engine.addRouterEndpoint( - chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain ); } @@ -312,11 +317,12 @@ contract MatchingEngineTest is Test { uint16 chain = 1; bytes32 routerEndpoint = bytes32(0); bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + uint32 domain = 1; vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrInvalidEndpoint(bytes32)", routerEndpoint)); engine.addRouterEndpoint( - chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain ); } @@ -324,11 +330,12 @@ contract MatchingEngineTest is Test { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); bytes32 mintRecipient = bytes32(0); + uint32 domain = 1; vm.prank(makeAddr("owner")); vm.expectRevert(abi.encodeWithSignature("ErrInvalidEndpoint(bytes32)", mintRecipient)); engine.addRouterEndpoint( - chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain ); } @@ -336,11 +343,12 @@ contract MatchingEngineTest is Test { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + uint32 domain = 1; vm.prank(makeAddr("robber")); vm.expectRevert(abi.encodeWithSignature("NotTheOwnerOrAssistant()")); engine.addRouterEndpoint( - chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}) + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain ); } @@ -554,7 +562,6 @@ contract MatchingEngineTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: ETH_CHAIN, - targetDomain: ETH_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), @@ -593,7 +600,6 @@ contract MatchingEngineTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: ETH_CHAIN, - targetDomain: ETH_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), @@ -624,7 +630,6 @@ contract MatchingEngineTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: invalidChain, - targetDomain: ETH_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), @@ -649,7 +654,6 @@ contract MatchingEngineTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: ETH_CHAIN, - targetDomain: ETH_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), @@ -1169,7 +1173,6 @@ contract MatchingEngineTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: ETH_CHAIN, - targetDomain: ETH_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), @@ -1192,7 +1195,8 @@ contract MatchingEngineTest is Test { vm.prank(makeAddr("owner")); engine.addRouterEndpoint( ARB_CHAIN, - RouterEndpoint({router: bytes32("deadbeef"), mintRecipient: bytes32("beefdead")}) + RouterEndpoint({router: bytes32("deadbeef"), mintRecipient: bytes32("beefdead")}), + ARB_DOMAIN ); vm.expectRevert( @@ -1246,7 +1250,6 @@ contract MatchingEngineTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: invalidTargetChain, - targetDomain: ETH_DOMAIN, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), @@ -1572,7 +1575,8 @@ contract MatchingEngineTest is Test { RouterEndpoint({ router: proxy.toUniversalAddress(), mintRecipient: proxy.toUniversalAddress() - }) + }), + AVAX_DOMAIN ); return ITokenRouter(proxy); @@ -1785,7 +1789,6 @@ contract MatchingEngineTest is Test { amountIn: amountIn, minAmountOut: 0, targetChain: targetChain, - targetDomain: targetDomain, redeemer: TEST_REDEEMER, sender: address(this).toUniversalAddress(), refundAddress: address(this).toUniversalAddress(), diff --git a/evm/deprecated/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol b/evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol similarity index 100% rename from evm/deprecated/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol rename to evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol diff --git a/evm/deprecated/src/MatchingEngine/MatchingEngineImplementation.sol b/evm/src/MatchingEngine/MatchingEngineImplementation.sol similarity index 100% rename from evm/deprecated/src/MatchingEngine/MatchingEngineImplementation.sol rename to evm/src/MatchingEngine/MatchingEngineImplementation.sol diff --git a/evm/deprecated/src/MatchingEngine/MatchingEngineSetup.sol b/evm/src/MatchingEngine/MatchingEngineSetup.sol similarity index 100% rename from evm/deprecated/src/MatchingEngine/MatchingEngineSetup.sol rename to evm/src/MatchingEngine/MatchingEngineSetup.sol diff --git a/evm/deprecated/src/MatchingEngine/assets/Errors.sol b/evm/src/MatchingEngine/assets/Errors.sol similarity index 100% rename from evm/deprecated/src/MatchingEngine/assets/Errors.sol rename to evm/src/MatchingEngine/assets/Errors.sol diff --git a/evm/deprecated/src/MatchingEngine/assets/MatchingEngineAdmin.sol b/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol similarity index 87% rename from evm/deprecated/src/MatchingEngine/assets/MatchingEngineAdmin.sol rename to evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol index 3d98e698..769b0bb2 100644 --- a/evm/deprecated/src/MatchingEngine/assets/MatchingEngineAdmin.sol +++ b/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol @@ -6,14 +6,14 @@ import {Admin} from "../../shared/Admin.sol"; import "./Errors.sol"; import {State} from "./State.sol"; -import {getRouterEndpointState, getFeeRecipientState} from "./Storage.sol"; +import {getRouterEndpointState, getFeeRecipientState, getCircleDomainsState} from "./Storage.sol"; import {RouterEndpoint} from "../../interfaces/IMatchingEngineTypes.sol"; import {IMatchingEngineAdmin} from "../../interfaces/IMatchingEngineAdmin.sol"; abstract contract MatchingEngineAdmin is IMatchingEngineAdmin, Admin, State { /// @inheritdoc IMatchingEngineAdmin - function addRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint) + function addRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint, uint32 circleDomain) external onlyOwnerOrAssistant { @@ -26,6 +26,7 @@ abstract contract MatchingEngineAdmin is IMatchingEngineAdmin, Admin, State { } getRouterEndpointState().endpoints[chain] = endpoint; + getCircleDomainsState().domains[chain] = circleDomain; } /// @inheritdoc IMatchingEngineAdmin diff --git a/evm/deprecated/src/MatchingEngine/assets/MatchingEngineFastOrders.sol b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol similarity index 99% rename from evm/deprecated/src/MatchingEngine/assets/MatchingEngineFastOrders.sol rename to evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol index 27133008..538e541f 100644 --- a/evm/deprecated/src/MatchingEngine/assets/MatchingEngineFastOrders.sol +++ b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol @@ -21,7 +21,8 @@ import { getLiveAuctionInfo, AuctionStatus, getFastFillsState, - FastFills + FastFills, + getCircleDomainsState } from "./Storage.sol"; abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { @@ -302,7 +303,7 @@ abstract contract MatchingEngineFastOrders is IMatchingEngineFastOrders, State { // Burn the tokens and publish the message to the target chain. (sequence,) = burnAndPublish( endpoint.router, - order.targetDomain, + getCircleDomainsState().domains[order.targetChain], address(_token), amount, endpoint.mintRecipient, diff --git a/evm/deprecated/src/MatchingEngine/assets/State.sol b/evm/src/MatchingEngine/assets/State.sol similarity index 97% rename from evm/deprecated/src/MatchingEngine/assets/State.sol rename to evm/src/MatchingEngine/assets/State.sol index 6e3638f1..7edb6406 100644 --- a/evm/deprecated/src/MatchingEngine/assets/State.sol +++ b/evm/src/MatchingEngine/assets/State.sol @@ -14,7 +14,8 @@ import { LiveAuctionData, AuctionStatus, getFastFillsState, - getFeeRecipientState + getFeeRecipientState, + getCircleDomainsState } from "./Storage.sol"; import {WormholeCctpTokenMessenger} from "../../shared/WormholeCctpTokenMessenger.sol"; @@ -137,6 +138,11 @@ abstract contract State is IMatchingEngineState, WormholeCctpTokenMessenger { return getRouterEndpointState().endpoints[chain]; } + /// @inheritdoc IMatchingEngineState + function getDomain(uint16 chain) public view returns (uint32) { + return getCircleDomainsState().domains[chain]; + } + /// @inheritdoc IMatchingEngineState function wormhole() public view returns (IWormhole) { return _wormhole; diff --git a/evm/deprecated/src/MatchingEngine/assets/Storage.sol b/evm/src/MatchingEngine/assets/Storage.sol similarity index 79% rename from evm/deprecated/src/MatchingEngine/assets/Storage.sol rename to evm/src/MatchingEngine/assets/Storage.sol index d0af41b5..8194d26d 100644 --- a/evm/deprecated/src/MatchingEngine/assets/Storage.sol +++ b/evm/src/MatchingEngine/assets/Storage.sol @@ -43,3 +43,16 @@ function getFastFillsState() pure returns (FastFills storage state) { state.slot := TRANSFER_RECEIPTS_STORAGE_SLOT } } + +// keccak256("CircleDomain") - 1 +bytes32 constant CIRCLE_DOMAIN_STORAGE_SLOT = + 0x0776d828ae37dc9b71ac8e092e28df60d7af2771b93454a1311c33040591339b; + +/** + * @notice Returns the CircleDomains mapping. + */ +function getCircleDomainsState() pure returns (CircleDomains storage state) { + assembly ("memory-safe") { + state.slot := CIRCLE_DOMAIN_STORAGE_SLOT + } +} diff --git a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol index 4d666c5c..b12e6de9 100644 --- a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol +++ b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol @@ -148,6 +148,12 @@ abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { uint64 maxFee, uint32 deadline ) private returns (uint64 sequence, uint64 fastSequence, uint256 protocolSequence) { + // The Matching Engine chain is a fast finality chain already, + // so we don't need to send a fast transfer message. + if (_chainId == _matchingEngineChain) { + revert ErrFastTransferNotSupported(); + } + // Verify the `amountIn` and specified auction price. FastTransferParameters memory fastParams = getFastTransferParametersState(); diff --git a/evm/src/TokenRouter/assets/RedeemFill.sol b/evm/src/TokenRouter/assets/RedeemFill.sol index 51c97017..3e958a38 100644 --- a/evm/src/TokenRouter/assets/RedeemFill.sol +++ b/evm/src/TokenRouter/assets/RedeemFill.sol @@ -7,6 +7,8 @@ import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; import {IWormhole} from "wormhole-solidity/IWormhole.sol"; +import {IMatchingEngine} from "../../interfaces/IMatchingEngine.sol"; + import {Admin} from "../../shared/Admin.sol"; import {Messages} from "../../shared/Messages.sol"; import {Utils} from "../../shared/Utils.sol"; @@ -25,8 +27,18 @@ abstract contract RedeemFill is IRedeemFill, Admin, State { /// @inheritdoc IRedeemFill function redeemFill(OrderResponse calldata response) external returns (RedeemedFill memory) { uint16 emitterChain = response.encodedWormholeMessage.unsafeEmitterChainFromVaa(); - - return _handleFill(emitterChain, response); + bytes32 emitterAddress = response.encodedWormholeMessage.unsafeEmitterAddressFromVaa(); + + // If the emitter is the matching engine, and this TokenRouter is on the same chain + // as the matching engine, then this is a fast fill. + if ( + (emitterChain == _matchingEngineChain && _chainId == _matchingEngineChain) + && emitterAddress == _matchingEngineAddress + ) { + return _handleFastFill(response.encodedWormholeMessage); + } else { + return _handleFill(emitterChain, response); + } } // ------------------------------- Private --------------------------------- @@ -65,6 +77,26 @@ abstract contract RedeemFill is IRedeemFill, Admin, State { }); } + function _handleFastFill(bytes calldata fastFillVaa) private returns (RedeemedFill memory) { + // Call the Matching Engine to redeem the fill directly. + Messages.FastFill memory fastFill = IMatchingEngine( + _matchingEngineAddress.fromUniversalAddress() + ).redeemFastFill(fastFillVaa); + + _verifyRedeemer(fastFill.fill.redeemer); + + // Transfer token amount to redeemer. + SafeERC20.safeTransfer(_orderToken, msg.sender, fastFill.fillAmount); + + return RedeemedFill({ + sender: fastFill.fill.orderSender, + senderChain: fastFill.fill.sourceChain, + token: address(_orderToken), + amount: fastFill.fillAmount, + message: fastFill.fill.redeemerMessage + }); + } + function _verifyRedeemer(bytes32 expectedRedeemer) private view { // Make sure the redeemer is who we expect. bytes32 redeemer = msg.sender.toUniversalAddress(); diff --git a/evm/deprecated/src/interfaces/IMatchingEngine.sol b/evm/src/interfaces/IMatchingEngine.sol similarity index 100% rename from evm/deprecated/src/interfaces/IMatchingEngine.sol rename to evm/src/interfaces/IMatchingEngine.sol diff --git a/evm/deprecated/src/interfaces/IMatchingEngineAdmin.sol b/evm/src/interfaces/IMatchingEngineAdmin.sol similarity index 88% rename from evm/deprecated/src/interfaces/IMatchingEngineAdmin.sol rename to evm/src/interfaces/IMatchingEngineAdmin.sol index 1e0fd14c..7c0a6381 100644 --- a/evm/deprecated/src/interfaces/IMatchingEngineAdmin.sol +++ b/evm/src/interfaces/IMatchingEngineAdmin.sol @@ -9,9 +9,11 @@ interface IMatchingEngineAdmin { * @notice Add a `router` endpoint for the specified Wormhole `chain`. * @param chain The Wormhole chain ID. * @param endpoint The `Endpoint` for the specified `chain`. + * @param circleDomain The Circle domain for the specified `chain`. * @dev This function is only callable by the contract owner or assistant. */ - function addRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint) external; + function addRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint, uint32 circleDomain) + external; /** * @notice Updates the `feeRecipient` state variable. This method can diff --git a/evm/deprecated/src/interfaces/IMatchingEngineFastOrders.sol b/evm/src/interfaces/IMatchingEngineFastOrders.sol similarity index 100% rename from evm/deprecated/src/interfaces/IMatchingEngineFastOrders.sol rename to evm/src/interfaces/IMatchingEngineFastOrders.sol diff --git a/evm/deprecated/src/interfaces/IMatchingEngineState.sol b/evm/src/interfaces/IMatchingEngineState.sol similarity index 96% rename from evm/deprecated/src/interfaces/IMatchingEngineState.sol rename to evm/src/interfaces/IMatchingEngineState.sol index 86cd7a45..8c1cb0a0 100644 --- a/evm/deprecated/src/interfaces/IMatchingEngineState.sol +++ b/evm/src/interfaces/IMatchingEngineState.sol @@ -55,6 +55,12 @@ interface IMatchingEngineState { */ function getRouterEndpoint(uint16 chain) external view returns (RouterEndpoint memory); + /** + * @notice Returns the Circle domain for a given chain ID. + * @param chain The Wormhole chain ID. + */ + function getDomain(uint16 chain) external view returns (uint32); + /** * @notice Returns the Wormhole contract interface. */ diff --git a/evm/deprecated/src/interfaces/IMatchingEngineTypes.sol b/evm/src/interfaces/IMatchingEngineTypes.sol similarity index 92% rename from evm/deprecated/src/interfaces/IMatchingEngineTypes.sol rename to evm/src/interfaces/IMatchingEngineTypes.sol index 136d4473..c0aafb39 100644 --- a/evm/deprecated/src/interfaces/IMatchingEngineTypes.sol +++ b/evm/src/interfaces/IMatchingEngineTypes.sol @@ -58,3 +58,8 @@ struct FastFills { // Mapping of VAA hash to redemption status. mapping(bytes32 vaaHash => bool redeemed) redeemed; } + +struct CircleDomains { + // Mapping of chain ID to Circle domain. + mapping(uint16 chain => uint32 domain) domains; +} diff --git a/evm/ts/src/MatchingEngine/evm.ts b/evm/ts/src/MatchingEngine/evm.ts index 54ab5ff7..ff3b0e45 100644 --- a/evm/ts/src/MatchingEngine/evm.ts +++ b/evm/ts/src/MatchingEngine/evm.ts @@ -53,9 +53,10 @@ export class EvmMatchingEngine implements MatchingEngine { - return this.contract.addRouterEndpoint(chain, endpoint); + return this.contract.addRouterEndpoint(chain, endpoint, domain); } async placeInitialBid( diff --git a/evm/ts/src/MatchingEngine/index.ts b/evm/ts/src/MatchingEngine/index.ts index 978af456..cd389007 100644 --- a/evm/ts/src/MatchingEngine/index.ts +++ b/evm/ts/src/MatchingEngine/index.ts @@ -29,7 +29,8 @@ export abstract class MatchingEngine; abstract liveAuctionInfo(auctionId: Buffer | Uint8Array): Promise; diff --git a/evm/ts/src/messages.ts b/evm/ts/src/messages.ts index 8558dd89..289d961a 100644 --- a/evm/ts/src/messages.ts +++ b/evm/ts/src/messages.ts @@ -227,7 +227,6 @@ export class FastMarketOrder { amountIn: bigint; minAmountOut: bigint; targetChain: number; - targetDomain: number; redeemer: Buffer; sender: Buffer; refundAddress: Buffer; @@ -240,7 +239,6 @@ export class FastMarketOrder { amountIn: bigint, minAmountOut: bigint, targetChain: number, - targetDomain: number, redeemer: Buffer, sender: Buffer, refundAddress: Buffer, @@ -252,7 +250,6 @@ export class FastMarketOrder { this.amountIn = amountIn; this.minAmountOut = minAmountOut; this.targetChain = targetChain; - this.targetDomain = targetDomain; this.redeemer = redeemer; this.sender = sender; this.refundAddress = refundAddress; @@ -272,20 +269,18 @@ export class FastMarketOrder { const amountIn = buf.readBigUInt64BE(0); const minAmountOut = buf.readBigUInt64BE(8); const targetChain = buf.readUInt16BE(16); - const targetDomain = buf.readUInt32BE(18); - const redeemer = buf.subarray(22, 54); - const sender = buf.subarray(54, 86); - const refundAddress = buf.subarray(86, 118); - const maxFee = buf.readBigUInt64BE(118); - const initAuctionFee = buf.readBigUInt64BE(126); - const deadline = buf.readUInt32BE(134); - const redeemerMsgLen = buf.readUInt32BE(138); - const redeemerMessage = buf.subarray(138, 138 + redeemerMsgLen); + const redeemer = buf.subarray(18, 50); + const sender = buf.subarray(50, 82); + const refundAddress = buf.subarray(82, 114); + const maxFee = buf.readBigUInt64BE(114); + const initAuctionFee = buf.readBigUInt64BE(122); + const deadline = buf.readUInt32BE(130); + const redeemerMsgLen = buf.readUInt32BE(134); + const redeemerMessage = buf.subarray(134, 134 + redeemerMsgLen); return new FastMarketOrder( amountIn, minAmountOut, targetChain, - targetDomain, redeemer, sender, refundAddress, diff --git a/evm/ts/tests/01__registration.ts b/evm/ts/tests/01__registration.ts index 64f42678..382a8345 100644 --- a/evm/ts/tests/01__registration.ts +++ b/evm/ts/tests/01__registration.ts @@ -42,10 +42,14 @@ describe("Registration", () => { ); const targetChainId = coalesceChainId(chainName); await engine - .addRouterEndpoint(targetChainId, { - router: formattedAddress, - mintRecipient, - }) + .addRouterEndpoint( + targetChainId, + { + router: formattedAddress, + mintRecipient, + }, + targetEnv.domain + ) .then((tx) => mineWait(provider, tx)); const registeredAddress = await engine.getRouter(targetChainId); From c39499956cd3230c4d1e0620a9971b82450b75ba Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 5 Feb 2024 17:05:28 -0600 Subject: [PATCH 106/126] solana: change transfer authority to custodian --- .../src/processor/auction/offer/improve.rs | 8 +- .../processor/auction/offer/place_initial.rs | 8 +- solana/ts/src/matchingEngine/index.ts | 35 ++++-- solana/ts/tests/01__matchingEngine.ts | 102 +++++++++--------- 4 files changed, 81 insertions(+), 72 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs index 6cb3ac16..2093c198 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs @@ -78,19 +78,17 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { // Transfer funds from the `best_offer` token account to the `offer_token` token account, // but only if the pubkeys are different. - // - // TODO: change authority to custodian. Authority must be delegated to custodian before this - // can work. let offer_token = ctx.accounts.offer_token.key(); if auction_info.best_offer_token != offer_token { token::transfer( - CpiContext::new( + CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), anchor_spl::token::Transfer { from: ctx.accounts.offer_token.to_account_info(), to: ctx.accounts.best_offer_token.to_account_info(), - authority: ctx.accounts.offer_authority.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), }, + &[Custodian::SIGNER_SEEDS], ), auction_info.total_deposit(), )?; diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index 04dede7b..d63baae6 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -131,17 +131,15 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R let amount_in = fast_order.amount_in(); // Transfer tokens from the offer authority's token account to the custodian. - // - // TODO: change authority to custodian. Authority must be delegated to custodian before this - // can work. token::transfer( - CpiContext::new( + CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), anchor_spl::token::Transfer { from: ctx.accounts.offer_token.to_account_info(), to: ctx.accounts.custody_token.to_account_info(), - authority: ctx.accounts.payer.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), }, + &[Custodian::SIGNER_SEEDS], ), amount_in + max_fee, )?; diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 66fcc40e..55e2c6ef 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -227,6 +227,18 @@ export class MatchingEngineProgram { return this.program.account.preparedOrderResponse.fetch(addr); } + async approveCustodianIx( + owner: PublicKey, + amount: bigint | number + ): Promise { + return splToken.createApproveInstruction( + splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, owner), + this.custodianAddress(), + owner, + amount + ); + } + async commonAccounts(): Promise { const custodian = this.custodianAddress(); const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = @@ -787,18 +799,20 @@ export class MatchingEngineProgram { const targetChain = await (async () => { const message = LiquidityLayerMessage.decode(fastVaaAccount.payload()); - if (message.fastMarketOrder == undefined) { - throw new Error("Message not FastMarketOrder"); - } + if (message.fastMarketOrder == undefined) { + throw new Error("Message not FastMarketOrder"); + } - const targetChain = message.fastMarketOrder.targetChain; + const targetChain = message.fastMarketOrder.targetChain; - return targetChain; + return targetChain; })(); - const { protocol: { cctp } } = await this.fetchRouterEndpoint(targetChain); - if (cctp === undefined ) { - throw new Error("CCTP domain is not undefined") + const { + protocol: { cctp }, + } = await this.fetchRouterEndpoint(targetChain); + if (cctp === undefined) { + throw new Error("CCTP domain is not undefined"); } const destinationCctpDomain = cctp.domain; @@ -859,7 +873,10 @@ export class MatchingEngineProgram { tokenMessengerMinterProgram, tokenMessengerMinterSenderAuthority, usedNonces, - remoteTokenMessenger: this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(destinationCctpDomain), + remoteTokenMessenger: + this.tokenMessengerMinterProgram().remoteTokenMessengerAddress( + destinationCctpDomain + ), tokenMessengerMinterCustodyToken, tokenPair, tokenProgram, diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 7f89cab1..6f9f41e7 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1144,6 +1144,11 @@ describe("Matching Engine", function () { new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) ); + const approveIx = await engine.approveCustodianIx( + offerAuthorityOne.publicKey, + baseFastOrder.amountIn + baseFastOrder.maxFee + ); + const { maxFee: offerPrice } = baseFastOrder; const ix = await engine.placeInitialOfferIx( { @@ -1152,10 +1157,15 @@ describe("Matching Engine", function () { }, offerPrice ); - await expectIxOk(connection, [ix], [offerAuthorityOne]); + await expectIxOk(connection, [approveIx, ix], [offerAuthorityOne]); // TODO: find specific address already in use - await expectIxErr(connection, [ix], [offerAuthorityOne], "already in use"); + await expectIxErr( + connection, + [approveIx, ix], + [offerAuthorityOne], + "already in use" + ); }); async function checkAfterEffects(args: { @@ -1265,6 +1275,14 @@ describe("Matching Engine", function () { ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); + const totalDeposit = auctionDataBefore.info!.amountIn.add( + auctionDataBefore.info!.securityDeposit + ); + + const approveIx = await engine.approveCustodianIx( + offerAuthorityTwo.publicKey, + totalDeposit.toNumber() + ); const ix = await engine.improveOfferIx( { @@ -1274,7 +1292,7 @@ describe("Matching Engine", function () { newOffer ); - await expectIxOk(connection, [ix], [offerAuthorityTwo]); + await expectIxOk(connection, [approveIx, ix], [offerAuthorityTwo]); await checkAfterEffects( auction, @@ -1287,52 +1305,6 @@ describe("Matching Engine", function () { prevBestOfferToken: initialOfferBalanceBefore, } ); - - // Validate balance changes. - // const initialOfferBalanceAfter = await getUsdcAtaBalance( - // connection, - // offerAuthorityOne.publicKey - // ); - // const newOfferBalanceAfter = await getUsdcAtaBalance( - // connection, - // offerAuthorityTwo.publicKey - // ); - // const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); - - // const balanceChange = baseFastOrder.maxFee + baseFastOrder.amountIn; - // expect(newOfferBalanceAfter).equals(newOfferBalanceBefore - balanceChange); - // expect(initialOfferBalanceAfter).equals( - // initialOfferBalanceBefore + balanceChange - // ); - // expect(custodyBalanceAfter).equals(custodyBalanceBefore); - - // // Confirm the auction data. - // const auctionDataAfter = await engine.fetchAuction(vaaHash); - // const { info: infoAfter } = auctionDataAfter; - // expect(infoAfter).is.not.null; - - // const newOfferToken = splToken.getAssociatedTokenAddressSync( - // USDC_MINT_ADDRESS, - // offerAuthorityTwo.publicKey - // ); - // const initialOfferToken = splToken.getAssociatedTokenAddressSync( - // USDC_MINT_ADDRESS, - // offerAuthorityOne.publicKey - // ); - - // // TODO: clean up to check deep equal Auction vs Auction - // expect(auctionDataAfter.vaaHash).to.eql(Array.from(vaaHash)); - // expect(auctionDataAfter.status).to.eql({ active: {} }); - // expect(infoAfter!.bestOfferToken).to.eql(newOfferToken); - // expect(infoAfter!.initialOfferToken).to.eql(initialOfferToken); - // expect(infoAfter!.startSlot.toString()).to.eql( - // infoBefore!.startSlot.toString() - // ); - // expect(infoAfter!.amountIn.toString()).to.eql(infoBefore!.amountIn.toString()); - // expect(infoAfter!.securityDeposit.toString()).to.eql( - // infoBefore!.securityDeposit.toString() - // ); - // expect(infoAfter!.offerPrice.toString()).to.eql(newOffer.toString()); }); } @@ -1352,6 +1324,14 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityOne. const newOffer = BigInt(auctionDataBefore.info!.offerPrice.subn(100).toString()); + const totalDeposit = auctionDataBefore.info!.amountIn.add( + auctionDataBefore.info!.securityDeposit + ); + + const approveIx = await engine.approveCustodianIx( + offerAuthorityOne.publicKey, + totalDeposit.toNumber() + ); const ix = await engine.improveOfferIx( { @@ -1361,7 +1341,7 @@ describe("Matching Engine", function () { newOffer ); - await expectIxOk(connection, [ix], [offerAuthorityOne]); + await expectIxOk(connection, [approveIx, ix], [offerAuthorityOne]); await checkAfterEffects( auction, @@ -2621,6 +2601,11 @@ describe("Matching Engine", function () { const auction = engine.auctionAddress(fastVaaHash); if (initAuction) { + const approveIx = await engine.approveCustodianIx( + offerAuthorityOne.publicKey, + fastMessage.fastMarketOrder!.amountIn + fastMessage.fastMarketOrder!.maxFee + ); + const ix = await engine.placeInitialOfferIx( { payer: offerAuthorityOne.publicKey, @@ -2628,7 +2613,7 @@ describe("Matching Engine", function () { }, maxFee ); - await expectIxOk(connection, [ix], [offerAuthorityOne]); + await expectIxOk(connection, [approveIx, ix], [offerAuthorityOne]); if (executeOrder) { const { info } = await engine.fetchAuction({ address: auction }); @@ -2698,6 +2683,11 @@ describe("Matching Engine", function () { chainName ); + const approveIx = await engine.approveCustodianIx( + offerAuthority.publicKey, + fastMarketOrder.amountIn + fastMarketOrder.maxFee + ); + // Place the initial offer. const ix = await engine.placeInitialOfferIx( { @@ -2707,7 +2697,7 @@ describe("Matching Engine", function () { feeOffer ?? fastMarketOrder.maxFee ); - const txDetails = await expectIxOkDetails(connection, [ix], [offerAuthority]); + const txDetails = await expectIxOkDetails(connection, [approveIx, ix], [offerAuthority]); if (txDetails === null) { throw new Error("Transaction details is null"); } @@ -2726,6 +2716,12 @@ describe("Matching Engine", function () { ) { const auctionData = await engine.fetchAuction({ address: auction }); const newOffer = BigInt(auctionData.info!.offerPrice.subn(improveBy).toString()); + const totalDeposit = auctionData.info!.amountIn.add(auctionData.info!.securityDeposit); + + const approveIx = await engine.approveCustodianIx( + offerAuthority.publicKey, + totalDeposit.toNumber() + ); const improveIx = await engine.improveOfferIx( { @@ -2736,7 +2732,7 @@ describe("Matching Engine", function () { ); // Improve the bid with offer one. - await expectIxOk(connection, [improveIx], [offerAuthority]); + await expectIxOk(connection, [approveIx, improveIx], [offerAuthority]); const auctionDataBefore = await engine.fetchAuction({ address: auction }); expect(BigInt(auctionDataBefore.info!.offerPrice.toString())).equals(newOffer); From 7b1b0885bb9e6c32d69b3783e854a4d4f3460294 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 6 Feb 2024 11:46:33 -0600 Subject: [PATCH 107/126] solana: return approve instruction in main instruction --- solana/ts/src/matchingEngine/index.ts | 35 ++++-- solana/ts/tests/01__matchingEngine.ts | 153 +++++++++++--------------- 2 files changed, 89 insertions(+), 99 deletions(-) diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 55e2c6ef..3f30cf22 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -505,9 +505,10 @@ export class MatchingEngineProgram { auctionConfig?: PublicKey; fromRouterEndpoint?: PublicKey; toRouterEndpoint?: PublicKey; + totalDeposit?: bigint; }, feeOffer: bigint - ): Promise { + ): Promise<[approveIx: TransactionInstruction, placeInitialOfferIx: TransactionInstruction]> { const { payer, fastVaa, @@ -516,6 +517,7 @@ export class MatchingEngineProgram { auctionConfig: inputAuctionConfig, fromRouterEndpoint: inputFromRouterEndpoint, toRouterEndpoint: inputToRouterEndpoint, + totalDeposit: inputTotalDeposit, } = accounts; const custodyToken = this.custodyTokenAccountAddress(); @@ -528,11 +530,12 @@ export class MatchingEngineProgram { } })(); - const { auction, fromRouterEndpoint, toRouterEndpoint } = await (async () => { + const { auction, fromRouterEndpoint, toRouterEndpoint, totalDeposit } = await (async () => { if ( inputAuction === undefined || inputFromRouterEndpoint === undefined || - inputToRouterEndpoint === undefined + inputToRouterEndpoint === undefined || + inputTotalDeposit === undefined ) { const vaaAccount = await VaaAccount.fetch( this.program.provider.connection, @@ -551,12 +554,14 @@ export class MatchingEngineProgram { toRouterEndpoint: inputToRouterEndpoint ?? this.routerEndpointAddress(fastMarketOrder.targetChain), + totalDeposit: fastMarketOrder.amountIn + fastMarketOrder.maxFee, }; } else { return { auction: inputAuction, fromRouterEndpoint: inputFromRouterEndpoint, toRouterEndpoint: inputToRouterEndpoint, + totalDeposit: inputTotalDeposit, }; } })(); @@ -570,7 +575,8 @@ export class MatchingEngineProgram { } })(); - return this.program.methods + const approveIx = await this.approveCustodianIx(payer, totalDeposit); + const placeInitialOfferIx = await this.program.methods .placeInitialOffer(new BN(feeOffer.toString())) .accounts({ payer, @@ -584,6 +590,8 @@ export class MatchingEngineProgram { fastVaa, }) .instruction(); + + return [approveIx, placeInitialOfferIx]; } async improveOfferIx( @@ -594,7 +602,7 @@ export class MatchingEngineProgram { bestOfferToken?: PublicKey; }, feeOffer: bigint - ) { + ): Promise<[approveIx: TransactionInstruction, improveOfferIx: TransactionInstruction]> { const { offerAuthority, auction, @@ -602,13 +610,12 @@ export class MatchingEngineProgram { bestOfferToken: inputBestOfferToken, } = accounts; + const { info } = await this.fetchAuction({ address: auction }); + if (info === null) { + throw new Error("no auction info found"); + } const { auctionConfig, bestOfferToken } = await (async () => { if (inputAuctionConfig === undefined || inputBestOfferToken === undefined) { - const { info } = await this.fetchAuction({ address: auction }); - if (info === null) { - throw new Error("no auction info found"); - } - return { auctionConfig: inputAuctionConfig ?? this.auctionConfigAddress(info.configId), bestOfferToken: inputBestOfferToken ?? info.bestOfferToken, @@ -621,7 +628,11 @@ export class MatchingEngineProgram { } })(); - return this.program.methods + const approveIx = await this.approveCustodianIx( + offerAuthority, + info.amountIn.add(info.securityDeposit).toNumber() + ); + const improveOfferIx = await this.program.methods .improveOffer(new BN(feeOffer.toString())) .accounts({ offerAuthority, @@ -633,6 +644,8 @@ export class MatchingEngineProgram { custodyToken: this.custodyTokenAccountAddress(), }) .instruction(); + + return [approveIx, improveOfferIx]; } async prepareOrderResponseCctpIx( diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 6f9f41e7..a93c6339 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -943,17 +943,18 @@ describe("Matching Engine", function () { engine.auctionAddress(vaa.digest()) ); - const ix = await engine.placeInitialOfferIx( + const [approveIx, ix] = await engine.placeInitialOfferIx( { payer: offerAuthorityOne.publicKey, fastVaa, auction, fromRouterEndpoint: engine.routerEndpointAddress(ethChain), toRouterEndpoint: engine.routerEndpointAddress(arbChain), + totalDeposit: baseFastOrder.amountIn + baseFastOrder.maxFee, }, baseFastOrder.maxFee ); - await expectIxErr(connection, [ix], [offerAuthorityOne], "InvalidVaa"); + await expectIxErr(connection, [approveIx, ix], [offerAuthorityOne], "InvalidVaa"); }); it("Cannot Place Initial Offer (Invalid Payload)", async function () { @@ -982,17 +983,23 @@ describe("Matching Engine", function () { engine.auctionAddress(vaa.digest()) ); - const ix = await engine.placeInitialOfferIx( + const [approveIx, ix] = await engine.placeInitialOfferIx( { payer: offerAuthorityOne.publicKey, fastVaa, auction, fromRouterEndpoint: engine.routerEndpointAddress(ethChain), toRouterEndpoint: engine.routerEndpointAddress(arbChain), + totalDeposit: baseFastOrder.amountIn + baseFastOrder.maxFee, }, baseFastOrder.maxFee ); - await expectIxErr(connection, [ix], [offerAuthorityOne], "NotFastMarketOrder"); + await expectIxErr( + connection, + [approveIx, ix], + [offerAuthorityOne], + "NotFastMarketOrder" + ); }); it("Cannot Place Initial Offer (Deadline Exceeded)", async function () { @@ -1013,7 +1020,7 @@ describe("Matching Engine", function () { new LiquidityLayerMessage({ fastMarketOrder }) ); - const ix = await engine.placeInitialOfferIx( + const [approveIx, ix] = await engine.placeInitialOfferIx( { payer: offerAuthorityOne.publicKey, fastVaa, @@ -1021,7 +1028,12 @@ describe("Matching Engine", function () { fastMarketOrder.maxFee ); - await expectIxErr(connection, [ix], [offerAuthorityOne], "FastMarketOrderExpired"); + await expectIxErr( + connection, + [approveIx, ix], + [offerAuthorityOne], + "FastMarketOrderExpired" + ); }); it("Cannot Place Initial Offer (Offer Price Too High)", async function () { @@ -1036,14 +1048,19 @@ describe("Matching Engine", function () { new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) ); - const ix = await engine.placeInitialOfferIx( + const [approveIx, ix] = await engine.placeInitialOfferIx( { payer: offerAuthorityOne.publicKey, fastVaa, }, offerPrice ); - await expectIxErr(connection, [ix], [offerAuthorityOne], "OfferPriceTooHigh"); + await expectIxErr( + connection, + [approveIx, ix], + [offerAuthorityOne], + "OfferPriceTooHigh" + ); }); it("Cannot Place Initial Offer (Invalid Emitter Chain)", async function () { @@ -1058,18 +1075,17 @@ describe("Matching Engine", function () { ); const { maxFee: offerPrice } = baseFastOrder; + const [approveIx, ix] = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + fromRouterEndpoint: engine.routerEndpointAddress(ethChain), + }, + offerPrice + ); await expectIxErr( connection, - [ - await engine.placeInitialOfferIx( - { - payer: offerAuthorityOne.publicKey, - fastVaa, - fromRouterEndpoint: engine.routerEndpointAddress(ethChain), - }, - offerPrice - ), - ], + [approveIx, ix], [offerAuthorityOne], "ErrInvalidSourceRouter" ); @@ -1086,17 +1102,16 @@ describe("Matching Engine", function () { ); const { maxFee: offerPrice } = baseFastOrder; + const [approveIx, ix] = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + }, + offerPrice + ); await expectIxErr( connection, - [ - await engine.placeInitialOfferIx( - { - payer: offerAuthorityOne.publicKey, - fastVaa, - }, - offerPrice - ), - ], + [approveIx, ix], [offerAuthorityOne], "ErrInvalidSourceRouter" ); @@ -1117,18 +1132,17 @@ describe("Matching Engine", function () { ); const { maxFee: offerPrice } = fastMarketOrder; + const [approveIx, ix] = await engine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + toRouterEndpoint: engine.routerEndpointAddress(arbChain), + }, + offerPrice + ); await expectIxErr( connection, - [ - await engine.placeInitialOfferIx( - { - payer: offerAuthorityOne.publicKey, - fastVaa, - toRouterEndpoint: engine.routerEndpointAddress(arbChain), - }, - offerPrice - ), - ], + [approveIx, ix], [offerAuthorityOne], "ErrInvalidTargetRouter" ); @@ -1144,13 +1158,8 @@ describe("Matching Engine", function () { new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) ); - const approveIx = await engine.approveCustodianIx( - offerAuthorityOne.publicKey, - baseFastOrder.amountIn + baseFastOrder.maxFee - ); - const { maxFee: offerPrice } = baseFastOrder; - const ix = await engine.placeInitialOfferIx( + const [approveIx, ix] = await engine.placeInitialOfferIx( { payer: offerAuthorityOne.publicKey, fastVaa, @@ -1275,16 +1284,8 @@ describe("Matching Engine", function () { ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); - const totalDeposit = auctionDataBefore.info!.amountIn.add( - auctionDataBefore.info!.securityDeposit - ); - - const approveIx = await engine.approveCustodianIx( - offerAuthorityTwo.publicKey, - totalDeposit.toNumber() - ); - const ix = await engine.improveOfferIx( + const [approveIx, ix] = await engine.improveOfferIx( { auction, offerAuthority: offerAuthorityTwo.publicKey, @@ -1324,16 +1325,8 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityOne. const newOffer = BigInt(auctionDataBefore.info!.offerPrice.subn(100).toString()); - const totalDeposit = auctionDataBefore.info!.amountIn.add( - auctionDataBefore.info!.securityDeposit - ); - const approveIx = await engine.approveCustodianIx( - offerAuthorityOne.publicKey, - totalDeposit.toNumber() - ); - - const ix = await engine.improveOfferIx( + const [approveIx, ix] = await engine.improveOfferIx( { auction, offerAuthority: offerAuthorityOne.publicKey, @@ -1373,7 +1366,7 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityOne. const newOffer = BigInt(offerPrice.subn(100).toString()); - const ix = await engine.improveOfferIx( + const [approveIx, ix] = await engine.improveOfferIx( { auction, offerAuthority: offerAuthorityOne.publicKey, @@ -1383,7 +1376,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, - [ix], + [approveIx, ix], [offerAuthorityOne], "Error Code: AuctionPeriodExpired" ); @@ -1400,7 +1393,7 @@ describe("Matching Engine", function () { // New Offer from offerAuthorityOne. const newOffer = BigInt(auctionDataBefore.info!.offerPrice.subn(100).toString()); - const ix = await engine.improveOfferIx( + const [approveIx, ix] = await engine.improveOfferIx( { auction, offerAuthority: offerAuthorityOne.publicKey, @@ -1410,7 +1403,7 @@ describe("Matching Engine", function () { ); await expectIxErr( connection, - [ix], + [approveIx, ix], [offerAuthorityOne], "Error Code: BestOfferTokenMismatch" ); @@ -1425,7 +1418,7 @@ describe("Matching Engine", function () { ); const newOffer = BigInt(auctionDataBefore.info!.offerPrice.toString()); - const ix = await engine.improveOfferIx( + const [approveIx, ix] = await engine.improveOfferIx( { auction, offerAuthority: offerAuthorityTwo.publicKey, @@ -1435,7 +1428,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, - [ix], + [approveIx, ix], [offerAuthorityTwo], "Error Code: OfferPriceNotImproved" ); @@ -1593,7 +1586,7 @@ describe("Matching Engine", function () { const auction = localVariables.get("auction") as PublicKey; expect(localVariables.delete("auction")).is.true; - const ix = await engine.improveOfferIx( + const [approveIx, ix] = await engine.improveOfferIx( { offerAuthority: offerAuthorityOne.publicKey, auction, @@ -1603,7 +1596,7 @@ describe("Matching Engine", function () { await expectIxErr( connection, - [ix], + [approveIx, ix], [offerAuthorityOne], "Error Code: AuctionNotActive" ); @@ -2601,12 +2594,7 @@ describe("Matching Engine", function () { const auction = engine.auctionAddress(fastVaaHash); if (initAuction) { - const approveIx = await engine.approveCustodianIx( - offerAuthorityOne.publicKey, - fastMessage.fastMarketOrder!.amountIn + fastMessage.fastMarketOrder!.maxFee - ); - - const ix = await engine.placeInitialOfferIx( + const [approveIx, ix] = await engine.placeInitialOfferIx( { payer: offerAuthorityOne.publicKey, fastVaa, @@ -2683,13 +2671,8 @@ describe("Matching Engine", function () { chainName ); - const approveIx = await engine.approveCustodianIx( - offerAuthority.publicKey, - fastMarketOrder.amountIn + fastMarketOrder.maxFee - ); - // Place the initial offer. - const ix = await engine.placeInitialOfferIx( + const [approveIx, ix] = await engine.placeInitialOfferIx( { payer: offerAuthority.publicKey, fastVaa, @@ -2716,14 +2699,8 @@ describe("Matching Engine", function () { ) { const auctionData = await engine.fetchAuction({ address: auction }); const newOffer = BigInt(auctionData.info!.offerPrice.subn(improveBy).toString()); - const totalDeposit = auctionData.info!.amountIn.add(auctionData.info!.securityDeposit); - - const approveIx = await engine.approveCustodianIx( - offerAuthority.publicKey, - totalDeposit.toNumber() - ); - const improveIx = await engine.improveOfferIx( + const [approveIx, improveIx] = await engine.improveOfferIx( { auction, offerAuthority: offerAuthority.publicKey, From 0f817f699368c0fcd90e2c76dc157d5dccf43405 Mon Sep 17 00:00:00 2001 From: Alexander Date: Tue, 6 Feb 2024 13:33:06 -0500 Subject: [PATCH 108/126] solana: add source chain to AuctionInfo; formatting changes to 01__matchingEngine.ts --- .../processor/auction/offer/place_initial.rs | 3 + .../matching-engine/src/state/auction.rs | 3 + .../matching-engine/src/utils/auction.rs | 1 + solana/ts/src/matchingEngine/state/Auction.ts | 3 +- solana/ts/tests/01__matchingEngine.ts | 462 +++++++++--------- 5 files changed, 241 insertions(+), 231 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index d63baae6..4ac04c23 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -102,6 +102,8 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R .fast_market_order() .ok_or(MatchingEngineError::NotFastMarketOrder)?; + let source_chain = fast_vaa.try_emitter_chain()?; + // We need to fetch clock values for a couple of operations in this instruction. let Clock { slot, @@ -152,6 +154,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R status: AuctionStatus::Active, info: Some(AuctionInfo { config_id: ctx.accounts.auction_config.id, + source_chain, best_offer_token: initial_offer_token, initial_offer_token, start_slot: slot, diff --git a/solana/programs/matching-engine/src/state/auction.rs b/solana/programs/matching-engine/src/state/auction.rs index a95d6c49..e92bb7b7 100644 --- a/solana/programs/matching-engine/src/state/auction.rs +++ b/solana/programs/matching-engine/src/state/auction.rs @@ -30,6 +30,9 @@ impl std::fmt::Display for AuctionStatus { pub struct AuctionInfo { pub config_id: u32, + /// The chain where the transfer is initiated. + pub source_chain: u16, + /// The highest bidder of the auction. pub best_offer_token: Pubkey, diff --git a/solana/programs/matching-engine/src/utils/auction.rs b/solana/programs/matching-engine/src/utils/auction.rs index e8590dff..06e017fb 100644 --- a/solana/programs/matching-engine/src/utils/auction.rs +++ b/solana/programs/matching-engine/src/utils/auction.rs @@ -279,6 +279,7 @@ mod test { security_deposit, start_slot: START, config_id: Default::default(), + source_chain: Default::default(), best_offer_token: Default::default(), initial_offer_token: Default::default(), amount_in: Default::default(), diff --git a/solana/ts/src/matchingEngine/state/Auction.ts b/solana/ts/src/matchingEngine/state/Auction.ts index dff95083..91c7bf3f 100644 --- a/solana/ts/src/matchingEngine/state/Auction.ts +++ b/solana/ts/src/matchingEngine/state/Auction.ts @@ -14,6 +14,7 @@ export type AuctionStatus = { export type AuctionInfo = { configId: number; + sourceChain: number; bestOfferToken: PublicKey; initialOfferToken: PublicKey; startSlot: BN; @@ -39,7 +40,7 @@ export class Auction { static address(programId: PublicKey, vaaHash: Array | Buffer | Uint8Array) { return PublicKey.findProgramAddressSync( [Buffer.from("auction"), Buffer.from(vaaHash)], - programId + programId, )[0]; } } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index a93c6339..8177f85c 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -62,7 +62,7 @@ describe("Matching Engine", function () { const feeRecipient = Keypair.generate().publicKey; const feeRecipientToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - feeRecipient + feeRecipient, ); const newFeeRecipient = Keypair.generate().publicKey; const offerAuthorityOne = Keypair.generate(); @@ -107,18 +107,18 @@ describe("Matching Engine", function () { feeRecipient, mint, }, - auctionParams + auctionParams, ); const unknownAta = splToken.getAssociatedTokenAddressSync( mint, engine.custodianAddress(), - true + true, ); await expectIxErr( connection, [ix], [payer], - `Instruction references an unknown account ${unknownAta.toString()}` + `Instruction references an unknown account ${unknownAta.toString()}`, ); }); @@ -129,7 +129,7 @@ describe("Matching Engine", function () { ownerAssistant: PublicKey.default, feeRecipient, }, - auctionParams + auctionParams, ); await expectIxErr(connection, [ix], [payer], "Error Code: AssistantZeroPubkey"); }); @@ -141,7 +141,7 @@ describe("Matching Engine", function () { ownerAssistant: ownerAssistant.publicKey, feeRecipient: PublicKey.default, }, - auctionParams + auctionParams, ); await expectIxErr(connection, [ix], [payer], "Error Code: FeeRecipientZeroPubkey"); }); @@ -156,7 +156,7 @@ describe("Matching Engine", function () { feeRecipient, mint: USDC_MINT_ADDRESS, }, - { duration: 0, ...remaining } + { duration: 0, ...remaining }, ); await expectIxErr(connection, [ix], [payer], "Error Code: InvalidAuctionDuration"); }); @@ -171,13 +171,13 @@ describe("Matching Engine", function () { feeRecipient, mint: USDC_MINT_ADDRESS, }, - { gracePeriod: 0, ...remaining } + { gracePeriod: 0, ...remaining }, ); await expectIxErr( connection, [ix], [payer], - "Error Code: InvalidAuctionGracePeriod" + "Error Code: InvalidAuctionGracePeriod", ); }); @@ -191,7 +191,7 @@ describe("Matching Engine", function () { feeRecipient, mint: USDC_MINT_ADDRESS, }, - { userPenaltyRewardBps: 4294967295, ...remaining } + { userPenaltyRewardBps: 4294967295, ...remaining }, ); await expectIxErr(connection, [ix], [payer], "Error Code: UserPenaltyTooLarge"); }); @@ -206,7 +206,7 @@ describe("Matching Engine", function () { feeRecipient, mint: USDC_MINT_ADDRESS, }, - { initialPenaltyBps: 4294967295, ...remaining } + { initialPenaltyBps: 4294967295, ...remaining }, ); await expectIxErr(connection, [ix], [payer], "Error Code: InitialPenaltyTooLarge"); }); @@ -219,7 +219,7 @@ describe("Matching Engine", function () { feeRecipient, mint: USDC_MINT_ADDRESS, }, - auctionParams + auctionParams, ); await expectIxOk(connection, [ix], [payer]); @@ -232,13 +232,13 @@ describe("Matching Engine", function () { ownerAssistant.publicKey, feeRecipientToken, expectedAuctionConfigId, - bigintToU64BN(0n) - ) + bigintToU64BN(0n), + ), ); const auctionConfigData = await engine.fetchAuctionConfig(0); expect(auctionConfigData).to.eql( - new AuctionConfig(expectedAuctionConfigId, auctionParams) + new AuctionConfig(expectedAuctionConfigId, auctionParams), ); localVariables.set("ix", ix); @@ -254,7 +254,7 @@ describe("Matching Engine", function () { [payer], `Allocate: account Address { address: ${engine .custodianAddress() - .toString()}, base: None } already in use` + .toString()}, base: None } already in use`, ); }); @@ -263,21 +263,21 @@ describe("Matching Engine", function () { connection, payer, USDC_MINT_ADDRESS, - feeRecipient + feeRecipient, ); await splToken.getOrCreateAssociatedTokenAccount( connection, payer, USDC_MINT_ADDRESS, - PublicKey.default + PublicKey.default, ); await splToken.getOrCreateAssociatedTokenAccount( connection, payer, USDC_MINT_ADDRESS, - SystemProgram.programId + SystemProgram.programId, ); }); @@ -288,7 +288,7 @@ describe("Matching Engine", function () { authority: payer.publicKey, payer: payer.publicKey, recentSlot: slot, - }) + }), ); await expectIxOk(connection, [createIx], [payer]); @@ -340,7 +340,7 @@ describe("Matching Engine", function () { lamports: 1000000000, }), ], - [payer] + [payer], ); }); }); @@ -379,7 +379,7 @@ describe("Matching Engine", function () { newOwner: owner.publicKey, }), ], - [payer] + [payer], ); // Confirm that the pending owner variable is set in the owner config. @@ -392,7 +392,7 @@ describe("Matching Engine", function () { await expectIxOk( connection, [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], - [payer, owner] + [payer, owner], ); // Confirm that the owner config reflects the current ownership status. @@ -412,7 +412,7 @@ describe("Matching Engine", function () { }), ], [payer, owner], - "InvalidNewOwner" + "InvalidNewOwner", ); }); @@ -425,7 +425,7 @@ describe("Matching Engine", function () { }), ], [payer, owner], - "AlreadyOwner" + "AlreadyOwner", ); }); @@ -438,7 +438,7 @@ describe("Matching Engine", function () { }), ], [payer, ownerAssistant], - "OwnerOnly" + "OwnerOnly", ); }); @@ -446,7 +446,7 @@ describe("Matching Engine", function () { await expectIxOk( connection, [await createSubmitOwnershipTransferIx()], - [payer, owner] + [payer, owner], ); // Confirm that the pending owner variable is set in the owner config. @@ -463,7 +463,7 @@ describe("Matching Engine", function () { }), ], [payer, ownerAssistant], - "NotPendingOwner" + "NotPendingOwner", ); }); @@ -471,7 +471,7 @@ describe("Matching Engine", function () { await expectIxOk( connection, [await createConfirmOwnershipTransferIx()], - [payer, relayer] + [payer, relayer], ); // Confirm that the owner config reflects the current ownership status. @@ -490,13 +490,13 @@ describe("Matching Engine", function () { newOwner: owner.publicKey, }), ], - [payer, relayer] + [payer, relayer], ); await expectIxOk( connection, [await createConfirmOwnershipTransferIx({ sender: owner.publicKey })], - [payer, owner] + [payer, owner], ); // Confirm that the payer is the owner again. @@ -512,7 +512,7 @@ describe("Matching Engine", function () { await expectIxOk( connection, [await createSubmitOwnershipTransferIx()], - [payer, owner] + [payer, owner], ); // Confirm that the pending owner variable is set in the owner config. @@ -526,7 +526,7 @@ describe("Matching Engine", function () { connection, [await createCancelOwnershipTransferIx({ sender: ownerAssistant.publicKey })], [payer, ownerAssistant], - "OwnerOnly" + "OwnerOnly", ); }); @@ -534,7 +534,7 @@ describe("Matching Engine", function () { await expectIxOk( connection, [await createCancelOwnershipTransferIx()], - [payer, owner] + [payer, owner], ); // Confirm the pending owner field was reset. @@ -559,7 +559,7 @@ describe("Matching Engine", function () { connection, [await createUpdateOwnerAssistantIx({ newAssistant: PublicKey.default })], [payer, owner], - "InvalidNewAssistant" + "InvalidNewAssistant", ); }); @@ -568,7 +568,7 @@ describe("Matching Engine", function () { connection, [await createUpdateOwnerAssistantIx({ sender: ownerAssistant.publicKey })], [payer, ownerAssistant], - "OwnerOnly" + "OwnerOnly", ); }); @@ -576,7 +576,7 @@ describe("Matching Engine", function () { await expectIxOk( connection, [await createUpdateOwnerAssistantIx()], - [payer, owner] + [payer, owner], ); // Confirm the assistant field was updated. @@ -591,7 +591,7 @@ describe("Matching Engine", function () { newAssistant: ownerAssistant.publicKey, }), ], - [payer, owner] + [payer, owner], ); }); }); @@ -605,7 +605,7 @@ describe("Matching Engine", function () { cctpDomain: ethDomain, address: ethRouter, mintRecipient: null, - } + }, ); await expectIxErr(connection, [ix], [payer], "OwnerOrAssistantOnly"); @@ -617,10 +617,10 @@ describe("Matching Engine", function () { const ix = await engine.addCctpRouterEndpointIx( { ownerOrAssistant: owner.publicKey }, - { chain, cctpDomain: ethDomain, address: ethRouter, mintRecipient: null } + { chain, cctpDomain: ethDomain, address: ethRouter, mintRecipient: null }, ); await expectIxErr(connection, [ix], [owner], "ChainNotAllowed"); - }) + }), ); it("Cannot Register Zero Address", async function () { @@ -631,7 +631,7 @@ describe("Matching Engine", function () { cctpDomain: ethDomain, address: new Array(32).fill(0), mintRecipient: null, - } + }, ); await expectIxErr(connection, [ix], [owner], "InvalidEndpoint"); @@ -647,7 +647,7 @@ describe("Matching Engine", function () { cctpDomain: ethDomain, address: contractAddress, mintRecipient, - } + }, ); await expectIxOk(connection, [ix], [ownerAssistant]); @@ -655,7 +655,7 @@ describe("Matching Engine", function () { expect(routerEndpointData).to.eql( new RouterEndpoint(255, ethChain, contractAddress, mintRecipient, { cctp: { domain: ethDomain }, - }) + }), ); }); @@ -667,7 +667,7 @@ describe("Matching Engine", function () { cctpDomain: ethDomain, address: ethRouter, mintRecipient: null, - } + }, ); await expectIxOk(connection, [ix], [owner]); @@ -676,7 +676,7 @@ describe("Matching Engine", function () { expect(routerEndpointData).to.eql( new RouterEndpoint(255, ethChain, ethRouter, ethRouter, { cctp: { domain: ethDomain }, - }) + }), ); }); }); @@ -690,21 +690,21 @@ describe("Matching Engine", function () { const [bogusEmitter] = PublicKey.findProgramAddressSync( [Buffer.from("emitter")], - SYSVAR_RENT_PUBKEY + SYSVAR_RENT_PUBKEY, ); await splToken.getOrCreateAssociatedTokenAccount( connection, payer, USDC_MINT_ADDRESS, bogusEmitter, - true + true, ); await expectIxErr( connection, [ix], [ownerAssistant], - "Error Code: ConstraintExecutable" + "Error Code: ConstraintExecutable", ); }); @@ -716,21 +716,21 @@ describe("Matching Engine", function () { const [bogusEmitter] = PublicKey.findProgramAddressSync( [Buffer.from("emitter")], - SystemProgram.programId + SystemProgram.programId, ); await splToken.getOrCreateAssociatedTokenAccount( connection, payer, USDC_MINT_ADDRESS, bogusEmitter, - true + true, ); await expectIxErr( connection, [ix], [ownerAssistant], - "Error Code: InvalidEndpoint" + "Error Code: InvalidEndpoint", ); }); }); @@ -748,7 +748,7 @@ describe("Matching Engine", function () { connection, [ix], [ownerAssistant], - "new_fee_recipient_token. Error Code: AccountNotInitialized" + "new_fee_recipient_token. Error Code: AccountNotInitialized", ); localVariables.set("ix", ix); @@ -762,14 +762,14 @@ describe("Matching Engine", function () { connection, payer, USDC_MINT_ADDRESS, - newFeeRecipient + newFeeRecipient, ); await expectIxOk(connection, [ix], [ownerAssistant]); const custodianData = await engine.fetchCustodian(); expect(custodianData.feeRecipientToken).to.eql( - splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, newFeeRecipient) + splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, newFeeRecipient), ); }); @@ -831,7 +831,7 @@ describe("Matching Engine", function () { // Fetch the balances before. const offerBalanceBefore = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); @@ -841,13 +841,13 @@ describe("Matching Engine", function () { wormholeSequence++, baseFastOrder, ethRouter, - offerPrice + offerPrice, ); // Validate balance changes. const offerBalanceAfter = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); const balanceChange = baseFastOrder.amountIn + baseFastOrder.maxFee; @@ -866,7 +866,7 @@ describe("Matching Engine", function () { // Fetch the balances before. const offerBalanceBefore = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); @@ -874,13 +874,13 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, fastOrder, - ethRouter + ethRouter, ); // Validate balance changes. const offerBalanceAfter = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); const balanceChange = fastOrder.amountIn + fastOrder.maxFee; @@ -904,7 +904,7 @@ describe("Matching Engine", function () { // Fetch the balances before. const offerBalanceBefore = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); @@ -913,13 +913,13 @@ describe("Matching Engine", function () { wormholeSequence++, fastOrder, ethRouter, - offerPrice + offerPrice, ); // Validate balance changes. const offerBalanceAfter = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); const balanceChange = fastOrder.amountIn + fastOrder.maxFee; @@ -936,11 +936,11 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - Buffer.from("deadbeef", "hex") + Buffer.from("deadbeef", "hex"), ); const auction = await VaaAccount.fetch(connection, fastVaa).then((vaa) => - engine.auctionAddress(vaa.digest()) + engine.auctionAddress(vaa.digest()), ); const [approveIx, ix] = await engine.placeInitialOfferIx( @@ -952,7 +952,7 @@ describe("Matching Engine", function () { toRouterEndpoint: engine.routerEndpointAddress(arbChain), totalDeposit: baseFastOrder.amountIn + baseFastOrder.maxFee, }, - baseFastOrder.maxFee + baseFastOrder.maxFee, ); await expectIxErr(connection, [approveIx, ix], [offerAuthorityOne], "InvalidVaa"); }); @@ -976,11 +976,11 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - message + message, ); const auction = await VaaAccount.fetch(connection, fastVaa).then((vaa) => - engine.auctionAddress(vaa.digest()) + engine.auctionAddress(vaa.digest()), ); const [approveIx, ix] = await engine.placeInitialOfferIx( @@ -992,13 +992,13 @@ describe("Matching Engine", function () { toRouterEndpoint: engine.routerEndpointAddress(arbChain), totalDeposit: baseFastOrder.amountIn + baseFastOrder.maxFee, }, - baseFastOrder.maxFee + baseFastOrder.maxFee, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "NotFastMarketOrder" + "NotFastMarketOrder", ); }); @@ -1017,7 +1017,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - new LiquidityLayerMessage({ fastMarketOrder }) + new LiquidityLayerMessage({ fastMarketOrder }), ); const [approveIx, ix] = await engine.placeInitialOfferIx( @@ -1025,14 +1025,14 @@ describe("Matching Engine", function () { payer: offerAuthorityOne.publicKey, fastVaa, }, - fastMarketOrder.maxFee + fastMarketOrder.maxFee, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "FastMarketOrderExpired" + "FastMarketOrderExpired", ); }); @@ -1045,7 +1045,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) + new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }), ); const [approveIx, ix] = await engine.placeInitialOfferIx( @@ -1053,13 +1053,13 @@ describe("Matching Engine", function () { payer: offerAuthorityOne.publicKey, fastVaa, }, - offerPrice + offerPrice, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "OfferPriceTooHigh" + "OfferPriceTooHigh", ); }); @@ -1071,7 +1071,7 @@ describe("Matching Engine", function () { ethRouter, wormholeSequence++, new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }), - "acala" + "acala", ); const { maxFee: offerPrice } = baseFastOrder; @@ -1081,13 +1081,13 @@ describe("Matching Engine", function () { fastVaa, fromRouterEndpoint: engine.routerEndpointAddress(ethChain), }, - offerPrice + offerPrice, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "ErrInvalidSourceRouter" + "ErrInvalidSourceRouter", ); }); @@ -1098,7 +1098,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, arbRouter, wormholeSequence++, - new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) + new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }), ); const { maxFee: offerPrice } = baseFastOrder; @@ -1107,13 +1107,13 @@ describe("Matching Engine", function () { payer: offerAuthorityOne.publicKey, fastVaa, }, - offerPrice + offerPrice, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "ErrInvalidSourceRouter" + "ErrInvalidSourceRouter", ); }); @@ -1128,7 +1128,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - new LiquidityLayerMessage({ fastMarketOrder }) + new LiquidityLayerMessage({ fastMarketOrder }), ); const { maxFee: offerPrice } = fastMarketOrder; @@ -1138,13 +1138,13 @@ describe("Matching Engine", function () { fastVaa, toRouterEndpoint: engine.routerEndpointAddress(arbChain), }, - offerPrice + offerPrice, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "ErrInvalidTargetRouter" + "ErrInvalidTargetRouter", ); }); @@ -1155,7 +1155,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }) + new LiquidityLayerMessage({ fastMarketOrder: baseFastOrder }), ); const { maxFee: offerPrice } = baseFastOrder; @@ -1164,7 +1164,7 @@ describe("Matching Engine", function () { payer: offerAuthorityOne.publicKey, fastVaa, }, - offerPrice + offerPrice, ); await expectIxOk(connection, [approveIx, ix], [offerAuthorityOne]); @@ -1173,7 +1173,7 @@ describe("Matching Engine", function () { connection, [approveIx, ix], [offerAuthorityOne], - "already in use" + "already in use", ); }); @@ -1194,7 +1194,7 @@ describe("Matching Engine", function () { const offerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); expect(fastMarketOrder).is.not.undefined; @@ -1208,6 +1208,7 @@ describe("Matching Engine", function () { { active: {} }, { configId: 0, + sourceChain: ethChain, bestOfferToken: offerToken, initialOfferToken: offerToken, startSlot: numberToU64BN(txDetails.slot), @@ -1215,8 +1216,8 @@ describe("Matching Engine", function () { securityDeposit: bigintToU64BN(maxFee), offerPrice: bigintToU64BN(offerPrice), amountOut: expectedAmountIn, - } - ) + }, + ), ); } @@ -1230,7 +1231,7 @@ describe("Matching Engine", function () { cctpDomain: arbDomain, address: arbRouter, mintRecipient: null, - } + }, ); await expectIxOk(connection, [ix], [owner]); }); @@ -1241,7 +1242,7 @@ describe("Matching Engine", function () { connection, wallet, USDC_MINT_ADDRESS, - wallet.publicKey + wallet.publicKey, ); // Mint USDC. @@ -1254,8 +1255,8 @@ describe("Matching Engine", function () { USDC_MINT_ADDRESS, destination, payer, - mintAmount - ) + mintAmount, + ), ).to.be.fulfilled; const { amount } = await splToken.getAccount(connection, destination); @@ -1271,16 +1272,16 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const initialOfferBalanceBefore = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const newOfferBalanceBefore = await getUsdcAtaBalance( connection, - offerAuthorityTwo.publicKey + offerAuthorityTwo.publicKey, ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); @@ -1290,7 +1291,7 @@ describe("Matching Engine", function () { auction, offerAuthority: offerAuthorityTwo.publicKey, }, - newOffer + newOffer, ); await expectIxOk(connection, [approveIx, ix], [offerAuthorityTwo]); @@ -1304,7 +1305,7 @@ describe("Matching Engine", function () { custodyToken: custodyBalanceBefore, bestOfferToken: newOfferBalanceBefore, prevBestOfferToken: initialOfferBalanceBefore, - } + }, ); }); } @@ -1314,12 +1315,12 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const initialOfferBalanceBefore = await getUsdcAtaBalance( connection, - offerAuthorityOne.publicKey + offerAuthorityOne.publicKey, ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); @@ -1331,7 +1332,7 @@ describe("Matching Engine", function () { auction, offerAuthority: offerAuthorityOne.publicKey, }, - newOffer + newOffer, ); await expectIxOk(connection, [approveIx, ix], [offerAuthorityOne]); @@ -1344,7 +1345,7 @@ describe("Matching Engine", function () { { custodyToken: custodyBalanceBefore, bestOfferToken: initialOfferBalanceBefore, - } + }, ); }); @@ -1353,14 +1354,14 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const { startSlot, offerPrice } = auctionDataBefore.info!; const { duration, gracePeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, - startSlot.addn(duration + gracePeriod - 1).toNumber() + startSlot.addn(duration + gracePeriod - 1).toNumber(), ); // New Offer from offerAuthorityOne. @@ -1371,14 +1372,14 @@ describe("Matching Engine", function () { auction, offerAuthority: offerAuthorityOne.publicKey, }, - newOffer + newOffer, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "Error Code: AuctionPeriodExpired" + "Error Code: AuctionPeriodExpired", ); }); @@ -1387,7 +1388,7 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); // New Offer from offerAuthorityOne. @@ -1399,13 +1400,13 @@ describe("Matching Engine", function () { offerAuthority: offerAuthorityOne.publicKey, bestOfferToken: engine.custodyTokenAccountAddress(), }, - newOffer + newOffer, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "Error Code: BestOfferTokenMismatch" + "Error Code: BestOfferTokenMismatch", ); }); @@ -1414,7 +1415,7 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const newOffer = BigInt(auctionDataBefore.info!.offerPrice.toString()); @@ -1423,14 +1424,14 @@ describe("Matching Engine", function () { auction, offerAuthority: offerAuthorityTwo.publicKey, }, - newOffer + newOffer, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityTwo], - "Error Code: OfferPriceNotImproved" + "Error Code: OfferPriceNotImproved", ); }); @@ -1443,7 +1444,7 @@ describe("Matching Engine", function () { custodyToken: bigint; bestOfferToken: bigint; prevBestOfferToken?: bigint; - } + }, ) { const { custodyToken: custodyTokenBefore, @@ -1453,7 +1454,7 @@ describe("Matching Engine", function () { const bestOfferToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - newOfferAuthority + newOfferAuthority, ); const { bump, vaaHash, status, info } = auctionDataBefore; @@ -1466,6 +1467,7 @@ describe("Matching Engine", function () { securityDeposit, offerPrice: prevOfferPrice, amountOut, + sourceChain, } = info!; expect(offerPrice).not.equals(BigInt(prevOfferPrice.toString())); @@ -1473,6 +1475,7 @@ describe("Matching Engine", function () { expect(auctionDataAfter).to.eql( new Auction(bump, vaaHash, status, { configId, + sourceChain, bestOfferToken, initialOfferToken, startSlot, @@ -1480,7 +1483,7 @@ describe("Matching Engine", function () { securityDeposit, offerPrice: bigintToU64BN(offerPrice), amountOut, - }) + }), ); // Custody token should be unchanged. @@ -1495,17 +1498,17 @@ describe("Matching Engine", function () { // New offer change. const { amount: bestOfferTokenAfter } = await splToken.getAccount( connection, - bestOfferToken + bestOfferToken, ); expect(bestOfferTokenAfter).equals(bestOfferTokenBefore - balanceChange); // Previous offer refunded. const { amount: prevBestOfferTokenAfter } = await splToken.getAccount( connection, - prevBestOfferToken + prevBestOfferToken, ); expect(prevBestOfferTokenAfter).equals( - prevBestOfferTokenBefore + balanceChange + prevBestOfferTokenBefore + balanceChange, ); } else { expect(bestOfferToken).to.eql(prevBestOfferToken); @@ -1513,7 +1516,7 @@ describe("Matching Engine", function () { // Should be no change. const { amount: bestOfferTokenAfter } = await splToken.getAccount( connection, - bestOfferToken + bestOfferToken, ); expect(bestOfferTokenAfter).equals(bestOfferTokenBefore); } @@ -1530,31 +1533,31 @@ describe("Matching Engine", function () { offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100 + 100, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - bestOfferToken + bestOfferToken, ); const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - initialOfferToken + initialOfferToken, ); const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); const { duration, gracePeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, - auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 1).toNumber() + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 1).toNumber(), ); const ix = await engine.executeFastOrderCctpIx({ @@ -1576,7 +1579,7 @@ describe("Matching Engine", function () { offerAuthorityOne.publicKey, false, // hasPenalty "ethereum", - "arbitrum" + "arbitrum", ); localVariables.set("auction", auction); @@ -1591,14 +1594,14 @@ describe("Matching Engine", function () { offerAuthority: offerAuthorityOne.publicKey, auction, }, - baseFastOrder.maxFee + baseFastOrder.maxFee, ); await expectIxErr( connection, [approveIx, ix], [offerAuthorityOne], - "Error Code: AuctionNotActive" + "Error Code: AuctionNotActive", ); }); @@ -1609,24 +1612,24 @@ describe("Matching Engine", function () { offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100 + 100, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - bestOfferToken + bestOfferToken, ); const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - initialOfferToken + initialOfferToken, ); const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); @@ -1636,7 +1639,7 @@ describe("Matching Engine", function () { connection, auctionDataBefore .info!.startSlot.addn(duration + gracePeriod + penaltySlots / 2) - .toNumber() + .toNumber(), ); const ix = await engine.executeFastOrderCctpIx({ @@ -1658,7 +1661,7 @@ describe("Matching Engine", function () { offerAuthorityOne.publicKey, true, // hasPenalty "ethereum", - "arbitrum" + "arbitrum", ); }); @@ -1669,34 +1672,34 @@ describe("Matching Engine", function () { offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100 + 100, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - bestOfferToken + bestOfferToken, ); const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - initialOfferToken + initialOfferToken, ); const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); const liquidatorToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - liquidator.publicKey + liquidator.publicKey, ); const { amount: executorTokenBefore } = await splToken.getAccount( connection, - liquidatorToken + liquidatorToken, ); const { duration, gracePeriod, penaltySlots } = @@ -1705,7 +1708,7 @@ describe("Matching Engine", function () { connection, auctionDataBefore .info!.startSlot.addn(duration + gracePeriod + penaltySlots / 2) - .toNumber() + .toNumber(), ); const ix = await engine.executeFastOrderCctpIx({ @@ -1728,7 +1731,7 @@ describe("Matching Engine", function () { liquidator.publicKey, true, // hasPenalty "ethereum", - "arbitrum" + "arbitrum", ); }); @@ -1739,34 +1742,34 @@ describe("Matching Engine", function () { offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100 + 100, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; // Fetch the balances before. const { amount: bestOfferTokenBefore } = await splToken.getAccount( connection, - bestOfferToken + bestOfferToken, ); const { amount: initialOfferTokenBefore } = await splToken.getAccount( connection, - initialOfferToken + initialOfferToken, ); const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); const liquidatorToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - liquidator.publicKey + liquidator.publicKey, ); const { amount: executorTokenBefore } = await splToken.getAccount( connection, - liquidatorToken + liquidatorToken, ); const { duration, gracePeriod, penaltySlots } = @@ -1775,7 +1778,7 @@ describe("Matching Engine", function () { connection, auctionDataBefore .info!.startSlot.addn(duration + gracePeriod + penaltySlots + 2) - .toNumber() + .toNumber(), ); const ix = await engine.executeFastOrderCctpIx({ @@ -1798,7 +1801,7 @@ describe("Matching Engine", function () { liquidator.publicKey, true, // hasPenalty "ethereum", - "arbitrum" + "arbitrum", ); }); @@ -1811,13 +1814,13 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, fastOrder, - ethRouter + ethRouter, ); const { duration, gracePeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, - auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 2).toNumber() + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 2).toNumber(), ); const ix = await engine.executeFastOrderCctpIx({ @@ -1828,7 +1831,7 @@ describe("Matching Engine", function () { connection, [ix], [offerAuthorityOne], - "Error Code: InvalidChain" + "Error Code: InvalidChain", ); }); @@ -1839,7 +1842,7 @@ describe("Matching Engine", function () { wormholeSequence++, baseFastOrder, ethRouter, - baseFastOrder.maxFee + baseFastOrder.maxFee, ); const { fastVaa: anotherFastVaa, fastVaaAccount: anotherFastVaaAccount } = @@ -1848,14 +1851,14 @@ describe("Matching Engine", function () { wormholeSequence++, baseFastOrder, ethRouter, - baseFastOrder.maxFee + baseFastOrder.maxFee, ); expect(fastVaaAccount.digest()).to.not.eql(anotherFastVaaAccount.digest()); const { duration, gracePeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, - auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 2).toNumber() + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 2).toNumber(), ); const ix = await engine.executeFastOrderCctpIx({ @@ -1868,7 +1871,7 @@ describe("Matching Engine", function () { connection, [ix], [offerAuthorityOne], - "account: auction. Error Code: ConstraintSeeds" + "account: auction. Error Code: ConstraintSeeds", ); }); @@ -1877,7 +1880,7 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const bogusToken = engine.custodyTokenAccountAddress(); @@ -1896,7 +1899,7 @@ describe("Matching Engine", function () { connection, [ix], [offerAuthorityOne], - "Error Code: BestOfferTokenMismatch" + "Error Code: BestOfferTokenMismatch", ); }); @@ -1905,7 +1908,7 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const bogusToken = engine.custodyTokenAccountAddress(); @@ -1924,7 +1927,7 @@ describe("Matching Engine", function () { connection, [ix], [offerAuthorityOne], - "Error Code: InitialOfferTokenMismatch" + "Error Code: InitialOfferTokenMismatch", ); }); @@ -1935,13 +1938,13 @@ describe("Matching Engine", function () { offerAuthorityTwo, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const { duration, gracePeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, - auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 1).toNumber() + auctionDataBefore.info!.startSlot.addn(duration + gracePeriod - 1).toNumber(), ); const ix = await engine.executeFastOrderCctpIx({ @@ -1962,7 +1965,7 @@ describe("Matching Engine", function () { connection, [ix], [offerAuthorityOne], - "Error Code: AuctionNotActive" + "Error Code: AuctionNotActive", ); }); @@ -1971,7 +1974,7 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); const ix = await engine.executeFastOrderCctpIx({ @@ -1983,7 +1986,7 @@ describe("Matching Engine", function () { connection, [ix], [offerAuthorityOne], - "Error Code: AuctionPeriodNotExpired" + "Error Code: AuctionPeriodNotExpired", ); }); @@ -1992,7 +1995,7 @@ describe("Matching Engine", function () { offerAuthorityOne, wormholeSequence++, baseFastOrder, - ethRouter + ethRouter, ); await expectIxErr( @@ -2005,7 +2008,7 @@ describe("Matching Engine", function () { }), ], [offerAuthorityOne], - "Error Code: ConstraintSeeds" + "Error Code: ConstraintSeeds", ); }); @@ -2022,7 +2025,7 @@ describe("Matching Engine", function () { executor: PublicKey, hasPenalty: boolean, fromChainName: wormholeSdk.ChainName, - toChainName: wormholeSdk.ChainName + toChainName: wormholeSdk.ChainName, ) { const { custodyToken: custodyTokenBefore, @@ -2039,8 +2042,8 @@ describe("Matching Engine", function () { bump, vaaHash, { completed: { slot: bigintToU64BN(BigInt(txDetails.slot)) } }, - info - ) + info, + ), ); const { bestOfferToken, initialOfferToken, securityDeposit, amountIn, offerPrice } = @@ -2049,17 +2052,17 @@ describe("Matching Engine", function () { // Validate balance changes. const { amount: bestOfferTokenAfter } = await splToken.getAccount( connection, - bestOfferToken + bestOfferToken, ); const { amount: initialOfferTokenAfter } = await splToken.getAccount( connection, - initialOfferToken + initialOfferToken, ); const { penalty, userReward } = await engine.computeDepositPenalty( info!, BigInt(txDetails.slot), - info!.configId + info!.configId, ); const { @@ -2078,26 +2081,26 @@ describe("Matching Engine", function () { BigInt(offerPrice.add(securityDeposit).toString()) - userReward; const executorToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - executor + executor, ); if (!executorToken.equals(bestOfferToken)) { depositAndFee -= penalty; const { amount: executorTokenAfter } = await splToken.getAccount( connection, - executorToken + executorToken, ); expect(executorTokenAfter).equals(executorTokenBefore! + penalty); } if (bestOfferToken.equals(initialOfferToken)) { expect(bestOfferTokenAfter).equals( - bestOfferTokenBefore + depositAndFee + initAuctionFee + bestOfferTokenBefore + depositAndFee + initAuctionFee, ); } else { expect(bestOfferTokenAfter).equals(bestOfferTokenBefore + depositAndFee); expect(initialOfferTokenAfter).equals( - initialOfferTokenBefore + initAuctionFee + initialOfferTokenBefore + initAuctionFee, ); } } else { @@ -2108,19 +2111,19 @@ describe("Matching Engine", function () { if (bestOfferToken.equals(initialOfferToken)) { expect(bestOfferTokenAfter).equals( - bestOfferTokenBefore + depositAndFee + initAuctionFee + bestOfferTokenBefore + depositAndFee + initAuctionFee, ); } else { expect(bestOfferTokenAfter).equals(bestOfferTokenBefore + depositAndFee); expect(initialOfferTokenAfter).equals( - initialOfferTokenBefore + initAuctionFee + initialOfferTokenBefore + initAuctionFee, ); } } const { amount: custodyTokenAfter } = await engine.fetchCustodyTokenAccount(); expect(custodyTokenAfter).equals( - custodyTokenBefore - BigInt(amountIn.add(securityDeposit).toString()) + custodyTokenBefore - BigInt(amountIn.add(securityDeposit).toString()), ); // Validate the core message. @@ -2148,7 +2151,7 @@ describe("Matching Engine", function () { const sourceChain = wormholeSdk.coalesceChainId(fromChainName); const { mintRecipient: expectedMintRecipient } = await engine.fetchRouterEndpoint( - wormholeSdk.coalesceChainId(toChainName) + wormholeSdk.coalesceChainId(toChainName), ); expect(mintRecipient).to.eql(expectedMintRecipient); @@ -2204,14 +2207,14 @@ describe("Matching Engine", function () { cctpNonce, burnSource, mintRecipient: Array.from( - engine.custodyTokenAccountAddress().toBuffer() + engine.custodyTokenAccountAddress().toBuffer(), ), }, { slowOrderResponse: { baseFee: 420n, }, - } + }, ), }); @@ -2221,7 +2224,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - finalizedMessage + finalizedMessage, ); const fastVaa = await postLiquidityLayerVaa( connection, @@ -2229,7 +2232,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - fastMessage + fastMessage, ); const ix = await engine.prepareOrderResponseCctpIx( @@ -2242,7 +2245,7 @@ describe("Matching Engine", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ @@ -2253,11 +2256,11 @@ describe("Matching Engine", function () { // TODO: validate prepared slow order const fastVaaHash = await VaaAccount.fetch(connection, fastVaa).then((vaa) => - vaa.digest() + vaa.digest(), ); const preparedOrderResponse = engine.preparedOrderResponseAddress( payer.publicKey, - fastVaaHash + fastVaaHash, ); // Save for later. @@ -2270,7 +2273,7 @@ describe("Matching Engine", function () { expect(localVariables.delete("ix")).is.true; const preparedOrderResponse = localVariables.get( - "preparedOrderResponse" + "preparedOrderResponse", ) as PublicKey; expect(localVariables.delete("preparedOrderResponse")).is.true; @@ -2278,7 +2281,7 @@ describe("Matching Engine", function () { connection, [ix], [payer], - `Allocate: account Address { address: ${preparedOrderResponse.toString()}, base: None } already in use` + `Allocate: account Address { address: ${preparedOrderResponse.toString()}, base: None } already in use`, ); }); }); @@ -2303,7 +2306,7 @@ describe("Matching Engine", function () { connection, [prepareIx!, settleIx], [payer], - "Error Code: AuctionNotCompleted" + "Error Code: AuctionNotCompleted", ); }); @@ -2343,7 +2346,7 @@ describe("Matching Engine", function () { const liquidatorToken = await splToken.getAssociatedTokenAddress( USDC_MINT_ADDRESS, - liquidator.publicKey + liquidator.publicKey, ); const sourceCctpDomain = 0; @@ -2353,7 +2356,7 @@ describe("Matching Engine", function () { engine, sourceCctpDomain, cctpNonce, - amountIn + amountIn, ); const settleIx = await engine.settleAuctionActiveCctpIx( @@ -2367,12 +2370,11 @@ describe("Matching Engine", function () { preparedBy: payer.publicKey, encodedCctpMessage, }, - { targetChain: ethChain, remoteDomain: solanaChain } + { targetChain: ethChain, remoteDomain: solanaChain }, ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ units: 500_000, }); @@ -2383,7 +2385,7 @@ describe("Matching Engine", function () { "Error Code: AuctionNotActive", { addressLookupTableAccounts: [lookupTableAccount!], - } + }, ); }); it("Settle", async function () { @@ -2397,7 +2399,7 @@ describe("Matching Engine", function () { const liquidatorToken = await splToken.getAssociatedTokenAddress( USDC_MINT_ADDRESS, - liquidator.publicKey + liquidator.publicKey, ); const sourceCctpDomain = 0; @@ -2407,7 +2409,7 @@ describe("Matching Engine", function () { engine, sourceCctpDomain, cctpNonce, - amountIn + amountIn, ); const settleIx = await engine.settleAuctionActiveCctpIx( { @@ -2420,12 +2422,11 @@ describe("Matching Engine", function () { preparedBy: payer.publicKey, encodedCctpMessage, }, - { targetChain: ethChain, remoteDomain: solanaChain } + { targetChain: ethChain, remoteDomain: solanaChain }, ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ units: 500_000, }); @@ -2458,20 +2459,21 @@ describe("Matching Engine", function () { const { amount: feeBalanceBefore } = await splToken.getAccount( connection, - feeRecipientToken + feeRecipientToken, ); const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); await expectIxOk(connection, [computeIx, settleIx], [payer]); - const deposit = LiquidityLayerMessage.decode(finalizedVaaAccount.payload()) - .deposit!; + const deposit = LiquidityLayerMessage.decode( + finalizedVaaAccount.payload(), + ).deposit!; const { baseFee } = deposit.message.slowOrderResponse!; const { amount: feeBalanceAfter } = await splToken.getAccount( connection, - feeRecipientToken + feeRecipientToken, ); expect(feeBalanceAfter).equals(feeBalanceBefore + baseFee); @@ -2492,8 +2494,8 @@ describe("Matching Engine", function () { penalty: null, }, }, - null - ) + null, + ), ); }); }); @@ -2542,14 +2544,14 @@ describe("Matching Engine", function () { cctpNonce, burnSource, mintRecipient: Array.from( - engine.custodyTokenAccountAddress().toBuffer() + engine.custodyTokenAccountAddress().toBuffer(), ), }, { slowOrderResponse: { baseFee: 420n, }, - } + }, ), }); @@ -2559,7 +2561,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - finalizedMessage + finalizedMessage, ); const finalizedVaaAccount = await VaaAccount.fetch(connection, finalizedVaa); @@ -2569,7 +2571,7 @@ describe("Matching Engine", function () { MOCK_GUARDIANS, ethRouter, wormholeSequence++, - fastMessage + fastMessage, ); const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); @@ -2582,14 +2584,14 @@ describe("Matching Engine", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); const fastVaaHash = fastVaaAccount.digest(); const preparedBy = payer.publicKey; const preparedOrderResponse = engine.preparedOrderResponseAddress( preparedBy, - fastVaaHash + fastVaaHash, ); const auction = engine.auctionAddress(fastVaaHash); @@ -2599,7 +2601,7 @@ describe("Matching Engine", function () { payer: offerAuthorityOne.publicKey, fastVaa, }, - maxFee + maxFee, ); await expectIxOk(connection, [approveIx, ix], [offerAuthorityOne]); @@ -2614,7 +2616,7 @@ describe("Matching Engine", function () { .duration; await new Promise((f) => - setTimeout(f, startSlot.toNumber() + duration + 200) + setTimeout(f, startSlot.toNumber() + duration + 200), ); const ix = await engine.executeFastOrderCctpIx({ @@ -2653,7 +2655,7 @@ describe("Matching Engine", function () { fastMarketOrder: FastMarketOrder, emitter: number[], feeOffer?: bigint, - chainName?: wormholeSdk.ChainName + chainName?: wormholeSdk.ChainName, ): Promise<{ fastVaa: PublicKey; fastVaaAccount: VaaAccount; @@ -2668,7 +2670,7 @@ describe("Matching Engine", function () { emitter, sequence, new LiquidityLayerMessage({ fastMarketOrder }), - chainName + chainName, ); // Place the initial offer. @@ -2677,7 +2679,7 @@ describe("Matching Engine", function () { payer: offerAuthority.publicKey, fastVaa, }, - feeOffer ?? fastMarketOrder.maxFee + feeOffer ?? fastMarketOrder.maxFee, ); const txDetails = await expectIxOkDetails(connection, [approveIx, ix], [offerAuthority]); @@ -2695,7 +2697,7 @@ describe("Matching Engine", function () { async function improveOfferForTest( auction: PublicKey, offerAuthority: Keypair, - improveBy: number + improveBy: number, ) { const auctionData = await engine.fetchAuction({ address: auction }); const newOffer = BigInt(auctionData.info!.offerPrice.subn(improveBy).toString()); @@ -2705,7 +2707,7 @@ describe("Matching Engine", function () { auction, offerAuthority: offerAuthority.publicKey, }, - newOffer + newOffer, ); // Improve the bid with offer one. @@ -2725,20 +2727,20 @@ async function craftCctpTokenBurnMessage( sourceCctpDomain: number, cctpNonce: bigint, amount: bigint, - overrides: { destinationCctpDomain?: number } = {} + overrides: { destinationCctpDomain?: number } = {}, ) { const { destinationCctpDomain: inputDestinationCctpDomain } = overrides; const messageTransmitterProgram = engine.messageTransmitterProgram(); const { version, localDomain } = await messageTransmitterProgram.fetchMessageTransmitterConfig( - messageTransmitterProgram.messageTransmitterConfigAddress() + messageTransmitterProgram.messageTransmitterConfigAddress(), ); const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; const tokenMessengerMinterProgram = engine.tokenMessengerMinterProgram(); const { tokenMessenger: sourceTokenMessenger } = await tokenMessengerMinterProgram.fetchRemoteTokenMessenger( - tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain) + tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain), ); const burnMessage = new CctpTokenBurnMessage( @@ -2755,7 +2757,7 @@ async function craftCctpTokenBurnMessage( Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress Array.from(engine.custodyTokenAccountAddress().toBuffer()), // mint recipient amount, - new Array(32).fill(0) // burnSource + new Array(32).fill(0), // burnSource ); const encodedCctpMessage = burnMessage.encode(); From 369c74e14282a76fb111101c467e1d4898c23ed6 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 6 Feb 2024 14:12:41 -0600 Subject: [PATCH 109/126] solana: slots -> period; fix prettierrc --- solana/.prettierrc.json | 1 + .../matching-engine/src/state/auction.rs | 2 +- .../src/state/auction_config.rs | 2 +- .../matching-engine/src/utils/auction.rs | 20 +-- solana/ts/scripts/getTestnetInfo.ts | 115 ++++++++++++++++++ .../ts/scripts/setUpTestnetMatchingEngine.ts | 26 ++-- solana/ts/src/matchingEngine/index.ts | 2 +- .../src/matchingEngine/state/AuctionConfig.ts | 2 +- solana/ts/tests/01__matchingEngine.ts | 29 ++--- 9 files changed, 158 insertions(+), 41 deletions(-) create mode 100644 solana/ts/scripts/getTestnetInfo.ts diff --git a/solana/.prettierrc.json b/solana/.prettierrc.json index b0e52c3c..b1db937c 100644 --- a/solana/.prettierrc.json +++ b/solana/.prettierrc.json @@ -7,6 +7,7 @@ "tabWidth": 4, "useTabs": false, "singleQuote": false, + "trailingComma": "all", "bracketSpacing": true } } diff --git a/solana/programs/matching-engine/src/state/auction.rs b/solana/programs/matching-engine/src/state/auction.rs index e92bb7b7..56789cd8 100644 --- a/solana/programs/matching-engine/src/state/auction.rs +++ b/solana/programs/matching-engine/src/state/auction.rs @@ -73,7 +73,7 @@ impl AuctionInfo { /// Compute start slot + duration + grace period + penalty slots. #[inline] pub fn penalty_period_end_slot(&self, params: &AuctionParameters) -> u64 { - self.grace_period_end_slot(params) + u64::from(params.penalty_slots) + self.grace_period_end_slot(params) + u64::from(params.penalty_period) } /// Compute amount in + security deposit. diff --git a/solana/programs/matching-engine/src/state/auction_config.rs b/solana/programs/matching-engine/src/state/auction_config.rs index 6e5eb2aa..a48fb05d 100644 --- a/solana/programs/matching-engine/src/state/auction_config.rs +++ b/solana/programs/matching-engine/src/state/auction_config.rs @@ -19,7 +19,7 @@ pub struct AuctionParameters { pub grace_period: u16, // The `securityDeposit` decays over the `penaltyslots` slots period. - pub penalty_slots: u16, + pub penalty_period: u16, } #[account] diff --git a/solana/programs/matching-engine/src/utils/auction.rs b/solana/programs/matching-engine/src/utils/auction.rs index 06e017fb..4d77c9ab 100644 --- a/solana/programs/matching-engine/src/utils/auction.rs +++ b/solana/programs/matching-engine/src/utils/auction.rs @@ -24,7 +24,7 @@ pub fn compute_deposit_penalty( } else { let deposit = info.security_deposit; let penalty_period = slots_elapsed - params.grace_period as u64; - if penalty_period >= params.penalty_slots as u64 + if penalty_period >= params.penalty_period as u64 || params.initial_penalty_bps == FEE_PRECISION_MAX { split_user_penalty_reward(params, deposit) @@ -33,7 +33,7 @@ pub fn compute_deposit_penalty( // Adjust the base amount to determine scaled penalty. let scaled = (((deposit - base_penalty) as u128 * penalty_period as u128) - / params.penalty_slots as u128) as u64; + / params.penalty_period as u128) as u64; split_user_penalty_reward(params, base_penalty + scaled) } @@ -104,7 +104,7 @@ mod test { let params = params_for_test(); let amount = 10000000; - let slots_elapsed = params.duration + params.grace_period + params.penalty_slots; + let slots_elapsed = params.duration + params.grace_period + params.penalty_period; let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); let DepositPenalty { @@ -138,7 +138,7 @@ mod test { let params = params_for_test(); let amount = 10000000; - let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); let DepositPenalty { @@ -155,7 +155,7 @@ mod test { let params = params_for_test(); let amount = 10000000; - let slots_elapsed = params.duration + params.grace_period + params.penalty_slots - 1; + let slots_elapsed = params.duration + params.grace_period + params.penalty_period - 1; let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); let DepositPenalty { @@ -175,7 +175,7 @@ mod test { }; let amount = 10000000; - let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); let DepositPenalty { @@ -196,7 +196,7 @@ mod test { }; let amount = 10000000; - let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); let DepositPenalty { @@ -238,7 +238,7 @@ mod test { }; let amount = 10000000; - let slots_elapsed = params.duration + params.grace_period + params.penalty_slots / 2; + let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); let DepositPenalty { @@ -255,7 +255,7 @@ mod test { let params = AuctionParameters { user_penalty_reward_bps: common::constants::FEE_PRECISION_MAX / 2, initial_penalty_bps: common::constants::FEE_PRECISION_MAX / 2, - penalty_slots: 0, + penalty_period: 0, ..params_for_test() }; @@ -296,7 +296,7 @@ mod test { initial_penalty_bps: 100000, // 10% duration: 2, grace_period: 4, - penalty_slots: 20, + penalty_period: 20, }; require_valid_parameters(¶ms).unwrap(); diff --git a/solana/ts/scripts/getTestnetInfo.ts b/solana/ts/scripts/getTestnetInfo.ts new file mode 100644 index 00000000..7ed7ecf9 --- /dev/null +++ b/solana/ts/scripts/getTestnetInfo.ts @@ -0,0 +1,115 @@ +import { + ChainName, + coalesceChainId, + tryNativeToUint8Array, + tryUint8ArrayToNative, +} from "@certusone/wormhole-sdk"; +import * as splToken from "@solana/spl-token"; +import { + Connection, + Keypair, + PublicKey, + Transaction, + sendAndConfirmTransaction, +} from "@solana/web3.js"; +import * as matchingEngineSdk from "../src/matchingEngine"; +import * as tokenRouterSdk from "../src/tokenRouter"; + +const USDC_MINT = new PublicKey("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + +const CHAINS: ChainName[] = [ + "sepolia", + "avalanche", + "optimism_sepolia", + "arbitrum_sepolia", + "base_sepolia", + "polygon", +]; + +// Here we go. +main(); + +// impl + +async function main() { + const connection = new Connection("https://api.devnet.solana.com", "confirmed"); + + console.log("Collecting Solana Matching Engine and Token Router Info..."); + console.log(); + { + const matchingEngine = new matchingEngineSdk.MatchingEngineProgram( + connection, + matchingEngineSdk.testnet(), + USDC_MINT + ); + + const custodian = matchingEngine.custodianAddress(); + console.log(`Matching Engine Custodian: ${custodian.toString()}`); + console.log(); + console.log("NOTE: The Custodian's address is the Matching Engine's emitter."); + console.log(`Emitter Address: ${custodian.toBuffer().toString("hex")}`); + console.log(); + + const custodyToken = matchingEngine.custodyTokenAccountAddress(); + console.log(`Matching Engine Custody Token: ${custodyToken.toString()}`); + console.log(); + console.log( + "NOTE: The Custody Token Account's address is the Matching Engine's mint recipient." + ); + console.log(`Mint Recipient Address: ${custodyToken.toBuffer().toString("hex")}`); + console.log(); + + const custodianData = await matchingEngine.fetchCustodian(); + console.log("Custodian Data"); + console.log(JSON.stringify(custodianData, null, 2)); + console.log(); + + const auctionConfig = await matchingEngine.fetchAuctionConfig( + custodianData.auctionConfigId + ); + console.log("Auction Config Data"); + console.log(JSON.stringify(auctionConfig, null, 2)); + console.log(); + + for (const chainName of CHAINS) { + const chain = coalesceChainId(chainName); + const endpointData = await matchingEngine.fetchRouterEndpoint(chain); + console.log(`Router Endpoint: ${chainName} (${chain})`); + console.log(stringifyEndpoint(chainName, endpointData)); + console.log(); + } + } + + { + const tokenRouter = new tokenRouterSdk.TokenRouterProgram( + connection, + tokenRouterSdk.testnet(), + USDC_MINT + ); + + const custodian = tokenRouter.custodianAddress(); + console.log(`Token Router Custodian: ${custodian.toString()}`); + console.log(); + console.log("NOTE: The Custodian's address is the Token Router's emitter."); + console.log(`Emitter Address: ${custodian.toBuffer().toString("hex")}`); + console.log(); + + const custodyToken = tokenRouter.custodyTokenAccountAddress(); + console.log(`Token Router Custody Token: ${custodyToken.toString()}`); + console.log(); + console.log( + "NOTE: The Custody Token Account's address is the Token Router's mint recipient." + ); + console.log(`Mint Recipient Address: ${custodyToken.toBuffer().toString("hex")}`); + console.log(); + } +} + +function stringifyEndpoint(chainName: ChainName, endpoint: matchingEngineSdk.RouterEndpoint) { + const out = { + address: tryUint8ArrayToNative(Uint8Array.from(endpoint.address), chainName), + mintRecipient: tryUint8ArrayToNative(Uint8Array.from(endpoint.mintRecipient), chainName), + protocol: endpoint.protocol, + }; + return JSON.stringify(out, null, 2); +} diff --git a/solana/ts/scripts/setUpTestnetMatchingEngine.ts b/solana/ts/scripts/setUpTestnetMatchingEngine.ts index 8de5f16c..64c1da90 100644 --- a/solana/ts/scripts/setUpTestnetMatchingEngine.ts +++ b/solana/ts/scripts/setUpTestnetMatchingEngine.ts @@ -18,7 +18,7 @@ const AUCTION_PARAMS: AuctionParameters = { initialPenaltyBps: 250000, // 25% duration: 5, // slots gracePeriod: 10, // slots - penaltySlots: 20, // slots + penaltyPeriod: 20, // slots }; // Here we go. @@ -102,19 +102,19 @@ async function main() { ); } { - // TODO: This is a placeholder. + // https://sepolia.basescan.org/address/0x4452b708c01d6ad7058a7541a3a82f0ad0a1abb1 const foreignChain = "base_sepolia"; - const foreignEmitter = "0xc1Cf3501ef0b26c8A47759F738832563C7cB014A"; + const foreignEmitter = "0x4452B708C01d6aD7058a7541A3A82f0aD0A1abB1"; const cctpDomain = 6; - // await addCctpRouterEndpoint( - // matchingEngine, - // payer, - // foreignChain, - // cctpDomain, - // foreignEmitter, - // null - // ); + await addCctpRouterEndpoint( + matchingEngine, + payer, + foreignChain, + cctpDomain, + foreignEmitter, + null + ); } { // https://mumbai.polygonscan.com/address/0x3Ce8a3aC230Eb4bCE3688f2A1ab21d986a0A0B06 @@ -197,7 +197,7 @@ async function addCctpRouterEndpoint( Buffer.from(mintRecipient).equals(Buffer.from(endpointMintRecipient ?? endpointAddress)) ) { console.log( - "already exists", + "endpoint already exists", foreignChain, "addr", foreignEmitter, @@ -223,7 +223,7 @@ async function addCctpRouterEndpoint( ); const txSig = await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]); console.log( - "register emitter and domain", + "added endpoint", txSig, "chain", foreignChain, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 3f30cf22..8ad619f8 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -1360,7 +1360,7 @@ export class MatchingEngineProgram { const amount = BigInt(auctionInfo.securityDeposit.toString()); const penaltyPeriod = slotsElapsed - gracePeriod; - const auctionPenaltySlots = BigInt(auctionParams.penaltySlots); + const auctionPenaltySlots = BigInt(auctionParams.penaltyPeriod); const initialPenaltyBps = BigInt(auctionParams.initialPenaltyBps); const userPenaltyRewardBps = BigInt(auctionParams.userPenaltyRewardBps); diff --git a/solana/ts/src/matchingEngine/state/AuctionConfig.ts b/solana/ts/src/matchingEngine/state/AuctionConfig.ts index f1cd62ec..60c3de69 100644 --- a/solana/ts/src/matchingEngine/state/AuctionConfig.ts +++ b/solana/ts/src/matchingEngine/state/AuctionConfig.ts @@ -5,7 +5,7 @@ export type AuctionParameters = { initialPenaltyBps: number; duration: number; gracePeriod: number; - penaltySlots: number; + penaltyPeriod: number; }; export class AuctionConfig { diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 8177f85c..85331e67 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -92,7 +92,7 @@ describe("Matching Engine", function () { initialPenaltyBps: 250000, duration: 2, gracePeriod: 5, - penaltySlots: 10, + penaltyPeriod: 10, }; const localVariables = new Map(); @@ -1633,12 +1633,12 @@ describe("Matching Engine", function () { ); const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); - const { duration, gracePeriod, penaltySlots } = + const { duration, gracePeriod, penaltyPeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, auctionDataBefore - .info!.startSlot.addn(duration + gracePeriod + penaltySlots / 2) + .info!.startSlot.addn(duration + gracePeriod + penaltyPeriod / 2) .toNumber(), ); @@ -1702,12 +1702,12 @@ describe("Matching Engine", function () { liquidatorToken, ); - const { duration, gracePeriod, penaltySlots } = + const { duration, gracePeriod, penaltyPeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, auctionDataBefore - .info!.startSlot.addn(duration + gracePeriod + penaltySlots / 2) + .info!.startSlot.addn(duration + gracePeriod + penaltyPeriod / 2) .toNumber(), ); @@ -1772,12 +1772,12 @@ describe("Matching Engine", function () { liquidatorToken, ); - const { duration, gracePeriod, penaltySlots } = + const { duration, gracePeriod, penaltyPeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( connection, auctionDataBefore - .info!.startSlot.addn(duration + gracePeriod + penaltySlots + 2) + .info!.startSlot.addn(duration + gracePeriod + penaltyPeriod + 2) .toNumber(), ); @@ -2373,8 +2373,9 @@ describe("Matching Engine", function () { { targetChain: ethChain, remoteDomain: solanaChain }, ); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ units: 500_000, }); @@ -2425,8 +2426,9 @@ describe("Matching Engine", function () { { targetChain: ethChain, remoteDomain: solanaChain }, ); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ units: 500_000, }); @@ -2466,9 +2468,8 @@ describe("Matching Engine", function () { await expectIxOk(connection, [computeIx, settleIx], [payer]); - const deposit = LiquidityLayerMessage.decode( - finalizedVaaAccount.payload(), - ).deposit!; + const deposit = LiquidityLayerMessage.decode(finalizedVaaAccount.payload()) + .deposit!; const { baseFee } = deposit.message.slowOrderResponse!; const { amount: feeBalanceAfter } = await splToken.getAccount( From 61c088601fe8fbd98e776e8f7140ffc29ede85c8 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 6 Feb 2024 20:12:51 -0600 Subject: [PATCH 110/126] solana: add redeemer message to prepared fill --- solana/modules/common/src/messages/raw/mod.rs | 18 ++ .../processor/auction/settle/active/mod.rs | 7 +- .../src/processor/auction/settle/none/mod.rs | 12 +- .../programs/matching-engine/src/utils/mod.rs | 10 +- solana/programs/token-router/src/error.rs | 3 + .../src/processor/redeem_fill/cctp.rs | 51 ++++- .../src/processor/redeem_fill/fast.rs | 43 +++- .../token-router/src/state/prepared_fill.rs | 10 +- .../ts/src/tokenRouter/state/PreparedFill.ts | 11 +- solana/ts/tests/02__tokenRouter.ts | 196 +++++++++--------- solana/ts/tests/04__interaction.ts | 47 +++-- 11 files changed, 260 insertions(+), 148 deletions(-) diff --git a/solana/modules/common/src/messages/raw/mod.rs b/solana/modules/common/src/messages/raw/mod.rs index 0645bb9c..dab80660 100644 --- a/solana/modules/common/src/messages/raw/mod.rs +++ b/solana/modules/common/src/messages/raw/mod.rs @@ -237,3 +237,21 @@ impl<'a> FastMarketOrder<'a> { Ok(fast_market_order) } } + +pub trait MessageToVec { + fn message_to_vec(&self) -> Vec; +} + +impl<'a> MessageToVec for Fill<'a> { + fn message_to_vec(&self) -> Vec { + let msg: &[_] = self.redeemer_message().into(); + msg.to_vec() + } +} + +impl<'a> MessageToVec for FastMarketOrder<'a> { + fn message_to_vec(&self) -> Vec { + let msg: &[_] = self.redeemer_message().into(); + msg.to_vec() + } +} diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index 341651c2..a6c70024 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -11,7 +11,10 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - messages::{raw::LiquidityLayerMessage, Fill}, + messages::{ + raw::{LiquidityLayerMessage, MessageToVec}, + Fill, + }, wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, }; @@ -126,7 +129,7 @@ fn settle_active_and_prepare_fill( source_chain: prepared_order_response.source_chain, order_sender: order.sender(), redeemer: order.redeemer(), - redeemer_message: utils::take_order_message(order).into(), + redeemer_message: order.message_to_vec().into(), }, }) } diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs index 0ec7ca6d..72aab29e 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -4,14 +4,14 @@ pub use cctp::*; mod local; pub use local::*; -use crate::{ - state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, RouterEndpoint}, - utils, -}; +use crate::state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, RouterEndpoint}; use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - messages::{raw::LiquidityLayerMessage, Fill}, + messages::{ + raw::{LiquidityLayerMessage, MessageToVec}, + Fill, + }, wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, }; @@ -98,7 +98,7 @@ fn settle_none_and_prepare_fill( source_chain: prepared_order_response.source_chain, order_sender: order.sender(), redeemer: order.redeemer(), - redeemer_message: utils::take_order_message(order).into(), + redeemer_message: order.message_to_vec().into(), }, }) } diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 3ae4840a..27286f8f 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -5,9 +5,7 @@ use crate::{ state::{Auction, AuctionConfig, AuctionStatus, RouterEndpoint}, }; use anchor_lang::prelude::*; -use common::{ - messages::raw::FastMarketOrder, wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, -}; +use common::wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; pub fn require_valid_router_path( vaa: &VaaAccount<'_>, @@ -69,9 +67,3 @@ pub fn is_valid_active_auction( _ => err!(MatchingEngineError::AuctionNotActive), } } - -#[inline] -pub fn take_order_message(order: FastMarketOrder<'_>) -> Vec { - let msg: &[_] = order.redeemer_message().into(); - msg.to_vec() -} diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index a7ce9327..5e6aef7c 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -77,6 +77,9 @@ pub enum TokenRouterError { #[msg("InvalidSourceRouter")] InvalidSourceRouter = 0x200, + #[msg("InvalidVaa")] + InvalidVaa = 0x201, + #[msg("InvalidDepositMessage")] InvalidDepositMessage = 0x202, diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index deb981ed..d9c4fb55 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -2,10 +2,10 @@ use crate::{ error::TokenRouterError, state::{Custodian, FillType, PreparedFill}, }; -use anchor_lang::prelude::*; +use anchor_lang::{prelude::*, system_program}; use anchor_spl::token; use common::{ - messages::raw::LiquidityLayerDepositMessage, + messages::raw::{LiquidityLayerDepositMessage, LiquidityLayerMessage, MessageToVec}, wormhole_cctp_solana::{ self, cctp::{message_transmitter_program, token_messenger_minter_program}, @@ -37,7 +37,7 @@ pub struct RedeemCctpFill<'info> { #[account( init_if_needed, payer = payer, - space = 8 + PreparedFill::INIT_SPACE, + space = compute_prepared_fill_size(&vaa)?, seeds = [ PreparedFill::SEED_PREFIX, VaaAccount::load(&vaa)?.try_digest()?.as_ref(), @@ -201,9 +201,29 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) let amount = u64::try_from(ruint::aliases::U256::from_be_bytes(deposit.amount())).unwrap(); // Verify as Liquiditiy Layer Deposit message. - let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) - .map_err(|_| TokenRouterError::InvalidDepositMessage)?; - let fill = msg.fill().ok_or(TokenRouterError::InvalidPayloadId)?; + let fill = LiquidityLayerDepositMessage::try_from(deposit.payload()) + .unwrap() + .to_fill_unchecked(); + + { + let data_len = PreparedFill::compute_size(fill.redeemer_message_len().try_into().unwrap()); + let acc_info: &AccountInfo = ctx.accounts.prepared_fill.as_ref(); + let lamport_diff = Rent::get().map(|rent| { + rent.minimum_balance(data_len) + .saturating_sub(acc_info.lamports()) + })?; + system_program::transfer( + CpiContext::new( + ctx.accounts.system_program.to_account_info(), + system_program::Transfer { + from: ctx.accounts.payer.to_account_info(), + to: ctx.accounts.prepared_fill.to_account_info(), + }, + ), + lamport_diff, + )?; + acc_info.realloc(data_len, false)?; + } // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { @@ -212,11 +232,28 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) redeemer: Pubkey::from(fill.redeemer()), prepared_by: ctx.accounts.payer.key(), fill_type: FillType::WormholeCctpDeposit, + amount, source_chain: fill.source_chain(), order_sender: fill.order_sender(), - amount, + redeemer_message: fill.message_to_vec(), }); // Done. Ok(()) } + +fn compute_prepared_fill_size(vaa_acc_info: &AccountInfo<'_>) -> Result { + let vaa = VaaAccount::load(vaa_acc_info)?; + let msg = LiquidityLayerMessage::try_from(vaa.try_payload()?) + .map_err(|_| TokenRouterError::InvalidVaa)?; + + let deposit = msg.deposit().ok_or(TokenRouterError::InvalidPayloadId)?; + let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) + .map_err(|_| TokenRouterError::InvalidDepositMessage)?; + let fill = msg.fill().ok_or(TokenRouterError::InvalidPayloadId)?; + Ok(fill + .redeemer_message_len() + .try_into() + .map(PreparedFill::compute_size) + .unwrap()) +} diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 9b2f0548..a4f825ea 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -2,10 +2,10 @@ use crate::{ error::TokenRouterError, state::{Custodian, FillType, PreparedFill}, }; -use anchor_lang::prelude::*; +use anchor_lang::{prelude::*, system_program}; use anchor_spl::token; use common::{ - messages::raw::LiquidityLayerMessage, + messages::raw::{LiquidityLayerMessage, MessageToVec}, wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, }; @@ -32,7 +32,7 @@ pub struct RedeemFastFill<'info> { #[account( init_if_needed, payer = payer, - space = 8 + PreparedFill::INIT_SPACE, + space = compute_prepared_fill_size(&vaa)?, seeds = [ PreparedFill::SEED_PREFIX, VaaAccount::load(&vaa)?.try_digest()?.as_ref(), @@ -114,6 +114,26 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { let fill = fast_fill.fill(); + { + let data_len = PreparedFill::compute_size(fill.redeemer_message_len().try_into().unwrap()); + let acc_info: &AccountInfo = ctx.accounts.prepared_fill.as_ref(); + let lamport_diff = Rent::get().map(|rent| { + rent.minimum_balance(data_len) + .saturating_sub(acc_info.lamports()) + })?; + system_program::transfer( + CpiContext::new( + ctx.accounts.system_program.to_account_info(), + system_program::Transfer { + from: ctx.accounts.payer.to_account_info(), + to: ctx.accounts.prepared_fill.to_account_info(), + }, + ), + lamport_diff, + )?; + acc_info.realloc(data_len, false)?; + } + // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { vaa_hash: vaa.try_digest().unwrap().0, @@ -121,11 +141,26 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { redeemer: Pubkey::from(fill.redeemer()), prepared_by: ctx.accounts.payer.key(), fill_type: FillType::FastFill, + amount: fast_fill.amount(), source_chain: fill.source_chain(), order_sender: fill.order_sender(), - amount: fast_fill.amount(), + redeemer_message: fill.message_to_vec(), }); // Done. Ok(()) } + +fn compute_prepared_fill_size(vaa_acc_info: &AccountInfo<'_>) -> Result { + let vaa = VaaAccount::load(vaa_acc_info)?; + let msg = LiquidityLayerMessage::try_from(vaa.try_payload().unwrap()) + .map_err(|_| TokenRouterError::InvalidVaa)?; + + let fast_fill = msg.fast_fill().ok_or(TokenRouterError::InvalidPayloadId)?; + Ok(fast_fill + .fill() + .redeemer_message_len() + .try_into() + .map(PreparedFill::compute_size) + .unwrap()) +} diff --git a/solana/programs/token-router/src/state/prepared_fill.rs b/solana/programs/token-router/src/state/prepared_fill.rs index ff926f38..bc09e0ce 100644 --- a/solana/programs/token-router/src/state/prepared_fill.rs +++ b/solana/programs/token-router/src/state/prepared_fill.rs @@ -8,7 +8,7 @@ pub enum FillType { } #[account] -#[derive(Debug, InitSpace)] +#[derive(Debug)] pub struct PreparedFill { pub vaa_hash: [u8; 32], pub bump: u8, @@ -17,11 +17,17 @@ pub struct PreparedFill { pub prepared_by: Pubkey, pub fill_type: FillType, + pub amount: u64, + pub source_chain: u16, pub order_sender: [u8; 32], - pub amount: u64, + pub redeemer_message: Vec, } impl PreparedFill { pub const SEED_PREFIX: &'static [u8] = b"fill"; + + pub fn compute_size(payload_len: usize) -> usize { + 8 + 32 + 1 + 32 + 32 + FillType::INIT_SPACE + 8 + 2 + 32 + 4 + payload_len + } } diff --git a/solana/ts/src/tokenRouter/state/PreparedFill.ts b/solana/ts/src/tokenRouter/state/PreparedFill.ts index 916ce6e5..4a1bd5ad 100644 --- a/solana/ts/src/tokenRouter/state/PreparedFill.ts +++ b/solana/ts/src/tokenRouter/state/PreparedFill.ts @@ -13,9 +13,10 @@ export class PreparedFill { redeemer: PublicKey; preparedBy: PublicKey; fillType: FillType; + amount: BN; sourceChain: number; orderSender: Array; - amount: BN; + redeemerMessage: Buffer; constructor( vaaHash: Array, @@ -23,24 +24,26 @@ export class PreparedFill { redeemer: PublicKey, preparedBy: PublicKey, fillType: FillType, + amount: BN, sourceChain: number, orderSender: Array, - amount: BN + redeemerMessage: Buffer, ) { this.vaaHash = vaaHash; this.bump = bump; this.redeemer = redeemer; this.preparedBy = preparedBy; this.fillType = fillType; + this.amount = amount; this.sourceChain = sourceChain; this.orderSender = orderSender; - this.amount = amount; + this.redeemerMessage = redeemerMessage; } static address(programId: PublicKey, vaaHash: Array | Uint8Array | Buffer) { return PublicKey.findProgramAddressSync( [Buffer.from("fill"), Buffer.from(vaaHash)], - programId + programId, )[0]; } } diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index bbef2d6c..3341af0b 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -59,13 +59,13 @@ describe("Token Router", function () { const unknownAta = splToken.getAssociatedTokenAddressSync( mint, tokenRouter.custodianAddress(), - true + true, ); await expectIxErr( connection, [ix], [payer], - `Instruction references an unknown account ${unknownAta.toString()}` + `Instruction references an unknown account ${unknownAta.toString()}`, ); }); @@ -93,13 +93,13 @@ describe("Token Router", function () { payer.publicKey, // owner null, // pendingOwner ownerAssistant.publicKey, - payer.publicKey // pausedSetBy - ) + payer.publicKey, // pausedSetBy + ), ); const { amount } = await splToken.getAccount( connection, - tokenRouter.custodyTokenAccountAddress() + tokenRouter.custodyTokenAccountAddress(), ); expect(amount).to.equal(0n); }); @@ -116,7 +116,7 @@ describe("Token Router", function () { [payer], `Allocate: account Address { address: ${tokenRouter .custodianAddress() - .toString()}, base: None } already in use` + .toString()}, base: None } already in use`, ); }); @@ -127,7 +127,7 @@ describe("Token Router", function () { authority: payer.publicKey, payer: payer.publicKey, recentSlot: slot, - }) + }), ); await expectIxOk(connection, [createIx], [payer]); @@ -169,7 +169,7 @@ describe("Token Router", function () { lamports: 1000000000, }), ], - [payer] + [payer], ); }); }); @@ -232,7 +232,7 @@ describe("Token Router", function () { connection, [ix], [ownerAssistant], - "Error Code: NotPendingOwner" + "Error Code: NotPendingOwner", ); }); @@ -319,7 +319,7 @@ describe("Token Router", function () { newOwnerAssistant: ownerAssistant.publicKey, }), ], - [owner] + [owner], ); }); }); @@ -330,7 +330,7 @@ describe("Token Router", function () { { ownerOrAssistant: payer.publicKey, }, - true // paused + true, // paused ); await expectIxErr(connection, [ix], [payer], "Error Code: OwnerOrAssistantOnly"); @@ -342,7 +342,7 @@ describe("Token Router", function () { { ownerOrAssistant: ownerAssistant.publicKey, }, - paused + paused, ); await expectIxOk(connection, [ix], [ownerAssistant]); @@ -358,7 +358,7 @@ describe("Token Router", function () { { ownerOrAssistant: owner.publicKey, }, - paused + paused, ); await expectIxOk(connection, [ix], [owner]); @@ -381,7 +381,7 @@ describe("Token Router", function () { describe("Preparing Order", function () { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - payer.publicKey + payer.publicKey, ); const localVariables = new Map(); @@ -421,14 +421,14 @@ describe("Token Router", function () { targetChain, redeemer, redeemerMessage, - } + }, ); const approveIx = splToken.createApproveInstruction( payerToken, tokenRouter.custodianAddress(), payer.publicKey, - amountIn + amountIn, ); const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); @@ -439,7 +439,7 @@ describe("Token Router", function () { expect(balanceAfter).equals(balanceBefore - amountIn); const preparedOrderData = await tokenRouter.fetchPreparedOrder( - preparedOrder.publicKey + preparedOrder.publicKey, ); expect(preparedOrderData).to.eql( new PreparedOrder( @@ -457,8 +457,8 @@ describe("Token Router", function () { targetChain, redeemer, }, - redeemerMessage - ) + redeemerMessage, + ), ); }); @@ -481,14 +481,14 @@ describe("Token Router", function () { targetChain: foreignChain, redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), redeemerMessage: Buffer.from("All your base are belong to us"), - } + }, ); const approveIx = splToken.createApproveInstruction( payerToken, tokenRouter.custodianAddress(), payer.publicKey, - amountIn + amountIn, ); const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); @@ -524,7 +524,7 @@ describe("Token Router", function () { connection, [ix], [ownerAssistant, orderSender], - "Error Code: PreparedByMismatch" + "Error Code: PreparedByMismatch", ); }); @@ -540,7 +540,7 @@ describe("Token Router", function () { connection, [ix], [payer, ownerAssistant], - "Error Code: OrderSenderMismatch" + "Error Code: OrderSenderMismatch", ); }); @@ -559,7 +559,7 @@ describe("Token Router", function () { connection, [ix], [payer, orderSender], - "Error Code: RefundTokenMismatch" + "Error Code: RefundTokenMismatch", ); }); @@ -590,7 +590,7 @@ describe("Token Router", function () { describe("Place Market Order (CCTP)", function () { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - payer.publicKey + payer.publicKey, ); const orderSender = Keypair.generate(); @@ -610,7 +610,7 @@ describe("Token Router", function () { await expectIxOk( connection, [approveIx, prepareIx], - [payer, orderSender, preparedOrder] + [payer, orderSender, preparedOrder], ); // Save for later. @@ -631,7 +631,7 @@ describe("Token Router", function () { }); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxErr( connection, @@ -640,7 +640,7 @@ describe("Token Router", function () { "Error Code: AccountNotInitialized", { addressLookupTableAccounts: [lookupTableAccount!], - } + }, ); }); @@ -664,7 +664,7 @@ describe("Token Router", function () { connection, [ix], [payer, someoneElse], - "Error Code: OrderSenderMismatch" + "Error Code: OrderSenderMismatch", ); }); @@ -682,11 +682,11 @@ describe("Token Router", function () { const custodyToken = tokenRouter.custodyTokenAccountAddress(); const { amount: balanceBefore } = await splToken.getAccount( connection, - custodyToken + custodyToken, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxOk(connection, [ix], [payer, orderSender], { addressLookupTableAccounts: [lookupTableAccount!], @@ -695,7 +695,7 @@ describe("Token Router", function () { // Check balance of custody account. const { amount: balanceAfter } = await splToken.getAccount( connection, - custodyToken + custodyToken, ); expect(balanceAfter).equals(balanceBefore - amountIn); @@ -707,7 +707,7 @@ describe("Token Router", function () { { ownerOrAssistant: owner.publicKey, }, - true // paused + true, // paused ); await expectIxOk(connection, [ix], [owner]); @@ -720,7 +720,7 @@ describe("Token Router", function () { await expectIxOk( connection, [approveIx, approveIx, prepareIx], - [payer, orderSender, preparedOrder] + [payer, orderSender, preparedOrder], ); // Save for later. @@ -744,7 +744,7 @@ describe("Token Router", function () { { ownerOrAssistant: ownerAssistant.publicKey, }, - false // paused + false, // paused ); await expectIxOk(connection, [ix], [ownerAssistant]); @@ -764,11 +764,11 @@ describe("Token Router", function () { const custodyToken = tokenRouter.custodyTokenAccountAddress(); const { amount: balanceBefore } = await splToken.getAccount( connection, - custodyToken + custodyToken, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxOk(connection, [ix], [payer, orderSender], { addressLookupTableAccounts: [lookupTableAccount!], @@ -777,7 +777,7 @@ describe("Token Router", function () { // Check balance. const { amount: balanceAfter } = await splToken.getAccount( connection, - custodyToken + custodyToken, ); expect(balanceAfter).equals(balanceBefore - amountIn); @@ -796,13 +796,13 @@ describe("Token Router", function () { }, { targetChain: foreignChain, - } + }, ); const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxOk( connection, @@ -810,7 +810,7 @@ describe("Token Router", function () { [payer, orderSender, preparedOrder], { addressLookupTableAccounts: [lookupTableAccount!], - } + }, ); const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); @@ -839,14 +839,14 @@ describe("Token Router", function () { targetChain: foreignChain, redeemer, redeemerMessage, - } + }, ); const approveIx = splToken.createApproveInstruction( payerToken, tokenRouter.custodianAddress(), payer.publicKey, - amountIn + amountIn, ); return { preparedOrder, approveIx, prepareIx }; @@ -860,13 +860,13 @@ describe("Token Router", function () { const { preparedOrder, amountIn, burnSource } = args; const { value: payerSequenceValue } = await tokenRouter.fetchPayerSequence( - tokenRouter.payerSequenceAddress(payer.publicKey) + tokenRouter.payerSequenceAddress(payer.publicKey), ); const { message: { emitterAddress, payload }, } = await getPostedMessage( connection, - tokenRouter.coreMessageAddress(payer.publicKey, payerSequenceValue.subn(1)) + tokenRouter.coreMessageAddress(payer.publicKey, payerSequenceValue.subn(1)), ); expect(emitterAddress).to.eql(tokenRouter.custodianAddress().toBuffer()); @@ -904,9 +904,9 @@ describe("Token Router", function () { redeemer, redeemerMessage, }, - } + }, ), - }) + }), ); const accInfo = await connection.getAccountInfo(preparedOrder); @@ -916,7 +916,7 @@ describe("Token Router", function () { describe("Redeem Fill (CCTP)", function () { const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() + tokenRouter.custodyTokenAccountAddress().toBuffer(), ); const sourceCctpDomain = 0; const amount = 69n; @@ -936,7 +936,7 @@ describe("Token Router", function () { cctpNonce, encodedMintRecipient, amount, - burnSource + burnSource, ); const message = new LiquidityLayerMessage({ @@ -951,10 +951,13 @@ describe("Token Router", function () { mintRecipient: encodedMintRecipient, }, { - slowOrderResponse: { - baseFee: 69n, + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, - } + }, ), }); @@ -965,7 +968,7 @@ describe("Token Router", function () { foreignEndpointAddress, wormholeSequence++, message, - "polygon" + "polygon", ); const ix = await tokenRouter.redeemCctpFillIx( { @@ -978,11 +981,11 @@ describe("Token Router", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxErr(connection, [ix], [payer], "Error Code: InvalidSourceRouter", { addressLookupTableAccounts: [lookupTableAccount!], @@ -1000,7 +1003,7 @@ describe("Token Router", function () { cctpNonce, encodedMintRecipient, amount, - burnSource + burnSource, ); const message = new LiquidityLayerMessage({ @@ -1015,10 +1018,13 @@ describe("Token Router", function () { mintRecipient: encodedMintRecipient, }, { - slowOrderResponse: { - baseFee: 69n, + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, - } + }, ), }); @@ -1028,7 +1034,7 @@ describe("Token Router", function () { MOCK_GUARDIANS, new Array(32).fill(0), // emitter address wormholeSequence++, - message + message, ); const ix = await tokenRouter.redeemCctpFillIx( { @@ -1038,11 +1044,11 @@ describe("Token Router", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxErr(connection, [ix], [payer], "Error Code: InvalidSourceRouter", { addressLookupTableAccounts: [lookupTableAccount!], @@ -1060,7 +1066,7 @@ describe("Token Router", function () { cctpNonce, encodedMintRecipient, amount, - burnSource + burnSource, ); const message = new LiquidityLayerMessage({ @@ -1078,7 +1084,7 @@ describe("Token Router", function () { slowOrderResponse: { baseFee: 69n, }, - } + }, ), }); @@ -1092,7 +1098,7 @@ describe("Token Router", function () { MOCK_GUARDIANS, foreignEndpointAddress, wormholeSequence++, - encodedMessage + encodedMessage, ); const ix = await tokenRouter.redeemCctpFillIx( { @@ -1102,7 +1108,7 @@ describe("Token Router", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ @@ -1110,7 +1116,7 @@ describe("Token Router", function () { }); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxErr( connection, @@ -1119,7 +1125,7 @@ describe("Token Router", function () { "Error Code: InvalidDepositMessage", { addressLookupTableAccounts: [lookupTableAccount!], - } + }, ); }); @@ -1134,7 +1140,7 @@ describe("Token Router", function () { cctpNonce, encodedMintRecipient, amount, - burnSource + burnSource, ); const message = new LiquidityLayerMessage({ @@ -1152,7 +1158,7 @@ describe("Token Router", function () { slowOrderResponse: { baseFee: 69n, }, - } + }, ), }); @@ -1162,7 +1168,7 @@ describe("Token Router", function () { MOCK_GUARDIANS, foreignEndpointAddress, wormholeSequence++, - message + message, ); const ix = await tokenRouter.redeemCctpFillIx( { @@ -1172,11 +1178,11 @@ describe("Token Router", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxErr(connection, [ix], [payer], "Error Code: InvalidPayloadId", { addressLookupTableAccounts: [lookupTableAccount!], @@ -1188,7 +1194,7 @@ describe("Token Router", function () { { ownerOrAssistant: ownerAssistant.publicKey, }, - foreignChain + foreignChain, ); await expectIxOk(connection, [ix], [ownerAssistant]); @@ -1205,7 +1211,7 @@ describe("Token Router", function () { cctpNonce, encodedMintRecipient, amount, - burnSource + burnSource, ); const message = new LiquidityLayerMessage({ @@ -1226,7 +1232,7 @@ describe("Token Router", function () { redeemer: Array.from(redeemer.publicKey.toBuffer()), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, - } + }, ), }); @@ -1236,7 +1242,7 @@ describe("Token Router", function () { MOCK_GUARDIANS, foreignEndpointAddress, wormholeSequence++, - message + message, ); const ix = await tokenRouter.redeemCctpFillIx( { @@ -1246,11 +1252,11 @@ describe("Token Router", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized", { addressLookupTableAccounts: [lookupTableAccount!], @@ -1271,7 +1277,7 @@ describe("Token Router", function () { address: foreignEndpointAddress, cctpDomain: foreignCctpDomain, mintRecipient: null, - } + }, ); await expectIxOk(connection, [ix], [ownerAssistant]); @@ -1289,7 +1295,7 @@ describe("Token Router", function () { payer: payer.publicKey, vaa, }, - args + args, ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ @@ -1299,11 +1305,11 @@ describe("Token Router", function () { const custodyToken = tokenRouter.custodyTokenAccountAddress(); const { amount: balanceBefore } = await splToken.getAccount( connection, - custodyToken + custodyToken, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxOk(connection, [computeIx, ix], [payer], { addressLookupTableAccounts: [lookupTableAccount!], @@ -1312,7 +1318,7 @@ describe("Token Router", function () { // Check balance. const { amount: balanceAfter } = await splToken.getAccount( connection, - custodyToken + custodyToken, ); expect(balanceAfter).equals(balanceBefore + amount); @@ -1334,11 +1340,11 @@ describe("Token Router", function () { payer: payer.publicKey, vaa, }, - args + args, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress + lookupTableAddress, ); await expectIxOk(connection, [ix], [payer], { addressLookupTableAccounts: [lookupTableAccount!], @@ -1367,7 +1373,7 @@ describe("Token Router", function () { async function redeemFillCctp() { const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer() + tokenRouter.custodyTokenAccountAddress().toBuffer(), ); const sourceCctpDomain = 0; const cctpNonce = testCctpNonce++; @@ -1382,7 +1388,7 @@ describe("Token Router", function () { cctpNonce, encodedMintRecipient, amount, - burnSource + burnSource, ); const message = new LiquidityLayerMessage({ @@ -1403,7 +1409,7 @@ describe("Token Router", function () { redeemer: Array.from(redeemer.publicKey.toBuffer()), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, - } + }, ), }); @@ -1413,7 +1419,7 @@ describe("Token Router", function () { MOCK_GUARDIANS, foreignEndpointAddress, wormholeSequence++, - message + message, ); const redeemIx = await tokenRouter.redeemCctpFillIx( { @@ -1423,7 +1429,7 @@ describe("Token Router", function () { { encodedCctpMessage, cctpAttestation, - } + }, ); return { amount, message, vaa, redeemIx }; @@ -1439,20 +1445,20 @@ async function craftCctpTokenBurnMessage( encodedMintRecipient: number[], amount: bigint, burnSource: number[], - overrides: { destinationCctpDomain?: number } = {} + overrides: { destinationCctpDomain?: number } = {}, ) { const { destinationCctpDomain: inputDestinationCctpDomain } = overrides; const messageTransmitterProgram = tokenRouter.messageTransmitterProgram(); const { version, localDomain } = await messageTransmitterProgram.fetchMessageTransmitterConfig( - messageTransmitterProgram.messageTransmitterConfigAddress() + messageTransmitterProgram.messageTransmitterConfigAddress(), ); const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; const tokenMessengerMinterProgram = tokenRouter.tokenMessengerMinterProgram(); const { tokenMessenger: sourceTokenMessenger } = await tokenMessengerMinterProgram.fetchRemoteTokenMessenger( - tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain) + tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain), ); const burnMessage = new CctpTokenBurnMessage( @@ -1469,7 +1475,7 @@ async function craftCctpTokenBurnMessage( Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress encodedMintRecipient, amount, - burnSource + burnSource, ); const encodedCctpMessage = burnMessage.encode(); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index dd357357..733bad5a 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -32,18 +32,18 @@ describe("Matching Engine <> Token Router", function () { const matchingEngine = new matchingEngineSdk.MatchingEngineProgram( connection, matchingEngineSdk.localnet(), - USDC_MINT_ADDRESS + USDC_MINT_ADDRESS, ); const tokenRouter = new tokenRouterSdk.TokenRouterProgram( connection, tokenRouterSdk.localnet(), - matchingEngine.mint + matchingEngine.mint, ); describe("Redeem Fast Fill", function () { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, - payer.publicKey + payer.publicKey, ); const orderSender = Array.from(Buffer.alloc(32, "d00d", "hex")); @@ -55,13 +55,14 @@ describe("Matching Engine <> Token Router", function () { it("Token Router ..... Cannot Redeem Fast Fill without Local Router Endpoint", async function () { const amount = 69n; + const redeemerMessage = Buffer.from("Somebody set up us the bomb"); const message = new LiquidityLayerMessage({ fastFill: { fill: { sourceChain: foreignChain, orderSender, redeemer: Array.from(redeemer.publicKey.toBuffer()), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), + redeemerMessage, }, amount, }, @@ -74,7 +75,7 @@ describe("Matching Engine <> Token Router", function () { Array.from(matchingEngine.custodianAddress().toBuffer()), wormholeSequence++, message, - "solana" + "solana", ); const ix = await tokenRouter.redeemFastFillIx({ @@ -87,6 +88,7 @@ describe("Matching Engine <> Token Router", function () { // Save for later. localVariables.set("vaa", vaa); localVariables.set("amount", amount); + localVariables.set("redeemerMessage", redeemerMessage); }); it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { @@ -97,7 +99,7 @@ describe("Matching Engine <> Token Router", function () { await expectIxOk(connection, [ix], [ownerAssistant]); const routerEndpointData = await matchingEngine.fetchRouterEndpoint( - wormholeSdk.CHAIN_ID_SOLANA + wormholeSdk.CHAIN_ID_SOLANA, ); const { bump } = routerEndpointData; expect(routerEndpointData).to.eql( @@ -106,14 +108,15 @@ describe("Matching Engine <> Token Router", function () { wormholeSdk.CHAIN_ID_SOLANA, Array.from(tokenRouter.custodianAddress().toBuffer()), Array.from(tokenRouter.custodyTokenAccountAddress().toBuffer()), - { local: { programId: tokenRouter.ID } } - ) + { local: { programId: tokenRouter.ID } }, + ), ); }); it("Token Router ..... Redeem Fast Fill", async function () { const vaa = localVariables.get("vaa") as PublicKey; const amount = localVariables.get("amount") as bigint; + const redeemerMessage = localVariables.get("redeemerMessage") as Buffer; const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, @@ -146,8 +149,8 @@ describe("Matching Engine <> Token Router", function () { new matchingEngineSdk.RedeemedFastFill( bump, Array.from(vaaHash), - new BN(new BN(wormholeSequence.toString()).subn(1).toBuffer("be", 8)) - ) + new BN(new BN(wormholeSequence.toString()).subn(1).toBuffer("be", 8)), + ), ); } @@ -161,10 +164,11 @@ describe("Matching Engine <> Token Router", function () { redeemer.publicKey, payer.publicKey, { fastFill: {} }, + bigintToU64BN(amount), foreignChain, orderSender, - bigintToU64BN(amount) - ) + redeemerMessage, + ), ); } @@ -191,6 +195,9 @@ describe("Matching Engine <> Token Router", function () { const amount = localVariables.get("amount") as bigint; expect(localVariables.delete("amount")).is.true; + const redeemerMessage = localVariables.get("redeemerMessage") as Buffer; + expect(localVariables.delete("redeemerMessage")).is.true; + const rentRecipient = Keypair.generate().publicKey; const ix = await tokenRouter.consumePreparedFillIx({ preparedFill, @@ -209,7 +216,9 @@ describe("Matching Engine <> Token Router", function () { expect(balanceAfter).equals(balanceBefore + amount); const solBalanceAfter = await connection.getBalance(rentRecipient); - const preparedFillRent = await connection.getMinimumBalanceForRentExemption(148); + const preparedFillRent = await connection.getMinimumBalanceForRentExemption( + 152 + redeemerMessage.length, + ); expect(solBalanceAfter).equals(solBalanceBefore + preparedFillRent); const accInfo = await connection.getAccountInfo(preparedFill); @@ -232,7 +241,7 @@ describe("Matching Engine <> Token Router", function () { connection, [ix], [payer], - `Allocate: account Address { address: ${redeemedFastFill.toString()}, base: None } already in use` + `Allocate: account Address { address: ${redeemedFastFill.toString()}, base: None } already in use`, ); }); @@ -257,7 +266,7 @@ describe("Matching Engine <> Token Router", function () { Array.from(matchingEngine.custodianAddress().toBuffer()), wormholeSequence++, message, - "avalanche" + "avalanche", ); const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, @@ -288,7 +297,7 @@ describe("Matching Engine <> Token Router", function () { Array.from(Buffer.alloc(32, "deadbeef", "hex")), wormholeSequence++, message, - "solana" + "solana", ); const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, @@ -306,7 +315,7 @@ describe("Matching Engine <> Token Router", function () { Array.from(matchingEngine.custodianAddress().toBuffer()), wormholeSequence++, Buffer.from("Oh noes!"), // message - "solana" + "solana", ); const ix = await tokenRouter.redeemFastFillIx({ @@ -337,7 +346,7 @@ describe("Matching Engine <> Token Router", function () { redeemer: new Array(32).fill(0), redeemerMessage: Buffer.from("Somebody set up us the bomb"), }, - } + }, ), }); @@ -348,7 +357,7 @@ describe("Matching Engine <> Token Router", function () { Array.from(matchingEngine.custodianAddress().toBuffer()), wormholeSequence++, message, - "solana" + "solana", ); const ix = await tokenRouter.redeemFastFillIx({ payer: payer.publicKey, From 7a940087bb4983143cbad0ae7400c88f205496e4 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Tue, 6 Feb 2024 23:11:03 -0600 Subject: [PATCH 111/126] solana: refactor custody token WIP --- solana/programs/token-router/src/lib.rs | 2 + .../src/processor/close_prepared_order.rs | 25 ++- .../src/processor/market_order/place_cctp.rs | 24 ++- .../src/processor/market_order/prepare.rs | 23 ++- .../token-router/src/state/prepared_order.rs | 2 +- solana/ts/src/tokenRouter/index.ts | 165 ++++++++---------- .../ts/src/tokenRouter/state/PreparedOrder.ts | 2 +- solana/ts/tests/02__tokenRouter.ts | 93 ++++++---- 8 files changed, 184 insertions(+), 152 deletions(-) diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index dac9b92f..def45c6e 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -22,6 +22,8 @@ cfg_if::cfg_if! { } } +const PREPARED_CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"prepared-custody"; + #[program] pub mod token_router { use super::*; diff --git a/solana/programs/token-router/src/processor/close_prepared_order.rs b/solana/programs/token-router/src/processor/close_prepared_order.rs index eed44c6d..222942d0 100644 --- a/solana/programs/token-router/src/processor/close_prepared_order.rs +++ b/solana/programs/token-router/src/processor/close_prepared_order.rs @@ -43,9 +43,13 @@ pub struct ClosePreparedOrder<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + seeds = [ + crate::PREPARED_CUSTODY_TOKEN_SEED_PREFIX, + prepared_order.key().as_ref(), + ], + bump = prepared_order.prepared_custody_token_bump, )] - custody_token: AccountInfo<'info>, + prepared_custody_token: Account<'info, token::TokenAccount>, token_program: Program<'info, token::Token>, } @@ -56,12 +60,23 @@ pub fn close_prepared_order(ctx: Context) -> Result<()> { CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), + from: ctx.accounts.prepared_custody_token.to_account_info(), to: ctx.accounts.refund_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, &[Custodian::SIGNER_SEEDS], ), - ctx.accounts.prepared_order.amount_in, - ) + ctx.accounts.prepared_custody_token.amount, + )?; + + // Finally close token account. + token::close_account(CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::CloseAccount { + account: ctx.accounts.prepared_custody_token.to_account_info(), + destination: ctx.accounts.prepared_by.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + )) } diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index 8ab0ddd5..f805b5b7 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -66,9 +66,13 @@ pub struct PlaceMarketOrderCctp<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + seeds = [ + crate::PREPARED_CUSTODY_TOKEN_SEED_PREFIX, + prepared_order.key().as_ref(), + ], + bump = prepared_order.prepared_custody_token_bump, )] - custody_token: AccountInfo<'info>, + prepared_custody_token: Box>, /// Registered router endpoint representing a foreign Token Router. This account may have a /// CCTP domain encoded if this route is CCTP-enabled. For this instruction, it is required that @@ -182,7 +186,7 @@ fn handle_place_market_order_cctp( .accounts .token_messenger_minter_sender_authority .to_account_info(), - src_token: ctx.accounts.custody_token.to_account_info(), + src_token: ctx.accounts.prepared_custody_token.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config @@ -235,7 +239,7 @@ fn handle_place_market_order_cctp( burn_source: Some(ctx.accounts.prepared_order.order_token), destination_caller: ctx.accounts.router_endpoint.address, destination_cctp_domain, - amount: ctx.accounts.prepared_order.amount_in, + amount: ctx.accounts.prepared_custody_token.amount, mint_recipient: ctx.accounts.router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, payload: common::messages::Fill { @@ -247,6 +251,14 @@ fn handle_place_market_order_cctp( }, )?; - // Done. - Ok(()) + // Finally close token account. + token::close_account(CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::CloseAccount { + account: ctx.accounts.prepared_custody_token.to_account_info(), + destination: ctx.accounts.payer.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + )) } diff --git a/solana/programs/token-router/src/processor/market_order/prepare.rs b/solana/programs/token-router/src/processor/market_order/prepare.rs index 3c551b86..fa8bf622 100644 --- a/solana/programs/token-router/src/processor/market_order/prepare.rs +++ b/solana/programs/token-router/src/processor/market_order/prepare.rs @@ -44,7 +44,7 @@ pub struct PrepareMarketOrder<'info> { #[account(mut)] order_token: AccountInfo<'info>, - #[account(token::mint = common::constants::usdc::id())] + #[account(token::mint = mint)] refund_token: Account<'info, token::TokenAccount>, /// Custody token account. This account will be closed at the end of this instruction. It just @@ -52,10 +52,21 @@ pub struct PrepareMarketOrder<'info> { /// /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( - mut, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + init, + payer = payer, + token::mint = mint, + token::authority = custodian, + seeds = [ + crate::PREPARED_CUSTODY_TOKEN_SEED_PREFIX, + prepared_order.key().as_ref(), + ], + bump, )] - custody_token: AccountInfo<'info>, + prepared_custody_token: Account<'info, token::TokenAccount>, + + /// CHECK: This mint must be USDC. + #[account(address = common::constants::usdc::id())] + mint: AccountInfo<'info>, token_program: Program<'info, token::Token>, system_program: Program<'info, System>, @@ -116,9 +127,9 @@ pub fn prepare_market_order( order_type: OrderType::Market { min_amount_out }, order_token: ctx.accounts.order_token.key(), refund_token: ctx.accounts.refund_token.key(), - amount_in, target_chain, redeemer, + prepared_custody_token_bump: ctx.bumps["prepared_custody_token"], }), redeemer_message, }); @@ -129,7 +140,7 @@ pub fn prepare_market_order( ctx.accounts.token_program.to_account_info(), token::Transfer { from: ctx.accounts.order_token.to_account_info(), - to: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.prepared_custody_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, &[Custodian::SIGNER_SEEDS], diff --git a/solana/programs/token-router/src/state/prepared_order.rs b/solana/programs/token-router/src/state/prepared_order.rs index 575be9f3..655c311c 100644 --- a/solana/programs/token-router/src/state/prepared_order.rs +++ b/solana/programs/token-router/src/state/prepared_order.rs @@ -14,9 +14,9 @@ pub struct PreparedOrderInfo { pub order_token: Pubkey, pub refund_token: Pubkey, - pub amount_in: u64, pub target_chain: u16, pub redeemer: [u8; 32], + pub prepared_custody_token_bump: u8, } #[account] diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 40f7a137..33c6af29 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -156,10 +156,17 @@ export class TokenRouterProgram { return splToken.getAssociatedTokenAddressSync(this.mint, this.custodianAddress(), true); } + preparedCustodyTokenAddress(preparedOrder: PublicKey): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("prepared-custody"), preparedOrder.toBuffer()], + this.ID, + )[0]; + } + coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { return PublicKey.findProgramAddressSync( [Buffer.from("msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], - this.ID + this.ID, )[0]; } @@ -239,7 +246,7 @@ export class TokenRouterProgram { orderToken: PublicKey; refundToken: PublicKey; }, - args: PrepareMarketOrderArgs + args: PrepareMarketOrderArgs, ): Promise { const { payer, orderSender, preparedOrder, orderToken, refundToken } = accounts; const { amountIn, minAmountOut, ...remainingArgs } = args; @@ -257,7 +264,8 @@ export class TokenRouterProgram { preparedOrder, orderToken, refundToken, - custodyToken: this.custodyTokenAccountAddress(), + preparedCustodyToken: this.preparedCustodyTokenAddress(preparedOrder), + mint: this.mint, tokenProgram: splToken.TOKEN_PROGRAM_ID, }) .instruction(); @@ -308,7 +316,7 @@ export class TokenRouterProgram { orderSender, preparedOrder, refundToken, - custodyToken: this.custodyTokenAccountAddress(), + preparedCustodyToken: this.preparedCustodyTokenAddress(preparedOrder), tokenProgram: splToken.TOKEN_PROGRAM_ID, }) .instruction(); @@ -336,71 +344,6 @@ export class TokenRouterProgram { .instruction(); } - async placeMarketOrderCctpAccounts( - targetChain: number, - overrides: { - remoteDomain?: number; - } = {} - ): Promise { - const { remoteDomain: inputRemoteDomain } = overrides; - - const matchingEngine = this.matchingEngineProgram(); - const routerEndpoint = matchingEngine.routerEndpointAddress(targetChain); - const remoteDomain = await (async () => { - if (inputRemoteDomain !== undefined) { - return inputRemoteDomain; - } else { - const { protocol } = await matchingEngine.fetchRouterEndpoint({ - address: routerEndpoint, - }); - if (protocol.cctp !== undefined) { - return protocol.cctp.domain; - } else { - throw new Error("invalid router endpoint"); - } - } - })(); - - const custodyToken = this.custodyTokenAccountAddress(); - const mint = this.mint; - - const { - senderAuthority: tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - messageTransmitterProgram, - tokenMessengerMinterProgram, - tokenProgram, - } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts(mint, remoteDomain); - - const custodian = this.custodianAddress(); - const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - this.publishMessageAccounts(custodian); - - return { - custodian, - custodyToken, - mint, - routerEndpoint, - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - tokenMessengerMinterSenderAuthority, - messageTransmitterConfig, - tokenMessenger, - remoteTokenMessenger, - tokenMinter, - localToken, - coreBridgeProgram, - tokenMessengerMinterProgram, - messageTransmitterProgram, - tokenProgram, - }; - } - async placeMarketOrderCctpIx( accounts: { payer: PublicKey; @@ -410,7 +353,7 @@ export class TokenRouterProgram { }, args?: { targetChain: number; - } + }, ): Promise { const { payer, @@ -424,7 +367,7 @@ export class TokenRouterProgram { info: { orderSender, targetChain }, } = await this.fetchPreparedOrder(preparedOrder).catch((_) => { throw new Error( - "Cannot find prepared order. If it doesn't exist, please provide orderSender and targetChain." + "Cannot find prepared order. If it doesn't exist, please provide orderSender and targetChain.", ); }); return { orderSender, targetChain }; @@ -435,27 +378,57 @@ export class TokenRouterProgram { const payerSequence = this.payerSequenceAddress(payer); const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => - this.coreMessageAddress(payer, value) + this.coreMessageAddress(payer, value), ); + // const { + // custodian, + // custodyToken, + // mint, + // routerEndpoint, + // coreBridgeConfig, + // coreEmitterSequence, + // coreFeeCollector, + // coreBridgeProgram, + // tokenMessengerMinterSenderAuthority, + // messageTransmitterConfig, + // tokenMessenger, + // remoteTokenMessenger, + // tokenMinter, + // localToken, + // tokenMessengerMinterProgram, + // messageTransmitterProgram, + // tokenProgram, + // } = await this.placeMarketOrderCctpAccounts(targetChain); + + const matchingEngine = this.matchingEngineProgram(); + const routerEndpoint = matchingEngine.routerEndpointAddress(targetChain); + + const { protocol } = await matchingEngine.fetchRouterEndpoint({ + address: routerEndpoint, + }); + if (protocol.cctp === undefined) { + throw new Error("invalid router endpoint"); + } + const mint = this.mint; + const { - custodian, - custodyToken, - mint, - routerEndpoint, - coreBridgeConfig, - coreEmitterSequence, - coreFeeCollector, - coreBridgeProgram, - tokenMessengerMinterSenderAuthority, + senderAuthority: tokenMessengerMinterSenderAuthority, messageTransmitterConfig, tokenMessenger, remoteTokenMessenger, tokenMinter, localToken, - tokenMessengerMinterProgram, messageTransmitterProgram, + tokenMessengerMinterProgram, tokenProgram, - } = await this.placeMarketOrderCctpAccounts(targetChain); + } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts( + mint, + protocol.cctp.domain, + ); + + const custodian = this.custodianAddress(); + const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = + this.publishMessageAccounts(custodian); return this.program.methods .placeMarketOrderCctp() @@ -466,7 +439,7 @@ export class TokenRouterProgram { preparedOrder, orderSender: inputOrderSender ?? orderSender, mint, - custodyToken, + preparedCustodyToken: this.preparedCustodyTokenAddress(preparedOrder), routerEndpoint: inputRouterEndpoint ?? routerEndpoint, coreBridgeConfig, coreMessage, @@ -488,7 +461,7 @@ export class TokenRouterProgram { async redeemCctpFillAccounts( vaa: PublicKey, - cctpMessage: CctpTokenBurnMessage | Buffer + cctpMessage: CctpTokenBurnMessage | Buffer, ): Promise { const msg = CctpTokenBurnMessage.from(cctpMessage); const custodyToken = this.custodyTokenAccountAddress(); @@ -541,7 +514,7 @@ export class TokenRouterProgram { args: { encodedCctpMessage: Buffer; cctpAttestation: Buffer; - } + }, ): Promise { const { payer, vaa, routerEndpoint: inputRouterEndpoint } = accounts; @@ -672,7 +645,7 @@ export class TokenRouterProgram { ownerOrAssistant: PublicKey; custodian?: PublicKey; }, - paused: boolean + paused: boolean, ): Promise { const { ownerOrAssistant, custodian: inputCustodian } = accounts; return this.program.methods @@ -756,15 +729,15 @@ export class TokenRouterProgram { return { coreBridgeConfig: PublicKey.findProgramAddressSync( [Buffer.from("Bridge")], - coreBridgeProgram + coreBridgeProgram, )[0], coreEmitterSequence: PublicKey.findProgramAddressSync( [Buffer.from("Sequence"), emitter.toBuffer()], - coreBridgeProgram + coreBridgeProgram, )[0], coreFeeCollector: PublicKey.findProgramAddressSync( [Buffer.from("fee_collector")], - coreBridgeProgram + coreBridgeProgram, )[0], coreBridgeProgram, }; @@ -775,13 +748,13 @@ export class TokenRouterProgram { case testnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", ); } case localnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", ); } default: { @@ -795,13 +768,13 @@ export class TokenRouterProgram { case testnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", ); } case localnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", ); } default: { @@ -816,14 +789,14 @@ export class TokenRouterProgram { return new matchingEngineSdk.MatchingEngineProgram( this.program.provider.connection, matchingEngineSdk.testnet(), - this.mint + this.mint, ); } case localnet(): { return new matchingEngineSdk.MatchingEngineProgram( this.program.provider.connection, matchingEngineSdk.localnet(), - this.mint + this.mint, ); } default: { diff --git a/solana/ts/src/tokenRouter/state/PreparedOrder.ts b/solana/ts/src/tokenRouter/state/PreparedOrder.ts index c28dda4c..e9566b9c 100644 --- a/solana/ts/src/tokenRouter/state/PreparedOrder.ts +++ b/solana/ts/src/tokenRouter/state/PreparedOrder.ts @@ -13,9 +13,9 @@ export type PreparedOrderInfo = { orderType: OrderType; orderToken: PublicKey; refundToken: PublicKey; - amountIn: BN; targetChain: number; redeemer: Array; + preparedCustodyTokenBump: number; }; export class PreparedOrder { diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 3341af0b..3f6017ec 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -441,6 +441,9 @@ describe("Token Router", function () { const preparedOrderData = await tokenRouter.fetchPreparedOrder( preparedOrder.publicKey, ); + const { + info: { preparedCustodyTokenBump }, + } = preparedOrderData; expect(preparedOrderData).to.eql( new PreparedOrder( { @@ -453,13 +456,19 @@ describe("Token Router", function () { }, orderToken: payerToken, refundToken: payerToken, - amountIn: bigintToU64BN(amountIn), targetChain, redeemer, + preparedCustodyTokenBump, }, redeemerMessage, ), ); + + const { amount: preparedCustodyTokenBalance } = await splToken.getAccount( + connection, + tokenRouter.preparedCustodyTokenAddress(preparedOrder.publicKey), + ); + expect(preparedCustodyTokenBalance).equals(amountIn); }); it("Prepare Market Order without Min Amount Out", async function () { @@ -498,6 +507,12 @@ describe("Token Router", function () { const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); expect(balanceAfter).equals(balanceBefore - amountIn); + const { amount: preparedCustodyTokenBalance } = await splToken.getAccount( + connection, + tokenRouter.preparedCustodyTokenAddress(preparedOrder.publicKey), + ); + expect(preparedCustodyTokenBalance).equals(amountIn); + // We've checked other fields in a previous test. Just make sure the min amount out // is null. const { @@ -582,8 +597,13 @@ describe("Token Router", function () { const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); expect(balanceAfter).equals(balanceBefore + amountIn); - const accInfo = await connection.getAccountInfo(preparedOrder); - expect(accInfo).is.null; + for (const key of [ + preparedOrder, + tokenRouter.preparedCustodyTokenAddress(preparedOrder), + ]) { + const accInfo = await connection.getAccountInfo(key); + expect(accInfo).is.null; + } }); }); @@ -679,12 +699,6 @@ describe("Token Router", function () { preparedOrder, }); - const custodyToken = tokenRouter.custodyTokenAccountAddress(); - const { amount: balanceBefore } = await splToken.getAccount( - connection, - custodyToken, - ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress, ); @@ -692,13 +706,6 @@ describe("Token Router", function () { addressLookupTableAccounts: [lookupTableAccount!], }); - // Check balance of custody account. - const { amount: balanceAfter } = await splToken.getAccount( - connection, - custodyToken, - ); - expect(balanceAfter).equals(balanceBefore - amountIn); - checkAfterEffects({ preparedOrder, amountIn, burnSource: payerToken }); }); @@ -761,12 +768,6 @@ describe("Token Router", function () { preparedOrder, }); - const custodyToken = tokenRouter.custodyTokenAccountAddress(); - const { amount: balanceBefore } = await splToken.getAccount( - connection, - custodyToken, - ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress, ); @@ -774,13 +775,6 @@ describe("Token Router", function () { addressLookupTableAccounts: [lookupTableAccount!], }); - // Check balance. - const { amount: balanceAfter } = await splToken.getAccount( - connection, - custodyToken, - ); - expect(balanceAfter).equals(balanceBefore - amountIn); - checkAfterEffects({ preparedOrder, amountIn, burnSource: payerToken }); }); @@ -909,8 +903,13 @@ describe("Token Router", function () { }), ); - const accInfo = await connection.getAccountInfo(preparedOrder); - expect(accInfo).is.null; + for (const key of [ + preparedOrder, + tokenRouter.preparedCustodyTokenAddress(preparedOrder), + ]) { + const accInfo = await connection.getAccountInfo(key); + expect(accInfo).is.null; + } } }); @@ -984,12 +983,22 @@ describe("Token Router", function () { }, ); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress, ); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidSourceRouter", { - addressLookupTableAccounts: [lookupTableAccount!], - }); + await expectIxErr( + connection, + [computeIx, ix], + [payer], + "Error Code: InvalidSourceRouter", + { + addressLookupTableAccounts: [lookupTableAccount!], + }, + ); }); it("Cannot Redeem Fill from Invalid Source Router Address", async function () { @@ -1047,12 +1056,22 @@ describe("Token Router", function () { }, ); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( lookupTableAddress, ); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidSourceRouter", { - addressLookupTableAccounts: [lookupTableAccount!], - }); + await expectIxErr( + connection, + [computeIx, ix], + [payer], + "Error Code: InvalidSourceRouter", + { + addressLookupTableAccounts: [lookupTableAccount!], + }, + ); }); it("Cannot Redeem Fill with Invalid Deposit Message", async function () { From 51ccb8361a69dd08a2dde8185aa70c7a3ad6b8e2 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 8 Feb 2024 13:32:57 -0600 Subject: [PATCH 112/126] solana: fix after cctp upgrade --- solana/Anchor.toml | 2 +- solana/Cargo.lock | 369 +- solana/Cargo.toml | 12 +- solana/modules/common/src/burn_and_publish.rs | 2 +- solana/modules/common/src/constants/mod.rs | 3 +- solana/programs/matching-engine/Cargo.toml | 2 - .../admin/propose/auction_parameters.rs | 2 +- .../admin/router_endpoint/add/cctp.rs | 2 +- .../admin/router_endpoint/add/local.rs | 2 +- .../auction/execute_fast_order/cctp.rs | 61 +- .../auction/execute_fast_order/local.rs | 10 +- .../auction/execute_fast_order/mod.rs | 6 +- .../processor/auction/offer/place_initial.rs | 2 +- .../auction/prepare_settlement/cctp.rs | 20 +- .../processor/auction/settle/active/cctp.rs | 140 +- .../processor/auction/settle/active/local.rs | 34 +- .../processor/auction/settle/active/mod.rs | 10 +- .../src/processor/auction/settle/none/cctp.rs | 83 +- .../processor/auction/settle/none/local.rs | 26 +- .../src/processor/auction/settle/none/mod.rs | 8 +- .../src/processor/complete_fast_fill.rs | 2 +- solana/programs/token-router/Cargo.toml | 2 - .../src/processor/consume_prepared_fill.rs | 25 +- .../src/processor/market_order/place_cctp.rs | 66 +- .../src/processor/market_order/prepare.rs | 12 +- .../src/processor/redeem_fill/cctp.rs | 66 +- .../src/processor/redeem_fill/fast.rs | 23 +- .../token-router/src/state/prepared_fill.rs | 4 +- .../token-router/src/state/prepared_order.rs | 7 +- solana/ts/src/cctp/index.ts | 5 +- .../cctp/messageTransmitter/MessageSent.ts | 11 + .../MessageTransmitterConfig.ts | 16 +- .../ts/src/cctp/messageTransmitter/index.ts | 70 +- solana/ts/src/cctp/messages.ts | 12 +- .../ts/src/cctp/tokenMessengerMinter/index.ts | 31 +- .../ts/src/cctp/types/message_transmitter.ts | 4918 +++++++------ .../src/cctp/types/token_messenger_minter.ts | 6304 +++++++++-------- solana/ts/src/matchingEngine/index.ts | 158 +- solana/ts/src/tokenRouter/index.ts | 88 +- .../ts/src/tokenRouter/state/PreparedFill.ts | 9 +- .../ts/src/tokenRouter/state/PreparedOrder.ts | 4 +- solana/ts/src/wormhole/index.ts | 30 +- solana/ts/tests/01__matchingEngine.ts | 31 +- solana/ts/tests/02__tokenRouter.ts | 15 +- solana/ts/tests/04__interaction.ts | 15 +- .../usdc_local_token.json | 8 +- 46 files changed, 7110 insertions(+), 5618 deletions(-) create mode 100644 solana/ts/src/cctp/messageTransmitter/MessageSent.ts diff --git a/solana/Anchor.toml b/solana/Anchor.toml index be3f7baa..9b1746ab 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -1,6 +1,6 @@ [toolchain] anchor_version = "0.29.0" # CLI -solana_version = "1.16.16" +solana_version = "1.16.27" [features] seeds = false diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 54349117..c1d94e2a 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -51,9 +51,9 @@ dependencies = [ [[package]] name = "ahash" -version = "0.8.6" +version = "0.8.4" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "91429305e9f0a25f6205c5b8e0d2db09e0708a7a6df0f42212bb56c32c8ac97a" +checksum = "72832d73be48bac96a5d7944568f305d829ed55b0ce3b483647089dfaf6cf704" dependencies = [ "cfg-if", "getrandom 0.2.11", @@ -73,64 +73,58 @@ dependencies = [ [[package]] name = "anchor-attribute-access-control" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "faa5be5b72abea167f87c868379ba3c2be356bfca9e6f474fd055fa0f7eeb4f2" +checksum = "e5f619f1d04f53621925ba8a2e633ba5a6081f2ae14758cbb67f38fd823e0a3e" dependencies = [ "anchor-syn", - "anyhow", "proc-macro2", "quote", - "regex", "syn 1.0.109", ] [[package]] name = "anchor-attribute-account" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f468970344c7c9f9d03b4da854fd7c54f21305059f53789d0045c1dd803f0018" +checksum = "e7f2a3e1df4685f18d12a943a9f2a7456305401af21a07c9fe076ef9ecd6e400" dependencies = [ "anchor-syn", - "anyhow", "bs58 0.5.0", "proc-macro2", "quote", - "rustversion", "syn 1.0.109", ] [[package]] name = "anchor-attribute-constant" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "59948e7f9ef8144c2aefb3f32a40c5fce2798baeec765ba038389e82301017ef" +checksum = "9423945cb55627f0b30903288e78baf6f62c6c8ab28fb344b6b25f1ffee3dca7" dependencies = [ "anchor-syn", - "proc-macro2", + "quote", "syn 1.0.109", ] [[package]] name = "anchor-attribute-error" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "fc753c9d1c7981cb8948cf7e162fb0f64558999c0413058e2d43df1df5448086" +checksum = "93ed12720033cc3c3bf3cfa293349c2275cd5ab99936e33dd4bf283aaad3e241" dependencies = [ "anchor-syn", - "proc-macro2", "quote", "syn 1.0.109", ] [[package]] name = "anchor-attribute-event" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f38b4e172ba1b52078f53fdc9f11e3dc0668ad27997838a0aad2d148afac8c97" +checksum = "eef4dc0371eba2d8c8b54794b0b0eb786a234a559b77593d6f80825b6d2c77a2" dependencies = [ "anchor-syn", - "anyhow", "proc-macro2", "quote", "syn 1.0.109", @@ -138,25 +132,34 @@ dependencies = [ [[package]] name = "anchor-attribute-program" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "4eebd21543606ab61e2d83d9da37d24d3886a49f390f9c43a1964735e8c0f0d5" +checksum = "b18c4f191331e078d4a6a080954d1576241c29c56638783322a18d308ab27e4f" dependencies = [ "anchor-syn", - "anyhow", - "proc-macro2", "quote", "syn 1.0.109", ] [[package]] name = "anchor-derive-accounts" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ec4720d899b3686396cced9508f23dab420f1308344456ec78ef76f98fda42af" +checksum = "5de10d6e9620d3bcea56c56151cad83c5992f50d5960b3a9bebc4a50390ddc3c" dependencies = [ "anchor-syn", - "anyhow", + "quote", + "syn 1.0.109", +] + +[[package]] +name = "anchor-derive-serde" +version = "0.29.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f4e2e5be518ec6053d90a2a7f26843dbee607583c779e6c8395951b9739bdfbe" +dependencies = [ + "anchor-syn", + "borsh-derive-internal 0.10.3", "proc-macro2", "quote", "syn 1.0.109", @@ -164,9 +167,9 @@ dependencies = [ [[package]] name = "anchor-derive-space" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f495e85480bd96ddeb77b71d499247c7d4e8b501e75ecb234e9ef7ae7bd6552a" +checksum = "1ecc31d19fa54840e74b7a979d44bcea49d70459de846088a1d71e87ba53c419" dependencies = [ "proc-macro2", "quote", @@ -175,9 +178,9 @@ dependencies = [ [[package]] name = "anchor-lang" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0d2d4b20100f1310a774aba3471ef268e5c4ba4d5c28c0bbe663c2658acbc414" +checksum = "35da4785497388af0553586d55ebdc08054a8b1724720ef2749d313494f2b8ad" dependencies = [ "anchor-attribute-access-control", "anchor-attribute-account", @@ -186,6 +189,7 @@ dependencies = [ "anchor-attribute-event", "anchor-attribute-program", "anchor-derive-accounts", + "anchor-derive-serde", "anchor-derive-space", "arrayref", "base64 0.13.1", @@ -199,9 +203,9 @@ dependencies = [ [[package]] name = "anchor-spl" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "78f860599da1c2354e7234c768783049eb42e2f54509ecfc942d2e0076a2da7b" +checksum = "6c4fd6e43b2ca6220d2ef1641539e678bfc31b6cc393cf892b373b5997b6a39a" dependencies = [ "anchor-lang", "solana-program", @@ -212,9 +216,9 @@ dependencies = [ [[package]] name = "anchor-syn" -version = "0.28.0" +version = "0.29.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "a125e4b0cc046cfec58f5aa25038e34cf440151d58f0db3afc55308251fe936d" +checksum = "d9101b84702fed2ea57bd22992f75065da5648017135b844283a2f6d74f27825" dependencies = [ "anyhow", "bs58 0.5.0", @@ -406,9 +410,9 @@ checksum = "9e1b586273c5702936fe7b7d6896644d8be71e6314cfe09d3167c95f712589e8" [[package]] name = "base64" -version = "0.21.6" +version = "0.21.7" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c79fed4cdb43e993fcdadc7e58a09fd0e3e649c4436fa11da71c9f1f3ee7feb9" +checksum = "9d297deb1925b89f2ccc13d7635fa0714f12c87adce1c75356b39ca9b7178567" [[package]] name = "bincode" @@ -596,9 +600,9 @@ dependencies = [ [[package]] name = "bytemuck" -version = "1.14.0" +version = "1.14.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "374d28ec25809ee0e23827c2ab573d729e293f281dfe393500e7ad618baa61c6" +checksum = "ea31d69bda4949c1c1562c1e6f042a1caefac98cdc8a298260a2ff41c1e2d42b" dependencies = [ "bytemuck_derive", ] @@ -959,7 +963,7 @@ version = "0.13.2" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "43a3c133739dddd0d2990f9a4bdf8eb4b21ef50e4851ca85ab661199821d510e" dependencies = [ - "ahash 0.8.6", + "ahash 0.8.4", ] [[package]] @@ -1092,9 +1096,9 @@ dependencies = [ [[package]] name = "js-sys" -version = "0.3.66" +version = "0.3.68" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "cee9c64da59eae3b50095c18d3e74f8b73c0b86d2792824ff01bbce68ba229ca" +checksum = "406cda4b368d531c842222cf9d2600a9a4acce8d29423695379c6868a143a9ee" dependencies = [ "wasm-bindgen", ] @@ -1202,7 +1206,6 @@ checksum = "b5e6163cb8c49088c2c36f57875e58ccd8c87c7427f7fbd50ea6710b2f3f2e8f" name = "matching-engine" version = "0.0.0" dependencies = [ - "ahash 0.8.6", "anchor-lang", "anchor-spl", "cfg-if", @@ -1271,6 +1274,17 @@ dependencies = [ "syn 1.0.109", ] +[[package]] +name = "num-derive" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ed3955f1a9c7c0c15e092f9c887db08b1fc683305fdf6eb6684f22555355e202" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.48", +] + [[package]] name = "num-integer" version = "0.1.45" @@ -1292,39 +1306,39 @@ dependencies = [ [[package]] name = "num_enum" -version = "0.5.11" +version = "0.6.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1f646caf906c20226733ed5b1374287eb97e3c2a5c227ce668c1f2ce20ae57c9" +checksum = "7a015b430d3c108a207fd776d2e2196aaf8b1cf8cf93253e3a097ff3085076a1" dependencies = [ - "num_enum_derive 0.5.11", + "num_enum_derive 0.6.1", ] [[package]] name = "num_enum" -version = "0.6.1" +version = "0.7.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7a015b430d3c108a207fd776d2e2196aaf8b1cf8cf93253e3a097ff3085076a1" +checksum = "02339744ee7253741199f897151b38e72257d13802d4ee837285cc2990a90845" dependencies = [ - "num_enum_derive 0.6.1", + "num_enum_derive 0.7.2", ] [[package]] name = "num_enum_derive" -version = "0.5.11" +version = "0.6.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "dcbff9bc912032c62bf65ef1d5aea88983b420f4f839db1e9b0c281a25c9c799" +checksum = "96667db765a921f7b295ffee8b60472b686a51d4f21c2ee4ffdb94c7013b65a6" dependencies = [ "proc-macro-crate 1.3.1", "proc-macro2", "quote", - "syn 1.0.109", + "syn 2.0.48", ] [[package]] name = "num_enum_derive" -version = "0.6.1" +version = "0.7.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "96667db765a921f7b295ffee8b60472b686a51d4f21c2ee4ffdb94c7013b65a6" +checksum = "681030a937600a36906c185595136d26abfebb4aa9c65701cefcaf8578bb982b" dependencies = [ "proc-macro-crate 1.3.1", "proc-macro2", @@ -1436,9 +1450,9 @@ dependencies = [ [[package]] name = "proc-macro2" -version = "1.0.76" +version = "1.0.78" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "95fc56cda0b5c3325f5fbbd7ff9fda9e02bb00bb3dac51252d2f1bfa1cb8cc8c" +checksum = "e2422ad645d89c99f8f3e6b88a9fdeca7fabeac836b1002371c4367c8f984aae" dependencies = [ "unicode-ident", ] @@ -1785,11 +1799,11 @@ checksum = "4dccd0940a2dcdf68d092b8cbab7dc0ad8fa938bf95787e1b916b0e3d0e8e970" [[package]] name = "solana-frozen-abi" -version = "1.16.24" +version = "1.16.27" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d229588852b514378c88ea74ef6fb93c5575758d2aa3a6a300872ccf5be51772" +checksum = "67a96a0a64cbc75e06c8eb49d6cd0a87054c48dbf59100d9959389aba51fb501" dependencies = [ - "ahash 0.8.6", + "ahash 0.8.4", "blake3", "block-buffer 0.10.4", "bs58 0.4.0", @@ -1818,9 +1832,9 @@ dependencies = [ [[package]] name = "solana-frozen-abi-macro" -version = "1.16.24" +version = "1.16.27" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "ad75a8290906967a9737c76bb5cc9769cee2097a6a6fbda08017562454ead020" +checksum = "5ae9765c963bebbf609dcdc82cfb969746cbdf6d65cfc9d94112e984475ae4ac" dependencies = [ "proc-macro2", "quote", @@ -1830,9 +1844,9 @@ dependencies = [ [[package]] name = "solana-logger" -version = "1.16.24" +version = "1.16.27" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f4896bca227a92b31c7be15f524850aba3255d94dcb837a4097daba723a84757" +checksum = "9c039e4336890c7a0667207caeb452187efa0602d80eca61a854f2e39915e972" dependencies = [ "env_logger", "lazy_static", @@ -1841,16 +1855,16 @@ dependencies = [ [[package]] name = "solana-program" -version = "1.16.24" +version = "1.16.27" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "de52673b07eda66299b6ff858c54f3d08bdf4addc5c56969f0a94a09bb63f853" +checksum = "20c16757f43d4384907f6e81924e155b8bd8228efcdcf9ea38bd4e18ea100804" dependencies = [ "ark-bn254", "ark-ec", "ark-ff", "ark-serialize", "array-bytes", - "base64 0.21.6", + "base64 0.21.7", "bincode", "bitflags", "blake3", @@ -1872,7 +1886,7 @@ dependencies = [ "log", "memoffset", "num-bigint", - "num-derive", + "num-derive 0.3.3", "num-traits", "parking_lot", "rand 0.7.3", @@ -1896,12 +1910,12 @@ dependencies = [ [[package]] name = "solana-sdk" -version = "1.16.24" +version = "1.16.27" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "96d5e51b30ff694f1353755b0e1672bc01a6b72ad12353fac4e53957a2a1f783" +checksum = "cdf179cda65775982e5f31da8d58dfa4349c3b5ae1573ceb507c7fc91df66690" dependencies = [ "assert_matches", - "base64 0.21.6", + "base64 0.21.7", "bincode", "bitflags", "borsh 0.10.3", @@ -1921,7 +1935,7 @@ dependencies = [ "libsecp256k1", "log", "memmap2", - "num-derive", + "num-derive 0.3.3", "num-traits", "num_enum 0.6.1", "pbkdf2 0.11.0", @@ -1949,9 +1963,9 @@ dependencies = [ [[package]] name = "solana-sdk-macro" -version = "1.16.24" +version = "1.16.27" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d5c5ae1f2b5e7dec7dcab0199a642e1900b981c156547942156c5c4fbcc3eafa" +checksum = "7f188d6fe76183137a4922274acbe76fc4fcc474b3fad860bb2612cb225e6e2a" dependencies = [ "bs58 0.4.0", "proc-macro2", @@ -1962,12 +1976,12 @@ dependencies = [ [[package]] name = "solana-zk-token-sdk" -version = "1.16.24" +version = "1.16.27" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d66b682b70d18374f8619a1e61ec461d481d5ee7dc2057d53d7370176f41027c" +checksum = "9513c4f1595b61f8a39a14c27535da2b2145c20c6b35ab491a1830981972b2bd" dependencies = [ "aes-gcm-siv", - "base64 0.21.6", + "base64 0.21.7", "bincode", "bytemuck", "byteorder", @@ -1976,7 +1990,7 @@ dependencies = [ "itertools", "lazy_static", "merlin", - "num-derive", + "num-derive 0.3.3", "num-traits", "rand 0.7.3", "serde", @@ -1991,13 +2005,13 @@ dependencies = [ [[package]] name = "spl-associated-token-account" -version = "1.1.3" +version = "2.2.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "978dba3bcbe88d0c2c58366c254d9ea41c5f73357e72fc0bdee4d6b5fc99c8f4" +checksum = "385e31c29981488f2820b2022d8e731aae3b02e6e18e2fd854e4c9a94dc44fc3" dependencies = [ "assert_matches", - "borsh 0.9.3", - "num-derive", + "borsh 0.10.3", + "num-derive 0.4.2", "num-traits", "solana-program", "spl-token", @@ -2005,48 +2019,182 @@ dependencies = [ "thiserror", ] +[[package]] +name = "spl-discriminator" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cce5d563b58ef1bb2cdbbfe0dfb9ffdc24903b10ae6a4df2d8f425ece375033f" +dependencies = [ + "bytemuck", + "solana-program", + "spl-discriminator-derive", +] + +[[package]] +name = "spl-discriminator-derive" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07fd7858fc4ff8fb0e34090e41d7eb06a823e1057945c26d480bfc21d2338a93" +dependencies = [ + "quote", + "spl-discriminator-syn", + "syn 2.0.48", +] + +[[package]] +name = "spl-discriminator-syn" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "18fea7be851bd98d10721782ea958097c03a0c2a07d8d4997041d0ece6319a63" +dependencies = [ + "proc-macro2", + "quote", + "sha2 0.10.8", + "syn 2.0.48", + "thiserror", +] + [[package]] name = "spl-memo" -version = "3.0.1" +version = "4.0.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "bd0dc6f70db6bacea7ff25870b016a65ba1d1b6013536f08e4fd79a8f9005325" +checksum = "f0f180b03318c3dbab3ef4e1e4d46d5211ae3c780940dd0a28695aba4b59a75a" dependencies = [ "solana-program", ] +[[package]] +name = "spl-pod" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2881dddfca792737c0706fa0175345ab282b1b0879c7d877bad129645737c079" +dependencies = [ + "borsh 0.10.3", + "bytemuck", + "solana-program", + "solana-zk-token-sdk", + "spl-program-error", +] + +[[package]] +name = "spl-program-error" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "249e0318493b6bcf27ae9902600566c689b7dfba9f1bdff5893e92253374e78c" +dependencies = [ + "num-derive 0.4.2", + "num-traits", + "solana-program", + "spl-program-error-derive", + "thiserror", +] + +[[package]] +name = "spl-program-error-derive" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1845dfe71fd68f70382232742e758557afe973ae19e6c06807b2c30f5d5cb474" +dependencies = [ + "proc-macro2", + "quote", + "sha2 0.10.8", + "syn 2.0.48", +] + +[[package]] +name = "spl-tlv-account-resolution" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "062e148d3eab7b165582757453632ffeef490c02c86a48bfdb4988f63eefb3b9" +dependencies = [ + "bytemuck", + "solana-program", + "spl-discriminator", + "spl-pod", + "spl-program-error", + "spl-type-length-value", +] + [[package]] name = "spl-token" -version = "3.5.0" +version = "4.0.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "8e85e168a785e82564160dcb87b2a8e04cee9bfd1f4d488c729d53d6a4bd300d" +checksum = "08459ba1b8f7c1020b4582c4edf0f5c7511a5e099a7a97570c9698d4f2337060" dependencies = [ "arrayref", "bytemuck", - "num-derive", + "num-derive 0.3.3", "num-traits", - "num_enum 0.5.11", + "num_enum 0.6.1", "solana-program", "thiserror", ] [[package]] name = "spl-token-2022" -version = "0.6.1" +version = "0.9.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0043b590232c400bad5ee9eb983ced003d15163c4c5d56b090ac6d9a57457b47" +checksum = "e4abf34a65ba420584a0c35f3903f8d727d1f13ababbdc3f714c6b065a686e86" dependencies = [ "arrayref", "bytemuck", - "num-derive", + "num-derive 0.4.2", "num-traits", - "num_enum 0.5.11", + "num_enum 0.7.2", "solana-program", "solana-zk-token-sdk", "spl-memo", + "spl-pod", "spl-token", + "spl-token-metadata-interface", + "spl-transfer-hook-interface", + "spl-type-length-value", "thiserror", ] +[[package]] +name = "spl-token-metadata-interface" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4c16ce3ba6979645fb7627aa1e435576172dd63088dc7848cb09aa331fa1fe4f" +dependencies = [ + "borsh 0.10.3", + "solana-program", + "spl-discriminator", + "spl-pod", + "spl-program-error", + "spl-type-length-value", +] + +[[package]] +name = "spl-transfer-hook-interface" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "051d31803f873cabe71aec3c1b849f35248beae5d19a347d93a5c9cccc5d5a9b" +dependencies = [ + "arrayref", + "bytemuck", + "solana-program", + "spl-discriminator", + "spl-pod", + "spl-program-error", + "spl-tlv-account-resolution", + "spl-type-length-value", +] + +[[package]] +name = "spl-type-length-value" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a468e6f6371f9c69aae760186ea9f1a01c2908351b06a5e0026d21cfc4d7ecac" +dependencies = [ + "bytemuck", + "solana-program", + "spl-discriminator", + "spl-pod", + "spl-program-error", +] + [[package]] name = "strsim" version = "0.10.0" @@ -2148,7 +2296,6 @@ checksum = "1f3ccbac311fea05f86f61904b462b55fb3df8837a366dfc601a0161d0532f20" name = "token-router" version = "0.0.0" dependencies = [ - "ahash 0.8.6", "anchor-lang", "anchor-spl", "cfg-if", @@ -2253,9 +2400,9 @@ checksum = "9c8d87e72b64a3b4db28d11ce29237c246188f4f51057d65a7eab63b7987e423" [[package]] name = "wasm-bindgen" -version = "0.2.89" +version = "0.2.91" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0ed0d4f68a3015cc185aff4db9506a015f4b96f95303897bfa23f846db54064e" +checksum = "c1e124130aee3fb58c5bdd6b639a0509486b0338acaaae0c84a5124b0f588b7f" dependencies = [ "cfg-if", "wasm-bindgen-macro", @@ -2263,9 +2410,9 @@ dependencies = [ [[package]] name = "wasm-bindgen-backend" -version = "0.2.89" +version = "0.2.91" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1b56f625e64f3a1084ded111c4d5f477df9f8c92df113852fa5a374dbda78826" +checksum = "c9e7e1900c352b609c8488ad12639a311045f40a35491fb69ba8c12f758af70b" dependencies = [ "bumpalo", "log", @@ -2278,9 +2425,9 @@ dependencies = [ [[package]] name = "wasm-bindgen-macro" -version = "0.2.89" +version = "0.2.91" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "0162dbf37223cd2afce98f3d0785506dcb8d266223983e4b5b525859e6e182b2" +checksum = "b30af9e2d358182b5c7449424f017eba305ed32a7010509ede96cdc4696c46ed" dependencies = [ "quote", "wasm-bindgen-macro-support", @@ -2288,9 +2435,9 @@ dependencies = [ [[package]] name = "wasm-bindgen-macro-support" -version = "0.2.89" +version = "0.2.91" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f0eb82fcb7930ae6219a7ecfd55b217f5f0893484b7a13022ebb2b2bf20b5283" +checksum = "642f325be6301eb8107a83d12a8ac6c1e1c54345a7ef1a9261962dfefda09e66" dependencies = [ "proc-macro2", "quote", @@ -2301,9 +2448,9 @@ dependencies = [ [[package]] name = "wasm-bindgen-shared" -version = "0.2.89" +version = "0.2.91" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7ab9b36309365056cd639da3134bf87fa8f3d86008abf99e612384a6eecd459f" +checksum = "4f186bd2dcf04330886ce82d6f33dd75a7bfcf69ecf5763b89fcde53b6ac9838" [[package]] name = "web-sys" @@ -2414,9 +2561,9 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.0.1-alpha.9" +version = "0.1.0-alpha.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "239a8dcac183cc310a0a639e5077d835ce0ff1fb74a4378001f70728eeeb6c6e" +checksum = "c7f30cd8dd31f573cc3005aeb586d80b728e901835089f730b7af4d68589ac40" dependencies = [ "anchor-lang", "anchor-spl", @@ -2424,22 +2571,6 @@ dependencies = [ "hex", "ruint", "solana-program", - "wormhole-core-bridge-solana", - "wormhole-io", - "wormhole-raw-vaas", -] - -[[package]] -name = "wormhole-core-bridge-solana" -version = "0.0.1-alpha.5" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3e3aa8ef4ad0295b10cce873f2dbbed86ed504a0b095b3ed1d06733b3f976044" -dependencies = [ - "anchor-lang", - "cfg-if", - "hex", - "ruint", - "solana-program", "wormhole-io", "wormhole-raw-vaas", ] diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 9e59f05d..a315d663 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -21,7 +21,7 @@ path = "modules/common" path = "programs/matching-engine" [workspace.dependencies.wormhole-cctp-solana] -version = "0.0.1-alpha.9" +version = "0.1.0-alpha.5" default-features = false [workspace.dependencies.wormhole-raw-vaas] @@ -31,18 +31,14 @@ default-features = false [workspace.dependencies] wormhole-io = "0.1.2" -anchor-lang = "0.28.0" -anchor-spl = "0.28.0" -solana-program = "1.16.16" +anchor-lang = "0.29.0" +anchor-spl = "0.29.0" +solana-program = "=1.16.27" hex = "0.4.3" ruint = "1.9.0" cfg-if = "1.0" hex-literal = "0.4.1" -### https://github.com/coral-xyz/anchor/issues/2755 -### This dependency must be added for each program. -ahash = "=0.8.6" - [profile.release] overflow-checks = true lto = "fat" diff --git a/solana/modules/common/src/burn_and_publish.rs b/solana/modules/common/src/burn_and_publish.rs index 0dff67bd..74ec4640 100644 --- a/solana/modules/common/src/burn_and_publish.rs +++ b/solana/modules/common/src/burn_and_publish.rs @@ -69,7 +69,7 @@ pub fn burn_and_publish_fill( .take_and_uptick() .to_be_bytes() .as_ref(), - &[ctx.bumps["core_message"]], + &[ctx.bumps.core_message], ], ], ), diff --git a/solana/modules/common/src/constants/mod.rs b/solana/modules/common/src/constants/mod.rs index a3b5014c..b3dce9b9 100644 --- a/solana/modules/common/src/constants/mod.rs +++ b/solana/modules/common/src/constants/mod.rs @@ -5,6 +5,7 @@ pub const WORMHOLE_MESSAGE_NONCE: u32 = 0; /// Seed for custody token account. pub const CUSTODY_TOKEN_SEED_PREFIX: &[u8] = b"custody"; -pub const CORE_MESSAGE_SEED_PREFIX: &[u8] = b"msg"; +pub const CORE_MESSAGE_SEED_PREFIX: &[u8] = b"core-msg"; +pub const CCTP_MESSAGE_SEED_PREFIX: &[u8] = b"cctp-msg"; pub const FEE_PRECISION_MAX: u32 = 1_000_000; diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index bd0b105a..fd1bc9b9 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -32,7 +32,5 @@ hex.workspace = true ruint.workspace = true cfg-if.workspace = true -ahash.workspace = true - [dev-dependencies] hex-literal.workspace = true \ No newline at end of file diff --git a/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs index 4345b1da..a34f3916 100644 --- a/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs +++ b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs @@ -54,6 +54,6 @@ pub fn propose_auction_parameters( epoch_schedule: &ctx.accounts.epoch_schedule, }, ProposalAction::UpdateAuctionParameters { id, parameters }, - ctx.bumps["proposal"], + ctx.bumps.proposal, ) } diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs index f0d7e9e2..7ae0928b 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs @@ -92,7 +92,7 @@ pub fn add_cctp_router_endpoint( }; ctx.accounts.router_endpoint.set_inner(RouterEndpoint { - bump: ctx.bumps["router_endpoint"], + bump: ctx.bumps.router_endpoint, chain, address, mint_recipient, diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs index 1604f9bc..1d772dc0 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -63,7 +63,7 @@ pub struct AddLocalRouterEndpoint<'info> { pub fn add_local_router_endpoint(ctx: Context) -> Result<()> { ctx.accounts.router_endpoint.set_inner(RouterEndpoint { - bump: ctx.bumps["router_endpoint"], + bump: ctx.bumps.router_endpoint, chain: SOLANA_CHAIN, address: ctx.accounts.token_router_emitter.key().to_bytes(), mint_recipient: ctx.accounts.token_router_custody_token.key().to_bytes(), diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index cb873a74..c6040a15 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -5,10 +5,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program::{self, VaaAccount}, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [execute_fast_order_cctp]. @@ -104,7 +107,7 @@ pub struct ExecuteFastOrderCctp<'info> { #[account(mut)] core_bridge_config: UncheckedAccount<'info>, - /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + /// CHECK: Mutable. Seeds must be \["core-msg", payer, payer_sequence.value\]. #[account( mut, seeds = [ @@ -116,6 +119,18 @@ pub struct ExecuteFastOrderCctp<'info> { )] core_message: AccountInfo<'info>, + /// CHECK: Mutable. Seeds must be \["cctp-msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + cctp_message: AccountInfo<'info>, + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). #[account(mut)] core_emitter_sequence: UncheckedAccount<'info>, @@ -147,6 +162,9 @@ pub struct ExecuteFastOrderCctp<'info> { #[account(mut)] local_token: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_event_authority: UncheckedAccount<'info>, + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, @@ -178,6 +196,7 @@ pub fn handle_execute_fast_order_cctp( let super::PreparedFastExecution { user_amount: amount, fill, + sequence_seed, } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, @@ -187,6 +206,7 @@ pub fn handle_execute_fast_order_cctp( executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, initial_offer_token: &ctx.accounts.initial_offer_token, + payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, })?; @@ -197,12 +217,13 @@ pub fn handle_execute_fast_order_cctp( .token_messenger_minter_program .to_account_info(), wormhole_cctp_solana::cpi::DepositForBurnWithCaller { - src_token_owner: ctx.accounts.custodian.to_account_info(), + burn_token_owner: ctx.accounts.custodian.to_account_info(), + payer: ctx.accounts.payer.to_account_info(), token_messenger_minter_sender_authority: ctx .accounts .token_messenger_minter_sender_authority .to_account_info(), - src_token: ctx.accounts.custody_token.to_account_info(), + burn_token: ctx.accounts.custody_token.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config @@ -212,6 +233,7 @@ pub fn handle_execute_fast_order_cctp( token_minter: ctx.accounts.token_minter.to_account_info(), local_token: ctx.accounts.local_token.to_account_info(), mint: ctx.accounts.mint.to_account_info(), + cctp_message: ctx.accounts.cctp_message.to_account_info(), message_transmitter_program: ctx .accounts .message_transmitter_program @@ -221,8 +243,21 @@ pub fn handle_execute_fast_order_cctp( .token_messenger_minter_program .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + event_authority: ctx + .accounts + .token_messenger_minter_event_authority + .to_account_info(), }, - &[Custodian::SIGNER_SEEDS], + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + sequence_seed.as_ref(), + &[ctx.bumps.cctp_message], + ], + ], ), CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), @@ -242,12 +277,8 @@ pub fn handle_execute_fast_order_cctp( &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), - ctx.accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[ctx.bumps["core_message"]], + sequence_seed.as_ref(), + &[ctx.bumps.core_message], ], ], ), @@ -258,7 +289,7 @@ pub fn handle_execute_fast_order_cctp( amount, mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: fill, + payload: fill.to_vec_payload(), }, )?; diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index 8a880e55..2c79431d 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -132,6 +132,7 @@ pub fn execute_fast_order_local(ctx: Context) -> Result<( let super::PreparedFastExecution { user_amount: amount, fill, + sequence_seed, } = super::prepare_fast_execution(super::PrepareFastExecution { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, @@ -141,6 +142,7 @@ pub fn execute_fast_order_local(ctx: Context) -> Result<( executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, initial_offer_token: &ctx.accounts.initial_offer_token, + payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, })?; @@ -164,12 +166,8 @@ pub fn execute_fast_order_local(ctx: Context) -> Result<( &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), - ctx.accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[ctx.bumps["core_message"]], + sequence_seed.as_ref(), + &[ctx.bumps.core_message], ], ], ), diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index 49dca85f..4495d9f5 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -6,7 +6,7 @@ pub use local::*; use crate::{ error::MatchingEngineError, - state::{Auction, AuctionConfig, AuctionStatus, Custodian}, + state::{Auction, AuctionConfig, AuctionStatus, Custodian, PayerSequence}, utils::{self, auction::DepositPenalty}, }; use anchor_lang::prelude::*; @@ -25,12 +25,14 @@ struct PrepareFastExecution<'ctx, 'info> { executor_token: &'ctx Account<'info, token::TokenAccount>, best_offer_token: &'ctx AccountInfo<'info>, initial_offer_token: &'ctx AccountInfo<'info>, + payer_sequence: &'ctx mut Account<'info, PayerSequence>, token_program: &'ctx Program<'info, token::Token>, } struct PreparedFastExecution { pub user_amount: u64, pub fill: Fill, + pub sequence_seed: [u8; 8], } fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result { @@ -43,6 +45,7 @@ fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result Result::from(order.redeemer_message()).to_vec().into(), }, + sequence_seed: payer_sequence.take_and_uptick().to_be_bytes(), }) } diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index 4ac04c23..83dac756 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -149,7 +149,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R // Set up the Auction account for this auction. let initial_offer_token = ctx.accounts.offer_token.key(); ctx.accounts.auction.set_inner(Auction { - bump: ctx.bumps["auction"], + bump: ctx.bumps.auction, vaa_hash: fast_vaa.try_digest().unwrap().0, status: AuctionStatus::Active, info: Some(AuctionInfo { diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index 8efdf4fd..ae028334 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -73,6 +73,9 @@ pub struct PrepareOrderResponseCctp<'info> { #[account(mut)] used_nonces: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Message Transmitter program)). + message_transmitter_event_authority: AccountInfo<'info>, + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). token_messenger: UncheckedAccount<'info>, @@ -98,6 +101,9 @@ pub struct PrepareOrderResponseCctp<'info> { #[account(mut)] token_messenger_minter_custody_token: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_event_authority: AccountInfo<'info>, + token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, @@ -138,6 +144,14 @@ pub fn prepare_order_response_cctp( .token_messenger_minter_program .to_account_info(), system_program: ctx.accounts.system_program.to_account_info(), + message_transmitter_event_authority: ctx + .accounts + .message_transmitter_event_authority + .to_account_info(), + message_transmitter_program: ctx + .accounts + .message_transmitter_program + .to_account_info(), token_messenger: ctx.accounts.token_messenger.to_account_info(), remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), token_minter: ctx.accounts.token_minter.to_account_info(), @@ -149,6 +163,10 @@ pub fn prepare_order_response_cctp( .token_messenger_minter_custody_token .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), + token_messenger_minter_event_authority: ctx + .accounts + .token_messenger_minter_event_authority + .to_account_info(), }, &[Custodian::SIGNER_SEEDS], ), @@ -210,7 +228,7 @@ pub fn prepare_order_response_cctp( ctx.accounts .prepared_order_response .set_inner(PreparedOrderResponse { - bump: ctx.bumps["prepared_order_response"], + bump: ctx.bumps.prepared_order_response, fast_vaa_hash: fast_vaa.try_digest().unwrap().0, prepared_by: ctx.accounts.payer.key(), source_chain, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index 9295eb4f..85a05de5 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -8,16 +8,22 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_active_cctp]. #[derive(Accounts)] pub struct SettleAuctionActiveCctp<'info> { - #[account(mut)] + #[account( + mut, + address = prepared_order_response.prepared_by, // TODO: add err + )] payer: Signer<'info>, #[account( @@ -48,17 +54,12 @@ pub struct SettleAuctionActiveCctp<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be the account that created the prepared slow order. This account will most - /// likely be the same as the payer. - #[account(mut)] - prepared_by: AccountInfo<'info>, - #[account( mut, - close = prepared_by, + close = payer, seeds = [ PreparedOrderResponse::SEED_PREFIX, - prepared_by.key().as_ref(), + payer.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump = prepared_order_response.bump, @@ -86,11 +87,9 @@ pub struct SettleAuctionActiveCctp<'info> { #[account(mut)] best_offer_token: AccountInfo<'info>, - #[account( - mut, - token::mint = common::constants::usdc::id(), - )] - executor_token: Box>, + /// CHECK: Must be the same mint as the best offer token. + #[account(mut)] + executor_token: AccountInfo<'info>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -122,48 +121,11 @@ pub struct SettleAuctionActiveCctp<'info> { #[account(mut)] mint: AccountInfo<'info>, - /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). - message_transmitter_authority: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). - #[account(mut)] - message_transmitter_config: UncheckedAccount<'info>, - - /// CHECK: Mutable. Seeds must be \["used_nonces", remote_domain.to_string(), - /// first_nonce.to_string()\] (CCTP Message Transmitter program). - #[account(mut)] - used_nonces: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). - token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token - /// Messenger Minter program). - remote_token_messenger: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). - token_minter: UncheckedAccount<'info>, - - /// Token Messenger Minter's Local Token account. This program uses the mint of this account to - /// validate the `mint_recipient` token account's mint. - /// - /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - local_token: UncheckedAccount<'info>, - - /// CHECK: Seeds must be \["token_pair", remote_domain.to_string(), remote_token_address\] (CCTP - /// Token Messenger Minter program). - token_pair: UncheckedAccount<'info>, - - /// CHECK: Mutable. Seeds must be \["custody", mint\] (CCTP Token Messenger Minter program). - #[account(mut)] - token_messenger_minter_custody_token: UncheckedAccount<'info>, - /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] core_bridge_config: UncheckedAccount<'info>, - /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + /// CHECK: Mutable. Seeds must be \["core-msg", payer, payer_sequence.value\]. #[account( mut, seeds = [ @@ -175,6 +137,18 @@ pub struct SettleAuctionActiveCctp<'info> { )] core_message: AccountInfo<'info>, + /// CHECK: Mutable. Seeds must be \["cctp-msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + cctp_message: AccountInfo<'info>, + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). #[account(mut)] core_emitter_sequence: UncheckedAccount<'info>, @@ -186,6 +160,29 @@ pub struct SettleAuctionActiveCctp<'info> { /// CHECK: Seeds must be \["sender_authority"\] (CCTP Token Messenger Minter program). token_messenger_minter_sender_authority: UncheckedAccount<'info>, + /// CHECK: Mutable. Seeds must be \["message_transmitter"\] (CCTP Message Transmitter program). + #[account(mut)] + message_transmitter_config: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). + token_messenger: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + remote_token_messenger: UncheckedAccount<'info>, + + /// CHECK Seeds must be \["token_minter"\] (CCTP Token Messenger Minter program). + token_minter: UncheckedAccount<'info>, + + /// Local token account, which this program uses to validate the `mint` used to burn. + /// + /// CHECK: Mutable. Seeds must be \["local_token", mint\] (CCTP Token Messenger Minter program). + #[account(mut)] + local_token: UncheckedAccount<'info>, + + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_event_authority: UncheckedAccount<'info>, + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, @@ -217,6 +214,7 @@ fn handle_settle_auction_active_cctp( let super::SettledActive { user_amount: amount, fill, + sequence_seed, } = super::settle_active_and_prepare_fill(super::SettleActiveAndPrepareFill { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, @@ -226,6 +224,7 @@ fn handle_settle_auction_active_cctp( executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, custody_token: &ctx.accounts.custody_token, + payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, })?; @@ -236,12 +235,13 @@ fn handle_settle_auction_active_cctp( .token_messenger_minter_program .to_account_info(), wormhole_cctp_solana::cpi::DepositForBurnWithCaller { - src_token_owner: ctx.accounts.custodian.to_account_info(), + burn_token_owner: ctx.accounts.custodian.to_account_info(), + payer: ctx.accounts.payer.to_account_info(), token_messenger_minter_sender_authority: ctx .accounts .token_messenger_minter_sender_authority .to_account_info(), - src_token: ctx.accounts.custody_token.to_account_info(), + burn_token: ctx.accounts.custody_token.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config @@ -251,6 +251,7 @@ fn handle_settle_auction_active_cctp( token_minter: ctx.accounts.token_minter.to_account_info(), local_token: ctx.accounts.local_token.to_account_info(), mint: ctx.accounts.mint.to_account_info(), + cctp_message: ctx.accounts.cctp_message.to_account_info(), message_transmitter_program: ctx .accounts .message_transmitter_program @@ -260,8 +261,21 @@ fn handle_settle_auction_active_cctp( .token_messenger_minter_program .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + event_authority: ctx + .accounts + .token_messenger_minter_event_authority + .to_account_info(), }, - &[Custodian::SIGNER_SEEDS], + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + sequence_seed.as_ref(), + &[ctx.bumps.cctp_message], + ], + ], ), CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), @@ -281,12 +295,8 @@ fn handle_settle_auction_active_cctp( &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), - ctx.accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[ctx.bumps["core_message"]], + sequence_seed.as_ref(), + &[ctx.bumps.core_message], ], ], ), @@ -297,7 +307,7 @@ fn handle_settle_auction_active_cctp( amount, mint_recipient: ctx.accounts.to_router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: fill, + payload: fill.to_vec_payload(), }, )?; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs index 6db2bded..7938d828 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -14,7 +14,10 @@ use common::{ /// Accounts required for [settle_auction_active_local]. #[derive(Accounts)] pub struct SettleAuctionActiveLocal<'info> { - #[account(mut)] + #[account( + mut, + address = prepared_order_response.prepared_by, // TODO: add err + )] payer: Signer<'info>, #[account( @@ -45,17 +48,12 @@ pub struct SettleAuctionActiveLocal<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be the account that created the prepared slow order. This account will most - /// likely be the same as the payer. - #[account(mut)] - prepared_by: AccountInfo<'info>, - #[account( mut, - close = prepared_by, + close = payer, seeds = [ PreparedOrderResponse::SEED_PREFIX, - prepared_by.key().as_ref(), + payer.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump = prepared_order_response.bump, @@ -89,16 +87,14 @@ pub struct SettleAuctionActiveLocal<'info> { )] to_router_endpoint: Box>, - #[account( - mut, - token::mint = common::constants::usdc::id(), - )] - executor_token: Box>, - /// CHECK: Must equal the best offer token in the auction data account. #[account(mut)] best_offer_token: AccountInfo<'info>, + /// CHECK: Must be the same mint as the best offer token. + #[account(mut)] + executor_token: AccountInfo<'info>, + /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message /// from its custody account to this account. @@ -154,6 +150,7 @@ pub fn settle_auction_active_local(ctx: Context) -> Re let super::SettledActive { user_amount: amount, fill, + sequence_seed, } = super::settle_active_and_prepare_fill(super::SettleActiveAndPrepareFill { custodian: &ctx.accounts.custodian, auction_config: &ctx.accounts.auction_config, @@ -163,6 +160,7 @@ pub fn settle_auction_active_local(ctx: Context) -> Re executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, custody_token: &ctx.accounts.custody_token, + payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, })?; @@ -186,12 +184,8 @@ pub fn settle_auction_active_local(ctx: Context) -> Re &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), - ctx.accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[ctx.bumps["core_message"]], + sequence_seed.as_ref(), + &[ctx.bumps.core_message], ], ], ), diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index a6c70024..f988513a 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -5,7 +5,9 @@ mod local; pub use local::*; use crate::{ - state::{Auction, AuctionConfig, AuctionStatus, Custodian, PreparedOrderResponse}, + state::{ + Auction, AuctionConfig, AuctionStatus, Custodian, PayerSequence, PreparedOrderResponse, + }, utils::{self, auction::DepositPenalty}, }; use anchor_lang::prelude::*; @@ -24,15 +26,17 @@ struct SettleActiveAndPrepareFill<'ctx, 'info> { fast_vaa: &'ctx AccountInfo<'info>, auction: &'ctx mut Account<'info, Auction>, prepared_order_response: &'ctx Account<'info, PreparedOrderResponse>, - executor_token: &'ctx Account<'info, token::TokenAccount>, + executor_token: &'ctx AccountInfo<'info>, best_offer_token: &'ctx AccountInfo<'info>, custody_token: &'ctx AccountInfo<'info>, + payer_sequence: &'ctx mut Account<'info, PayerSequence>, token_program: &'ctx Program<'info, token::Token>, } struct SettledActive { user_amount: u64, fill: Fill, + sequence_seed: [u8; 8], } fn settle_active_and_prepare_fill( @@ -47,6 +51,7 @@ fn settle_active_and_prepare_fill( executor_token, best_offer_token, custody_token, + payer_sequence, token_program, } = accounts; @@ -131,5 +136,6 @@ fn settle_active_and_prepare_fill( redeemer: order.redeemer(), redeemer_message: order.message_to_vec().into(), }, + sequence_seed: payer_sequence.take_and_uptick().to_be_bytes(), }) } diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs index ad7b4baf..adb3e0da 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs @@ -6,16 +6,22 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_none_cctp]. #[derive(Accounts)] pub struct SettleAuctionNoneCctp<'info> { - #[account(mut)] + #[account( + mut, + address = prepared_order_response.prepared_by, // TODO: add err + )] payer: Signer<'info>, #[account( @@ -45,22 +51,21 @@ pub struct SettleAuctionNoneCctp<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be the account that created the prepared slow order. This account will most - /// likely be the same as the payer. - #[account(mut)] - prepared_by: AccountInfo<'info>, - + // /// CHECK: Must be the account that created the prepared slow order. This account will most + // /// likely be the same as the payer. + // #[account(mut)] + // prepared_by: AccountInfo<'info>, #[account( mut, - close = prepared_by, + close = payer, seeds = [ PreparedOrderResponse::SEED_PREFIX, - prepared_by.key().as_ref(), + payer.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump = prepared_order_response.bump, )] - prepared_order_response: Account<'info, PreparedOrderResponse>, + prepared_order_response: Box>, /// There should be no account data here because an auction was never created. #[account( @@ -133,7 +138,7 @@ pub struct SettleAuctionNoneCctp<'info> { #[account(mut)] core_bridge_config: UncheckedAccount<'info>, - /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + /// CHECK: Mutable. Seeds must be \["core-msg", payer, payer_sequence.value\]. #[account( mut, seeds = [ @@ -145,6 +150,18 @@ pub struct SettleAuctionNoneCctp<'info> { )] core_message: AccountInfo<'info>, + /// CHECK: Mutable. Seeds must be \["cctp-msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + cctp_message: AccountInfo<'info>, + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). #[account(mut)] core_emitter_sequence: UncheckedAccount<'info>, @@ -176,6 +193,9 @@ pub struct SettleAuctionNoneCctp<'info> { #[account(mut)] local_token: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_event_authority: UncheckedAccount<'info>, + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, @@ -208,6 +228,7 @@ fn handle_settle_auction_none_cctp( let super::SettledNone { user_amount: amount, fill, + sequence_seed, } = super::settle_none_and_prepare_fill( super::SettleNoneAndPrepareFill { custodian: &ctx.accounts.custodian, @@ -218,9 +239,10 @@ fn handle_settle_auction_none_cctp( to_router_endpoint: &ctx.accounts.to_router_endpoint, fee_recipient_token: &ctx.accounts.fee_recipient_token, custody_token: &ctx.accounts.custody_token, + payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, }, - ctx.bumps["auction"], + ctx.bumps.auction, )?; // This returns the CCTP nonce, but we do not need it. @@ -230,12 +252,13 @@ fn handle_settle_auction_none_cctp( .token_messenger_minter_program .to_account_info(), wormhole_cctp_solana::cpi::DepositForBurnWithCaller { - src_token_owner: ctx.accounts.custodian.to_account_info(), + burn_token_owner: ctx.accounts.custodian.to_account_info(), + payer: ctx.accounts.payer.to_account_info(), token_messenger_minter_sender_authority: ctx .accounts .token_messenger_minter_sender_authority .to_account_info(), - src_token: ctx.accounts.custody_token.to_account_info(), + burn_token: ctx.accounts.custody_token.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config @@ -245,6 +268,7 @@ fn handle_settle_auction_none_cctp( token_minter: ctx.accounts.token_minter.to_account_info(), local_token: ctx.accounts.local_token.to_account_info(), mint: ctx.accounts.mint.to_account_info(), + cctp_message: ctx.accounts.cctp_message.to_account_info(), message_transmitter_program: ctx .accounts .message_transmitter_program @@ -254,8 +278,21 @@ fn handle_settle_auction_none_cctp( .token_messenger_minter_program .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + event_authority: ctx + .accounts + .token_messenger_minter_event_authority + .to_account_info(), }, - &[Custodian::SIGNER_SEEDS], + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + sequence_seed.as_ref(), + &[ctx.bumps.cctp_message], + ], + ], ), CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), @@ -275,12 +312,8 @@ fn handle_settle_auction_none_cctp( &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), - ctx.accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[ctx.bumps["core_message"]], + sequence_seed.as_ref(), + &[ctx.bumps.core_message], ], ], ), @@ -292,7 +325,7 @@ fn handle_settle_auction_none_cctp( // TODO: add mint recipient to the router endpoint account to future proof this? mint_recipient: ctx.accounts.to_router_endpoint.address, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, - payload: fill, + payload: fill.to_vec_payload(), }, )?; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs index 22818f64..36692216 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -11,7 +11,10 @@ use common::{ /// Accounts required for [settle_auction_none_local]. #[derive(Accounts)] pub struct SettleAuctionNoneLocal<'info> { - #[account(mut)] + #[account( + mut, + address = prepared_order_response.prepared_by, // TODO: add err + )] payer: Signer<'info>, #[account( @@ -41,17 +44,12 @@ pub struct SettleAuctionNoneLocal<'info> { #[account(owner = core_bridge_program::id())] fast_vaa: AccountInfo<'info>, - /// CHECK: Must be the account that created the prepared slow order. This account will most - /// likely be the same as the payer. - #[account(mut)] - prepared_by: AccountInfo<'info>, - #[account( mut, - close = prepared_by, + close = payer, seeds = [ PreparedOrderResponse::SEED_PREFIX, - prepared_by.key().as_ref(), + payer.key().as_ref(), core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() ], bump = prepared_order_response.bump, @@ -157,6 +155,7 @@ pub fn settle_auction_none_local(ctx: Context) -> Result let super::SettledNone { user_amount: amount, fill, + sequence_seed, } = super::settle_none_and_prepare_fill( super::SettleNoneAndPrepareFill { custodian: &ctx.accounts.custodian, @@ -167,9 +166,10 @@ pub fn settle_auction_none_local(ctx: Context) -> Result to_router_endpoint: &ctx.accounts.to_router_endpoint, fee_recipient_token: &ctx.accounts.fee_recipient_token, custody_token: &ctx.accounts.custody_token, + payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, }, - ctx.bumps["auction"], + ctx.bumps.auction, )?; // Publish message via Core Bridge. @@ -192,12 +192,8 @@ pub fn settle_auction_none_local(ctx: Context) -> Result &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), - ctx.accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[ctx.bumps["core_message"]], + sequence_seed.as_ref(), + &[ctx.bumps.core_message], ], ], ), diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs index 72aab29e..096bc04b 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -4,7 +4,9 @@ pub use cctp::*; mod local; pub use local::*; -use crate::state::{Auction, AuctionStatus, Custodian, PreparedOrderResponse, RouterEndpoint}; +use crate::state::{ + Auction, AuctionStatus, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint, +}; use anchor_lang::prelude::*; use anchor_spl::token; use common::{ @@ -24,12 +26,14 @@ struct SettleNoneAndPrepareFill<'ctx, 'info> { to_router_endpoint: &'ctx Account<'info, RouterEndpoint>, fee_recipient_token: &'ctx AccountInfo<'info>, custody_token: &'ctx AccountInfo<'info>, + payer_sequence: &'ctx mut Account<'info, PayerSequence>, token_program: &'ctx Program<'info, token::Token>, } struct SettledNone { user_amount: u64, fill: Fill, + sequence_seed: [u8; 8], } fn settle_none_and_prepare_fill( @@ -45,6 +49,7 @@ fn settle_none_and_prepare_fill( to_router_endpoint, fee_recipient_token, custody_token, + payer_sequence, token_program, } = accounts; @@ -100,5 +105,6 @@ fn settle_none_and_prepare_fill( redeemer: order.redeemer(), redeemer_message: order.message_to_vec().into(), }, + sequence_seed: payer_sequence.take_and_uptick().to_be_bytes(), }) } diff --git a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs index f38d9afa..5a0003ab 100644 --- a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -95,7 +95,7 @@ pub fn complete_fast_fill(ctx: Context) -> Result<()> { // Fill redeemed fast fill data. ctx.accounts.redeemed_fast_fill.set_inner(RedeemedFastFill { - bump: ctx.bumps["redeemed_fast_fill"], + bump: ctx.bumps.redeemed_fast_fill, vaa_hash: vaa.try_digest().unwrap().0, sequence: emitter.sequence, }); diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index a7548a80..f9865bce 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -33,7 +33,5 @@ hex.workspace = true ruint.workspace = true cfg-if.workspace = true -ahash.workspace = true - [dev-dependencies] hex-literal.workspace = true \ No newline at end of file diff --git a/solana/programs/token-router/src/processor/consume_prepared_fill.rs b/solana/programs/token-router/src/processor/consume_prepared_fill.rs index 254dfca0..36a55c5a 100644 --- a/solana/programs/token-router/src/processor/consume_prepared_fill.rs +++ b/solana/programs/token-router/src/processor/consume_prepared_fill.rs @@ -48,9 +48,13 @@ pub struct ConsumePreparedFill<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + seeds = [ + crate::PREPARED_CUSTODY_TOKEN_SEED_PREFIX, + prepared_fill.key().as_ref(), + ], + bump = prepared_fill.prepared_custody_token_bump, )] - custody_token: AccountInfo<'info>, + prepared_custody_token: Account<'info, token::TokenAccount>, token_program: Program<'info, token::Token>, } @@ -61,12 +65,23 @@ pub fn consume_prepared_fill(ctx: Context) -> Result<()> { CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), + from: ctx.accounts.prepared_custody_token.to_account_info(), to: ctx.accounts.dst_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, &[Custodian::SIGNER_SEEDS], ), - ctx.accounts.prepared_fill.amount, - ) + ctx.accounts.prepared_custody_token.amount, + )?; + + // Finally close token account. + token::close_account(CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::CloseAccount { + account: ctx.accounts.prepared_custody_token.to_account_info(), + destination: ctx.accounts.rent_recipient.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + )) } diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index f805b5b7..4db0df71 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -4,10 +4,13 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use common::wormhole_cctp_solana::{ - self, - cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, +use common::{ + wormhole_cctp_solana::{ + self, + cctp::{message_transmitter_program, token_messenger_minter_program}, + wormhole::core_bridge_program, + }, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [place_market_order_cctp]. @@ -40,7 +43,7 @@ pub struct PlaceMarketOrderCctp<'info> { bump = Custodian::BUMP, constraint = !custodian.paused @ TokenRouterError::Paused, )] - custodian: Account<'info, Custodian>, + custodian: Box>, #[account( mut, @@ -96,7 +99,7 @@ pub struct PlaceMarketOrderCctp<'info> { #[account(mut)] core_bridge_config: UncheckedAccount<'info>, - /// CHECK: Mutable. Seeds must be \["msg", payer, payer_sequence.value\]. + /// CHECK: Mutable. Seeds must be \["core-msg", payer, payer_sequence.value\]. #[account( mut, seeds = [ @@ -108,6 +111,18 @@ pub struct PlaceMarketOrderCctp<'info> { )] core_message: AccountInfo<'info>, + /// CHECK: Mutable. Seeds must be \["cctp-msg", payer, payer_sequence.value\]. + #[account( + mut, + seeds = [ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + payer.key().as_ref(), + payer_sequence.value.to_be_bytes().as_ref(), + ], + bump, + )] + cctp_message: AccountInfo<'info>, + /// CHECK: Seeds must be \["Sequence"\, custodian] (Wormhole Core Bridge program). #[account(mut)] core_emitter_sequence: UncheckedAccount<'info>, @@ -139,6 +154,9 @@ pub struct PlaceMarketOrderCctp<'info> { #[account(mut)] local_token: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Token Messenger Minter program). + token_messenger_minter_event_authority: UncheckedAccount<'info>, + core_bridge_program: Program<'info, core_bridge_program::CoreBridge>, token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, @@ -174,6 +192,8 @@ fn handle_place_market_order_cctp( ) -> Result<()> { let redeemer_message = std::mem::take(&mut ctx.accounts.prepared_order.redeemer_message); + let sequence_seed = ctx.accounts.payer_sequence.take_and_uptick().to_be_bytes(); + // This returns the CCTP nonce, but we do not need it. wormhole_cctp_solana::cpi::burn_and_publish( CpiContext::new_with_signer( @@ -181,12 +201,13 @@ fn handle_place_market_order_cctp( .token_messenger_minter_program .to_account_info(), wormhole_cctp_solana::cpi::DepositForBurnWithCaller { - src_token_owner: ctx.accounts.custodian.to_account_info(), + burn_token_owner: ctx.accounts.custodian.to_account_info(), + payer: ctx.accounts.payer.to_account_info(), token_messenger_minter_sender_authority: ctx .accounts .token_messenger_minter_sender_authority .to_account_info(), - src_token: ctx.accounts.prepared_custody_token.to_account_info(), + burn_token: ctx.accounts.prepared_custody_token.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config @@ -196,6 +217,7 @@ fn handle_place_market_order_cctp( token_minter: ctx.accounts.token_minter.to_account_info(), local_token: ctx.accounts.local_token.to_account_info(), mint: ctx.accounts.mint.to_account_info(), + cctp_message: ctx.accounts.cctp_message.to_account_info(), message_transmitter_program: ctx .accounts .message_transmitter_program @@ -205,8 +227,21 @@ fn handle_place_market_order_cctp( .token_messenger_minter_program .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), + system_program: ctx.accounts.system_program.to_account_info(), + event_authority: ctx + .accounts + .token_messenger_minter_event_authority + .to_account_info(), }, - &[Custodian::SIGNER_SEEDS], + &[ + Custodian::SIGNER_SEEDS, + &[ + common::constants::CCTP_MESSAGE_SEED_PREFIX, + ctx.accounts.payer.key().as_ref(), + sequence_seed.as_ref(), + &[ctx.bumps.cctp_message], + ], + ], ), CpiContext::new_with_signer( ctx.accounts.core_bridge_program.to_account_info(), @@ -226,17 +261,13 @@ fn handle_place_market_order_cctp( &[ common::constants::CORE_MESSAGE_SEED_PREFIX, ctx.accounts.payer.key().as_ref(), - ctx.accounts - .payer_sequence - .take_and_uptick() - .to_be_bytes() - .as_ref(), - &[ctx.bumps["core_message"]], + sequence_seed.as_ref(), + &[ctx.bumps.core_message], ], ], ), wormhole_cctp_solana::cpi::BurnAndPublishArgs { - burn_source: Some(ctx.accounts.prepared_order.order_token), + burn_source: Some(ctx.accounts.prepared_order.src_token), destination_caller: ctx.accounts.router_endpoint.address, destination_cctp_domain, amount: ctx.accounts.prepared_custody_token.amount, @@ -247,7 +278,8 @@ fn handle_place_market_order_cctp( order_sender: ctx.accounts.order_sender.key().to_bytes(), redeemer: ctx.accounts.prepared_order.redeemer, redeemer_message: redeemer_message.into(), - }, + } + .to_vec_payload(), }, )?; diff --git a/solana/programs/token-router/src/processor/market_order/prepare.rs b/solana/programs/token-router/src/processor/market_order/prepare.rs index fa8bf622..82e94d72 100644 --- a/solana/programs/token-router/src/processor/market_order/prepare.rs +++ b/solana/programs/token-router/src/processor/market_order/prepare.rs @@ -42,7 +42,7 @@ pub struct PrepareMarketOrder<'info> { /// NOTE: This token account must have delegated transfer authority to the custodian prior to /// invoking this instruction. #[account(mut)] - order_token: AccountInfo<'info>, + src_token: AccountInfo<'info>, #[account(token::mint = mint)] refund_token: Account<'info, token::TokenAccount>, @@ -121,16 +121,16 @@ pub fn prepare_market_order( // Set the values in prepared order account. ctx.accounts.prepared_order.set_inner(PreparedOrder { - info: Box::new(PreparedOrderInfo { + info: PreparedOrderInfo { order_sender: ctx.accounts.order_sender.key(), prepared_by: ctx.accounts.payer.key(), order_type: OrderType::Market { min_amount_out }, - order_token: ctx.accounts.order_token.key(), + src_token: ctx.accounts.src_token.key(), refund_token: ctx.accounts.refund_token.key(), target_chain, redeemer, - prepared_custody_token_bump: ctx.bumps["prepared_custody_token"], - }), + prepared_custody_token_bump: ctx.bumps.prepared_custody_token, + }, redeemer_message, }); @@ -139,7 +139,7 @@ pub fn prepare_market_order( CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), token::Transfer { - from: ctx.accounts.order_token.to_account_info(), + from: ctx.accounts.src_token.to_account_info(), to: ctx.accounts.prepared_custody_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index d9c4fb55..230362cf 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -44,7 +44,14 @@ pub struct RedeemCctpFill<'info> { ], bump, )] - prepared_fill: Account<'info, PreparedFill>, + prepared_fill: Box>, + + /// CHECK: Mutable. Seeds must be \["custody"\]. + #[account( + mut, + address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + )] + custody_token: AccountInfo<'info>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -54,10 +61,21 @@ pub struct RedeemCctpFill<'info> { /// /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( - mut, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + init_if_needed, + payer = payer, + token::mint = mint, + token::authority = custodian, + seeds = [ + crate::PREPARED_CUSTODY_TOKEN_SEED_PREFIX, + prepared_fill.key().as_ref(), + ], + bump, )] - custody_token: AccountInfo<'info>, + prepared_custody_token: Box>, + + /// CHECK: This mint must be USDC. + #[account(address = common::constants::usdc::id())] + mint: AccountInfo<'info>, /// Registered emitter account representing a Circle Integration on another network. /// @@ -83,6 +101,9 @@ pub struct RedeemCctpFill<'info> { #[account(mut)] used_nonces: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Message Transmitter program)). + message_transmitter_event_authority: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["token_messenger"\] (CCTP Token Messenger Minter program). token_messenger: UncheckedAccount<'info>, @@ -108,6 +129,9 @@ pub struct RedeemCctpFill<'info> { #[account(mut)] token_messenger_minter_custody_token: UncheckedAccount<'info>, + /// CHECK: Seeds must be \["__event_authority"\] (CCTP Token Messenger Minter program)). + token_messenger_minter_event_authority: UncheckedAccount<'info>, + token_messenger_minter_program: Program<'info, token_messenger_minter_program::TokenMessengerMinter>, message_transmitter_program: Program<'info, message_transmitter_program::MessageTransmitter>, @@ -158,6 +182,14 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) .token_messenger_minter_program .to_account_info(), system_program: ctx.accounts.system_program.to_account_info(), + message_transmitter_event_authority: ctx + .accounts + .message_transmitter_event_authority + .to_account_info(), + message_transmitter_program: ctx + .accounts + .message_transmitter_program + .to_account_info(), token_messenger: ctx.accounts.token_messenger.to_account_info(), remote_token_messenger: ctx.accounts.remote_token_messenger.to_account_info(), token_minter: ctx.accounts.token_minter.to_account_info(), @@ -169,6 +201,10 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) .token_messenger_minter_custody_token .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), + token_messenger_minter_event_authority: ctx + .accounts + .token_messenger_minter_event_authority + .to_account_info(), }, &[Custodian::SIGNER_SEEDS], ), @@ -207,7 +243,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) { let data_len = PreparedFill::compute_size(fill.redeemer_message_len().try_into().unwrap()); - let acc_info: &AccountInfo = ctx.accounts.prepared_fill.as_ref(); + let acc_info: &AccountInfo = ctx.accounts.prepared_fill.as_ref().as_ref(); let lamport_diff = Rent::get().map(|rent| { rent.minimum_balance(data_len) .saturating_sub(acc_info.lamports()) @@ -228,17 +264,31 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { vaa_hash: vaa.try_digest().unwrap().0, - bump: ctx.bumps["prepared_fill"], + bump: ctx.bumps.prepared_fill, + prepared_custody_token_bump: ctx.bumps.prepared_custody_token, redeemer: Pubkey::from(fill.redeemer()), prepared_by: ctx.accounts.payer.key(), fill_type: FillType::WormholeCctpDeposit, - amount, source_chain: fill.source_chain(), order_sender: fill.order_sender(), redeemer_message: fill.message_to_vec(), }); - // Done. + // Transfer to prepared custody account. + token::transfer( + CpiContext::new_with_signer( + ctx.accounts.token_program.to_account_info(), + token::Transfer { + from: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.prepared_custody_token.to_account_info(), + authority: ctx.accounts.custodian.to_account_info(), + }, + &[Custodian::SIGNER_SEEDS], + ), + amount, + )?; + + // TODO: close custody token. Ok(()) } diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index a4f825ea..527e2799 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -47,10 +47,21 @@ pub struct RedeemFastFill<'info> { /// /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( - mut, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + init_if_needed, + payer = payer, + token::mint = mint, + token::authority = custodian, + seeds = [ + crate::PREPARED_CUSTODY_TOKEN_SEED_PREFIX, + prepared_fill.key().as_ref(), + ], + bump, )] - custody_token: AccountInfo<'info>, + prepared_custody_token: Account<'info, token::TokenAccount>, + + /// CHECK: This mint must be USDC. + #[account(address = common::constants::usdc::id())] + mint: AccountInfo<'info>, /// CHECK: Seeds must be \["emitter"] (Matching Engine program). #[account(mut)] @@ -95,7 +106,7 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { .matching_engine_redeemed_fast_fill .to_account_info(), token_router_emitter: ctx.accounts.custodian.to_account_info(), - token_router_custody_token: ctx.accounts.custody_token.to_account_info(), + token_router_custody_token: ctx.accounts.prepared_custody_token.to_account_info(), router_endpoint: ctx .accounts .matching_engine_router_endpoint @@ -137,11 +148,11 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { vaa_hash: vaa.try_digest().unwrap().0, - bump: ctx.bumps["prepared_fill"], + bump: ctx.bumps.prepared_fill, + prepared_custody_token_bump: ctx.bumps.prepared_custody_token, redeemer: Pubkey::from(fill.redeemer()), prepared_by: ctx.accounts.payer.key(), fill_type: FillType::FastFill, - amount: fast_fill.amount(), source_chain: fill.source_chain(), order_sender: fill.order_sender(), redeemer_message: fill.message_to_vec(), diff --git a/solana/programs/token-router/src/state/prepared_fill.rs b/solana/programs/token-router/src/state/prepared_fill.rs index bc09e0ce..2a7f3f31 100644 --- a/solana/programs/token-router/src/state/prepared_fill.rs +++ b/solana/programs/token-router/src/state/prepared_fill.rs @@ -12,15 +12,15 @@ pub enum FillType { pub struct PreparedFill { pub vaa_hash: [u8; 32], pub bump: u8, + pub prepared_custody_token_bump: u8, - pub redeemer: Pubkey, pub prepared_by: Pubkey, pub fill_type: FillType, - pub amount: u64, pub source_chain: u16, pub order_sender: [u8; 32], + pub redeemer: Pubkey, pub redeemer_message: Vec, } diff --git a/solana/programs/token-router/src/state/prepared_order.rs b/solana/programs/token-router/src/state/prepared_order.rs index 655c311c..5203d0b2 100644 --- a/solana/programs/token-router/src/state/prepared_order.rs +++ b/solana/programs/token-router/src/state/prepared_order.rs @@ -7,22 +7,23 @@ pub enum OrderType { #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace)] pub struct PreparedOrderInfo { + pub prepared_custody_token_bump: u8, + pub order_sender: Pubkey, pub prepared_by: Pubkey, pub order_type: OrderType, - pub order_token: Pubkey, + pub src_token: Pubkey, pub refund_token: Pubkey, pub target_chain: u16, pub redeemer: [u8; 32], - pub prepared_custody_token_bump: u8, } #[account] #[derive(Debug)] pub struct PreparedOrder { - pub info: Box, + pub info: PreparedOrderInfo, pub redeemer_message: Vec, } diff --git a/solana/ts/src/cctp/index.ts b/solana/ts/src/cctp/index.ts index acd4e0c3..3527387a 100644 --- a/solana/ts/src/cctp/index.ts +++ b/solana/ts/src/cctp/index.ts @@ -1,6 +1,3 @@ export { MessageTransmitterProgram } from "./messageTransmitter"; export { CctpMessage, CctpTokenBurnMessage } from "./messages"; -export { - DEPOSIT_FOR_BURN_WITH_CALLER_IX_SELECTOR, - TokenMessengerMinterProgram, -} from "./tokenMessengerMinter"; +export { TokenMessengerMinterProgram } from "./tokenMessengerMinter"; diff --git a/solana/ts/src/cctp/messageTransmitter/MessageSent.ts b/solana/ts/src/cctp/messageTransmitter/MessageSent.ts new file mode 100644 index 00000000..8cbb5522 --- /dev/null +++ b/solana/ts/src/cctp/messageTransmitter/MessageSent.ts @@ -0,0 +1,11 @@ +import { PublicKey } from "@solana/web3.js"; + +export class MessageSent { + rentPayer: PublicKey; + message: Buffer; + + constructor(rentPayer: PublicKey, message: Buffer) { + this.rentPayer = rentPayer; + this.message = message; + } +} diff --git a/solana/ts/src/cctp/messageTransmitter/MessageTransmitterConfig.ts b/solana/ts/src/cctp/messageTransmitter/MessageTransmitterConfig.ts index e8b86ab2..d297ab9f 100644 --- a/solana/ts/src/cctp/messageTransmitter/MessageTransmitterConfig.ts +++ b/solana/ts/src/cctp/messageTransmitter/MessageTransmitterConfig.ts @@ -1,3 +1,4 @@ +import { BN } from "@coral-xyz/anchor"; import { PublicKey } from "@solana/web3.js"; export class MessageTransmitterConfig { @@ -9,10 +10,9 @@ export class MessageTransmitterConfig { localDomain: number; version: number; signatureThreshold: number; - enabledAttesters: Array>; - maxMessageBodySize: bigint; - nextAvailableNonce: bigint; - authorityBump: number; + enabledAttesters: Array; + maxMessageBodySize: BN; + nextAvailableNonce: BN; constructor( owner: PublicKey, @@ -23,10 +23,9 @@ export class MessageTransmitterConfig { localDomain: number, version: number, signatureThreshold: number, - enabledAttesters: Array>, - maxMessageBodySize: bigint, - nextAvailableNonce: bigint, - authorityBump: number, + enabledAttesters: Array, + maxMessageBodySize: BN, + nextAvailableNonce: BN, ) { this.owner = owner; this.pendingOwner = pendingOwner; @@ -39,7 +38,6 @@ export class MessageTransmitterConfig { this.enabledAttesters = enabledAttesters; this.maxMessageBodySize = maxMessageBodySize; this.nextAvailableNonce = nextAvailableNonce; - this.authorityBump = authorityBump; } static address(programId: PublicKey) { diff --git a/solana/ts/src/cctp/messageTransmitter/index.ts b/solana/ts/src/cctp/messageTransmitter/index.ts index d9067be3..05abc9ce 100644 --- a/solana/ts/src/cctp/messageTransmitter/index.ts +++ b/solana/ts/src/cctp/messageTransmitter/index.ts @@ -1,9 +1,9 @@ import { Program } from "@coral-xyz/anchor"; -import { TOKEN_PROGRAM_ID } from "@solana/spl-token"; import { Connection, PublicKey } from "@solana/web3.js"; import { CctpTokenBurnMessage } from "../messages"; import { TokenMessengerMinterProgram } from "../tokenMessengerMinter"; import { IDL, MessageTransmitter } from "../types/message_transmitter"; +import { MessageSent } from "./MessageSent"; import { MessageTransmitterConfig } from "./MessageTransmitterConfig"; import { UsedNonses } from "./UsedNonces"; @@ -11,19 +11,20 @@ export const PROGRAM_IDS = ["CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd"] as c export type ProgramId = (typeof PROGRAM_IDS)[number]; -export type ReceiveMessageAccounts = { +export type ReceiveTokenMessengerMinterMessageAccounts = { authority: PublicKey; messageTransmitterConfig: PublicKey; usedNonces: PublicKey; tokenMessengerMinterProgram: PublicKey; + messageTransmitterEventAuthority: PublicKey; + messageTransmitterProgram: PublicKey; tokenMessenger: PublicKey; remoteTokenMessenger: PublicKey; tokenMinter: PublicKey; localToken: PublicKey; tokenPair: PublicKey; custodyToken: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; + tokenMessengerMinterEventAuthority: PublicKey; }; export class MessageTransmitterProgram { @@ -47,60 +48,40 @@ export class MessageTransmitterProgram { } async fetchMessageTransmitterConfig(addr: PublicKey): Promise { - const { - owner, - pendingOwner, - attesterManager, - pauser, - paused, - localDomain, - version, - signatureThreshold, - enabledAttesters, - maxMessageBodySize, - nextAvailableNonce, - authorityBump, - } = await this.program.account.messageTransmitter.fetch(addr); - - return new MessageTransmitterConfig( - owner, - pendingOwner, - attesterManager, - pauser, - paused, - localDomain, - version, - signatureThreshold, - enabledAttesters.map((addr) => Array.from(addr.toBuffer())), - BigInt(maxMessageBodySize.toString()), - BigInt(nextAvailableNonce.toString()), - authorityBump - ); + return this.program.account.messageTransmitter.fetch(addr); } usedNoncesAddress(remoteDomain: number, nonce: bigint): PublicKey { return UsedNonses.address(this.ID, remoteDomain, nonce); } - authorityAddress(): PublicKey { + authorityAddress(cpiProgramId: PublicKey): PublicKey { return PublicKey.findProgramAddressSync( - [Buffer.from("message_transmitter_authority")], - this.ID + [Buffer.from("message_transmitter_authority"), cpiProgramId.toBuffer()], + this.ID, )[0]; } + eventAuthorityAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("__event_authority")], this.ID)[0]; + } + + fetchMessageSent(addr: PublicKey): Promise { + return this.program.account.messageSent.fetch(addr); + } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { switch (this._programId) { case testnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", ); } case mainnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", ); } default: { @@ -109,10 +90,10 @@ export class MessageTransmitterProgram { } } - receiveMessageAccounts( + receiveTokenMessengerMinterMessageAccounts( mint: PublicKey, - circleMessage: CctpTokenBurnMessage | Buffer - ): ReceiveMessageAccounts { + circleMessage: CctpTokenBurnMessage | Buffer, + ): ReceiveTokenMessengerMinterMessageAccounts { const { cctp: { sourceDomain, nonce }, burnTokenAddress, @@ -120,10 +101,12 @@ export class MessageTransmitterProgram { const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); return { - authority: this.authorityAddress(), + authority: this.authorityAddress(tokenMessengerMinterProgram.ID), messageTransmitterConfig: this.messageTransmitterConfigAddress(), usedNonces: this.usedNoncesAddress(sourceDomain, nonce), tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, + messageTransmitterEventAuthority: this.eventAuthorityAddress(), + messageTransmitterProgram: this.ID, tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), remoteTokenMessenger: tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceDomain), @@ -131,8 +114,7 @@ export class MessageTransmitterProgram { localToken: tokenMessengerMinterProgram.localTokenAddress(mint), tokenPair: tokenMessengerMinterProgram.tokenPairAddress(sourceDomain, burnTokenAddress), custodyToken: tokenMessengerMinterProgram.custodyTokenAddress(mint), - messageTransmitterProgram: this.ID, - tokenProgram: TOKEN_PROGRAM_ID, + tokenMessengerMinterEventAuthority: tokenMessengerMinterProgram.eventAuthorityAddress(), }; } } diff --git a/solana/ts/src/cctp/messages.ts b/solana/ts/src/cctp/messages.ts index 7c898ba5..28894d37 100644 --- a/solana/ts/src/cctp/messages.ts +++ b/solana/ts/src/cctp/messages.ts @@ -33,9 +33,9 @@ export class CctpMessage { const sourceDomain = buf.readUInt32BE(4); const destinationDomain = buf.readUInt32BE(8); const nonce = buf.readBigUInt64BE(12); - const sender = Array.from(buf.subarray(20, 52)); - const recipient = Array.from(buf.subarray(52, 84)); - const targetCaller = Array.from(buf.subarray(84, 116)); + const sender = Array.from(buf.slice(20, 52)); + const recipient = Array.from(buf.slice(52, 84)); + const targetCaller = Array.from(buf.slice(84, 116)); const message = buf.subarray(116); return new CctpMessage( @@ -48,7 +48,7 @@ export class CctpMessage { recipient, targetCaller, }, - message + message, ); } @@ -72,7 +72,7 @@ export class CctpTokenBurnMessage { burnTokenAddress: Array, mintRecipient: Array, amount: bigint, - sender: Array + sender: Array, ) { this.cctp = cctp; this.version = version; @@ -104,7 +104,7 @@ export class CctpTokenBurnMessage { burnTokenAddress, mintRecipient, amount, - sender + sender, ); } diff --git a/solana/ts/src/cctp/tokenMessengerMinter/index.ts b/solana/ts/src/cctp/tokenMessengerMinter/index.ts index 6f5957c3..941ce615 100644 --- a/solana/ts/src/cctp/tokenMessengerMinter/index.ts +++ b/solana/ts/src/cctp/tokenMessengerMinter/index.ts @@ -1,5 +1,4 @@ import { Program } from "@coral-xyz/anchor"; -import { TOKEN_PROGRAM_ID } from "@solana/spl-token"; import { Connection, PublicKey } from "@solana/web3.js"; import { MessageTransmitterProgram } from "../messageTransmitter"; import { IDL, TokenMessengerMinter } from "../types/token_messenger_minter"; @@ -7,10 +6,6 @@ import { RemoteTokenMessenger } from "./RemoteTokenMessenger"; export const PROGRAM_IDS = ["CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3"] as const; -export const DEPOSIT_FOR_BURN_WITH_CALLER_IX_SELECTOR = Uint8Array.from([ - 167, 222, 19, 114, 85, 21, 14, 118, -]); - export type ProgramId = (typeof PROGRAM_IDS)[number]; export type DepositForBurnWithCallerAccounts = { @@ -20,9 +15,9 @@ export type DepositForBurnWithCallerAccounts = { remoteTokenMessenger: PublicKey; tokenMinter: PublicKey; localToken: PublicKey; + tokenMessengerMinterEventAuthority: PublicKey; messageTransmitterProgram: PublicKey; tokenMessengerMinterProgram: PublicKey; - tokenProgram: PublicKey; }; export class TokenMessengerMinterProgram { @@ -52,7 +47,7 @@ export class TokenMessengerMinterProgram { custodyTokenAddress(mint: PublicKey): PublicKey { return PublicKey.findProgramAddressSync( [Buffer.from("custody"), mint.toBuffer()], - this.ID + this.ID, )[0]; } @@ -63,7 +58,7 @@ export class TokenMessengerMinterProgram { Buffer.from(remoteDomain.toString()), Buffer.from(remoteTokenAddress), ], - this.ID + this.ID, )[0]; } @@ -73,7 +68,7 @@ export class TokenMessengerMinterProgram { async fetchRemoteTokenMessenger(addr: PublicKey): Promise { const { domain, tokenMessenger } = await this.program.account.remoteTokenMessenger.fetch( - addr + addr, ); return new RemoteTokenMessenger(domain, Array.from(tokenMessenger.toBuffer())); } @@ -81,26 +76,30 @@ export class TokenMessengerMinterProgram { localTokenAddress(mint: PublicKey): PublicKey { return PublicKey.findProgramAddressSync( [Buffer.from("local_token"), mint.toBuffer()], - this.ID + this.ID, )[0]; } - senderAuthority(): PublicKey { + senderAuthorityAddress(): PublicKey { return PublicKey.findProgramAddressSync([Buffer.from("sender_authority")], this.ID)[0]; } + eventAuthorityAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("__event_authority")], this.ID)[0]; + } + messageTransmitterProgram(): MessageTransmitterProgram { switch (this._programId) { case testnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", ); } case mainnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", ); } default: { @@ -111,19 +110,19 @@ export class TokenMessengerMinterProgram { depositForBurnWithCallerAccounts( mint: PublicKey, - remoteDomain: number + remoteDomain: number, ): DepositForBurnWithCallerAccounts { const messageTransmitterProgram = this.messageTransmitterProgram(); return { - senderAuthority: this.senderAuthority(), + senderAuthority: this.senderAuthorityAddress(), messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), tokenMessenger: this.tokenMessengerAddress(), remoteTokenMessenger: this.remoteTokenMessengerAddress(remoteDomain), tokenMinter: this.tokenMinterAddress(), localToken: this.localTokenAddress(mint), + tokenMessengerMinterEventAuthority: this.eventAuthorityAddress(), messageTransmitterProgram: messageTransmitterProgram.ID, tokenMessengerMinterProgram: this.ID, - tokenProgram: TOKEN_PROGRAM_ID, }; } } diff --git a/solana/ts/src/cctp/types/message_transmitter.ts b/solana/ts/src/cctp/types/message_transmitter.ts index 464e36fa..4f599325 100644 --- a/solana/ts/src/cctp/types/message_transmitter.ts +++ b/solana/ts/src/cctp/types/message_transmitter.ts @@ -1,2193 +1,2735 @@ export type MessageTransmitter = { - "version": "0.1.0", - "name": "message_transmitter", - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgramData", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "InitializeParams" - } - } - ] - }, - { - "name": "transferOwnership", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "TransferOwnershipParams" - } - } - ] - }, - { - "name": "acceptOwnership", - "accounts": [ - { - "name": "pendingOwner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AcceptOwnershipParams" - } - } - ] - }, - { - "name": "updatePauser", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdatePauserParams" - } - } - ] - }, - { - "name": "updateAttesterManager", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdateAttesterManagerParams" - } - } - ] - }, - { - "name": "pause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "PauseParams" - } - } - ] - }, - { - "name": "unpause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UnpauseParams" - } - } - ] - }, - { - "name": "setMaxMessageBodySize", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetMaxMessageBodySizeParams" - } - } - ] - }, - { - "name": "enableAttester", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "EnableAttesterParams" - } - } - ] - }, - { - "name": "disableAttester", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DisableAttesterParams" - } - } - ] - }, - { - "name": "setSignatureThreshold", - "accounts": [ - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetSignatureThresholdParams" - } - } - ] - }, - { - "name": "sendMessage", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SendMessageParams" - } - } - ], - "returns": "u64" - }, - { - "name": "sendMessageWithCaller", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SendMessageWithCallerParams" - } - } - ], - "returns": "u64" - }, - { - "name": "replaceMessage", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReplaceMessageParams" - } - } - ], - "returns": "u64" - }, - { - "name": "receiveMessage", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "caller", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": false, - "isSigner": false - }, - { - "name": "usedNonces", - "isMut": true, - "isSigner": false - }, - { - "name": "receiver", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReceiveMessageParams" - } - } - ] - } - ], - "accounts": [ - { - "name": "messageTransmitter", - "docs": [ - "Main state of the MessageTransmitter program" - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "owner", - "type": "publicKey" - }, - { - "name": "pendingOwner", - "type": "publicKey" - }, - { - "name": "attesterManager", - "type": "publicKey" - }, - { - "name": "pauser", - "type": "publicKey" - }, - { - "name": "paused", - "type": "bool" - }, - { - "name": "localDomain", - "type": "u32" - }, - { - "name": "version", - "type": "u32" - }, - { - "name": "signatureThreshold", - "type": "u32" - }, - { - "name": "enabledAttesters", - "type": { - "vec": "publicKey" - } - }, - { - "name": "maxMessageBodySize", - "type": "u64" - }, - { - "name": "nextAvailableNonce", - "type": "u64" - }, - { - "name": "authorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "usedNonces", - "docs": [ - "UsedNonces account holds an array of bits that indicate which nonces were already used", - "so they can't be resused to receive new messages. Array starts with the first_nonce and", - "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain." - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "firstNonce", - "type": "u64" - }, - { - "name": "usedNonces", - "type": { - "array": [ - "u64", - 100 - ] - } - } - ] - } - } - ], - "types": [ - { - "name": "AcceptOwnershipParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "DisableAttesterParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "attester", - "type": "publicKey" - } - ] - } - }, - { - "name": "EnableAttesterParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newAttester", - "type": "publicKey" - } - ] - } - }, - { - "name": "InitializeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "localDomain", - "type": "u32" - }, - { - "name": "attester", - "type": "publicKey" - }, - { - "name": "maxMessageBodySize", - "type": "u64" - }, - { - "name": "version", - "type": "u32" - } - ] - } - }, - { - "name": "PauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "ReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "message", - "type": "bytes" - }, - { - "name": "attestation", - "type": "bytes" - } - ] - } - }, - { - "name": "HandleReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "sender", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "ReplaceMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "originalMessage", - "type": "bytes" - }, - { - "name": "originalAttestation", - "type": "bytes" - }, - { - "name": "newMessageBody", - "type": "bytes" - }, - { - "name": "newDestinationCaller", - "type": "publicKey" - } - ] - } - }, - { - "name": "SendMessageWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "recipient", - "type": "publicKey" - }, - { - "name": "destinationCaller", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "SendMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "recipient", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "SetMaxMessageBodySizeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newMaxMessageBodySize", - "type": "u64" - } - ] - } - }, - { - "name": "SetSignatureThresholdParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newSignatureThreshold", - "type": "u32" - } - ] - } - }, - { - "name": "TransferOwnershipParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newOwner", - "type": "publicKey" - } - ] - } - }, - { - "name": "UnpauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UpdateAttesterManagerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newAttesterManager", - "type": "publicKey" - } - ] - } - }, - { - "name": "UpdatePauserParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newPauser", - "type": "publicKey" - } - ] - } - }, - { - "name": "MathError", - "type": { - "kind": "enum", - "variants": [ - { - "name": "MathOverflow" - }, - { - "name": "MathUnderflow" - }, - { - "name": "ErrorInDivision" - } - ] - } - } - ], - "events": [ - { - "name": "OwnershipTransferStarted", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "OwnershipTransferred", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "PauserChanged", - "fields": [ - { - "name": "newAddress", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "AttesterManagerUpdated", - "fields": [ - { - "name": "previousAttesterManager", - "type": "publicKey", - "index": false - }, - { - "name": "newAttesterManager", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MessageSent", - "fields": [ - { - "name": "message", - "type": "bytes", - "index": false - } - ] - }, - { - "name": "MessageReceived", - "fields": [ - { - "name": "caller", - "type": "publicKey", - "index": false - }, - { - "name": "sourceDomain", - "type": "u32", - "index": false - }, - { - "name": "nonce", - "type": "u64", - "index": false - }, - { - "name": "sender", - "type": "publicKey", - "index": false - }, - { - "name": "messageBody", - "type": "bytes", - "index": false - } - ] - }, - { - "name": "SignatureThresholdUpdated", - "fields": [ - { - "name": "oldSignatureThreshold", - "type": "u32", - "index": false - }, - { - "name": "newSignatureThreshold", - "type": "u32", - "index": false - } - ] - }, - { - "name": "AttesterEnabled", - "fields": [ - { - "name": "attester", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "AttesterDisabled", - "fields": [ - { - "name": "attester", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MaxMessageBodySizeUpdated", - "fields": [ - { - "name": "newMaxMessageBodySize", - "type": "u64", - "index": false - } - ] - }, - { - "name": "Pause", - "fields": [] - }, - { - "name": "Unpause", - "fields": [] - } - ], - "errors": [ - { - "code": 6000, - "name": "InvalidAuthority", - "msg": "Invalid authority" - }, - { - "code": 6001, - "name": "ProgramPaused", - "msg": "Instruction is not allowed at this time" - }, - { - "code": 6002, - "name": "InvalidMessageTransmitterState", - "msg": "Invalid message transmitter state" - }, - { - "code": 6003, - "name": "InvalidSignatureThreshold", - "msg": "Invalid signature threshold" - }, - { - "code": 6004, - "name": "SignatureThresholdAlreadySet", - "msg": "Signature threshold already set" - }, - { - "code": 6005, - "name": "InvalidOwner", - "msg": "Invalid owner" - }, - { - "code": 6006, - "name": "InvalidPauser", - "msg": "Invalid pauser" - }, - { - "code": 6007, - "name": "InvalidAttesterManager", - "msg": "Invalid attester manager" - }, - { - "code": 6008, - "name": "InvalidAttester", - "msg": "Invalid attester" - }, - { - "code": 6009, - "name": "AttesterAlreadyEnabled", - "msg": "Attester already enabled" - }, - { - "code": 6010, - "name": "TooFewEnabledAttesters", - "msg": "Too few enabled attesters" - }, - { - "code": 6011, - "name": "SignatureThresholdTooLow", - "msg": "Signature threshold is too low" - }, - { - "code": 6012, - "name": "AttesterAlreadyDisabled", - "msg": "Attester already disabled" - }, - { - "code": 6013, - "name": "MessageBodyLimitExceeded", - "msg": "Message body exceeds max size" - }, - { - "code": 6014, - "name": "InvalidDestinationCaller", - "msg": "Invalid destination caller" - }, - { - "code": 6015, - "name": "InvalidRecipient", - "msg": "Invalid message recipient" - }, - { - "code": 6016, - "name": "SenderNotPermitted", - "msg": "Sender is not permitted" - }, - { - "code": 6017, - "name": "InvalidSourceDomain", - "msg": "Invalid source domain" - }, - { - "code": 6018, - "name": "InvalidDestinationDomain", - "msg": "Invalid destination domain" - }, - { - "code": 6019, - "name": "InvalidMessageVersion", - "msg": "Invalid message version" - }, - { - "code": 6020, - "name": "InvalidUsedNoncesAccount", - "msg": "Invalid used nonces account" - }, - { - "code": 6021, - "name": "InvalidRecipientProgram", - "msg": "Invalid recipient program" - }, - { - "code": 6022, - "name": "InvalidNonce", - "msg": "Invalid nonce" - }, - { - "code": 6023, - "name": "NonceAlreadyUsed", - "msg": "Nonce already used" - }, - { - "code": 6024, - "name": "MessageTooShort", - "msg": "Message is too short" - }, - { - "code": 6025, - "name": "MalformedMessage", - "msg": "Malformed message" - }, - { - "code": 6026, - "name": "InvalidSignatureOrderOrDupe", - "msg": "Invalid signature order or dupe" - }, - { - "code": 6027, - "name": "InvalidAttesterSignature", - "msg": "Invalid attester signature" - }, - { - "code": 6028, - "name": "InvalidAttestationLength", - "msg": "Invalid attestation length" - }, - { - "code": 6029, - "name": "InvalidSignatureRecoveryId", - "msg": "Invalid signature recovery ID" - }, - { - "code": 6030, - "name": "InvalidSignatureSValue", - "msg": "Invalid signature S value" - }, - { - "code": 6031, - "name": "InvalidMessageHash", - "msg": "Invalid message hash" - } - ] + version: "0.1.0"; + name: "message_transmitter"; + instructions: [ + { + name: "initialize"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "upgradeAuthority"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "messageTransmitterProgramData"; + isMut: false; + isSigner: false; + }, + { + name: "messageTransmitterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "InitializeParams"; + }; + }, + ]; + }, + { + name: "transferOwnership"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "TransferOwnershipParams"; + }; + }, + ]; + }, + { + name: "acceptOwnership"; + accounts: [ + { + name: "pendingOwner"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "AcceptOwnershipParams"; + }; + }, + ]; + }, + { + name: "updatePauser"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "UpdatePauserParams"; + }; + }, + ]; + }, + { + name: "updateAttesterManager"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "UpdateAttesterManagerParams"; + }; + }, + ]; + }, + { + name: "pause"; + accounts: [ + { + name: "pauser"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "PauseParams"; + }; + }, + ]; + }, + { + name: "unpause"; + accounts: [ + { + name: "pauser"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "UnpauseParams"; + }; + }, + ]; + }, + { + name: "setMaxMessageBodySize"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "SetMaxMessageBodySizeParams"; + }; + }, + ]; + }, + { + name: "enableAttester"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "attesterManager"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "EnableAttesterParams"; + }; + }, + ]; + }, + { + name: "disableAttester"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "attesterManager"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "DisableAttesterParams"; + }; + }, + ]; + }, + { + name: "setSignatureThreshold"; + accounts: [ + { + name: "attesterManager"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "SetSignatureThresholdParams"; + }; + }, + ]; + }, + { + name: "sendMessage"; + accounts: [ + { + name: "eventRentPayer"; + isMut: true; + isSigner: true; + }, + { + name: "senderAuthorityPda"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "messageSentEventData"; + isMut: true; + isSigner: true; + }, + { + name: "senderProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "SendMessageParams"; + }; + }, + ]; + returns: "u64"; + }, + { + name: "sendMessageWithCaller"; + accounts: [ + { + name: "eventRentPayer"; + isMut: true; + isSigner: true; + }, + { + name: "senderAuthorityPda"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "messageSentEventData"; + isMut: true; + isSigner: true; + }, + { + name: "senderProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "SendMessageWithCallerParams"; + }; + }, + ]; + returns: "u64"; + }, + { + name: "replaceMessage"; + accounts: [ + { + name: "eventRentPayer"; + isMut: true; + isSigner: true; + }, + { + name: "senderAuthorityPda"; + isMut: false; + isSigner: true; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "messageSentEventData"; + isMut: true; + isSigner: true; + }, + { + name: "senderProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "ReplaceMessageParams"; + }; + }, + ]; + returns: "u64"; + }, + { + name: "receiveMessage"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "caller"; + isMut: false; + isSigner: true; + }, + { + name: "authorityPda"; + isMut: false; + isSigner: false; + }, + { + name: "messageTransmitter"; + isMut: false; + isSigner: false; + }, + { + name: "usedNonces"; + isMut: true; + isSigner: false; + }, + { + name: "receiver"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "ReceiveMessageParams"; + }; + }, + ]; + }, + { + name: "reclaimEventAccount"; + accounts: [ + { + name: "payee"; + isMut: true; + isSigner: true; + docs: ["rent SOL receiver, should match original rent payer"]; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "messageSentEventData"; + isMut: true; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "ReclaimEventAccountParams"; + }; + }, + ]; + }, + { + name: "getNoncePda"; + accounts: [ + { + name: "messageTransmitter"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "GetNoncePDAParams"; + }; + }, + ]; + returns: "publicKey"; + }, + { + name: "isNonceUsed"; + accounts: [ + { + name: "usedNonces"; + isMut: false; + isSigner: false; + docs: [ + "Account will be explicitly loaded to avoid error when it's not initialized", + ]; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "IsNonceUsedParams"; + }; + }, + ]; + returns: "bool"; + }, + ]; + accounts: [ + { + name: "messageSent"; + type: { + kind: "struct"; + fields: [ + { + name: "rentPayer"; + type: "publicKey"; + }, + { + name: "message"; + type: "bytes"; + }, + ]; + }; + }, + { + name: "messageTransmitter"; + docs: ["Main state of the MessageTransmitter program"]; + type: { + kind: "struct"; + fields: [ + { + name: "owner"; + type: "publicKey"; + }, + { + name: "pendingOwner"; + type: "publicKey"; + }, + { + name: "attesterManager"; + type: "publicKey"; + }, + { + name: "pauser"; + type: "publicKey"; + }, + { + name: "paused"; + type: "bool"; + }, + { + name: "localDomain"; + type: "u32"; + }, + { + name: "version"; + type: "u32"; + }, + { + name: "signatureThreshold"; + type: "u32"; + }, + { + name: "enabledAttesters"; + type: { + vec: "publicKey"; + }; + }, + { + name: "maxMessageBodySize"; + type: "u64"; + }, + { + name: "nextAvailableNonce"; + type: "u64"; + }, + ]; + }; + }, + { + name: "usedNonces"; + docs: [ + "UsedNonces account holds an array of bits that indicate which nonces were already used", + "so they can't be resused to receive new messages. Array starts with the first_nonce and", + "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain.", + ]; + type: { + kind: "struct"; + fields: [ + { + name: "remoteDomain"; + type: "u32"; + }, + { + name: "firstNonce"; + type: "u64"; + }, + { + name: "usedNonces"; + type: { + array: ["u64", 100]; + }; + }, + ]; + }; + }, + ]; + types: [ + { + name: "AcceptOwnershipParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "DisableAttesterParams"; + type: { + kind: "struct"; + fields: [ + { + name: "attester"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "EnableAttesterParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newAttester"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "GetNoncePDAParams"; + type: { + kind: "struct"; + fields: [ + { + name: "nonce"; + type: "u64"; + }, + { + name: "sourceDomain"; + type: "u32"; + }, + ]; + }; + }, + { + name: "InitializeParams"; + type: { + kind: "struct"; + fields: [ + { + name: "localDomain"; + type: "u32"; + }, + { + name: "attester"; + type: "publicKey"; + }, + { + name: "maxMessageBodySize"; + type: "u64"; + }, + { + name: "version"; + type: "u32"; + }, + ]; + }; + }, + { + name: "IsNonceUsedParams"; + type: { + kind: "struct"; + fields: [ + { + name: "nonce"; + type: "u64"; + }, + ]; + }; + }, + { + name: "PauseParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "ReceiveMessageParams"; + type: { + kind: "struct"; + fields: [ + { + name: "message"; + type: "bytes"; + }, + { + name: "attestation"; + type: "bytes"; + }, + ]; + }; + }, + { + name: "HandleReceiveMessageParams"; + type: { + kind: "struct"; + fields: [ + { + name: "remoteDomain"; + type: "u32"; + }, + { + name: "sender"; + type: "publicKey"; + }, + { + name: "messageBody"; + type: "bytes"; + }, + { + name: "authorityBump"; + type: "u8"; + }, + ]; + }; + }, + { + name: "ReclaimEventAccountParams"; + type: { + kind: "struct"; + fields: [ + { + name: "attestation"; + type: "bytes"; + }, + ]; + }; + }, + { + name: "ReplaceMessageParams"; + type: { + kind: "struct"; + fields: [ + { + name: "originalMessage"; + type: "bytes"; + }, + { + name: "originalAttestation"; + type: "bytes"; + }, + { + name: "newMessageBody"; + type: "bytes"; + }, + { + name: "newDestinationCaller"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "SendMessageWithCallerParams"; + type: { + kind: "struct"; + fields: [ + { + name: "destinationDomain"; + type: "u32"; + }, + { + name: "recipient"; + type: "publicKey"; + }, + { + name: "messageBody"; + type: "bytes"; + }, + { + name: "destinationCaller"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "SendMessageParams"; + type: { + kind: "struct"; + fields: [ + { + name: "destinationDomain"; + type: "u32"; + }, + { + name: "recipient"; + type: "publicKey"; + }, + { + name: "messageBody"; + type: "bytes"; + }, + ]; + }; + }, + { + name: "SetMaxMessageBodySizeParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newMaxMessageBodySize"; + type: "u64"; + }, + ]; + }; + }, + { + name: "SetSignatureThresholdParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newSignatureThreshold"; + type: "u32"; + }, + ]; + }; + }, + { + name: "TransferOwnershipParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newOwner"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "UnpauseParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "UpdateAttesterManagerParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newAttesterManager"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "UpdatePauserParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newPauser"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "MathError"; + type: { + kind: "enum"; + variants: [ + { + name: "MathOverflow"; + }, + { + name: "MathUnderflow"; + }, + { + name: "ErrorInDivision"; + }, + ]; + }; + }, + ]; + events: [ + { + name: "OwnershipTransferStarted"; + fields: [ + { + name: "previousOwner"; + type: "publicKey"; + index: false; + }, + { + name: "newOwner"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "OwnershipTransferred"; + fields: [ + { + name: "previousOwner"; + type: "publicKey"; + index: false; + }, + { + name: "newOwner"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "PauserChanged"; + fields: [ + { + name: "newAddress"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "AttesterManagerUpdated"; + fields: [ + { + name: "previousAttesterManager"; + type: "publicKey"; + index: false; + }, + { + name: "newAttesterManager"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "MessageReceived"; + fields: [ + { + name: "caller"; + type: "publicKey"; + index: false; + }, + { + name: "sourceDomain"; + type: "u32"; + index: false; + }, + { + name: "nonce"; + type: "u64"; + index: false; + }, + { + name: "sender"; + type: "publicKey"; + index: false; + }, + { + name: "messageBody"; + type: "bytes"; + index: false; + }, + ]; + }, + { + name: "SignatureThresholdUpdated"; + fields: [ + { + name: "oldSignatureThreshold"; + type: "u32"; + index: false; + }, + { + name: "newSignatureThreshold"; + type: "u32"; + index: false; + }, + ]; + }, + { + name: "AttesterEnabled"; + fields: [ + { + name: "attester"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "AttesterDisabled"; + fields: [ + { + name: "attester"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "MaxMessageBodySizeUpdated"; + fields: [ + { + name: "newMaxMessageBodySize"; + type: "u64"; + index: false; + }, + ]; + }, + { + name: "Pause"; + fields: []; + }, + { + name: "Unpause"; + fields: []; + }, + ]; + errors: [ + { + code: 6000; + name: "InvalidAuthority"; + msg: "Invalid authority"; + }, + { + code: 6001; + name: "ProgramPaused"; + msg: "Instruction is not allowed at this time"; + }, + { + code: 6002; + name: "InvalidMessageTransmitterState"; + msg: "Invalid message transmitter state"; + }, + { + code: 6003; + name: "InvalidSignatureThreshold"; + msg: "Invalid signature threshold"; + }, + { + code: 6004; + name: "SignatureThresholdAlreadySet"; + msg: "Signature threshold already set"; + }, + { + code: 6005; + name: "InvalidOwner"; + msg: "Invalid owner"; + }, + { + code: 6006; + name: "InvalidPauser"; + msg: "Invalid pauser"; + }, + { + code: 6007; + name: "InvalidAttesterManager"; + msg: "Invalid attester manager"; + }, + { + code: 6008; + name: "InvalidAttester"; + msg: "Invalid attester"; + }, + { + code: 6009; + name: "AttesterAlreadyEnabled"; + msg: "Attester already enabled"; + }, + { + code: 6010; + name: "TooFewEnabledAttesters"; + msg: "Too few enabled attesters"; + }, + { + code: 6011; + name: "SignatureThresholdTooLow"; + msg: "Signature threshold is too low"; + }, + { + code: 6012; + name: "AttesterAlreadyDisabled"; + msg: "Attester already disabled"; + }, + { + code: 6013; + name: "MessageBodyLimitExceeded"; + msg: "Message body exceeds max size"; + }, + { + code: 6014; + name: "InvalidDestinationCaller"; + msg: "Invalid destination caller"; + }, + { + code: 6015; + name: "InvalidRecipient"; + msg: "Invalid message recipient"; + }, + { + code: 6016; + name: "SenderNotPermitted"; + msg: "Sender is not permitted"; + }, + { + code: 6017; + name: "InvalidSourceDomain"; + msg: "Invalid source domain"; + }, + { + code: 6018; + name: "InvalidDestinationDomain"; + msg: "Invalid destination domain"; + }, + { + code: 6019; + name: "InvalidMessageVersion"; + msg: "Invalid message version"; + }, + { + code: 6020; + name: "InvalidUsedNoncesAccount"; + msg: "Invalid used nonces account"; + }, + { + code: 6021; + name: "InvalidRecipientProgram"; + msg: "Invalid recipient program"; + }, + { + code: 6022; + name: "InvalidNonce"; + msg: "Invalid nonce"; + }, + { + code: 6023; + name: "NonceAlreadyUsed"; + msg: "Nonce already used"; + }, + { + code: 6024; + name: "MessageTooShort"; + msg: "Message is too short"; + }, + { + code: 6025; + name: "MalformedMessage"; + msg: "Malformed message"; + }, + { + code: 6026; + name: "InvalidSignatureOrderOrDupe"; + msg: "Invalid signature order or dupe"; + }, + { + code: 6027; + name: "InvalidAttesterSignature"; + msg: "Invalid attester signature"; + }, + { + code: 6028; + name: "InvalidAttestationLength"; + msg: "Invalid attestation length"; + }, + { + code: 6029; + name: "InvalidSignatureRecoveryId"; + msg: "Invalid signature recovery ID"; + }, + { + code: 6030; + name: "InvalidSignatureSValue"; + msg: "Invalid signature S value"; + }, + { + code: 6031; + name: "InvalidMessageHash"; + msg: "Invalid message hash"; + }, + ]; }; export const IDL: MessageTransmitter = { - "version": "0.1.0", - "name": "message_transmitter", - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgramData", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "InitializeParams" - } - } - ] - }, - { - "name": "transferOwnership", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "TransferOwnershipParams" - } - } - ] - }, - { - "name": "acceptOwnership", - "accounts": [ - { - "name": "pendingOwner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AcceptOwnershipParams" - } - } - ] - }, - { - "name": "updatePauser", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdatePauserParams" - } - } - ] - }, - { - "name": "updateAttesterManager", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdateAttesterManagerParams" - } - } - ] - }, - { - "name": "pause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "PauseParams" - } - } - ] - }, - { - "name": "unpause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UnpauseParams" - } - } - ] - }, - { - "name": "setMaxMessageBodySize", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetMaxMessageBodySizeParams" - } - } - ] - }, - { - "name": "enableAttester", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "EnableAttesterParams" - } - } - ] - }, - { - "name": "disableAttester", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DisableAttesterParams" - } - } - ] - }, - { - "name": "setSignatureThreshold", - "accounts": [ - { - "name": "attesterManager", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetSignatureThresholdParams" - } - } - ] - }, - { - "name": "sendMessage", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SendMessageParams" - } - } - ], - "returns": "u64" - }, - { - "name": "sendMessageWithCaller", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SendMessageWithCallerParams" - } - } - ], - "returns": "u64" - }, - { - "name": "replaceMessage", - "accounts": [ - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "senderProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReplaceMessageParams" - } - } - ], - "returns": "u64" - }, - { - "name": "receiveMessage", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "caller", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": false, - "isSigner": false - }, - { - "name": "usedNonces", - "isMut": true, - "isSigner": false - }, - { - "name": "receiver", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReceiveMessageParams" - } - } - ] - } - ], - "accounts": [ - { - "name": "messageTransmitter", - "docs": [ - "Main state of the MessageTransmitter program" - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "owner", - "type": "publicKey" - }, - { - "name": "pendingOwner", - "type": "publicKey" - }, - { - "name": "attesterManager", - "type": "publicKey" - }, - { - "name": "pauser", - "type": "publicKey" - }, - { - "name": "paused", - "type": "bool" - }, - { - "name": "localDomain", - "type": "u32" - }, - { - "name": "version", - "type": "u32" - }, - { - "name": "signatureThreshold", - "type": "u32" - }, - { - "name": "enabledAttesters", - "type": { - "vec": "publicKey" - } - }, - { - "name": "maxMessageBodySize", - "type": "u64" - }, - { - "name": "nextAvailableNonce", - "type": "u64" - }, - { - "name": "authorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "usedNonces", - "docs": [ - "UsedNonces account holds an array of bits that indicate which nonces were already used", - "so they can't be resused to receive new messages. Array starts with the first_nonce and", - "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain." - ], - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "firstNonce", - "type": "u64" - }, - { - "name": "usedNonces", - "type": { - "array": [ - "u64", - 100 - ] - } - } - ] - } - } - ], - "types": [ - { - "name": "AcceptOwnershipParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "DisableAttesterParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "attester", - "type": "publicKey" - } - ] - } - }, - { - "name": "EnableAttesterParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newAttester", - "type": "publicKey" - } - ] - } - }, - { - "name": "InitializeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "localDomain", - "type": "u32" - }, - { - "name": "attester", - "type": "publicKey" - }, - { - "name": "maxMessageBodySize", - "type": "u64" - }, - { - "name": "version", - "type": "u32" - } - ] - } - }, - { - "name": "PauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "ReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "message", - "type": "bytes" - }, - { - "name": "attestation", - "type": "bytes" - } - ] - } - }, - { - "name": "HandleReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "sender", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "ReplaceMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "originalMessage", - "type": "bytes" - }, - { - "name": "originalAttestation", - "type": "bytes" - }, - { - "name": "newMessageBody", - "type": "bytes" - }, - { - "name": "newDestinationCaller", - "type": "publicKey" - } - ] - } - }, - { - "name": "SendMessageWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "recipient", - "type": "publicKey" - }, - { - "name": "destinationCaller", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "SendMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "recipient", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "SetMaxMessageBodySizeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newMaxMessageBodySize", - "type": "u64" - } - ] - } - }, - { - "name": "SetSignatureThresholdParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newSignatureThreshold", - "type": "u32" - } - ] - } - }, - { - "name": "TransferOwnershipParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newOwner", - "type": "publicKey" - } - ] - } - }, - { - "name": "UnpauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UpdateAttesterManagerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newAttesterManager", - "type": "publicKey" - } - ] - } - }, - { - "name": "UpdatePauserParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newPauser", - "type": "publicKey" - } - ] - } - }, - { - "name": "MathError", - "type": { - "kind": "enum", - "variants": [ - { - "name": "MathOverflow" - }, - { - "name": "MathUnderflow" - }, - { - "name": "ErrorInDivision" - } - ] - } - } - ], - "events": [ - { - "name": "OwnershipTransferStarted", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "OwnershipTransferred", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "PauserChanged", - "fields": [ - { - "name": "newAddress", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "AttesterManagerUpdated", - "fields": [ - { - "name": "previousAttesterManager", - "type": "publicKey", - "index": false - }, - { - "name": "newAttesterManager", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MessageSent", - "fields": [ - { - "name": "message", - "type": "bytes", - "index": false - } - ] - }, - { - "name": "MessageReceived", - "fields": [ - { - "name": "caller", - "type": "publicKey", - "index": false - }, - { - "name": "sourceDomain", - "type": "u32", - "index": false - }, - { - "name": "nonce", - "type": "u64", - "index": false - }, - { - "name": "sender", - "type": "publicKey", - "index": false - }, - { - "name": "messageBody", - "type": "bytes", - "index": false - } - ] - }, - { - "name": "SignatureThresholdUpdated", - "fields": [ - { - "name": "oldSignatureThreshold", - "type": "u32", - "index": false - }, - { - "name": "newSignatureThreshold", - "type": "u32", - "index": false - } - ] - }, - { - "name": "AttesterEnabled", - "fields": [ - { - "name": "attester", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "AttesterDisabled", - "fields": [ - { - "name": "attester", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MaxMessageBodySizeUpdated", - "fields": [ - { - "name": "newMaxMessageBodySize", - "type": "u64", - "index": false - } - ] - }, - { - "name": "Pause", - "fields": [] - }, - { - "name": "Unpause", - "fields": [] - } - ], - "errors": [ - { - "code": 6000, - "name": "InvalidAuthority", - "msg": "Invalid authority" - }, - { - "code": 6001, - "name": "ProgramPaused", - "msg": "Instruction is not allowed at this time" - }, - { - "code": 6002, - "name": "InvalidMessageTransmitterState", - "msg": "Invalid message transmitter state" - }, - { - "code": 6003, - "name": "InvalidSignatureThreshold", - "msg": "Invalid signature threshold" - }, - { - "code": 6004, - "name": "SignatureThresholdAlreadySet", - "msg": "Signature threshold already set" - }, - { - "code": 6005, - "name": "InvalidOwner", - "msg": "Invalid owner" - }, - { - "code": 6006, - "name": "InvalidPauser", - "msg": "Invalid pauser" - }, - { - "code": 6007, - "name": "InvalidAttesterManager", - "msg": "Invalid attester manager" - }, - { - "code": 6008, - "name": "InvalidAttester", - "msg": "Invalid attester" - }, - { - "code": 6009, - "name": "AttesterAlreadyEnabled", - "msg": "Attester already enabled" - }, - { - "code": 6010, - "name": "TooFewEnabledAttesters", - "msg": "Too few enabled attesters" - }, - { - "code": 6011, - "name": "SignatureThresholdTooLow", - "msg": "Signature threshold is too low" - }, - { - "code": 6012, - "name": "AttesterAlreadyDisabled", - "msg": "Attester already disabled" - }, - { - "code": 6013, - "name": "MessageBodyLimitExceeded", - "msg": "Message body exceeds max size" - }, - { - "code": 6014, - "name": "InvalidDestinationCaller", - "msg": "Invalid destination caller" - }, - { - "code": 6015, - "name": "InvalidRecipient", - "msg": "Invalid message recipient" - }, - { - "code": 6016, - "name": "SenderNotPermitted", - "msg": "Sender is not permitted" - }, - { - "code": 6017, - "name": "InvalidSourceDomain", - "msg": "Invalid source domain" - }, - { - "code": 6018, - "name": "InvalidDestinationDomain", - "msg": "Invalid destination domain" - }, - { - "code": 6019, - "name": "InvalidMessageVersion", - "msg": "Invalid message version" - }, - { - "code": 6020, - "name": "InvalidUsedNoncesAccount", - "msg": "Invalid used nonces account" - }, - { - "code": 6021, - "name": "InvalidRecipientProgram", - "msg": "Invalid recipient program" - }, - { - "code": 6022, - "name": "InvalidNonce", - "msg": "Invalid nonce" - }, - { - "code": 6023, - "name": "NonceAlreadyUsed", - "msg": "Nonce already used" - }, - { - "code": 6024, - "name": "MessageTooShort", - "msg": "Message is too short" - }, - { - "code": 6025, - "name": "MalformedMessage", - "msg": "Malformed message" - }, - { - "code": 6026, - "name": "InvalidSignatureOrderOrDupe", - "msg": "Invalid signature order or dupe" - }, - { - "code": 6027, - "name": "InvalidAttesterSignature", - "msg": "Invalid attester signature" - }, - { - "code": 6028, - "name": "InvalidAttestationLength", - "msg": "Invalid attestation length" - }, - { - "code": 6029, - "name": "InvalidSignatureRecoveryId", - "msg": "Invalid signature recovery ID" - }, - { - "code": 6030, - "name": "InvalidSignatureSValue", - "msg": "Invalid signature S value" - }, - { - "code": 6031, - "name": "InvalidMessageHash", - "msg": "Invalid message hash" - } - ] + version: "0.1.0", + name: "message_transmitter", + instructions: [ + { + name: "initialize", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "upgradeAuthority", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "messageTransmitterProgramData", + isMut: false, + isSigner: false, + }, + { + name: "messageTransmitterProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "InitializeParams", + }, + }, + ], + }, + { + name: "transferOwnership", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "TransferOwnershipParams", + }, + }, + ], + }, + { + name: "acceptOwnership", + accounts: [ + { + name: "pendingOwner", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "AcceptOwnershipParams", + }, + }, + ], + }, + { + name: "updatePauser", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "UpdatePauserParams", + }, + }, + ], + }, + { + name: "updateAttesterManager", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "UpdateAttesterManagerParams", + }, + }, + ], + }, + { + name: "pause", + accounts: [ + { + name: "pauser", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "PauseParams", + }, + }, + ], + }, + { + name: "unpause", + accounts: [ + { + name: "pauser", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "UnpauseParams", + }, + }, + ], + }, + { + name: "setMaxMessageBodySize", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "SetMaxMessageBodySizeParams", + }, + }, + ], + }, + { + name: "enableAttester", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "attesterManager", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "EnableAttesterParams", + }, + }, + ], + }, + { + name: "disableAttester", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "attesterManager", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "DisableAttesterParams", + }, + }, + ], + }, + { + name: "setSignatureThreshold", + accounts: [ + { + name: "attesterManager", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "SetSignatureThresholdParams", + }, + }, + ], + }, + { + name: "sendMessage", + accounts: [ + { + name: "eventRentPayer", + isMut: true, + isSigner: true, + }, + { + name: "senderAuthorityPda", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "messageSentEventData", + isMut: true, + isSigner: true, + }, + { + name: "senderProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "SendMessageParams", + }, + }, + ], + returns: "u64", + }, + { + name: "sendMessageWithCaller", + accounts: [ + { + name: "eventRentPayer", + isMut: true, + isSigner: true, + }, + { + name: "senderAuthorityPda", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "messageSentEventData", + isMut: true, + isSigner: true, + }, + { + name: "senderProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "SendMessageWithCallerParams", + }, + }, + ], + returns: "u64", + }, + { + name: "replaceMessage", + accounts: [ + { + name: "eventRentPayer", + isMut: true, + isSigner: true, + }, + { + name: "senderAuthorityPda", + isMut: false, + isSigner: true, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "messageSentEventData", + isMut: true, + isSigner: true, + }, + { + name: "senderProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "ReplaceMessageParams", + }, + }, + ], + returns: "u64", + }, + { + name: "receiveMessage", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "caller", + isMut: false, + isSigner: true, + }, + { + name: "authorityPda", + isMut: false, + isSigner: false, + }, + { + name: "messageTransmitter", + isMut: false, + isSigner: false, + }, + { + name: "usedNonces", + isMut: true, + isSigner: false, + }, + { + name: "receiver", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "ReceiveMessageParams", + }, + }, + ], + }, + { + name: "reclaimEventAccount", + accounts: [ + { + name: "payee", + isMut: true, + isSigner: true, + docs: ["rent SOL receiver, should match original rent payer"], + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "messageSentEventData", + isMut: true, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "ReclaimEventAccountParams", + }, + }, + ], + }, + { + name: "getNoncePda", + accounts: [ + { + name: "messageTransmitter", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "GetNoncePDAParams", + }, + }, + ], + returns: "publicKey", + }, + { + name: "isNonceUsed", + accounts: [ + { + name: "usedNonces", + isMut: false, + isSigner: false, + docs: [ + "Account will be explicitly loaded to avoid error when it's not initialized", + ], + }, + ], + args: [ + { + name: "params", + type: { + defined: "IsNonceUsedParams", + }, + }, + ], + returns: "bool", + }, + ], + accounts: [ + { + name: "messageSent", + type: { + kind: "struct", + fields: [ + { + name: "rentPayer", + type: "publicKey", + }, + { + name: "message", + type: "bytes", + }, + ], + }, + }, + { + name: "messageTransmitter", + docs: ["Main state of the MessageTransmitter program"], + type: { + kind: "struct", + fields: [ + { + name: "owner", + type: "publicKey", + }, + { + name: "pendingOwner", + type: "publicKey", + }, + { + name: "attesterManager", + type: "publicKey", + }, + { + name: "pauser", + type: "publicKey", + }, + { + name: "paused", + type: "bool", + }, + { + name: "localDomain", + type: "u32", + }, + { + name: "version", + type: "u32", + }, + { + name: "signatureThreshold", + type: "u32", + }, + { + name: "enabledAttesters", + type: { + vec: "publicKey", + }, + }, + { + name: "maxMessageBodySize", + type: "u64", + }, + { + name: "nextAvailableNonce", + type: "u64", + }, + ], + }, + }, + { + name: "usedNonces", + docs: [ + "UsedNonces account holds an array of bits that indicate which nonces were already used", + "so they can't be resused to receive new messages. Array starts with the first_nonce and", + "holds flags for UsedNonces::MAX_NONCES. Nonces are recorded separately for each remote_domain.", + ], + type: { + kind: "struct", + fields: [ + { + name: "remoteDomain", + type: "u32", + }, + { + name: "firstNonce", + type: "u64", + }, + { + name: "usedNonces", + type: { + array: ["u64", 100], + }, + }, + ], + }, + }, + ], + types: [ + { + name: "AcceptOwnershipParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "DisableAttesterParams", + type: { + kind: "struct", + fields: [ + { + name: "attester", + type: "publicKey", + }, + ], + }, + }, + { + name: "EnableAttesterParams", + type: { + kind: "struct", + fields: [ + { + name: "newAttester", + type: "publicKey", + }, + ], + }, + }, + { + name: "GetNoncePDAParams", + type: { + kind: "struct", + fields: [ + { + name: "nonce", + type: "u64", + }, + { + name: "sourceDomain", + type: "u32", + }, + ], + }, + }, + { + name: "InitializeParams", + type: { + kind: "struct", + fields: [ + { + name: "localDomain", + type: "u32", + }, + { + name: "attester", + type: "publicKey", + }, + { + name: "maxMessageBodySize", + type: "u64", + }, + { + name: "version", + type: "u32", + }, + ], + }, + }, + { + name: "IsNonceUsedParams", + type: { + kind: "struct", + fields: [ + { + name: "nonce", + type: "u64", + }, + ], + }, + }, + { + name: "PauseParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "ReceiveMessageParams", + type: { + kind: "struct", + fields: [ + { + name: "message", + type: "bytes", + }, + { + name: "attestation", + type: "bytes", + }, + ], + }, + }, + { + name: "HandleReceiveMessageParams", + type: { + kind: "struct", + fields: [ + { + name: "remoteDomain", + type: "u32", + }, + { + name: "sender", + type: "publicKey", + }, + { + name: "messageBody", + type: "bytes", + }, + { + name: "authorityBump", + type: "u8", + }, + ], + }, + }, + { + name: "ReclaimEventAccountParams", + type: { + kind: "struct", + fields: [ + { + name: "attestation", + type: "bytes", + }, + ], + }, + }, + { + name: "ReplaceMessageParams", + type: { + kind: "struct", + fields: [ + { + name: "originalMessage", + type: "bytes", + }, + { + name: "originalAttestation", + type: "bytes", + }, + { + name: "newMessageBody", + type: "bytes", + }, + { + name: "newDestinationCaller", + type: "publicKey", + }, + ], + }, + }, + { + name: "SendMessageWithCallerParams", + type: { + kind: "struct", + fields: [ + { + name: "destinationDomain", + type: "u32", + }, + { + name: "recipient", + type: "publicKey", + }, + { + name: "messageBody", + type: "bytes", + }, + { + name: "destinationCaller", + type: "publicKey", + }, + ], + }, + }, + { + name: "SendMessageParams", + type: { + kind: "struct", + fields: [ + { + name: "destinationDomain", + type: "u32", + }, + { + name: "recipient", + type: "publicKey", + }, + { + name: "messageBody", + type: "bytes", + }, + ], + }, + }, + { + name: "SetMaxMessageBodySizeParams", + type: { + kind: "struct", + fields: [ + { + name: "newMaxMessageBodySize", + type: "u64", + }, + ], + }, + }, + { + name: "SetSignatureThresholdParams", + type: { + kind: "struct", + fields: [ + { + name: "newSignatureThreshold", + type: "u32", + }, + ], + }, + }, + { + name: "TransferOwnershipParams", + type: { + kind: "struct", + fields: [ + { + name: "newOwner", + type: "publicKey", + }, + ], + }, + }, + { + name: "UnpauseParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "UpdateAttesterManagerParams", + type: { + kind: "struct", + fields: [ + { + name: "newAttesterManager", + type: "publicKey", + }, + ], + }, + }, + { + name: "UpdatePauserParams", + type: { + kind: "struct", + fields: [ + { + name: "newPauser", + type: "publicKey", + }, + ], + }, + }, + { + name: "MathError", + type: { + kind: "enum", + variants: [ + { + name: "MathOverflow", + }, + { + name: "MathUnderflow", + }, + { + name: "ErrorInDivision", + }, + ], + }, + }, + ], + events: [ + { + name: "OwnershipTransferStarted", + fields: [ + { + name: "previousOwner", + type: "publicKey", + index: false, + }, + { + name: "newOwner", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "OwnershipTransferred", + fields: [ + { + name: "previousOwner", + type: "publicKey", + index: false, + }, + { + name: "newOwner", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "PauserChanged", + fields: [ + { + name: "newAddress", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "AttesterManagerUpdated", + fields: [ + { + name: "previousAttesterManager", + type: "publicKey", + index: false, + }, + { + name: "newAttesterManager", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "MessageReceived", + fields: [ + { + name: "caller", + type: "publicKey", + index: false, + }, + { + name: "sourceDomain", + type: "u32", + index: false, + }, + { + name: "nonce", + type: "u64", + index: false, + }, + { + name: "sender", + type: "publicKey", + index: false, + }, + { + name: "messageBody", + type: "bytes", + index: false, + }, + ], + }, + { + name: "SignatureThresholdUpdated", + fields: [ + { + name: "oldSignatureThreshold", + type: "u32", + index: false, + }, + { + name: "newSignatureThreshold", + type: "u32", + index: false, + }, + ], + }, + { + name: "AttesterEnabled", + fields: [ + { + name: "attester", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "AttesterDisabled", + fields: [ + { + name: "attester", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "MaxMessageBodySizeUpdated", + fields: [ + { + name: "newMaxMessageBodySize", + type: "u64", + index: false, + }, + ], + }, + { + name: "Pause", + fields: [], + }, + { + name: "Unpause", + fields: [], + }, + ], + errors: [ + { + code: 6000, + name: "InvalidAuthority", + msg: "Invalid authority", + }, + { + code: 6001, + name: "ProgramPaused", + msg: "Instruction is not allowed at this time", + }, + { + code: 6002, + name: "InvalidMessageTransmitterState", + msg: "Invalid message transmitter state", + }, + { + code: 6003, + name: "InvalidSignatureThreshold", + msg: "Invalid signature threshold", + }, + { + code: 6004, + name: "SignatureThresholdAlreadySet", + msg: "Signature threshold already set", + }, + { + code: 6005, + name: "InvalidOwner", + msg: "Invalid owner", + }, + { + code: 6006, + name: "InvalidPauser", + msg: "Invalid pauser", + }, + { + code: 6007, + name: "InvalidAttesterManager", + msg: "Invalid attester manager", + }, + { + code: 6008, + name: "InvalidAttester", + msg: "Invalid attester", + }, + { + code: 6009, + name: "AttesterAlreadyEnabled", + msg: "Attester already enabled", + }, + { + code: 6010, + name: "TooFewEnabledAttesters", + msg: "Too few enabled attesters", + }, + { + code: 6011, + name: "SignatureThresholdTooLow", + msg: "Signature threshold is too low", + }, + { + code: 6012, + name: "AttesterAlreadyDisabled", + msg: "Attester already disabled", + }, + { + code: 6013, + name: "MessageBodyLimitExceeded", + msg: "Message body exceeds max size", + }, + { + code: 6014, + name: "InvalidDestinationCaller", + msg: "Invalid destination caller", + }, + { + code: 6015, + name: "InvalidRecipient", + msg: "Invalid message recipient", + }, + { + code: 6016, + name: "SenderNotPermitted", + msg: "Sender is not permitted", + }, + { + code: 6017, + name: "InvalidSourceDomain", + msg: "Invalid source domain", + }, + { + code: 6018, + name: "InvalidDestinationDomain", + msg: "Invalid destination domain", + }, + { + code: 6019, + name: "InvalidMessageVersion", + msg: "Invalid message version", + }, + { + code: 6020, + name: "InvalidUsedNoncesAccount", + msg: "Invalid used nonces account", + }, + { + code: 6021, + name: "InvalidRecipientProgram", + msg: "Invalid recipient program", + }, + { + code: 6022, + name: "InvalidNonce", + msg: "Invalid nonce", + }, + { + code: 6023, + name: "NonceAlreadyUsed", + msg: "Nonce already used", + }, + { + code: 6024, + name: "MessageTooShort", + msg: "Message is too short", + }, + { + code: 6025, + name: "MalformedMessage", + msg: "Malformed message", + }, + { + code: 6026, + name: "InvalidSignatureOrderOrDupe", + msg: "Invalid signature order or dupe", + }, + { + code: 6027, + name: "InvalidAttesterSignature", + msg: "Invalid attester signature", + }, + { + code: 6028, + name: "InvalidAttestationLength", + msg: "Invalid attestation length", + }, + { + code: 6029, + name: "InvalidSignatureRecoveryId", + msg: "Invalid signature recovery ID", + }, + { + code: 6030, + name: "InvalidSignatureSValue", + msg: "Invalid signature S value", + }, + { + code: 6031, + name: "InvalidMessageHash", + msg: "Invalid message hash", + }, + ], }; diff --git a/solana/ts/src/cctp/types/token_messenger_minter.ts b/solana/ts/src/cctp/types/token_messenger_minter.ts index 3ca7a4bf..9305bcc7 100644 --- a/solana/ts/src/cctp/types/token_messenger_minter.ts +++ b/solana/ts/src/cctp/types/token_messenger_minter.ts @@ -1,2897 +1,3521 @@ export type TokenMessengerMinter = { - "version": "0.1.0", - "name": "token_messenger_minter", - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgramData", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "InitializeParams" - } - } - ] - }, - { - "name": "transferOwnership", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "TransferOwnershipParams" - } - } - ] - }, - { - "name": "acceptOwnership", - "accounts": [ - { - "name": "pendingOwner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AcceptOwnershipParams" - } - } - ] - }, - { - "name": "addRemoteTokenMessenger", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AddRemoteTokenMessengerParams" - } - } - ] - }, - { - "name": "removeRemoteTokenMessenger", - "accounts": [ + version: "0.1.0"; + name: "token_messenger_minter"; + instructions: [ + { + name: "initialize"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "upgradeAuthority"; + isMut: false; + isSigner: true; + }, + { + name: "authorityPda"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMessenger"; + isMut: true; + isSigner: false; + }, + { + name: "tokenMinter"; + isMut: true; + isSigner: false; + }, + { + name: "tokenMessengerMinterProgramData"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMessengerMinterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "InitializeParams"; + }; + }, + ]; + }, + { + name: "transferOwnership"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMessenger"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "TransferOwnershipParams"; + }; + }, + ]; + }, + { + name: "acceptOwnership"; + accounts: [ + { + name: "pendingOwner"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMessenger"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "AcceptOwnershipParams"; + }; + }, + ]; + }, + { + name: "addRemoteTokenMessenger"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "remoteTokenMessenger"; + isMut: true; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "AddRemoteTokenMessengerParams"; + }; + }, + ]; + }, + { + name: "removeRemoteTokenMessenger"; + accounts: [ + { + name: "payee"; + isMut: true; + isSigner: true; + }, + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "remoteTokenMessenger"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "RemoveRemoteTokenMessengerParams"; + }; + }, + ]; + }, + { + name: "depositForBurn"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "eventRentPayer"; + isMut: true; + isSigner: true; + }, + { + name: "senderAuthorityPda"; + isMut: false; + isSigner: false; + }, + { + name: "burnTokenAccount"; + isMut: true; + isSigner: false; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "remoteTokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "localToken"; + isMut: true; + isSigner: false; + }, + { + name: "burnTokenMint"; + isMut: true; + isSigner: false; + }, + { + name: "messageSentEventData"; + isMut: true; + isSigner: true; + }, + { + name: "messageTransmitterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMessengerMinterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "tokenProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "DepositForBurnParams"; + }; + }, + ]; + returns: "u64"; + }, + { + name: "depositForBurnWithCaller"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "eventRentPayer"; + isMut: true; + isSigner: true; + }, + { + name: "senderAuthorityPda"; + isMut: false; + isSigner: false; + }, + { + name: "burnTokenAccount"; + isMut: true; + isSigner: false; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "remoteTokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "localToken"; + isMut: true; + isSigner: false; + }, + { + name: "burnTokenMint"; + isMut: true; + isSigner: false; + }, + { + name: "messageSentEventData"; + isMut: true; + isSigner: true; + }, + { + name: "messageTransmitterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMessengerMinterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "tokenProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "DepositForBurnWithCallerParams"; + }; + }, + ]; + returns: "u64"; + }, + { + name: "replaceDepositForBurn"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "eventRentPayer"; + isMut: true; + isSigner: true; + }, + { + name: "senderAuthorityPda"; + isMut: false; + isSigner: false; + }, + { + name: "messageTransmitter"; + isMut: true; + isSigner: false; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "messageSentEventData"; + isMut: true; + isSigner: true; + }, + { + name: "messageTransmitterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMessengerMinterProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "ReplaceDepositForBurnParams"; + }; + }, + ]; + returns: "u64"; + }, + { + name: "handleReceiveMessage"; + accounts: [ + { + name: "authorityPda"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "remoteTokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "localToken"; + isMut: true; + isSigner: false; + }, + { + name: "tokenPair"; + isMut: false; + isSigner: false; + }, + { + name: "recipientTokenAccount"; + isMut: true; + isSigner: false; + }, + { + name: "custodyTokenAccount"; + isMut: true; + isSigner: false; + }, + { + name: "tokenProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "HandleReceiveMessageParams"; + }; + }, + ]; + }, + { + name: "setTokenController"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMinter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "SetTokenControllerParams"; + }; + }, + ]; + }, + { + name: "pause"; + accounts: [ + { + name: "pauser"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "PauseParams"; + }; + }, + ]; + }, + { + name: "unpause"; + accounts: [ + { + name: "pauser"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "UnpauseParams"; + }; + }, + ]; + }, + { + name: "updatePauser"; + accounts: [ + { + name: "owner"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMessenger"; + isMut: false; + isSigner: false; + }, + { + name: "tokenMinter"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "UpdatePauserParams"; + }; + }, + ]; + }, + { + name: "setMaxBurnAmountPerMessage"; + accounts: [ + { + name: "tokenController"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "localToken"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "SetMaxBurnAmountPerMessageParams"; + }; + }, + ]; + }, + { + name: "addLocalToken"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "tokenController"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "localToken"; + isMut: true; + isSigner: false; + }, + { + name: "custodyTokenAccount"; + isMut: true; + isSigner: false; + }, + { + name: "localTokenMint"; + isMut: false; + isSigner: false; + }, + { + name: "tokenProgram"; + isMut: false; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "AddLocalTokenParams"; + }; + }, + ]; + }, + { + name: "removeLocalToken"; + accounts: [ + { + name: "payee"; + isMut: true; + isSigner: true; + }, + { + name: "tokenController"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "localToken"; + isMut: true; + isSigner: false; + }, + { + name: "custodyTokenAccount"; + isMut: true; + isSigner: false; + }, + { + name: "tokenProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "RemoveLocalTokenParams"; + }; + }, + ]; + }, + { + name: "linkTokenPair"; + accounts: [ + { + name: "payer"; + isMut: true; + isSigner: true; + }, + { + name: "tokenController"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "tokenPair"; + isMut: true; + isSigner: false; + }, + { + name: "systemProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "LinkTokenPairParams"; + }; + }, + ]; + }, + { + name: "unlinkTokenPair"; + accounts: [ + { + name: "payee"; + isMut: true; + isSigner: true; + }, + { + name: "tokenController"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "tokenPair"; + isMut: true; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "UninkTokenPairParams"; + }; + }, + ]; + }, + { + name: "burnTokenCustody"; + accounts: [ + { + name: "payee"; + isMut: true; + isSigner: true; + }, + { + name: "tokenController"; + isMut: false; + isSigner: true; + }, + { + name: "tokenMinter"; + isMut: false; + isSigner: false; + }, + { + name: "localToken"; + isMut: false; + isSigner: false; + }, + { + name: "custodyTokenAccount"; + isMut: true; + isSigner: false; + }, + { + name: "custodyTokenMint"; + isMut: true; + isSigner: false; + }, + { + name: "tokenProgram"; + isMut: false; + isSigner: false; + }, + { + name: "eventAuthority"; + isMut: false; + isSigner: false; + }, + { + name: "program"; + isMut: false; + isSigner: false; + }, + ]; + args: [ + { + name: "params"; + type: { + defined: "BurnTokenCustodyParams"; + }; + }, + ]; + }, + ]; + accounts: [ + { + name: "tokenMessenger"; + type: { + kind: "struct"; + fields: [ + { + name: "owner"; + type: "publicKey"; + }, + { + name: "pendingOwner"; + type: "publicKey"; + }, + { + name: "localMessageTransmitter"; + type: "publicKey"; + }, + { + name: "messageBodyVersion"; + type: "u32"; + }, + { + name: "authorityBump"; + type: "u8"; + }, + ]; + }; + }, + { + name: "remoteTokenMessenger"; + type: { + kind: "struct"; + fields: [ + { + name: "domain"; + type: "u32"; + }, + { + name: "tokenMessenger"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "tokenMinter"; + type: { + kind: "struct"; + fields: [ + { + name: "tokenController"; + type: "publicKey"; + }, + { + name: "pauser"; + type: "publicKey"; + }, + { + name: "paused"; + type: "bool"; + }, + { + name: "bump"; + type: "u8"; + }, + ]; + }; + }, + { + name: "tokenPair"; + type: { + kind: "struct"; + fields: [ + { + name: "remoteDomain"; + type: "u32"; + }, + { + name: "remoteToken"; + type: "publicKey"; + }, + { + name: "localToken"; + type: "publicKey"; + }, + { + name: "bump"; + type: "u8"; + }, + ]; + }; + }, + { + name: "localToken"; + type: { + kind: "struct"; + fields: [ + { + name: "custody"; + type: "publicKey"; + }, + { + name: "mint"; + type: "publicKey"; + }, + { + name: "burnLimitPerMessage"; + type: "u64"; + }, + { + name: "messagesSent"; + type: "u64"; + }, + { + name: "messagesReceived"; + type: "u64"; + }, + { + name: "amountSent"; + type: "u128"; + }, + { + name: "amountReceived"; + type: "u128"; + }, + { + name: "bump"; + type: "u8"; + }, + { + name: "custodyBump"; + type: "u8"; + }, + ]; + }; + }, + ]; + types: [ + { + name: "AcceptOwnershipParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "AddRemoteTokenMessengerParams"; + type: { + kind: "struct"; + fields: [ + { + name: "domain"; + type: "u32"; + }, + { + name: "tokenMessenger"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "DepositForBurnWithCallerParams"; + type: { + kind: "struct"; + fields: [ + { + name: "amount"; + type: "u64"; + }, + { + name: "destinationDomain"; + type: "u32"; + }, + { + name: "mintRecipient"; + type: "publicKey"; + }, + { + name: "destinationCaller"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "DepositForBurnParams"; + type: { + kind: "struct"; + fields: [ + { + name: "amount"; + type: "u64"; + }, + { + name: "destinationDomain"; + type: "u32"; + }, + { + name: "mintRecipient"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "HandleReceiveMessageParams"; + type: { + kind: "struct"; + fields: [ + { + name: "remoteDomain"; + type: "u32"; + }, + { + name: "sender"; + type: "publicKey"; + }, + { + name: "messageBody"; + type: "bytes"; + }, + { + name: "authorityBump"; + type: "u8"; + }, + ]; + }; + }, + { + name: "InitializeParams"; + type: { + kind: "struct"; + fields: [ + { + name: "tokenController"; + type: "publicKey"; + }, + { + name: "localMessageTransmitter"; + type: "publicKey"; + }, + { + name: "messageBodyVersion"; + type: "u32"; + }, + ]; + }; + }, + { + name: "RemoveRemoteTokenMessengerParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "ReplaceDepositForBurnParams"; + type: { + kind: "struct"; + fields: [ + { + name: "originalMessage"; + type: "bytes"; + }, + { + name: "originalAttestation"; + type: "bytes"; + }, + { + name: "newDestinationCaller"; + type: "publicKey"; + }, + { + name: "newMintRecipient"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "TransferOwnershipParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newOwner"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "AddLocalTokenParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "BurnTokenCustodyParams"; + type: { + kind: "struct"; + fields: [ + { + name: "amount"; + type: "u64"; + }, + ]; + }; + }, + { + name: "LinkTokenPairParams"; + type: { + kind: "struct"; + fields: [ + { + name: "localToken"; + type: "publicKey"; + }, + { + name: "remoteDomain"; + type: "u32"; + }, + { + name: "remoteToken"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "PauseParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "RemoveLocalTokenParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "SetMaxBurnAmountPerMessageParams"; + type: { + kind: "struct"; + fields: [ + { + name: "burnLimitPerMessage"; + type: "u64"; + }, + ]; + }; + }, + { + name: "SetTokenControllerParams"; + type: { + kind: "struct"; + fields: [ + { + name: "tokenController"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "UninkTokenPairParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "UnpauseParams"; + type: { + kind: "struct"; + fields: []; + }; + }, + { + name: "UpdatePauserParams"; + type: { + kind: "struct"; + fields: [ + { + name: "newPauser"; + type: "publicKey"; + }, + ]; + }; + }, + { + name: "TokenMinterError"; + type: { + kind: "enum"; + variants: [ + { + name: "InvalidAuthority"; + }, + { + name: "InvalidTokenMinterState"; + }, + { + name: "ProgramPaused"; + }, + { + name: "InvalidTokenPairState"; + }, + { + name: "InvalidLocalTokenState"; + }, + { + name: "InvalidPauser"; + }, + { + name: "InvalidTokenController"; + }, + { + name: "BurnAmountExceeded"; + }, + { + name: "InvalidAmount"; + }, + ]; + }; + }, + ]; + events: [ + { + name: "OwnershipTransferStarted"; + fields: [ + { + name: "previousOwner"; + type: "publicKey"; + index: false; + }, + { + name: "newOwner"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "OwnershipTransferred"; + fields: [ + { + name: "previousOwner"; + type: "publicKey"; + index: false; + }, + { + name: "newOwner"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "DepositForBurn"; + fields: [ + { + name: "nonce"; + type: "u64"; + index: false; + }, + { + name: "burnToken"; + type: "publicKey"; + index: false; + }, + { + name: "amount"; + type: "u64"; + index: false; + }, + { + name: "depositor"; + type: "publicKey"; + index: false; + }, + { + name: "mintRecipient"; + type: "publicKey"; + index: false; + }, + { + name: "destinationDomain"; + type: "u32"; + index: false; + }, + { + name: "destinationTokenMessenger"; + type: "publicKey"; + index: false; + }, + { + name: "destinationCaller"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "MintAndWithdraw"; + fields: [ + { + name: "mintRecipient"; + type: "publicKey"; + index: false; + }, + { + name: "amount"; + type: "u64"; + index: false; + }, + { + name: "mintToken"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "RemoteTokenMessengerAdded"; + fields: [ + { + name: "domain"; + type: "u32"; + index: false; + }, + { + name: "tokenMessenger"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "RemoteTokenMessengerRemoved"; + fields: [ + { + name: "domain"; + type: "u32"; + index: false; + }, + { + name: "tokenMessenger"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "SetTokenController"; + fields: [ + { + name: "tokenController"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "PauserChanged"; + fields: [ + { + name: "newAddress"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "SetBurnLimitPerMessage"; + fields: [ + { + name: "token"; + type: "publicKey"; + index: false; + }, + { + name: "burnLimitPerMessage"; + type: "u64"; + index: false; + }, + ]; + }, + { + name: "LocalTokenAdded"; + fields: [ + { + name: "custody"; + type: "publicKey"; + index: false; + }, + { + name: "mint"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "LocalTokenRemoved"; + fields: [ + { + name: "custody"; + type: "publicKey"; + index: false; + }, + { + name: "mint"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "TokenPairLinked"; + fields: [ + { + name: "localToken"; + type: "publicKey"; + index: false; + }, + { + name: "remoteDomain"; + type: "u32"; + index: false; + }, + { + name: "remoteToken"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "TokenPairUnlinked"; + fields: [ + { + name: "localToken"; + type: "publicKey"; + index: false; + }, + { + name: "remoteDomain"; + type: "u32"; + index: false; + }, + { + name: "remoteToken"; + type: "publicKey"; + index: false; + }, + ]; + }, + { + name: "Pause"; + fields: []; + }, + { + name: "Unpause"; + fields: []; + }, + { + name: "TokenCustodyBurned"; + fields: [ + { + name: "custodyTokenAccount"; + type: "publicKey"; + index: false; + }, + { + name: "amount"; + type: "u64"; + index: false; + }, + ]; + }, + ]; + errors: [ { - "name": "payee", - "isMut": true, - "isSigner": true + code: 6000; + name: "InvalidAuthority"; + msg: "Invalid authority"; }, { - "name": "owner", - "isMut": false, - "isSigner": true + code: 6001; + name: "InvalidTokenMessengerState"; + msg: "Invalid token messenger state"; }, { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "RemoveRemoteTokenMessengerParams" - } - } - ] - }, - { - "name": "depositForBurn", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "burnTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "burnTokenMint", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DepositForBurnParams" - } - } - ], - "returns": "u64" - }, - { - "name": "depositForBurnWithCaller", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true + code: 6002; + name: "InvalidTokenMessenger"; + msg: "Invalid token messenger"; }, { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false + code: 6003; + name: "InvalidOwner"; + msg: "Invalid owner"; }, { - "name": "burnTokenAccount", - "isMut": true, - "isSigner": false + code: 6004; + name: "MalformedMessage"; + msg: "Malformed message"; }, { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false + code: 6005; + name: "InvalidMessageBodyVersion"; + msg: "Invalid message body version"; }, { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false + code: 6006; + name: "InvalidAmount"; + msg: "Invalid amount"; }, { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false + code: 6007; + name: "InvalidDestinationDomain"; + msg: "Invalid destination domain"; }, { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "burnTokenMint", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DepositForBurnWithCallerParams" - } - } - ], - "returns": "u64" - }, - { - "name": "replaceDepositForBurn", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReplaceDepositForBurnParams" - } - } - ], - "returns": "u64" - }, - { - "name": "handleReceiveMessage", - "accounts": [ - { - "name": "authorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": false, - "isSigner": false - }, - { - "name": "recipientTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "HandleReceiveMessageParams" - } - } - ] - }, - { - "name": "setTokenController", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetTokenControllerParams" - } - } - ] - }, - { - "name": "pause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "PauseParams" - } - } - ] - }, - { - "name": "unpause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UnpauseParams" - } - } - ] - }, - { - "name": "updatePauser", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdatePauserParams" - } - } - ] - }, - { - "name": "setMaxBurnAmountPerMessage", - "accounts": [ - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetMaxBurnAmountPerMessageParams" - } - } - ] - }, - { - "name": "addLocalToken", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "localTokenMint", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AddLocalTokenParams" - } - } - ] - }, - { - "name": "removeLocalToken", - "accounts": [ - { - "name": "payee", - "isMut": true, - "isSigner": true + code: 6008; + name: "InvalidDestinationCaller"; + msg: "Invalid destination caller"; }, { - "name": "tokenController", - "isMut": false, - "isSigner": true + code: 6009; + name: "InvalidMintRecipient"; + msg: "Invalid mint recipient"; }, { - "name": "tokenMinter", - "isMut": false, - "isSigner": false + code: 6010; + name: "InvalidSender"; + msg: "Invalid sender"; }, { - "name": "localToken", - "isMut": true, - "isSigner": false + code: 6011; + name: "InvalidTokenPair"; + msg: "Invalid token pair"; }, { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false + code: 6012; + name: "InvalidTokenMint"; + msg: "Invalid token mint"; }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "RemoveLocalTokenParams" - } - } - ] - }, - { - "name": "linkTokenPair", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "LinkTokenPairParams" - } - } - ] - }, - { - "name": "unlinkTokenPair", - "accounts": [ - { - "name": "payee", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UninkTokenPairParams" - } - } - ] - } - ], - "accounts": [ - { - "name": "tokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "owner", - "type": "publicKey" - }, - { - "name": "pendingOwner", - "type": "publicKey" - }, - { - "name": "localMessageTransmitter", - "type": "publicKey" - }, - { - "name": "messageBodyVersion", - "type": "u32" - }, - { - "name": "authorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "remoteTokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": "publicKey" - } - ] - } - }, - { - "name": "tokenMinter", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - }, - { - "name": "pauser", - "type": "publicKey" - }, - { - "name": "paused", - "type": "bool" - }, - { - "name": "bump", - "type": "u8" - } - ] - } - }, - { - "name": "tokenPair", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "remoteToken", - "type": "publicKey" - }, - { - "name": "localToken", - "type": "publicKey" - }, - { - "name": "bump", - "type": "u8" - } - ] - } - }, - { - "name": "localToken", - "type": { - "kind": "struct", - "fields": [ - { - "name": "custody", - "type": "publicKey" - }, - { - "name": "mint", - "type": "publicKey" - }, - { - "name": "burnLimitPerMessage", - "type": "u64" - }, - { - "name": "messagesSent", - "type": "u64" - }, - { - "name": "messagesReceived", - "type": "u64" - }, - { - "name": "amountSent", - "type": "u64" - }, - { - "name": "amountReceived", - "type": "u64" - }, - { - "name": "bump", - "type": "u8" - }, - { - "name": "custodyBump", - "type": "u8" - } - ] - } - } - ], - "types": [ - { - "name": "AcceptOwnershipParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "AddRemoteTokenMessengerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": "publicKey" - } - ] - } - }, - { - "name": "DepositForBurnWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "mintRecipient", - "type": "publicKey" - }, - { - "name": "destinationCaller", - "type": "publicKey" - } - ] - } - }, - { - "name": "DepositForBurnParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "mintRecipient", - "type": "publicKey" - } - ] - } - }, - { - "name": "HandleReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "sender", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "InitializeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - }, - { - "name": "localMessageTransmitter", - "type": "publicKey" - }, - { - "name": "messageBodyVersion", - "type": "u32" - } - ] - } - }, - { - "name": "RemoveRemoteTokenMessengerParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "ReplaceDepositForBurnParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "originalMessage", - "type": "bytes" - }, - { - "name": "originalAttestation", - "type": "bytes" - }, - { - "name": "newDestinationCaller", - "type": "publicKey" - }, - { - "name": "newMintRecipient", - "type": "publicKey" - } - ] - } - }, - { - "name": "TransferOwnershipParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newOwner", - "type": "publicKey" - } - ] - } - }, - { - "name": "AddLocalTokenParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "LinkTokenPairParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "localToken", - "type": "publicKey" - }, - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "remoteToken", - "type": "publicKey" - } - ] - } - }, - { - "name": "PauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "RemoveLocalTokenParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "SetMaxBurnAmountPerMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "burnLimitPerMessage", - "type": "u64" - } - ] - } - }, - { - "name": "SetTokenControllerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - } - ] - } - }, - { - "name": "UninkTokenPairParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UnpauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UpdatePauserParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newPauser", - "type": "publicKey" - } - ] - } - }, - { - "name": "TokenMinterError", - "type": { - "kind": "enum", - "variants": [ - { - "name": "InvalidAuthority" - }, - { - "name": "InvalidTokenMinterState" - }, - { - "name": "ProgramPaused" - }, - { - "name": "InvalidTokenPairState" - }, - { - "name": "InvalidLocalTokenState" - }, - { - "name": "InvalidPauser" - }, - { - "name": "InvalidTokenController" - }, - { - "name": "BurnAmountExceeded" - } - ] - } - } - ], - "events": [ - { - "name": "OwnershipTransferStarted", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "OwnershipTransferred", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "DepositForBurn", - "fields": [ - { - "name": "nonce", - "type": "u64", - "index": false - }, - { - "name": "burnToken", - "type": "publicKey", - "index": false - }, - { - "name": "amount", - "type": "u64", - "index": false - }, - { - "name": "depositor", - "type": "publicKey", - "index": false - }, - { - "name": "mintRecipient", - "type": "publicKey", - "index": false - }, - { - "name": "destinationDomain", - "type": "u32", - "index": false - }, - { - "name": "destinationTokenMessenger", - "type": "publicKey", - "index": false - }, - { - "name": "destinationCaller", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MintAndWithdraw", - "fields": [ - { - "name": "mintRecipient", - "type": "publicKey", - "index": false - }, - { - "name": "amount", - "type": "u64", - "index": false - }, - { - "name": "mintToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "RemoteTokenMessengerAdded", - "fields": [ - { - "name": "domain", - "type": "u32", - "index": false - }, - { - "name": "tokenMessenger", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "RemoteTokenMessengerRemoved", - "fields": [ - { - "name": "domain", - "type": "u32", - "index": false - }, - { - "name": "tokenMessenger", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "SetTokenController", - "fields": [ - { - "name": "tokenController", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "PauserChanged", - "fields": [ - { - "name": "newAddress", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "SetBurnLimitPerMessage", - "fields": [ - { - "name": "token", - "type": "publicKey", - "index": false - }, - { - "name": "burnLimitPerMessage", - "type": "u64", - "index": false - } - ] - }, - { - "name": "LocalTokenAdded", - "fields": [ - { - "name": "custody", - "type": "publicKey", - "index": false - }, - { - "name": "mint", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "LocalTokenRemoved", - "fields": [ - { - "name": "custody", - "type": "publicKey", - "index": false - }, - { - "name": "mint", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "TokenPairLinked", - "fields": [ - { - "name": "localToken", - "type": "publicKey", - "index": false - }, - { - "name": "remoteDomain", - "type": "u32", - "index": false - }, - { - "name": "remoteToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "TokenPairUnlinked", - "fields": [ - { - "name": "localToken", - "type": "publicKey", - "index": false - }, - { - "name": "remoteDomain", - "type": "u32", - "index": false - }, - { - "name": "remoteToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "Pause", - "fields": [] - }, - { - "name": "Unpause", - "fields": [] - } - ], - "errors": [ - { - "code": 6000, - "name": "InvalidAuthority", - "msg": "Invalid authority" - }, - { - "code": 6001, - "name": "InvalidTokenMessengerState", - "msg": "Invalid token messenger state" - }, - { - "code": 6002, - "name": "InvalidTokenMessenger", - "msg": "Invalid token messenger" - }, - { - "code": 6003, - "name": "InvalidOwner", - "msg": "Invalid owner" - }, - { - "code": 6004, - "name": "MalformedMessage", - "msg": "Malformed message" - }, - { - "code": 6005, - "name": "InvalidMessageBodyVersion", - "msg": "Invalid message body version" - }, - { - "code": 6006, - "name": "InvalidAmount", - "msg": "Invalid amount" - }, - { - "code": 6007, - "name": "InvalidDestinationDomain", - "msg": "Invalid destination domain" - }, - { - "code": 6008, - "name": "InvalidDestinationCaller", - "msg": "Invalid destination caller" - }, - { - "code": 6009, - "name": "InvalidMintRecipient", - "msg": "Invalid mint recipient" - }, - { - "code": 6010, - "name": "InvalidSender", - "msg": "Invalid sender" - }, - { - "code": 6011, - "name": "InvalidTokenPair", - "msg": "Invalid token pair" - }, - { - "code": 6012, - "name": "InvalidTokenMint", - "msg": "Invalid token mint" - } - ] + ]; }; export const IDL: TokenMessengerMinter = { - "version": "0.1.0", - "name": "token_messenger_minter", - "instructions": [ - { - "name": "initialize", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "upgradeAuthority", - "isMut": false, - "isSigner": true - }, - { - "name": "authorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgramData", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "InitializeParams" - } - } - ] - }, - { - "name": "transferOwnership", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "TransferOwnershipParams" - } - } - ] - }, - { - "name": "acceptOwnership", - "accounts": [ - { - "name": "pendingOwner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AcceptOwnershipParams" - } - } - ] - }, - { - "name": "addRemoteTokenMessenger", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AddRemoteTokenMessengerParams" - } - } - ] - }, - { - "name": "removeRemoteTokenMessenger", - "accounts": [ + version: "0.1.0", + name: "token_messenger_minter", + instructions: [ + { + name: "initialize", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "upgradeAuthority", + isMut: false, + isSigner: true, + }, + { + name: "authorityPda", + isMut: false, + isSigner: false, + }, + { + name: "tokenMessenger", + isMut: true, + isSigner: false, + }, + { + name: "tokenMinter", + isMut: true, + isSigner: false, + }, + { + name: "tokenMessengerMinterProgramData", + isMut: false, + isSigner: false, + }, + { + name: "tokenMessengerMinterProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "InitializeParams", + }, + }, + ], + }, + { + name: "transferOwnership", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "tokenMessenger", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "TransferOwnershipParams", + }, + }, + ], + }, + { + name: "acceptOwnership", + accounts: [ + { + name: "pendingOwner", + isMut: false, + isSigner: true, + }, + { + name: "tokenMessenger", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "AcceptOwnershipParams", + }, + }, + ], + }, + { + name: "addRemoteTokenMessenger", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "remoteTokenMessenger", + isMut: true, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "AddRemoteTokenMessengerParams", + }, + }, + ], + }, + { + name: "removeRemoteTokenMessenger", + accounts: [ + { + name: "payee", + isMut: true, + isSigner: true, + }, + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "remoteTokenMessenger", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "RemoveRemoteTokenMessengerParams", + }, + }, + ], + }, + { + name: "depositForBurn", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "eventRentPayer", + isMut: true, + isSigner: true, + }, + { + name: "senderAuthorityPda", + isMut: false, + isSigner: false, + }, + { + name: "burnTokenAccount", + isMut: true, + isSigner: false, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "remoteTokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "localToken", + isMut: true, + isSigner: false, + }, + { + name: "burnTokenMint", + isMut: true, + isSigner: false, + }, + { + name: "messageSentEventData", + isMut: true, + isSigner: true, + }, + { + name: "messageTransmitterProgram", + isMut: false, + isSigner: false, + }, + { + name: "tokenMessengerMinterProgram", + isMut: false, + isSigner: false, + }, + { + name: "tokenProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "DepositForBurnParams", + }, + }, + ], + returns: "u64", + }, + { + name: "depositForBurnWithCaller", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "eventRentPayer", + isMut: true, + isSigner: true, + }, + { + name: "senderAuthorityPda", + isMut: false, + isSigner: false, + }, + { + name: "burnTokenAccount", + isMut: true, + isSigner: false, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "remoteTokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "localToken", + isMut: true, + isSigner: false, + }, + { + name: "burnTokenMint", + isMut: true, + isSigner: false, + }, + { + name: "messageSentEventData", + isMut: true, + isSigner: true, + }, + { + name: "messageTransmitterProgram", + isMut: false, + isSigner: false, + }, + { + name: "tokenMessengerMinterProgram", + isMut: false, + isSigner: false, + }, + { + name: "tokenProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "DepositForBurnWithCallerParams", + }, + }, + ], + returns: "u64", + }, + { + name: "replaceDepositForBurn", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "eventRentPayer", + isMut: true, + isSigner: true, + }, + { + name: "senderAuthorityPda", + isMut: false, + isSigner: false, + }, + { + name: "messageTransmitter", + isMut: true, + isSigner: false, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "messageSentEventData", + isMut: true, + isSigner: true, + }, + { + name: "messageTransmitterProgram", + isMut: false, + isSigner: false, + }, + { + name: "tokenMessengerMinterProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "ReplaceDepositForBurnParams", + }, + }, + ], + returns: "u64", + }, + { + name: "handleReceiveMessage", + accounts: [ + { + name: "authorityPda", + isMut: false, + isSigner: true, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "remoteTokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "localToken", + isMut: true, + isSigner: false, + }, + { + name: "tokenPair", + isMut: false, + isSigner: false, + }, + { + name: "recipientTokenAccount", + isMut: true, + isSigner: false, + }, + { + name: "custodyTokenAccount", + isMut: true, + isSigner: false, + }, + { + name: "tokenProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "HandleReceiveMessageParams", + }, + }, + ], + }, + { + name: "setTokenController", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "tokenMinter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "SetTokenControllerParams", + }, + }, + ], + }, + { + name: "pause", + accounts: [ + { + name: "pauser", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "PauseParams", + }, + }, + ], + }, + { + name: "unpause", + accounts: [ + { + name: "pauser", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "UnpauseParams", + }, + }, + ], + }, + { + name: "updatePauser", + accounts: [ + { + name: "owner", + isMut: false, + isSigner: true, + }, + { + name: "tokenMessenger", + isMut: false, + isSigner: false, + }, + { + name: "tokenMinter", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "UpdatePauserParams", + }, + }, + ], + }, + { + name: "setMaxBurnAmountPerMessage", + accounts: [ + { + name: "tokenController", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "localToken", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "SetMaxBurnAmountPerMessageParams", + }, + }, + ], + }, + { + name: "addLocalToken", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "tokenController", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "localToken", + isMut: true, + isSigner: false, + }, + { + name: "custodyTokenAccount", + isMut: true, + isSigner: false, + }, + { + name: "localTokenMint", + isMut: false, + isSigner: false, + }, + { + name: "tokenProgram", + isMut: false, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "AddLocalTokenParams", + }, + }, + ], + }, + { + name: "removeLocalToken", + accounts: [ + { + name: "payee", + isMut: true, + isSigner: true, + }, + { + name: "tokenController", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "localToken", + isMut: true, + isSigner: false, + }, + { + name: "custodyTokenAccount", + isMut: true, + isSigner: false, + }, + { + name: "tokenProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "RemoveLocalTokenParams", + }, + }, + ], + }, + { + name: "linkTokenPair", + accounts: [ + { + name: "payer", + isMut: true, + isSigner: true, + }, + { + name: "tokenController", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "tokenPair", + isMut: true, + isSigner: false, + }, + { + name: "systemProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "LinkTokenPairParams", + }, + }, + ], + }, + { + name: "unlinkTokenPair", + accounts: [ + { + name: "payee", + isMut: true, + isSigner: true, + }, + { + name: "tokenController", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "tokenPair", + isMut: true, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "UninkTokenPairParams", + }, + }, + ], + }, + { + name: "burnTokenCustody", + accounts: [ + { + name: "payee", + isMut: true, + isSigner: true, + }, + { + name: "tokenController", + isMut: false, + isSigner: true, + }, + { + name: "tokenMinter", + isMut: false, + isSigner: false, + }, + { + name: "localToken", + isMut: false, + isSigner: false, + }, + { + name: "custodyTokenAccount", + isMut: true, + isSigner: false, + }, + { + name: "custodyTokenMint", + isMut: true, + isSigner: false, + }, + { + name: "tokenProgram", + isMut: false, + isSigner: false, + }, + { + name: "eventAuthority", + isMut: false, + isSigner: false, + }, + { + name: "program", + isMut: false, + isSigner: false, + }, + ], + args: [ + { + name: "params", + type: { + defined: "BurnTokenCustodyParams", + }, + }, + ], + }, + ], + accounts: [ + { + name: "tokenMessenger", + type: { + kind: "struct", + fields: [ + { + name: "owner", + type: "publicKey", + }, + { + name: "pendingOwner", + type: "publicKey", + }, + { + name: "localMessageTransmitter", + type: "publicKey", + }, + { + name: "messageBodyVersion", + type: "u32", + }, + { + name: "authorityBump", + type: "u8", + }, + ], + }, + }, + { + name: "remoteTokenMessenger", + type: { + kind: "struct", + fields: [ + { + name: "domain", + type: "u32", + }, + { + name: "tokenMessenger", + type: "publicKey", + }, + ], + }, + }, + { + name: "tokenMinter", + type: { + kind: "struct", + fields: [ + { + name: "tokenController", + type: "publicKey", + }, + { + name: "pauser", + type: "publicKey", + }, + { + name: "paused", + type: "bool", + }, + { + name: "bump", + type: "u8", + }, + ], + }, + }, + { + name: "tokenPair", + type: { + kind: "struct", + fields: [ + { + name: "remoteDomain", + type: "u32", + }, + { + name: "remoteToken", + type: "publicKey", + }, + { + name: "localToken", + type: "publicKey", + }, + { + name: "bump", + type: "u8", + }, + ], + }, + }, + { + name: "localToken", + type: { + kind: "struct", + fields: [ + { + name: "custody", + type: "publicKey", + }, + { + name: "mint", + type: "publicKey", + }, + { + name: "burnLimitPerMessage", + type: "u64", + }, + { + name: "messagesSent", + type: "u64", + }, + { + name: "messagesReceived", + type: "u64", + }, + { + name: "amountSent", + type: "u128", + }, + { + name: "amountReceived", + type: "u128", + }, + { + name: "bump", + type: "u8", + }, + { + name: "custodyBump", + type: "u8", + }, + ], + }, + }, + ], + types: [ + { + name: "AcceptOwnershipParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "AddRemoteTokenMessengerParams", + type: { + kind: "struct", + fields: [ + { + name: "domain", + type: "u32", + }, + { + name: "tokenMessenger", + type: "publicKey", + }, + ], + }, + }, + { + name: "DepositForBurnWithCallerParams", + type: { + kind: "struct", + fields: [ + { + name: "amount", + type: "u64", + }, + { + name: "destinationDomain", + type: "u32", + }, + { + name: "mintRecipient", + type: "publicKey", + }, + { + name: "destinationCaller", + type: "publicKey", + }, + ], + }, + }, + { + name: "DepositForBurnParams", + type: { + kind: "struct", + fields: [ + { + name: "amount", + type: "u64", + }, + { + name: "destinationDomain", + type: "u32", + }, + { + name: "mintRecipient", + type: "publicKey", + }, + ], + }, + }, + { + name: "HandleReceiveMessageParams", + type: { + kind: "struct", + fields: [ + { + name: "remoteDomain", + type: "u32", + }, + { + name: "sender", + type: "publicKey", + }, + { + name: "messageBody", + type: "bytes", + }, + { + name: "authorityBump", + type: "u8", + }, + ], + }, + }, + { + name: "InitializeParams", + type: { + kind: "struct", + fields: [ + { + name: "tokenController", + type: "publicKey", + }, + { + name: "localMessageTransmitter", + type: "publicKey", + }, + { + name: "messageBodyVersion", + type: "u32", + }, + ], + }, + }, + { + name: "RemoveRemoteTokenMessengerParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "ReplaceDepositForBurnParams", + type: { + kind: "struct", + fields: [ + { + name: "originalMessage", + type: "bytes", + }, + { + name: "originalAttestation", + type: "bytes", + }, + { + name: "newDestinationCaller", + type: "publicKey", + }, + { + name: "newMintRecipient", + type: "publicKey", + }, + ], + }, + }, + { + name: "TransferOwnershipParams", + type: { + kind: "struct", + fields: [ + { + name: "newOwner", + type: "publicKey", + }, + ], + }, + }, + { + name: "AddLocalTokenParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "BurnTokenCustodyParams", + type: { + kind: "struct", + fields: [ + { + name: "amount", + type: "u64", + }, + ], + }, + }, + { + name: "LinkTokenPairParams", + type: { + kind: "struct", + fields: [ + { + name: "localToken", + type: "publicKey", + }, + { + name: "remoteDomain", + type: "u32", + }, + { + name: "remoteToken", + type: "publicKey", + }, + ], + }, + }, + { + name: "PauseParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "RemoveLocalTokenParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "SetMaxBurnAmountPerMessageParams", + type: { + kind: "struct", + fields: [ + { + name: "burnLimitPerMessage", + type: "u64", + }, + ], + }, + }, + { + name: "SetTokenControllerParams", + type: { + kind: "struct", + fields: [ + { + name: "tokenController", + type: "publicKey", + }, + ], + }, + }, + { + name: "UninkTokenPairParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "UnpauseParams", + type: { + kind: "struct", + fields: [], + }, + }, + { + name: "UpdatePauserParams", + type: { + kind: "struct", + fields: [ + { + name: "newPauser", + type: "publicKey", + }, + ], + }, + }, + { + name: "TokenMinterError", + type: { + kind: "enum", + variants: [ + { + name: "InvalidAuthority", + }, + { + name: "InvalidTokenMinterState", + }, + { + name: "ProgramPaused", + }, + { + name: "InvalidTokenPairState", + }, + { + name: "InvalidLocalTokenState", + }, + { + name: "InvalidPauser", + }, + { + name: "InvalidTokenController", + }, + { + name: "BurnAmountExceeded", + }, + { + name: "InvalidAmount", + }, + ], + }, + }, + ], + events: [ + { + name: "OwnershipTransferStarted", + fields: [ + { + name: "previousOwner", + type: "publicKey", + index: false, + }, + { + name: "newOwner", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "OwnershipTransferred", + fields: [ + { + name: "previousOwner", + type: "publicKey", + index: false, + }, + { + name: "newOwner", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "DepositForBurn", + fields: [ + { + name: "nonce", + type: "u64", + index: false, + }, + { + name: "burnToken", + type: "publicKey", + index: false, + }, + { + name: "amount", + type: "u64", + index: false, + }, + { + name: "depositor", + type: "publicKey", + index: false, + }, + { + name: "mintRecipient", + type: "publicKey", + index: false, + }, + { + name: "destinationDomain", + type: "u32", + index: false, + }, + { + name: "destinationTokenMessenger", + type: "publicKey", + index: false, + }, + { + name: "destinationCaller", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "MintAndWithdraw", + fields: [ + { + name: "mintRecipient", + type: "publicKey", + index: false, + }, + { + name: "amount", + type: "u64", + index: false, + }, + { + name: "mintToken", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "RemoteTokenMessengerAdded", + fields: [ + { + name: "domain", + type: "u32", + index: false, + }, + { + name: "tokenMessenger", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "RemoteTokenMessengerRemoved", + fields: [ + { + name: "domain", + type: "u32", + index: false, + }, + { + name: "tokenMessenger", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "SetTokenController", + fields: [ + { + name: "tokenController", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "PauserChanged", + fields: [ + { + name: "newAddress", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "SetBurnLimitPerMessage", + fields: [ + { + name: "token", + type: "publicKey", + index: false, + }, + { + name: "burnLimitPerMessage", + type: "u64", + index: false, + }, + ], + }, + { + name: "LocalTokenAdded", + fields: [ + { + name: "custody", + type: "publicKey", + index: false, + }, + { + name: "mint", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "LocalTokenRemoved", + fields: [ + { + name: "custody", + type: "publicKey", + index: false, + }, + { + name: "mint", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "TokenPairLinked", + fields: [ + { + name: "localToken", + type: "publicKey", + index: false, + }, + { + name: "remoteDomain", + type: "u32", + index: false, + }, + { + name: "remoteToken", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "TokenPairUnlinked", + fields: [ + { + name: "localToken", + type: "publicKey", + index: false, + }, + { + name: "remoteDomain", + type: "u32", + index: false, + }, + { + name: "remoteToken", + type: "publicKey", + index: false, + }, + ], + }, + { + name: "Pause", + fields: [], + }, + { + name: "Unpause", + fields: [], + }, + { + name: "TokenCustodyBurned", + fields: [ + { + name: "custodyTokenAccount", + type: "publicKey", + index: false, + }, + { + name: "amount", + type: "u64", + index: false, + }, + ], + }, + ], + errors: [ { - "name": "payee", - "isMut": true, - "isSigner": true + code: 6000, + name: "InvalidAuthority", + msg: "Invalid authority", }, { - "name": "owner", - "isMut": false, - "isSigner": true + code: 6001, + name: "InvalidTokenMessengerState", + msg: "Invalid token messenger state", }, { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "RemoveRemoteTokenMessengerParams" - } - } - ] - }, - { - "name": "depositForBurn", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "burnTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "burnTokenMint", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DepositForBurnParams" - } - } - ], - "returns": "u64" - }, - { - "name": "depositForBurnWithCaller", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true + code: 6002, + name: "InvalidTokenMessenger", + msg: "Invalid token messenger", }, { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false + code: 6003, + name: "InvalidOwner", + msg: "Invalid owner", }, { - "name": "burnTokenAccount", - "isMut": true, - "isSigner": false + code: 6004, + name: "MalformedMessage", + msg: "Malformed message", }, { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false + code: 6005, + name: "InvalidMessageBodyVersion", + msg: "Invalid message body version", }, { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false + code: 6006, + name: "InvalidAmount", + msg: "Invalid amount", }, { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false + code: 6007, + name: "InvalidDestinationDomain", + msg: "Invalid destination domain", }, { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "burnTokenMint", - "isMut": true, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "DepositForBurnWithCallerParams" - } - } - ], - "returns": "u64" - }, - { - "name": "replaceDepositForBurn", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "senderAuthorityPda", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitter", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "messageTransmitterProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessengerMinterProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "ReplaceDepositForBurnParams" - } - } - ], - "returns": "u64" - }, - { - "name": "handleReceiveMessage", - "accounts": [ - { - "name": "authorityPda", - "isMut": false, - "isSigner": true - }, - { - "name": "messageTransmitter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "remoteTokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": false, - "isSigner": false - }, - { - "name": "recipientTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "HandleReceiveMessageParams" - } - } - ] - }, - { - "name": "setTokenController", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetTokenControllerParams" - } - } - ] - }, - { - "name": "pause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "PauseParams" - } - } - ] - }, - { - "name": "unpause", - "accounts": [ - { - "name": "pauser", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UnpauseParams" - } - } - ] - }, - { - "name": "updatePauser", - "accounts": [ - { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMessenger", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenMinter", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UpdatePauserParams" - } - } - ] - }, - { - "name": "setMaxBurnAmountPerMessage", - "accounts": [ - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "SetMaxBurnAmountPerMessageParams" - } - } - ] - }, - { - "name": "addLocalToken", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "localToken", - "isMut": true, - "isSigner": false - }, - { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false - }, - { - "name": "localTokenMint", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "AddLocalTokenParams" - } - } - ] - }, - { - "name": "removeLocalToken", - "accounts": [ - { - "name": "payee", - "isMut": true, - "isSigner": true + code: 6008, + name: "InvalidDestinationCaller", + msg: "Invalid destination caller", }, { - "name": "tokenController", - "isMut": false, - "isSigner": true + code: 6009, + name: "InvalidMintRecipient", + msg: "Invalid mint recipient", }, { - "name": "tokenMinter", - "isMut": false, - "isSigner": false + code: 6010, + name: "InvalidSender", + msg: "Invalid sender", }, { - "name": "localToken", - "isMut": true, - "isSigner": false + code: 6011, + name: "InvalidTokenPair", + msg: "Invalid token pair", }, { - "name": "custodyTokenAccount", - "isMut": true, - "isSigner": false + code: 6012, + name: "InvalidTokenMint", + msg: "Invalid token mint", }, - { - "name": "tokenProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "RemoveLocalTokenParams" - } - } - ] - }, - { - "name": "linkTokenPair", - "accounts": [ - { - "name": "payer", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": true, - "isSigner": false - }, - { - "name": "systemProgram", - "isMut": false, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "LinkTokenPairParams" - } - } - ] - }, - { - "name": "unlinkTokenPair", - "accounts": [ - { - "name": "payee", - "isMut": true, - "isSigner": true - }, - { - "name": "tokenController", - "isMut": false, - "isSigner": true - }, - { - "name": "tokenMinter", - "isMut": false, - "isSigner": false - }, - { - "name": "tokenPair", - "isMut": true, - "isSigner": false - } - ], - "args": [ - { - "name": "params", - "type": { - "defined": "UninkTokenPairParams" - } - } - ] - } - ], - "accounts": [ - { - "name": "tokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "owner", - "type": "publicKey" - }, - { - "name": "pendingOwner", - "type": "publicKey" - }, - { - "name": "localMessageTransmitter", - "type": "publicKey" - }, - { - "name": "messageBodyVersion", - "type": "u32" - }, - { - "name": "authorityBump", - "type": "u8" - } - ] - } - }, - { - "name": "remoteTokenMessenger", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": "publicKey" - } - ] - } - }, - { - "name": "tokenMinter", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - }, - { - "name": "pauser", - "type": "publicKey" - }, - { - "name": "paused", - "type": "bool" - }, - { - "name": "bump", - "type": "u8" - } - ] - } - }, - { - "name": "tokenPair", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "remoteToken", - "type": "publicKey" - }, - { - "name": "localToken", - "type": "publicKey" - }, - { - "name": "bump", - "type": "u8" - } - ] - } - }, - { - "name": "localToken", - "type": { - "kind": "struct", - "fields": [ - { - "name": "custody", - "type": "publicKey" - }, - { - "name": "mint", - "type": "publicKey" - }, - { - "name": "burnLimitPerMessage", - "type": "u64" - }, - { - "name": "messagesSent", - "type": "u64" - }, - { - "name": "messagesReceived", - "type": "u64" - }, - { - "name": "amountSent", - "type": "u64" - }, - { - "name": "amountReceived", - "type": "u64" - }, - { - "name": "bump", - "type": "u8" - }, - { - "name": "custodyBump", - "type": "u8" - } - ] - } - } - ], - "types": [ - { - "name": "AcceptOwnershipParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "AddRemoteTokenMessengerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "domain", - "type": "u32" - }, - { - "name": "tokenMessenger", - "type": "publicKey" - } - ] - } - }, - { - "name": "DepositForBurnWithCallerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "mintRecipient", - "type": "publicKey" - }, - { - "name": "destinationCaller", - "type": "publicKey" - } - ] - } - }, - { - "name": "DepositForBurnParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "amount", - "type": "u64" - }, - { - "name": "destinationDomain", - "type": "u32" - }, - { - "name": "mintRecipient", - "type": "publicKey" - } - ] - } - }, - { - "name": "HandleReceiveMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "sender", - "type": "publicKey" - }, - { - "name": "messageBody", - "type": "bytes" - } - ] - } - }, - { - "name": "InitializeParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - }, - { - "name": "localMessageTransmitter", - "type": "publicKey" - }, - { - "name": "messageBodyVersion", - "type": "u32" - } - ] - } - }, - { - "name": "RemoveRemoteTokenMessengerParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "ReplaceDepositForBurnParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "originalMessage", - "type": "bytes" - }, - { - "name": "originalAttestation", - "type": "bytes" - }, - { - "name": "newDestinationCaller", - "type": "publicKey" - }, - { - "name": "newMintRecipient", - "type": "publicKey" - } - ] - } - }, - { - "name": "TransferOwnershipParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newOwner", - "type": "publicKey" - } - ] - } - }, - { - "name": "AddLocalTokenParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "LinkTokenPairParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "localToken", - "type": "publicKey" - }, - { - "name": "remoteDomain", - "type": "u32" - }, - { - "name": "remoteToken", - "type": "publicKey" - } - ] - } - }, - { - "name": "PauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "RemoveLocalTokenParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "SetMaxBurnAmountPerMessageParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "burnLimitPerMessage", - "type": "u64" - } - ] - } - }, - { - "name": "SetTokenControllerParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "tokenController", - "type": "publicKey" - } - ] - } - }, - { - "name": "UninkTokenPairParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UnpauseParams", - "type": { - "kind": "struct", - "fields": [] - } - }, - { - "name": "UpdatePauserParams", - "type": { - "kind": "struct", - "fields": [ - { - "name": "newPauser", - "type": "publicKey" - } - ] - } - }, - { - "name": "TokenMinterError", - "type": { - "kind": "enum", - "variants": [ - { - "name": "InvalidAuthority" - }, - { - "name": "InvalidTokenMinterState" - }, - { - "name": "ProgramPaused" - }, - { - "name": "InvalidTokenPairState" - }, - { - "name": "InvalidLocalTokenState" - }, - { - "name": "InvalidPauser" - }, - { - "name": "InvalidTokenController" - }, - { - "name": "BurnAmountExceeded" - } - ] - } - } - ], - "events": [ - { - "name": "OwnershipTransferStarted", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "OwnershipTransferred", - "fields": [ - { - "name": "previousOwner", - "type": "publicKey", - "index": false - }, - { - "name": "newOwner", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "DepositForBurn", - "fields": [ - { - "name": "nonce", - "type": "u64", - "index": false - }, - { - "name": "burnToken", - "type": "publicKey", - "index": false - }, - { - "name": "amount", - "type": "u64", - "index": false - }, - { - "name": "depositor", - "type": "publicKey", - "index": false - }, - { - "name": "mintRecipient", - "type": "publicKey", - "index": false - }, - { - "name": "destinationDomain", - "type": "u32", - "index": false - }, - { - "name": "destinationTokenMessenger", - "type": "publicKey", - "index": false - }, - { - "name": "destinationCaller", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "MintAndWithdraw", - "fields": [ - { - "name": "mintRecipient", - "type": "publicKey", - "index": false - }, - { - "name": "amount", - "type": "u64", - "index": false - }, - { - "name": "mintToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "RemoteTokenMessengerAdded", - "fields": [ - { - "name": "domain", - "type": "u32", - "index": false - }, - { - "name": "tokenMessenger", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "RemoteTokenMessengerRemoved", - "fields": [ - { - "name": "domain", - "type": "u32", - "index": false - }, - { - "name": "tokenMessenger", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "SetTokenController", - "fields": [ - { - "name": "tokenController", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "PauserChanged", - "fields": [ - { - "name": "newAddress", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "SetBurnLimitPerMessage", - "fields": [ - { - "name": "token", - "type": "publicKey", - "index": false - }, - { - "name": "burnLimitPerMessage", - "type": "u64", - "index": false - } - ] - }, - { - "name": "LocalTokenAdded", - "fields": [ - { - "name": "custody", - "type": "publicKey", - "index": false - }, - { - "name": "mint", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "LocalTokenRemoved", - "fields": [ - { - "name": "custody", - "type": "publicKey", - "index": false - }, - { - "name": "mint", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "TokenPairLinked", - "fields": [ - { - "name": "localToken", - "type": "publicKey", - "index": false - }, - { - "name": "remoteDomain", - "type": "u32", - "index": false - }, - { - "name": "remoteToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "TokenPairUnlinked", - "fields": [ - { - "name": "localToken", - "type": "publicKey", - "index": false - }, - { - "name": "remoteDomain", - "type": "u32", - "index": false - }, - { - "name": "remoteToken", - "type": "publicKey", - "index": false - } - ] - }, - { - "name": "Pause", - "fields": [] - }, - { - "name": "Unpause", - "fields": [] - } - ], - "errors": [ - { - "code": 6000, - "name": "InvalidAuthority", - "msg": "Invalid authority" - }, - { - "code": 6001, - "name": "InvalidTokenMessengerState", - "msg": "Invalid token messenger state" - }, - { - "code": 6002, - "name": "InvalidTokenMessenger", - "msg": "Invalid token messenger" - }, - { - "code": 6003, - "name": "InvalidOwner", - "msg": "Invalid owner" - }, - { - "code": 6004, - "name": "MalformedMessage", - "msg": "Malformed message" - }, - { - "code": 6005, - "name": "InvalidMessageBodyVersion", - "msg": "Invalid message body version" - }, - { - "code": 6006, - "name": "InvalidAmount", - "msg": "Invalid amount" - }, - { - "code": 6007, - "name": "InvalidDestinationDomain", - "msg": "Invalid destination domain" - }, - { - "code": 6008, - "name": "InvalidDestinationCaller", - "msg": "Invalid destination caller" - }, - { - "code": 6009, - "name": "InvalidMintRecipient", - "msg": "Invalid mint recipient" - }, - { - "code": 6010, - "name": "InvalidSender", - "msg": "Invalid sender" - }, - { - "code": 6011, - "name": "InvalidTokenPair", - "msg": "Invalid token pair" - }, - { - "code": 6012, - "name": "InvalidTokenMint", - "msg": "Invalid token mint" - } - ] + ], }; diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 8ad619f8..c1d1c0a3 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -56,7 +56,6 @@ export type WormholeCoreBridgeAccounts = { export type PublishMessageAccounts = WormholeCoreBridgeAccounts & { custodian: PublicKey; - payerSequence: PublicKey; coreMessage: PublicKey; }; @@ -85,6 +84,7 @@ export type BurnAndPublishAccounts = { payerSequence: PublicKey; routerEndpoint: PublicKey; coreMessage: PublicKey; + cctpMessage: PublicKey; coreBridgeConfig: PublicKey; coreEmitterSequence: PublicKey; coreFeeCollector: PublicKey; @@ -95,6 +95,7 @@ export type BurnAndPublishAccounts = { remoteTokenMessenger: PublicKey; tokenMinter: PublicKey; localToken: PublicKey; + tokenMessengerMinterEventAuthority: PublicKey; messageTransmitterProgram: PublicKey; tokenMessengerMinterProgram: PublicKey; }; @@ -197,12 +198,21 @@ export class MatchingEngineProgram { .catch((_) => 0n); } - coreMessageAddress(payer: PublicKey, payerSequenceValue: bigint): PublicKey { + coreMessageAddress(payer: PublicKey, payerSequenceValue: BN | bigint): PublicKey { const encodedPayerSequenceValue = Buffer.alloc(8); - encodedPayerSequenceValue.writeBigUInt64BE(payerSequenceValue); + encodedPayerSequenceValue.writeBigUInt64BE(BigInt(payerSequenceValue.toString())); return PublicKey.findProgramAddressSync( - [Buffer.from("msg"), payer.toBuffer(), encodedPayerSequenceValue], - this.ID + [Buffer.from("core-msg"), payer.toBuffer(), encodedPayerSequenceValue], + this.ID, + )[0]; + } + + cctpMessageAddress(payer: PublicKey, payerSequenceValue: BN | bigint): PublicKey { + const encodedPayerSequenceValue = Buffer.alloc(8); + encodedPayerSequenceValue.writeBigUInt64BE(BigInt(payerSequenceValue.toString())); + return PublicKey.findProgramAddressSync( + [Buffer.from("cctp-msg"), payer.toBuffer(), encodedPayerSequenceValue], + this.ID, )[0]; } @@ -220,7 +230,7 @@ export class MatchingEngineProgram { } fetchPreparedOrderResponse( - input: [PublicKey, VaaHash] | { address: PublicKey } + input: [PublicKey, VaaHash] | { address: PublicKey }, ): Promise { const addr = "address" in input ? input.address : this.preparedOrderResponseAddress(...input); @@ -229,20 +239,20 @@ export class MatchingEngineProgram { async approveCustodianIx( owner: PublicKey, - amount: bigint | number + amount: bigint | number, ): Promise { return splToken.createApproveInstruction( splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, owner), this.custodianAddress(), owner, - amount + amount, ); } async commonAccounts(): Promise { const custodian = this.custodianAddress(); const { coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram } = - await this.publishMessageAccounts(custodian); + await this.publishMessageAccounts(PublicKey.default, 0n); const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); const messageTransmitterProgram = this.messageTransmitterProgram(); @@ -263,9 +273,12 @@ export class MatchingEngineProgram { coreBridgeProgram, tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), - tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), + tokenMessengerMinterSenderAuthority: + tokenMessengerMinterProgram.senderAuthorityAddress(), tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, - messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), + messageTransmitterAuthority: messageTransmitterProgram.authorityAddress( + tokenMessengerMinterProgram.ID, + ), messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), messageTransmitterProgram: messageTransmitterProgram.ID, tokenProgram: splToken.TOKEN_PROGRAM_ID, @@ -282,7 +295,7 @@ export class MatchingEngineProgram { feeRecipient: PublicKey; mint?: PublicKey; }, - auctionParams: AuctionParameters + auctionParams: AuctionParameters, ): Promise { const { owner, ownerAssistant, feeRecipient, mint: inputMint } = accounts; @@ -375,7 +388,7 @@ export class MatchingEngineProgram { routerEndpoint?: PublicKey; remoteTokenMessenger?: PublicKey; }, - args: AddCctpRouterEndpointArgs + args: AddCctpRouterEndpointArgs, ): Promise { const { ownerOrAssistant, @@ -412,7 +425,7 @@ export class MatchingEngineProgram { } = accounts; const [tokenRouterEmitter] = PublicKey.findProgramAddressSync( [Buffer.from("emitter")], - tokenRouterProgram + tokenRouterProgram, ); return this.program.methods .addLocalRouterEndpoint() @@ -426,7 +439,7 @@ export class MatchingEngineProgram { tokenRouterCustodyToken: splToken.getAssociatedTokenAddressSync( this.mint, tokenRouterEmitter, - true + true, ), }) .instruction(); @@ -438,7 +451,7 @@ export class MatchingEngineProgram { custodian?: PublicKey; routerEndpoint?: PublicKey; }, - chain: wormholeSdk.ChainId + chain: wormholeSdk.ChainId, ): Promise { const { ownerOrAssistant, @@ -470,7 +483,7 @@ export class MatchingEngineProgram { newFeeRecipient, newFeeRecipientToken: splToken.getAssociatedTokenAddressSync( this.mint, - newFeeRecipient + newFeeRecipient, ), }) .instruction(); @@ -492,7 +505,7 @@ export class MatchingEngineProgram { async fetchCustodyTokenAccount(): Promise { return splToken.getAccount( this.program.provider.connection, - this.custodyTokenAccountAddress() + this.custodyTokenAccountAddress(), ); } @@ -507,7 +520,7 @@ export class MatchingEngineProgram { toRouterEndpoint?: PublicKey; totalDeposit?: bigint; }, - feeOffer: bigint + feeOffer: bigint, ): Promise<[approveIx: TransactionInstruction, placeInitialOfferIx: TransactionInstruction]> { const { payer, @@ -539,7 +552,7 @@ export class MatchingEngineProgram { ) { const vaaAccount = await VaaAccount.fetch( this.program.provider.connection, - fastVaa + fastVaa, ); const { fastMarketOrder } = LiquidityLayerMessage.decode(vaaAccount.payload()); if (fastMarketOrder === undefined) { @@ -601,7 +614,7 @@ export class MatchingEngineProgram { auctionConfig?: PublicKey; bestOfferToken?: PublicKey; }, - feeOffer: bigint + feeOffer: bigint, ): Promise<[approveIx: TransactionInstruction, improveOfferIx: TransactionInstruction]> { const { offerAuthority, @@ -630,7 +643,7 @@ export class MatchingEngineProgram { const approveIx = await this.approveCustodianIx( offerAuthority, - info.amountIn.add(info.securityDeposit).toNumber() + info.amountIn.add(info.securityDeposit).toNumber(), ); const improveOfferIx = await this.program.methods .improveOffer(new BN(feeOffer.toString())) @@ -655,7 +668,7 @@ export class MatchingEngineProgram { finalizedVaa: PublicKey; mint?: PublicKey; }, - args: CctpMessageArgs + args: CctpMessageArgs, ): Promise { const { payer, fastVaa, finalizedVaa, mint: inputMint } = accounts; @@ -665,6 +678,7 @@ export class MatchingEngineProgram { authority: messageTransmitterAuthority, messageTransmitterConfig, usedNonces, + messageTransmitterEventAuthority, tokenMessengerMinterProgram, tokenMessenger, remoteTokenMessenger, @@ -673,9 +687,10 @@ export class MatchingEngineProgram { tokenPair, custodyToken: tokenMessengerMinterCustodyToken, messageTransmitterProgram, - } = this.messageTransmitterProgram().receiveMessageAccounts( + tokenMessengerMinterEventAuthority, + } = this.messageTransmitterProgram().receiveTokenMessengerMinterMessageAccounts( inputMint ?? this.mint, - encodedCctpMessage + encodedCctpMessage, ); return this.program.methods @@ -687,18 +702,20 @@ export class MatchingEngineProgram { finalizedVaa, preparedOrderResponse: this.preparedOrderResponseAddress( payer, - fastVaaAcct.digest() + fastVaaAcct.digest(), ), custodyToken: this.custodyTokenAccountAddress(), messageTransmitterAuthority, messageTransmitterConfig, usedNonces, + messageTransmitterEventAuthority, tokenMessenger, remoteTokenMessenger, tokenMinter, localToken, tokenPair, tokenMessengerMinterCustodyToken, + tokenMessengerMinterEventAuthority, tokenMessengerMinterProgram, messageTransmitterProgram, }) @@ -766,20 +783,18 @@ export class MatchingEngineProgram { executorToken: PublicKey; preparedOrderResponse?: PublicKey; auction?: PublicKey; - preparedBy?: PublicKey; fastVaa: PublicKey; fastVaaAccount: VaaAccount; auctionConfig?: PublicKey; bestOfferToken?: PublicKey; encodedCctpMessage: Buffer; }, - args: { targetChain: wormholeSdk.ChainId; remoteDomain?: number } + args: { targetChain: wormholeSdk.ChainId; remoteDomain?: number }, ) { const { payer, auction: inputAuction, executorToken, - preparedBy, preparedOrderResponse, fastVaa, fastVaaAccount, @@ -829,14 +844,6 @@ export class MatchingEngineProgram { } const destinationCctpDomain = cctp.domain; - const { - authority: messageTransmitterAuthority, - usedNonces, - tokenPair, - custodyToken: tokenMessengerMinterCustodyToken, - tokenProgram, - } = this.messageTransmitterProgram().receiveMessageAccounts(mint, encodedCctpMessage); - const routerEndpoint = this.routerEndpointAddress(targetChain); const { custodian, @@ -844,6 +851,7 @@ export class MatchingEngineProgram { tokenMessengerMinterSenderAuthority, coreBridgeConfig, coreMessage, + cctpMessage, coreEmitterSequence, coreFeeCollector, coreBridgeProgram, @@ -852,10 +860,11 @@ export class MatchingEngineProgram { tokenMinter, localToken, tokenMessenger, + tokenMessengerMinterEventAuthority, messageTransmitterProgram, } = await this.burnAndPublishAccounts( { payer, mint }, - { targetChain, destinationCctpDomain } + { targetChain, destinationCctpDomain }, ); return this.program.methods @@ -865,7 +874,6 @@ export class MatchingEngineProgram { payerSequence, custodian, fastVaa, - preparedBy, preparedOrderResponse, auction: auctionAddress, executorToken, @@ -874,25 +882,22 @@ export class MatchingEngineProgram { bestOfferToken, toRouterEndpoint: routerEndpoint, mint, - messageTransmitterAuthority, messageTransmitterConfig, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreMessage, + cctpMessage, localToken, tokenMinter, tokenMessenger, tokenMessengerMinterProgram, tokenMessengerMinterSenderAuthority, - usedNonces, remoteTokenMessenger: this.tokenMessengerMinterProgram().remoteTokenMessengerAddress( - destinationCctpDomain + destinationCctpDomain, ), - tokenMessengerMinterCustodyToken, - tokenPair, - tokenProgram, + tokenMessengerMinterEventAuthority, messageTransmitterProgram, coreBridgeProgram, }) @@ -924,15 +929,12 @@ export class MatchingEngineProgram { const { targetChain } = fastMarketOrder; - const { preparedBy } = await this.fetchPreparedOrderResponse({ - address: preparedOrderResponse, - }); - const { custodian, payerSequence, routerEndpoint: toRouterEndpoint, coreMessage, + cctpMessage, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, @@ -943,6 +945,7 @@ export class MatchingEngineProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, messageTransmitterProgram, tokenMessengerMinterProgram, } = await this.burnAndPublishAccounts({ payer }, { targetChain }); @@ -956,7 +959,6 @@ export class MatchingEngineProgram { payerSequence, custodian, fastVaa, - preparedBy, preparedOrderResponse, auction: this.auctionAddress(fastVaaAccount.digest()), custodyToken: this.custodyTokenAccountAddress(), @@ -966,6 +968,7 @@ export class MatchingEngineProgram { toRouterEndpoint, coreBridgeConfig, coreMessage, + cctpMessage, coreEmitterSequence, coreFeeCollector, tokenMessengerMinterSenderAuthority, @@ -974,6 +977,7 @@ export class MatchingEngineProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, coreBridgeProgram, tokenMessengerMinterProgram, messageTransmitterProgram, @@ -1039,6 +1043,7 @@ export class MatchingEngineProgram { payerSequence, routerEndpoint: toRouterEndpoint, coreMessage, + cctpMessage, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, @@ -1049,6 +1054,7 @@ export class MatchingEngineProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, messageTransmitterProgram, tokenMessengerMinterProgram, } = await this.burnAndPublishAccounts({ payer }, fastMarketOrder); @@ -1072,6 +1078,7 @@ export class MatchingEngineProgram { payerSequence, coreBridgeConfig, coreMessage, + cctpMessage, coreEmitterSequence, coreFeeCollector, tokenMessengerMinterSenderAuthority, @@ -1080,6 +1087,7 @@ export class MatchingEngineProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, coreBridgeProgram, tokenMessengerMinterProgram, messageTransmitterProgram, @@ -1136,15 +1144,18 @@ export class MatchingEngineProgram { } })(); + const payerSequence = this.payerSequenceAddress(payer); + const payerSequenceValue = await this.fetchPayerSequenceValue({ + address: payerSequence, + }); const { custodian, - payerSequence, coreMessage, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram, - } = await this.publishMessageAccounts(payer); + } = await this.publishMessageAccounts(payer, payerSequenceValue); return this.program.methods .executeFastOrderLocal() @@ -1173,7 +1184,7 @@ export class MatchingEngineProgram { } async redeemFastFillAccounts( - vaa: PublicKey + vaa: PublicKey, ): Promise<{ vaaAccount: VaaAccount; accounts: RedeemFastFillAccounts }> { const vaaAccount = await VaaAccount.fetch(this.program.provider.connection, vaa); @@ -1189,30 +1200,29 @@ export class MatchingEngineProgram { }; } - async publishMessageAccounts(payer: PublicKey): Promise { - const payerSequence = this.payerSequenceAddress(payer); - const coreMessage = await this.fetchPayerSequenceValue({ address: payerSequence }).then( - (value) => this.coreMessageAddress(payer, value) - ); + async publishMessageAccounts( + payer: PublicKey, + payerSequenceValue: BN | bigint, + ): Promise { + const coreMessage = this.coreMessageAddress(payer, payerSequenceValue); const coreBridgeProgram = this.coreBridgeProgramId(); const custodian = this.custodianAddress(); return { custodian, - payerSequence, coreMessage, coreBridgeConfig: PublicKey.findProgramAddressSync( [Buffer.from("Bridge")], - coreBridgeProgram + coreBridgeProgram, )[0], coreEmitterSequence: PublicKey.findProgramAddressSync( [Buffer.from("Sequence"), custodian.toBuffer()], - coreBridgeProgram + coreBridgeProgram, )[0], coreFeeCollector: PublicKey.findProgramAddressSync( [Buffer.from("fee_collector")], - coreBridgeProgram + coreBridgeProgram, )[0], coreBridgeProgram, }; @@ -1226,7 +1236,7 @@ export class MatchingEngineProgram { args: { targetChain: number; destinationCctpDomain?: number; - } + }, ): Promise { const { payer, mint: inputMint } = base; const { targetChain, destinationCctpDomain: inputDestinationCctpDomain } = args; @@ -1252,28 +1262,33 @@ export class MatchingEngineProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, messageTransmitterProgram, tokenMessengerMinterProgram, } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts( inputMint ?? this.mint, - destinationCctpDomain + destinationCctpDomain, ); + const payerSequence = this.payerSequenceAddress(payer); + const payerSequenceValue = await this.fetchPayerSequenceValue({ + address: payerSequence, + }); const { custodian, - payerSequence, coreMessage, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, coreBridgeProgram, - } = await this.publishMessageAccounts(payer); + } = await this.publishMessageAccounts(payer, payerSequenceValue); return { custodian, payerSequence, routerEndpoint: this.routerEndpointAddress(targetChain), coreMessage, + cctpMessage: this.cctpMessageAddress(payer, payerSequenceValue), coreBridgeConfig, coreEmitterSequence, coreFeeCollector, @@ -1284,6 +1299,7 @@ export class MatchingEngineProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, messageTransmitterProgram, tokenMessengerMinterProgram, }; @@ -1294,13 +1310,13 @@ export class MatchingEngineProgram { case testnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", ); } case localnet(): { return new TokenMessengerMinterProgram( this.program.provider.connection, - "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3" + "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", ); } default: { @@ -1314,13 +1330,13 @@ export class MatchingEngineProgram { case testnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", ); } case localnet(): { return new MessageTransmitterProgram( this.program.provider.connection, - "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd" + "CCTPmbSD7gX1bxKPAmg77w8oFzNFpaQiQUWD43TKaecd", ); } default: { @@ -1346,7 +1362,7 @@ export class MatchingEngineProgram { async computeDepositPenalty( auctionInfo: AuctionInfo, currentSlot: bigint, - configId?: number + configId?: number, ): Promise<{ penalty: bigint; userReward: bigint }> { const auctionParams = await this.fetchAuctionParameters(configId); diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 33c6af29..82055fd0 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -91,6 +91,7 @@ export type RedeemFillCctpAccounts = { messageTransmitterAuthority: PublicKey; messageTransmitterConfig: PublicKey; usedNonces: PublicKey; + messageTransmitterEventAuthority: PublicKey; tokenMessenger: PublicKey; remoteTokenMessenger: PublicKey; tokenMinter: PublicKey; @@ -99,7 +100,7 @@ export type RedeemFillCctpAccounts = { tokenMessengerMinterCustodyToken: PublicKey; tokenMessengerMinterProgram: PublicKey; messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; + tokenMessengerMinterEventAuthority: PublicKey; }; export type RedeemFastFillAccounts = { @@ -165,7 +166,14 @@ export class TokenRouterProgram { coreMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { return PublicKey.findProgramAddressSync( - [Buffer.from("msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], + [Buffer.from("core-msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], + this.ID, + )[0]; + } + + cctpMessageAddress(payer: PublicKey, payerSequenceValue: BN): PublicKey { + return PublicKey.findProgramAddressSync( + [Buffer.from("cctp-msg"), payer.toBuffer(), payerSequenceValue.toBuffer("be", 8)], this.ID, )[0]; } @@ -223,9 +231,12 @@ export class TokenRouterProgram { coreBridgeProgram, tokenMessenger: tokenMessengerMinterProgram.tokenMessengerAddress(), tokenMinter: tokenMessengerMinterProgram.tokenMinterAddress(), - tokenMessengerMinterSenderAuthority: tokenMessengerMinterProgram.senderAuthority(), + tokenMessengerMinterSenderAuthority: + tokenMessengerMinterProgram.senderAuthorityAddress(), tokenMessengerMinterProgram: tokenMessengerMinterProgram.ID, - messageTransmitterAuthority: messageTransmitterProgram.authorityAddress(), + messageTransmitterAuthority: messageTransmitterProgram.authorityAddress( + tokenMessengerMinterProgram.ID, + ), messageTransmitterConfig: messageTransmitterProgram.messageTransmitterConfigAddress(), messageTransmitterProgram: messageTransmitterProgram.ID, tokenProgram: splToken.TOKEN_PROGRAM_ID, @@ -243,12 +254,12 @@ export class TokenRouterProgram { payer: PublicKey; orderSender: PublicKey; preparedOrder: PublicKey; - orderToken: PublicKey; + srcToken: PublicKey; refundToken: PublicKey; }, args: PrepareMarketOrderArgs, ): Promise { - const { payer, orderSender, preparedOrder, orderToken, refundToken } = accounts; + const { payer, orderSender, preparedOrder, srcToken, refundToken } = accounts; const { amountIn, minAmountOut, ...remainingArgs } = args; return this.program.methods @@ -262,7 +273,7 @@ export class TokenRouterProgram { custodian: this.custodianAddress(), orderSender, preparedOrder, - orderToken, + srcToken, refundToken, preparedCustodyToken: this.preparedCustodyTokenAddress(preparedOrder), mint: this.mint, @@ -338,8 +349,7 @@ export class TokenRouterProgram { rentRecipient, preparedFill, dstToken, - custodyToken: this.custodyTokenAccountAddress(), - tokenProgram: splToken.TOKEN_PROGRAM_ID, + preparedCustodyToken: this.preparedCustodyTokenAddress(preparedFill), }) .instruction(); } @@ -377,28 +387,14 @@ export class TokenRouterProgram { })(); const payerSequence = this.payerSequenceAddress(payer); - const coreMessage = await this.fetchPayerSequenceValue(payerSequence).then((value) => - this.coreMessageAddress(payer, value), + const { coreMessage, cctpMessage } = await this.fetchPayerSequenceValue(payerSequence).then( + (value) => { + return { + coreMessage: this.coreMessageAddress(payer, value), + cctpMessage: this.cctpMessageAddress(payer, value), + }; + }, ); - // const { - // custodian, - // custodyToken, - // mint, - // routerEndpoint, - // coreBridgeConfig, - // coreEmitterSequence, - // coreFeeCollector, - // coreBridgeProgram, - // tokenMessengerMinterSenderAuthority, - // messageTransmitterConfig, - // tokenMessenger, - // remoteTokenMessenger, - // tokenMinter, - // localToken, - // tokenMessengerMinterProgram, - // messageTransmitterProgram, - // tokenProgram, - // } = await this.placeMarketOrderCctpAccounts(targetChain); const matchingEngine = this.matchingEngineProgram(); const routerEndpoint = matchingEngine.routerEndpointAddress(targetChain); @@ -418,9 +414,9 @@ export class TokenRouterProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, messageTransmitterProgram, tokenMessengerMinterProgram, - tokenProgram, } = this.tokenMessengerMinterProgram().depositForBurnWithCallerAccounts( mint, protocol.cctp.domain, @@ -443,6 +439,7 @@ export class TokenRouterProgram { routerEndpoint: inputRouterEndpoint ?? routerEndpoint, coreBridgeConfig, coreMessage, + cctpMessage, coreEmitterSequence, coreFeeCollector, tokenMessengerMinterSenderAuthority, @@ -451,10 +448,10 @@ export class TokenRouterProgram { remoteTokenMessenger, tokenMinter, localToken, + tokenMessengerMinterEventAuthority, coreBridgeProgram, tokenMessengerMinterProgram, messageTransmitterProgram, - tokenProgram, }) .instruction(); } @@ -470,11 +467,11 @@ export class TokenRouterProgram { const { chain } = vaaAcct.emitterInfo(); const preparedFill = this.preparedFillAddress(vaaAcct.digest()); - const messageTransmitterProgram = this.messageTransmitterProgram(); const { authority: messageTransmitterAuthority, messageTransmitterConfig, usedNonces, + messageTransmitterEventAuthority, tokenMessengerMinterProgram, tokenMessenger, remoteTokenMessenger, @@ -482,8 +479,12 @@ export class TokenRouterProgram { localToken, tokenPair, custodyToken: tokenMessengerMinterCustodyToken, - tokenProgram, - } = messageTransmitterProgram.receiveMessageAccounts(this.mint, msg); + tokenMessengerMinterEventAuthority, + messageTransmitterProgram, + } = this.messageTransmitterProgram().receiveTokenMessengerMinterMessageAccounts( + this.mint, + msg, + ); return { custodian: this.custodianAddress(), @@ -493,6 +494,7 @@ export class TokenRouterProgram { messageTransmitterAuthority, messageTransmitterConfig, usedNonces, + messageTransmitterEventAuthority, tokenMessenger, remoteTokenMessenger, tokenMinter, @@ -500,8 +502,8 @@ export class TokenRouterProgram { tokenPair, tokenMessengerMinterCustodyToken, tokenMessengerMinterProgram, - messageTransmitterProgram: messageTransmitterProgram.ID, - tokenProgram, + messageTransmitterProgram, + tokenMessengerMinterEventAuthority, }; } @@ -528,6 +530,7 @@ export class TokenRouterProgram { messageTransmitterAuthority, messageTransmitterConfig, usedNonces, + messageTransmitterEventAuthority, tokenMessenger, remoteTokenMessenger, tokenMinter, @@ -536,7 +539,7 @@ export class TokenRouterProgram { tokenMessengerMinterCustodyToken, tokenMessengerMinterProgram, messageTransmitterProgram, - tokenProgram, + tokenMessengerMinterEventAuthority, } = await this.redeemCctpFillAccounts(vaa, encodedCctpMessage); return this.program.methods @@ -547,19 +550,22 @@ export class TokenRouterProgram { vaa, preparedFill, custodyToken, + preparedCustodyToken: this.preparedCustodyTokenAddress(preparedFill), + mint: this.mint, routerEndpoint: inputRouterEndpoint ?? routerEndpoint, messageTransmitterAuthority, messageTransmitterConfig, usedNonces, + messageTransmitterEventAuthority, tokenMessenger, remoteTokenMessenger, tokenMinter, localToken, tokenPair, tokenMessengerMinterCustodyToken, + tokenMessengerMinterEventAuthority, tokenMessengerMinterProgram, messageTransmitterProgram, - tokenProgram, }) .instruction(); } @@ -596,7 +602,6 @@ export class TokenRouterProgram { const { custodian, preparedFill, - custodyToken, matchingEngineCustodian, matchingEngineRedeemedFastFill, matchingEngineRouterEndpoint, @@ -611,7 +616,8 @@ export class TokenRouterProgram { custodian, vaa, preparedFill, - custodyToken, + preparedCustodyToken: this.preparedCustodyTokenAddress(preparedFill), + mint: this.mint, matchingEngineCustodian, matchingEngineRedeemedFastFill, matchingEngineRouterEndpoint, diff --git a/solana/ts/src/tokenRouter/state/PreparedFill.ts b/solana/ts/src/tokenRouter/state/PreparedFill.ts index 4a1bd5ad..8f4c77fb 100644 --- a/solana/ts/src/tokenRouter/state/PreparedFill.ts +++ b/solana/ts/src/tokenRouter/state/PreparedFill.ts @@ -10,17 +10,18 @@ export type FillType = { export class PreparedFill { vaaHash: Array; bump: number; - redeemer: PublicKey; + preparedCustodyTokenBump: number; preparedBy: PublicKey; fillType: FillType; - amount: BN; sourceChain: number; orderSender: Array; + redeemer: PublicKey; redeemerMessage: Buffer; constructor( vaaHash: Array, bump: number, + preparedCustodyTokenBump: number, redeemer: PublicKey, preparedBy: PublicKey, fillType: FillType, @@ -31,12 +32,12 @@ export class PreparedFill { ) { this.vaaHash = vaaHash; this.bump = bump; - this.redeemer = redeemer; + this.preparedCustodyTokenBump = preparedCustodyTokenBump; this.preparedBy = preparedBy; this.fillType = fillType; - this.amount = amount; this.sourceChain = sourceChain; this.orderSender = orderSender; + this.redeemer = redeemer; this.redeemerMessage = redeemerMessage; } diff --git a/solana/ts/src/tokenRouter/state/PreparedOrder.ts b/solana/ts/src/tokenRouter/state/PreparedOrder.ts index e9566b9c..f1036c4a 100644 --- a/solana/ts/src/tokenRouter/state/PreparedOrder.ts +++ b/solana/ts/src/tokenRouter/state/PreparedOrder.ts @@ -8,14 +8,14 @@ export type OrderType = { }; export type PreparedOrderInfo = { + preparedCustodyTokenBump: number; orderSender: PublicKey; preparedBy: PublicKey; orderType: OrderType; - orderToken: PublicKey; + srcToken: PublicKey; refundToken: PublicKey; targetChain: number; redeemer: Array; - preparedCustodyTokenBump: number; }; export class PreparedOrder { diff --git a/solana/ts/src/wormhole/index.ts b/solana/ts/src/wormhole/index.ts index 555b0f68..916a94f0 100644 --- a/solana/ts/src/wormhole/index.ts +++ b/solana/ts/src/wormhole/index.ts @@ -121,7 +121,7 @@ export class VaaAccount { digest(): Uint8Array { if (this._encodedVaa !== undefined) { return ethers.utils.arrayify( - ethers.utils.keccak256(parseVaa(this._encodedVaa.buf).hash) + ethers.utils.keccak256(parseVaa(this._encodedVaa.buf).hash), ); } else if (this._postedVaaV1 !== undefined) { const { @@ -175,31 +175,3 @@ export class VaaAccount { this._postedVaaV1 = postedVaaV1; } } - -export class Claim { - static address( - programId: PublicKey, - address: Array, - chain: number, - sequence: bigint, - prefix?: Buffer - ): PublicKey { - const chainBuf = Buffer.alloc(2); - chainBuf.writeUInt16BE(chain); - - const sequenceBuf = Buffer.alloc(8); - sequenceBuf.writeBigUInt64BE(sequence); - - if (prefix !== undefined) { - return PublicKey.findProgramAddressSync( - [prefix, Buffer.from(address), chainBuf, sequenceBuf], - new PublicKey(programId) - )[0]; - } else { - return PublicKey.findProgramAddressSync( - [Buffer.from(address), chainBuf, sequenceBuf], - new PublicKey(programId) - )[0]; - } - } -} diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 85331e67..ec4f91a0 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -2249,7 +2249,7 @@ describe("Matching Engine", function () { ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 250_000, + units: 300_000, }); await expectIxOk(connection, [computeIx, ix], [payer]); @@ -2298,15 +2298,24 @@ describe("Matching Engine", function () { const settleIx = await engine.settleAuctionCompleteIx({ preparedOrderResponse, - preparedBy: payer.publicKey, auction, + preparedBy: payer.publicKey, }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 500_000, + }); await expectIxErr( connection, - [prepareIx!, settleIx], + [computeIx, prepareIx!, settleIx], [payer], "Error Code: AuctionNotCompleted", + { + addressLookupTableAccounts: [lookupTableAccount!], + }, ); }); @@ -2326,7 +2335,6 @@ describe("Matching Engine", function () { const settleIx = await engine.settleAuctionCompleteIx({ preparedOrderResponse, - preparedBy: payer.publicKey, auction, }); @@ -2367,7 +2375,6 @@ describe("Matching Engine", function () { preparedOrderResponse, executorToken: liquidatorToken, auction, - preparedBy: payer.publicKey, encodedCctpMessage, }, { targetChain: ethChain, remoteDomain: solanaChain }, @@ -2389,6 +2396,7 @@ describe("Matching Engine", function () { }, ); }); + it("Settle", async function () { const { auction, fastVaa, fastVaaAccount, prepareIx, preparedOrderResponse } = await prepareOrderResponse({ @@ -2420,7 +2428,6 @@ describe("Matching Engine", function () { preparedOrderResponse, executorToken: liquidatorToken, auction, - preparedBy: payer.publicKey, encodedCctpMessage, }, { targetChain: ethChain, remoteDomain: solanaChain }, @@ -2456,7 +2463,7 @@ describe("Matching Engine", function () { }); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 250_000, + units: 300_000, }); const { amount: feeBalanceBefore } = await splToken.getAccount( @@ -2620,6 +2627,9 @@ describe("Matching Engine", function () { setTimeout(f, startSlot.toNumber() + duration + 200), ); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, + }); const ix = await engine.executeFastOrderCctpIx({ payer: payer.publicKey, fastVaa, @@ -2628,12 +2638,15 @@ describe("Matching Engine", function () { bestOfferToken, initialOfferToken, }); - await expectIxOk(connection, [ix], [payer]); + await expectIxOk(connection, [computeIx, ix], [payer]); } } if (prepareOrderResponse) { - await expectIxOk(connection, [prepareIx], [payer]); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, + }); + await expectIxOk(connection, [computeIx, prepareIx], [payer]); } return { diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 3f6017ec..89c45d19 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -412,7 +412,7 @@ describe("Token Router", function () { payer: payer.publicKey, orderSender: orderSender.publicKey, preparedOrder: preparedOrder.publicKey, - orderToken: payerToken, + srcToken: payerToken, refundToken: payerToken, }, { @@ -454,7 +454,7 @@ describe("Token Router", function () { minAmountOut: bigintToU64BN(minAmountOut), }, }, - orderToken: payerToken, + srcToken: payerToken, refundToken: payerToken, targetChain, redeemer, @@ -481,7 +481,7 @@ describe("Token Router", function () { payer: payer.publicKey, orderSender: orderSender.publicKey, preparedOrder: preparedOrder.publicKey, - orderToken: payerToken, + srcToken: payerToken, refundToken: payerToken, }, { @@ -824,7 +824,7 @@ describe("Token Router", function () { payer: payer.publicKey, orderSender: orderSender.publicKey, preparedOrder: preparedOrder.publicKey, - orderToken: payerToken, + srcToken: payerToken, refundToken: payerToken, }, { @@ -869,7 +869,10 @@ describe("Token Router", function () { const config = transmitter.messageTransmitterConfigAddress(); const { localDomain, nextAvailableNonce } = await transmitter.fetchMessageTransmitterConfig(config); - return { sourceCctpDomain: localDomain, cctpNonce: nextAvailableNonce - 1n }; + return { + sourceCctpDomain: localDomain, + cctpNonce: BigInt(nextAvailableNonce.subn(1).toString()), + }; })(); const { @@ -1339,7 +1342,7 @@ describe("Token Router", function () { connection, custodyToken, ); - expect(balanceAfter).equals(balanceBefore + amount); + expect(balanceAfter).equals(balanceBefore); // TODO: check prepared fill account. }); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 733bad5a..ea8dd030 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -123,14 +123,9 @@ describe("Matching Engine <> Token Router", function () { vaa, }); - const custodyToken = tokenRouter.custodyTokenAccountAddress(); - const { amount: balanceBefore } = await splToken.getAccount(connection, custodyToken); - await expectIxOk(connection, [ix], [payer]); - // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, custodyToken); - expect(balanceAfter).equals(balanceBefore + amount); + // Check balance. TODO const vaaHash = await VaaAccount.fetch(connection, vaa).then((vaa) => vaa.digest()); const preparedFill = tokenRouter.preparedFillAddress(vaaHash); @@ -156,11 +151,12 @@ describe("Matching Engine <> Token Router", function () { { const preparedFillData = await tokenRouter.fetchPreparedFill(preparedFill); - const { bump } = preparedFillData; + const { bump, preparedCustodyTokenBump } = preparedFillData; expect(preparedFillData).to.eql( new tokenRouterSdk.PreparedFill( Array.from(vaaHash), bump, + preparedCustodyTokenBump, redeemer.publicKey, payer.publicKey, { fastFill: {} }, @@ -219,7 +215,10 @@ describe("Matching Engine <> Token Router", function () { const preparedFillRent = await connection.getMinimumBalanceForRentExemption( 152 + redeemerMessage.length, ); - expect(solBalanceAfter).equals(solBalanceBefore + preparedFillRent); + const preparedTokenRent = await connection.getMinimumBalanceForRentExemption( + splToken.AccountLayout.span, + ); + expect(solBalanceAfter).equals(solBalanceBefore + preparedFillRent + preparedTokenRent); const accInfo = await connection.getAccountInfo(preparedFill); expect(accInfo).is.null; diff --git a/solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json b/solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json index 850c6045..a2082abb 100644 --- a/solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json +++ b/solana/ts/tests/accounts/token_messenger_minter/usdc_local_token.json @@ -1,14 +1,14 @@ { "pubkey": "4xt9P42CcMHXAgvemTnzineHp6owfGUcrg1xD9V7mdk1", "account": { - "lamports": 1684320, + "lamports": 1795680, "data": [ - "n4M6qsFUgLaJOQ9DWBY8Pr5GkgAm5md6yYsX7D3P0LYdBflhsqtwJDtELLORIVfxOpM9ATQoLQMrX/7NAaLb8bd5BgjfAC6nABCl1OgAAAAyAAAAAAAAAIYAAAAAAAAAjaVmAQAAAAAhU6gjdg8AAP//", + "n4M6qsFUgLaJOQ9DWBY8Pr5GkgAm5md6yYsX7D3P0LYdBflhsqtwJDtELLORIVfxOpM9ATQoLQMrX/7NAaLb8bd5BgjfAC6nABCl1OgAAAABAAAAAAAAAAEAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAD//w==", "base64" ], "owner": "CCTPiPYPc6AsJuwueEnWgSgucamXDZwBd53dQ11YiKX3", "executable": false, "rentEpoch": 18446744073709551615, - "space": 114 + "space": 130 } -} \ No newline at end of file +} From 2cef128f832ded9e47885669d76a7040c7cd1899 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 8 Feb 2024 14:29:46 -0600 Subject: [PATCH 113/126] solana: custody token -> cctp mint recipient --- ...ustody_token.rs => cctp_mint_recipient.rs} | 0 solana/programs/matching-engine/src/lib.rs | 2 +- .../src/processor/admin/initialize.rs | 4 +- .../auction/execute_fast_order/cctp.rs | 8 +-- .../auction/execute_fast_order/local.rs | 6 +- .../auction/execute_fast_order/mod.rs | 10 +-- .../src/processor/auction/offer/improve.rs | 7 --- .../processor/auction/offer/place_initial.rs | 8 +-- .../auction/prepare_settlement/cctp.rs | 6 +- .../processor/auction/settle/active/cctp.rs | 8 +-- .../processor/auction/settle/active/local.rs | 6 +- .../processor/auction/settle/active/mod.rs | 8 +-- .../src/processor/auction/settle/complete.rs | 6 +- .../src/processor/auction/settle/none/cctp.rs | 8 +-- .../processor/auction/settle/none/local.rs | 6 +- .../src/processor/auction/settle/none/mod.rs | 6 +- .../src/processor/complete_fast_fill.rs | 8 +-- ...ustody_token.rs => cctp_mint_recipient.rs} | 2 +- solana/programs/token-router/src/lib.rs | 2 +- .../src/processor/admin/initialize.rs | 4 +- .../src/processor/redeem_fill/cctp.rs | 8 +-- .../src/processor/redeem_fill/fast.rs | 7 ++- solana/ts/src/matchingEngine/index.ts | 35 ++++++----- solana/ts/src/tokenRouter/index.ts | 55 ++++++----------- solana/ts/tests/01__matchingEngine.ts | 61 ++++++++++--------- solana/ts/tests/02__tokenRouter.ts | 20 +++--- solana/ts/tests/04__interaction.ts | 2 +- 27 files changed, 141 insertions(+), 162 deletions(-) rename solana/programs/matching-engine/src/{custody_token.rs => cctp_mint_recipient.rs} (100%) rename solana/programs/token-router/src/{custody_token.rs => cctp_mint_recipient.rs} (94%) diff --git a/solana/programs/matching-engine/src/custody_token.rs b/solana/programs/matching-engine/src/cctp_mint_recipient.rs similarity index 100% rename from solana/programs/matching-engine/src/custody_token.rs rename to solana/programs/matching-engine/src/cctp_mint_recipient.rs diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index da308b4f..1da676ef 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -1,7 +1,7 @@ #![doc = include_str!("../README.md")] #![allow(clippy::result_large_err)] -pub mod custody_token; +pub mod cctp_mint_recipient; pub mod error; diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 717e9be8..8d93a26b 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -68,9 +68,9 @@ pub struct Initialize<'info> { payer = owner, associated_token::mint = mint, associated_token::authority = custodian, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: Account<'info, token::TokenAccount>, + cctp_mint_recipient: Account<'info, token::TokenAccount>, #[account(address = common::constants::usdc::id() @ MatchingEngineError::NotUsdc)] mint: Account<'info, token::Mint>, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index c6040a15..669dc9d0 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -92,9 +92,9 @@ pub struct ExecuteFastOrderCctp<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// Circle-supported mint. /// @@ -202,7 +202,7 @@ pub fn handle_execute_fast_order_cctp( auction_config: &ctx.accounts.auction_config, fast_vaa: &ctx.accounts.fast_vaa, auction: &mut ctx.accounts.auction, - custody_token: &ctx.accounts.custody_token, + cctp_mint_recipient: &ctx.accounts.cctp_mint_recipient, executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, initial_offer_token: &ctx.accounts.initial_offer_token, @@ -223,7 +223,7 @@ pub fn handle_execute_fast_order_cctp( .accounts .token_messenger_minter_sender_authority .to_account_info(), - burn_token: ctx.accounts.custody_token.to_account_info(), + burn_token: ctx.accounts.cctp_mint_recipient.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index 2c79431d..0c344170 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -87,9 +87,9 @@ pub struct ExecuteFastOrderLocal<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] @@ -138,7 +138,7 @@ pub fn execute_fast_order_local(ctx: Context) -> Result<( auction_config: &ctx.accounts.auction_config, fast_vaa: &ctx.accounts.fast_vaa, auction: &mut ctx.accounts.auction, - custody_token: &ctx.accounts.custody_token, + cctp_mint_recipient: &ctx.accounts.cctp_mint_recipient, executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, initial_offer_token: &ctx.accounts.initial_offer_token, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index 4495d9f5..38ece2b4 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -21,7 +21,7 @@ struct PrepareFastExecution<'ctx, 'info> { auction_config: &'ctx Account<'info, AuctionConfig>, fast_vaa: &'ctx AccountInfo<'info>, auction: &'ctx mut Box>, - custody_token: &'ctx AccountInfo<'info>, + cctp_mint_recipient: &'ctx AccountInfo<'info>, executor_token: &'ctx Account<'info, token::TokenAccount>, best_offer_token: &'ctx AccountInfo<'info>, initial_offer_token: &'ctx AccountInfo<'info>, @@ -41,7 +41,7 @@ fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result Result Result Result { #[account(mut)] best_offer_token: AccountInfo<'info>, - /// CHECK: Mutable. Seeds must be \["custody"\]. - #[account( - mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, - )] - custody_token: AccountInfo<'info>, - token_program: Program<'info, token::Token>, } diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index 83dac756..6e5fea68 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -77,16 +77,16 @@ pub struct PlaceInitialOffer<'info> { #[account( mut, - associated_token::mint = custody_token.mint, + associated_token::mint = cctp_mint_recipient.mint, associated_token::authority = payer )] offer_token: Account<'info, token::TokenAccount>, #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: Account<'info, token::TokenAccount>, + cctp_mint_recipient: Account<'info, token::TokenAccount>, system_program: Program<'info, System>, token_program: Program<'info, token::Token>, @@ -138,7 +138,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R ctx.accounts.token_program.to_account_info(), anchor_spl::token::Transfer { from: ctx.accounts.offer_token.to_account_info(), - to: ctx.accounts.custody_token.to_account_info(), + to: ctx.accounts.cctp_mint_recipient.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, &[Custodian::SIGNER_SEEDS], diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index ae028334..053c32ec 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -58,9 +58,9 @@ pub struct PrepareOrderResponseCctp<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// CHECK: Seeds must be \["message_transmitter_authority"\] (CCTP Message Transmitter program). message_transmitter_authority: UncheckedAccount<'info>, @@ -157,7 +157,7 @@ pub fn prepare_order_response_cctp( token_minter: ctx.accounts.token_minter.to_account_info(), local_token: ctx.accounts.local_token.to_account_info(), token_pair: ctx.accounts.token_pair.to_account_info(), - mint_recipient: ctx.accounts.custody_token.to_account_info(), + mint_recipient: ctx.accounts.cctp_mint_recipient.to_account_info(), custody_token: ctx .accounts .token_messenger_minter_custody_token diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index 85a05de5..7b385969 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -100,9 +100,9 @@ pub struct SettleAuctionActiveCctp<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// Seeds must be \["endpoint", chain.to_be_bytes()\]. #[account( @@ -223,7 +223,7 @@ fn handle_settle_auction_active_cctp( prepared_order_response: &ctx.accounts.prepared_order_response, executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, - custody_token: &ctx.accounts.custody_token, + cctp_mint_recipient: &ctx.accounts.cctp_mint_recipient, payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, })?; @@ -241,7 +241,7 @@ fn handle_settle_auction_active_cctp( .accounts .token_messenger_minter_sender_authority .to_account_info(), - burn_token: ctx.accounts.custody_token.to_account_info(), + burn_token: ctx.accounts.cctp_mint_recipient.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs index 7938d828..b0898787 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -104,9 +104,9 @@ pub struct SettleAuctionActiveLocal<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// CHECK: Seeds must be \["Bridge"\] (Wormhole Core Bridge program). #[account(mut)] @@ -159,7 +159,7 @@ pub fn settle_auction_active_local(ctx: Context) -> Re prepared_order_response: &ctx.accounts.prepared_order_response, executor_token: &ctx.accounts.executor_token, best_offer_token: &ctx.accounts.best_offer_token, - custody_token: &ctx.accounts.custody_token, + cctp_mint_recipient: &ctx.accounts.cctp_mint_recipient, payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, })?; diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index f988513a..65c3206a 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -28,7 +28,7 @@ struct SettleActiveAndPrepareFill<'ctx, 'info> { prepared_order_response: &'ctx Account<'info, PreparedOrderResponse>, executor_token: &'ctx AccountInfo<'info>, best_offer_token: &'ctx AccountInfo<'info>, - custody_token: &'ctx AccountInfo<'info>, + cctp_mint_recipient: &'ctx AccountInfo<'info>, payer_sequence: &'ctx mut Account<'info, PayerSequence>, token_program: &'ctx Program<'info, token::Token>, } @@ -50,7 +50,7 @@ fn settle_active_and_prepare_fill( prepared_order_response, executor_token, best_offer_token, - custody_token, + cctp_mint_recipient, payer_sequence, token_program, } = accounts; @@ -99,7 +99,7 @@ fn settle_active_and_prepare_fill( CpiContext::new_with_signer( token_program.to_account_info(), token::Transfer { - from: custody_token.to_account_info(), + from: cctp_mint_recipient.to_account_info(), to: executor_token.to_account_info(), authority: custodian.to_account_info(), }, @@ -116,7 +116,7 @@ fn settle_active_and_prepare_fill( CpiContext::new_with_signer( token_program.to_account_info(), token::Transfer { - from: custody_token.to_account_info(), + from: cctp_mint_recipient.to_account_info(), to: best_offer_token.to_account_info(), authority: custodian.to_account_info(), }, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/complete.rs b/solana/programs/matching-engine/src/processor/auction/settle/complete.rs index 48cc9024..7ba42d21 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/complete.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/complete.rs @@ -71,9 +71,9 @@ pub struct SettleAuctionComplete<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: Account<'info, token::TokenAccount>, + cctp_mint_recipient: Account<'info, token::TokenAccount>, token_program: Program<'info, token::Token>, } @@ -89,7 +89,7 @@ pub fn settle_auction_complete(ctx: Context) -> Result<() CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), + from: ctx.accounts.cctp_mint_recipient.to_account_info(), to: ctx.accounts.best_offer_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs index adb3e0da..5f902382 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs @@ -89,9 +89,9 @@ pub struct SettleAuctionNoneCctp<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// Destination token account, which the redeemer may not own. But because the redeemer is a /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent @@ -238,7 +238,7 @@ fn handle_settle_auction_none_cctp( from_router_endpoint: &ctx.accounts.from_router_endpoint, to_router_endpoint: &ctx.accounts.to_router_endpoint, fee_recipient_token: &ctx.accounts.fee_recipient_token, - custody_token: &ctx.accounts.custody_token, + cctp_mint_recipient: &ctx.accounts.cctp_mint_recipient, payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, }, @@ -258,7 +258,7 @@ fn handle_settle_auction_none_cctp( .accounts .token_messenger_minter_sender_authority .to_account_info(), - burn_token: ctx.accounts.custody_token.to_account_info(), + burn_token: ctx.accounts.cctp_mint_recipient.to_account_info(), message_transmitter_config: ctx .accounts .message_transmitter_config diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs index 36692216..0e15c2a6 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -78,9 +78,9 @@ pub struct SettleAuctionNoneLocal<'info> { /// NOTE: This account must be encoded as the mint recipient in the CCTP message. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// Destination token account, which the redeemer may not own. But because the redeemer is a /// signer and is the one encoded in the Deposit Fill message, he may have the tokens be sent @@ -165,7 +165,7 @@ pub fn settle_auction_none_local(ctx: Context) -> Result from_router_endpoint: &ctx.accounts.from_router_endpoint, to_router_endpoint: &ctx.accounts.to_router_endpoint, fee_recipient_token: &ctx.accounts.fee_recipient_token, - custody_token: &ctx.accounts.custody_token, + cctp_mint_recipient: &ctx.accounts.cctp_mint_recipient, payer_sequence: &mut ctx.accounts.payer_sequence, token_program: &ctx.accounts.token_program, }, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs index 096bc04b..cbdfda27 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -25,7 +25,7 @@ struct SettleNoneAndPrepareFill<'ctx, 'info> { from_router_endpoint: &'ctx Account<'info, RouterEndpoint>, to_router_endpoint: &'ctx Account<'info, RouterEndpoint>, fee_recipient_token: &'ctx AccountInfo<'info>, - custody_token: &'ctx AccountInfo<'info>, + cctp_mint_recipient: &'ctx AccountInfo<'info>, payer_sequence: &'ctx mut Account<'info, PayerSequence>, token_program: &'ctx Program<'info, token::Token>, } @@ -48,7 +48,7 @@ fn settle_none_and_prepare_fill( from_router_endpoint, to_router_endpoint, fee_recipient_token, - custody_token, + cctp_mint_recipient, payer_sequence, token_program, } = accounts; @@ -75,7 +75,7 @@ fn settle_none_and_prepare_fill( CpiContext::new_with_signer( token_program.to_account_info(), token::Transfer { - from: custody_token.to_account_info(), + from: cctp_mint_recipient.to_account_info(), to: fee_recipient_token.to_account_info(), authority: custodian.to_account_info(), }, diff --git a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs index 5a0003ab..ad33b342 100644 --- a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -46,7 +46,7 @@ pub struct CompleteFastFill<'info> { #[account( mut, - token::mint = custody_token.mint, + token::mint = cctp_mint_recipient.mint, token::authority = token_router_emitter, )] token_router_custody_token: Account<'info, token::TokenAccount>, @@ -67,9 +67,9 @@ pub struct CompleteFastFill<'info> { /// Mutable. Seeds must be \["custody"\]. #[account( mut, - address = crate::custody_token::id() @ MatchingEngineError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ MatchingEngineError::InvalidCustodyToken, )] - custody_token: Account<'info, token::TokenAccount>, + cctp_mint_recipient: Account<'info, token::TokenAccount>, token_program: Program<'info, token::Token>, system_program: Program<'info, System>, @@ -115,7 +115,7 @@ pub fn complete_fast_fill(ctx: Context) -> Result<()> { CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), + from: ctx.accounts.cctp_mint_recipient.to_account_info(), to: ctx.accounts.token_router_custody_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, diff --git a/solana/programs/token-router/src/custody_token.rs b/solana/programs/token-router/src/cctp_mint_recipient.rs similarity index 94% rename from solana/programs/token-router/src/custody_token.rs rename to solana/programs/token-router/src/cctp_mint_recipient.rs index a351322a..7fafc17d 100644 --- a/solana/programs/token-router/src/custody_token.rs +++ b/solana/programs/token-router/src/cctp_mint_recipient.rs @@ -23,7 +23,7 @@ mod test { &custodian, &common::constants::usdc::id() ), - "custody ata mismatch" + "cctp mint recipient mismatch" ); } } diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index def45c6e..309f1f68 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -1,7 +1,7 @@ #![doc = include_str!("../README.md")] #![allow(clippy::result_large_err)] -pub mod custody_token; +pub mod cctp_mint_recipient; pub mod error; diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index f5166392..3d273f66 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -36,9 +36,9 @@ pub struct Initialize<'info> { payer = owner, associated_token::mint = mint, associated_token::authority = custodian, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ TokenRouterError::InvalidCustodyToken, )] - custody_token: Account<'info, token::TokenAccount>, + cctp_mint_recipient: Account<'info, token::TokenAccount>, #[account(address = common::constants::usdc::id() @ TokenRouterError::NotUsdc)] mint: Account<'info, token::Mint>, diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 230362cf..611533ad 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -49,9 +49,9 @@ pub struct RedeemCctpFill<'info> { /// CHECK: Mutable. Seeds must be \["custody"\]. #[account( mut, - address = crate::custody_token::id() @ TokenRouterError::InvalidCustodyToken, + address = crate::cctp_mint_recipient::id() @ TokenRouterError::InvalidCustodyToken, )] - custody_token: AccountInfo<'info>, + cctp_mint_recipient: AccountInfo<'info>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message @@ -195,7 +195,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) token_minter: ctx.accounts.token_minter.to_account_info(), local_token: ctx.accounts.local_token.to_account_info(), token_pair: ctx.accounts.token_pair.to_account_info(), - mint_recipient: ctx.accounts.custody_token.to_account_info(), + mint_recipient: ctx.accounts.cctp_mint_recipient.to_account_info(), custody_token: ctx .accounts .token_messenger_minter_custody_token @@ -279,7 +279,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) CpiContext::new_with_signer( ctx.accounts.token_program.to_account_info(), token::Transfer { - from: ctx.accounts.custody_token.to_account_info(), + from: ctx.accounts.cctp_mint_recipient.to_account_info(), to: ctx.accounts.prepared_custody_token.to_account_info(), authority: ctx.accounts.custodian.to_account_info(), }, diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 527e2799..7e9129f9 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -76,7 +76,7 @@ pub struct RedeemFastFill<'info> { /// CHECK: Mutable. Seeds must be \["custody"] (Matching Engine program). #[account(mut)] - matching_engine_custody_token: UncheckedAccount<'info>, + matching_engine_cctp_mint_recipient: UncheckedAccount<'info>, matching_engine_program: Program<'info, matching_engine::program::MatchingEngine>, token_program: Program<'info, token::Token>, @@ -111,7 +111,10 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { .accounts .matching_engine_router_endpoint .to_account_info(), - custody_token: ctx.accounts.matching_engine_custody_token.to_account_info(), + cctp_mint_recipient: ctx + .accounts + .matching_engine_cctp_mint_recipient + .to_account_info(), token_program: ctx.accounts.token_program.to_account_info(), system_program: ctx.accounts.system_program.to_account_info(), }, diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index c1d1c0a3..8ed786e6 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -65,7 +65,7 @@ export type MatchingEngineCommonAccounts = WormholeCoreBridgeAccounts & { rent: PublicKey; clock: PublicKey; custodian: PublicKey; - custodyToken: PublicKey; + cctpMintRecipient: PublicKey; tokenMessenger: PublicKey; tokenMinter: PublicKey; tokenMessengerMinterSenderAuthority: PublicKey; @@ -104,7 +104,7 @@ export type RedeemFastFillAccounts = { custodian: PublicKey; redeemedFastFill: PublicKey; routerEndpoint: PublicKey; - custodyToken: PublicKey; + cctpMintRecipient: PublicKey; matchingEngineProgram: PublicKey; }; @@ -161,7 +161,7 @@ export class MatchingEngineProgram { return this.fetchAuctionConfig(id).then((config) => config.parameters); } - custodyTokenAccountAddress(): PublicKey { + cctpMintRecipientAddress(): PublicKey { return splToken.getAssociatedTokenAddressSync(this.mint, this.custodianAddress(), true); } @@ -257,7 +257,7 @@ export class MatchingEngineProgram { const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); const messageTransmitterProgram = this.messageTransmitterProgram(); - const custodyToken = this.custodyTokenAccountAddress(); + const cctpMintRecipient = this.cctpMintRecipientAddress(); const mint = this.mint; return { @@ -266,7 +266,7 @@ export class MatchingEngineProgram { rent: SYSVAR_RENT_PUBKEY, clock: SYSVAR_CLOCK_PUBKEY, custodian, - custodyToken, + cctpMintRecipient, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, @@ -308,7 +308,7 @@ export class MatchingEngineProgram { ownerAssistant, feeRecipient, feeRecipientToken: splToken.getAssociatedTokenAddressSync(this.mint, feeRecipient), - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), mint: inputMint ?? this.mint, programData: getProgramData(this.ID), }) @@ -502,10 +502,10 @@ export class MatchingEngineProgram { return this.coreMessageAddress(payer, value); } - async fetchCustodyTokenAccount(): Promise { + async fetchCctpMintRecipient(): Promise { return splToken.getAccount( this.program.provider.connection, - this.custodyTokenAccountAddress(), + this.cctpMintRecipientAddress(), ); } @@ -533,7 +533,7 @@ export class MatchingEngineProgram { totalDeposit: inputTotalDeposit, } = accounts; - const custodyToken = this.custodyTokenAccountAddress(); + const cctpMintRecipient = this.cctpMintRecipientAddress(); const offerToken = await (async () => { if (inputOfferToken !== undefined) { @@ -599,7 +599,7 @@ export class MatchingEngineProgram { fromRouterEndpoint, toRouterEndpoint, offerToken, - custodyToken, + cctpMintRecipient, fastVaa, }) .instruction(); @@ -654,7 +654,6 @@ export class MatchingEngineProgram { auction, offerToken: splToken.getAssociatedTokenAddressSync(this.mint, offerAuthority), bestOfferToken, - custodyToken: this.custodyTokenAccountAddress(), }) .instruction(); @@ -704,7 +703,7 @@ export class MatchingEngineProgram { payer, fastVaaAcct.digest(), ), - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), messageTransmitterAuthority, messageTransmitterConfig, usedNonces, @@ -772,7 +771,7 @@ export class MatchingEngineProgram { preparedOrderResponse, auction, bestOfferToken, - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), }) .instruction(); } @@ -877,7 +876,7 @@ export class MatchingEngineProgram { preparedOrderResponse, auction: auctionAddress, executorToken, - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), auctionConfig, bestOfferToken, toRouterEndpoint: routerEndpoint, @@ -961,7 +960,7 @@ export class MatchingEngineProgram { fastVaa, preparedOrderResponse, auction: this.auctionAddress(fastVaaAccount.digest()), - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), feeRecipientToken, mint: this.mint, fromRouterEndpoint: this.routerEndpointAddress(fastVaaAccount.emitterInfo().chain), @@ -1073,7 +1072,7 @@ export class MatchingEngineProgram { inputExecutorToken ?? splToken.getAssociatedTokenAddressSync(mint, payer), bestOfferToken, initialOfferToken, - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), mint, payerSequence, coreBridgeConfig, @@ -1172,7 +1171,7 @@ export class MatchingEngineProgram { inputExecutorToken ?? splToken.getAssociatedTokenAddressSync(this.mint, payer), bestOfferToken, initialOfferToken, - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), payerSequence, coreBridgeConfig, coreMessage, @@ -1194,7 +1193,7 @@ export class MatchingEngineProgram { custodian: this.custodianAddress(), redeemedFastFill: this.redeemedFastFillAddress(vaaAccount.digest()), routerEndpoint: this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), matchingEngineProgram: this.ID, }, }; diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index 82055fd0..fa8061e9 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -49,7 +49,7 @@ export type TokenRouterCommonAccounts = PublishMessageAccounts & { rent: PublicKey; clock: PublicKey; custodian: PublicKey; - custodyToken: PublicKey; + cctpMintRecipient: PublicKey; tokenMessenger: PublicKey; tokenMinter: PublicKey; tokenMessengerMinterSenderAuthority: PublicKey; @@ -63,30 +63,13 @@ export type TokenRouterCommonAccounts = PublishMessageAccounts & { tokenMessengerMinterCustodyToken: PublicKey; matchingEngineProgram: PublicKey; matchingEngineCustodian: PublicKey; - matchingEngineCustodyToken: PublicKey; -}; - -export type PlaceMarketOrderCctpAccounts = PublishMessageAccounts & { - custodian: PublicKey; - custodyToken: PublicKey; - mint: PublicKey; - routerEndpoint: PublicKey; - tokenMessengerMinterSenderAuthority: PublicKey; - messageTransmitterConfig: PublicKey; - tokenMessenger: PublicKey; - remoteTokenMessenger: PublicKey; - tokenMinter: PublicKey; - localToken: PublicKey; - coreBridgeProgram: PublicKey; - tokenMessengerMinterProgram: PublicKey; - messageTransmitterProgram: PublicKey; - tokenProgram: PublicKey; + matchingEngineCctpMintRecipient: PublicKey; }; export type RedeemFillCctpAccounts = { custodian: PublicKey; preparedFill: PublicKey; - custodyToken: PublicKey; + cctpMintRecipient: PublicKey; routerEndpoint: PublicKey; messageTransmitterAuthority: PublicKey; messageTransmitterConfig: PublicKey; @@ -106,11 +89,11 @@ export type RedeemFillCctpAccounts = { export type RedeemFastFillAccounts = { custodian: PublicKey; preparedFill: PublicKey; - custodyToken: PublicKey; + cctpMintRecipient: PublicKey; matchingEngineCustodian: PublicKey; matchingEngineRedeemedFastFill: PublicKey; matchingEngineRouterEndpoint: PublicKey; - matchingEngineCustodyToken: PublicKey; + matchingEngineCctpMintRecipient: PublicKey; matchingEngineProgram: PublicKey; }; @@ -153,7 +136,7 @@ export class TokenRouterProgram { return this.program.account.custodian.fetch(addr); } - custodyTokenAccountAddress(): PublicKey { + cctpMintRecipientAddress(): PublicKey { return splToken.getAssociatedTokenAddressSync(this.mint, this.custodianAddress(), true); } @@ -213,7 +196,7 @@ export class TokenRouterProgram { const tokenMessengerMinterProgram = this.tokenMessengerMinterProgram(); const messageTransmitterProgram = this.messageTransmitterProgram(); - const custodyToken = this.custodyTokenAccountAddress(); + const cctpMintRecipient = this.cctpMintRecipientAddress(); const mint = this.mint; const matchingEngine = this.matchingEngineProgram(); @@ -224,7 +207,7 @@ export class TokenRouterProgram { rent: SYSVAR_RENT_PUBKEY, clock: SYSVAR_CLOCK_PUBKEY, custodian, - custodyToken, + cctpMintRecipient, coreBridgeConfig, coreEmitterSequence, coreFeeCollector, @@ -245,7 +228,7 @@ export class TokenRouterProgram { tokenMessengerMinterCustodyToken: tokenMessengerMinterProgram.custodyTokenAddress(mint), matchingEngineProgram: matchingEngine.ID, matchingEngineCustodian: matchingEngine.custodianAddress(), - matchingEngineCustodyToken: matchingEngine.custodyTokenAccountAddress(), + matchingEngineCctpMintRecipient: matchingEngine.cctpMintRecipientAddress(), }; } @@ -461,7 +444,7 @@ export class TokenRouterProgram { cctpMessage: CctpTokenBurnMessage | Buffer, ): Promise { const msg = CctpTokenBurnMessage.from(cctpMessage); - const custodyToken = this.custodyTokenAccountAddress(); + const cctpMintRecipient = this.cctpMintRecipientAddress(); const vaaAcct = await VaaAccount.fetch(this.program.provider.connection, vaa); const { chain } = vaaAcct.emitterInfo(); @@ -489,7 +472,7 @@ export class TokenRouterProgram { return { custodian: this.custodianAddress(), preparedFill, - custodyToken, + cctpMintRecipient, routerEndpoint: this.matchingEngineProgram().routerEndpointAddress(chain), messageTransmitterAuthority, messageTransmitterConfig, @@ -525,7 +508,7 @@ export class TokenRouterProgram { const { custodian, preparedFill, - custodyToken, + cctpMintRecipient, routerEndpoint, messageTransmitterAuthority, messageTransmitterConfig, @@ -549,7 +532,7 @@ export class TokenRouterProgram { custodian, vaa, preparedFill, - custodyToken, + cctpMintRecipient, preparedCustodyToken: this.preparedCustodyTokenAddress(preparedFill), mint: this.mint, routerEndpoint: inputRouterEndpoint ?? routerEndpoint, @@ -577,7 +560,7 @@ export class TokenRouterProgram { custodian: matchingEngineCustodian, redeemedFastFill: matchingEngineRedeemedFastFill, routerEndpoint: matchingEngineRouterEndpoint, - custodyToken: matchingEngineCustodyToken, + cctpMintRecipient: matchingEngineCctpMintRecipient, matchingEngineProgram, }, } = await this.matchingEngineProgram().redeemFastFillAccounts(vaa); @@ -585,11 +568,11 @@ export class TokenRouterProgram { return { custodian: this.custodianAddress(), preparedFill: this.preparedFillAddress(vaaAccount.digest()), - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), matchingEngineCustodian, matchingEngineRedeemedFastFill, matchingEngineRouterEndpoint, - matchingEngineCustodyToken, + matchingEngineCctpMintRecipient, matchingEngineProgram, }; } @@ -605,7 +588,7 @@ export class TokenRouterProgram { matchingEngineCustodian, matchingEngineRedeemedFastFill, matchingEngineRouterEndpoint, - matchingEngineCustodyToken, + matchingEngineCctpMintRecipient, matchingEngineProgram, } = await this.redeemFastFillAccounts(vaa); @@ -621,7 +604,7 @@ export class TokenRouterProgram { matchingEngineCustodian, matchingEngineRedeemedFastFill, matchingEngineRouterEndpoint, - matchingEngineCustodyToken, + matchingEngineCctpMintRecipient, matchingEngineProgram, }) .instruction(); @@ -640,7 +623,7 @@ export class TokenRouterProgram { custodian: this.custodianAddress(), ownerAssistant, mint: inputMint ?? this.mint, - custodyToken: this.custodyTokenAccountAddress(), + cctpMintRecipient: this.cctpMintRecipientAddress(), programData: getProgramData(this.ID), }) .instruction(); diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index ec4f91a0..02f2b034 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -833,8 +833,7 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey, ); - const { amount: custodyBalanceBefore } = - await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); const { fastVaa, txDetails } = await placeInitialOfferForTest( offerAuthorityOne, @@ -849,7 +848,7 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey, ); - const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceAfter } = await engine.fetchCctpMintRecipient(); const balanceChange = baseFastOrder.amountIn + baseFastOrder.maxFee; expect(offerBalanceAfter).equals(offerBalanceBefore - balanceChange); @@ -868,7 +867,7 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey, ); - const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); const { fastVaa, txDetails } = await placeInitialOfferForTest( offerAuthorityOne, @@ -882,7 +881,7 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey, ); - const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceAfter } = await engine.fetchCctpMintRecipient(); const balanceChange = fastOrder.amountIn + fastOrder.maxFee; expect(offerBalanceAfter).equals(offerBalanceBefore - balanceChange); expect(custodyBalanceAfter).equals(custodyBalanceBefore + balanceChange); @@ -906,7 +905,7 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey, ); - const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); const { fastVaa, txDetails } = await placeInitialOfferForTest( offerAuthorityOne, @@ -921,7 +920,7 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey, ); - const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceAfter } = await engine.fetchCctpMintRecipient(); const balanceChange = fastOrder.amountIn + fastOrder.maxFee; expect(offerBalanceAfter).equals(offerBalanceBefore - balanceChange); expect(custodyBalanceAfter).equals(custodyBalanceBefore + balanceChange); @@ -1283,8 +1282,7 @@ describe("Matching Engine", function () { connection, offerAuthorityTwo.publicKey, ); - const { amount: custodyBalanceBefore } = - await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); const [approveIx, ix] = await engine.improveOfferIx( { @@ -1322,7 +1320,7 @@ describe("Matching Engine", function () { connection, offerAuthorityOne.publicKey, ); - const { amount: custodyBalanceBefore } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); // New Offer from offerAuthorityOne. const newOffer = BigInt(auctionDataBefore.info!.offerPrice.subn(100).toString()); @@ -1398,7 +1396,7 @@ describe("Matching Engine", function () { { auction, offerAuthority: offerAuthorityOne.publicKey, - bestOfferToken: engine.custodyTokenAccountAddress(), + bestOfferToken: engine.cctpMintRecipientAddress(), }, newOffer, ); @@ -1487,7 +1485,7 @@ describe("Matching Engine", function () { ); // Custody token should be unchanged. - const { amount: custodyTokenAfter } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyTokenAfter } = await engine.fetchCctpMintRecipient(); expect(custodyTokenAfter).equals(custodyTokenBefore); const balanceChange = BigInt(amountIn.add(securityDeposit).toString()); @@ -1552,7 +1550,7 @@ describe("Matching Engine", function () { connection, initialOfferToken, ); - const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyTokenBefore } = await engine.fetchCctpMintRecipient(); const { duration, gracePeriod } = await engine.fetchAuctionParameters(); await waitUntilSlot( @@ -1631,7 +1629,7 @@ describe("Matching Engine", function () { connection, initialOfferToken, ); - const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyTokenBefore } = await engine.fetchCctpMintRecipient(); const { duration, gracePeriod, penaltyPeriod } = await engine.fetchAuctionParameters(); @@ -1691,7 +1689,7 @@ describe("Matching Engine", function () { connection, initialOfferToken, ); - const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyTokenBefore } = await engine.fetchCctpMintRecipient(); const liquidatorToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, @@ -1716,7 +1714,15 @@ describe("Matching Engine", function () { fastVaa, }); - const txDetails = await expectIxOkDetails(connection, [ix], [liquidator]); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, + }); + + const txDetails = await expectIxOkDetails( + connection, + [computeIx, ix], + [liquidator], + ); await checkAfterEffects( txDetails!, @@ -1761,7 +1767,7 @@ describe("Matching Engine", function () { connection, initialOfferToken, ); - const { amount: custodyTokenBefore } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyTokenBefore } = await engine.fetchCctpMintRecipient(); const liquidatorToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, @@ -1883,7 +1889,7 @@ describe("Matching Engine", function () { ethRouter, ); - const bogusToken = engine.custodyTokenAccountAddress(); + const bogusToken = engine.cctpMintRecipientAddress(); const { bestOfferToken } = auctionDataBefore.info!; expect(bogusToken).to.not.eql(bestOfferToken); @@ -1911,7 +1917,7 @@ describe("Matching Engine", function () { ethRouter, ); - const bogusToken = engine.custodyTokenAccountAddress(); + const bogusToken = engine.cctpMintRecipientAddress(); const { initialOfferToken } = auctionDataBefore.info!; expect(bogusToken).to.not.eql(initialOfferToken); @@ -2121,7 +2127,7 @@ describe("Matching Engine", function () { } } - const { amount: custodyTokenAfter } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyTokenAfter } = await engine.fetchCctpMintRecipient(); expect(custodyTokenAfter).equals( custodyTokenBefore - BigInt(amountIn.add(securityDeposit).toString()), ); @@ -2206,9 +2212,7 @@ describe("Matching Engine", function () { destinationCctpDomain, cctpNonce, burnSource, - mintRecipient: Array.from( - engine.custodyTokenAccountAddress().toBuffer(), - ), + mintRecipient: Array.from(engine.cctpMintRecipientAddress().toBuffer()), }, { slowOrderResponse: { @@ -2470,8 +2474,7 @@ describe("Matching Engine", function () { connection, feeRecipientToken, ); - const { amount: custodyBalanceBefore } = - await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); await expectIxOk(connection, [computeIx, settleIx], [payer]); @@ -2486,7 +2489,7 @@ describe("Matching Engine", function () { expect(feeBalanceAfter).equals(feeBalanceBefore + baseFee); const { amount } = deposit.header; - const { amount: custodyBalanceAfter } = await engine.fetchCustodyTokenAccount(); + const { amount: custodyBalanceAfter } = await engine.fetchCctpMintRecipient(); expect(custodyBalanceAfter).equals(custodyBalanceBefore - amount); const fastVaaHash = fastVaaAccount.digest(); @@ -2551,9 +2554,7 @@ describe("Matching Engine", function () { destinationCctpDomain, cctpNonce, burnSource, - mintRecipient: Array.from( - engine.custodyTokenAccountAddress().toBuffer(), - ), + mintRecipient: Array.from(engine.cctpMintRecipientAddress().toBuffer()), }, { slowOrderResponse: { @@ -2769,7 +2770,7 @@ async function craftCctpTokenBurnMessage( }, 0, Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress - Array.from(engine.custodyTokenAccountAddress().toBuffer()), // mint recipient + Array.from(engine.cctpMintRecipientAddress().toBuffer()), // mint recipient amount, new Array(32).fill(0), // burnSource ); diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 89c45d19..91c013dc 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -99,7 +99,7 @@ describe("Token Router", function () { const { amount } = await splToken.getAccount( connection, - tokenRouter.custodyTokenAccountAddress(), + tokenRouter.cctpMintRecipientAddress(), ); expect(amount).to.equal(0n); }); @@ -918,7 +918,7 @@ describe("Token Router", function () { describe("Redeem Fill (CCTP)", function () { const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer(), + tokenRouter.cctpMintRecipientAddress().toBuffer(), ); const sourceCctpDomain = 0; const amount = 69n; @@ -987,7 +987,7 @@ describe("Token Router", function () { ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 250_000, + units: 300_000, }); const { value: lookupTableAccount } = await connection.getAddressLookupTable( @@ -1060,7 +1060,7 @@ describe("Token Router", function () { ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 250_000, + units: 300_000, }); const { value: lookupTableAccount } = await connection.getAddressLookupTable( @@ -1134,7 +1134,7 @@ describe("Token Router", function () { ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 250_000, + units: 300_000, }); const { value: lookupTableAccount } = await connection.getAddressLookupTable( @@ -1321,13 +1321,13 @@ describe("Token Router", function () { ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 250_000, + units: 300_000, }); - const custodyToken = tokenRouter.custodyTokenAccountAddress(); + const cctpMintRecipient = tokenRouter.cctpMintRecipientAddress(); const { amount: balanceBefore } = await splToken.getAccount( connection, - custodyToken, + cctpMintRecipient, ); const { value: lookupTableAccount } = await connection.getAddressLookupTable( @@ -1340,7 +1340,7 @@ describe("Token Router", function () { // Check balance. const { amount: balanceAfter } = await splToken.getAccount( connection, - custodyToken, + cctpMintRecipient, ); expect(balanceAfter).equals(balanceBefore); @@ -1395,7 +1395,7 @@ describe("Token Router", function () { async function redeemFillCctp() { const encodedMintRecipient = Array.from( - tokenRouter.custodyTokenAccountAddress().toBuffer(), + tokenRouter.cctpMintRecipientAddress().toBuffer(), ); const sourceCctpDomain = 0; const cctpNonce = testCctpNonce++; diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index ea8dd030..51b6504d 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -107,7 +107,7 @@ describe("Matching Engine <> Token Router", function () { bump, wormholeSdk.CHAIN_ID_SOLANA, Array.from(tokenRouter.custodianAddress().toBuffer()), - Array.from(tokenRouter.custodyTokenAccountAddress().toBuffer()), + Array.from(tokenRouter.cctpMintRecipientAddress().toBuffer()), { local: { programId: tokenRouter.ID } }, ), ); From 08e7840d3e12d345196f12e59a76f84f5287502b Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Thu, 8 Feb 2024 15:13:23 -0600 Subject: [PATCH 114/126] solana: bump solana to 1.17.20 --- solana/Cargo.lock | 92 +++++++++++++++++++++++++++++------------------ solana/Cargo.toml | 2 +- 2 files changed, 59 insertions(+), 35 deletions(-) diff --git a/solana/Cargo.lock b/solana/Cargo.lock index c1d94e2a..ef3f1ac9 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -51,9 +51,9 @@ dependencies = [ [[package]] name = "ahash" -version = "0.8.4" +version = "0.8.5" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "72832d73be48bac96a5d7944568f305d829ed55b0ce3b483647089dfaf6cf704" +checksum = "cd7d5a2cecb58716e47d67d5703a249964b14c7be1ec3cad3affc295b2d1c35d" dependencies = [ "cfg-if", "getrandom 0.2.11", @@ -355,12 +355,6 @@ dependencies = [ "rand 0.8.5", ] -[[package]] -name = "array-bytes" -version = "1.4.1" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9ad284aeb45c13f2fb4f084de4a420ebf447423bdf9386c0540ce33cb3ef4b8c" - [[package]] name = "arrayref" version = "0.3.7" @@ -429,6 +423,15 @@ version = "1.3.2" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a" +[[package]] +name = "bitflags" +version = "2.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ed570934406eb16438a4e976b1b4500774099c13b8cb96eec99f620f05090ddf" +dependencies = [ + "serde", +] + [[package]] name = "bitmaps" version = "2.1.0" @@ -963,7 +966,7 @@ version = "0.13.2" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "43a3c133739dddd0d2990f9a4bdf8eb4b21ef50e4851ca85ab661199821d510e" dependencies = [ - "ahash 0.8.4", + "ahash 0.8.5", ] [[package]] @@ -1172,6 +1175,18 @@ dependencies = [ "libsecp256k1-core", ] +[[package]] +name = "light-poseidon" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3c9a85a9752c549ceb7578064b4ed891179d20acd85f27318573b64d2d7ee7ee" +dependencies = [ + "ark-bn254", + "ark-ff", + "num-bigint", + "thiserror", +] + [[package]] name = "liquidity-layer-common-solana" version = "0.0.0" @@ -1466,6 +1481,17 @@ dependencies = [ "percent-encoding", ] +[[package]] +name = "qualifier_attr" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9e2e25ee72f5b24d773cae88422baddefff7714f97aab68d96fe2b6fc4a28fb2" +dependencies = [ + "proc-macro2", + "quote", + "syn 2.0.48", +] + [[package]] name = "quote" version = "1.0.35" @@ -1494,6 +1520,7 @@ version = "0.8.5" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "34af8d1a0e25924bc5b7c43c079c942339d8f0a8b57c39049bef581b46327404" dependencies = [ + "libc", "rand_chacha 0.3.1", "rand_core 0.6.4", ] @@ -1580,7 +1607,7 @@ version = "0.4.1" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "4722d768eff46b75989dd134e5c353f0d6296e5aaa3132e776cbdb56be7731aa" dependencies = [ - "bitflags", + "bitflags 1.3.2", ] [[package]] @@ -1799,11 +1826,11 @@ checksum = "4dccd0940a2dcdf68d092b8cbab7dc0ad8fa938bf95787e1b916b0e3d0e8e970" [[package]] name = "solana-frozen-abi" -version = "1.16.27" +version = "1.17.20" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "67a96a0a64cbc75e06c8eb49d6cd0a87054c48dbf59100d9959389aba51fb501" +checksum = "380a5173027b9d70fa033272ebc8ffe8e59c64274109ac99b05578a4c9434215" dependencies = [ - "ahash 0.8.4", + "ahash 0.8.5", "blake3", "block-buffer 0.10.4", "bs58 0.4.0", @@ -1812,13 +1839,10 @@ dependencies = [ "cc", "either", "generic-array", - "getrandom 0.1.16", "im", "lazy_static", "log", "memmap2", - "once_cell", - "rand_core 0.6.4", "rustc_version", "serde", "serde_bytes", @@ -1832,9 +1856,9 @@ dependencies = [ [[package]] name = "solana-frozen-abi-macro" -version = "1.16.27" +version = "1.17.20" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5ae9765c963bebbf609dcdc82cfb969746cbdf6d65cfc9d94112e984475ae4ac" +checksum = "d1017a631a72e211f8bd78e707c9424fb0ef074f3df5bb7b6baef6912a3b1b6b" dependencies = [ "proc-macro2", "quote", @@ -1844,9 +1868,9 @@ dependencies = [ [[package]] name = "solana-logger" -version = "1.16.27" +version = "1.17.20" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9c039e4336890c7a0667207caeb452187efa0602d80eca61a854f2e39915e972" +checksum = "dfcfc4dc59c2f64b0d78b27e5db0238e4f6be852454b0f915bd1f58806fe08c3" dependencies = [ "env_logger", "lazy_static", @@ -1855,18 +1879,17 @@ dependencies = [ [[package]] name = "solana-program" -version = "1.16.27" +version = "1.17.20" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "20c16757f43d4384907f6e81924e155b8bd8228efcdcf9ea38bd4e18ea100804" +checksum = "e882d2ae4903aec8657d18075897cba532155d8f49a0aa39acc0f86fee8c5697" dependencies = [ "ark-bn254", "ark-ec", "ark-ff", "ark-serialize", - "array-bytes", "base64 0.21.7", "bincode", - "bitflags", + "bitflags 2.4.2", "blake3", "borsh 0.10.3", "borsh 0.9.3", @@ -1883,14 +1906,14 @@ dependencies = [ "lazy_static", "libc", "libsecp256k1", + "light-poseidon", "log", "memoffset", "num-bigint", "num-derive 0.3.3", "num-traits", "parking_lot", - "rand 0.7.3", - "rand_chacha 0.2.2", + "rand 0.8.5", "rustc_version", "rustversion", "serde", @@ -1910,14 +1933,14 @@ dependencies = [ [[package]] name = "solana-sdk" -version = "1.16.27" +version = "1.17.20" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "cdf179cda65775982e5f31da8d58dfa4349c3b5ae1573ceb507c7fc91df66690" +checksum = "4b191352781d621b08b3513b02857c8e89f891a8e2aeeeecff977f9819e1a7d5" dependencies = [ "assert_matches", "base64 0.21.7", "bincode", - "bitflags", + "bitflags 2.4.2", "borsh 0.10.3", "bs58 0.4.0", "bytemuck", @@ -1940,8 +1963,9 @@ dependencies = [ "num_enum 0.6.1", "pbkdf2 0.11.0", "qstring", + "qualifier_attr", "rand 0.7.3", - "rand_chacha 0.2.2", + "rand 0.8.5", "rustc_version", "rustversion", "serde", @@ -1963,9 +1987,9 @@ dependencies = [ [[package]] name = "solana-sdk-macro" -version = "1.16.27" +version = "1.17.20" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7f188d6fe76183137a4922274acbe76fc4fcc474b3fad860bb2612cb225e6e2a" +checksum = "c4a7d5483adb2e54e79160ff03fb20fc93e537cc06bef0fc964e2e6e3bbefdbd" dependencies = [ "bs58 0.4.0", "proc-macro2", @@ -1976,9 +2000,9 @@ dependencies = [ [[package]] name = "solana-zk-token-sdk" -version = "1.16.27" +version = "1.17.20" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "9513c4f1595b61f8a39a14c27535da2b2145c20c6b35ab491a1830981972b2bd" +checksum = "28bfe4443f550d37b0055d3dade5ae0dc951d8f80b9f58f1043b699fe9a2f326" dependencies = [ "aes-gcm-siv", "base64 0.21.7", diff --git a/solana/Cargo.toml b/solana/Cargo.toml index a315d663..c5aadc3f 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -33,7 +33,7 @@ default-features = false wormhole-io = "0.1.2" anchor-lang = "0.29.0" anchor-spl = "0.29.0" -solana-program = "=1.16.27" +solana-program = "1.17.20" hex = "0.4.3" ruint = "1.9.0" cfg-if = "1.0" From 68784acc3df5c1ff49f8b1f6bfa13c21f7ac84a9 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Sun, 11 Feb 2024 21:28:32 -0600 Subject: [PATCH 115/126] solana: fix deps --- solana/Anchor.toml | 2 +- solana/Cargo.lock | 35 ++++++++++++++++--- solana/Cargo.toml | 15 +++++--- solana/Makefile | 3 +- solana/modules/common/Cargo.toml | 6 ++-- solana/modules/common/src/constants/mod.rs | 4 +-- .../src/cctp_mint_recipient.rs | 2 +- .../src/processor/admin/initialize.rs | 2 +- .../admin/router_endpoint/add/cctp.rs | 4 +-- .../admin/router_endpoint/add/local.rs | 5 ++- .../admin/update/fee_recipient_token.rs | 2 +- .../auction/execute_fast_order/cctp.rs | 4 +-- .../auction/execute_fast_order/local.rs | 8 ++--- .../auction/execute_fast_order/mod.rs | 8 ++--- .../src/processor/auction/offer/improve.rs | 2 +- .../processor/auction/offer/place_initial.rs | 10 +++--- .../auction/prepare_settlement/cctp.rs | 16 ++++----- .../processor/auction/settle/active/cctp.rs | 2 +- .../processor/auction/settle/active/local.rs | 7 ++-- .../processor/auction/settle/active/mod.rs | 6 ++-- .../src/processor/auction/settle/none/cctp.rs | 12 +++---- .../processor/auction/settle/none/local.rs | 10 +++--- .../src/processor/auction/settle/none/mod.rs | 8 ++--- .../src/processor/complete_fast_fill.rs | 17 ++++----- .../programs/matching-engine/src/utils/mod.rs | 4 +-- .../token-router/src/cctp_mint_recipient.rs | 2 +- .../src/processor/admin/initialize.rs | 2 +- .../src/processor/market_order/place_cctp.rs | 4 +-- .../src/processor/market_order/prepare.rs | 2 +- .../src/processor/redeem_fill/cctp.rs | 16 ++++----- .../src/processor/redeem_fill/fast.rs | 16 ++++----- solana/ts/tests/01__matchingEngine.ts | 10 +++++- 32 files changed, 144 insertions(+), 102 deletions(-) diff --git a/solana/Anchor.toml b/solana/Anchor.toml index 9b1746ab..ddaf981e 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -31,7 +31,7 @@ wallet = "ts/tests/keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json" test = "npx ts-mocha -p ./tsconfig.json -t 1000000 ts/tests/[0-9]*.ts" [test] -startup_wait = 16000 +startup_wait = 20000 [test.validator] url = "https://api.devnet.solana.com" diff --git a/solana/Cargo.lock b/solana/Cargo.lock index ef3f1ac9..2fe259c7 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1199,6 +1199,7 @@ dependencies = [ "wormhole-cctp-solana", "wormhole-io", "wormhole-raw-vaas", + "wormhole-solana-consts", ] [[package]] @@ -2585,18 +2586,19 @@ dependencies = [ [[package]] name = "wormhole-cctp-solana" -version = "0.1.0-alpha.5" +version = "0.1.0-alpha.6" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "c7f30cd8dd31f573cc3005aeb586d80b728e901835089f730b7af4d68589ac40" +checksum = "34cb8cf6dd00dfb05b6fa251ef8b691a2fde580faf694fb7463fcbf1eecca215" dependencies = [ "anchor-lang", "anchor-spl", "cfg-if", "hex", "ruint", - "solana-program", "wormhole-io", "wormhole-raw-vaas", + "wormhole-solana-consts", + "wormhole-solana-vaas", ] [[package]] @@ -2607,14 +2609,37 @@ checksum = "b021a14ea7bcef9517ed9f81d4466c4a663dd90e726c5724707a976fa83ad8f3" [[package]] name = "wormhole-raw-vaas" -version = "0.1.3" +version = "0.2.0-alpha.2" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d05bc16d11c8eb6f956c5de65bff05759ac2b961b16b054bef3666fe029db7c9" +checksum = "e4b8fed51f54543a57b009ce057df3380269c70971d4d096cc9f5dcc2cb1fdb7" dependencies = [ "ruint", "ruint-macro", ] +[[package]] +name = "wormhole-solana-consts" +version = "0.2.0-alpha.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "037dcc895cb45b18d898ccb52358c6dfa02a68bd99f0c68d883c15bb9fb8b423" +dependencies = [ + "cfg-if", + "solana-program", +] + +[[package]] +name = "wormhole-solana-vaas" +version = "0.2.0-alpha.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f6b6c2691fe29bea24748f8a810704f86ce811f807e856d2ee428142acf6b955" +dependencies = [ + "anchor-lang", + "borsh 0.10.3", + "solana-program", + "wormhole-raw-vaas", + "wormhole-solana-consts", +] + [[package]] name = "zerocopy" version = "0.7.32" diff --git a/solana/Cargo.toml b/solana/Cargo.toml index c5aadc3f..6afff202 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -21,16 +21,23 @@ path = "modules/common" path = "programs/matching-engine" [workspace.dependencies.wormhole-cctp-solana] -version = "0.1.0-alpha.5" +version = "0.1.0-alpha.6" default-features = false +[workspace.dependencies.wormhole-solana-utils] +version = "0.2.0-alpha.11" +features = ["anchor"] + +[workspace.dependencies.wormhole-solana-vaas] +version = "0.2.0-alpha.11" +features = ["anchor"] + [workspace.dependencies.wormhole-raw-vaas] -version = "0.1.3" -features = ["on-chain"] -default-features = false +version = "0.2.0-alpha.2" [workspace.dependencies] wormhole-io = "0.1.2" +wormhole-solana-consts = "0.2.0-alpha.11" anchor-lang = "0.29.0" anchor-spl = "0.29.0" solana-program = "1.17.20" diff --git a/solana/Makefile b/solana/Makefile index 8ef4f34e..4002a869 100644 --- a/solana/Makefile +++ b/solana/Makefile @@ -43,7 +43,8 @@ test: node_modules lint: cargo fmt --check - cargo clippy --no-deps --all-targets --all-features -- -D warnings + cargo clippy --no-deps --all-targets --features testnet -- -D warnings + cargo clippy --no-deps --all-targets --features localnet -- -D warnings ci: DOCKER_BUILDKIT=1 docker build -f Dockerfile.ci \ diff --git a/solana/modules/common/Cargo.toml b/solana/modules/common/Cargo.toml index 0c854b59..e950232e 100644 --- a/solana/modules/common/Cargo.toml +++ b/solana/modules/common/Cargo.toml @@ -10,14 +10,16 @@ repository.workspace = true # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html [features] -testnet = ["wormhole-cctp-solana/testnet"] -localnet = ["wormhole-cctp-solana/testnet"] +testnet = ["wormhole-solana-consts/testnet", "wormhole-cctp-solana/testnet"] +localnet = ["wormhole-solana-consts/testnet", "wormhole-cctp-solana/testnet"] [dependencies] wormhole-cctp-solana = { workspace = true, features = ["cpi"] } wormhole-io.workspace = true wormhole-raw-vaas.workspace = true +wormhole-solana-consts.workspace = true + anchor-lang.workspace = true solana-program.workspace = true cfg-if.workspace = true diff --git a/solana/modules/common/src/constants/mod.rs b/solana/modules/common/src/constants/mod.rs index b3dce9b9..9381960d 100644 --- a/solana/modules/common/src/constants/mod.rs +++ b/solana/modules/common/src/constants/mod.rs @@ -1,5 +1,3 @@ -pub mod usdc; - pub const WORMHOLE_MESSAGE_NONCE: u32 = 0; /// Seed for custody token account. @@ -9,3 +7,5 @@ pub const CORE_MESSAGE_SEED_PREFIX: &[u8] = b"core-msg"; pub const CCTP_MESSAGE_SEED_PREFIX: &[u8] = b"cctp-msg"; pub const FEE_PRECISION_MAX: u32 = 1_000_000; + +pub use wormhole_solana_consts::USDC_MINT; diff --git a/solana/programs/matching-engine/src/cctp_mint_recipient.rs b/solana/programs/matching-engine/src/cctp_mint_recipient.rs index b64d8526..2887789a 100644 --- a/solana/programs/matching-engine/src/cctp_mint_recipient.rs +++ b/solana/programs/matching-engine/src/cctp_mint_recipient.rs @@ -21,7 +21,7 @@ mod test { super::id(), anchor_spl::associated_token::get_associated_token_address( &custodian, - &common::constants::usdc::id() + &common::constants::USDC_MINT, ), "custody ata mismatch" ); diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index 8d93a26b..e6f2c2fc 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -72,7 +72,7 @@ pub struct Initialize<'info> { )] cctp_mint_recipient: Account<'info, token::TokenAccount>, - #[account(address = common::constants::usdc::id() @ MatchingEngineError::NotUsdc)] + #[account(address = common::constants::USDC_MINT @ MatchingEngineError::NotUsdc)] mint: Account<'info, token::Mint>, /// We use the program data to make sure this owner is the upgrade authority (the true owner, diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs index 7ae0928b..e60714e7 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs @@ -8,7 +8,7 @@ use common::{ wormhole_cctp_solana::{ cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, utils::ExternalAccount, - wormhole::core_bridge_program, + wormhole::SOLANA_CHAIN, }, }; @@ -74,7 +74,7 @@ pub fn add_cctp_router_endpoint( } = args; require!( - chain != 0 && chain != core_bridge_program::SOLANA_CHAIN, + chain != 0 && chain != SOLANA_CHAIN, MatchingEngineError::ChainNotAllowed ); diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs index 1d772dc0..63eb9f4e 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -5,8 +5,7 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - admin::utils::assistant::only_authorized, - wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + admin::utils::assistant::only_authorized, wormhole_cctp_solana::wormhole::SOLANA_CHAIN, }; #[derive(Accounts)] @@ -53,7 +52,7 @@ pub struct AddLocalRouterEndpoint<'info> { token_router_emitter: AccountInfo<'info>, #[account( - associated_token::mint = common::constants::usdc::id(), + associated_token::mint = common::constants::USDC_MINT, associated_token::authority = token_router_emitter, )] token_router_custody_token: Account<'info, token::TokenAccount>, diff --git a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient_token.rs b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient_token.rs index 512f4e22..a3f66124 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/fee_recipient_token.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/fee_recipient_token.rs @@ -21,7 +21,7 @@ pub struct UpdateFeeRecipient<'info> { custodian: Account<'info, Custodian>, #[account( - associated_token::mint = common::constants::usdc::id(), + associated_token::mint = common::constants::USDC_MINT, associated_token::authority = new_fee_recipient, )] new_fee_recipient_token: Account<'info, token::TokenAccount>, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs index 669dc9d0..5a2fa57f 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/cctp.rs @@ -9,7 +9,7 @@ use common::{ wormhole_cctp_solana::{ self, cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, + wormhole::{core_bridge_program, VaaAccount}, }, wormhole_io::TypePrefixedPayload, }; @@ -52,7 +52,7 @@ pub struct ExecuteFastOrderCctp<'info> { mut, seeds = [ Auction::SEED_PREFIX, - VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + VaaAccount::load(&fast_vaa)?.digest().as_ref() ], bump = auction.bump, constraint = utils::is_valid_active_auction( diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index 0c344170..f39ce9bb 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -6,7 +6,7 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, + wormhole_cctp_solana::wormhole::{core_bridge_program, VaaAccount, SOLANA_CHAIN}, wormhole_io::TypePrefixedPayload, }; @@ -47,7 +47,7 @@ pub struct ExecuteFastOrderLocal<'info> { mut, seeds = [ Auction::SEED_PREFIX, - VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + VaaAccount::load(&fast_vaa)?.digest().as_ref() ], bump = auction.bump, constraint = utils::is_valid_active_auction( @@ -62,7 +62,7 @@ pub struct ExecuteFastOrderLocal<'info> { #[account( seeds = [ RouterEndpoint::SEED_PREFIX, - core_bridge_program::SOLANA_CHAIN.to_be_bytes().as_ref(), + SOLANA_CHAIN.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, )] @@ -70,7 +70,7 @@ pub struct ExecuteFastOrderLocal<'info> { #[account( mut, - token::mint = common::constants::usdc::id(), + token::mint = common::constants::USDC_MINT, )] executor_token: Box>, diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs index 38ece2b4..2959cb90 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/mod.rs @@ -13,7 +13,7 @@ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ messages::{raw::LiquidityLayerPayload, Fill}, - wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, + wormhole_cctp_solana::wormhole::VaaAccount, }; struct PrepareFastExecution<'ctx, 'info> { @@ -50,8 +50,8 @@ fn prepare_fast_execution(accounts: PrepareFastExecution) -> Result Result::from(order.redeemer_message()).to_vec().into(), diff --git a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs index a7afd3f1..68f05ebe 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs @@ -40,7 +40,7 @@ pub struct ImproveOffer<'info> { #[account( mut, - associated_token::mint = common::constants::usdc::id(), + associated_token::mint = common::constants::USDC_MINT, associated_token::authority = offer_authority )] offer_token: Account<'info, token::TokenAccount>, diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index 6e5fea68..e555d440 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -2,7 +2,7 @@ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ messages::raw::LiquidityLayerPayload, - wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, + wormhole_cctp_solana::wormhole::{core_bridge_program, VaaAccount}, }; use crate::{ @@ -51,7 +51,7 @@ pub struct PlaceInitialOffer<'info> { space = 8 + Auction::INIT_SPACE, seeds = [ Auction::SEED_PREFIX, - VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref(), + VaaAccount::load(&fast_vaa)?.digest().as_ref(), ], bump )] @@ -95,14 +95,14 @@ pub struct PlaceInitialOffer<'info> { pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> Result<()> { // Create zero copy reference to `FastMarketOrder` payload. let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa)?; - let msg = LiquidityLayerPayload::try_from(fast_vaa.try_payload()?) + let msg = LiquidityLayerPayload::try_from(fast_vaa.payload()) .map_err(|_| MatchingEngineError::InvalidVaa)? .message(); let fast_order = msg .fast_market_order() .ok_or(MatchingEngineError::NotFastMarketOrder)?; - let source_chain = fast_vaa.try_emitter_chain()?; + let source_chain = fast_vaa.emitter_chain(); // We need to fetch clock values for a couple of operations in this instruction. let Clock { @@ -150,7 +150,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R let initial_offer_token = ctx.accounts.offer_token.key(); ctx.accounts.auction.set_inner(Auction { bump: ctx.bumps.auction, - vaa_hash: fast_vaa.try_digest().unwrap().0, + vaa_hash: fast_vaa.digest().0, status: AuctionStatus::Active, info: Some(AuctionInfo { config_id: ctx.accounts.auction_config.id, diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index 053c32ec..1e246596 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -9,7 +9,7 @@ use common::{ wormhole_cctp_solana::{ self, cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program::{self, VaaAccount}, + wormhole::{core_bridge_program, VaaAccount}, }, }; @@ -43,7 +43,7 @@ pub struct PrepareOrderResponseCctp<'info> { seeds = [ PreparedOrderResponse::SEED_PREFIX, payer.key().as_ref(), - core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + VaaAccount::load(&fast_vaa)?.digest().as_ref() ], bump, )] @@ -121,7 +121,7 @@ pub fn prepare_order_response_cctp( ctx: Context, args: CctpMessageArgs, ) -> Result<()> { - let fast_vaa = VaaAccount::load(&ctx.accounts.fast_vaa).unwrap(); + let fast_vaa = VaaAccount::load_unchecked(&ctx.accounts.fast_vaa); let finalized_vaa = wormhole_cctp_solana::cpi::verify_vaa_and_mint( &ctx.accounts.finalized_vaa, @@ -178,8 +178,8 @@ pub fn prepare_order_response_cctp( // Reconcile fast VAA with finalized VAA. let source_chain = { - let fast_emitter = fast_vaa.try_emitter_info().unwrap(); - let finalized_emitter = finalized_vaa.try_emitter_info().unwrap(); + let fast_emitter = fast_vaa.emitter_info(); + let finalized_emitter = finalized_vaa.emitter_info(); require_eq!( fast_emitter.chain, finalized_emitter.chain, @@ -195,7 +195,7 @@ pub fn prepare_order_response_cctp( MatchingEngineError::VaaMismatch ); require!( - fast_vaa.try_timestamp().unwrap() == finalized_vaa.try_timestamp().unwrap(), + fast_vaa.timestamp() == finalized_vaa.timestamp(), MatchingEngineError::VaaMismatch ); @@ -209,7 +209,7 @@ pub fn prepare_order_response_cctp( // // However, we will still process results in case Token Router implementation renders any of // these assumptions invalid. - let finalized_msg = LiquidityLayerMessage::try_from(finalized_vaa.try_payload().unwrap()) + let finalized_msg = LiquidityLayerMessage::try_from(finalized_vaa.payload()) .map_err(|_| error!(MatchingEngineError::InvalidVaa))?; let deposit = finalized_msg .deposit() @@ -229,7 +229,7 @@ pub fn prepare_order_response_cctp( .prepared_order_response .set_inner(PreparedOrderResponse { bump: ctx.bumps.prepared_order_response, - fast_vaa_hash: fast_vaa.try_digest().unwrap().0, + fast_vaa_hash: fast_vaa.digest().0, prepared_by: ctx.accounts.payer.key(), source_chain, base_fee: slow_order_response.base_fee(), diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs index 7b385969..87b4fa0b 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/cctp.rs @@ -60,7 +60,7 @@ pub struct SettleAuctionActiveCctp<'info> { seeds = [ PreparedOrderResponse::SEED_PREFIX, payer.key().as_ref(), - core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + wormhole_cctp_solana::wormhole::VaaAccount::load(&fast_vaa)?.digest().as_ref() ], bump = prepared_order_response.bump, )] diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs index b0898787..6488493a 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -8,7 +8,8 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - wormhole_cctp_solana::wormhole::core_bridge_program, wormhole_io::TypePrefixedPayload, + wormhole_cctp_solana::wormhole::{core_bridge_program, VaaAccount, SOLANA_CHAIN}, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_active_local]. @@ -54,7 +55,7 @@ pub struct SettleAuctionActiveLocal<'info> { seeds = [ PreparedOrderResponse::SEED_PREFIX, payer.key().as_ref(), - core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + VaaAccount::load(&fast_vaa)?.digest().as_ref() ], bump = prepared_order_response.bump, )] @@ -81,7 +82,7 @@ pub struct SettleAuctionActiveLocal<'info> { #[account( seeds = [ RouterEndpoint::SEED_PREFIX, - core_bridge_program::SOLANA_CHAIN.to_be_bytes().as_ref(), + SOLANA_CHAIN.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, )] diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs index 65c3206a..6ae45c28 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/mod.rs @@ -17,7 +17,7 @@ use common::{ raw::{LiquidityLayerMessage, MessageToVec}, Fill, }, - wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, + wormhole_cctp_solana::wormhole::VaaAccount, }; struct SettleActiveAndPrepareFill<'ctx, 'info> { @@ -55,8 +55,8 @@ fn settle_active_and_prepare_fill( token_program, } = accounts; - let fast_vaa = VaaAccount::load(fast_vaa).unwrap(); - let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) + let fast_vaa = VaaAccount::load_unchecked(fast_vaa); + let order = LiquidityLayerMessage::try_from(fast_vaa.payload()) .unwrap() .to_fast_market_order_unchecked(); diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs index 5f902382..f17969f2 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/cctp.rs @@ -10,7 +10,7 @@ use common::{ wormhole_cctp_solana::{ self, cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, + wormhole::{core_bridge_program, VaaAccount, SOLANA_CHAIN}, }, wormhole_io::TypePrefixedPayload, }; @@ -61,7 +61,7 @@ pub struct SettleAuctionNoneCctp<'info> { seeds = [ PreparedOrderResponse::SEED_PREFIX, payer.key().as_ref(), - core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + VaaAccount::load(&fast_vaa)?.digest().as_ref() ], bump = prepared_order_response.bump, )] @@ -108,9 +108,6 @@ pub struct SettleAuctionNoneCctp<'info> { from_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = from_router_endpoint.bump, - constraint = { - to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN - } @ MatchingEngineError::InvalidChain )] from_router_endpoint: Box>, @@ -121,6 +118,9 @@ pub struct SettleAuctionNoneCctp<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = { + to_router_endpoint.chain != SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain )] to_router_endpoint: Box>, @@ -130,7 +130,7 @@ pub struct SettleAuctionNoneCctp<'info> { /// Token Messenger Minter program's local token account. #[account( mut, - address = common::constants::usdc::id(), + address = common::constants::USDC_MINT, )] mint: AccountInfo<'info>, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs index 0e15c2a6..6ad3cc2f 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -5,7 +5,8 @@ use crate::{ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - wormhole_cctp_solana::wormhole::core_bridge_program, wormhole_io::TypePrefixedPayload, + wormhole_cctp_solana::wormhole::{core_bridge_program, VaaAccount, SOLANA_CHAIN}, + wormhole_io::TypePrefixedPayload, }; /// Accounts required for [settle_auction_none_local]. @@ -50,7 +51,7 @@ pub struct SettleAuctionNoneLocal<'info> { seeds = [ PreparedOrderResponse::SEED_PREFIX, payer.key().as_ref(), - core_bridge_program::VaaAccount::load(&fast_vaa)?.try_digest()?.as_ref() + VaaAccount::load(&fast_vaa)?.digest().as_ref() ], bump = prepared_order_response.bump, )] @@ -97,9 +98,6 @@ pub struct SettleAuctionNoneLocal<'info> { from_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = from_router_endpoint.bump, - constraint = { - to_router_endpoint.chain != core_bridge_program::SOLANA_CHAIN - } @ MatchingEngineError::InvalidChain )] from_router_endpoint: Box>, @@ -107,7 +105,7 @@ pub struct SettleAuctionNoneLocal<'info> { #[account( seeds = [ RouterEndpoint::SEED_PREFIX, - core_bridge_program::SOLANA_CHAIN.to_be_bytes().as_ref(), + SOLANA_CHAIN.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, )] diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs index cbdfda27..37216fbb 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/mod.rs @@ -14,7 +14,7 @@ use common::{ raw::{LiquidityLayerMessage, MessageToVec}, Fill, }, - wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount, + wormhole_cctp_solana::wormhole::VaaAccount, }; struct SettleNoneAndPrepareFill<'ctx, 'info> { @@ -53,8 +53,8 @@ fn settle_none_and_prepare_fill( token_program, } = accounts; - let fast_vaa = VaaAccount::load(fast_vaa).unwrap(); - let order = LiquidityLayerMessage::try_from(fast_vaa.try_payload().unwrap()) + let fast_vaa = VaaAccount::load_unchecked(fast_vaa); + let order = LiquidityLayerMessage::try_from(fast_vaa.payload()) .unwrap() .to_fast_market_order_unchecked(); @@ -89,7 +89,7 @@ fn settle_none_and_prepare_fill( // setting this could lead to trapped funds (which would require an upgrade to fix). auction.set_inner(Auction { bump: auction_bump_seed, - vaa_hash: fast_vaa.try_digest().unwrap().0, + vaa_hash: fast_vaa.digest().0, status: AuctionStatus::Settled { base_fee, penalty: None, diff --git a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs index ad33b342..4b67cd03 100644 --- a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -1,7 +1,8 @@ use anchor_lang::prelude::*; use anchor_spl::token; use common::{ - messages::raw::LiquidityLayerMessage, wormhole_cctp_solana::wormhole::core_bridge_program, + messages::raw::LiquidityLayerMessage, + wormhole_cctp_solana::wormhole::{core_bridge_program, VaaAccount, SOLANA_CHAIN}, }; use crate::{ @@ -35,7 +36,7 @@ pub struct CompleteFastFill<'info> { space = 8 + RedeemedFastFill::INIT_SPACE, seeds = [ RedeemedFastFill::SEED_PREFIX, - core_bridge_program::VaaAccount::load(&vaa)?.try_digest()?.as_ref() + VaaAccount::load(&vaa)?.digest().as_ref() ], bump )] @@ -54,7 +55,7 @@ pub struct CompleteFastFill<'info> { #[account( seeds = [ RouterEndpoint::SEED_PREFIX, - &core_bridge_program::SOLANA_CHAIN.to_be_bytes() + SOLANA_CHAIN.to_be_bytes().as_ref() ], bump = router_endpoint.bump, )] @@ -77,14 +78,14 @@ pub struct CompleteFastFill<'info> { /// TODO: docstring pub fn complete_fast_fill(ctx: Context) -> Result<()> { - let vaa = core_bridge_program::VaaAccount::load(&ctx.accounts.vaa).unwrap(); + let vaa = VaaAccount::load_unchecked(&ctx.accounts.vaa); // Emitter must be the matching engine (this program). { - let emitter = vaa.try_emitter_info()?; + let emitter = vaa.emitter_info(); require_eq!( emitter.chain, - core_bridge_program::SOLANA_CHAIN, + SOLANA_CHAIN, MatchingEngineError::InvalidEmitterForFastFill ); require_keys_eq!( @@ -96,13 +97,13 @@ pub fn complete_fast_fill(ctx: Context) -> Result<()> { // Fill redeemed fast fill data. ctx.accounts.redeemed_fast_fill.set_inner(RedeemedFastFill { bump: ctx.bumps.redeemed_fast_fill, - vaa_hash: vaa.try_digest().unwrap().0, + vaa_hash: vaa.digest().0, sequence: emitter.sequence, }); } // Check whether this message is a deposit message we recognize. - let msg = LiquidityLayerMessage::try_from(vaa.try_payload()?) + let msg = LiquidityLayerMessage::try_from(vaa.payload()) .map_err(|_| error!(MatchingEngineError::InvalidVaa))?; // Is this a fast fill? diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 27286f8f..8fee597c 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -5,7 +5,7 @@ use crate::{ state::{Auction, AuctionConfig, AuctionStatus, RouterEndpoint}, }; use anchor_lang::prelude::*; -use common::wormhole_cctp_solana::wormhole::core_bridge_program::VaaAccount; +use common::wormhole_cctp_solana::wormhole::VaaAccount; pub fn require_valid_router_path( vaa: &VaaAccount<'_>, @@ -13,7 +13,7 @@ pub fn require_valid_router_path( target_endpoint: &RouterEndpoint, expected_target_chain: u16, ) -> Result<()> { - let emitter = vaa.try_emitter_info()?; + let emitter = vaa.emitter_info(); require_eq!( source_endpoint.chain, emitter.chain, diff --git a/solana/programs/token-router/src/cctp_mint_recipient.rs b/solana/programs/token-router/src/cctp_mint_recipient.rs index 7fafc17d..c1ba86c5 100644 --- a/solana/programs/token-router/src/cctp_mint_recipient.rs +++ b/solana/programs/token-router/src/cctp_mint_recipient.rs @@ -21,7 +21,7 @@ mod test { super::id(), anchor_spl::associated_token::get_associated_token_address( &custodian, - &common::constants::usdc::id() + &common::constants::USDC_MINT ), "cctp mint recipient mismatch" ); diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index 3d273f66..a53899d9 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -40,7 +40,7 @@ pub struct Initialize<'info> { )] cctp_mint_recipient: Account<'info, token::TokenAccount>, - #[account(address = common::constants::usdc::id() @ TokenRouterError::NotUsdc)] + #[account(address = common::constants::USDC_MINT @ TokenRouterError::NotUsdc)] mint: Account<'info, token::Mint>, /// We use the program data to make sure this owner is the upgrade authority (the true owner, diff --git a/solana/programs/token-router/src/processor/market_order/place_cctp.rs b/solana/programs/token-router/src/processor/market_order/place_cctp.rs index 4db0df71..7f5b4c2a 100644 --- a/solana/programs/token-router/src/processor/market_order/place_cctp.rs +++ b/solana/programs/token-router/src/processor/market_order/place_cctp.rs @@ -8,7 +8,7 @@ use common::{ wormhole_cctp_solana::{ self, cctp::{message_transmitter_program, token_messenger_minter_program}, - wormhole::core_bridge_program, + wormhole::{core_bridge_program, SOLANA_CHAIN}, }, wormhole_io::TypePrefixedPayload, }; @@ -274,7 +274,7 @@ fn handle_place_market_order_cctp( mint_recipient: ctx.accounts.router_endpoint.mint_recipient, wormhole_message_nonce: common::constants::WORMHOLE_MESSAGE_NONCE, payload: common::messages::Fill { - source_chain: wormhole_cctp_solana::wormhole::core_bridge_program::SOLANA_CHAIN, + source_chain: SOLANA_CHAIN, order_sender: ctx.accounts.order_sender.key().to_bytes(), redeemer: ctx.accounts.prepared_order.redeemer, redeemer_message: redeemer_message.into(), diff --git a/solana/programs/token-router/src/processor/market_order/prepare.rs b/solana/programs/token-router/src/processor/market_order/prepare.rs index 82e94d72..a381fff6 100644 --- a/solana/programs/token-router/src/processor/market_order/prepare.rs +++ b/solana/programs/token-router/src/processor/market_order/prepare.rs @@ -65,7 +65,7 @@ pub struct PrepareMarketOrder<'info> { prepared_custody_token: Account<'info, token::TokenAccount>, /// CHECK: This mint must be USDC. - #[account(address = common::constants::usdc::id())] + #[account(address = common::constants::USDC_MINT)] mint: AccountInfo<'info>, token_program: Program<'info, token::Token>, diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index 611533ad..d4b6ed92 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -11,7 +11,7 @@ use common::{ cctp::{message_transmitter_program, token_messenger_minter_program}, cpi::ReceiveMessageArgs, utils::WormholeCctpPayload, - wormhole::core_bridge_program::VaaAccount, + wormhole::VaaAccount, }, }; @@ -40,7 +40,7 @@ pub struct RedeemCctpFill<'info> { space = compute_prepared_fill_size(&vaa)?, seeds = [ PreparedFill::SEED_PREFIX, - VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + VaaAccount::load(&vaa)?.digest().as_ref(), ], bump, )] @@ -74,7 +74,7 @@ pub struct RedeemCctpFill<'info> { prepared_custody_token: Box>, /// CHECK: This mint must be USDC. - #[account(address = common::constants::usdc::id())] + #[account(address = common::constants::USDC_MINT)] mint: AccountInfo<'info>, /// Registered emitter account representing a Circle Integration on another network. @@ -216,7 +216,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) // Validate that this message originated from a registered emitter. let endpoint = &ctx.accounts.router_endpoint; - let emitter = vaa.try_emitter_info().unwrap(); + let emitter = vaa.emitter_info(); require_eq!( emitter.chain, endpoint.chain, @@ -228,7 +228,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) ); // Wormhole CCTP deposit should be ours, so make sure this is a fill we recognize. - let deposit = WormholeCctpPayload::try_from(vaa.try_payload().unwrap()) + let deposit = WormholeCctpPayload::try_from(vaa.payload()) .unwrap() .message() .to_deposit_unchecked(); @@ -263,7 +263,7 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { - vaa_hash: vaa.try_digest().unwrap().0, + vaa_hash: vaa.digest().0, bump: ctx.bumps.prepared_fill, prepared_custody_token_bump: ctx.bumps.prepared_custody_token, redeemer: Pubkey::from(fill.redeemer()), @@ -294,8 +294,8 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) fn compute_prepared_fill_size(vaa_acc_info: &AccountInfo<'_>) -> Result { let vaa = VaaAccount::load(vaa_acc_info)?; - let msg = LiquidityLayerMessage::try_from(vaa.try_payload()?) - .map_err(|_| TokenRouterError::InvalidVaa)?; + let msg = + LiquidityLayerMessage::try_from(vaa.payload()).map_err(|_| TokenRouterError::InvalidVaa)?; let deposit = msg.deposit().ok_or(TokenRouterError::InvalidPayloadId)?; let msg = LiquidityLayerDepositMessage::try_from(deposit.payload()) diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 7e9129f9..6715dc26 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -6,7 +6,7 @@ use anchor_lang::{prelude::*, system_program}; use anchor_spl::token; use common::{ messages::raw::{LiquidityLayerMessage, MessageToVec}, - wormhole_cctp_solana::wormhole::core_bridge_program::{self, VaaAccount}, + wormhole_cctp_solana::wormhole::{core_bridge_program, VaaAccount}, }; /// Accounts required for [redeem_fast_fill]. @@ -35,7 +35,7 @@ pub struct RedeemFastFill<'info> { space = compute_prepared_fill_size(&vaa)?, seeds = [ PreparedFill::SEED_PREFIX, - VaaAccount::load(&vaa)?.try_digest()?.as_ref(), + VaaAccount::load(&vaa)?.digest().as_ref(), ], bump, )] @@ -60,7 +60,7 @@ pub struct RedeemFastFill<'info> { prepared_custody_token: Account<'info, token::TokenAccount>, /// CHECK: This mint must be USDC. - #[account(address = common::constants::usdc::id())] + #[account(address = common::constants::USDC_MINT)] mint: AccountInfo<'info>, /// CHECK: Seeds must be \["emitter"] (Matching Engine program). @@ -121,8 +121,8 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { &[Custodian::SIGNER_SEEDS], ))?; - let vaa = VaaAccount::load(&ctx.accounts.vaa).unwrap(); - let fast_fill = LiquidityLayerMessage::try_from(vaa.try_payload().unwrap()) + let vaa = VaaAccount::load_unchecked(&ctx.accounts.vaa); + let fast_fill = LiquidityLayerMessage::try_from(vaa.payload()) .unwrap() .to_fast_fill_unchecked(); @@ -150,7 +150,7 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { - vaa_hash: vaa.try_digest().unwrap().0, + vaa_hash: vaa.digest().0, bump: ctx.bumps.prepared_fill, prepared_custody_token_bump: ctx.bumps.prepared_custody_token, redeemer: Pubkey::from(fill.redeemer()), @@ -167,8 +167,8 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { fn compute_prepared_fill_size(vaa_acc_info: &AccountInfo<'_>) -> Result { let vaa = VaaAccount::load(vaa_acc_info)?; - let msg = LiquidityLayerMessage::try_from(vaa.try_payload().unwrap()) - .map_err(|_| TokenRouterError::InvalidVaa)?; + let msg = + LiquidityLayerMessage::try_from(vaa.payload()).map_err(|_| TokenRouterError::InvalidVaa)?; let fast_fill = msg.fast_fill().ok_or(TokenRouterError::InvalidPayloadId)?; Ok(fast_fill diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 02f2b034..8012c636 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1792,7 +1792,15 @@ describe("Matching Engine", function () { fastVaa, }); - const txDetails = await expectIxOkDetails(connection, [ix], [liquidator]); + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, + }); + + const txDetails = await expectIxOkDetails( + connection, + [computeIx, ix], + [liquidator], + ); await checkAfterEffects( txDetails!, From 41197017044212e8804a5242a7eff16924d50bd1 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 12 Feb 2024 10:06:14 -0600 Subject: [PATCH 116/126] solana: add min offer delta parameter to auction config --- solana/programs/matching-engine/src/error.rs | 6 + .../src/processor/auction/offer/improve.rs | 10 ++ .../src/state/auction_config.rs | 5 +- .../matching-engine/src/utils/auction.rs | 76 +++++++-- .../ts/scripts/setUpTestnetMatchingEngine.ts | 23 +-- solana/ts/src/matchingEngine/index.ts | 5 + .../src/matchingEngine/state/AuctionConfig.ts | 3 +- solana/ts/tests/01__matchingEngine.ts | 148 ++++++++++++++++-- 8 files changed, 239 insertions(+), 37 deletions(-) diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 35dbb20e..8b4fae5e 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -77,6 +77,9 @@ pub enum MatchingEngineError { #[msg("InitialPenaltyTooLarge")] InitialPenaltyTooLarge, + #[msg("MinOfferDeltaTooLarge")] + MinOfferDeltaTooLarge, + #[msg("InvalidVaa")] InvalidVaa, @@ -148,4 +151,7 @@ pub enum MatchingEngineError { #[msg("InvalidCctpEndpoint")] InvalidCctpEndpoint, + + #[msg("CarpingNotAllowed")] + CarpingNotAllowed, } diff --git a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs index 68f05ebe..39c4f1c4 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs @@ -69,6 +69,16 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { MatchingEngineError::OfferPriceNotImproved ); + // This check is safe because we already checked that `fee_offer` is less than `offer_price`. + { + let min_offer_delta = + utils::auction::compute_min_offer_delta(&ctx.accounts.auction_config, auction_info); + require!( + auction_info.offer_price - fee_offer >= min_offer_delta, + MatchingEngineError::CarpingNotAllowed + ); + } + // Transfer funds from the `best_offer` token account to the `offer_token` token account, // but only if the pubkeys are different. let offer_token = ctx.accounts.offer_token.key(); diff --git a/solana/programs/matching-engine/src/state/auction_config.rs b/solana/programs/matching-engine/src/state/auction_config.rs index a48fb05d..2c1291c2 100644 --- a/solana/programs/matching-engine/src/state/auction_config.rs +++ b/solana/programs/matching-engine/src/state/auction_config.rs @@ -18,8 +18,11 @@ pub struct AuctionParameters { */ pub grace_period: u16, - // The `securityDeposit` decays over the `penaltyslots` slots period. + // The `securityDeposit` decays over the `penalty_slots` slots period. pub penalty_period: u16, + + // The minimum offer increment in percentage terms. + pub min_offer_delta_bps: u32, } #[account] diff --git a/solana/programs/matching-engine/src/utils/auction.rs b/solana/programs/matching-engine/src/utils/auction.rs index 4d77c9ab..e1cbba22 100644 --- a/solana/programs/matching-engine/src/utils/auction.rs +++ b/solana/programs/matching-engine/src/utils/auction.rs @@ -40,6 +40,11 @@ pub fn compute_deposit_penalty( } } +#[inline] +pub fn compute_min_offer_delta(params: &AuctionParameters, info: &AuctionInfo) -> u64 { + mul_bps_unsafe(info.offer_price, params.min_offer_delta_bps) +} + pub fn require_valid_parameters(params: &AuctionParameters) -> Result<()> { require!( params.duration > 0, @@ -57,6 +62,10 @@ pub fn require_valid_parameters(params: &AuctionParameters) -> Result<()> { params.initial_penalty_bps <= FEE_PRECISION_MAX, MatchingEngineError::InitialPenaltyTooLarge ); + require!( + params.min_offer_delta_bps <= FEE_PRECISION_MAX, + MatchingEngineError::MinOfferDeltaTooLarge + ); Ok(()) } @@ -88,7 +97,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period - 1; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -105,7 +114,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + params.penalty_period; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -122,7 +131,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + 1; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -139,7 +148,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -156,7 +165,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + params.penalty_period - 1; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -176,7 +185,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -197,7 +206,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -218,7 +227,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + 5; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -239,7 +248,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + params.penalty_period / 2; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -261,7 +270,7 @@ mod test { let amount = 10000000; let slots_elapsed = params.duration + params.grace_period + 10; - let (info, current_slot) = set_up(amount, Some(slots_elapsed.into())); + let (info, current_slot) = set_up(amount, Some(slots_elapsed.into()), 0); let DepositPenalty { penalty, @@ -272,7 +281,49 @@ mod test { assert_eq!(user_reward, 5000000); } - fn set_up(security_deposit: u64, slots_elapsed: Option) -> (AuctionInfo, u64) { + #[test] + fn compute_min_offer_delta_max() { + let mut params = params_for_test(); + params.min_offer_delta_bps = common::constants::FEE_PRECISION_MAX; + + let offer_price = 10000000; + let (info, _) = set_up(0, None, offer_price); + + let min_offer_delta = compute_min_offer_delta(¶ms, &info); + + assert_eq!(min_offer_delta, offer_price); + } + + #[test] + fn compute_min_offer_delta_zero() { + let mut params = params_for_test(); + params.min_offer_delta_bps = 0; + + let offer_price = 10000000; + let (info, _) = set_up(0, None, offer_price); + + let min_offer_delta = compute_min_offer_delta(¶ms, &info); + + assert_eq!(min_offer_delta, 0); + } + + #[test] + fn compute_min_offer_delta_five_percent() { + let params = params_for_test(); + + let offer_price = 10000000; + let (info, _) = set_up(0, None, offer_price); + + let min_offer_delta = compute_min_offer_delta(¶ms, &info); + + assert_eq!(min_offer_delta, 500000); + } + + fn set_up( + security_deposit: u64, + slots_elapsed: Option, + offer_price: u64, + ) -> (AuctionInfo, u64) { const START: u64 = 69; ( AuctionInfo { @@ -283,7 +334,7 @@ mod test { best_offer_token: Default::default(), initial_offer_token: Default::default(), amount_in: Default::default(), - offer_price: Default::default(), + offer_price, amount_out: Default::default(), }, START + slots_elapsed.unwrap_or_default(), @@ -297,6 +348,7 @@ mod test { duration: 2, grace_period: 4, penalty_period: 20, + min_offer_delta_bps: 50000, // 5% }; require_valid_parameters(¶ms).unwrap(); diff --git a/solana/ts/scripts/setUpTestnetMatchingEngine.ts b/solana/ts/scripts/setUpTestnetMatchingEngine.ts index 64c1da90..9cd5a8a8 100644 --- a/solana/ts/scripts/setUpTestnetMatchingEngine.ts +++ b/solana/ts/scripts/setUpTestnetMatchingEngine.ts @@ -19,6 +19,7 @@ const AUCTION_PARAMS: AuctionParameters = { duration: 5, // slots gracePeriod: 10, // slots penaltyPeriod: 20, // slots + minOfferDelta: 50000, // 5% }; // Here we go. @@ -53,7 +54,7 @@ async function main() { foreignChain, cctpDomain, foreignEmitter, - null + null, ); } { @@ -68,7 +69,7 @@ async function main() { foreignChain, cctpDomain, foreignEmitter, - null + null, ); } { @@ -83,7 +84,7 @@ async function main() { foreignChain, cctpDomain, foreignEmitter, - null + null, ); } { @@ -98,7 +99,7 @@ async function main() { foreignChain, cctpDomain, foreignEmitter, - null + null, ); } { @@ -113,7 +114,7 @@ async function main() { foreignChain, cctpDomain, foreignEmitter, - null + null, ); } { @@ -128,7 +129,7 @@ async function main() { foreignChain, cctpDomain, foreignEmitter, - null + null, ); } } @@ -151,7 +152,7 @@ async function intialize(matchingEngine: MatchingEngineProgram, payer: Keypair) ownerAssistant: payer.publicKey, feeRecipient: payer.publicKey, }, - AUCTION_PARAMS + AUCTION_PARAMS, ); await splToken.getOrCreateAssociatedTokenAccount(connection, payer, USDC_MINT, payer.publicKey); @@ -172,7 +173,7 @@ async function addCctpRouterEndpoint( foreignChain: ChainName, cctpDomain: number, foreignEmitter: string, - foreignMintRecipient: string | null + foreignMintRecipient: string | null, ) { await matchingEngine.fetchCustodian().catch((_) => { throw new Error("no custodian found"); @@ -204,7 +205,7 @@ async function addCctpRouterEndpoint( "domain", cctpDomain, "mintRecipient", - foreignMintRecipient + foreignMintRecipient, ); return; } @@ -219,7 +220,7 @@ async function addCctpRouterEndpoint( address: endpointAddress, mintRecipient: endpointMintRecipient, cctpDomain, - } + }, ); const txSig = await sendAndConfirmTransaction(connection, new Transaction().add(ix), [payer]); console.log( @@ -232,6 +233,6 @@ async function addCctpRouterEndpoint( "domain", cctpDomain, "mintRecipient", - foreignMintRecipient + foreignMintRecipient, ); } diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 8ed786e6..6de27f1a 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -1391,6 +1391,11 @@ export class MatchingEngineProgram { return { penalty: penalty - userReward, userReward }; } } + + async computeMinOfferDelta(offerPrice: bigint): Promise { + const auctionParams = await this.fetchAuctionParameters(); + return (offerPrice * BigInt(auctionParams.minOfferDeltaBps)) / FEE_PRECISION_MAX; + } } export function testnet(): ProgramId { diff --git a/solana/ts/src/matchingEngine/state/AuctionConfig.ts b/solana/ts/src/matchingEngine/state/AuctionConfig.ts index 60c3de69..d0239ef4 100644 --- a/solana/ts/src/matchingEngine/state/AuctionConfig.ts +++ b/solana/ts/src/matchingEngine/state/AuctionConfig.ts @@ -6,6 +6,7 @@ export type AuctionParameters = { duration: number; gracePeriod: number; penaltyPeriod: number; + minOfferDeltaBps: number; }; export class AuctionConfig { @@ -22,7 +23,7 @@ export class AuctionConfig { encodedId.writeUInt32BE(id); return PublicKey.findProgramAddressSync( [Buffer.from("auction-config"), encodedId], - programId + programId, )[0]; } } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 8012c636..62a5cce3 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -88,11 +88,12 @@ describe("Matching Engine", function () { describe("Admin", function () { describe("Initialize", function () { const auctionParams: AuctionParameters = { - userPenaltyRewardBps: 250000, - initialPenaltyBps: 250000, + userPenaltyRewardBps: 250000, // 25% + initialPenaltyBps: 250000, // 25% duration: 2, gracePeriod: 5, penaltyPeriod: 10, + minOfferDeltaBps: 20000, // 2% }; const localVariables = new Map(); @@ -211,6 +212,21 @@ describe("Matching Engine", function () { await expectIxErr(connection, [ix], [payer], "Error Code: InitialPenaltyTooLarge"); }); + it("Cannot Initialize with Invalid Min Offer Delta", async function () { + const { minOfferDeltaBps: _, ...remaining } = auctionParams; + + const ix = await engine.initializeIx( + { + owner: payer.publicKey, + ownerAssistant: ownerAssistant.publicKey, + feeRecipient, + mint: USDC_MINT_ADDRESS, + }, + { minOfferDeltaBps: 4294967295, ...remaining }, + ); + await expectIxErr(connection, [ix], [payer], "Error Code: MinOfferDeltaTooLarge"); + }); + it("Finally Initialize Program", async function () { const ix = await engine.initializeIx( { @@ -1265,7 +1281,7 @@ describe("Matching Engine", function () { }); describe("Improve Offer", function () { - for (const newOffer of [0n, baseFastOrder.maxFee / 2n, baseFastOrder.maxFee - 1n]) { + for (const newOffer of [0n, baseFastOrder.maxFee / 2n]) { it(`Improve Offer (Price == ${newOffer})`, async function () { const { auction, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, @@ -1308,6 +1324,51 @@ describe("Matching Engine", function () { }); } + it("Improve Offer By Min Offer Delta", async function () { + const { auction, auctionDataBefore } = await placeInitialOfferForTest( + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + ); + + const currentOffer = BigInt(auctionDataBefore.info!.offerPrice.toString()); + const newOffer = + currentOffer - (await engine.computeMinOfferDelta(currentOffer)) - 100n; + + const initialOfferBalanceBefore = await getUsdcAtaBalance( + connection, + offerAuthorityOne.publicKey, + ); + const newOfferBalanceBefore = await getUsdcAtaBalance( + connection, + offerAuthorityTwo.publicKey, + ); + const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); + + const [approveIx, ix] = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthorityTwo.publicKey, + }, + newOffer, + ); + + await expectIxOk(connection, [approveIx, ix], [offerAuthorityTwo]); + + await checkAfterEffects( + auction, + offerAuthorityTwo.publicKey, + newOffer, + auctionDataBefore, + { + custodyToken: custodyBalanceBefore, + bestOfferToken: newOfferBalanceBefore, + prevBestOfferToken: initialOfferBalanceBefore, + }, + ); + }); + it("Improve Offer With Same Best Offer Token Account", async function () { const { auction, auctionDataBefore } = await placeInitialOfferForTest( offerAuthorityOne, @@ -1323,7 +1384,8 @@ describe("Matching Engine", function () { const { amount: custodyBalanceBefore } = await engine.fetchCctpMintRecipient(); // New Offer from offerAuthorityOne. - const newOffer = BigInt(auctionDataBefore.info!.offerPrice.subn(100).toString()); + const currentOffer = BigInt(auctionDataBefore.info!.offerPrice.toString()); + const newOffer = currentOffer - (await engine.computeMinOfferDelta(currentOffer)); const [approveIx, ix] = await engine.improveOfferIx( { @@ -1433,6 +1495,32 @@ describe("Matching Engine", function () { ); }); + it("Cannot Improve Offer (Carping Not Allowed)", async function () { + const { auction, auctionDataBefore } = await placeInitialOfferForTest( + offerAuthorityOne, + wormholeSequence++, + baseFastOrder, + ethRouter, + ); + + // Attempt to improve by the minimum allowed. + const newOffer = BigInt(auctionDataBefore.info!.offerPrice.toString()) - 1n; + const [approveIx, ix] = await engine.improveOfferIx( + { + auction, + offerAuthority: offerAuthorityTwo.publicKey, + }, + newOffer, + ); + + await expectIxErr( + connection, + [approveIx, ix], + [offerAuthorityTwo], + "Error Code: CarpingNotAllowed", + ); + }); + async function checkAfterEffects( auction: PublicKey, newOfferAuthority: PublicKey, @@ -1527,17 +1615,26 @@ describe("Matching Engine", function () { it("Execute Fast Order Within Grace Period", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. - const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( + const { + fastVaa, + auction, + auctionDataBefore: initialData, + } = await placeInitialOfferForTest( offerAuthorityTwo, wormholeSequence++, baseFastOrder, ethRouter, ); + const improveBy = Number( + await engine.computeMinOfferDelta( + BigInt(initialData.info!.offerPrice.toString()), + ), + ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100, + improveBy, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; @@ -1606,17 +1703,26 @@ describe("Matching Engine", function () { it("Execute Fast Order After Grace Period", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. - const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( + const { + fastVaa, + auction, + auctionDataBefore: initialData, + } = await placeInitialOfferForTest( offerAuthorityTwo, wormholeSequence++, baseFastOrder, ethRouter, ); + const improveBy = Number( + await engine.computeMinOfferDelta( + BigInt(initialData.info!.offerPrice.toString()), + ), + ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100, + improveBy, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; @@ -1666,17 +1772,26 @@ describe("Matching Engine", function () { it("Execute Fast Order After Grace Period with Liquidator", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. - const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( + const { + fastVaa, + auction, + auctionDataBefore: initialData, + } = await placeInitialOfferForTest( offerAuthorityTwo, wormholeSequence++, baseFastOrder, ethRouter, ); + const improveBy = Number( + await engine.computeMinOfferDelta( + BigInt(initialData.info!.offerPrice.toString()), + ), + ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100, + improveBy, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; @@ -1744,17 +1859,26 @@ describe("Matching Engine", function () { it("Execute Fast Order After Penalty Period with Liquidator", async function () { // Start the auction with offer two so that we can // check that the initial offer is refunded. - const { fastVaa, fastVaaAccount, auction } = await placeInitialOfferForTest( + const { + fastVaa, + auction, + auctionDataBefore: initialData, + } = await placeInitialOfferForTest( offerAuthorityTwo, wormholeSequence++, baseFastOrder, ethRouter, ); + const improveBy = Number( + await engine.computeMinOfferDelta( + BigInt(initialData.info!.offerPrice.toString()), + ), + ); const { auctionDataBefore } = await improveOfferForTest( auction, offerAuthorityOne, - 100, + improveBy, ); const { bestOfferToken, initialOfferToken } = auctionDataBefore.info!; From 55251b135133e681ec5015c8c5a0e63f2b9cbd58 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 12 Feb 2024 13:39:33 -0600 Subject: [PATCH 117/126] solana: add vaa_sequence to auction info --- .../src/processor/auction/offer/place_initial.rs | 1 + solana/programs/matching-engine/src/state/auction.rs | 3 +++ solana/programs/matching-engine/src/utils/auction.rs | 1 + solana/ts/src/matchingEngine/state/Auction.ts | 1 + solana/ts/tests/01__matchingEngine.ts | 3 +++ 5 files changed, 9 insertions(+) diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index e555d440..0a60e33f 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -154,6 +154,7 @@ pub fn place_initial_offer(ctx: Context, fee_offer: u64) -> R status: AuctionStatus::Active, info: Some(AuctionInfo { config_id: ctx.accounts.auction_config.id, + vaa_sequence: fast_vaa.sequence(), source_chain, best_offer_token: initial_offer_token, initial_offer_token, diff --git a/solana/programs/matching-engine/src/state/auction.rs b/solana/programs/matching-engine/src/state/auction.rs index 56789cd8..07d97def 100644 --- a/solana/programs/matching-engine/src/state/auction.rs +++ b/solana/programs/matching-engine/src/state/auction.rs @@ -30,6 +30,9 @@ impl std::fmt::Display for AuctionStatus { pub struct AuctionInfo { pub config_id: u32, + /// Sequence of the fast market order VAA. + pub vaa_sequence: u64, + /// The chain where the transfer is initiated. pub source_chain: u16, diff --git a/solana/programs/matching-engine/src/utils/auction.rs b/solana/programs/matching-engine/src/utils/auction.rs index e1cbba22..247404d2 100644 --- a/solana/programs/matching-engine/src/utils/auction.rs +++ b/solana/programs/matching-engine/src/utils/auction.rs @@ -328,6 +328,7 @@ mod test { ( AuctionInfo { security_deposit, + vaa_sequence: Default::default(), start_slot: START, config_id: Default::default(), source_chain: Default::default(), diff --git a/solana/ts/src/matchingEngine/state/Auction.ts b/solana/ts/src/matchingEngine/state/Auction.ts index 91c7bf3f..36818907 100644 --- a/solana/ts/src/matchingEngine/state/Auction.ts +++ b/solana/ts/src/matchingEngine/state/Auction.ts @@ -14,6 +14,7 @@ export type AuctionStatus = { export type AuctionInfo = { configId: number; + vaaSequence: BN; sourceChain: number; bestOfferToken: PublicKey; initialOfferToken: PublicKey; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 62a5cce3..e80de75d 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1223,6 +1223,7 @@ describe("Matching Engine", function () { { active: {} }, { configId: 0, + vaaSequence: bigintToU64BN(vaaAccount.emitterInfo().sequence), sourceChain: ethChain, bestOfferToken: offerToken, initialOfferToken: offerToken, @@ -1546,6 +1547,7 @@ describe("Matching Engine", function () { const { bump, vaaHash, status, info } = auctionDataBefore; const { configId, + vaaSequence, bestOfferToken: prevBestOfferToken, initialOfferToken, startSlot, @@ -1561,6 +1563,7 @@ describe("Matching Engine", function () { expect(auctionDataAfter).to.eql( new Auction(bump, vaaHash, status, { configId, + vaaSequence, sourceChain, bestOfferToken, initialOfferToken, From efb15236158c3d21471058a5a9cfc650166577e9 Mon Sep 17 00:00:00 2001 From: gator-boi Date: Mon, 12 Feb 2024 19:38:54 -0600 Subject: [PATCH 118/126] solana: add propose auction params tests --- solana/programs/matching-engine/src/error.rs | 6 + .../admin/update/auction_parameters.rs | 5 +- solana/ts/src/matchingEngine/index.ts | 37 +++ .../ts/src/matchingEngine/state/Proposal.ts | 51 +++++ solana/ts/src/matchingEngine/state/index.ts | 1 + solana/ts/tests/01__matchingEngine.ts | 211 +++++++++++++++++- 6 files changed, 299 insertions(+), 12 deletions(-) create mode 100644 solana/ts/src/matchingEngine/state/Proposal.ts diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 8b4fae5e..3c74d8aa 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -154,4 +154,10 @@ pub enum MatchingEngineError { #[msg("CarpingNotAllowed")] CarpingNotAllowed, + + #[msg("ProposalAlreadyEnacted")] + ProposalAlreadyEnacted, + + #[msg("InvalidProposalAction")] + InvalidProposalAction, } diff --git a/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs index 7e1f54b3..df30311d 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs @@ -28,8 +28,7 @@ pub struct UpdateAuctionParameters<'info> { constraint = { require!( proposal.slot_enacted_at.is_none(), - ErrorCode::InstructionMissing, - // TODO: add err + MatchingEngineError::ProposalAlreadyEnacted ); match &proposal.action { @@ -37,7 +36,7 @@ pub struct UpdateAuctionParameters<'info> { require_eq!( *id, custodian.auction_config_id + 1, - // TODO: add err + MatchingEngineError::AuctionConfigMismatch ); }, _ => return err!(ErrorCode::InstructionMissing), diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index 6de27f1a..f8f1a3ba 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -8,6 +8,7 @@ import { PublicKey, SYSVAR_CLOCK_PUBKEY, SYSVAR_RENT_PUBKEY, + SYSVAR_EPOCH_SCHEDULE_PUBKEY, SystemProgram, TransactionInstruction, } from "@solana/web3.js"; @@ -22,6 +23,7 @@ import { Custodian, PayerSequence, PreparedOrderResponse, + Proposal, RedeemedFastFill, RouterEndpoint, AuctionParameters, @@ -198,6 +200,20 @@ export class MatchingEngineProgram { .catch((_) => 0n); } + async proposalAddress(proposalId?: BN): Promise { + if (proposalId === undefined) { + const { nextProposalId } = await this.fetchCustodian(); + proposalId = nextProposalId; + } + + return Proposal.address(this.ID, proposalId); + } + + async fetchProposal(input?: { address: PublicKey }): Promise { + const addr = input === undefined ? await this.proposalAddress() : input.address; + return this.program.account.proposal.fetch(addr); + } + coreMessageAddress(payer: PublicKey, payerSequenceValue: BN | bigint): PublicKey { const encodedPayerSequenceValue = Buffer.alloc(8); encodedPayerSequenceValue.writeBigUInt64BE(BigInt(payerSequenceValue.toString())); @@ -411,6 +427,27 @@ export class MatchingEngineProgram { .instruction(); } + async proposeAuctionParametersIx( + accounts: { + ownerOrAssistant: PublicKey; + custodian?: PublicKey; + proposal?: PublicKey; + }, + parameters: AuctionParameters, + ): Promise { + const { ownerOrAssistant, custodian: inputCustodian, proposal: inputProposal } = accounts; + + return this.program.methods + .proposeAuctionParameters(parameters) + .accounts({ + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + proposal: inputProposal ?? (await this.proposalAddress()), + epochSchedule: SYSVAR_EPOCH_SCHEDULE_PUBKEY, + }) + .instruction(); + } + async addLocalRouterEndpointIx(accounts: { ownerOrAssistant: PublicKey; tokenRouterProgram: PublicKey; diff --git a/solana/ts/src/matchingEngine/state/Proposal.ts b/solana/ts/src/matchingEngine/state/Proposal.ts new file mode 100644 index 00000000..5710d767 --- /dev/null +++ b/solana/ts/src/matchingEngine/state/Proposal.ts @@ -0,0 +1,51 @@ +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; +import { AuctionParameters } from "./AuctionConfig"; + +export type ProposalAction = { + none?: {}; + updateAuctionParameters?: { + id: number; + parameters: AuctionParameters; + }; +}; + +export class Proposal { + id: BN; + bump: number; + action: ProposalAction; + by: PublicKey; + owner: PublicKey; + slotProposedAt: BN; + slotEnactBy: BN; + slotEnactedAt: BN | null; + constructor( + id: BN, + bump: number, + action: ProposalAction, + by: PublicKey, + owner: PublicKey, + slotProposedAt: BN, + slotEnactBy: BN, + slotEnactedAt: BN | null, + ) { + this.id = id; + this.bump = bump; + this.action = action; + this.by = by; + this.owner = owner; + this.slotProposedAt = slotProposedAt; + this.slotEnactBy = slotEnactBy; + this.slotEnactedAt = slotEnactedAt; + } + + static address(programId: PublicKey, nextProposalId: BN) { + const encodedProposalId = Buffer.alloc(8); + encodedProposalId.writeBigUInt64BE(BigInt(nextProposalId.toString())); + + return PublicKey.findProgramAddressSync( + [Buffer.from("proposal"), encodedProposalId], + programId, + )[0]; + } +} diff --git a/solana/ts/src/matchingEngine/state/index.ts b/solana/ts/src/matchingEngine/state/index.ts index 9c5044f9..071409c9 100644 --- a/solana/ts/src/matchingEngine/state/index.ts +++ b/solana/ts/src/matchingEngine/state/index.ts @@ -3,5 +3,6 @@ export * from "./AuctionConfig"; export * from "./Custodian"; export * from "./PayerSequence"; export * from "./PreparedOrderResponse"; +export * from "./Proposal"; export * from "./RedeemedFastFill"; export * from "./RouterEndpoint"; diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index e80de75d..d612c672 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1,5 +1,6 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import { getPostedMessage } from "@certusone/wormhole-sdk/lib/cjs/solana/wormhole"; +import { BN } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; import { AddressLookupTableProgram, @@ -27,6 +28,7 @@ import { AuctionParameters, Custodian, MatchingEngineProgram, + Proposal, RouterEndpoint, localnet, } from "../src/matchingEngine"; @@ -51,6 +53,8 @@ import { chaiUse(chaiAsPromised); +const SLOTS_PER_EPOCH = 32; + describe("Matching Engine", function () { const connection = new Connection(LOCALHOST, "confirmed"); @@ -85,17 +89,17 @@ describe("Matching Engine", function () { let lookupTableAddress: PublicKey; + const auctionParams: AuctionParameters = { + userPenaltyRewardBps: 250000, // 25% + initialPenaltyBps: 250000, // 25% + duration: 2, + gracePeriod: 5, + penaltyPeriod: 10, + minOfferDeltaBps: 20000, // 2% + }; + describe("Admin", function () { describe("Initialize", function () { - const auctionParams: AuctionParameters = { - userPenaltyRewardBps: 250000, // 25% - initialPenaltyBps: 250000, // 25% - duration: 2, - gracePeriod: 5, - penaltyPeriod: 10, - minOfferDeltaBps: 20000, // 2% - }; - const localVariables = new Map(); it("Cannot Initialize without USDC Mint", async function () { @@ -818,6 +822,195 @@ describe("Matching Engine", function () { expect(custodianData.feeRecipientToken).to.eql(feeRecipientToken); }); }); + + describe("Propose New Auction Parameters", async function () { + // Create a new set of auction parameters. + const newAuctionParameters: AuctionParameters = { + userPenaltyRewardBps: 1000000, + initialPenaltyBps: 1000000, + duration: 1, + gracePeriod: 3, + penaltyPeriod: 5, + minOfferDeltaBps: 10000, + }; + + it("Propose New Auction Parameters as Owner Assistant", async function () { + const { nextProposalId, auctionConfigId } = await engine.fetchCustodian(); + + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + newAuctionParameters, + ); + + await expectIxOk(connection, [ix], [ownerAssistant]); + + const currentSlot = await connection.getSlot(); + + // Fetch the proposal data and validate it. + const proposalData = await engine + .proposalAddress(nextProposalId) + .then((addr) => engine.fetchProposal({ address: addr })); + + expect(proposalData).to.eql( + new Proposal( + nextProposalId, + 255, + { + updateAuctionParameters: { + id: auctionConfigId + 1, + parameters: newAuctionParameters, + }, + }, + ownerAssistant.publicKey, + owner.publicKey, + numberToU64BN(currentSlot), + numberToU64BN(currentSlot + SLOTS_PER_EPOCH), + null, + ), + ); + }); + + it("Cannot Propose New Auction Parameters without Owner or Assistant", async function () { + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: payer.publicKey, + }, + newAuctionParameters, + ); + + await expectIxErr(connection, [ix], [payer], "OwnerOrAssistantOnly"); + }); + + it("Cannot Propose New Auction Parameters (Invalid Auction Duration)", async function () { + const { duration: _, ...remaining } = newAuctionParameters; + + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { duration: 0, ...remaining }, + ); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: InvalidAuctionDuration", + ); + }); + + it("Cannot Propose New Auction Parameters (Invalid Auction Grace Period)", async function () { + const { gracePeriod: _, ...remaining } = newAuctionParameters; + + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { gracePeriod: 0, ...remaining }, + ); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: InvalidAuctionGracePeriod", + ); + }); + + it("Cannot Propose New Auction Parameters (Invalid User Penalty)", async function () { + const { userPenaltyRewardBps: _, ...remaining } = newAuctionParameters; + + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { userPenaltyRewardBps: 4294967295, ...remaining }, + ); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: UserPenaltyTooLarge", + ); + }); + + it("Cannot Propose New Auction Parameters (Invalid Initial Penalty)", async function () { + const { initialPenaltyBps: _, ...remaining } = newAuctionParameters; + + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { initialPenaltyBps: 4294967295, ...remaining }, + ); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: InitialPenaltyTooLarge", + ); + }); + + it("Cannot Propose New Auction Parameters (Invalid Min Offer Delta)", async function () { + const { minOfferDeltaBps: _, ...remaining } = newAuctionParameters; + + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + { minOfferDeltaBps: 4294967295, ...remaining }, + ); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: MinOfferDeltaTooLarge", + ); + }); + + it("Propose New Auction Parameters as Owner", async function () { + const { nextProposalId, auctionConfigId } = await engine.fetchCustodian(); + + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + auctionParams, + ); + + await expectIxOk(connection, [ix], [ownerAssistant]); + + const currentSlot = await connection.getSlot(); + + // Fetch the proposal data and validate it. + const proposalData = await engine + .proposalAddress(nextProposalId) + .then((addr) => engine.fetchProposal({ address: addr })); + + expect(proposalData).to.eql( + new Proposal( + nextProposalId, + 255, + { + updateAuctionParameters: { + id: auctionConfigId + 1, + parameters: auctionParams, + }, + }, + ownerAssistant.publicKey, + owner.publicKey, + numberToU64BN(currentSlot), + numberToU64BN(currentSlot + SLOTS_PER_EPOCH), + null, + ), + ); + }); + }); }); describe("Business Logic", function () { From ee9ce91abef969e2beffe140075e3b906a4d7e6a Mon Sep 17 00:00:00 2001 From: gator-boi Date: Tue, 13 Feb 2024 13:17:51 -0600 Subject: [PATCH 119/126] solana: add tests for update_auction_parameters instruction --- solana/Anchor.toml | 2 + solana/programs/matching-engine/src/error.rs | 3 + .../src/processor/admin/propose/mod.rs | 2 +- .../admin/update/auction_parameters.rs | 5 + .../matching-engine/src/state/proposal.rs | 2 +- solana/ts/src/matchingEngine/index.ts | 34 ++++++ .../ts/src/matchingEngine/state/Proposal.ts | 6 +- solana/ts/tests/01__matchingEngine.ts | 113 +++++++++++++++++- 8 files changed, 161 insertions(+), 6 deletions(-) diff --git a/solana/Anchor.toml b/solana/Anchor.toml index ddaf981e..661259af 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -36,6 +36,8 @@ startup_wait = 20000 [test.validator] url = "https://api.devnet.solana.com" +slots_per_epoch = "32" + ### At 160 ticks/s, 64 ticks per slot implies that leader rotation and voting will happen ### every 400 ms. A fast voting cadence ensures faster finality and convergence ticks_per_slot = 16 diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 3c74d8aa..7b2f2cc4 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -158,6 +158,9 @@ pub enum MatchingEngineError { #[msg("ProposalAlreadyEnacted")] ProposalAlreadyEnacted, + #[msg("ProposalDelayNotExpired")] + ProposalDelayNotExpired, + #[msg("InvalidProposalAction")] InvalidProposalAction, } diff --git a/solana/programs/matching-engine/src/processor/admin/propose/mod.rs b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs index 0f8ea7bb..83c7432f 100644 --- a/solana/programs/matching-engine/src/processor/admin/propose/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs @@ -29,7 +29,7 @@ fn propose(accounts: Propose, action: ProposalAction, proposal_bump_seed: u8) -> by: by.key(), owner: custodian.owner.key(), slot_proposed_at, - slot_enact_by: slot_proposed_at + epoch_schedule.slots_per_epoch, + slot_enact_delay: slot_proposed_at + epoch_schedule.slots_per_epoch, slot_enacted_at: None, }); diff --git a/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs index df30311d..20682f30 100644 --- a/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs +++ b/solana/programs/matching-engine/src/processor/admin/update/auction_parameters.rs @@ -31,6 +31,11 @@ pub struct UpdateAuctionParameters<'info> { MatchingEngineError::ProposalAlreadyEnacted ); + require!( + Clock::get()?.slot >= proposal.slot_enact_delay, + MatchingEngineError::ProposalDelayNotExpired + ); + match &proposal.action { ProposalAction::UpdateAuctionParameters { id, .. } => { require_eq!( diff --git a/solana/programs/matching-engine/src/state/proposal.rs b/solana/programs/matching-engine/src/state/proposal.rs index da5759b3..aba756d7 100644 --- a/solana/programs/matching-engine/src/state/proposal.rs +++ b/solana/programs/matching-engine/src/state/proposal.rs @@ -22,7 +22,7 @@ pub struct Proposal { pub owner: Pubkey, pub slot_proposed_at: u64, - pub slot_enact_by: u64, + pub slot_enact_delay: u64, pub slot_enacted_at: Option, } diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index f8f1a3ba..d38d79ef 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -448,6 +448,40 @@ export class MatchingEngineProgram { .instruction(); } + async updateAuctionParametersIx(accounts: { + owner: PublicKey; + custodian?: PublicKey; + proposal?: PublicKey; + auctionConfig?: PublicKey; + }): Promise { + const { + owner, + custodian: inputCustodian, + proposal: inputProposal, + auctionConfig: inputAuctionConfig, + } = accounts; + + // Add 1 to the current auction config ID to get the next one. + const auctionConfig = await (async () => { + if (inputAuctionConfig === undefined) { + const { auctionConfigId } = await this.fetchCustodian(); + return this.auctionConfigAddress(auctionConfigId + 1); + } else { + return inputAuctionConfig; + } + })(); + + return this.program.methods + .updateAuctionParameters() + .accounts({ + owner, + custodian: inputCustodian ?? this.custodianAddress(), + proposal: inputProposal ?? (await this.proposalAddress()), + auctionConfig, + }) + .instruction(); + } + async addLocalRouterEndpointIx(accounts: { ownerOrAssistant: PublicKey; tokenRouterProgram: PublicKey; diff --git a/solana/ts/src/matchingEngine/state/Proposal.ts b/solana/ts/src/matchingEngine/state/Proposal.ts index 5710d767..05b1367b 100644 --- a/solana/ts/src/matchingEngine/state/Proposal.ts +++ b/solana/ts/src/matchingEngine/state/Proposal.ts @@ -17,7 +17,7 @@ export class Proposal { by: PublicKey; owner: PublicKey; slotProposedAt: BN; - slotEnactBy: BN; + slotEnactDelay: BN; slotEnactedAt: BN | null; constructor( id: BN, @@ -26,7 +26,7 @@ export class Proposal { by: PublicKey, owner: PublicKey, slotProposedAt: BN, - slotEnactBy: BN, + slotEnactDelay: BN, slotEnactedAt: BN | null, ) { this.id = id; @@ -35,7 +35,7 @@ export class Proposal { this.by = by; this.owner = owner; this.slotProposedAt = slotProposedAt; - this.slotEnactBy = slotEnactBy; + this.slotEnactDelay = slotEnactDelay; this.slotEnactedAt = slotEnactedAt; } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index d612c672..313f4ba9 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -1011,6 +1011,116 @@ describe("Matching Engine", function () { ); }); }); + + describe("Update Auction Parameters", async function () { + const localVariables = new Map(); + + // Create a new set of auction parameters. + const newAuctionParameters: AuctionParameters = { + userPenaltyRewardBps: 300000, // 30% + initialPenaltyBps: 200000, // 20% + duration: 3, + gracePeriod: 4, + penaltyPeriod: 8, + minOfferDeltaBps: 50000, // 5% + }; + + before("Propose New Auction Parameters as Owner Assistant", async function () { + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + newAuctionParameters, + ); + + await expectIxOk(connection, [ix], [ownerAssistant]); + }); + + it("Cannot Update Auction Config (Owner Only)", async function () { + const { nextProposalId } = await engine.fetchCustodian(); + + // Substract one to get the proposal ID for the auction parameters proposal. + const proposal = await engine.proposalAddress( + nextProposalId.sub(bigintToU64BN(1n)), + ); + + const ix = await engine.updateAuctionParametersIx({ + owner: ownerAssistant.publicKey, + proposal, + }); + + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); + }); + + it("Cannot Update Auction Config (Proposal Delay Not Expired)", async function () { + const { nextProposalId } = await engine.fetchCustodian(); + + // Substract one to get the proposal ID for the auction parameters proposal. + const proposal = await engine.proposalAddress( + nextProposalId.sub(bigintToU64BN(1n)), + ); + + const ix = await engine.updateAuctionParametersIx({ + owner: owner.publicKey, + proposal, + }); + + await expectIxErr(connection, [ix], [owner], "Error Code: ProposalDelayNotExpired"); + }); + + it("Update Auction Config as Owner", async function () { + const { nextProposalId, auctionConfigId } = await engine.fetchCustodian(); + + // Substract one to get the proposal ID for the auction parameters proposal. + const proposal = await engine.proposalAddress( + nextProposalId.sub(bigintToU64BN(1n)), + ); + const proposalDataBefore = await engine.fetchProposal({ address: proposal }); + + await waitUntilSlot( + connection, + proposalDataBefore.slotEnactDelay.toNumber() + SLOTS_PER_EPOCH + 1, + ); + + const ix = await engine.updateAuctionParametersIx({ + owner: owner.publicKey, + proposal, + }); + + await expectIxOk(connection, [ix], [owner]); + + const auctionConfigData = await engine.fetchAuctionConfig(auctionConfigId + 1); + expect(auctionConfigData).to.eql( + new AuctionConfig(auctionConfigId + 1, newAuctionParameters), + ); + + // Verify that the proposal was updated with the enacted at slot. + const proposalDataAfter = await engine + .proposalAddress(nextProposalId.sub(bigintToU64BN(1n))) + .then((addr) => engine.fetchProposal({ address: addr })); + expect(proposalDataAfter.slotEnactedAt).to.eql( + numberToU64BN(await connection.getSlot()), + ); + }); + + it("Cannot Update Auction Config (Proposal Already Enacted)", async function () { + const { nextProposalId } = await engine.fetchCustodian(); + + // Substract one to get the proposal ID for the auction parameters proposal. + const proposal = await engine.proposalAddress( + nextProposalId.sub(bigintToU64BN(1n)), + ); + + const ix = await engine.updateAuctionParametersIx({ + owner: owner.publicKey, + proposal, + }); + + await expectIxErr(connection, [ix], [owner], "Error Code: ProposalAlreadyEnacted"); + }); + + it.skip("Cannot Update Auction Config (Auction Config Mismatch)", async function () {}); + }); }); describe("Business Logic", function () { @@ -1415,7 +1525,7 @@ describe("Matching Engine", function () { Array.from(vaaHash), { active: {} }, { - configId: 0, + configId: 1, vaaSequence: bigintToU64BN(vaaAccount.emitterInfo().sequence), sourceChain: ethChain, bestOfferToken: offerToken, @@ -1452,6 +1562,7 @@ describe("Matching Engine", function () { wallet, USDC_MINT_ADDRESS, wallet.publicKey, + undefined, ); // Mint USDC. From 3b0242c14904e4178661b11a62c561daf45c6d3d Mon Sep 17 00:00:00 2001 From: gator-boi Date: Wed, 14 Feb 2024 12:58:11 -0600 Subject: [PATCH 120/126] solana: more auction update tests --- solana/Anchor.toml | 2 - solana/package-lock.json | 136 +++++++++++++++--- solana/package.json | 2 +- .../src/processor/admin/propose/mod.rs | 12 +- solana/ts/tests/01__matchingEngine.ts | 104 ++++++++++---- 5 files changed, 207 insertions(+), 49 deletions(-) diff --git a/solana/Anchor.toml b/solana/Anchor.toml index 661259af..ddaf981e 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -36,8 +36,6 @@ startup_wait = 20000 [test.validator] url = "https://api.devnet.solana.com" -slots_per_epoch = "32" - ### At 160 ticks/s, 64 ticks per slot implies that leader rotation and voting will happen ### every 400 ms. A fast voting cadence ensures faster finality and convergence ticks_per_slot = 16 diff --git a/solana/package-lock.json b/solana/package-lock.json index 58c7950c..af214344 100644 --- a/solana/package-lock.json +++ b/solana/package-lock.json @@ -4,11 +4,10 @@ "requires": true, "packages": { "": { - "name": "solana", "dependencies": { "@certusone/wormhole-sdk": "^0.10.10", "@coral-xyz/anchor": "^0.29.0", - "@solana/spl-token": "^0.3.9", + "@solana/spl-token": "^0.4.0", "@solana/web3.js": "^1.87.6", "dotenv": "^16.4.1", "ethers": "^5.7.2", @@ -174,6 +173,23 @@ "@types/node": "^18.0.3" } }, + "node_modules/@certusone/wormhole-sdk/node_modules/@solana/spl-token": { + "version": "0.3.11", + "resolved": "https://registry.npmjs.org/@solana/spl-token/-/spl-token-0.3.11.tgz", + "integrity": "sha512-bvohO3rIMSVL24Pb+I4EYTJ6cL82eFpInEXD/I8K8upOGjpqHsKUoAempR/RnUlI1qSFNyFlWJfu6MNUgfbCQQ==", + "dependencies": { + "@solana/buffer-layout": "^4.0.0", + "@solana/buffer-layout-utils": "^0.2.0", + "@solana/spl-token-metadata": "^0.1.2", + "buffer": "^6.0.3" + }, + "engines": { + "node": ">=16" + }, + "peerDependencies": { + "@solana/web3.js": "^1.88.0" + } + }, "node_modules/@certusone/wormhole-sdk/node_modules/axios": { "version": "0.24.0", "license": "MIT", @@ -1748,32 +1764,106 @@ "node": ">= 10" } }, + "node_modules/@solana/codecs-core": { + "version": "2.0.0-experimental.8618508", + "resolved": "https://registry.npmjs.org/@solana/codecs-core/-/codecs-core-2.0.0-experimental.8618508.tgz", + "integrity": "sha512-JCz7mKjVKtfZxkuDtwMAUgA7YvJcA2BwpZaA1NOLcted4OMC4Prwa3DUe3f3181ixPYaRyptbF0Ikq2MbDkYEA==" + }, + "node_modules/@solana/codecs-data-structures": { + "version": "2.0.0-experimental.8618508", + "resolved": "https://registry.npmjs.org/@solana/codecs-data-structures/-/codecs-data-structures-2.0.0-experimental.8618508.tgz", + "integrity": "sha512-sLpjL9sqzaDdkloBPV61Rht1tgaKq98BCtIKRuyscIrmVPu3wu0Bavk2n/QekmUzaTsj7K1pVSniM0YqCdnEBw==", + "dependencies": { + "@solana/codecs-core": "2.0.0-experimental.8618508", + "@solana/codecs-numbers": "2.0.0-experimental.8618508" + } + }, + "node_modules/@solana/codecs-numbers": { + "version": "2.0.0-experimental.8618508", + "resolved": "https://registry.npmjs.org/@solana/codecs-numbers/-/codecs-numbers-2.0.0-experimental.8618508.tgz", + "integrity": "sha512-EXQKfzFr3CkKKNzKSZPOOOzchXsFe90TVONWsSnVkonO9z+nGKALE0/L9uBmIFGgdzhhU9QQVFvxBMclIDJo2Q==", + "dependencies": { + "@solana/codecs-core": "2.0.0-experimental.8618508" + } + }, + "node_modules/@solana/codecs-strings": { + "version": "2.0.0-experimental.8618508", + "resolved": "https://registry.npmjs.org/@solana/codecs-strings/-/codecs-strings-2.0.0-experimental.8618508.tgz", + "integrity": "sha512-b2yhinr1+oe+JDmnnsV0641KQqqDG8AQ16Z/x7GVWO+AWHMpRlHWVXOq8U1yhPMA4VXxl7i+D+C6ql0VGFp0GA==", + "dependencies": { + "@solana/codecs-core": "2.0.0-experimental.8618508", + "@solana/codecs-numbers": "2.0.0-experimental.8618508" + }, + "peerDependencies": { + "fastestsmallesttextencoderdecoder": "^1.0.22" + } + }, + "node_modules/@solana/options": { + "version": "2.0.0-experimental.8618508", + "resolved": "https://registry.npmjs.org/@solana/options/-/options-2.0.0-experimental.8618508.tgz", + "integrity": "sha512-fy/nIRAMC3QHvnKi63KEd86Xr/zFBVxNW4nEpVEU2OT0gCEKwHY4Z55YHf7XujhyuM3PNpiBKg/YYw5QlRU4vg==", + "dependencies": { + "@solana/codecs-core": "2.0.0-experimental.8618508", + "@solana/codecs-numbers": "2.0.0-experimental.8618508" + } + }, "node_modules/@solana/spl-token": { - "version": "0.3.9", - "resolved": "https://registry.npmjs.org/@solana/spl-token/-/spl-token-0.3.9.tgz", - "integrity": "sha512-1EXHxKICMnab35MvvY/5DBc/K/uQAOJCYnDZXw83McCAYUAfi+rwq6qfd6MmITmSTEhcfBcl/zYxmW/OSN0RmA==", + "version": "0.4.0", + "resolved": "https://registry.npmjs.org/@solana/spl-token/-/spl-token-0.4.0.tgz", + "integrity": "sha512-jjBIBG9IsclqQVl5Y82npGE6utdCh7Z9VFcF5qgJa5EUq2XgspW3Dt1wujWjH/vQDRnkp9zGO+BqQU/HhX/3wg==", "dependencies": { "@solana/buffer-layout": "^4.0.0", "@solana/buffer-layout-utils": "^0.2.0", + "@solana/spl-token-metadata": "^0.1.2", "buffer": "^6.0.3" }, "engines": { "node": ">=16" }, "peerDependencies": { - "@solana/web3.js": "^1.47.4" + "@solana/web3.js": "^1.89.1" + } + }, + "node_modules/@solana/spl-token-metadata": { + "version": "0.1.2", + "resolved": "https://registry.npmjs.org/@solana/spl-token-metadata/-/spl-token-metadata-0.1.2.tgz", + "integrity": "sha512-hJYnAJNkDrtkE2Q41YZhCpeOGU/0JgRFXbtrtOuGGeKc3pkEUHB9DDoxZAxx+XRno13GozUleyBi0qypz4c3bw==", + "dependencies": { + "@solana/codecs-core": "2.0.0-experimental.8618508", + "@solana/codecs-data-structures": "2.0.0-experimental.8618508", + "@solana/codecs-numbers": "2.0.0-experimental.8618508", + "@solana/codecs-strings": "2.0.0-experimental.8618508", + "@solana/options": "2.0.0-experimental.8618508", + "@solana/spl-type-length-value": "0.1.0" + }, + "engines": { + "node": ">=16" + }, + "peerDependencies": { + "@solana/web3.js": "^1.87.6" + } + }, + "node_modules/@solana/spl-type-length-value": { + "version": "0.1.0", + "resolved": "https://registry.npmjs.org/@solana/spl-type-length-value/-/spl-type-length-value-0.1.0.tgz", + "integrity": "sha512-JBMGB0oR4lPttOZ5XiUGyvylwLQjt1CPJa6qQ5oM+MBCndfjz2TKKkw0eATlLLcYmq1jBVsNlJ2cD6ns2GR7lA==", + "dependencies": { + "buffer": "^6.0.3" + }, + "engines": { + "node": ">=16" } }, "node_modules/@solana/web3.js": { - "version": "1.87.6", - "resolved": "https://registry.npmjs.org/@solana/web3.js/-/web3.js-1.87.6.tgz", - "integrity": "sha512-LkqsEBgTZztFiccZZXnawWa8qNCATEqE97/d0vIwjTclmVlc8pBpD1DmjfVHtZ1HS5fZorFlVhXfpwnCNDZfyg==", + "version": "1.90.0", + "resolved": "https://registry.npmjs.org/@solana/web3.js/-/web3.js-1.90.0.tgz", + "integrity": "sha512-p0cb/COXb8NNVSMkGMPwqQ6NvObZgUitN80uOedMB+jbYWOKOeJBuPnzhenkIV9RX0krGwyuY1Ltn5O8MGFsEw==", "dependencies": { - "@babel/runtime": "^7.23.2", + "@babel/runtime": "^7.23.4", "@noble/curves": "^1.2.0", - "@noble/hashes": "^1.3.1", - "@solana/buffer-layout": "^4.0.0", - "agentkeepalive": "^4.3.0", + "@noble/hashes": "^1.3.2", + "@solana/buffer-layout": "^4.0.1", + "agentkeepalive": "^4.5.0", "bigint-buffer": "^1.1.5", "bn.js": "^5.2.1", "borsh": "^0.7.0", @@ -1781,7 +1871,7 @@ "buffer": "6.0.3", "fast-stable-stringify": "^1.0.0", "jayson": "^4.1.0", - "node-fetch": "^2.6.12", + "node-fetch": "^2.7.0", "rpc-websockets": "^7.5.1", "superstruct": "^0.14.2" } @@ -2023,11 +2113,10 @@ "license": "MIT" }, "node_modules/agentkeepalive": { - "version": "4.3.0", - "license": "MIT", + "version": "4.5.0", + "resolved": "https://registry.npmjs.org/agentkeepalive/-/agentkeepalive-4.5.0.tgz", + "integrity": "sha512-5GG/5IbQQpC9FpkRGsSvZI5QYeSCzlJHdpBQntCsuTOxhKD8lqKhrleg2Yi7yvMIf82Ycmmqln9U8V9qwEiJew==", "dependencies": { - "debug": "^4.1.0", - "depd": "^2.0.0", "humanize-ms": "^1.2.1" }, "engines": { @@ -2717,6 +2806,7 @@ }, "node_modules/debug": { "version": "4.3.4", + "dev": true, "license": "MIT", "dependencies": { "ms": "2.1.2" @@ -2732,6 +2822,7 @@ }, "node_modules/debug/node_modules/ms": { "version": "2.1.2", + "dev": true, "license": "MIT" }, "node_modules/decamelize": { @@ -3169,6 +3260,12 @@ "version": "1.0.0", "license": "MIT" }, + "node_modules/fastestsmallesttextencoderdecoder": { + "version": "1.0.22", + "resolved": "https://registry.npmjs.org/fastestsmallesttextencoderdecoder/-/fastestsmallesttextencoderdecoder-1.0.22.tgz", + "integrity": "sha512-Pb8d48e+oIuY4MaM64Cd7OW1gt4nxCHs7/ddPPZ/Ic3sg8yVGM7O9wDvZ7us6ScaUupzM+pfBolwtYhN1IxBIw==", + "peer": true + }, "node_modules/file-uri-to-path": { "version": "1.0.0", "license": "MIT" @@ -3502,7 +3599,8 @@ }, "node_modules/humanize-ms": { "version": "1.2.1", - "license": "MIT", + "resolved": "https://registry.npmjs.org/humanize-ms/-/humanize-ms-1.2.1.tgz", + "integrity": "sha512-Fl70vYtsAFb/C06PTS9dZBo7ihau+Tu/DNCk/OyHhea07S+aeMWpFFkUaXRa8fI+ScZbEI8dfSxwY7gxZ9SAVQ==", "dependencies": { "ms": "^2.0.0" } diff --git a/solana/package.json b/solana/package.json index b26d4b98..4e1a1e8c 100644 --- a/solana/package.json +++ b/solana/package.json @@ -10,7 +10,7 @@ "dependencies": { "@certusone/wormhole-sdk": "^0.10.10", "@coral-xyz/anchor": "^0.29.0", - "@solana/spl-token": "^0.3.9", + "@solana/spl-token": "^0.4.0", "@solana/web3.js": "^1.87.6", "dotenv": "^16.4.1", "ethers": "^5.7.2", diff --git a/solana/programs/matching-engine/src/processor/admin/propose/mod.rs b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs index 83c7432f..0d59c68e 100644 --- a/solana/programs/matching-engine/src/processor/admin/propose/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/propose/mod.rs @@ -21,6 +21,16 @@ fn propose(accounts: Propose, action: ProposalAction, proposal_bump_seed: u8) -> let slot_proposed_at = Clock::get().map(|clock| clock.slot)?; + cfg_if::cfg_if! { + if #[cfg(feature = "integration-test")] { + let _ = epoch_schedule; + // Arbitrary set for fast testing. + let slot_enact_delay = slot_proposed_at + 8; + } else { + let slot_enact_delay = slot_proposed_at + epoch_schedule.slots_per_epoch; + } + } + // Create the proposal. proposal.set_inner(Proposal { id: custodian.next_proposal_id, @@ -29,7 +39,7 @@ fn propose(accounts: Propose, action: ProposalAction, proposal_bump_seed: u8) -> by: by.key(), owner: custodian.owner.key(), slot_proposed_at, - slot_enact_delay: slot_proposed_at + epoch_schedule.slots_per_epoch, + slot_enact_delay, slot_enacted_at: None, }); diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 313f4ba9..521a70b6 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -53,7 +53,7 @@ import { chaiUse(chaiAsPromised); -const SLOTS_PER_EPOCH = 32; +const SLOTS_PER_EPOCH = 8; describe("Matching Engine", function () { const connection = new Connection(LOCALHOST, "confirmed"); @@ -1026,14 +1026,20 @@ describe("Matching Engine", function () { }; before("Propose New Auction Parameters as Owner Assistant", async function () { - const ix = await engine.proposeAuctionParametersIx( - { - ownerOrAssistant: ownerAssistant.publicKey, - }, - newAuctionParameters, - ); + const { nextProposalId } = await engine.fetchCustodian(); - await expectIxOk(connection, [ix], [ownerAssistant]); + localVariables.set("duplicateProposalId", nextProposalId); + + for (let i = 0; i < 2; i++) { + const ix = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + newAuctionParameters, + ); + + await expectIxOk(connection, [ix], [ownerAssistant]); + } }); it("Cannot Update Auction Config (Owner Only)", async function () { @@ -1119,7 +1125,53 @@ describe("Matching Engine", function () { await expectIxErr(connection, [ix], [owner], "Error Code: ProposalAlreadyEnacted"); }); - it.skip("Cannot Update Auction Config (Auction Config Mismatch)", async function () {}); + it("Cannot Update Auction Config (Auction Config Mismatch)", async function () { + const { nextProposalId } = await engine.fetchCustodian(); + + const proposalIx = await engine.proposeAuctionParametersIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + auctionParams, + ); + await expectIxOk(connection, [proposalIx], [ownerAssistant]); + + const proposalData = await engine + .proposalAddress(nextProposalId) + .then((addr) => engine.fetchProposal({ address: addr })); + + await waitUntilSlot( + connection, + proposalData.slotEnactDelay.toNumber() + SLOTS_PER_EPOCH + 1, + ); + + // Fetch the duplicate proposal ID saved earlier. + const duplicateProposalId = localVariables.get("duplicateProposalId") as BN; + const proposal = await engine.proposalAddress(duplicateProposalId); + + const ix = await engine.updateAuctionParametersIx({ + owner: owner.publicKey, + proposal, + }); + + await expectIxErr(connection, [ix], [owner], "Error Code: AuctionConfigMismatch"); + }); + + after("Enact Last Proposal to Reset Auction Parameters", async function () { + const { nextProposalId } = await engine.fetchCustodian(); + + // Substract one to get the proposal ID for the auction parameters proposal. + const proposal = await engine.proposalAddress( + nextProposalId.sub(bigintToU64BN(1n)), + ); + + const ix = await engine.updateAuctionParametersIx({ + owner: owner.publicKey, + proposal, + }); + + await expectIxOk(connection, [ix], [owner]); + }); }); }); @@ -1510,6 +1562,8 @@ describe("Matching Engine", function () { const auctionData = await engine.fetchAuction(vaaHash); const { bump } = auctionData; + const { auctionConfigId } = await engine.fetchCustodian(); + const offerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, offerAuthorityOne.publicKey, @@ -1525,7 +1579,7 @@ describe("Matching Engine", function () { Array.from(vaaHash), { active: {} }, { - configId: 1, + configId: auctionConfigId, vaaSequence: bigintToU64BN(vaaAccount.emitterInfo().sequence), sourceChain: ethChain, bestOfferToken: offerToken, @@ -1557,27 +1611,25 @@ describe("Matching Engine", function () { before("Create ATAs For Offer Authorities", async function () { for (const wallet of [offerAuthorityOne, offerAuthorityTwo, liquidator]) { - const destination = await splToken.createAccount( - connection, - wallet, + const destination = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS, wallet.publicKey, - undefined, + ); + const createIx = splToken.createAssociatedTokenAccountInstruction( + payer.publicKey, + destination, + wallet.publicKey, + USDC_MINT_ADDRESS, ); - // Mint USDC. const mintAmount = 10_000_000n * 1_000_000n; - - await expect( - splToken.mintTo( - connection, - payer, - USDC_MINT_ADDRESS, - destination, - payer, - mintAmount, - ), - ).to.be.fulfilled; + const mintIx = splToken.createMintToInstruction( + USDC_MINT_ADDRESS, + destination, + payer.publicKey, + mintAmount, + ); + await expectIxOk(connection, [createIx, mintIx], [payer]); const { amount } = await splToken.getAccount(connection, destination); expect(amount).equals(mintAmount); From ccbfb01a7f94c52447889c743d482cf76cd74cd5 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Mon, 12 Feb 2024 08:58:30 -0600 Subject: [PATCH 121/126] solana: upgrade WIP --- solana/Anchor.toml | 47 ++- solana/Cargo.lock | 27 ++ solana/Cargo.toml | 5 +- solana/Makefile | 12 +- solana/modules/common/src/admin/cpi.rs | 32 -- solana/modules/common/src/admin/mod.rs | 2 - solana/modules/common/src/admin/utils/mod.rs | 2 + .../modules/common/src/admin/utils/upgrade.rs | 28 ++ solana/modules/common/src/constants/mod.rs | 30 ++ solana/modules/common/src/constants/usdc.rs | 9 - solana/programs/matching-engine/Cargo.toml | 3 +- solana/programs/matching-engine/src/error.rs | 27 +- solana/programs/matching-engine/src/lib.rs | 5 +- .../src/processor/admin/initialize.rs | 64 ++-- .../ownership_transfer_request/cancel.rs | 34 -- .../ownership_transfer_request/confirm.rs | 35 -- .../ownership_transfer_request/submit.rs | 36 -- solana/programs/token-router/Cargo.toml | 3 +- solana/programs/token-router/src/error.rs | 27 +- solana/programs/token-router/src/lib.rs | 8 +- .../src/processor/admin/authorize_upgrade.rs | 26 ++ .../src/processor/admin/initialize.rs | 30 +- .../token-router/src/processor/admin/mod.rs | 3 + .../ownership_transfer_request/cancel.rs | 35 -- .../ownership_transfer_request/confirm.rs | 36 -- .../ownership_transfer_request/submit.rs | 36 -- solana/programs/upgrade-manager/Cargo.toml | 38 ++ solana/programs/upgrade-manager/README.md | 0 solana/programs/upgrade-manager/src/lib.rs | 53 +++ .../processor/matching_engine_upgrade/mod.rs | 2 + .../matching_engine_upgrade/upgrade.rs | 90 +++++ .../upgrade-manager/src/processor/mod.rs | 5 + .../processor/token_router_upgrade/execute.rs | 113 ++++++ .../src/processor/token_router_upgrade/mod.rs | 2 + .../programs/upgrade-manager/src/state/mod.rs | 2 + .../src/state/upgrade_receipt.rs | 15 + solana/ts/src/matchingEngine/index.ts | 43 ++- solana/ts/src/tokenRouter/index.ts | 37 +- solana/ts/src/tokenRouter/state/index.ts | 2 +- solana/ts/src/upgradeManager/index.ts | 146 ++++++++ .../upgradeManager/state/UpgradeReceipt.ts | 23 ++ solana/ts/src/upgradeManager/state/index.ts | 1 + solana/ts/src/utils.ts | 6 +- solana/ts/tests/01__matchingEngine.ts | 3 +- solana/ts/tests/02__tokenRouter.ts | 5 +- solana/ts/tests/12__testnetFork.ts | 335 ++++++++++++++++++ .../testnet/matching_engine_custodian.json | 14 + .../testnet/token_router_custodian.json | 14 + .../token_router_program_data_hacked.json | 14 + solana/ts/tests/helpers/consts.ts | 15 +- solana/ts/tests/helpers/utils.ts | 33 +- 51 files changed, 1262 insertions(+), 351 deletions(-) delete mode 100644 solana/modules/common/src/admin/cpi.rs create mode 100644 solana/modules/common/src/admin/utils/upgrade.rs delete mode 100644 solana/modules/common/src/constants/usdc.rs create mode 100644 solana/programs/token-router/src/processor/admin/authorize_upgrade.rs create mode 100644 solana/programs/upgrade-manager/Cargo.toml create mode 100644 solana/programs/upgrade-manager/README.md create mode 100644 solana/programs/upgrade-manager/src/lib.rs create mode 100644 solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/mod.rs create mode 100644 solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/upgrade.rs create mode 100644 solana/programs/upgrade-manager/src/processor/mod.rs create mode 100644 solana/programs/upgrade-manager/src/processor/token_router_upgrade/execute.rs create mode 100644 solana/programs/upgrade-manager/src/processor/token_router_upgrade/mod.rs create mode 100644 solana/programs/upgrade-manager/src/state/mod.rs create mode 100644 solana/programs/upgrade-manager/src/state/upgrade_receipt.rs create mode 100644 solana/ts/src/upgradeManager/index.ts create mode 100644 solana/ts/src/upgradeManager/state/UpgradeReceipt.ts create mode 100644 solana/ts/src/upgradeManager/state/index.ts create mode 100644 solana/ts/tests/12__testnetFork.ts create mode 100644 solana/ts/tests/accounts/testnet/matching_engine_custodian.json create mode 100644 solana/ts/tests/accounts/testnet/token_router_custodian.json create mode 100644 solana/ts/tests/accounts/testnet/token_router_program_data_hacked.json diff --git a/solana/Anchor.toml b/solana/Anchor.toml index ddaf981e..193efcca 100644 --- a/solana/Anchor.toml +++ b/solana/Anchor.toml @@ -9,16 +9,19 @@ skip-lint = false [workspace] members = [ "programs/token-router", - "programs/matching-engine" + "programs/matching-engine", + "programs/upgrade-manager" ] [programs.localnet] token_router = "TokenRouter11111111111111111111111111111111" matching_engine = "MatchingEngine11111111111111111111111111111" +upgrade_manager = "UpgradeManager11111111111111111111111111111" [programs.devnet] token_router = "tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md" matching_engine = "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS" +upgrade_manager = "ucdP9ktgrXgEUnn6roqD2SfdGMR2JSiWHUKv23oXwxt" [registry] url = "https://api.apr.dev" @@ -120,4 +123,44 @@ filename = "ts/tests/accounts/core_bridge/fee_collector.json" ### Wormhole Core Bridge -- Guardian Set 0 [[test.validator.account]] address = "dxZtypiKT5D9LYzdPxjvSZER9MgYfeRVU5qpMTMTRs4" -filename = "ts/tests/accounts/core_bridge/guardian_set_0.json" \ No newline at end of file +filename = "ts/tests/accounts/core_bridge/guardian_set_0.json" + +### Testnet Matching Engine Program +### +### NOTE: Change this back to clone from Solana devnet once the program is +### fixed. +[[test.validator.clone]] +###[[test.genesis]] +address = "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS" +###program = "ts/tests/artifacts/testnet_matching_engine.so" +###upgradeable = true + +### Testnet Matching Engine -- Custodian +[[test.validator.account]] +address = "5BsCKkzuZXLygduw6RorCqEB61AdzNkxp5VzQrFGzYWr" +filename = "ts/tests/accounts/testnet/matching_engine_custodian.json" + +### Testnet Token Router Program +### +### NOTE: Change this back to clone from Solana devnet once the program is +### fixed. +[[test.validator.clone]] +###[[test.genesis]] +address = "tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md" +###program = "ts/tests/artifacts/testnet_token_router.so" +###upgradeable = true + +### Testnet Token Router -- Custodian +[[test.validator.account]] +address = "CFYdtHYDnQgCAcwetWVjVg5V8Uiy1CpJaoYJxmV19Z7N" +filename = "ts/tests/accounts/testnet/token_router_custodian.json" + +### Upgrade Manager (Testnet) +### +### NOTE: This is not forked from Solana devnet because the owner cannot be +### modified in the program data. We instead load this program as an upgradeable +### program so the wallet above ends up as the upgrade authority. +[[test.genesis]] +address = "ucdP9ktgrXgEUnn6roqD2SfdGMR2JSiWHUKv23oXwxt" +program = "ts/tests/artifacts/testnet_upgrade_manager.so" +upgradeable = true \ No newline at end of file diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 2fe259c7..0579a336 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -1230,6 +1230,7 @@ dependencies = [ "liquidity-layer-common-solana", "ruint", "solana-program", + "wormhole-solana-utils", ] [[package]] @@ -2330,6 +2331,7 @@ dependencies = [ "matching-engine", "ruint", "solana-program", + "wormhole-solana-utils", ] [[package]] @@ -2395,6 +2397,21 @@ dependencies = [ "subtle", ] +[[package]] +name = "upgrade-manager" +version = "0.0.0" +dependencies = [ + "anchor-lang", + "cfg-if", + "hex", + "hex-literal", + "liquidity-layer-common-solana", + "matching-engine", + "solana-program", + "token-router", + "wormhole-solana-utils", +] + [[package]] name = "uriparse" version = "0.6.4" @@ -2627,6 +2644,16 @@ dependencies = [ "solana-program", ] +[[package]] +name = "wormhole-solana-utils" +version = "0.2.0-alpha.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eae4412bb88773852fe58215601cda7d8f7f0204a700526f25a9ece951715774" +dependencies = [ + "anchor-lang", + "solana-program", +] + [[package]] name = "wormhole-solana-vaas" version = "0.2.0-alpha.11" diff --git a/solana/Cargo.toml b/solana/Cargo.toml index 6afff202..fc20f657 100644 --- a/solana/Cargo.toml +++ b/solana/Cargo.toml @@ -20,12 +20,15 @@ path = "modules/common" [workspace.dependencies.matching-engine] path = "programs/matching-engine" +[workspace.dependencies.token-router] +path = "programs/token-router" + [workspace.dependencies.wormhole-cctp-solana] version = "0.1.0-alpha.6" default-features = false [workspace.dependencies.wormhole-solana-utils] -version = "0.2.0-alpha.11" +version = "0.2.0-alpha.15" features = ["anchor"] [workspace.dependencies.wormhole-solana-vaas] diff --git a/solana/Makefile b/solana/Makefile index 4002a869..4c2d5742 100644 --- a/solana/Makefile +++ b/solana/Makefile @@ -25,8 +25,7 @@ cargo-test $(NETWORK): build: $(out_$(NETWORK)) $(out_$(NETWORK)): cargo-test ifdef out_$(NETWORK) - anchor build -p token_router --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features - anchor build -p matching_engine --arch sbf -- --features "$(NETWORK),no-idl" -- --no-default-features + anchor build --arch sbf -- --features $(NETWORK) mkdir -p $(out_$(NETWORK)) cp target/deploy/*.so $(out_$(NETWORK))/ endif @@ -34,10 +33,11 @@ endif test: node_modules NETWORK=localnet $(MAKE) cargo-test NETWORK=testnet $(MAKE) cargo-test - anchor build -p token_router --arch sbf -- --features testnet - mkdir -p ts/tests/artifacts && cp target/deploy/token_router.so ts/tests/artifacts/testnet_token_router.so - anchor build -p matching_engine --arch sbf -- --features testnet - mkdir -p ts/tests/artifacts && cp target/deploy/matching_engine.so ts/tests/artifacts/testnet_matching_engine.so + anchor build --arch sbf -- --features testnet + mkdir -p ts/tests/artifacts + cp target/deploy/matching_engine.so ts/tests/artifacts/testnet_matching_engine.so + cp target/deploy/token_router.so ts/tests/artifacts/testnet_token_router.so + cp target/deploy/upgrade_manager.so ts/tests/artifacts/testnet_upgrade_manager.so anchor build --arch sbf -- --features integration-test anchor test --skip-build diff --git a/solana/modules/common/src/admin/cpi.rs b/solana/modules/common/src/admin/cpi.rs deleted file mode 100644 index f88c0f22..00000000 --- a/solana/modules/common/src/admin/cpi.rs +++ /dev/null @@ -1,32 +0,0 @@ -#![allow(clippy::result_large_err)] - -use anchor_lang::prelude::*; -use solana_program::bpf_loader_upgradeable; - -#[derive(Accounts)] -pub struct SetUpgradeAuthorityChecked<'info> { - #[account(mut)] - pub program_data: AccountInfo<'info>, - - #[account(signer)] - pub current_authority: AccountInfo<'info>, - - #[account(signer)] - pub new_authority: AccountInfo<'info>, -} - -pub fn set_upgrade_authority_checked<'info>( - ctx: CpiContext<'_, '_, '_, 'info, SetUpgradeAuthorityChecked<'info>>, - program_id: Pubkey, -) -> Result<()> { - solana_program::program::invoke_signed( - &bpf_loader_upgradeable::set_upgrade_authority_checked( - &program_id, - &ctx.accounts.current_authority.key(), - &ctx.accounts.new_authority.key(), - ), - &ctx.to_account_infos(), - ctx.signer_seeds, - ) - .map_err(Into::into) -} diff --git a/solana/modules/common/src/admin/mod.rs b/solana/modules/common/src/admin/mod.rs index 42cd1114..f564222c 100644 --- a/solana/modules/common/src/admin/mod.rs +++ b/solana/modules/common/src/admin/mod.rs @@ -1,5 +1,3 @@ -pub mod cpi; - pub mod utils; use anchor_lang::prelude::Pubkey; diff --git a/solana/modules/common/src/admin/utils/mod.rs b/solana/modules/common/src/admin/utils/mod.rs index 09738c98..6dcecb91 100644 --- a/solana/modules/common/src/admin/utils/mod.rs +++ b/solana/modules/common/src/admin/utils/mod.rs @@ -3,3 +3,5 @@ pub mod assistant; pub mod ownable; pub mod pending_owner; + +pub mod upgrade; diff --git a/solana/modules/common/src/admin/utils/upgrade.rs b/solana/modules/common/src/admin/utils/upgrade.rs new file mode 100644 index 00000000..24e27eac --- /dev/null +++ b/solana/modules/common/src/admin/utils/upgrade.rs @@ -0,0 +1,28 @@ +use anchor_lang::prelude::*; +use solana_program::{instruction::Instruction, sysvar::instructions::load_instruction_at_checked}; + +pub trait RequireValidInstructionsError { + fn require_eq_this_program(actual_program_id: Pubkey) -> Result<()>; + + fn require_eq_upgrade_manager(actual_program_id: Pubkey) -> Result<()>; +} + +pub fn require_valid_instructions(instructions_sysvar: &AccountInfo) -> Result<()> +where + E: RequireValidInstructionsError, +{ + // Check instruction to make sure this is executed top level as the first instruction. + { + let Instruction { program_id, .. } = load_instruction_at_checked(0, instructions_sysvar)?; + E::require_eq_this_program(program_id)?; + } + + // Check that the next instruction is the Upgrade Manager's. + { + let Instruction { program_id, .. } = load_instruction_at_checked(1, instructions_sysvar)?; + E::require_eq_upgrade_manager(program_id)?; + } + + // Done. + Ok(()) +} diff --git a/solana/modules/common/src/constants/mod.rs b/solana/modules/common/src/constants/mod.rs index 9381960d..492b8164 100644 --- a/solana/modules/common/src/constants/mod.rs +++ b/solana/modules/common/src/constants/mod.rs @@ -9,3 +9,33 @@ pub const CCTP_MESSAGE_SEED_PREFIX: &[u8] = b"cctp-msg"; pub const FEE_PRECISION_MAX: u32 = 1_000_000; pub use wormhole_solana_consts::USDC_MINT; + +use solana_program::{pubkey, pubkey::Pubkey}; + +cfg_if::cfg_if! { + if #[cfg(feature = "testnet")] { + pub const MATCHING_ENGINE_PROGRAM_ID: Pubkey = pubkey!("mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS"); + pub const TOKEN_ROUTER_PROGRAM_ID: Pubkey = pubkey!("tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md"); + + pub const UPGRADE_MANAGER_PROGRAM_ID: Pubkey = pubkey!("ucdP9ktgrXgEUnn6roqD2SfdGMR2JSiWHUKv23oXwxt"); + pub const UPGRADE_MANAGER_AUTHORITY: Pubkey = pubkey!("2sxpm9pvWmNWFzhgWtmxkMsdWk2uSNT9MoKvww53po1M"); + } else if #[cfg(feature = "localnet")] { + pub const MATCHING_ENGINE_PROGRAM_ID: Pubkey = pubkey!("MatchingEngine11111111111111111111111111111"); + pub const TOKEN_ROUTER_PROGRAM_ID: Pubkey = pubkey!("TokenRouter11111111111111111111111111111111"); + + pub const UPGRADE_MANAGER_PROGRAM_ID: Pubkey = pubkey!("UpgradeManager11111111111111111111111111111"); + pub const UPGRADE_MANAGER_AUTHORITY: Pubkey = pubkey!("9Nu3k9HKFChDcAC8SeCrCeHvsRcdZzZfdQxGaEynFHZ7"); + } +} + +#[cfg(test)] +mod test { + use super::*; + + #[test] + fn upgrade_manager_authority() { + let (expected, _) = + Pubkey::find_program_address(&[b"upgrade"], &UPGRADE_MANAGER_PROGRAM_ID); + assert_eq!(UPGRADE_MANAGER_AUTHORITY, expected); + } +} diff --git a/solana/modules/common/src/constants/usdc.rs b/solana/modules/common/src/constants/usdc.rs deleted file mode 100644 index fa5b5b19..00000000 --- a/solana/modules/common/src/constants/usdc.rs +++ /dev/null @@ -1,9 +0,0 @@ -cfg_if::cfg_if! { - if #[cfg(feature = "mainnet")] { - anchor_lang::declare_id!("EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v"); - } else if #[cfg(feature = "testnet")] { - anchor_lang::declare_id!("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); - } else if #[cfg(feature = "localnet")] { - anchor_lang::declare_id!("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); - } -} diff --git a/solana/programs/matching-engine/Cargo.toml b/solana/programs/matching-engine/Cargo.toml index fd1bc9b9..03e71dac 100644 --- a/solana/programs/matching-engine/Cargo.toml +++ b/solana/programs/matching-engine/Cargo.toml @@ -12,7 +12,7 @@ repository.workspace = true crate-type = ["cdylib", "lib"] [features] -default = ["localnet", "no-idl"] +default = ["no-idl"] no-entrypoint = [] no-idl = [] no-log-ix-name = [] @@ -23,6 +23,7 @@ integration-test = ["localnet"] [dependencies] common.workspace = true +wormhole-solana-utils.workspace = true anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index 7b2f2cc4..c6f6b862 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -1,4 +1,7 @@ -#[anchor_lang::prelude::error_code] +use anchor_lang::prelude::*; +use common::admin::utils::upgrade::RequireValidInstructionsError; + +#[error_code] pub enum MatchingEngineError { /// Only the program's owner is permitted. #[msg("OwnerOnly")] @@ -11,6 +14,12 @@ pub enum MatchingEngineError { #[msg("InvalidCustodyToken")] InvalidCustodyToken = 0x6, + #[msg("CpiDisallowed")] + CpiDisallowed = 0x8, + + #[msg("UpgradeManagerRequired")] + UpgradeManagerRequired = 0x10, + #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x100, @@ -164,3 +173,19 @@ pub enum MatchingEngineError { #[msg("InvalidProposalAction")] InvalidProposalAction, } + +impl RequireValidInstructionsError for MatchingEngineError { + fn require_eq_this_program(actual_program_id: Pubkey) -> Result<()> { + require_keys_eq!(actual_program_id, crate::ID, Self::CpiDisallowed); + Ok(()) + } + + fn require_eq_upgrade_manager(actual_program_id: Pubkey) -> Result<()> { + require_keys_eq!( + actual_program_id, + common::constants::UPGRADE_MANAGER_PROGRAM_ID, + Self::UpgradeManagerRequired + ); + Ok(()) + } +} diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 1da676ef..655809cc 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -14,13 +14,12 @@ pub mod utils; use anchor_lang::prelude::*; +declare_id!(common::constants::MATCHING_ENGINE_PROGRAM_ID); + cfg_if::cfg_if! { if #[cfg(feature = "testnet")] { - // Placeholder. - declare_id!("mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS"); const CUSTODIAN_BUMP: u8 = 254; } else if #[cfg(feature = "localnet")] { - declare_id!("MatchingEngine11111111111111111111111111111"); const CUSTODIAN_BUMP: u8 = 254; } } diff --git a/solana/programs/matching-engine/src/processor/admin/initialize.rs b/solana/programs/matching-engine/src/processor/admin/initialize.rs index e6f2c2fc..fca48a9c 100644 --- a/solana/programs/matching-engine/src/processor/admin/initialize.rs +++ b/solana/programs/matching-engine/src/processor/admin/initialize.rs @@ -4,7 +4,7 @@ use crate::{ }; use anchor_lang::prelude::*; use anchor_spl::token; -use solana_program::bpf_loader_upgradeable; +use wormhole_solana_utils::cpi::bpf_loader_upgradeable::{self, BpfLoaderUpgradeable}; // Because this is used as the args for initialize, we'll make it public here. pub use crate::state::AuctionParameters; @@ -88,15 +88,53 @@ pub struct Initialize<'info> { )] program_data: Account<'info, ProgramData>, + /// CHECK: This program PDA will be the upgrade authority for the Token Router program. + #[account(address = common::constants::UPGRADE_MANAGER_AUTHORITY)] + upgrade_manager_authority: AccountInfo<'info>, + + /// CHECK: This program must exist. + #[account( + executable, + address = common::constants::UPGRADE_MANAGER_PROGRAM_ID, + )] + upgrade_manager_program: AccountInfo<'info>, + + bpf_loader_upgradeable_program: Program<'info, BpfLoaderUpgradeable>, system_program: Program<'info, System>, token_program: Program<'info, token::Token>, associated_token_program: Program<'info, anchor_spl::associated_token::AssociatedToken>, } -#[access_control(check_constraints(&ctx, &auction_params))] pub fn initialize(ctx: Context, auction_params: AuctionParameters) -> Result<()> { let owner: Pubkey = ctx.accounts.owner.key(); let auction_config_id = 0; + + // We need to check that the upgrade authority is the owner passed into the account context. + #[cfg(not(feature = "integration-test"))] + { + require_keys_eq!( + ctx.accounts.owner.key(), + ctx.accounts.program_data.upgrade_authority_address.unwrap(), + MatchingEngineError::OwnerOnly + ); + + bpf_loader_upgradeable::set_upgrade_authority( + CpiContext::new( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + bpf_loader_upgradeable::SetUpgradeAuthority { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.owner.to_account_info(), + new_authority: Some(ctx.accounts.upgrade_manager_authority.to_account_info()), + }, + ), + &crate::id(), + )?; + } + + crate::utils::auction::require_valid_parameters(&auction_params)?; + ctx.accounts.custodian.set_inner(Custodian { owner, pending_owner: None, @@ -114,25 +152,3 @@ pub fn initialize(ctx: Context, auction_params: AuctionParameters) - // Done. Ok(()) } - -fn check_constraints(ctx: &Context, params: &AuctionParameters) -> Result<()> { - // We need to check that the upgrade authority is the owner passed into the account context. - #[cfg(not(feature = "integration-test"))] - { - { - require_keys_eq!( - ctx.accounts.owner.key(), - ctx.accounts.program_data.upgrade_authority_address.unwrap(), - MatchingEngineError::OwnerOnly - ); - } - } - - // This prevents the unused variables warning popping up when this program is built. - let _ = ctx; - - crate::utils::auction::require_valid_parameters(params)?; - - // Done. - Ok(()) -} diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs index 0daa0a98..67bea622 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,7 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; use common::admin::utils::ownable::only_owner; -use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct CancelOwnershipTransferRequest<'info> { @@ -15,21 +14,6 @@ pub struct CancelOwnershipTransferRequest<'info> { constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, )] custodian: Account<'info, Custodian>, - - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - #[account( - mut, - seeds = [crate::ID.as_ref()], - bump, - seeds::program = bpf_loader_upgradeable_program, - )] - program_data: AccountInfo<'info>, - - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn cancel_ownership_transfer_request( @@ -37,24 +21,6 @@ pub fn cancel_ownership_transfer_request( ) -> Result<()> { common::admin::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); - // Finally set the upgrade authority back to the current owner. - #[cfg(not(feature = "integration-test"))] - { - common::admin::cpi::set_upgrade_authority_checked( - CpiContext::new_with_signer( - ctx.accounts - .bpf_loader_upgradeable_program - .to_account_info(), - common::admin::cpi::SetUpgradeAuthorityChecked { - program_data: ctx.accounts.program_data.to_account_info(), - current_authority: ctx.accounts.custodian.to_account_info(), - new_authority: ctx.accounts.owner.to_account_info(), - }, - &[Custodian::SIGNER_SEEDS], - ), - crate::ID, - )?; - } // Done. Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs index 82dff4e8..bdc2341f 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,7 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; use common::admin::utils::pending_owner; -use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct ConfirmOwnershipTransferRequest<'info> { @@ -21,21 +20,6 @@ pub struct ConfirmOwnershipTransferRequest<'info> { } @ MatchingEngineError::NotPendingOwner, )] custodian: Account<'info, Custodian>, - - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - #[account( - mut, - seeds = [crate::ID.as_ref()], - bump, - seeds::program = bpf_loader_upgradeable_program, - )] - program_data: AccountInfo<'info>, - - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn confirm_ownership_transfer_request( @@ -43,25 +27,6 @@ pub fn confirm_ownership_transfer_request( ) -> Result<()> { pending_owner::accept_ownership_unchecked(&mut ctx.accounts.custodian); - // Finally set the upgrade authority to the pending owner (the new owner). - #[cfg(not(feature = "integration-test"))] - { - common::admin::cpi::set_upgrade_authority_checked( - CpiContext::new_with_signer( - ctx.accounts - .bpf_loader_upgradeable_program - .to_account_info(), - common::admin::cpi::SetUpgradeAuthorityChecked { - program_data: ctx.accounts.program_data.to_account_info(), - current_authority: ctx.accounts.custodian.to_account_info(), - new_authority: ctx.accounts.pending_owner.to_account_info(), - }, - &[Custodian::SIGNER_SEEDS], - ), - crate::ID, - )?; - } - // Done. Ok(()) } diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs index 87d71546..332c779f 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,7 +1,6 @@ use crate::{error::MatchingEngineError, state::Custodian}; use anchor_lang::prelude::*; use common::admin::utils::ownable::only_owner; -use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct SubmitOwnershipTransferRequest<'info> { @@ -24,21 +23,6 @@ pub struct SubmitOwnershipTransferRequest<'info> { constraint = new_owner.key() != owner.key() @ MatchingEngineError::AlreadyOwner )] new_owner: AccountInfo<'info>, - - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - #[account( - mut, - seeds = [crate::ID.as_ref()], - bump, - seeds::program = bpf_loader_upgradeable_program, - )] - program_data: AccountInfo<'info>, - - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn submit_ownership_transfer_request( @@ -49,26 +33,6 @@ pub fn submit_ownership_transfer_request( &ctx.accounts.new_owner.key(), ); - // Set the upgrade authority to the custodian for now. It will be set to the new owner once the - // ownership transfer is confirmed. - #[cfg(not(feature = "integration-test"))] - { - common::admin::cpi::set_upgrade_authority_checked( - CpiContext::new_with_signer( - ctx.accounts - .bpf_loader_upgradeable_program - .to_account_info(), - common::admin::cpi::SetUpgradeAuthorityChecked { - program_data: ctx.accounts.program_data.to_account_info(), - current_authority: ctx.accounts.owner.to_account_info(), - new_authority: ctx.accounts.custodian.to_account_info(), - }, - &[Custodian::SIGNER_SEEDS], - ), - crate::ID, - )?; - } - // Done. Ok(()) } diff --git a/solana/programs/token-router/Cargo.toml b/solana/programs/token-router/Cargo.toml index f9865bce..c09cb143 100644 --- a/solana/programs/token-router/Cargo.toml +++ b/solana/programs/token-router/Cargo.toml @@ -12,7 +12,7 @@ repository.workspace = true crate-type = ["cdylib", "lib"] [features] -default = ["localnet", "no-idl"] +default = ["no-idl"] no-entrypoint = [] no-idl = [] no-log-ix-name = [] @@ -24,6 +24,7 @@ integration-test = ["localnet"] [dependencies] common.workspace = true matching-engine = { workspace = true, features = ["cpi"] } +wormhole-solana-utils.workspace = true anchor-lang = { workspace = true, features = ["derive", "init-if-needed"] } anchor-spl.workspace = true diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index 5e6aef7c..a031ee2f 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -1,4 +1,7 @@ -#[anchor_lang::prelude::error_code] +use anchor_lang::prelude::*; +use common::admin::utils::upgrade::RequireValidInstructionsError; + +#[error_code] pub enum TokenRouterError { /// Only the program's owner is permitted. #[msg("OwnerOnly")] @@ -11,6 +14,12 @@ pub enum TokenRouterError { #[msg("InvalidCustodyToken")] InvalidCustodyToken = 0x6, + #[msg("CpiDisallowed")] + CpiDisallowed = 0x8, + + #[msg("UpgradeManagerRequired")] + UpgradeManagerRequired = 0x10, + #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x20, @@ -92,3 +101,19 @@ pub enum TokenRouterError { #[msg("RedeemerMismatch")] RedeemerMismatch = 0x220, } + +impl RequireValidInstructionsError for TokenRouterError { + fn require_eq_this_program(actual_program_id: Pubkey) -> Result<()> { + require_keys_eq!(actual_program_id, crate::ID, Self::CpiDisallowed); + Ok(()) + } + + fn require_eq_upgrade_manager(actual_program_id: Pubkey) -> Result<()> { + require_keys_eq!( + actual_program_id, + common::constants::UPGRADE_MANAGER_PROGRAM_ID, + Self::UpgradeManagerRequired + ); + Ok(()) + } +} diff --git a/solana/programs/token-router/src/lib.rs b/solana/programs/token-router/src/lib.rs index 309f1f68..798f0f36 100644 --- a/solana/programs/token-router/src/lib.rs +++ b/solana/programs/token-router/src/lib.rs @@ -12,12 +12,12 @@ pub mod state; use anchor_lang::prelude::*; +declare_id!(common::constants::TOKEN_ROUTER_PROGRAM_ID); + cfg_if::cfg_if! { if #[cfg(feature = "testnet")] { - declare_id!("tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md"); const CUSTODIAN_BUMP: u8 = 255; } else if #[cfg(feature = "localnet")] { - declare_id!("TokenRouter11111111111111111111111111111111"); const CUSTODIAN_BUMP: u8 = 253; } } @@ -210,4 +210,8 @@ pub mod token_router { // ) -> Result<()> { // processor::complete_wrapped_transfer_with_relay(ctx, _vaa_hash) // } + + pub fn authorize_upgrade(ctx: Context) -> Result<()> { + processor::authorize_upgrade(ctx) + } } diff --git a/solana/programs/token-router/src/processor/admin/authorize_upgrade.rs b/solana/programs/token-router/src/processor/admin/authorize_upgrade.rs new file mode 100644 index 00000000..105fa798 --- /dev/null +++ b/solana/programs/token-router/src/processor/admin/authorize_upgrade.rs @@ -0,0 +1,26 @@ +use crate::{error::TokenRouterError, state::Custodian}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct AuthorizeUpgrade<'info> { + owner: Signer<'info>, + + #[account( + mut, + seeds = [Custodian::SEED_PREFIX], + bump = Custodian::BUMP, + has_one = owner @ TokenRouterError::OwnerOnly, + constraint = custodian.pending_owner.is_none(), // TODO: add error + )] + custodian: Account<'info, Custodian>, + + #[account(address = common::constants::UPGRADE_MANAGER_AUTHORITY)] + upgrade_manager_authority: Signer<'info>, +} + +pub fn authorize_upgrade(ctx: Context) -> Result<()> { + ctx.accounts.custodian.owner = ctx.accounts.upgrade_manager_authority.key(); + + // Done. + Ok(()) +} diff --git a/solana/programs/token-router/src/processor/admin/initialize.rs b/solana/programs/token-router/src/processor/admin/initialize.rs index a53899d9..03f51fd6 100644 --- a/solana/programs/token-router/src/processor/admin/initialize.rs +++ b/solana/programs/token-router/src/processor/admin/initialize.rs @@ -1,7 +1,7 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use anchor_spl::token; -use solana_program::bpf_loader_upgradeable; +use wormhole_solana_utils::cpi::bpf_loader_upgradeable::{self, BpfLoaderUpgradeable}; #[derive(Accounts)] pub struct Initialize<'info> { @@ -56,6 +56,18 @@ pub struct Initialize<'info> { )] program_data: Account<'info, ProgramData>, + /// CHECK: This program PDA will be the upgrade authority for the Token Router program. + #[account(address = common::constants::UPGRADE_MANAGER_AUTHORITY)] + upgrade_manager_authority: AccountInfo<'info>, + + /// CHECK: This program must exist. + #[account( + executable, + address = common::constants::UPGRADE_MANAGER_PROGRAM_ID, + )] + upgrade_manager_program: AccountInfo<'info>, + + bpf_loader_upgradeable_program: Program<'info, BpfLoaderUpgradeable>, system_program: Program<'info, System>, token_program: Program<'info, token::Token>, associated_token_program: Program<'info, anchor_spl::associated_token::AssociatedToken>, @@ -68,10 +80,24 @@ pub fn initialize(ctx: Context) -> Result<()> { #[cfg(not(feature = "integration-test"))] { require_keys_eq!( - owner, + ctx.accounts.owner.key(), ctx.accounts.program_data.upgrade_authority_address.unwrap(), TokenRouterError::OwnerOnly ); + + bpf_loader_upgradeable::set_upgrade_authority( + CpiContext::new( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + bpf_loader_upgradeable::SetUpgradeAuthority { + program_data: ctx.accounts.program_data.to_account_info(), + current_authority: ctx.accounts.owner.to_account_info(), + new_authority: Some(ctx.accounts.upgrade_manager_authority.to_account_info()), + }, + ), + &crate::id(), + )?; } ctx.accounts.custodian.set_inner(Custodian { diff --git a/solana/programs/token-router/src/processor/admin/mod.rs b/solana/programs/token-router/src/processor/admin/mod.rs index 9364992f..0d7b607c 100644 --- a/solana/programs/token-router/src/processor/admin/mod.rs +++ b/solana/programs/token-router/src/processor/admin/mod.rs @@ -1,3 +1,6 @@ +mod authorize_upgrade; +pub use authorize_upgrade::*; + mod initialize; pub use initialize::*; diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs index f2811372..22a15ece 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,6 +1,5 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; -use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct CancelOwnershipTransferRequest<'info> { @@ -14,21 +13,6 @@ pub struct CancelOwnershipTransferRequest<'info> { has_one = owner @ TokenRouterError::OwnerOnly, )] custodian: Account<'info, Custodian>, - - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - #[account( - mut, - seeds = [crate::ID.as_ref()], - bump, - seeds::program = bpf_loader_upgradeable_program, - )] - program_data: AccountInfo<'info>, - - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn cancel_ownership_transfer_request( @@ -36,25 +20,6 @@ pub fn cancel_ownership_transfer_request( ) -> Result<()> { common::admin::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); - // Finally set the upgrade authority back to the current owner. - #[cfg(not(feature = "integration-test"))] - { - common::admin::cpi::set_upgrade_authority_checked( - CpiContext::new_with_signer( - ctx.accounts - .bpf_loader_upgradeable_program - .to_account_info(), - common::admin::cpi::SetUpgradeAuthorityChecked { - program_data: ctx.accounts.program_data.to_account_info(), - current_authority: ctx.accounts.custodian.to_account_info(), - new_authority: ctx.accounts.owner.to_account_info(), - }, - &[Custodian::SIGNER_SEEDS], - ), - crate::ID, - )?; - } - // Done. Ok(()) } diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs index 580c19f8..79577a04 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/confirm.rs @@ -1,8 +1,6 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; use common::admin::utils::pending_owner; -use solana_program::bpf_loader_upgradeable; - #[derive(Accounts)] pub struct ConfirmOwnershipTransferRequest<'info> { /// Must be the pending owner of the program set in the [`OwnerConfig`] @@ -21,21 +19,6 @@ pub struct ConfirmOwnershipTransferRequest<'info> { } @ TokenRouterError::NotPendingOwner, )] custodian: Account<'info, Custodian>, - - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - #[account( - mut, - seeds = [crate::ID.as_ref()], - bump, - seeds::program = bpf_loader_upgradeable_program, - )] - program_data: AccountInfo<'info>, - - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn confirm_ownership_transfer_request( @@ -43,25 +26,6 @@ pub fn confirm_ownership_transfer_request( ) -> Result<()> { pending_owner::accept_ownership_unchecked(&mut ctx.accounts.custodian); - // Finally set the upgrade authority to the pending owner (the new owner). - #[cfg(not(feature = "integration-test"))] - { - common::admin::cpi::set_upgrade_authority_checked( - CpiContext::new_with_signer( - ctx.accounts - .bpf_loader_upgradeable_program - .to_account_info(), - common::admin::cpi::SetUpgradeAuthorityChecked { - program_data: ctx.accounts.program_data.to_account_info(), - current_authority: ctx.accounts.custodian.to_account_info(), - new_authority: ctx.accounts.pending_owner.to_account_info(), - }, - &[Custodian::SIGNER_SEEDS], - ), - crate::ID, - )?; - } - // Done. Ok(()) } diff --git a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs index 65eeca0c..8c7624c5 100644 --- a/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/token-router/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,6 +1,5 @@ use crate::{error::TokenRouterError, state::Custodian}; use anchor_lang::prelude::*; -use solana_program::bpf_loader_upgradeable; #[derive(Accounts)] pub struct SubmitOwnershipTransferRequest<'info> { @@ -23,21 +22,6 @@ pub struct SubmitOwnershipTransferRequest<'info> { constraint = new_owner.key() != owner.key() @ TokenRouterError::AlreadyOwner )] new_owner: AccountInfo<'info>, - - /// CHECK: BPF Loader Upgradeable program needs to modify this program's data to change the - /// upgrade authority. We check this PDA address just in case there is another program that this - /// deployer has deployed. - #[account( - mut, - seeds = [crate::ID.as_ref()], - bump, - seeds::program = bpf_loader_upgradeable_program, - )] - program_data: AccountInfo<'info>, - - /// CHECK: The account's pubkey must be the BPF Loader Upgradeable program's. - #[account(address = bpf_loader_upgradeable::id())] - bpf_loader_upgradeable_program: AccountInfo<'info>, } pub fn submit_ownership_transfer_request( @@ -48,26 +32,6 @@ pub fn submit_ownership_transfer_request( &ctx.accounts.new_owner.key(), ); - // Set the upgrade authority to the custodian for now. It will be set to the new owner once the - // ownership transfer is confirmed. - #[cfg(not(feature = "integration-test"))] - { - common::admin::cpi::set_upgrade_authority_checked( - CpiContext::new_with_signer( - ctx.accounts - .bpf_loader_upgradeable_program - .to_account_info(), - common::admin::cpi::SetUpgradeAuthorityChecked { - program_data: ctx.accounts.program_data.to_account_info(), - current_authority: ctx.accounts.owner.to_account_info(), - new_authority: ctx.accounts.custodian.to_account_info(), - }, - &[Custodian::SIGNER_SEEDS], - ), - crate::ID, - )?; - } - // Done. Ok(()) } diff --git a/solana/programs/upgrade-manager/Cargo.toml b/solana/programs/upgrade-manager/Cargo.toml new file mode 100644 index 00000000..46242fcb --- /dev/null +++ b/solana/programs/upgrade-manager/Cargo.toml @@ -0,0 +1,38 @@ +[package] +name = "upgrade-manager" +description = "Example Liquidity Layer Upgrade Manager" +version.workspace = true +edition.workspace = true +authors.workspace = true +license.workspace = true +homepage.workspace = true +repository.workspace = true + +[lib] +crate-type = ["cdylib", "lib"] + +[features] +default = ["no-idl"] +no-entrypoint = [] +no-idl = [] +no-log-ix-name = [] +cpi = ["no-entrypoint"] +testnet = ["common/testnet", "matching-engine/testnet", "token-router/testnet"] +localnet = ["common/localnet", "matching-engine/localnet", "token-router/localnet"] +integration-test = ["localnet"] + +[dependencies] +common.workspace = true +wormhole-solana-utils.workspace = true + +matching-engine = { workspace = true, features = ["cpi"] } +token-router = { workspace = true, features = ["cpi"] } + +anchor-lang = { workspace = true, features = ["derive"] } +solana-program.workspace = true + +hex.workspace = true +cfg-if.workspace = true + +[dev-dependencies] +hex-literal.workspace = true \ No newline at end of file diff --git a/solana/programs/upgrade-manager/README.md b/solana/programs/upgrade-manager/README.md new file mode 100644 index 00000000..e69de29b diff --git a/solana/programs/upgrade-manager/src/lib.rs b/solana/programs/upgrade-manager/src/lib.rs new file mode 100644 index 00000000..77e48294 --- /dev/null +++ b/solana/programs/upgrade-manager/src/lib.rs @@ -0,0 +1,53 @@ +#![doc = include_str!("../README.md")] +#![allow(clippy::result_large_err)] + +mod processor; +pub(crate) use processor::*; + +pub mod state; + +use anchor_lang::prelude::*; + +declare_id!(common::constants::UPGRADE_MANAGER_PROGRAM_ID); + +cfg_if::cfg_if! { + if #[cfg(feature = "testnet")] { + const UPGRADE_AUTHORITY_BUMP: u8 = 255; + } else if #[cfg(feature = "localnet")] { + const UPGRADE_AUTHORITY_BUMP: u8 = 255; + } +} + +const UPGRADE_AUTHORITY_SEED_PREFIX: &[u8] = b"upgrade"; +const UPGRADE_AUTHORITY_SIGNER_SEEDS: &[&[u8]] = + &[UPGRADE_AUTHORITY_SEED_PREFIX, &[UPGRADE_AUTHORITY_BUMP]]; + +#[cfg(test)] +mod test { + use super::*; + + #[test] + fn upgrade_authority() { + let (actual_addr, actual_bump_seed) = + Pubkey::find_program_address(&[UPGRADE_AUTHORITY_SEED_PREFIX], &crate::id()); + assert_eq!(actual_bump_seed, UPGRADE_AUTHORITY_BUMP); + assert_eq!(actual_addr, common::constants::UPGRADE_MANAGER_AUTHORITY); + } +} + +#[program] +pub mod upgrade_manager { + use super::*; + + // Matching Engine + + pub fn upgrade_matching_engine(ctx: Context) -> Result<()> { + processor::upgrade_matching_engine(ctx) + } + + // Token Router + + pub fn execute_token_router_upgrade(ctx: Context) -> Result<()> { + processor::execute_token_router_upgrade(ctx) + } +} diff --git a/solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/mod.rs b/solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/mod.rs new file mode 100644 index 00000000..b86d4934 --- /dev/null +++ b/solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/mod.rs @@ -0,0 +1,2 @@ +mod upgrade; +pub use upgrade::*; diff --git a/solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/upgrade.rs b/solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/upgrade.rs new file mode 100644 index 00000000..e15362a8 --- /dev/null +++ b/solana/programs/upgrade-manager/src/processor/matching_engine_upgrade/upgrade.rs @@ -0,0 +1,90 @@ +use anchor_lang::prelude::*; +use wormhole_solana_utils::cpi::bpf_loader_upgradeable::{self, BpfLoaderUpgradeable}; + +#[derive(Accounts)] +pub struct UpgradeMatchingEngine<'info> { + /// Owner of this program. Must match the upgrade authority in this program data. + #[account( + mut, + address = program_data.upgrade_authority_address.unwrap_or_default() + )] + owner: Signer<'info>, + + /// Program data for this program. Its upgrade authority must match the owner. + #[account( + mut, + seeds = [crate::id().as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + program_data: Account<'info, ProgramData>, + + /// CHECK: Upgrade authority for the liquidity layer program (either Token Router or Matching + /// Engine). This address must equal the liquidity layer program data's upgrade authority. + #[account(address = common::constants::UPGRADE_MANAGER_AUTHORITY)] + upgrade_authority: AccountInfo<'info>, + + /// Deployed implementation of liquidity layer. + /// + /// CHECK: This address must be the deployed implementation pubkey. + #[account(mut)] + matching_engine_buffer: AccountInfo<'info>, + + /// CHECK: Must be BPF Loader Upgradeable's PDA of liquidity layer program's program data. + #[account( + mut, + seeds = [matching_engine_program.key().as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + matching_engine_program_data: Account<'info, ProgramData>, + + /// CHECK: Must be Token Router program . We cannot use the Program<'info, ..> definition here + /// because we cannot set this account to be mutable in that case. + #[account( + mut, + address = common::constants::MATCHING_ENGINE_PROGRAM_ID, + )] + matching_engine_program: AccountInfo<'info>, + + bpf_loader_upgradeable_program: Program<'info, BpfLoaderUpgradeable>, + + /// CHECK: Must be rent sysvar pubkey. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, + + /// CHECK: Must be clock sysvar pubkey. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, +} + +pub fn upgrade_matching_engine(ctx: Context) -> Result<()> { + // First set the buffer's authority to the upgrade authority. + bpf_loader_upgradeable::set_buffer_authority_checked(CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + bpf_loader_upgradeable::SetBufferAuthorityChecked { + buffer: ctx.accounts.matching_engine_buffer.to_account_info(), + current_authority: ctx.accounts.owner.to_account_info(), + new_authority: ctx.accounts.upgrade_authority.to_account_info(), + }, + &[crate::UPGRADE_AUTHORITY_SIGNER_SEEDS], + ))?; + + bpf_loader_upgradeable::upgrade(CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + bpf_loader_upgradeable::Upgrade { + program: ctx.accounts.matching_engine_program.to_account_info(), + program_data: ctx.accounts.matching_engine_program_data.to_account_info(), + buffer: ctx.accounts.matching_engine_buffer.to_account_info(), + authority: ctx.accounts.upgrade_authority.to_account_info(), + spill: ctx.accounts.owner.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + }, + &[crate::UPGRADE_AUTHORITY_SIGNER_SEEDS], + )) +} diff --git a/solana/programs/upgrade-manager/src/processor/mod.rs b/solana/programs/upgrade-manager/src/processor/mod.rs new file mode 100644 index 00000000..8a88dc8f --- /dev/null +++ b/solana/programs/upgrade-manager/src/processor/mod.rs @@ -0,0 +1,5 @@ +mod matching_engine_upgrade; +pub use matching_engine_upgrade::*; + +mod token_router_upgrade; +pub use token_router_upgrade::*; diff --git a/solana/programs/upgrade-manager/src/processor/token_router_upgrade/execute.rs b/solana/programs/upgrade-manager/src/processor/token_router_upgrade/execute.rs new file mode 100644 index 00000000..32ecd2c5 --- /dev/null +++ b/solana/programs/upgrade-manager/src/processor/token_router_upgrade/execute.rs @@ -0,0 +1,113 @@ +use anchor_lang::prelude::*; +use wormhole_solana_utils::cpi::bpf_loader_upgradeable::{self, BpfLoaderUpgradeable}; + +use crate::{state::UpgradeReceipt, UPGRADE_AUTHORITY_SIGNER_SEEDS}; + +#[derive(Accounts)] +pub struct ExecuteTokenRouterUpgrade<'info> { + /// Owner of this program. Must match the upgrade authority in this program data. + #[account(mut)] + owner: Signer<'info>, + + /// CHECK: Upgrade authority for the liquidity layer program (either Token Router or Matching + /// Engine). This address must equal the liquidity layer program data's upgrade authority. + #[account(address = common::constants::UPGRADE_MANAGER_AUTHORITY)] + upgrade_authority: AccountInfo<'info>, + + #[account( + init, + payer = owner, + space = 8 + UpgradeReceipt::INIT_SPACE, + seeds = [ + UpgradeReceipt::SEED_PREFIX, + token_router_program.key().as_ref(), + ], + bump, + )] + upgrade_receipt: Account<'info, UpgradeReceipt>, + + /// Deployed implementation of liquidity layer. + /// + /// CHECK: This address must be the deployed implementation pubkey. + #[account(mut)] + token_router_buffer: AccountInfo<'info>, + + /// CHECK: Must be BPF Loader Upgradeable's PDA of liquidity layer program's program data. + #[account( + mut, + seeds = [token_router_program.key().as_ref()], + bump, + seeds::program = bpf_loader_upgradeable_program, + )] + token_router_program_data: Account<'info, ProgramData>, + + #[account(mut)] + token_router_custodian: Account<'info, token_router::state::Custodian>, + + /// CHECK: Must be Token Router program . We cannot use the Program<'info, ..> definition here + /// because we cannot set this account to be mutable in that case. + #[account( + mut, + address = common::constants::TOKEN_ROUTER_PROGRAM_ID, + )] + token_router_program: AccountInfo<'info>, + + bpf_loader_upgradeable_program: Program<'info, BpfLoaderUpgradeable>, + system_program: Program<'info, System>, + + /// CHECK: Must be rent sysvar pubkey. + #[account(address = solana_program::sysvar::rent::id())] + rent: AccountInfo<'info>, + + /// CHECK: Must be clock sysvar pubkey. + #[account(address = solana_program::sysvar::clock::id())] + clock: AccountInfo<'info>, +} + +pub fn execute_token_router_upgrade(ctx: Context) -> Result<()> { + token_router::cpi::authorize_upgrade(CpiContext::new_with_signer( + ctx.accounts.token_router_program.to_account_info(), + token_router::cpi::accounts::AuthorizeUpgrade { + owner: ctx.accounts.owner.to_account_info(), + custodian: ctx.accounts.token_router_custodian.to_account_info(), + upgrade_manager_authority: ctx.accounts.upgrade_authority.to_account_info(), + }, + &[UPGRADE_AUTHORITY_SIGNER_SEEDS], + ))?; + + ctx.accounts.upgrade_receipt.set_inner(UpgradeReceipt { + bump: ctx.bumps.upgrade_receipt, + owner: *ctx.accounts.owner.key, + buffer: *ctx.accounts.token_router_buffer.key, + slot: Clock::get().map(|clock| clock.slot)?, + }); + + // First set the buffer's authority to the upgrade authority. + bpf_loader_upgradeable::set_buffer_authority_checked(CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + bpf_loader_upgradeable::SetBufferAuthorityChecked { + buffer: ctx.accounts.token_router_buffer.to_account_info(), + current_authority: ctx.accounts.owner.to_account_info(), + new_authority: ctx.accounts.upgrade_authority.to_account_info(), + }, + &[UPGRADE_AUTHORITY_SIGNER_SEEDS], + ))?; + + bpf_loader_upgradeable::upgrade(CpiContext::new_with_signer( + ctx.accounts + .bpf_loader_upgradeable_program + .to_account_info(), + bpf_loader_upgradeable::Upgrade { + program: ctx.accounts.token_router_program.to_account_info(), + program_data: ctx.accounts.token_router_program_data.to_account_info(), + buffer: ctx.accounts.token_router_buffer.to_account_info(), + authority: ctx.accounts.upgrade_authority.to_account_info(), + spill: ctx.accounts.owner.to_account_info(), + rent: ctx.accounts.rent.to_account_info(), + clock: ctx.accounts.clock.to_account_info(), + }, + &[UPGRADE_AUTHORITY_SIGNER_SEEDS], + )) +} diff --git a/solana/programs/upgrade-manager/src/processor/token_router_upgrade/mod.rs b/solana/programs/upgrade-manager/src/processor/token_router_upgrade/mod.rs new file mode 100644 index 00000000..f51120ae --- /dev/null +++ b/solana/programs/upgrade-manager/src/processor/token_router_upgrade/mod.rs @@ -0,0 +1,2 @@ +mod execute; +pub use execute::*; diff --git a/solana/programs/upgrade-manager/src/state/mod.rs b/solana/programs/upgrade-manager/src/state/mod.rs new file mode 100644 index 00000000..ea5fd803 --- /dev/null +++ b/solana/programs/upgrade-manager/src/state/mod.rs @@ -0,0 +1,2 @@ +mod upgrade_receipt; +pub use upgrade_receipt::*; diff --git a/solana/programs/upgrade-manager/src/state/upgrade_receipt.rs b/solana/programs/upgrade-manager/src/state/upgrade_receipt.rs new file mode 100644 index 00000000..4e7862da --- /dev/null +++ b/solana/programs/upgrade-manager/src/state/upgrade_receipt.rs @@ -0,0 +1,15 @@ +use anchor_lang::prelude::*; + +#[account] +#[derive(Debug, InitSpace)] +pub struct UpgradeReceipt { + pub bump: u8, + + pub owner: Pubkey, + pub buffer: Pubkey, + pub slot: u64, +} + +impl UpgradeReceipt { + pub const SEED_PREFIX: &'static [u8] = b"receipt"; +} diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index d38d79ef..f8e3c202 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -15,21 +15,22 @@ import { import { IDL, MatchingEngine } from "../../../target/types/matching_engine"; import { USDC_MINT_ADDRESS } from "../../tests/helpers"; import { MessageTransmitterProgram, TokenMessengerMinterProgram } from "../cctp"; -import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; +import { LiquidityLayerMessage } from "../messages"; +import { UpgradeManagerProgram } from "../upgradeManager"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, programDataAddress } from "../utils"; import { VaaAccount } from "../wormhole"; import { - AuctionConfig, Auction, + AuctionConfig, + AuctionInfo, + AuctionParameters, Custodian, PayerSequence, PreparedOrderResponse, Proposal, RedeemedFastFill, RouterEndpoint, - AuctionParameters, - AuctionInfo, } from "./state"; -import { LiquidityLayerMessage } from "../messages"; export const PROGRAM_IDS = [ "MatchingEngine11111111111111111111111111111", @@ -315,6 +316,7 @@ export class MatchingEngineProgram { ): Promise { const { owner, ownerAssistant, feeRecipient, mint: inputMint } = accounts; + const upgradeManager = this.upgradeManagerProgram(); return this.program.methods .initialize(auctionParams) .accounts({ @@ -326,7 +328,10 @@ export class MatchingEngineProgram { feeRecipientToken: splToken.getAssociatedTokenAddressSync(this.mint, feeRecipient), cctpMintRecipient: this.cctpMintRecipientAddress(), mint: inputMint ?? this.mint, - programData: getProgramData(this.ID), + programData: programDataAddress(this.ID), + upgradeManagerAuthority: upgradeManager.upgradeAuthorityAddress(), + upgradeManagerProgram: upgradeManager.ID, + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -343,8 +348,6 @@ export class MatchingEngineProgram { owner, custodian: inputCustodian ?? this.custodianAddress(), newOwner, - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -359,8 +362,6 @@ export class MatchingEngineProgram { .accounts({ pendingOwner, custodian: inputCustodian ?? this.custodianAddress(), - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -375,8 +376,6 @@ export class MatchingEngineProgram { .accounts({ owner, custodian: inputCustodian ?? this.custodianAddress(), - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -1375,6 +1374,26 @@ export class MatchingEngineProgram { }; } + upgradeManagerProgram(): UpgradeManagerProgram { + switch (this._programId) { + case testnet(): { + return new UpgradeManagerProgram( + this.program.provider.connection, + "ucdP9ktgrXgEUnn6roqD2SfdGMR2JSiWHUKv23oXwxt", + ); + } + case localnet(): { + return new UpgradeManagerProgram( + this.program.provider.connection, + "UpgradeManager11111111111111111111111111111", + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { switch (this._programId) { case testnet(): { diff --git a/solana/ts/src/tokenRouter/index.ts b/solana/ts/src/tokenRouter/index.ts index fa8061e9..caf083ae 100644 --- a/solana/ts/src/tokenRouter/index.ts +++ b/solana/ts/src/tokenRouter/index.ts @@ -6,6 +6,7 @@ import { Connection, PublicKey, SYSVAR_CLOCK_PUBKEY, + SYSVAR_INSTRUCTIONS_PUBKEY, SYSVAR_RENT_PUBKEY, SystemProgram, TransactionInstruction, @@ -17,9 +18,10 @@ import { TokenMessengerMinterProgram, } from "../cctp"; import * as matchingEngineSdk from "../matchingEngine"; -import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, getProgramData } from "../utils"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, programDataAddress } from "../utils"; import { VaaAccount } from "../wormhole"; import { Custodian, PayerSequence, PreparedFill, PreparedOrder } from "./state"; +import { UpgradeManagerProgram } from "../upgradeManager"; export const PROGRAM_IDS = [ "TokenRouter11111111111111111111111111111111", @@ -616,6 +618,8 @@ export class TokenRouterProgram { mint?: PublicKey; }): Promise { const { owner, ownerAssistant, mint: inputMint } = accounts; + + const upgradeManager = this.upgradeManagerProgram(); return this.program.methods .initialize() .accounts({ @@ -624,7 +628,10 @@ export class TokenRouterProgram { ownerAssistant, mint: inputMint ?? this.mint, cctpMintRecipient: this.cctpMintRecipientAddress(), - programData: getProgramData(this.ID), + programData: programDataAddress(this.ID), + upgradeManagerAuthority: upgradeManager.upgradeAuthorityAddress(), + upgradeManagerProgram: upgradeManager.ID, + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -658,8 +665,6 @@ export class TokenRouterProgram { owner, custodian: inputCustodian ?? this.custodianAddress(), newOwner, - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -674,8 +679,6 @@ export class TokenRouterProgram { .accounts({ pendingOwner, custodian: inputCustodian ?? this.custodianAddress(), - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -690,8 +693,6 @@ export class TokenRouterProgram { .accounts({ owner, custodian: inputCustodian ?? this.custodianAddress(), - programData: getProgramData(this.ID), - bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, }) .instruction(); } @@ -732,6 +733,26 @@ export class TokenRouterProgram { }; } + upgradeManagerProgram(): UpgradeManagerProgram { + switch (this._programId) { + case testnet(): { + return new UpgradeManagerProgram( + this.program.provider.connection, + "ucdP9ktgrXgEUnn6roqD2SfdGMR2JSiWHUKv23oXwxt", + ); + } + case localnet(): { + return new UpgradeManagerProgram( + this.program.provider.connection, + "UpgradeManager11111111111111111111111111111", + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + tokenMessengerMinterProgram(): TokenMessengerMinterProgram { switch (this._programId) { case testnet(): { diff --git a/solana/ts/src/tokenRouter/state/index.ts b/solana/ts/src/tokenRouter/state/index.ts index 6298364a..b9ac8d58 100644 --- a/solana/ts/src/tokenRouter/state/index.ts +++ b/solana/ts/src/tokenRouter/state/index.ts @@ -10,6 +10,6 @@ import { PublicKey } from "@solana/web3.js"; export function deriveCoreMessageKey(programId: PublicKey, payer: PublicKey, sequence: BN) { return solana.deriveAddress( [Buffer.from("msg"), payer.toBuffer(), sequence.toBuffer()], - programId + programId, ); } diff --git a/solana/ts/src/upgradeManager/index.ts b/solana/ts/src/upgradeManager/index.ts new file mode 100644 index 00000000..424e3dea --- /dev/null +++ b/solana/ts/src/upgradeManager/index.ts @@ -0,0 +1,146 @@ +export * from "./state"; + +import { Program } from "@coral-xyz/anchor"; +import { + Connection, + PublicKey, + SYSVAR_INSTRUCTIONS_PUBKEY, + TransactionInstruction, +} from "@solana/web3.js"; +import { IDL, UpgradeManager } from "../../../target/types/upgrade_manager"; +import * as matchingEngineSdk from "../matchingEngine"; +import * as tokenRouterSdk from "../tokenRouter"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, programDataAddress } from "../utils"; +import { UpgradeReceipt } from "./state"; + +export const PROGRAM_IDS = [ + "UpgradeManager11111111111111111111111111111", + "ucdP9ktgrXgEUnn6roqD2SfdGMR2JSiWHUKv23oXwxt", +] as const; + +export type ProgramId = (typeof PROGRAM_IDS)[number]; + +export class UpgradeManagerProgram { + private _programId: ProgramId; + + program: Program; + + constructor(connection: Connection, programId: ProgramId) { + this._programId = programId; + this.program = new Program(IDL as any, new PublicKey(this._programId), { + connection, + }); + } + + get ID(): PublicKey { + return this.program.programId; + } + + upgradeAuthorityAddress(): PublicKey { + return PublicKey.findProgramAddressSync([Buffer.from("upgrade")], this.ID)[0]; + } + + upgradeReceiptAddress(otherProgram: PublicKey): PublicKey { + return UpgradeReceipt.address(this.ID, otherProgram); + } + + async fetchUpgradeReceipt(input: PublicKey | { address: PublicKey }): Promise { + const addr = "address" in input ? input.address : this.upgradeReceiptAddress(input); + return this.program.account.upgradeReceipt.fetch(addr); + } + + async upgradeMatchingEngineIx(accounts: { + owner: PublicKey; + matchingEngineBuffer: PublicKey; + }): Promise { + const { owner, matchingEngineBuffer } = accounts; + + const matchingEngine = this.matchingEngineProgram(); + return this.program.methods + .upgradeMatchingEngine() + .accounts({ + owner, + programData: programDataAddress(this.ID), + upgradeAuthority: this.upgradeAuthorityAddress(), + matchingEngineBuffer, + matchingEngineProgramData: programDataAddress(matchingEngine.ID), + matchingEngineProgram: matchingEngine.ID, + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + }) + .instruction(); + } + + async executeTokenRouterUpgradeIx(accounts: { + owner: PublicKey; + tokenRouterBuffer: PublicKey; + }): Promise { + const { owner, tokenRouterBuffer } = accounts; + + const tokenRouter = this.tokenRouterProgram(); + return this.program.methods + .executeTokenRouterUpgrade() + .accounts({ + owner, + upgradeAuthority: this.upgradeAuthorityAddress(), + upgradeReceipt: this.upgradeReceiptAddress(tokenRouter.ID), + tokenRouterBuffer, + tokenRouterProgramData: programDataAddress(tokenRouter.ID), + tokenRouterCustodian: tokenRouter.custodianAddress(), + tokenRouterProgram: tokenRouter.ID, + bpfLoaderUpgradeableProgram: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + }) + .instruction(); + } + + matchingEngineProgram(): matchingEngineSdk.MatchingEngineProgram { + switch (this._programId) { + case testnet(): { + return new matchingEngineSdk.MatchingEngineProgram( + this.program.provider.connection, + matchingEngineSdk.testnet(), + PublicKey.default, + ); + } + case localnet(): { + return new matchingEngineSdk.MatchingEngineProgram( + this.program.provider.connection, + matchingEngineSdk.localnet(), + PublicKey.default, + ); + } + default: { + throw new Error("unsupported network"); + } + } + } + + tokenRouterProgram(): tokenRouterSdk.TokenRouterProgram { + switch (this._programId) { + case testnet(): { + return new tokenRouterSdk.TokenRouterProgram( + this.program.provider.connection, + tokenRouterSdk.testnet(), + PublicKey.default, + ); + } + case localnet(): { + return new tokenRouterSdk.TokenRouterProgram( + this.program.provider.connection, + tokenRouterSdk.localnet(), + PublicKey.default, + ); + } + default: { + throw new Error("unsupported network"); + } + } + } +} + +export function testnet(): ProgramId { + return "ucdP9ktgrXgEUnn6roqD2SfdGMR2JSiWHUKv23oXwxt"; +} + +export function localnet(): ProgramId { + return "UpgradeManager11111111111111111111111111111"; +} diff --git a/solana/ts/src/upgradeManager/state/UpgradeReceipt.ts b/solana/ts/src/upgradeManager/state/UpgradeReceipt.ts new file mode 100644 index 00000000..6f9891c1 --- /dev/null +++ b/solana/ts/src/upgradeManager/state/UpgradeReceipt.ts @@ -0,0 +1,23 @@ +import { BN } from "@coral-xyz/anchor"; +import { PublicKey } from "@solana/web3.js"; + +export class UpgradeReceipt { + bump: number; + owner: PublicKey; + buffer: PublicKey; + slot: BN; + + constructor(bump: number, owner: PublicKey, buffer: PublicKey, slot: BN) { + this.bump = bump; + this.owner = owner; + this.buffer = buffer; + this.slot = slot; + } + + static address(programId: PublicKey, otherProgram: PublicKey) { + return PublicKey.findProgramAddressSync( + [Buffer.from("receipt"), otherProgram.toBuffer()], + programId, + )[0]; + } +} diff --git a/solana/ts/src/upgradeManager/state/index.ts b/solana/ts/src/upgradeManager/state/index.ts new file mode 100644 index 00000000..851ae6a2 --- /dev/null +++ b/solana/ts/src/upgradeManager/state/index.ts @@ -0,0 +1 @@ +export * from "./UpgradeReceipt"; diff --git a/solana/ts/src/utils.ts b/solana/ts/src/utils.ts index 6d5a24f0..cc0fb1b3 100644 --- a/solana/ts/src/utils.ts +++ b/solana/ts/src/utils.ts @@ -1,12 +1,12 @@ import { PublicKey } from "@solana/web3.js"; export const BPF_LOADER_UPGRADEABLE_PROGRAM_ID = new PublicKey( - "BPFLoaderUpgradeab1e11111111111111111111111" + "BPFLoaderUpgradeab1e11111111111111111111111", ); -export function getProgramData(programId: PublicKey) { +export function programDataAddress(programId: PublicKey) { return PublicKey.findProgramAddressSync( [programId.toBuffer()], - BPF_LOADER_UPGRADEABLE_PROGRAM_ID + BPF_LOADER_UPGRADEABLE_PROGRAM_ID, )[0]; } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 521a70b6..ecc56823 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -39,6 +39,7 @@ import { LOCALHOST, MOCK_GUARDIANS, OWNER_ASSISTANT_KEYPAIR, + OWNER_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, bigintToU64BN, @@ -60,7 +61,7 @@ describe("Matching Engine", function () { // owner is also the recipient in all tests const payer = PAYER_KEYPAIR; - const owner = Keypair.generate(); + const owner = OWNER_KEYPAIR; const relayer = Keypair.generate(); const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const feeRecipient = Keypair.generate().publicKey; diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index 91c013dc..bce060ba 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -19,6 +19,7 @@ import { LOCALHOST, MOCK_GUARDIANS, OWNER_ASSISTANT_KEYPAIR, + OWNER_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, bigintToU64BN, @@ -34,7 +35,7 @@ describe("Token Router", function () { // payer is also the recipient in all tests const payer = PAYER_KEYPAIR; const relayer = Keypair.generate(); - const owner = Keypair.generate(); + const owner = OWNER_KEYPAIR; const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const foreignChain = wormholeSdk.CHAINS.ethereum; @@ -1321,7 +1322,7 @@ describe("Token Router", function () { ); const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ - units: 300_000, + units: 400_000, }); const cctpMintRecipient = tokenRouter.cctpMintRecipientAddress(); diff --git a/solana/ts/tests/12__testnetFork.ts b/solana/ts/tests/12__testnetFork.ts new file mode 100644 index 00000000..f2ed179e --- /dev/null +++ b/solana/ts/tests/12__testnetFork.ts @@ -0,0 +1,335 @@ +import * as wormholeSdk from "@certusone/wormhole-sdk"; +import { + Connection, + Keypair, + PublicKey, + SYSVAR_CLOCK_PUBKEY, + SYSVAR_RENT_PUBKEY, + SystemProgram, + TransactionInstruction, +} from "@solana/web3.js"; +import { use as chaiUse } from "chai"; +import chaiAsPromised from "chai-as-promised"; +import * as matchingEngineSdk from "../src/matchingEngine"; +import * as tokenRouterSdk from "../src/tokenRouter"; +import { UpgradeManagerProgram, testnet } from "../src/upgradeManager"; +import { BPF_LOADER_UPGRADEABLE_PROGRAM_ID, programDataAddress } from "../src/utils"; +import { + LOCALHOST, + OWNER_ASSISTANT_KEYPAIR, + OWNER_KEYPAIR, + PAYER_KEYPAIR, + USDC_MINT_ADDRESS, + expectIxOk, + loadProgramBpf, +} from "./helpers"; + +// TODO: remove +import "dotenv/config"; + +chaiUse(chaiAsPromised); + +const MATCHING_ENGINE_ARTIFACT_PATH = `${__dirname}/artifacts/testnet_matching_engine.so`; +const TOKEN_ROUTER_ARTIFACT_PATH = `${__dirname}/artifacts/testnet_token_router.so`; + +/// FOR NOW ONLY PERFORM THESE TESTS IF YOU HAVE THE MAGIC PRIVATE KEY. +if (process.env.MAGIC_PRIVATE_KEY !== undefined) { + const devnetOwner = Keypair.fromSecretKey( + Buffer.from(process.env.MAGIC_PRIVATE_KEY!, "base64"), + ); + + describe("Token Router", function () { + const connection = new Connection(LOCALHOST, "processed"); + const payer = PAYER_KEYPAIR; + + const matchingEngine = new matchingEngineSdk.MatchingEngineProgram( + connection, + matchingEngineSdk.testnet(), + USDC_MINT_ADDRESS, + ); + const tokenRouter = new tokenRouterSdk.TokenRouterProgram( + connection, + tokenRouterSdk.testnet(), + matchingEngine.mint, + ); + const upgradeManager = new UpgradeManagerProgram(connection, testnet()); + + describe("Set Up Environment", function () { + // TODO: remove + it("Upgrade Matching Engine to Current Implementation (REMOVE ME)", async function () { + console.log("It'sa me!", devnetOwner.publicKey.toString()); + + const buffer = loadProgramBpf(MATCHING_ENGINE_ARTIFACT_PATH); + + const setBufferAuthorityIx = new TransactionInstruction({ + programId: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + keys: [ + { + pubkey: buffer, + isWritable: true, + isSigner: false, + }, + { pubkey: payer.publicKey, isSigner: true, isWritable: false }, + { pubkey: devnetOwner.publicKey, isSigner: false, isWritable: false }, + ], + data: Buffer.from([4, 0, 0, 0]), + }); + + const upgradeIx = new TransactionInstruction({ + programId: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + keys: [ + { + pubkey: programDataAddress(matchingEngine.ID), + isWritable: true, + isSigner: false, + }, + { pubkey: matchingEngine.ID, isWritable: true, isSigner: false }, + { pubkey: buffer, isWritable: true, isSigner: false }, + { pubkey: payer.publicKey, isWritable: true, isSigner: false }, + { pubkey: SYSVAR_RENT_PUBKEY, isWritable: false, isSigner: false }, + { pubkey: SYSVAR_CLOCK_PUBKEY, isWritable: false, isSigner: false }, + { pubkey: devnetOwner.publicKey, isWritable: false, isSigner: true }, + ], + data: Buffer.from([3, 0, 0, 0]), + }); + + const transferIx = SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: devnetOwner.publicKey, + lamports: 1_000_000_000, + }); + + await expectIxOk( + connection, + [transferIx, setBufferAuthorityIx, upgradeIx], + [payer, devnetOwner], + ); + }); + + // TODO: remove + it("Upgrade Token Router to Current Implementation (REMOVE ME)", async function () { + console.log("It'sa me!", devnetOwner.publicKey.toString()); + + const buffer = loadProgramBpf(TOKEN_ROUTER_ARTIFACT_PATH); + + const setBufferAuthorityIx = new TransactionInstruction({ + programId: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + keys: [ + { + pubkey: buffer, + isWritable: true, + isSigner: false, + }, + { pubkey: payer.publicKey, isSigner: true, isWritable: false }, + { pubkey: devnetOwner.publicKey, isSigner: false, isWritable: false }, + ], + data: Buffer.from([4, 0, 0, 0]), + }); + + const upgradeIx = new TransactionInstruction({ + programId: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + keys: [ + { + pubkey: programDataAddress(tokenRouter.ID), + isWritable: true, + isSigner: false, + }, + { pubkey: tokenRouter.ID, isWritable: true, isSigner: false }, + { pubkey: buffer, isWritable: true, isSigner: false }, + { pubkey: payer.publicKey, isWritable: true, isSigner: false }, + { pubkey: SYSVAR_RENT_PUBKEY, isWritable: false, isSigner: false }, + { pubkey: SYSVAR_CLOCK_PUBKEY, isWritable: false, isSigner: false }, + { pubkey: devnetOwner.publicKey, isWritable: false, isSigner: true }, + ], + data: Buffer.from([3, 0, 0, 0]), + }); + + const transferIx = SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: devnetOwner.publicKey, + lamports: 1_000_000_000, + }); + + await expectIxOk( + connection, + [transferIx, setBufferAuthorityIx, upgradeIx], + [payer, devnetOwner], + ); + }); + + // TODO: remove + it("Set Authority of Forked Matching Engine to Upgrade Manager (REMOVE ME)", async function () { + console.log("It'sa me!", devnetOwner.publicKey.toString()); + + const ix = setUpgradeAuthorityIx( + matchingEngine.ID, + devnetOwner.publicKey, + upgradeManager.upgradeAuthorityAddress(), + ); + + await expectIxOk(connection, [ix], [payer, devnetOwner]); + }); + + // TODO: remove + it("Set Authority of Forked Token Router to Upgrade Manager (REMOVE ME)", async function () { + console.log("It'sa me!", devnetOwner.publicKey.toString()); + + const ix = setUpgradeAuthorityIx( + tokenRouter.ID, + devnetOwner.publicKey, + upgradeManager.upgradeAuthorityAddress(), + ); + + await expectIxOk(connection, [ix], [payer, devnetOwner]); + }); + }); + + describe.skip("Upgrade Matching Engine", function () { + it("Upgrade without Upgrade Ticket", async function () { + const buffer = loadProgramBpf(MATCHING_ENGINE_ARTIFACT_PATH); + + const ix = await upgradeManager.upgradeMatchingEngineIx({ + owner: payer.publicKey, + matchingEngineBuffer: buffer, + }); + await expectIxOk(connection, [ix], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + }); + + it("Upgrade with Upgrade Ticket and with Bad Implementation", async function () { + const buffer = loadProgramBpf(TOKEN_ROUTER_ARTIFACT_PATH); + + const initializeIx = await matchingEngine.initializeUpgradeIx({ + owner: payer.publicKey, + buffer, + }); + const upgradeIx = await upgradeManager.upgradeMatchingEngineIx({ + owner: payer.publicKey, + matchingEngineBuffer: buffer, + }); + + await expectIxOk(connection, [initializeIx, upgradeIx], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + }); + + it.skip("Cannot Complete Upgrade with Bad Implementation", async function () { + // TODO + }); + + it("Fix Upgrade", async function () { + const buffer = loadProgramBpf(MATCHING_ENGINE_ARTIFACT_PATH); + + const fixIx = await matchingEngine.fixUpgradeIx({ + owner: payer.publicKey, + buffer, + }); + const upgradeIx = await upgradeManager.upgradeTokenRouterIx({ + owner: payer.publicKey, + tokenRouterBuffer: buffer, + }); + + await expectIxOk(connection, [fixIx, upgradeIx], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + }); + + it("Complete Upgrade", async function () { + const { buffer } = await matchingEngine.fetchUpgradeTicket(); + + const completeIx = await matchingEngine.completeUpgradeIx({ + owner: payer.publicKey, + buffer, + }); + + await expectIxOk(connection, [completeIx], [payer]); + }); + }); + + describe("Upgrade Token Router", function () { + it("Execute", async function () { + const tokenRouterBuffer = loadProgramBpf(TOKEN_ROUTER_ARTIFACT_PATH); + + const ix = await upgradeManager.executeTokenRouterUpgradeIx({ + owner: payer.publicKey, + tokenRouterBuffer, + }); + + await expectIxOk(connection, [ix], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + }); + + it.skip("Upgrade with Upgrade Ticket and with Bad Implementation", async function () { + const buffer = loadProgramBpf(MATCHING_ENGINE_ARTIFACT_PATH); + + const authorizeIx = await upgradeManager.authorizeTokenRouterUpgradeIx({ + owner: payer.publicKey, + buffer, + }); + const upgradeIx = await upgradeManager.upgradeTokenRouterIx({ + owner: payer.publicKey, + tokenRouterBuffer: buffer, + }); + console.log("whoa buddy", Array.from(upgradeIx.data.subarray(0, 8))); + + await expectIxOk(connection, [authorizeIx, upgradeIx], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + }); + + it.skip("Cannot Complete Upgrade with Bad Implementation", async function () { + // TODO + }); + + it.skip("Fix Upgrade", async function () { + const buffer = loadProgramBpf(TOKEN_ROUTER_ARTIFACT_PATH); + + const fixIx = await tokenRouter.fixUpgradeIx({ + owner: payer.publicKey, + buffer, + }); + const upgradeIx = await upgradeManager.upgradeTokenRouterIx({ + owner: payer.publicKey, + tokenRouterBuffer: buffer, + }); + + await expectIxOk(connection, [fixIx, upgradeIx], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + }); + + it.skip("Complete Upgrade", async function () { + const { buffer } = await tokenRouter.fetchUpgradeTicket(); + + const completeIx = await tokenRouter.completeUpgradeIx({ + owner: payer.publicKey, + buffer, + }); + + await expectIxOk(connection, [completeIx], [payer]); + }); + }); + }); +} + +function setUpgradeAuthorityIx( + programId: PublicKey, + currentAuthority: PublicKey, + newAuthority: PublicKey, +) { + return new TransactionInstruction({ + programId: BPF_LOADER_UPGRADEABLE_PROGRAM_ID, + keys: [ + { + pubkey: programDataAddress(programId), + isWritable: true, + isSigner: false, + }, + { pubkey: currentAuthority, isSigner: true, isWritable: false }, + { pubkey: newAuthority, isSigner: false, isWritable: false }, + ], + data: Buffer.from([4, 0, 0, 0]), + }); +} diff --git a/solana/ts/tests/accounts/testnet/matching_engine_custodian.json b/solana/ts/tests/accounts/testnet/matching_engine_custodian.json new file mode 100644 index 00000000..f9eb041d --- /dev/null +++ b/solana/ts/tests/accounts/testnet/matching_engine_custodian.json @@ -0,0 +1,14 @@ +{ + "pubkey": "5BsCKkzuZXLygduw6RorCqEB61AdzNkxp5VzQrFGzYWr", + "account": { + "lamports": 1927920, + "data": [ + "hOSLuHDkbPAMGliG/hCT35/EOMKW+fcnW3cYtrwOFW2NM2xY8IOZbQCyYhuGDPpdfzJOBnceTvHX8S6d3fMAJtKCp45SBiW1cXT3n2+4rU8d7ccb0Cv2HoY7eHIPeYyfdHVa3M3rheUeAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=", + "base64" + ], + "owner": "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 149 + } +} diff --git a/solana/ts/tests/accounts/testnet/token_router_custodian.json b/solana/ts/tests/accounts/testnet/token_router_custodian.json new file mode 100644 index 00000000..0402b34b --- /dev/null +++ b/solana/ts/tests/accounts/testnet/token_router_custodian.json @@ -0,0 +1,14 @@ +{ + "pubkey": "CFYdtHYDnQgCAcwetWVjVg5V8Uiy1CpJaoYJxmV19Z7N", + "account": { + "lamports": 1851360, + "data": [ + "hOSLuHDkbPAADBpYhv4Qk9+fxDjClvn3J1t3GLa8DhVtjTNsWPCDmW0AsmIbhgz6XX8yTgZ3Hk7x1/Eund3zACbSgqeOUgYltXGyYhuGDPpdfzJOBnceTvHX8S6d3fMAJtKCp45SBiW1cQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", + "base64" + ], + "owner": "tD8RmtdcV7bzBeuFgyrFc8wvayj988ChccEzRQzo6md", + "executable": false, + "rentEpoch": 18446744073709551615, + "space": 138 + } +} diff --git a/solana/ts/tests/accounts/testnet/token_router_program_data_hacked.json b/solana/ts/tests/accounts/testnet/token_router_program_data_hacked.json new file mode 100644 index 00000000..17806339 --- /dev/null +++ b/solana/ts/tests/accounts/testnet/token_router_program_data_hacked.json @@ -0,0 +1,14 @@ +{ + "pubkey": "CqrEUyMva5apDRpzbMh52w3JV3NBFVNBiQsr52uewM6j", + "account": { + "lamports": 10102224240, + "data": [ + "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", + "base64" + ], + "owner": "BPFLoaderUpgradeab1e11111111111111111111111", + "executable": false, + "rentEpoch": 18446744073709552000, + "space": 1451341 + } +} \ No newline at end of file diff --git a/solana/ts/tests/helpers/consts.ts b/solana/ts/tests/helpers/consts.ts index 73490e80..d3da3f8b 100644 --- a/solana/ts/tests/helpers/consts.ts +++ b/solana/ts/tests/helpers/consts.ts @@ -12,15 +12,22 @@ export const LOCALHOST = "http://localhost:8899"; export const PAYER_KEYPAIR = Keypair.fromSecretKey( Buffer.from( "cDfpY+VbRFXPPwouZwAx+ha9HqedkhqUr5vUaFa2ucAMGliG/hCT35/EOMKW+fcnW3cYtrwOFW2NM2xY8IOZbQ==", - "base64" - ) + "base64", + ), ); export const OWNER_ASSISTANT_KEYPAIR = Keypair.fromSecretKey( Buffer.from( "900mlHo1RRdhxUKuBnnPowQ7yqb4rJ1dC7K1PM+pRxeuCWamoSkQdY+3hXAeX0OBXanyqg4oyBl8g1z1sDnSWg==", - "base64" - ) + "base64", + ), +); + +export const OWNER_KEYPAIR = Keypair.fromSecretKey( + Buffer.from( + "t0zuiHtsaDJBSUFzkvXNttgXOMvZy0bbuUPGEByIJEHAUdFeBdSAesMbgbuH1v/y+B8CdTSkCIZZNuCntHQ+Ig==", + "base64", + ), ); export const GOVERNANCE_EMITTER_ADDRESS = new PublicKey("11111111111111111111111111111115"); diff --git a/solana/ts/tests/helpers/utils.ts b/solana/ts/tests/helpers/utils.ts index 7fe19c82..0ee8bd9f 100644 --- a/solana/ts/tests/helpers/utils.ts +++ b/solana/ts/tests/helpers/utils.ts @@ -25,8 +25,8 @@ async function confirmLatest(connection: Connection, signature: string) { lastValidBlockHeight, signature, }, - "confirmed" - ) + "confirmed", + ), ); } @@ -37,7 +37,7 @@ export async function expectIxOk( options: { addressLookupTableAccounts?: AddressLookupTableAccount[]; confirmOptions?: ConfirmOptions; - } = {} + } = {}, ) { const { addressLookupTableAccounts, confirmOptions } = options; return debugSendAndConfirmTransaction(connection, instructions, signers, { @@ -55,7 +55,7 @@ export async function expectIxErr( options: { addressLookupTableAccounts?: AddressLookupTableAccount[]; confirmOptions?: ConfirmOptions; - } = {} + } = {}, ) { const { addressLookupTableAccounts, confirmOptions } = options; const errorMsg = await debugSendAndConfirmTransaction(connection, instructions, signers, { @@ -84,7 +84,7 @@ export async function expectIxOkDetails( options: { addressLookupTableAccounts?: AddressLookupTableAccount[]; confirmOptions?: ConfirmOptions; - } = {} + } = {}, ) { const txSig = await expectIxOk(connection, ixs, signers, options); await confirmLatest(connection, txSig); @@ -102,7 +102,7 @@ async function debugSendAndConfirmTransaction( addressLookupTableAccounts?: AddressLookupTableAccount[]; logError?: boolean; confirmOptions?: ConfirmOptions; - } = {} + } = {}, ) { const { logError, confirmOptions, addressLookupTableAccounts } = options; @@ -127,7 +127,7 @@ async function debugSendAndConfirmTransaction( signature, ...latestBlockhash, }, - confirmOptions === undefined ? "confirmed" : confirmOptions.commitment + confirmOptions === undefined ? "confirmed" : confirmOptions.commitment, ); return new Ok(signature); }) @@ -148,36 +148,27 @@ export async function postVaa( connection: Connection, payer: Keypair, vaaBuf: Buffer, - coreBridgeAddress?: PublicKey + coreBridgeAddress?: PublicKey, ) { await postVaaSolana( connection, new wormSolana.NodeWallet(payer).signTransaction, coreBridgeAddress ?? CORE_BRIDGE_PID, payer.publicKey, - vaaBuf + vaaBuf, ); } -export function loadProgramBpf(artifactPath: string, bufferAuthority: PublicKey): PublicKey { +export function loadProgramBpf(artifactPath: string): PublicKey { // Write keypair to temporary file. const keypath = `${__dirname}/../keys/pFCBP4bhqdSsrWUVTgqhPsLrfEdChBK17vgFM7TxjxQ.json`; // Invoke BPF Loader Upgradeable `write-buffer` instruction. const buffer = (() => { const output = execSync(`solana -u l -k ${keypath} program write-buffer ${artifactPath}`); - const pubkeyStr = output.toString().match(/^.{8}([A-Za-z0-9]+)/); - if (pubkeyStr === null) { - throw new Error("Could not parse pubkey from output"); - } - return new PublicKey(pubkeyStr); + return new PublicKey(output.toString().match(/^Buffer: ([A-Za-z0-9]+)/)![1]); })(); - // Invoke BPF Loader Upgradeable `set-buffer-authority` instruction. - execSync( - `solana -k ${keypath} program set-buffer-authority ${buffer.toString()} --new-buffer-authority ${bufferAuthority.toString()} -u localhost` - ); - // Return the pubkey for the buffer (our new program implementation). return buffer; } @@ -237,7 +228,7 @@ export async function waitUntilSlot(connection: Connection, targetSlot: number) export async function getUsdcAtaBalance(connection: Connection, owner: PublicKey) { const { amount } = await splToken.getAccount( connection, - splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, owner) + splToken.getAssociatedTokenAddressSync(USDC_MINT_ADDRESS, owner), ); return amount; } From 5a541ed6ca65971ecda1f094b67c72b78c451736 Mon Sep 17 00:00:00 2001 From: Alexander Date: Fri, 9 Feb 2024 16:59:00 -0500 Subject: [PATCH 122/126] solana: add some local tests --- .../processor/auction/settle/none/local.rs | 3 + .../AuctionParticipant.ts | 115 +++ .../improveAuctionOfferAndExecute/app.ts | 39 + solana/ts/scripts/setUpMatchingEngineLut.ts | 63 ++ solana/ts/src/matchingEngine/index.ts | 160 ++- solana/ts/tests/01__matchingEngine.ts | 4 +- solana/ts/tests/04__interaction.ts | 935 +++++++++++++----- 7 files changed, 1062 insertions(+), 257 deletions(-) create mode 100644 solana/ts/scripts/improveAuctionOfferAndExecute/AuctionParticipant.ts create mode 100644 solana/ts/scripts/improveAuctionOfferAndExecute/app.ts create mode 100644 solana/ts/scripts/setUpMatchingEngineLut.ts diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs index 6ad3cc2f..bc9cc712 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -98,6 +98,9 @@ pub struct SettleAuctionNoneLocal<'info> { from_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = from_router_endpoint.bump, + constraint = { + from_router_endpoint.chain != SOLANA_CHAIN + } @ MatchingEngineError::InvalidChain )] from_router_endpoint: Box>, diff --git a/solana/ts/scripts/improveAuctionOfferAndExecute/AuctionParticipant.ts b/solana/ts/scripts/improveAuctionOfferAndExecute/AuctionParticipant.ts new file mode 100644 index 00000000..7fe01aa2 --- /dev/null +++ b/solana/ts/scripts/improveAuctionOfferAndExecute/AuctionParticipant.ts @@ -0,0 +1,115 @@ +import { Connection, Context, Logs, MessageCompiledInstruction, PublicKey } from "@solana/web3.js"; +import * as winston from "winston"; +import { MatchingEngineProgram } from "../../src/matchingEngine"; + +const PLACE_INITIAL_OFFER_SELECTOR = Uint8Array.from([170, 227, 204, 195, 210, 9, 219, 220]); +const IMPROVE_OFFER_SELECTOR = Uint8Array.from([171, 112, 46, 172, 194, 135, 23, 102]); + +export class AuctionParticipant { + private _logger: winston.Logger; + private _matchingEngine: MatchingEngineProgram; + private _connection: Connection; + + private _recognizedPayers: PublicKey[]; + + private _ourAuctions: Map; + + constructor( + matchingEngine: MatchingEngineProgram, + recognizedPayers: string[], + logger: winston.Logger, + ) { + this._logger = logger; + this._matchingEngine = matchingEngine; + this._connection = matchingEngine.program.provider.connection; + + this._recognizedPayers = recognizedPayers.map((keyInit) => new PublicKey(keyInit)); + + this._ourAuctions = new Map(); + } + + async onLogsCallback() { + const logger = this._logger; + const matchingEngine = this._matchingEngine; + + const connection = this._connection; + if (connection.commitment !== undefined) { + logger.info(`Connection established with "${connection.commitment}" commitment`); + } + + const recognizedPayers = this._recognizedPayers; + for (const recognized of recognizedPayers) { + logger.info(`Recognized payer: ${recognized.toString()}`); + } + + logger.info("Fetching active auction config"); + const { auctionConfigId } = await matchingEngine.fetchCustodian(); + const { parameters } = await matchingEngine.fetchAuctionConfig(auctionConfigId); + logger.info(`Found auction config with ID: ${auctionConfigId.toString()}`); + + logger.info( + `Listen to transaction logs from Matching Engine: ${matchingEngine.ID.toString()}`, + ); + return async function (logs: Logs, ctx: Context) { + if (logs.err !== null) { + return; + } + + logger.debug( + `Found signature: ${logs.signature} at slot ${ctx.slot}. Fetching transaction.`, + ); + + // TODO: save sigs to db and check if we've already processed this. + + // WARNING: When using get parsed transaction and there is a LUT involved, + const txMessage = await connection + .getTransaction(logs.signature, { + maxSupportedTransactionVersion: 0, + }) + .then((response) => response?.transaction.message); + if (txMessage === undefined) { + logger.warn(`Failed to fetch transaction with ${logs.signature}`); + return; + } + + if ( + recognizedPayers.find((recognized) => + recognized.equals(txMessage.staticAccountKeys[0]), + ) !== undefined + ) { + logger.debug("I recognize a payer. Disregard?"); + // return; + } else { + logger.debug(`Who is this? ${txMessage.staticAccountKeys[0].toString()}`); + } + + for (const ix of txMessage.compiledInstructions) { + const offerAmount = getOfferAmount(ix, logger); + if (offerAmount !== null) { + const improveOfferBy = await matchingEngine.computeMinOfferDelta( + offerAmount, + parameters, + ); + logger.debug(`Improve offer? ${offerAmount - improveOfferBy}`); + } + } + }; + } +} + +function getOfferAmount(ix: MessageCompiledInstruction, logger: winston.Logger) { + const data = Buffer.from(ix.data); + + const discriminator = data.subarray(0, 8); + if (discriminator.equals(PLACE_INITIAL_OFFER_SELECTOR)) { + const offerAmount = data.readBigUInt64LE(8); + logger.debug(`Found initial offer for ${offerAmount}`); + return offerAmount; + } else if (discriminator.equals(IMPROVE_OFFER_SELECTOR)) { + const offerAmount = data.readBigUInt64LE(8); + logger.debug(`Found improved offer for ${offerAmount}`); + return offerAmount; + } else { + return null; + } +} diff --git a/solana/ts/scripts/improveAuctionOfferAndExecute/app.ts b/solana/ts/scripts/improveAuctionOfferAndExecute/app.ts new file mode 100644 index 00000000..c83d707e --- /dev/null +++ b/solana/ts/scripts/improveAuctionOfferAndExecute/app.ts @@ -0,0 +1,39 @@ +import { Connection, PublicKey } from "@solana/web3.js"; +import "dotenv/config"; +import { AuctionParticipant } from "./AuctionParticipant"; +import * as utils from "../utils"; +import { MatchingEngineProgram } from "../../src/matchingEngine"; + +const MATCHING_ENGINE_PROGRAM_ID = "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS"; +const USDC_MINT = new PublicKey("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + +main(process.argv); + +async function main(argv: string[]) { + // TODO: read config + const logicLogger = utils.defaultLogger({ label: "logic", level: "debug" }); + logicLogger.info("Start logging logic"); + + if (process.env.SOLANA_SUB_RPC === undefined) { + throw new Error("SOLANA_SUB_RPC is undefined"); + } + if (process.env.SOLANA_REQ_RPC === undefined) { + throw new Error("SOLANA_REQ_RPC is undefined"); + } + + const connection = new Connection(process.env.SOLANA_REQ_RPC, { + commitment: "confirmed", + //wsEndpoint: process.env.SOLANA_SUB_WS, + wsEndpoint: "wss://api.devnet.solana.com/", + }); + const matchingEngine = new MatchingEngineProgram( + connection, + MATCHING_ENGINE_PROGRAM_ID, + USDC_MINT, + ); + + const recognizedPayers = ["2SiZZ6cUrrjCjQdTrBjW5qv6jLdCzfCP4aDeAB3AKXWM"]; + const participant = new AuctionParticipant(matchingEngine, recognizedPayers, logicLogger); + + connection.onLogs(matchingEngine.ID, await participant.onLogsCallback()); +} diff --git a/solana/ts/scripts/setUpMatchingEngineLut.ts b/solana/ts/scripts/setUpMatchingEngineLut.ts new file mode 100644 index 00000000..a2aef007 --- /dev/null +++ b/solana/ts/scripts/setUpMatchingEngineLut.ts @@ -0,0 +1,63 @@ +import { + AddressLookupTableProgram, + Connection, + Keypair, + PublicKey, + Transaction, + sendAndConfirmTransaction, +} from "@solana/web3.js"; +import "dotenv/config"; +import { MatchingEngineProgram } from "../src/matchingEngine"; + +const PROGRAM_ID = "mPydpGUWxzERTNpyvTKdvS7v8kvw5sgwfiP8WQFrXVS"; +const USDC_MINT = new PublicKey("4zMMC9srt5Ri5X14GAgXhaHii3GnPAEERYPJgZJDncDU"); + +// Here we go. +main(); + +// impl + +async function main() { + const connection = new Connection("https://api.devnet.solana.com", "confirmed"); + const matchingEngine = new MatchingEngineProgram(connection, PROGRAM_ID, USDC_MINT); + + if (process.env.SOLANA_PRIVATE_KEY === undefined) { + throw new Error("SOLANA_PRIVATE_KEY is undefined"); + } + const payer = Keypair.fromSecretKey(Buffer.from(process.env.SOLANA_PRIVATE_KEY, "base64")); + + // const [createIx, lookupTable] = await connection.getSlot("finalized").then((slot) => + // AddressLookupTableProgram.createLookupTable({ + // authority: payer.publicKey, + // payer: payer.publicKey, + // recentSlot: slot, + // }), + // ); + + // const createTx = await sendAndConfirmTransaction(connection, new Transaction().add(createIx), [ + // payer, + // ]); + // console.log("createTx", createTx); + + const lookupTable = new PublicKey("pGTATFy5xgzdxu6XpiCzCu1uE3Ur473gGUD2pZykahf"); + + const usdcCommonAccounts = await matchingEngine.commonAccounts(); + + // Extend. + const extendIx = AddressLookupTableProgram.extendLookupTable({ + payer: payer.publicKey, + authority: payer.publicKey, + lookupTable, + addresses: Object.values(usdcCommonAccounts).filter((key) => key !== undefined), + }); + + const extendTx = await sendAndConfirmTransaction( + connection, + new Transaction().add(extendIx), + [payer], + { + commitment: "finalized", + }, + ); + console.log("extendTx", extendTx); +} diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index f8e3c202..e9362c11 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -846,6 +846,103 @@ export class MatchingEngineProgram { .instruction(); } + async settleAuctionActiveLocalIx(accounts: { + payer: PublicKey; + fastVaa: PublicKey; + executorToken: PublicKey; + preparedOrderResponse?: PublicKey; + auction?: PublicKey; + bestOfferToken?: PublicKey; + auctionConfig?: PublicKey; + }) { + const { + payer, + preparedOrderResponse, + auction, + fastVaa, + executorToken, + bestOfferToken: inputBestOfferToken, + auctionConfig: inputAuctionConfig, + } = accounts; + const fastVaaAccount = await VaaAccount.fetch(this.program.provider.connection, fastVaa); + + const mint = this.mint; + const auctionAddress = auction ?? this.auctionAddress(fastVaaAccount.digest()); + + const { auctionConfig, bestOfferToken } = await (async () => { + if (inputAuctionConfig === undefined || inputBestOfferToken === undefined) { + const { info } = await this.fetchAuction({ address: auctionAddress }); + if (info === null) { + throw new Error("no auction info found"); + } + const { configId, bestOfferToken } = info; + return { + auctionConfig: inputAuctionConfig ?? this.auctionConfigAddress(configId), + bestOfferToken: inputBestOfferToken ?? bestOfferToken, + }; + } else { + return { + auctionConfig: inputAuctionConfig, + bestOfferToken: inputBestOfferToken, + }; + } + })(); + const { targetChain, toRouterEndpoint } = await (async () => { + const message = LiquidityLayerMessage.decode(fastVaaAccount.payload()); + if (message.fastMarketOrder == undefined) { + throw new Error("Message not FastMarketOrder"); + } + + const targetChain = message.fastMarketOrder.targetChain; + const toRouterEndpoint = this.routerEndpointAddress( + message.fastMarketOrder.targetChain, + ); + + return { targetChain, toRouterEndpoint }; + })(); + + const payerSequence = this.payerSequenceAddress(payer); + const payerSequenceValue = await this.fetchPayerSequenceValue({ + address: payerSequence, + }); + const { + custodian, + coreMessage, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + } = await this.publishMessageAccounts(payer, payerSequenceValue); + + const cctpMintRecipient = this.cctpMintRecipientAddress(); + + return this.program.methods + .settleAuctionActiveLocal() + .accounts({ + payer, + payerSequence, + custodian, + auctionConfig, + fastVaa, + preparedOrderResponse, + auction, + cctpMintRecipient, + toRouterEndpoint, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreBridgeProgram, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + systemProgram: SystemProgram.programId, + clock: SYSVAR_CLOCK_PUBKEY, + coreFeeCollector, + rent: SYSVAR_RENT_PUBKEY, + bestOfferToken, + executorToken, + }) + .instruction(); + } + async settleAuctionActiveCctpIx( accounts: { payer: PublicKey; @@ -973,11 +1070,68 @@ export class MatchingEngineProgram { .instruction(); } - async settleAuctionNoneLocalIx() { + async settleAuctionNoneLocalIx(accounts: { + payer: PublicKey; + preparedOrderResponse?: PublicKey; + auction?: PublicKey; + fastVaa: PublicKey; + }) { + const { payer, preparedOrderResponse, auction, fastVaa } = accounts; + const fastVaaAccount = await VaaAccount.fetch(this.program.provider.connection, fastVaa); + + const mint = this.mint; + const { targetChain, toRouterEndpoint } = await (async () => { + const message = LiquidityLayerMessage.decode(fastVaaAccount.payload()); + if (message.fastMarketOrder == undefined) { + throw new Error("Message not FastMarketOrder"); + } + + const targetChain = message.fastMarketOrder.targetChain; + const toRouterEndpoint = this.routerEndpointAddress( + message.fastMarketOrder.targetChain, + ); + + return { targetChain, toRouterEndpoint }; + })(); + + const payerSequence = this.payerSequenceAddress(payer); + const payerSequenceValue = await this.fetchPayerSequenceValue({ + address: payerSequence, + }); + const { + custodian, + coreMessage, + coreBridgeConfig, + coreEmitterSequence, + coreFeeCollector, + coreBridgeProgram, + } = await this.publishMessageAccounts(payer, payerSequenceValue); + + const { feeRecipientToken } = await this.fetchCustodian(); + const cctpMintRecipient = this.cctpMintRecipientAddress(); + return this.program.methods - .settleAuctionNoneCctp() + .settleAuctionNoneLocal() .accounts({ - custodian: this.custodianAddress(), + payer, + payerSequence, + custodian, + fastVaa, + preparedOrderResponse, + auction, + cctpMintRecipient, + feeRecipientToken, + fromRouterEndpoint: this.routerEndpointAddress(fastVaaAccount.emitterInfo().chain), + toRouterEndpoint, + coreBridgeConfig, + coreMessage, + coreEmitterSequence, + coreBridgeProgram, + tokenProgram: splToken.TOKEN_PROGRAM_ID, + systemProgram: SystemProgram.programId, + clock: SYSVAR_CLOCK_PUBKEY, + coreFeeCollector, + rent: SYSVAR_RENT_PUBKEY, }) .instruction(); } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index ecc56823..fccc4a51 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -302,7 +302,7 @@ describe("Matching Engine", function () { ); }); - after("Setup Lookup Table", async function () { + after("Set Up Lookup Table", async function () { // Create. const [createIx, lookupTable] = await connection.getSlot("finalized").then((slot) => AddressLookupTableProgram.createLookupTable({ @@ -1182,7 +1182,7 @@ describe("Matching Engine", function () { // Hack to prevent math overflow error when invoking CCTP programs. testCctpNonce -= 10n * 6400n; - let wormholeSequence = 0n; + let wormholeSequence = 1000n; const baseFastOrder: FastMarketOrder = { amountIn: 50000000000n, diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 51b6504d..fe88bcbe 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -1,14 +1,28 @@ import * as wormholeSdk from "@certusone/wormhole-sdk"; import { BN } from "@coral-xyz/anchor"; import * as splToken from "@solana/spl-token"; -import { Connection, Keypair, PublicKey } from "@solana/web3.js"; +import { + AddressLookupTableProgram, + Connection, + Keypair, + PublicKey, + ComputeBudgetProgram, + SystemProgram, +} from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; -import { LiquidityLayerDeposit, LiquidityLayerMessage } from "../src"; +import { + LiquidityLayerDeposit, + LiquidityLayerMessage, + FastMarketOrder, + CctpTokenBurnMessage, +} from "../src"; import * as matchingEngineSdk from "../src/matchingEngine"; import * as tokenRouterSdk from "../src/tokenRouter"; import { VaaAccount } from "../src/wormhole"; import { + CircleAttester, + ETHEREUM_USDC_ADDRESS, LOCALHOST, MOCK_GUARDIANS, OWNER_ASSISTANT_KEYPAIR, @@ -27,6 +41,7 @@ describe("Matching Engine <> Token Router", function () { const payer = PAYER_KEYPAIR; const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; + const offerAuthorityOne = Keypair.generate(); const foreignChain = wormholeSdk.CHAINS.ethereum; const matchingEngine = new matchingEngineSdk.MatchingEngineProgram( @@ -39,331 +54,747 @@ describe("Matching Engine <> Token Router", function () { tokenRouterSdk.localnet(), matchingEngine.mint, ); + const liquidator = Keypair.generate(); - describe("Redeem Fast Fill", function () { - const payerToken = splToken.getAssociatedTokenAddressSync( - USDC_MINT_ADDRESS, - payer.publicKey, - ); + let lookupTableAddress: PublicKey; + const ethRouter = Array.from(Buffer.alloc(32, "deadbeef", "hex")); - const orderSender = Array.from(Buffer.alloc(32, "d00d", "hex")); - const redeemer = Keypair.generate(); + describe("Admin", function () { + describe("Local Router Endpoint", function () { + it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); + await expectIxOk(connection, [ix], [ownerAssistant]); - let wormholeSequence = 4000n; + const routerEndpointData = await matchingEngine.fetchRouterEndpoint( + wormholeSdk.CHAIN_ID_SOLANA, + ); + const { bump } = routerEndpointData; + expect(routerEndpointData).to.eql( + new matchingEngineSdk.RouterEndpoint( + bump, + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(tokenRouter.custodianAddress().toBuffer()), + Array.from(tokenRouter.cctpMintRecipientAddress().toBuffer()), + { local: { programId: tokenRouter.ID } }, + ), + ); + }); - const localVariables = new Map(); - - it("Token Router ..... Cannot Redeem Fast Fill without Local Router Endpoint", async function () { - const amount = 69n; - const redeemerMessage = Buffer.from("Somebody set up us the bomb"); - const message = new LiquidityLayerMessage({ - fastFill: { - fill: { - sourceChain: foreignChain, - orderSender, - redeemer: Array.from(redeemer.publicKey.toBuffer()), - redeemerMessage, + it("Matching Engine .. Remove Local Router Endpoint", async function () { + const ix = await matchingEngine.removeRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, }, - amount, - }, - }); + wormholeSdk.CHAIN_ID_SOLANA, + ); + await expectIxOk(connection, [ix], [ownerAssistant]); - const vaa = await postLiquidityLayerVaa( - connection, - payer, - MOCK_GUARDIANS, - Array.from(matchingEngine.custodianAddress().toBuffer()), - wormholeSequence++, - message, - "solana", - ); + const accInfo = await connection.getAccountInfo( + matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + ); + expect(accInfo).to.eql(null); + }); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, + after("Set Up Lookup Table", async function () { + const [createIx, lookupTable] = await connection.getSlot("finalized").then((slot) => + AddressLookupTableProgram.createLookupTable({ + authority: payer.publicKey, + payer: payer.publicKey, + recentSlot: slot, + }), + ); + await expectIxOk(connection, [createIx], [payer]); + const usdcCommonAccounts = await matchingEngine.commonAccounts(); + // Extend. + const extendIx = AddressLookupTableProgram.extendLookupTable({ + payer: payer.publicKey, + authority: payer.publicKey, + lookupTable, + addresses: Object.values(usdcCommonAccounts).filter((key) => key !== undefined), + }); + await expectIxOk(connection, [extendIx], [payer], { + confirmOptions: { commitment: "finalized" }, + }); + lookupTableAddress = lookupTable; }); - await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized"); + after("Set Up Offer Authority", async function () { + const transferIx = SystemProgram.transfer({ + fromPubkey: payer.publicKey, + toPubkey: offerAuthorityOne.publicKey, + lamports: 1000000000, + }); - // Save for later. - localVariables.set("vaa", vaa); - localVariables.set("amount", amount); - localVariables.set("redeemerMessage", redeemerMessage); + const offerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + offerAuthorityOne.publicKey, + ); + const createIx = splToken.createAssociatedTokenAccountInstruction( + payer.publicKey, + offerToken, + offerAuthorityOne.publicKey, + USDC_MINT_ADDRESS, + ); + const mintIx = splToken.createMintToInstruction( + USDC_MINT_ADDRESS, + offerToken, + payer.publicKey, + 1_000_000_000_000n, + ); + await expectIxOk(connection, [transferIx, createIx, mintIx], [payer]); + }); }); + }); + + describe("Business Logic", function () { + let testCctpNonce = 2n ** 64n - 1n; + + // Hack to prevent math overflow error when invoking CCTP programs. + testCctpNonce -= 40n * 6400n; + + let wormholeSequence = 4000n; - it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { - const ix = await matchingEngine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: tokenRouter.ID, + const baseFastOrder: FastMarketOrder = { + amountIn: 50000000000n, + minAmountOut: 0n, + targetChain: wormholeSdk.CHAINS.solana, + redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), + sender: Array.from(Buffer.alloc(32, "beefdead", "hex")), + refundAddress: Array.from(Buffer.alloc(32, "beef", "hex")), + maxFee: 1000000n, + initAuctionFee: 100n, + deadline: 0, + redeemerMessage: Buffer.from("All your base are belong to us."), + }; + const sourceCctpDomain = 0; + + describe("Settle Auction", function () { + describe("Settle No Auction (Local)", function () { + it("Settle", async function () { + const { prepareIx, preparedOrderResponse, auction, fastVaa, finalizedVaa } = + await prepareOrderResponse({ + initAuction: false, + executeOrder: false, + prepareOrderResponse: false, + }); + const settleIx = await matchingEngine.settleAuctionNoneLocalIx({ + payer: payer.publicKey, + preparedOrderResponse, + fastVaa, + auction, + }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 400_000, + }); + await expectIxOk(connection, [prepareIx!, settleIx, computeIx], [payer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + }); }); - await expectIxOk(connection, [ix], [ownerAssistant]); - const routerEndpointData = await matchingEngine.fetchRouterEndpoint( - wormholeSdk.CHAIN_ID_SOLANA, - ); - const { bump } = routerEndpointData; - expect(routerEndpointData).to.eql( - new matchingEngineSdk.RouterEndpoint( - bump, + describe("Settle Active Auction (Local)", function () { + it("Settle", async function () { + const { prepareIx, preparedOrderResponse, auction, fastVaa, finalizedVaa } = + await prepareOrderResponse({ + initAuction: true, + executeOrder: false, + prepareOrderResponse: false, + }); + + const { address: executorToken } = + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + liquidator.publicKey, + ); + + const settleIx = await matchingEngine.settleAuctionActiveLocalIx({ + payer: payer.publicKey, + preparedOrderResponse, + fastVaa, + auction, + executorToken, + }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 400_000, + }); + await expectIxOk(connection, [prepareIx!, settleIx, computeIx], [payer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + }); + }); + + before("Add Local Router Endpoint", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); + await expectIxOk(connection, [ix], [ownerAssistant]); + }); + + after("Remove Local Router Endpoint", async function () { + const ix = await matchingEngine.removeRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, wormholeSdk.CHAIN_ID_SOLANA, - Array.from(tokenRouter.custodianAddress().toBuffer()), - Array.from(tokenRouter.cctpMintRecipientAddress().toBuffer()), - { local: { programId: tokenRouter.ID } }, - ), - ); + ); + await expectIxOk(connection, [ix], [ownerAssistant]); + }); }); - it("Token Router ..... Redeem Fast Fill", async function () { - const vaa = localVariables.get("vaa") as PublicKey; - const amount = localVariables.get("amount") as bigint; - const redeemerMessage = localVariables.get("redeemerMessage") as Buffer; + describe("Redeem Fast Fill", function () { + const payerToken = splToken.getAssociatedTokenAddressSync( + USDC_MINT_ADDRESS, + payer.publicKey, + ); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, - }); + const orderSender = Array.from(Buffer.alloc(32, "d00d", "hex")); + const redeemer = Keypair.generate(); + + const localVariables = new Map(); - await expectIxOk(connection, [ix], [payer]); + it("Token Router ..... Cannot Redeem Fast Fill without Local Router Endpoint", async function () { + const amount = 69n; + const redeemerMessage = Buffer.from("Somebody set up us the bomb"); + const message = new LiquidityLayerMessage({ + fastFill: { + fill: { + sourceChain: foreignChain, + orderSender, + redeemer: Array.from(redeemer.publicKey.toBuffer()), + redeemerMessage, + }, + amount, + }, + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + message, + "solana", + ); - // Check balance. TODO + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); - const vaaHash = await VaaAccount.fetch(connection, vaa).then((vaa) => vaa.digest()); - const preparedFill = tokenRouter.preparedFillAddress(vaaHash); + await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized"); - // Check redeemed fast fill account. - const redeemedFastFill = matchingEngine.redeemedFastFillAddress(vaaHash); - const redeemedFastFillData = await matchingEngine.fetchRedeemedFastFill({ - address: redeemedFastFill, + // Save for later. + localVariables.set("vaa", vaa); + localVariables.set("amount", amount); + localVariables.set("redeemerMessage", redeemerMessage); }); - // The VAA hash can change depending on the message (sequence is usually the reason for - // this). So we just take the bump from the fetched data and move on with our lives. - { - const { bump } = redeemedFastFillData; - expect(redeemedFastFillData).to.eql( - new matchingEngineSdk.RedeemedFastFill( - bump, - Array.from(vaaHash), - new BN(new BN(wormholeSequence.toString()).subn(1).toBuffer("be", 8)), - ), - ); - } + it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); + await expectIxOk(connection, [ix], [ownerAssistant]); - { - const preparedFillData = await tokenRouter.fetchPreparedFill(preparedFill); - const { bump, preparedCustodyTokenBump } = preparedFillData; - expect(preparedFillData).to.eql( - new tokenRouterSdk.PreparedFill( - Array.from(vaaHash), + const routerEndpointData = await matchingEngine.fetchRouterEndpoint( + wormholeSdk.CHAIN_ID_SOLANA, + ); + const { bump } = routerEndpointData; + expect(routerEndpointData).to.eql( + new matchingEngineSdk.RouterEndpoint( bump, - preparedCustodyTokenBump, - redeemer.publicKey, - payer.publicKey, - { fastFill: {} }, - bigintToU64BN(amount), - foreignChain, - orderSender, - redeemerMessage, + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(tokenRouter.custodianAddress().toBuffer()), + Array.from(tokenRouter.cctpMintRecipientAddress().toBuffer()), + { local: { programId: tokenRouter.ID } }, ), ); - } + }); - // Save for later. - localVariables.set("redeemedFastFill", redeemedFastFill); - localVariables.set("preparedFill", preparedFill); - }); + it("Token Router ..... Redeem Fast Fill", async function () { + const vaa = localVariables.get("vaa") as PublicKey; + const amount = localVariables.get("amount") as bigint; + const redeemerMessage = localVariables.get("redeemerMessage") as Buffer; + + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); + + await expectIxOk(connection, [ix], [payer]); + + // Check balance. TODO + + const vaaHash = await VaaAccount.fetch(connection, vaa).then((vaa) => vaa.digest()); + const preparedFill = tokenRouter.preparedFillAddress(vaaHash); + + // Check redeemed fast fill account. + const redeemedFastFill = matchingEngine.redeemedFastFillAddress(vaaHash); + const redeemedFastFillData = await matchingEngine.fetchRedeemedFastFill({ + address: redeemedFastFill, + }); + + // The VAA hash can change depending on the message (sequence is usually the reason for + // this). So we just take the bump from the fetched data and move on with our lives. + { + const { bump } = redeemedFastFillData; + expect(redeemedFastFillData).to.eql( + new matchingEngineSdk.RedeemedFastFill( + bump, + Array.from(vaaHash), + new BN(new BN(wormholeSequence.toString()).subn(1).toBuffer("be", 8)), + ), + ); + } + + { + const preparedFillData = await tokenRouter.fetchPreparedFill(preparedFill); + const { bump, preparedCustodyTokenBump } = preparedFillData; + expect(preparedFillData).to.eql( + new tokenRouterSdk.PreparedFill( + Array.from(vaaHash), + bump, + preparedCustodyTokenBump, + redeemer.publicKey, + payer.publicKey, + { fastFill: {} }, + bigintToU64BN(amount), + foreignChain, + orderSender, + redeemerMessage, + ), + ); + } + + // Save for later. + localVariables.set("redeemedFastFill", redeemedFastFill); + localVariables.set("preparedFill", preparedFill); + }); + + it("Token Router ..... Redeem Same Fast Fill is No-op", async function () { + const vaa = localVariables.get("vaa") as PublicKey; - it("Token Router ..... Redeem Same Fast Fill is No-op", async function () { - const vaa = localVariables.get("vaa") as PublicKey; + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, + await expectIxOk(connection, [ix], [payer]); }); - await expectIxOk(connection, [ix], [payer]); - }); + it("Token Router ..... Consume Prepared Fill for Fast Fill", async function () { + const preparedFill = localVariables.get("preparedFill") as PublicKey; + expect(localVariables.delete("preparedFill")).is.true; - it("Token Router ..... Consume Prepared Fill for Fast Fill", async function () { - const preparedFill = localVariables.get("preparedFill") as PublicKey; - expect(localVariables.delete("preparedFill")).is.true; + const amount = localVariables.get("amount") as bigint; + expect(localVariables.delete("amount")).is.true; - const amount = localVariables.get("amount") as bigint; - expect(localVariables.delete("amount")).is.true; + const redeemerMessage = localVariables.get("redeemerMessage") as Buffer; + expect(localVariables.delete("redeemerMessage")).is.true; - const redeemerMessage = localVariables.get("redeemerMessage") as Buffer; - expect(localVariables.delete("redeemerMessage")).is.true; + const rentRecipient = Keypair.generate().publicKey; + const ix = await tokenRouter.consumePreparedFillIx({ + preparedFill, + redeemer: redeemer.publicKey, + dstToken: payerToken, + rentRecipient, + }); - const rentRecipient = Keypair.generate().publicKey; - const ix = await tokenRouter.consumePreparedFillIx({ - preparedFill, - redeemer: redeemer.publicKey, - dstToken: payerToken, - rentRecipient, - }); + const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); + const solBalanceBefore = await connection.getBalance(rentRecipient); - const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); - const solBalanceBefore = await connection.getBalance(rentRecipient); + await expectIxOk(connection, [ix], [payer, redeemer]); - await expectIxOk(connection, [ix], [payer, redeemer]); + // Check balance. + const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); + expect(balanceAfter).equals(balanceBefore + amount); - // Check balance. - const { amount: balanceAfter } = await splToken.getAccount(connection, payerToken); - expect(balanceAfter).equals(balanceBefore + amount); + const solBalanceAfter = await connection.getBalance(rentRecipient); + const preparedFillRent = await connection.getMinimumBalanceForRentExemption( + 152 + redeemerMessage.length, + ); + const preparedTokenRent = await connection.getMinimumBalanceForRentExemption( + splToken.AccountLayout.span, + ); + expect(solBalanceAfter).equals( + solBalanceBefore + preparedFillRent + preparedTokenRent, + ); - const solBalanceAfter = await connection.getBalance(rentRecipient); - const preparedFillRent = await connection.getMinimumBalanceForRentExemption( - 152 + redeemerMessage.length, - ); - const preparedTokenRent = await connection.getMinimumBalanceForRentExemption( - splToken.AccountLayout.span, - ); - expect(solBalanceAfter).equals(solBalanceBefore + preparedFillRent + preparedTokenRent); + const accInfo = await connection.getAccountInfo(preparedFill); + expect(accInfo).is.null; + }); - const accInfo = await connection.getAccountInfo(preparedFill); - expect(accInfo).is.null; - }); + it("Token Router ..... Cannot Redeem Same Fast Fill Again", async function () { + const vaa = localVariables.get("vaa") as PublicKey; + expect(localVariables.delete("vaa")).is.true; - it("Token Router ..... Cannot Redeem Same Fast Fill Again", async function () { - const vaa = localVariables.get("vaa") as PublicKey; - expect(localVariables.delete("vaa")).is.true; + const redeemedFastFill = localVariables.get("redeemedFastFill") as PublicKey; + expect(localVariables.delete("redeemedFastFill")).is.true; - const redeemedFastFill = localVariables.get("redeemedFastFill") as PublicKey; - expect(localVariables.delete("redeemedFastFill")).is.true; + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, + await expectIxErr( + connection, + [ix], + [payer], + `Allocate: account Address { address: ${redeemedFastFill.toString()}, base: None } already in use`, + ); }); - await expectIxErr( - connection, - [ix], - [payer], - `Allocate: account Address { address: ${redeemedFastFill.toString()}, base: None } already in use`, - ); - }); - - it("Token Router ..... Cannot Redeem Fast Fill with Emitter Chain ID != Solana", async function () { - const amount = 69n; - const message = new LiquidityLayerMessage({ - fastFill: { - fill: { - sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: new Array(32).fill(0), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), + it("Token Router ..... Cannot Redeem Fast Fill with Emitter Chain ID != Solana", async function () { + const amount = 69n; + const message = new LiquidityLayerMessage({ + fastFill: { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: new Array(32).fill(0), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + amount, }, - amount, - }, + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + message, + "avalanche", + ); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); + + await expectIxErr( + connection, + [ix], + [payer], + "Error Code: InvalidEmitterForFastFill", + ); }); - const vaa = await postLiquidityLayerVaa( - connection, - payer, - MOCK_GUARDIANS, - Array.from(matchingEngine.custodianAddress().toBuffer()), - wormholeSequence++, - message, - "avalanche", - ); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, + it("Token Router ..... Cannot Redeem Fast Fill with Emitter Address != Matching Engine Custodian", async function () { + const amount = 69n; + const message = new LiquidityLayerMessage({ + fastFill: { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: new Array(32).fill(0), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + amount, + }, + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(Buffer.alloc(32, "deadbeef", "hex")), + wormholeSequence++, + message, + "solana", + ); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); + + await expectIxErr( + connection, + [ix], + [payer], + "Error Code: InvalidEmitterForFastFill", + ); }); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidEmitterForFastFill"); - }); + it("Token Router ..... Cannot Redeem Fast Fill with Invalid VAA", async function () { + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + Buffer.from("Oh noes!"), // message + "solana", + ); - it("Token Router ..... Cannot Redeem Fast Fill with Emitter Address != Matching Engine Custodian", async function () { - const amount = 69n; - const message = new LiquidityLayerMessage({ - fastFill: { - fill: { - sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: new Array(32).fill(0), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), - }, - amount, - }, - }); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); - const vaa = await postLiquidityLayerVaa( - connection, - payer, - MOCK_GUARDIANS, - Array.from(Buffer.alloc(32, "deadbeef", "hex")), - wormholeSequence++, - message, - "solana", - ); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidVaa"); }); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidEmitterForFastFill"); + it("Token Router ..... Cannot Redeem Fast Fill with Invalid Payload", async function () { + const amount = 69n; + const message = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: new Array(32).fill(0), + amount, + sourceCctpDomain: 69, + destinationCctpDomain: 69, + cctpNonce: 69n, + burnSource: new Array(32).fill(0), + mintRecipient: new Array(32).fill(0), + }, + { + fill: { + sourceChain: foreignChain, + orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), + redeemer: new Array(32).fill(0), + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + }, + ), + }); + + const vaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + Array.from(matchingEngine.custodianAddress().toBuffer()), + wormholeSequence++, + message, + "solana", + ); + const ix = await tokenRouter.redeemFastFillIx({ + payer: payer.publicKey, + vaa, + }); + + await expectIxErr(connection, [ix], [payer], "Error Code: InvalidPayloadId"); + }); }); - it("Token Router ..... Cannot Redeem Fast Fill with Invalid VAA", async function () { - const vaa = await postLiquidityLayerVaa( - connection, - payer, - MOCK_GUARDIANS, - Array.from(matchingEngine.custodianAddress().toBuffer()), - wormholeSequence++, - Buffer.from("Oh noes!"), // message - "solana", - ); + async function prepareOrderResponse(args: { + initAuction: boolean; + executeOrder: boolean; + prepareOrderResponse: boolean; + }) { + const { initAuction, executeOrder, prepareOrderResponse } = args; + + const redeemer = Keypair.generate(); + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage( + matchingEngine, + sourceCctpDomain, + cctpNonce, + amountIn, + ); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, + const maxFee = 42069n; + const currTime = await connection.getBlockTime(await connection.getSlot()); + const fastMessage = new LiquidityLayerMessage({ + fastMarketOrder: { + amountIn, + minAmountOut: 0n, + targetChain: wormholeSdk.CHAINS.solana, + redeemer: Array.from(redeemer.publicKey.toBuffer()), + sender: new Array(32).fill(0), + refundAddress: new Array(32).fill(0), + maxFee, + initAuctionFee: 2000n, + deadline: currTime! + 2, + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, }); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidVaa"); - }); - - it("Token Router ..... Cannot Redeem Fast Fill with Invalid Payload", async function () { - const amount = 69n; - const message = new LiquidityLayerMessage({ + const finalizedMessage = new LiquidityLayerMessage({ deposit: new LiquidityLayerDeposit( { - tokenAddress: new Array(32).fill(0), - amount, - sourceCctpDomain: 69, - destinationCctpDomain: 69, - cctpNonce: 69n, - burnSource: new Array(32).fill(0), - mintRecipient: new Array(32).fill(0), + tokenAddress: burnMessage.burnTokenAddress, + amount: amountIn, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: Array.from( + matchingEngine.cctpMintRecipientAddress().toBuffer(), + ), }, { - fill: { - sourceChain: foreignChain, - orderSender: Array.from(Buffer.alloc(32, "d00d", "hex")), - redeemer: new Array(32).fill(0), - redeemerMessage: Buffer.from("Somebody set up us the bomb"), + slowOrderResponse: { + baseFee: 420n, }, }, ), }); - const vaa = await postLiquidityLayerVaa( + const finalizedVaa = await postLiquidityLayerVaa( connection, payer, MOCK_GUARDIANS, - Array.from(matchingEngine.custodianAddress().toBuffer()), + ethRouter, wormholeSequence++, - message, - "solana", + finalizedMessage, ); - const ix = await tokenRouter.redeemFastFillIx({ - payer: payer.publicKey, - vaa, - }); + const finalizedVaaAccount = await VaaAccount.fetch(connection, finalizedVaa); - await expectIxErr(connection, [ix], [payer], "Error Code: InvalidPayloadId"); - }); + const fastVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + fastMessage, + ); + const fastVaaAccount = await VaaAccount.fetch(connection, fastVaa); + + const prepareIx = await matchingEngine.prepareOrderResponseCctpIx( + { + payer: payer.publicKey, + fastVaa, + finalizedVaa, + }, + { + encodedCctpMessage, + cctpAttestation, + }, + ); + + const fastVaaHash = fastVaaAccount.digest(); + const preparedBy = payer.publicKey; + const preparedOrderResponse = matchingEngine.preparedOrderResponseAddress( + preparedBy, + fastVaaHash, + ); + const auction = matchingEngine.auctionAddress(fastVaaHash); + + if (initAuction) { + const [approveIx, ix] = await matchingEngine.placeInitialOfferIx( + { + payer: offerAuthorityOne.publicKey, + fastVaa, + }, + maxFee, + ); + await expectIxOk(connection, [approveIx, ix], [offerAuthorityOne]); + + if (executeOrder) { + const { info } = await matchingEngine.fetchAuction({ address: auction }); + if (info === null) { + throw new Error("No auction info found"); + } + const { configId, bestOfferToken, initialOfferToken, startSlot } = info; + const auctionConfig = matchingEngine.auctionConfigAddress(configId); + const duration = (await matchingEngine.fetchAuctionConfig(configId)).parameters + .duration; + + await new Promise((f) => setTimeout(f, startSlot.toNumber() + duration + 200)); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 400_000, + }); + const ix = await matchingEngine.executeFastOrderCctpIx({ + payer: payer.publicKey, + fastVaa, + auction, + auctionConfig, + bestOfferToken, + initialOfferToken, + }); + await expectIxOk(connection, [computeIx, ix], [payer]); + } + } + + if (prepareOrderResponse) { + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 400_000, + }); + await expectIxOk(connection, [computeIx, prepareIx], [payer]); + } + + return { + fastVaa, + fastVaaAccount, + finalizedVaa, + finalizedVaaAccount, + prepareIx: prepareOrderResponse ? null : prepareIx, + preparedOrderResponse, + auction, + preparedBy, + }; + } }); }); + +async function craftCctpTokenBurnMessage( + engine: matchingEngineSdk.MatchingEngineProgram, + sourceCctpDomain: number, + cctpNonce: bigint, + amount: bigint, + overrides: { destinationCctpDomain?: number } = {}, +) { + const { destinationCctpDomain: inputDestinationCctpDomain } = overrides; + + const messageTransmitterProgram = engine.messageTransmitterProgram(); + const { version, localDomain } = await messageTransmitterProgram.fetchMessageTransmitterConfig( + messageTransmitterProgram.messageTransmitterConfigAddress(), + ); + const destinationCctpDomain = inputDestinationCctpDomain ?? localDomain; + + const tokenMessengerMinterProgram = engine.tokenMessengerMinterProgram(); + const { tokenMessenger: sourceTokenMessenger } = + await tokenMessengerMinterProgram.fetchRemoteTokenMessenger( + tokenMessengerMinterProgram.remoteTokenMessengerAddress(sourceCctpDomain), + ); + + const burnMessage = new CctpTokenBurnMessage( + { + version, + sourceDomain: sourceCctpDomain, + destinationDomain: destinationCctpDomain, + nonce: cctpNonce, + sender: sourceTokenMessenger, + recipient: Array.from(tokenMessengerMinterProgram.ID.toBuffer()), // targetTokenMessenger + targetCaller: Array.from(engine.custodianAddress().toBuffer()), // targetCaller + }, + 0, + Array.from(wormholeSdk.tryNativeToUint8Array(ETHEREUM_USDC_ADDRESS, "ethereum")), // sourceTokenAddress + Array.from(engine.cctpMintRecipientAddress().toBuffer()), // mint recipient + amount, + new Array(32).fill(0), // burnSource + ); + + const encodedCctpMessage = burnMessage.encode(); + const cctpAttestation = new CircleAttester().createAttestation(encodedCctpMessage); + + return { + destinationCctpDomain, + burnMessage, + encodedCctpMessage, + cctpAttestation, + }; +} From f1a556839fb1dcecf5274229a2377910cafe3e19 Mon Sep 17 00:00:00 2001 From: A5 Pickle Date: Fri, 16 Feb 2024 09:02:07 -0600 Subject: [PATCH 123/126] solana: add token-router-sdk --- solana/Cargo.lock | 9 +++ solana/modules/token-router-sdk/Cargo.toml | 20 ++++++ .../token-router-sdk/src/accounts/mod.rs | 2 + .../src/accounts/prepared_fill.rs | 62 +++++++++++++++++++ solana/modules/token-router-sdk/src/lib.rs | 3 + .../src/processor/redeem_fill/cctp.rs | 20 +++--- .../src/processor/redeem_fill/fast.rs | 20 +++--- .../token-router/src/state/prepared_fill.rs | 19 +++++- .../ts/src/tokenRouter/state/PreparedFill.ts | 28 +++------ solana/ts/tests/04__interaction.ts | 23 ++++--- 10 files changed, 154 insertions(+), 52 deletions(-) create mode 100644 solana/modules/token-router-sdk/Cargo.toml create mode 100644 solana/modules/token-router-sdk/src/accounts/mod.rs create mode 100644 solana/modules/token-router-sdk/src/accounts/prepared_fill.rs create mode 100644 solana/modules/token-router-sdk/src/lib.rs diff --git a/solana/Cargo.lock b/solana/Cargo.lock index 0579a336..299524f4 100644 --- a/solana/Cargo.lock +++ b/solana/Cargo.lock @@ -2334,6 +2334,15 @@ dependencies = [ "wormhole-solana-utils", ] +[[package]] +name = "token-router-sdk" +version = "0.0.0" +dependencies = [ + "anchor-lang", + "token-router", + "wormhole-io", +] + [[package]] name = "toml" version = "0.5.11" diff --git a/solana/modules/token-router-sdk/Cargo.toml b/solana/modules/token-router-sdk/Cargo.toml new file mode 100644 index 00000000..1f48ea76 --- /dev/null +++ b/solana/modules/token-router-sdk/Cargo.toml @@ -0,0 +1,20 @@ +[package] +name = "token-router-sdk" +edition.workspace = true +version.workspace = true +authors.workspace = true +license.workspace = true +homepage.workspace = true +repository.workspace = true + +# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html + +[features] +testnet = ["token-router/testnet"] +localnet = ["token-router/localnet"] + +[dependencies] +token-router = { workspace = true, features = ["cpi"] } + +wormhole-io.workspace = true +anchor-lang.workspace = true \ No newline at end of file diff --git a/solana/modules/token-router-sdk/src/accounts/mod.rs b/solana/modules/token-router-sdk/src/accounts/mod.rs new file mode 100644 index 00000000..ccc23e69 --- /dev/null +++ b/solana/modules/token-router-sdk/src/accounts/mod.rs @@ -0,0 +1,2 @@ +mod prepared_fill; +pub use prepared_fill::*; diff --git a/solana/modules/token-router-sdk/src/accounts/prepared_fill.rs b/solana/modules/token-router-sdk/src/accounts/prepared_fill.rs new file mode 100644 index 00000000..56badc77 --- /dev/null +++ b/solana/modules/token-router-sdk/src/accounts/prepared_fill.rs @@ -0,0 +1,62 @@ +use std::ops::Deref; + +use anchor_lang::{prelude::*, Discriminator}; +use token_router::state::PreparedFillInfo; +use wormhole_io::{Readable, TypePrefixedPayload}; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct PreparedFill { + pub info: PreparedFillInfo, + pub message_size: u32, + pub redeemer_message: P, +} + +impl Owner for PreparedFill

{ + fn owner() -> Pubkey { + token_router::ID + } +} + +impl Discriminator for PreparedFill

{ + const DISCRIMINATOR: [u8; 8] = token_router::state::PreparedFill::DISCRIMINATOR; +} + +impl AccountSerialize for PreparedFill

{ + fn try_serialize(&self, writer: &mut W) -> Result<()> { + Self::DISCRIMINATOR.serialize(writer)?; + self.info.serialize(writer)?; + self.message_size.serialize(writer)?; + self.redeemer_message.write(writer)?; + Ok(()) + } +} + +impl AccountDeserialize for PreparedFill

{ + fn try_deserialize(buf: &mut &[u8]) -> Result { + let disc_len = Self::DISCRIMINATOR.len(); + if buf.len() < disc_len { + return err!(ErrorCode::AccountDidNotDeserialize); + }; + if Self::DISCRIMINATOR != buf[..disc_len] { + return err!(ErrorCode::AccountDidNotDeserialize); + } + Self::try_deserialize_unchecked(buf) + } + + fn try_deserialize_unchecked(buf: &mut &[u8]) -> Result { + let mut data = &buf[Self::DISCRIMINATOR.len()..]; + Ok(Self { + info: AnchorDeserialize::deserialize(&mut data)?, + message_size: AnchorDeserialize::deserialize(&mut data)?, + redeemer_message: Readable::read(&mut data)?, + }) + } +} + +impl Deref for PreparedFill

{ + type Target = PreparedFillInfo; + + fn deref(&self) -> &Self::Target { + &self.info + } +} diff --git a/solana/modules/token-router-sdk/src/lib.rs b/solana/modules/token-router-sdk/src/lib.rs new file mode 100644 index 00000000..28222048 --- /dev/null +++ b/solana/modules/token-router-sdk/src/lib.rs @@ -0,0 +1,3 @@ +pub mod accounts; + +pub use token_router::cpi::*; diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index d4b6ed92..ce1a3046 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -1,6 +1,6 @@ use crate::{ error::TokenRouterError, - state::{Custodian, FillType, PreparedFill}, + state::{Custodian, FillType, PreparedFill, PreparedFillInfo}, }; use anchor_lang::{prelude::*, system_program}; use anchor_spl::token; @@ -263,14 +263,16 @@ fn handle_redeem_fill_cctp(ctx: Context, args: CctpMessageArgs) // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { - vaa_hash: vaa.digest().0, - bump: ctx.bumps.prepared_fill, - prepared_custody_token_bump: ctx.bumps.prepared_custody_token, - redeemer: Pubkey::from(fill.redeemer()), - prepared_by: ctx.accounts.payer.key(), - fill_type: FillType::WormholeCctpDeposit, - source_chain: fill.source_chain(), - order_sender: fill.order_sender(), + info: PreparedFillInfo { + vaa_hash: vaa.digest().0, + bump: ctx.bumps.prepared_fill, + prepared_custody_token_bump: ctx.bumps.prepared_custody_token, + redeemer: Pubkey::from(fill.redeemer()), + prepared_by: ctx.accounts.payer.key(), + fill_type: FillType::WormholeCctpDeposit, + source_chain: fill.source_chain(), + order_sender: fill.order_sender(), + }, redeemer_message: fill.message_to_vec(), }); diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 6715dc26..512c5627 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -1,6 +1,6 @@ use crate::{ error::TokenRouterError, - state::{Custodian, FillType, PreparedFill}, + state::{Custodian, FillType, PreparedFill, PreparedFillInfo}, }; use anchor_lang::{prelude::*, system_program}; use anchor_spl::token; @@ -150,14 +150,16 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { // Set prepared fill data. ctx.accounts.prepared_fill.set_inner(PreparedFill { - vaa_hash: vaa.digest().0, - bump: ctx.bumps.prepared_fill, - prepared_custody_token_bump: ctx.bumps.prepared_custody_token, - redeemer: Pubkey::from(fill.redeemer()), - prepared_by: ctx.accounts.payer.key(), - fill_type: FillType::FastFill, - source_chain: fill.source_chain(), - order_sender: fill.order_sender(), + info: PreparedFillInfo { + vaa_hash: vaa.digest().0, + bump: ctx.bumps.prepared_fill, + prepared_custody_token_bump: ctx.bumps.prepared_custody_token, + redeemer: Pubkey::from(fill.redeemer()), + prepared_by: ctx.accounts.payer.key(), + fill_type: FillType::FastFill, + source_chain: fill.source_chain(), + order_sender: fill.order_sender(), + }, redeemer_message: fill.message_to_vec(), }); diff --git a/solana/programs/token-router/src/state/prepared_fill.rs b/solana/programs/token-router/src/state/prepared_fill.rs index 2a7f3f31..61b1f429 100644 --- a/solana/programs/token-router/src/state/prepared_fill.rs +++ b/solana/programs/token-router/src/state/prepared_fill.rs @@ -7,9 +7,8 @@ pub enum FillType { FastFill, } -#[account] -#[derive(Debug)] -pub struct PreparedFill { +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, InitSpace)] +pub struct PreparedFillInfo { pub vaa_hash: [u8; 32], pub bump: u8, pub prepared_custody_token_bump: u8, @@ -21,6 +20,12 @@ pub struct PreparedFill { pub source_chain: u16, pub order_sender: [u8; 32], pub redeemer: Pubkey, +} + +#[account] +#[derive(Debug)] +pub struct PreparedFill { + pub info: PreparedFillInfo, pub redeemer_message: Vec, } @@ -31,3 +36,11 @@ impl PreparedFill { 8 + 32 + 1 + 32 + 32 + FillType::INIT_SPACE + 8 + 2 + 32 + 4 + payload_len } } + +impl std::ops::Deref for PreparedFill { + type Target = PreparedFillInfo; + + fn deref(&self) -> &Self::Target { + &self.info + } +} diff --git a/solana/ts/src/tokenRouter/state/PreparedFill.ts b/solana/ts/src/tokenRouter/state/PreparedFill.ts index 8f4c77fb..9041d1d9 100644 --- a/solana/ts/src/tokenRouter/state/PreparedFill.ts +++ b/solana/ts/src/tokenRouter/state/PreparedFill.ts @@ -7,7 +7,7 @@ export type FillType = { fastFill?: {}; }; -export class PreparedFill { +export type PreparedFillInfo = { vaaHash: Array; bump: number; preparedCustodyTokenBump: number; @@ -16,28 +16,14 @@ export class PreparedFill { sourceChain: number; orderSender: Array; redeemer: PublicKey; +}; + +export class PreparedFill { + info: PreparedFillInfo; redeemerMessage: Buffer; - constructor( - vaaHash: Array, - bump: number, - preparedCustodyTokenBump: number, - redeemer: PublicKey, - preparedBy: PublicKey, - fillType: FillType, - amount: BN, - sourceChain: number, - orderSender: Array, - redeemerMessage: Buffer, - ) { - this.vaaHash = vaaHash; - this.bump = bump; - this.preparedCustodyTokenBump = preparedCustodyTokenBump; - this.preparedBy = preparedBy; - this.fillType = fillType; - this.sourceChain = sourceChain; - this.orderSender = orderSender; - this.redeemer = redeemer; + constructor(info: PreparedFillInfo, redeemerMessage: Buffer) { + this.info = info; this.redeemerMessage = redeemerMessage; } diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index fe88bcbe..2c7e442f 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -364,18 +364,21 @@ describe("Matching Engine <> Token Router", function () { { const preparedFillData = await tokenRouter.fetchPreparedFill(preparedFill); - const { bump, preparedCustodyTokenBump } = preparedFillData; + const { + info: { bump, preparedCustodyTokenBump }, + } = preparedFillData; expect(preparedFillData).to.eql( new tokenRouterSdk.PreparedFill( - Array.from(vaaHash), - bump, - preparedCustodyTokenBump, - redeemer.publicKey, - payer.publicKey, - { fastFill: {} }, - bigintToU64BN(amount), - foreignChain, - orderSender, + { + vaaHash: Array.from(vaaHash), + bump, + preparedCustodyTokenBump, + redeemer: redeemer.publicKey, + preparedBy: payer.publicKey, + fillType: { fastFill: {} }, + sourceChain: foreignChain, + orderSender, + }, redeemerMessage, ), ); From db7f618077116417be55e017d959910fcdc14a19 Mon Sep 17 00:00:00 2001 From: Alexander Date: Wed, 21 Feb 2024 11:50:54 -0500 Subject: [PATCH 124/126] solana: add basic CI for solana integration branch (#4) --- .github/workflows/solana-integration.yml | 43 ++++++++++++++++++++++++ 1 file changed, 43 insertions(+) create mode 100644 .github/workflows/solana-integration.yml diff --git a/.github/workflows/solana-integration.yml b/.github/workflows/solana-integration.yml new file mode 100644 index 00000000..fd04f533 --- /dev/null +++ b/.github/workflows/solana-integration.yml @@ -0,0 +1,43 @@ +name: Solana Integration Checks +on: + push: + branches: + - solana/integration + pull_request: null + +env: + RUSTC_VERSION: 1.76.0 +jobs: + cancel-previous-runs: + runs-on: ubuntu-latest + steps: + - name: Cancel Previous Runs + uses: styfle/cancel-workflow-action@0.9.1 + with: + access_token: ${{ github.token }} + make-lint: + name: make lint + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v4 + - name: Install toolchain + uses: dtolnay/rust-toolchain@master + with: + toolchain: ${{ env.RUSTC_VERSION }} + components: clippy, rustfmt + - name: make lint + run: make lint + working-directory: ./solana + make-test: + name: make test + runs-on: ubuntu-latest + # Anchor Docker image: https://www.anchor-lang.com/docs/verifiable-builds#images + container: backpackapp/build:v0.29.0 + steps: + - uses: actions/checkout@v4 + - name: Set default Rust toolchain + run: rustup default stable + working-directory: ./solana + - name: make test + run: make test + working-directory: ./solana From d86414746339b406a5a9b789259b3abcf7f1e2ce Mon Sep 17 00:00:00 2001 From: Alexander Date: Fri, 23 Feb 2024 23:17:16 -0500 Subject: [PATCH 125/126] solana: fix several comments (#5) --- .../matching-engine/src/processor/auction/offer/improve.rs | 2 +- .../src/processor/auction/prepare_settlement/cctp.rs | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs index 39c4f1c4..1ecb8aff 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/improve.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/improve.rs @@ -79,7 +79,7 @@ pub fn improve_offer(ctx: Context, fee_offer: u64) -> Result<()> { ); } - // Transfer funds from the `best_offer` token account to the `offer_token` token account, + // Transfer funds from the `offer_token` token account to the `best_offer_token` token account, // but only if the pubkeys are different. let offer_token = ctx.accounts.offer_token.key(); if auction_info.best_offer_token != offer_token { diff --git a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs index 1e246596..78f85e80 100644 --- a/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs +++ b/solana/programs/matching-engine/src/processor/auction/prepare_settlement/cctp.rs @@ -224,7 +224,7 @@ pub fn prepare_order_response_cctp( // instructions: // * settle_auction_active_cctp // * settle_auction_complete - // * execute_slow_order_no_auction + // * settle_auction_none ctx.accounts .prepared_order_response .set_inner(PreparedOrderResponse { From cd024402fceeec5d4f4bd4355d41f93be12e94ab Mon Sep 17 00:00:00 2001 From: Alexander Date: Mon, 4 Mar 2024 15:48:58 -0500 Subject: [PATCH 126/126] solana: add negative tests for MatchingEngine and TokenRouter (#6) --- solana/ts/tests/01__matchingEngine.ts | 252 ++++++++++++++++++++++++++ solana/ts/tests/02__tokenRouter.ts | 229 ++++++++++++++++++----- solana/ts/tests/04__interaction.ts | 114 ++++++++++-- 3 files changed, 539 insertions(+), 56 deletions(-) diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index fccc4a51..07c6f441 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -2667,6 +2667,258 @@ describe("Matching Engine", function () { const localVariables = new Map(); // TODO: add negative tests + it("Cannot Prepare Order Response with Emitter Chain Mismatch", async function () { + const redeemer = Keypair.generate(); + + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage(engine, sourceCctpDomain, cctpNonce, amountIn); + + const fastMessage = new LiquidityLayerMessage({ + fastMarketOrder: { + amountIn, + minAmountOut: 0n, + targetChain: wormholeSdk.CHAIN_ID_SOLANA as number, + redeemer: Array.from(redeemer.publicKey.toBuffer()), + sender: new Array(32).fill(0), + refundAddress: new Array(32).fill(0), + maxFee: 42069n, + initAuctionFee: 2000n, + deadline: 2, + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + }); + + const finalizedMessage = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount: amountIn, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: Array.from(engine.cctpMintRecipientAddress().toBuffer()), + }, + { + slowOrderResponse: { + baseFee: 420n, + }, + }, + ), + }); + + const finalizedVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + finalizedMessage, + ); + const fastVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + fastMessage, + "arbitrum", + ); + + const ix = await engine.prepareOrderResponseCctpIx( + { + payer: payer.publicKey, + fastVaa, + finalizedVaa, + mint: USDC_MINT_ADDRESS, + }, + { + encodedCctpMessage, + cctpAttestation, + }, + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, + }); + + await expectIxErr(connection, [computeIx, ix], [payer], "Error Code: VaaMismatch"); + }); + + it("Cannot Prepare Order Response with Emitter Address Mismatch", async function () { + const redeemer = Keypair.generate(); + + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage(engine, sourceCctpDomain, cctpNonce, amountIn); + + const fastMessage = new LiquidityLayerMessage({ + fastMarketOrder: { + amountIn, + minAmountOut: 0n, + targetChain: wormholeSdk.CHAIN_ID_SOLANA as number, + redeemer: Array.from(redeemer.publicKey.toBuffer()), + sender: new Array(32).fill(0), + refundAddress: new Array(32).fill(0), + maxFee: 42069n, + initAuctionFee: 2000n, + deadline: 2, + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + }); + + const finalizedMessage = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount: amountIn, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: Array.from(engine.cctpMintRecipientAddress().toBuffer()), + }, + { + slowOrderResponse: { + baseFee: 420n, + }, + }, + ), + }); + + const finalizedVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + finalizedMessage, + ); + const fastVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + arbRouter, + wormholeSequence++, + fastMessage, + ); + + const ix = await engine.prepareOrderResponseCctpIx( + { + payer: payer.publicKey, + fastVaa, + finalizedVaa, + mint: USDC_MINT_ADDRESS, + }, + { + encodedCctpMessage, + cctpAttestation, + }, + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, + }); + + await expectIxErr(connection, [computeIx, ix], [payer], "Error Code: VaaMismatch"); + }); + + it("Cannot Prepare Order Response with Emitter Sequence Mismatch", async function () { + const redeemer = Keypair.generate(); + + const sourceCctpDomain = 0; + const cctpNonce = testCctpNonce++; + const amountIn = 690000n; // 69 cents + + // Concoct a Circle message. + const burnSource = Array.from(Buffer.alloc(32, "beefdead", "hex")); + const { destinationCctpDomain, burnMessage, encodedCctpMessage, cctpAttestation } = + await craftCctpTokenBurnMessage(engine, sourceCctpDomain, cctpNonce, amountIn); + + const fastMessage = new LiquidityLayerMessage({ + fastMarketOrder: { + amountIn, + minAmountOut: 0n, + targetChain: wormholeSdk.CHAIN_ID_SOLANA as number, + redeemer: Array.from(redeemer.publicKey.toBuffer()), + sender: new Array(32).fill(0), + refundAddress: new Array(32).fill(0), + maxFee: 42069n, + initAuctionFee: 2000n, + deadline: 2, + redeemerMessage: Buffer.from("Somebody set up us the bomb"), + }, + }); + + const finalizedMessage = new LiquidityLayerMessage({ + deposit: new LiquidityLayerDeposit( + { + tokenAddress: burnMessage.burnTokenAddress, + amount: amountIn, + sourceCctpDomain, + destinationCctpDomain, + cctpNonce, + burnSource, + mintRecipient: Array.from(engine.cctpMintRecipientAddress().toBuffer()), + }, + { + slowOrderResponse: { + baseFee: 420n, + }, + }, + ), + }); + + const finalizedVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence++, + finalizedMessage, + ); + const fastVaa = await postLiquidityLayerVaa( + connection, + payer, + MOCK_GUARDIANS, + ethRouter, + wormholeSequence + 2n, + fastMessage, + ); + + const ix = await engine.prepareOrderResponseCctpIx( + { + payer: payer.publicKey, + fastVaa, + finalizedVaa, + mint: USDC_MINT_ADDRESS, + }, + { + encodedCctpMessage, + cctpAttestation, + }, + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, + }); + + await expectIxErr(connection, [computeIx, ix], [payer], "Error Code: VaaMismatch"); + }); + + // TODO: Test timestamp mismatch + it.skip("Cannot Prepare Order Response with VAA Timestamp Mismatch", async function () {}); it("Prepare Order Response", async function () { const redeemer = Keypair.generate(); diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index bce060ba..c1092c1a 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -387,16 +387,161 @@ describe("Token Router", function () { const localVariables = new Map(); - it.skip("Cannot Prepare Market Order with Insufficient Amount", async function () { - // TODO + it("Cannot Prepare Market Order with Insufficient Amount", async function () { + const orderSender = Keypair.generate(); + const preparedOrder = Keypair.generate(); + + const amountIn = 0n; + const minAmountOut = 0n; + const targetChain = foreignChain; + const redeemer = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const redeemerMessage = Buffer.from("All your base are belong to us"); + const ix = await tokenRouter.prepareMarketOrderIx( + { + payer: payer.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + srcToken: payerToken, + refundToken: payerToken, + }, + { + amountIn, + minAmountOut, + targetChain, + redeemer, + redeemerMessage, + }, + ); + + const approveIx = splToken.createApproveInstruction( + payerToken, + tokenRouter.custodianAddress(), + payer.publicKey, + amountIn, + ); + + await expectIxErr( + connection, + [approveIx, ix], + [payer, orderSender, preparedOrder], + "Error Code: InsufficientAmount", + ); }); - it.skip("Cannot Prepare Market Order with Invalid Redeemer", async function () { - // TODO + it("Cannot Prepare Market Order with Invalid Redeemer", async function () { + const orderSender = Keypair.generate(); + const preparedOrder = Keypair.generate(); + + const amountIn = 69n; + const minAmountOut = 0n; + const targetChain = foreignChain; + const redeemer = Array.from(Buffer.alloc(32, 0, "hex")); + const redeemerMessage = Buffer.from("All your base are belong to us"); + const ix = await tokenRouter.prepareMarketOrderIx( + { + payer: payer.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + srcToken: payerToken, + refundToken: payerToken, + }, + { + amountIn, + minAmountOut, + targetChain, + redeemer, + redeemerMessage, + }, + ); + + const approveIx = splToken.createApproveInstruction( + payerToken, + tokenRouter.custodianAddress(), + payer.publicKey, + amountIn, + ); + + await expectIxErr( + connection, + [approveIx, ix], + [payer, orderSender, preparedOrder], + "Error Code: InvalidRedeemer", + ); }); - it.skip("Cannot Prepare Market Order without Delegating Authority to Custodian", async function () { - // TODO + it("Cannot Prepare Market Order with Min Amount Too High", async function () { + const orderSender = Keypair.generate(); + const preparedOrder = Keypair.generate(); + + const amountIn = 1n; + const minAmountOut = 2n; + const targetChain = foreignChain; + const redeemer = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const redeemerMessage = Buffer.from("All your base are belong to us"); + const ix = await tokenRouter.prepareMarketOrderIx( + { + payer: payer.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + srcToken: payerToken, + refundToken: payerToken, + }, + { + amountIn, + minAmountOut, + targetChain, + redeemer, + redeemerMessage, + }, + ); + + const approveIx = splToken.createApproveInstruction( + payerToken, + tokenRouter.custodianAddress(), + payer.publicKey, + amountIn, + ); + + await expectIxErr( + connection, + [approveIx, ix], + [payer, orderSender, preparedOrder], + "Error Code: MinAmountOutTooHigh", + ); + }); + + it("Cannot Prepare Market Order without Delegating Authority to Custodian", async function () { + const orderSender = Keypair.generate(); + const preparedOrder = Keypair.generate(); + + const amountIn = 69n; + const minAmountOut = 0n; + const targetChain = foreignChain; + const redeemer = Array.from(Buffer.alloc(32, "deadbeef", "hex")); + const redeemerMessage = Buffer.from("All your base are belong to us"); + const ix = await tokenRouter.prepareMarketOrderIx( + { + payer: payer.publicKey, + orderSender: orderSender.publicKey, + preparedOrder: preparedOrder.publicKey, + srcToken: payerToken, + refundToken: payerToken, + }, + { + amountIn, + minAmountOut, + targetChain, + redeemer, + redeemerMessage, + }, + ); + + await expectIxErr( + connection, + [ix], + [payer, orderSender, preparedOrder], + "Error: owner does not match", + ); }); it("Prepare Market Order with Some Min Amount Out", async function () { @@ -651,9 +796,8 @@ describe("Token Router", function () { routerEndpoint: unregisteredEndpoint, }); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxErr( connection, [ix], @@ -665,8 +809,21 @@ describe("Token Router", function () { ); }); - it.skip("Cannot Place Market Order without Original Payer", async function () { - // TODO + it("Cannot Place Market Order without Original Payer", async function () { + const preparedOrder = localVariables.get("preparedOrder") as PublicKey; + + const newPayer = Keypair.generate(); + const ix = await tokenRouter.placeMarketOrderCctpIx({ + payer: newPayer.publicKey, + preparedOrder, + }); + + await expectIxErr( + connection, + [ix], + [newPayer], + "Transaction signature verification failure", + ); }); it("Cannot Place Market Order without Order Sender", async function () { @@ -700,9 +857,8 @@ describe("Token Router", function () { preparedOrder, }); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxOk(connection, [ix], [payer, orderSender], { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -769,9 +925,8 @@ describe("Token Router", function () { preparedOrder, }); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxOk(connection, [ix], [payer, orderSender], { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -796,9 +951,8 @@ describe("Token Router", function () { const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxOk( connection, [approveIx, prepareIx, ix], @@ -991,9 +1145,8 @@ describe("Token Router", function () { units: 300_000, }); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxErr( connection, [computeIx, ix], @@ -1064,9 +1217,8 @@ describe("Token Router", function () { units: 300_000, }); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxErr( connection, [computeIx, ix], @@ -1138,9 +1290,8 @@ describe("Token Router", function () { units: 300_000, }); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxErr( connection, [computeIx, ix], @@ -1204,9 +1355,8 @@ describe("Token Router", function () { }, ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxErr(connection, [ix], [payer], "Error Code: InvalidPayloadId", { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -1278,9 +1428,8 @@ describe("Token Router", function () { }, ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized", { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -1331,9 +1480,8 @@ describe("Token Router", function () { cctpMintRecipient, ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxOk(connection, [computeIx, ix], [payer], { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -1366,9 +1514,8 @@ describe("Token Router", function () { args, ); - const { value: lookupTableAccount } = await connection.getAddressLookupTable( - lookupTableAddress, - ); + const { value: lookupTableAccount } = + await connection.getAddressLookupTable(lookupTableAddress); await expectIxOk(connection, [ix], [payer], { addressLookupTableAccounts: [lookupTableAccount!], }); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 2c7e442f..5e116c72 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -32,6 +32,7 @@ import { expectIxErr, expectIxOk, postLiquidityLayerVaa, + waitUntilSlot, } from "./helpers"; chaiUse(chaiAsPromised); @@ -157,20 +158,6 @@ describe("Matching Engine <> Token Router", function () { let wormholeSequence = 4000n; - const baseFastOrder: FastMarketOrder = { - amountIn: 50000000000n, - minAmountOut: 0n, - targetChain: wormholeSdk.CHAINS.solana, - redeemer: Array.from(Buffer.alloc(32, "deadbeef", "hex")), - sender: Array.from(Buffer.alloc(32, "beefdead", "hex")), - refundAddress: Array.from(Buffer.alloc(32, "beef", "hex")), - maxFee: 1000000n, - initAuctionFee: 100n, - deadline: 0, - redeemerMessage: Buffer.from("All your base are belong to us."), - }; - const sourceCctpDomain = 0; - describe("Settle Auction", function () { describe("Settle No Auction (Local)", function () { it("Settle", async function () { @@ -201,7 +188,7 @@ describe("Matching Engine <> Token Router", function () { describe("Settle Active Auction (Local)", function () { it("Settle", async function () { - const { prepareIx, preparedOrderResponse, auction, fastVaa, finalizedVaa } = + const { prepareIx, preparedOrderResponse, auction, fastVaa } = await prepareOrderResponse({ initAuction: true, executeOrder: false, @@ -255,6 +242,103 @@ describe("Matching Engine <> Token Router", function () { }); }); + describe("Execute Fast Order (Local)", function () { + it("Cannot Execute Fast Order (Auction Period Not Expired)", async function () { + const { auction: auctionAddress, fastVaa } = await prepareOrderResponse({ + initAuction: true, + executeOrder: false, + prepareOrderResponse: false, + }); + + const { address: executorToken } = await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + liquidator.publicKey, + ); + + const settleIx = await matchingEngine.executeFastOrderLocalIx({ + payer: payer.publicKey, + fastVaa, + auction: auctionAddress, + executorToken, + }); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 250_000, + }); + + await expectIxErr( + connection, + [settleIx, computeIx], + [payer], + "Error Code: AuctionPeriodNotExpired", + ); + }); + it("Execute after Auction Period has Expired", async function () { + const { + prepareIx, + auction: auctionAddress, + fastVaa, + } = await prepareOrderResponse({ + initAuction: true, + executeOrder: false, + prepareOrderResponse: false, + }); + + const { address: executorToken } = await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + liquidator.publicKey, + ); + + const auction = await matchingEngine.fetchAuction({ address: auctionAddress }); + const { duration, gracePeriod } = await matchingEngine.fetchAuctionParameters(); + + await waitUntilSlot( + connection, + auction.info!.startSlot.addn(duration + gracePeriod - 1).toNumber(), + ); + + const settleIx = await matchingEngine.executeFastOrderLocalIx({ + payer: payer.publicKey, + fastVaa, + auction: auctionAddress, + executorToken, + }); + + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); + + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 400_000, + }); + await expectIxOk(connection, [prepareIx!, settleIx, computeIx], [payer], { + addressLookupTableAccounts: [lookupTableAccount!], + }); + }); + + before("Add Local Router Endpoint", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); + await expectIxOk(connection, [ix], [ownerAssistant]); + }); + + after("Remove Local Router Endpoint", async function () { + const ix = await matchingEngine.removeRouterEndpointIx( + { + ownerOrAssistant: ownerAssistant.publicKey, + }, + wormholeSdk.CHAIN_ID_SOLANA, + ); + await expectIxOk(connection, [ix], [ownerAssistant]); + }); + }); + describe("Redeem Fast Fill", function () { const payerToken = splToken.getAssociatedTokenAddressSync( USDC_MINT_ADDRESS,