2021-08-25 10:27:27 -07:00
|
|
|
use crate::*;
|
2021-06-27 09:50:54 -07:00
|
|
|
use proc_macro2_diagnostics::SpanDiagnosticExt;
|
2021-05-30 12:59:33 -07:00
|
|
|
use quote::quote;
|
2021-06-27 13:17:05 -07:00
|
|
|
use syn::Expr;
|
2021-05-30 12:59:33 -07:00
|
|
|
|
|
|
|
pub fn generate(f: &Field) -> proc_macro2::TokenStream {
|
2021-08-08 13:20:26 -07:00
|
|
|
let constraints = linearize(&f.constraints);
|
|
|
|
|
|
|
|
let rent = constraints
|
|
|
|
.iter()
|
|
|
|
.any(|c| matches!(c, Constraint::RentExempt(ConstraintRentExempt::Enforce)))
|
|
|
|
.then(|| quote! { let __anchor_rent = Rent::get()?; })
|
|
|
|
.unwrap_or_else(|| quote! {});
|
|
|
|
|
|
|
|
let checks: Vec<proc_macro2::TokenStream> = constraints
|
2021-05-30 12:59:33 -07:00
|
|
|
.iter()
|
|
|
|
.map(|c| generate_constraint(f, c))
|
|
|
|
.collect();
|
2021-08-08 13:20:26 -07:00
|
|
|
|
2021-05-30 12:59:33 -07:00
|
|
|
quote! {
|
2021-08-08 13:20:26 -07:00
|
|
|
#rent
|
2021-05-30 12:59:33 -07:00
|
|
|
#(#checks)*
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_composite(f: &CompositeField) -> proc_macro2::TokenStream {
|
|
|
|
let checks: Vec<proc_macro2::TokenStream> = linearize(&f.constraints)
|
|
|
|
.iter()
|
|
|
|
.filter_map(|c| match c {
|
|
|
|
Constraint::Raw(_) => Some(c),
|
|
|
|
Constraint::Literal(_) => Some(c),
|
|
|
|
_ => panic!("Invariant violation: composite constraints can only be raw or literals"),
|
|
|
|
})
|
|
|
|
.map(|c| generate_constraint_composite(f, c))
|
|
|
|
.collect();
|
|
|
|
quote! {
|
|
|
|
#(#checks)*
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Linearizes the constraint group so that constraints with dependencies
|
|
|
|
// run after those without.
|
|
|
|
pub fn linearize(c_group: &ConstraintGroup) -> Vec<Constraint> {
|
|
|
|
let ConstraintGroup {
|
|
|
|
init,
|
2021-08-25 10:27:27 -07:00
|
|
|
zeroed,
|
2021-05-30 12:59:33 -07:00
|
|
|
mutable,
|
|
|
|
signer,
|
2021-07-03 11:58:23 -07:00
|
|
|
has_one,
|
2021-05-30 12:59:33 -07:00
|
|
|
literal,
|
|
|
|
raw,
|
|
|
|
owner,
|
|
|
|
rent_exempt,
|
|
|
|
seeds,
|
|
|
|
executable,
|
|
|
|
state,
|
2021-06-09 15:40:43 -07:00
|
|
|
close,
|
2021-06-27 13:17:05 -07:00
|
|
|
address,
|
2021-10-07 13:57:47 -07:00
|
|
|
associated_token,
|
2021-05-30 12:59:33 -07:00
|
|
|
} = c_group.clone();
|
|
|
|
|
|
|
|
let mut constraints = Vec::new();
|
|
|
|
|
2021-08-29 14:25:38 -07:00
|
|
|
if let Some(c) = zeroed {
|
|
|
|
constraints.push(Constraint::Zeroed(c));
|
2021-06-15 17:15:51 -07:00
|
|
|
}
|
2021-05-30 12:59:33 -07:00
|
|
|
if let Some(c) = init {
|
|
|
|
constraints.push(Constraint::Init(c));
|
|
|
|
}
|
2021-08-29 14:25:38 -07:00
|
|
|
if let Some(c) = seeds {
|
|
|
|
constraints.push(Constraint::Seeds(c));
|
2021-08-25 10:27:27 -07:00
|
|
|
}
|
2021-10-07 13:57:47 -07:00
|
|
|
if let Some(c) = associated_token {
|
|
|
|
constraints.push(Constraint::AssociatedToken(c));
|
|
|
|
}
|
2021-05-30 12:59:33 -07:00
|
|
|
if let Some(c) = mutable {
|
|
|
|
constraints.push(Constraint::Mut(c));
|
|
|
|
}
|
|
|
|
if let Some(c) = signer {
|
|
|
|
constraints.push(Constraint::Signer(c));
|
|
|
|
}
|
2021-07-03 11:58:23 -07:00
|
|
|
constraints.append(&mut has_one.into_iter().map(Constraint::HasOne).collect());
|
2021-06-27 17:09:46 -07:00
|
|
|
constraints.append(&mut literal.into_iter().map(Constraint::Literal).collect());
|
|
|
|
constraints.append(&mut raw.into_iter().map(Constraint::Raw).collect());
|
2021-05-30 12:59:33 -07:00
|
|
|
if let Some(c) = owner {
|
|
|
|
constraints.push(Constraint::Owner(c));
|
|
|
|
}
|
|
|
|
if let Some(c) = rent_exempt {
|
|
|
|
constraints.push(Constraint::RentExempt(c));
|
|
|
|
}
|
|
|
|
if let Some(c) = executable {
|
|
|
|
constraints.push(Constraint::Executable(c));
|
|
|
|
}
|
|
|
|
if let Some(c) = state {
|
|
|
|
constraints.push(Constraint::State(c));
|
|
|
|
}
|
2021-06-09 15:40:43 -07:00
|
|
|
if let Some(c) = close {
|
|
|
|
constraints.push(Constraint::Close(c));
|
|
|
|
}
|
2021-06-27 13:17:05 -07:00
|
|
|
if let Some(c) = address {
|
|
|
|
constraints.push(Constraint::Address(c));
|
|
|
|
}
|
2021-05-30 12:59:33 -07:00
|
|
|
constraints
|
|
|
|
}
|
|
|
|
|
|
|
|
fn generate_constraint(f: &Field, c: &Constraint) -> proc_macro2::TokenStream {
|
|
|
|
match c {
|
|
|
|
Constraint::Init(c) => generate_constraint_init(f, c),
|
2021-08-25 10:27:27 -07:00
|
|
|
Constraint::Zeroed(c) => generate_constraint_zeroed(f, c),
|
2021-05-30 12:59:33 -07:00
|
|
|
Constraint::Mut(c) => generate_constraint_mut(f, c),
|
2021-07-03 11:58:23 -07:00
|
|
|
Constraint::HasOne(c) => generate_constraint_has_one(f, c),
|
2021-05-30 12:59:33 -07:00
|
|
|
Constraint::Signer(c) => generate_constraint_signer(f, c),
|
|
|
|
Constraint::Literal(c) => generate_constraint_literal(c),
|
|
|
|
Constraint::Raw(c) => generate_constraint_raw(c),
|
|
|
|
Constraint::Owner(c) => generate_constraint_owner(f, c),
|
|
|
|
Constraint::RentExempt(c) => generate_constraint_rent_exempt(f, c),
|
|
|
|
Constraint::Seeds(c) => generate_constraint_seeds(f, c),
|
|
|
|
Constraint::Executable(c) => generate_constraint_executable(f, c),
|
|
|
|
Constraint::State(c) => generate_constraint_state(f, c),
|
2021-06-09 15:40:43 -07:00
|
|
|
Constraint::Close(c) => generate_constraint_close(f, c),
|
2021-06-27 13:17:05 -07:00
|
|
|
Constraint::Address(c) => generate_constraint_address(f, c),
|
2021-10-07 13:57:47 -07:00
|
|
|
Constraint::AssociatedToken(c) => generate_constraint_associated_token(f, c),
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn generate_constraint_composite(_f: &CompositeField, c: &Constraint) -> proc_macro2::TokenStream {
|
|
|
|
match c {
|
|
|
|
Constraint::Raw(c) => generate_constraint_raw(c),
|
|
|
|
Constraint::Literal(c) => generate_constraint_literal(c),
|
|
|
|
_ => panic!("Invariant violation"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-27 13:17:05 -07:00
|
|
|
fn generate_constraint_address(f: &Field, c: &ConstraintAddress) -> proc_macro2::TokenStream {
|
|
|
|
let field = &f.ident;
|
|
|
|
let addr = &c.address;
|
2021-10-23 16:40:51 -07:00
|
|
|
let error = generate_custom_error(&c.error, quote! { ConstraintAddress });
|
2021-06-27 13:17:05 -07:00
|
|
|
quote! {
|
2022-01-05 07:08:49 -08:00
|
|
|
if #field.key() != #addr {
|
2021-10-23 16:40:51 -07:00
|
|
|
return Err(#error);
|
2021-06-27 13:17:05 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-29 14:25:38 -07:00
|
|
|
pub fn generate_constraint_init(f: &Field, c: &ConstraintInitGroup) -> proc_macro2::TokenStream {
|
|
|
|
generate_constraint_init_group(f, c)
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
|
2021-08-29 14:25:38 -07:00
|
|
|
pub fn generate_constraint_zeroed(f: &Field, _c: &ConstraintZeroed) -> proc_macro2::TokenStream {
|
|
|
|
let field = &f.ident;
|
2021-09-07 13:06:15 -07:00
|
|
|
let ty_decl = f.ty_decl();
|
2021-09-16 15:49:24 -07:00
|
|
|
let from_account_info = f.from_account_info_unchecked(None);
|
2021-08-29 14:25:38 -07:00
|
|
|
quote! {
|
2021-09-07 13:06:15 -07:00
|
|
|
let #field: #ty_decl = {
|
2021-08-29 14:25:38 -07:00
|
|
|
let mut __data: &[u8] = &#field.try_borrow_data()?;
|
|
|
|
let mut __disc_bytes = [0u8; 8];
|
|
|
|
__disc_bytes.copy_from_slice(&__data[..8]);
|
|
|
|
let __discriminator = u64::from_le_bytes(__disc_bytes);
|
|
|
|
if __discriminator != 0 {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintZero.into());
|
|
|
|
}
|
2021-09-07 13:06:15 -07:00
|
|
|
#from_account_info
|
2021-08-29 14:25:38 -07:00
|
|
|
};
|
|
|
|
}
|
2021-08-25 10:27:27 -07:00
|
|
|
}
|
|
|
|
|
2021-06-09 15:40:43 -07:00
|
|
|
pub fn generate_constraint_close(f: &Field, c: &ConstraintClose) -> proc_macro2::TokenStream {
|
|
|
|
let field = &f.ident;
|
|
|
|
let target = &c.sol_dest;
|
|
|
|
quote! {
|
2022-01-05 07:08:49 -08:00
|
|
|
if #field.key() == #target.key() {
|
2021-06-09 15:40:43 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintClose.into());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-23 16:40:51 -07:00
|
|
|
pub fn generate_constraint_mut(f: &Field, c: &ConstraintMut) -> proc_macro2::TokenStream {
|
2021-05-30 12:59:33 -07:00
|
|
|
let ident = &f.ident;
|
2021-10-23 16:40:51 -07:00
|
|
|
let error = generate_custom_error(&c.error, quote! { ConstraintMut });
|
2021-05-30 12:59:33 -07:00
|
|
|
quote! {
|
|
|
|
if !#ident.to_account_info().is_writable {
|
2021-10-23 16:40:51 -07:00
|
|
|
return Err(#error);
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-03 11:58:23 -07:00
|
|
|
pub fn generate_constraint_has_one(f: &Field, c: &ConstraintHasOne) -> proc_macro2::TokenStream {
|
2021-05-30 12:59:33 -07:00
|
|
|
let target = c.join_target.clone();
|
|
|
|
let ident = &f.ident;
|
|
|
|
let field = match &f.ty {
|
|
|
|
Ty::Loader(_) => quote! {#ident.load()?},
|
2021-10-08 09:24:25 -07:00
|
|
|
Ty::AccountLoader(_) => quote! {#ident.load()?},
|
2021-05-30 12:59:33 -07:00
|
|
|
_ => quote! {#ident},
|
|
|
|
};
|
2021-10-23 16:40:51 -07:00
|
|
|
let error = generate_custom_error(&c.error, quote! { ConstraintHasOne });
|
2021-05-30 12:59:33 -07:00
|
|
|
quote! {
|
2022-01-05 07:08:49 -08:00
|
|
|
if #field.#target != #target.key() {
|
2021-10-23 16:40:51 -07:00
|
|
|
return Err(#error);
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-23 16:40:51 -07:00
|
|
|
pub fn generate_constraint_signer(f: &Field, c: &ConstraintSigner) -> proc_macro2::TokenStream {
|
2021-05-30 12:59:33 -07:00
|
|
|
let ident = &f.ident;
|
|
|
|
let info = match f.ty {
|
|
|
|
Ty::AccountInfo => quote! { #ident },
|
|
|
|
Ty::ProgramAccount(_) => quote! { #ident.to_account_info() },
|
2021-09-07 13:06:15 -07:00
|
|
|
Ty::Account(_) => quote! { #ident.to_account_info() },
|
2021-08-29 14:25:38 -07:00
|
|
|
Ty::Loader(_) => quote! { #ident.to_account_info() },
|
2021-10-08 09:24:25 -07:00
|
|
|
Ty::AccountLoader(_) => quote! { #ident.to_account_info() },
|
2021-08-29 14:25:38 -07:00
|
|
|
Ty::CpiAccount(_) => quote! { #ident.to_account_info() },
|
2021-05-30 12:59:33 -07:00
|
|
|
_ => panic!("Invalid syntax: signer cannot be specified."),
|
|
|
|
};
|
2021-10-23 16:40:51 -07:00
|
|
|
let error = generate_custom_error(&c.error, quote! { ConstraintSigner });
|
2021-05-30 12:59:33 -07:00
|
|
|
quote! {
|
2021-10-23 09:16:40 -07:00
|
|
|
if !#info.is_signer {
|
2021-10-23 16:40:51 -07:00
|
|
|
return Err(#error);
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_constraint_literal(c: &ConstraintLiteral) -> proc_macro2::TokenStream {
|
|
|
|
let lit: proc_macro2::TokenStream = {
|
|
|
|
let lit = &c.lit;
|
2021-12-15 15:03:44 -08:00
|
|
|
let constraint = lit.value().replace('\"', "");
|
2021-06-27 09:50:54 -07:00
|
|
|
let message = format!(
|
|
|
|
"Deprecated. Should be used with constraint: #[account(constraint = {})]",
|
|
|
|
constraint,
|
|
|
|
);
|
|
|
|
lit.span().warning(message).emit_as_item_tokens();
|
|
|
|
constraint.parse().unwrap()
|
2021-05-30 12:59:33 -07:00
|
|
|
};
|
|
|
|
quote! {
|
|
|
|
if !(#lit) {
|
2021-06-09 13:02:50 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::Deprecated.into());
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_constraint_raw(c: &ConstraintRaw) -> proc_macro2::TokenStream {
|
|
|
|
let raw = &c.raw;
|
2021-10-21 15:51:20 -07:00
|
|
|
let error = generate_custom_error(&c.error, quote! { ConstraintRaw });
|
2021-05-30 12:59:33 -07:00
|
|
|
quote! {
|
|
|
|
if !(#raw) {
|
2021-10-21 15:51:20 -07:00
|
|
|
return Err(#error);
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_constraint_owner(f: &Field, c: &ConstraintOwner) -> proc_macro2::TokenStream {
|
|
|
|
let ident = &f.ident;
|
2021-09-09 14:32:11 -07:00
|
|
|
let owner_address = &c.owner_address;
|
2021-10-23 16:40:51 -07:00
|
|
|
let error = generate_custom_error(&c.error, quote! { ConstraintOwner });
|
2021-05-30 12:59:33 -07:00
|
|
|
quote! {
|
2022-01-11 08:32:49 -08:00
|
|
|
if #ident.as_ref().owner != &#owner_address {
|
2021-10-23 16:40:51 -07:00
|
|
|
return Err(#error);
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_constraint_rent_exempt(
|
|
|
|
f: &Field,
|
|
|
|
c: &ConstraintRentExempt,
|
|
|
|
) -> proc_macro2::TokenStream {
|
|
|
|
let ident = &f.ident;
|
2021-06-27 13:17:05 -07:00
|
|
|
let info = quote! {
|
|
|
|
#ident.to_account_info()
|
2021-05-30 12:59:33 -07:00
|
|
|
};
|
|
|
|
match c {
|
|
|
|
ConstraintRentExempt::Skip => quote! {},
|
|
|
|
ConstraintRentExempt::Enforce => quote! {
|
2021-08-08 13:20:26 -07:00
|
|
|
if !__anchor_rent.is_exempt(#info.lamports(), #info.try_data_len()?) {
|
2021-06-09 13:02:50 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintRentExempt.into());
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-29 14:25:38 -07:00
|
|
|
fn generate_constraint_init_group(f: &Field, c: &ConstraintInitGroup) -> proc_macro2::TokenStream {
|
2021-06-15 17:15:51 -07:00
|
|
|
let payer = {
|
|
|
|
let p = &c.payer;
|
|
|
|
quote! {
|
|
|
|
let payer = #p.to_account_info();
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
2021-06-15 17:15:51 -07:00
|
|
|
};
|
2021-08-29 14:25:38 -07:00
|
|
|
|
|
|
|
let seeds_with_nonce = match &c.seeds {
|
|
|
|
None => quote! {},
|
|
|
|
Some(c) => {
|
2021-09-22 07:42:39 -07:00
|
|
|
let s = &mut c.seeds.clone();
|
|
|
|
// If the seeds came with a trailing comma, we need to chop it off
|
|
|
|
// before we interpolate them below.
|
|
|
|
if let Some(pair) = s.pop() {
|
|
|
|
s.push_value(pair.into_value());
|
|
|
|
}
|
2021-10-09 12:21:15 -07:00
|
|
|
let maybe_seeds_plus_comma = (!s.is_empty()).then(|| {
|
|
|
|
quote! { #s, }
|
|
|
|
});
|
2021-08-29 14:25:38 -07:00
|
|
|
let inner = match c.bump.as_ref() {
|
2021-08-15 16:35:53 -07:00
|
|
|
// Bump target not given. Use the canonical bump.
|
|
|
|
None => {
|
|
|
|
quote! {
|
|
|
|
[
|
2021-10-09 12:21:15 -07:00
|
|
|
#maybe_seeds_plus_comma
|
2021-08-15 16:35:53 -07:00
|
|
|
&[
|
|
|
|
Pubkey::find_program_address(
|
|
|
|
&[#s],
|
|
|
|
program_id,
|
|
|
|
).1
|
2021-10-09 12:21:15 -07:00
|
|
|
][..]
|
2021-08-15 16:35:53 -07:00
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Bump target given. Use it.
|
|
|
|
Some(b) => quote! {
|
2021-10-09 12:21:15 -07:00
|
|
|
[#maybe_seeds_plus_comma &[#b][..]]
|
2021-08-15 16:35:53 -07:00
|
|
|
},
|
2021-08-29 14:25:38 -07:00
|
|
|
};
|
|
|
|
quote! {
|
|
|
|
&#inner[..]
|
|
|
|
}
|
2021-06-15 17:15:51 -07:00
|
|
|
}
|
|
|
|
};
|
2021-10-21 16:05:16 -07:00
|
|
|
generate_init(f, c.if_needed, seeds_with_nonce, payer, &c.space, &c.kind)
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
|
2021-08-29 14:25:38 -07:00
|
|
|
fn generate_constraint_seeds(f: &Field, c: &ConstraintSeedsGroup) -> proc_macro2::TokenStream {
|
2021-06-15 17:15:51 -07:00
|
|
|
let name = &f.ident;
|
2021-10-09 12:21:15 -07:00
|
|
|
let s = &mut c.seeds.clone();
|
2022-01-11 07:51:22 -08:00
|
|
|
|
|
|
|
let deriving_program_id = c
|
|
|
|
.program_seed
|
|
|
|
.clone()
|
|
|
|
// If they specified a seeds::program to use when deriving the PDA, use it.
|
|
|
|
.map(|program_id| quote! { #program_id })
|
|
|
|
// Otherwise fall back to the current program's program_id.
|
|
|
|
.unwrap_or(quote! { program_id });
|
|
|
|
|
2021-10-09 12:21:15 -07:00
|
|
|
// If the seeds came with a trailing comma, we need to chop it off
|
|
|
|
// before we interpolate them below.
|
|
|
|
if let Some(pair) = s.pop() {
|
|
|
|
s.push_value(pair.into_value());
|
|
|
|
}
|
2021-07-09 18:42:05 -07:00
|
|
|
|
2021-08-29 14:25:38 -07:00
|
|
|
// If the bump is provided with init *and target*, then force it to be the
|
|
|
|
// canonical bump.
|
|
|
|
if c.is_init && c.bump.is_some() {
|
|
|
|
let b = c.bump.as_ref().unwrap();
|
2021-07-09 18:42:05 -07:00
|
|
|
quote! {
|
|
|
|
let (__program_signer, __bump) = anchor_lang::solana_program::pubkey::Pubkey::find_program_address(
|
|
|
|
&[#s],
|
2022-01-11 07:51:22 -08:00
|
|
|
&#deriving_program_id,
|
2021-07-09 18:42:05 -07:00
|
|
|
);
|
2022-01-05 07:08:49 -08:00
|
|
|
if #name.key() != __program_signer {
|
2021-07-09 18:42:05 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintSeeds.into());
|
|
|
|
}
|
|
|
|
if __bump != #b {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintSeeds.into());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2021-10-09 12:21:15 -07:00
|
|
|
let maybe_seeds_plus_comma = (!s.is_empty()).then(|| {
|
|
|
|
quote! { #s, }
|
|
|
|
});
|
2021-07-09 18:42:05 -07:00
|
|
|
let seeds = match c.bump.as_ref() {
|
2021-08-29 14:25:38 -07:00
|
|
|
// Bump target not given. Find it.
|
2021-07-09 18:42:05 -07:00
|
|
|
None => {
|
|
|
|
quote! {
|
2021-08-29 14:25:38 -07:00
|
|
|
[
|
2021-10-09 12:21:15 -07:00
|
|
|
#maybe_seeds_plus_comma
|
2021-08-29 14:25:38 -07:00
|
|
|
&[
|
|
|
|
Pubkey::find_program_address(
|
|
|
|
&[#s],
|
2022-01-11 07:51:22 -08:00
|
|
|
&#deriving_program_id,
|
2021-08-29 14:25:38 -07:00
|
|
|
).1
|
2021-10-09 12:21:15 -07:00
|
|
|
][..]
|
2021-08-29 14:25:38 -07:00
|
|
|
]
|
2021-07-09 18:42:05 -07:00
|
|
|
}
|
2021-08-29 14:25:38 -07:00
|
|
|
}
|
|
|
|
// Bump target given. Use it.
|
|
|
|
Some(b) => {
|
|
|
|
quote! {
|
2021-10-09 12:21:15 -07:00
|
|
|
[#maybe_seeds_plus_comma &[#b][..]]
|
2021-08-15 16:35:53 -07:00
|
|
|
}
|
2021-08-29 14:25:38 -07:00
|
|
|
}
|
2021-07-09 18:42:05 -07:00
|
|
|
};
|
|
|
|
quote! {
|
|
|
|
let __program_signer = Pubkey::create_program_address(
|
2021-08-15 16:35:53 -07:00
|
|
|
&#seeds[..],
|
2022-01-11 07:51:22 -08:00
|
|
|
&#deriving_program_id,
|
2021-07-09 18:42:05 -07:00
|
|
|
).map_err(|_| anchor_lang::__private::ErrorCode::ConstraintSeeds)?;
|
2022-01-05 07:08:49 -08:00
|
|
|
if #name.key() != __program_signer {
|
2021-07-09 18:42:05 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintSeeds.into());
|
|
|
|
}
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-07 13:57:47 -07:00
|
|
|
fn generate_constraint_associated_token(
|
|
|
|
f: &Field,
|
|
|
|
c: &ConstraintAssociatedToken,
|
|
|
|
) -> proc_macro2::TokenStream {
|
|
|
|
let name = &f.ident;
|
|
|
|
let wallet_address = &c.wallet;
|
|
|
|
let spl_token_mint_address = &c.mint;
|
|
|
|
quote! {
|
2022-01-05 08:09:57 -08:00
|
|
|
if #name.owner != #wallet_address.key() {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintTokenOwner.into());
|
|
|
|
}
|
2021-10-07 13:57:47 -07:00
|
|
|
let __associated_token_address = anchor_spl::associated_token::get_associated_token_address(&#wallet_address.key(), &#spl_token_mint_address.key());
|
2022-01-05 07:08:49 -08:00
|
|
|
if #name.key() != __associated_token_address {
|
2021-10-07 13:57:47 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintAssociated.into());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-21 16:05:16 -07:00
|
|
|
// `if_needed` is set if account allocation and initialization is optional.
|
2021-09-07 13:06:15 -07:00
|
|
|
pub fn generate_init(
|
2021-06-15 17:15:51 -07:00
|
|
|
f: &Field,
|
2021-10-21 16:05:16 -07:00
|
|
|
if_needed: bool,
|
2021-06-15 17:15:51 -07:00
|
|
|
seeds_with_nonce: proc_macro2::TokenStream,
|
|
|
|
payer: proc_macro2::TokenStream,
|
2021-06-27 13:17:05 -07:00
|
|
|
space: &Option<Expr>,
|
2021-08-29 14:25:38 -07:00
|
|
|
kind: &InitKind,
|
2021-06-15 17:15:51 -07:00
|
|
|
) -> proc_macro2::TokenStream {
|
2021-05-30 12:59:33 -07:00
|
|
|
let field = &f.ident;
|
2021-09-07 13:06:15 -07:00
|
|
|
let ty_decl = f.ty_decl();
|
2021-09-16 15:49:24 -07:00
|
|
|
let from_account_info = f.from_account_info_unchecked(Some(kind));
|
2021-10-21 16:05:16 -07:00
|
|
|
let if_needed = if if_needed {
|
|
|
|
quote! {true}
|
|
|
|
} else {
|
|
|
|
quote! {false}
|
|
|
|
};
|
2021-06-27 13:17:05 -07:00
|
|
|
match kind {
|
2021-08-31 14:43:04 -07:00
|
|
|
InitKind::Token { owner, mint } => {
|
|
|
|
let create_account = generate_create_account(
|
|
|
|
field,
|
|
|
|
quote! {anchor_spl::token::TokenAccount::LEN},
|
2022-01-05 07:08:49 -08:00
|
|
|
quote! {&token_program.key()},
|
2021-08-31 14:43:04 -07:00
|
|
|
seeds_with_nonce,
|
|
|
|
);
|
|
|
|
quote! {
|
2021-09-07 13:06:15 -07:00
|
|
|
let #field: #ty_decl = {
|
2022-01-11 08:32:49 -08:00
|
|
|
if !#if_needed || #field.as_ref().owner == &anchor_lang::solana_program::system_program::ID {
|
2021-10-21 16:05:16 -07:00
|
|
|
// Define payer variable.
|
|
|
|
#payer
|
|
|
|
|
|
|
|
// Create the account with the system program.
|
|
|
|
#create_account
|
|
|
|
|
|
|
|
// Initialize the token account.
|
|
|
|
let cpi_program = token_program.to_account_info();
|
|
|
|
let accounts = anchor_spl::token::InitializeAccount {
|
|
|
|
account: #field.to_account_info(),
|
|
|
|
mint: #mint.to_account_info(),
|
|
|
|
authority: #owner.to_account_info(),
|
|
|
|
rent: rent.to_account_info(),
|
|
|
|
};
|
2022-01-06 12:26:43 -08:00
|
|
|
let cpi_ctx = anchor_lang::context::CpiContext::new(cpi_program, accounts);
|
2021-10-21 16:05:16 -07:00
|
|
|
anchor_spl::token::initialize_account(cpi_ctx)?;
|
|
|
|
}
|
|
|
|
|
2021-09-16 15:49:24 -07:00
|
|
|
let pa: #ty_decl = #from_account_info;
|
2022-01-11 08:32:49 -08:00
|
|
|
if !(!#if_needed || #field.as_ref().owner == &anchor_lang::solana_program::system_program::ID) {
|
2021-12-08 13:50:08 -08:00
|
|
|
if pa.mint != #mint.key() {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintTokenMint.into());
|
|
|
|
}
|
|
|
|
if pa.owner != #owner.key() {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintTokenOwner.into());
|
|
|
|
}
|
|
|
|
}
|
2021-09-07 13:06:15 -07:00
|
|
|
pa
|
2021-08-14 18:18:28 -07:00
|
|
|
};
|
2021-08-31 14:43:04 -07:00
|
|
|
}
|
|
|
|
}
|
2021-09-23 17:06:38 -07:00
|
|
|
InitKind::AssociatedToken { owner, mint } => {
|
|
|
|
quote! {
|
|
|
|
let #field: #ty_decl = {
|
2022-01-11 08:32:49 -08:00
|
|
|
if !#if_needed || #field.as_ref().owner == &anchor_lang::solana_program::system_program::ID {
|
2021-10-21 16:05:16 -07:00
|
|
|
#payer
|
|
|
|
|
|
|
|
let cpi_program = associated_token_program.to_account_info();
|
|
|
|
let cpi_accounts = anchor_spl::associated_token::Create {
|
|
|
|
payer: payer.to_account_info(),
|
|
|
|
associated_token: #field.to_account_info(),
|
|
|
|
authority: #owner.to_account_info(),
|
|
|
|
mint: #mint.to_account_info(),
|
|
|
|
system_program: system_program.to_account_info(),
|
|
|
|
token_program: token_program.to_account_info(),
|
|
|
|
rent: rent.to_account_info(),
|
|
|
|
};
|
2022-01-06 12:26:43 -08:00
|
|
|
let cpi_ctx = anchor_lang::context::CpiContext::new(cpi_program, cpi_accounts);
|
2021-10-21 16:05:16 -07:00
|
|
|
anchor_spl::associated_token::create(cpi_ctx)?;
|
|
|
|
}
|
2021-09-23 17:06:38 -07:00
|
|
|
let pa: #ty_decl = #from_account_info;
|
2022-01-11 08:32:49 -08:00
|
|
|
if !(!#if_needed || #field.as_ref().owner == &anchor_lang::solana_program::system_program::ID) {
|
2021-12-08 13:50:08 -08:00
|
|
|
if pa.mint != #mint.key() {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintTokenMint.into());
|
|
|
|
}
|
|
|
|
if pa.owner != #owner.key() {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintTokenOwner.into());
|
|
|
|
}
|
2022-01-01 18:47:13 -08:00
|
|
|
|
|
|
|
if pa.key() != anchor_spl::associated_token::get_associated_token_address(&#owner.key(), &#mint.key()) {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::AccountNotAssociatedTokenAccount.into());
|
|
|
|
}
|
2021-12-08 13:50:08 -08:00
|
|
|
}
|
2021-09-23 17:06:38 -07:00
|
|
|
pa
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
2021-10-05 11:36:17 -07:00
|
|
|
InitKind::Mint {
|
|
|
|
owner,
|
|
|
|
decimals,
|
|
|
|
freeze_authority,
|
|
|
|
} => {
|
2021-08-31 14:43:04 -07:00
|
|
|
let create_account = generate_create_account(
|
|
|
|
field,
|
|
|
|
quote! {anchor_spl::token::Mint::LEN},
|
2022-01-05 07:08:49 -08:00
|
|
|
quote! {&token_program.key()},
|
2021-08-31 14:43:04 -07:00
|
|
|
seeds_with_nonce,
|
|
|
|
);
|
2021-10-05 11:36:17 -07:00
|
|
|
let freeze_authority = match freeze_authority {
|
2021-12-08 13:50:08 -08:00
|
|
|
Some(fa) => quote! { Option::<&anchor_lang::prelude::Pubkey>::Some(&#fa.key()) },
|
|
|
|
None => quote! { Option::<&anchor_lang::prelude::Pubkey>::None },
|
2021-10-05 11:36:17 -07:00
|
|
|
};
|
2021-08-31 14:43:04 -07:00
|
|
|
quote! {
|
2021-09-07 13:06:15 -07:00
|
|
|
let #field: #ty_decl = {
|
2022-01-11 08:32:49 -08:00
|
|
|
if !#if_needed || #field.as_ref().owner == &anchor_lang::solana_program::system_program::ID {
|
2021-10-21 16:05:16 -07:00
|
|
|
// Define payer variable.
|
|
|
|
#payer
|
|
|
|
|
|
|
|
// Create the account with the system program.
|
|
|
|
#create_account
|
|
|
|
|
|
|
|
// Initialize the mint account.
|
|
|
|
let cpi_program = token_program.to_account_info();
|
|
|
|
let accounts = anchor_spl::token::InitializeMint {
|
|
|
|
mint: #field.to_account_info(),
|
|
|
|
rent: rent.to_account_info(),
|
|
|
|
};
|
2022-01-06 12:26:43 -08:00
|
|
|
let cpi_ctx = anchor_lang::context::CpiContext::new(cpi_program, accounts);
|
2021-12-08 13:50:08 -08:00
|
|
|
anchor_spl::token::initialize_mint(cpi_ctx, #decimals, &#owner.key(), #freeze_authority)?;
|
2021-10-21 16:05:16 -07:00
|
|
|
}
|
2021-09-16 15:49:24 -07:00
|
|
|
let pa: #ty_decl = #from_account_info;
|
2022-01-11 08:32:49 -08:00
|
|
|
if !(!#if_needed || #field.as_ref().owner == &anchor_lang::solana_program::system_program::ID) {
|
2021-12-08 13:50:08 -08:00
|
|
|
if pa.mint_authority != anchor_lang::solana_program::program_option::COption::Some(#owner.key()) {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintMintMintAuthority.into());
|
|
|
|
}
|
|
|
|
if pa.freeze_authority
|
|
|
|
.as_ref()
|
|
|
|
.map(|fa| #freeze_authority.as_ref().map(|expected_fa| fa != *expected_fa).unwrap_or(true))
|
|
|
|
.unwrap_or(#freeze_authority.is_some()) {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintMintFreezeAuthority.into());
|
|
|
|
}
|
|
|
|
if pa.decimals != #decimals {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintMintDecimals.into());
|
|
|
|
}
|
|
|
|
}
|
2021-09-07 13:06:15 -07:00
|
|
|
pa
|
2021-06-27 13:17:05 -07:00
|
|
|
};
|
2021-08-31 14:43:04 -07:00
|
|
|
}
|
|
|
|
}
|
2021-08-29 14:25:38 -07:00
|
|
|
InitKind::Program { owner } => {
|
2021-08-14 18:18:28 -07:00
|
|
|
let space = match space {
|
|
|
|
// If no explicit space param was given, serialize the type to bytes
|
|
|
|
// and take the length (with +8 for the discriminator.)
|
2021-09-07 13:06:15 -07:00
|
|
|
None => {
|
|
|
|
let account_ty = f.account_ty();
|
2021-10-08 09:24:25 -07:00
|
|
|
match matches!(f.ty, Ty::Loader(_) | Ty::AccountLoader(_)) {
|
2021-09-07 13:06:15 -07:00
|
|
|
false => {
|
|
|
|
quote! {
|
|
|
|
let space = 8 + #account_ty::default().try_to_vec().unwrap().len();
|
|
|
|
}
|
2021-08-14 18:18:28 -07:00
|
|
|
}
|
2021-09-07 13:06:15 -07:00
|
|
|
true => {
|
|
|
|
quote! {
|
|
|
|
let space = 8 + anchor_lang::__private::bytemuck::bytes_of(&#account_ty::default()).len();
|
|
|
|
}
|
2021-08-14 18:18:28 -07:00
|
|
|
}
|
|
|
|
}
|
2021-09-07 13:06:15 -07:00
|
|
|
}
|
2021-08-14 18:18:28 -07:00
|
|
|
// Explicit account size given. Use it.
|
|
|
|
Some(s) => quote! {
|
2021-08-29 14:25:38 -07:00
|
|
|
let space = #s;
|
2021-08-14 18:18:28 -07:00
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2021-07-09 18:42:05 -07:00
|
|
|
// Owner of the account being created. If not specified,
|
|
|
|
// default to the currently executing program.
|
|
|
|
let owner = match owner {
|
|
|
|
None => quote! {
|
|
|
|
program_id
|
|
|
|
},
|
|
|
|
Some(o) => quote! {
|
|
|
|
&#o
|
|
|
|
},
|
|
|
|
};
|
2021-12-08 13:50:08 -08:00
|
|
|
let pda_check = if !seeds_with_nonce.is_empty() {
|
|
|
|
quote! {
|
|
|
|
let expected_key = anchor_lang::prelude::Pubkey::create_program_address(
|
|
|
|
#seeds_with_nonce,
|
|
|
|
#owner
|
|
|
|
).map_err(|_| anchor_lang::__private::ErrorCode::ConstraintSeeds)?;
|
|
|
|
if expected_key != #field.key() {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintSeeds.into());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
quote! {}
|
|
|
|
};
|
2021-08-31 14:43:04 -07:00
|
|
|
let create_account =
|
2021-12-08 13:50:08 -08:00
|
|
|
generate_create_account(field, quote! {space}, owner.clone(), seeds_with_nonce);
|
2021-06-27 13:17:05 -07:00
|
|
|
quote! {
|
2021-07-09 18:42:05 -07:00
|
|
|
let #field = {
|
2021-12-08 13:50:08 -08:00
|
|
|
let actual_field = #field.to_account_info();
|
|
|
|
let actual_owner = actual_field.owner;
|
|
|
|
#space
|
|
|
|
if !#if_needed || actual_owner == &anchor_lang::solana_program::system_program::ID {
|
2021-10-21 16:05:16 -07:00
|
|
|
#payer
|
|
|
|
#create_account
|
|
|
|
}
|
2021-09-16 15:49:24 -07:00
|
|
|
let pa: #ty_decl = #from_account_info;
|
2021-12-08 13:50:08 -08:00
|
|
|
if !(!#if_needed || actual_owner == &anchor_lang::solana_program::system_program::ID) {
|
|
|
|
if space != actual_field.data_len() {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintSpace.into());
|
|
|
|
}
|
|
|
|
|
|
|
|
if actual_owner != #owner {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintOwner.into());
|
|
|
|
}
|
|
|
|
|
2022-01-06 12:31:36 -08:00
|
|
|
{
|
|
|
|
let required_lamports = __anchor_rent.minimum_balance(space);
|
|
|
|
if pa.to_account_info().lamports() < required_lamports {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintRentExempt.into());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-08 13:50:08 -08:00
|
|
|
#pda_check
|
|
|
|
}
|
2021-06-27 13:17:05 -07:00
|
|
|
pa
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-31 14:43:04 -07:00
|
|
|
// Generated code to create an account with with system program with the
|
|
|
|
// given `space` amount of data, owned by `owner`.
|
|
|
|
//
|
|
|
|
// `seeds_with_nonce` should be given for creating PDAs. Otherwise it's an
|
|
|
|
// empty stream.
|
|
|
|
pub fn generate_create_account(
|
|
|
|
field: &Ident,
|
|
|
|
space: proc_macro2::TokenStream,
|
|
|
|
owner: proc_macro2::TokenStream,
|
|
|
|
seeds_with_nonce: proc_macro2::TokenStream,
|
|
|
|
) -> proc_macro2::TokenStream {
|
|
|
|
quote! {
|
|
|
|
// If the account being initialized already has lamports, then
|
|
|
|
// return them all back to the payer so that the account has
|
|
|
|
// zero lamports when the system program's create instruction
|
|
|
|
// is eventually called.
|
2022-01-05 07:08:49 -08:00
|
|
|
let __current_lamports = #field.lamports();
|
2021-08-31 14:43:04 -07:00
|
|
|
if __current_lamports == 0 {
|
|
|
|
// Create the token account with right amount of lamports and space, and the correct owner.
|
|
|
|
let lamports = __anchor_rent.minimum_balance(#space);
|
|
|
|
anchor_lang::solana_program::program::invoke_signed(
|
|
|
|
&anchor_lang::solana_program::system_instruction::create_account(
|
2022-01-05 07:08:49 -08:00
|
|
|
&payer.key(),
|
|
|
|
&#field.key(),
|
2021-08-31 14:43:04 -07:00
|
|
|
lamports,
|
|
|
|
#space as u64,
|
|
|
|
#owner,
|
|
|
|
),
|
|
|
|
&[
|
|
|
|
payer.to_account_info(),
|
|
|
|
#field.to_account_info(),
|
2021-09-11 14:43:12 -07:00
|
|
|
system_program.to_account_info(),
|
2021-08-31 14:43:04 -07:00
|
|
|
],
|
|
|
|
&[#seeds_with_nonce],
|
|
|
|
)?;
|
|
|
|
} else {
|
|
|
|
// Fund the account for rent exemption.
|
|
|
|
let required_lamports = __anchor_rent
|
|
|
|
.minimum_balance(#space)
|
|
|
|
.max(1)
|
|
|
|
.saturating_sub(__current_lamports);
|
|
|
|
if required_lamports > 0 {
|
|
|
|
anchor_lang::solana_program::program::invoke(
|
|
|
|
&anchor_lang::solana_program::system_instruction::transfer(
|
2022-01-05 07:08:49 -08:00
|
|
|
&payer.key(),
|
|
|
|
&#field.key(),
|
2021-08-31 14:43:04 -07:00
|
|
|
required_lamports,
|
|
|
|
),
|
|
|
|
&[
|
|
|
|
payer.to_account_info(),
|
|
|
|
#field.to_account_info(),
|
2021-09-11 14:43:12 -07:00
|
|
|
system_program.to_account_info(),
|
2021-08-31 14:43:04 -07:00
|
|
|
],
|
|
|
|
)?;
|
|
|
|
}
|
|
|
|
// Allocate space.
|
|
|
|
anchor_lang::solana_program::program::invoke_signed(
|
|
|
|
&anchor_lang::solana_program::system_instruction::allocate(
|
2022-01-05 07:08:49 -08:00
|
|
|
&#field.key(),
|
2021-08-31 14:43:04 -07:00
|
|
|
#space as u64,
|
|
|
|
),
|
|
|
|
&[
|
|
|
|
#field.to_account_info(),
|
2021-09-11 14:43:12 -07:00
|
|
|
system_program.to_account_info(),
|
2021-08-31 14:43:04 -07:00
|
|
|
],
|
|
|
|
&[#seeds_with_nonce],
|
|
|
|
)?;
|
|
|
|
// Assign to the spl token program.
|
|
|
|
anchor_lang::solana_program::program::invoke_signed(
|
|
|
|
&anchor_lang::solana_program::system_instruction::assign(
|
2022-01-05 07:08:49 -08:00
|
|
|
&#field.key(),
|
2021-08-31 14:43:04 -07:00
|
|
|
#owner,
|
|
|
|
),
|
|
|
|
&[
|
|
|
|
#field.to_account_info(),
|
|
|
|
system_program.to_account_info(),
|
|
|
|
],
|
|
|
|
&[#seeds_with_nonce],
|
|
|
|
)?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-15 17:15:51 -07:00
|
|
|
pub fn generate_constraint_executable(
|
|
|
|
f: &Field,
|
|
|
|
_c: &ConstraintExecutable,
|
|
|
|
) -> proc_macro2::TokenStream {
|
|
|
|
let name = &f.ident;
|
|
|
|
quote! {
|
|
|
|
if !#name.to_account_info().executable {
|
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintExecutable.into());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn generate_constraint_state(f: &Field, c: &ConstraintState) -> proc_macro2::TokenStream {
|
|
|
|
let program_target = c.program_target.clone();
|
|
|
|
let ident = &f.ident;
|
|
|
|
let account_ty = match &f.ty {
|
2021-07-08 13:14:39 -07:00
|
|
|
Ty::CpiState(ty) => &ty.account_type_path,
|
2021-06-15 17:15:51 -07:00
|
|
|
_ => panic!("Invalid state constraint"),
|
|
|
|
};
|
|
|
|
quote! {
|
|
|
|
// Checks the given state account is the canonical state account for
|
|
|
|
// the target program.
|
2022-01-06 12:26:43 -08:00
|
|
|
if #ident.key() != anchor_lang::accounts::cpi_state::CpiState::<#account_ty>::address(&#program_target.key()) {
|
2021-06-15 17:15:51 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintState.into());
|
|
|
|
}
|
2022-01-11 08:32:49 -08:00
|
|
|
if #ident.as_ref().owner != &#program_target.key() {
|
2021-06-15 17:15:51 -07:00
|
|
|
return Err(anchor_lang::__private::ErrorCode::ConstraintState.into());
|
|
|
|
}
|
2021-05-30 12:59:33 -07:00
|
|
|
}
|
|
|
|
}
|
2021-10-21 15:51:20 -07:00
|
|
|
|
|
|
|
fn generate_custom_error(
|
|
|
|
custom_error: &Option<Expr>,
|
|
|
|
error: proc_macro2::TokenStream,
|
|
|
|
) -> proc_macro2::TokenStream {
|
|
|
|
match custom_error {
|
|
|
|
Some(error) => quote! { #error.into() },
|
|
|
|
None => quote! { anchor_lang::__private::ErrorCode::#error.into() },
|
|
|
|
}
|
|
|
|
}
|