-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathclaim_vesting.rs
176 lines (160 loc) · 6.82 KB
/
claim_vesting.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
use crate::context::{CONFIG_SEED, VESTING_BALANCE_SEED, VESTING_CONFIG_SEED, VEST_SEED};
use crate::state::checkpoints::{push_checkpoint, CheckpointData, Operation};
use crate::state::global_config::GlobalConfig;
use crate::state::stake_account::StakeAccountMetadata;
use crate::{
error::{ErrorCode, VestingError},
state::{Vesting, VestingBalance, VestingConfig},
};
use anchor_lang::prelude::*;
use anchor_spl::associated_token::AssociatedToken;
use anchor_spl::token_interface::{
transfer_checked, Mint, TokenAccount, TokenInterface, TransferChecked,
};
use std::convert::TryInto;
#[derive(Accounts)]
pub struct ClaimVesting<'info> {
#[account(mut)]
vester: Signer<'info>,
mint: InterfaceAccount<'info, Mint>,
#[account(
mut,
associated_token::mint = mint,
associated_token::authority = config,
associated_token::token_program = token_program
)]
vault: InterfaceAccount<'info, TokenAccount>,
#[account(
mut,
token::mint = mint
)]
vester_ta: InterfaceAccount<'info, TokenAccount>,
#[account(
mut,
constraint = config.finalized @ VestingError::VestingUnfinalized,
seeds = [VESTING_CONFIG_SEED.as_bytes(), global_config.vesting_admin.as_ref(), mint.key().as_ref(), config.seed.to_le_bytes().as_ref()],
bump = config.bump
)]
config: Account<'info, VestingConfig>,
#[account(
mut,
close = vester,
constraint = Clock::get()?.unix_timestamp >= vest.maturation @ VestingError::NotFullyVested,
has_one = vester_ta, // This check is arbitrary, as ATA is baked into the PDA
has_one = config, // This check is arbitrary, as ATA is baked into the PDA
seeds = [VEST_SEED.as_bytes(), config.key().as_ref(), vester_ta.key().as_ref(), vest.maturation.to_le_bytes().as_ref()],
bump = vest.bump
)]
vest: Account<'info, Vesting>,
#[account(
mut,
has_one = vester,
seeds = [VESTING_BALANCE_SEED.as_bytes(), config.key().as_ref(), vester_ta.owner.key().as_ref()],
bump = vesting_balance.bump
)]
vesting_balance: Account<'info, VestingBalance>,
/// CheckpointData and StakeAccountMetadata accounts are optional because
/// in order to be able to claim vests that have not been delegated
#[account(mut)]
pub stake_account_checkpoints: Option<AccountLoader<'info, CheckpointData>>,
#[account(mut)]
pub stake_account_metadata: Option<Box<Account<'info, StakeAccountMetadata>>>,
#[account(
seeds = [CONFIG_SEED.as_bytes()],
bump = global_config.bump,
)]
pub global_config: Box<Account<'info, GlobalConfig>>,
associated_token_program: Program<'info, AssociatedToken>,
token_program: Interface<'info, TokenInterface>,
system_program: Program<'info, System>,
}
impl<'info> ClaimVesting<'info> {
pub fn close_vesting(&mut self) -> Result<()> {
// If vesting_balance.stake_account_metadata is not set it means that vester has not
// delegated his vests
if self.vesting_balance.stake_account_metadata != Pubkey::default() {
if let (Some(stake_account_metadata), Some(stake_account_checkpoints)) = (
&mut self.stake_account_metadata,
&mut self.stake_account_checkpoints,
) {
// Check if stake account checkpoints is out of bounds
let loaded_checkpoints = stake_account_checkpoints.load()?;
require!(
loaded_checkpoints.next_index
< self.global_config.max_checkpoints_account_limit.into(),
ErrorCode::TooManyCheckpoints,
);
// Verify that the actual address matches the expected one
require!(
stake_account_metadata.delegate.key() == loaded_checkpoints.owner,
VestingError::InvalidStakeAccountCheckpoints
);
drop(loaded_checkpoints);
// Additional checks to ensure the owner matches
require!(
stake_account_metadata.owner == self.vesting_balance.vester,
VestingError::InvalidStakeAccountOwner
);
let new_recorded_vesting_balance = stake_account_metadata
.recorded_vesting_balance
.checked_sub(self.vest.amount)
.ok_or(VestingError::Underflow)?;
// Update the recorded vesting balance
stake_account_metadata
.update_recorded_vesting_balance(new_recorded_vesting_balance);
// Update checkpoints
let current_delegate_checkpoints_account_info =
stake_account_checkpoints.to_account_info();
let current_timestamp: u64 = Clock::get()?.unix_timestamp.try_into()?;
push_checkpoint(
stake_account_checkpoints,
¤t_delegate_checkpoints_account_info,
self.vest.amount,
Operation::Subtract,
current_timestamp,
&self.vester.to_account_info(),
&self.system_program.to_account_info(),
)?;
let loaded_checkpoints = stake_account_checkpoints.load()?;
if loaded_checkpoints.next_index
>= self.global_config.max_checkpoints_account_limit.into()
{
stake_account_metadata.stake_account_checkpoints_last_index += 1;
}
} else {
return err!(VestingError::ErrorOfStakeAccountParsing);
}
}
self.config.vested = self
.config
.vested
.checked_sub(self.vest.amount)
.ok_or(VestingError::Underflow)?;
self.vesting_balance.total_vesting_balance = self
.vesting_balance
.total_vesting_balance
.checked_sub(self.vest.amount)
.ok_or(VestingError::Underflow)?;
// Binding to solve for lifetime issues
let seed = self.config.seed.to_le_bytes();
let bump = [self.config.bump];
let signer_seeds = [&[
VESTING_CONFIG_SEED.as_bytes(),
self.config.admin.as_ref(),
self.config.mint.as_ref(),
&seed,
&bump,
][..]];
let ctx = CpiContext::new_with_signer(
self.token_program.to_account_info(),
TransferChecked {
from: self.vault.to_account_info(),
to: self.vester_ta.to_account_info(),
mint: self.mint.to_account_info(),
authority: self.config.to_account_info(),
},
&signer_seeds,
);
transfer_checked(ctx, self.vest.amount, self.mint.decimals)
}
}