Implement initial solana program (#3)
* add rust program * update rust program * first VAA actions * implement full transfer * remove token copy * restructure and copy
This commit is contained in:
parent
72cbb2aec2
commit
7ddf910faa
|
@ -3,3 +3,5 @@ node_modules
|
|||
.idea
|
||||
.arcconfig
|
||||
*.iml
|
||||
target
|
||||
bin
|
||||
|
|
|
@ -10,8 +10,10 @@ Initializes a new Bridge at `bridge`.
|
|||
|
||||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | ------ | ------------ | ------ | --------- | ----- | ------- |
|
||||
| 0 | owner | Account | ✅️ | | | |
|
||||
| 0 | bridge | BridgeConfig | | | ✅️ | ✅️ |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | guardian_set | GuardianSet | | ✅ | ✅ | ✅ |
|
||||
| 3 | sender | Account | ✅ | | | |
|
||||
|
||||
#### TransferOut
|
||||
|
||||
|
@ -24,9 +26,10 @@ Parameters:
|
|||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | -------- | ------------------- | ------ | --------- | ----- | ------- |
|
||||
| 0 | sender | TokenAccount | | ✅ | | |
|
||||
| 1 | bridge | BridgeConfig | | | | |
|
||||
| 2 | proposal | TransferOutProposal | | ✅ | ✅ | ✅ |
|
||||
| 3 | token | WrappedAsset | | ✅ | | ✅ |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | bridge | BridgeConfig | | | | |
|
||||
| 3 | proposal | TransferOutProposal | | ✅ | ✅ | ✅ |
|
||||
| 4 | token | WrappedAsset | | ✅ | | ✅ |
|
||||
|
||||
#### TransferOutNative
|
||||
|
||||
|
@ -41,7 +44,8 @@ The transfer proposal will be tracked at a new account `proposal` where a VAA wi
|
|||
| 1 | bridge | BridgeConfig | | | | |
|
||||
| 2 | proposal | TransferOutProposal | | ✅ | ✅ | ✅ |
|
||||
| 3 | token | Mint | | ✅ | | |
|
||||
| 4 | custody_account | Mint | | ✅ | opt | ✅ |
|
||||
| 4 | custody_account | TokenAccount | | ✅ | opt | ✅ |
|
||||
| 5-n | sender_owner | Account | ✅ | | | |
|
||||
|
||||
#### EvictTransferOut
|
||||
|
||||
|
@ -50,8 +54,10 @@ Deletes a `proposal` after the `VAA_EXPIRATION_TIME` to free up space on chain.
|
|||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | -------- | ------------------- | ------ | --------- | ----- | ------- |
|
||||
| 0 | guardian | Account | ✅ | | | |
|
||||
| 1 | bridge | BridgeConfig | | | | |
|
||||
| 2 | proposal | TransferOutProposal | | ✅ | | ✅ |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | bridge | BridgeConfig | | | | |
|
||||
| 3 | proposal | TransferOutProposal | | ✅ | | ✅ |
|
||||
| 4-n | sender_owner | Account | ✅ | | | |
|
||||
|
||||
#### EvictExecutedVAA
|
||||
|
||||
|
@ -60,8 +66,9 @@ Deletes a `ExecutedVAA` after the `VAA_EXPIRATION_TIME` to free up space on chai
|
|||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | -------- | ------------------- | ------ | --------- | ----- | ------- |
|
||||
| 0 | guardian | Account | ✅ | | | |
|
||||
| 1 | bridge | BridgeConfig | | | | |
|
||||
| 2 | proposal | ExecutedVAA | | ✅ | | ✅ |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | bridge | BridgeConfig | | | | |
|
||||
| 3 | proposal | ExecutedVAA | | ✅ | | ✅ |
|
||||
|
||||
#### PostVAA
|
||||
|
||||
|
@ -74,38 +81,45 @@ The required accounts depend on the `action` of the VAA:
|
|||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | ------------ | ------------------- | ------ | --------- | ----- | ------- |
|
||||
| 0 | bridge | BridgeConfig | | ✅ | | |
|
||||
| 1 | guardian_set | GuardianSet | | ✅ | ✅ | ✅ |
|
||||
| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | guardian_set_old | GuardianSet | | ✅ | | ✅ |
|
||||
| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 4 | guardian_set | GuardianSet | | ✅ | ✅ | ✅ |
|
||||
|
||||
##### Transfer: Ethereum (native) -> Solana (wrapped)
|
||||
|
||||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | ------------ | ------------ | ------ | --------- | ----- | ------- |
|
||||
| 0 | bridge | BridgeConfig | | | | |
|
||||
| 1 | guardian_set | GuardianSet | | | | |
|
||||
| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 3 | token | WrappedAsset | | | opt | ✅ |
|
||||
| 4 | destination | TokenAccount | | ✅ | opt | |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | guardian_set | GuardianSet | | | | |
|
||||
| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 4 | token | WrappedAsset | | | opt | ✅ |
|
||||
| 5 | destination | TokenAccount | | ✅ | opt | |
|
||||
| 6 | sender | Account | ✅ | | | |
|
||||
|
||||
##### Transfer: Ethereum (wrapped) -> Solana (native)
|
||||
|
||||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | ------------ | ------------ | ------ | --------- | ----- | ------- |
|
||||
| 0 | bridge | BridgeConfig | | | | |
|
||||
| 1 | guardian_set | GuardianSet | | | | |
|
||||
| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 3 | token | Mint | | | | ✅ |
|
||||
| 4 | custody_src | TokenAccount | | ✅ | | ✅ |
|
||||
| 5 | destination | TokenAccount | | ✅ | opt | |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | guardian_set | GuardianSet | | | | |
|
||||
| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 4 | token | Mint | | | | ✅ |
|
||||
| 6 | destination | TokenAccount | | ✅ | opt | |
|
||||
| 5 | custody_src | TokenAccount | | ✅ | | ✅ |
|
||||
|
||||
##### Transfer: Solana (any) -> Ethereum (any)
|
||||
|
||||
| Index | Name | Type | signer | writeable | empty | derived |
|
||||
| ----- | ------------ | ------------------- | ------ | --------- | ----- | ------- |
|
||||
| 0 | bridge | BridgeConfig | | | | |
|
||||
| 1 | guardian_set | GuardianSet | | | | |
|
||||
| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 3 | out_proposal | TransferOutProposal | | ✅ | | ✅ |
|
||||
| 1 | clock | Sysvar | | | ️ | ✅ |
|
||||
| 2 | guardian_set | GuardianSet | | | | |
|
||||
| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ |
|
||||
| 4 | out_proposal | TransferOutProposal | | ✅ | | ✅ |
|
||||
| 5 | sender | Account | ✅ | | | |
|
||||
|
||||
## Accounts
|
||||
|
||||
|
|
|
@ -0,0 +1,22 @@
|
|||
#!/usr/bin/env bash
|
||||
set -e
|
||||
|
||||
installDir=$1
|
||||
channel=beta
|
||||
|
||||
if [[ -n $2 ]]; then
|
||||
channel=$2
|
||||
fi
|
||||
|
||||
echo "Installing $channel BPF SDK into $installDir"
|
||||
|
||||
set -x
|
||||
cd "$installDir/"
|
||||
curl -L --retry 5 --retry-delay 2 -o bpf-sdk.tar.bz2 \
|
||||
http://solana-sdk.s3.amazonaws.com/"$channel"/bpf-sdk.tar.bz2
|
||||
rm -rf bpf-sdk
|
||||
mkdir -p bpf-sdk
|
||||
tar jxf bpf-sdk.tar.bz2
|
||||
rm -f bpf-sdk.tar.bz2
|
||||
|
||||
cat bpf-sdk/version.txt
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,36 @@
|
|||
# Note: This crate must be built using do.sh
|
||||
|
||||
[package]
|
||||
name = "wormhole-bridge"
|
||||
version = "0.1.0"
|
||||
description = "Solana Program Library Token Swap"
|
||||
authors = ["Certus One Team <info@certus.one>"]
|
||||
repository = "https://github.com/solana-labs/solana-program-library"
|
||||
license = "Apache-2.0"
|
||||
edition = "2018"
|
||||
|
||||
[features]
|
||||
no-entrypoint = []
|
||||
skip-no-mangle = ["solana-sdk/skip-no-mangle"]
|
||||
program = ["solana-sdk/program", "spl-token/program", "spl-token/no-entrypoint"]
|
||||
default = ["solana-sdk/default", "spl-token/default"]
|
||||
|
||||
[dependencies]
|
||||
num-derive = "0.2"
|
||||
num-traits = "0.2"
|
||||
remove_dir_all = "=0.5.0"
|
||||
solana-sdk = { version = "=1.2.17", default-features = false, optional = true }
|
||||
spl-token = { package = "spl-token", version = "1.0.6", default-features = false, optional = true }
|
||||
thiserror = "1.0"
|
||||
arrayref = "0.3.6"
|
||||
byteorder = "1.3.4"
|
||||
zerocopy = "0.3.0"
|
||||
sha3 = "0.9.1"
|
||||
|
||||
[dev-dependencies]
|
||||
rand = { version = "0.7.0" }
|
||||
hex = "0.4.2"
|
||||
|
||||
[lib]
|
||||
name = "spl_bridge"
|
||||
crate-type = ["cdylib", "lib"]
|
|
@ -0,0 +1,4 @@
|
|||
FROM centos:8
|
||||
|
||||
RUN dnf install -y dnf install bzip2 git gcc wget
|
||||
RUN curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
|
|
@ -0,0 +1,2 @@
|
|||
[target.bpfel-unknown-unknown.dependencies.std]
|
||||
features = []
|
|
@ -0,0 +1,24 @@
|
|||
//! Program entrypoint definitions
|
||||
#![cfg(feature = "program")]
|
||||
#![cfg(not(feature = "no-entrypoint"))]
|
||||
|
||||
use solana_sdk::{
|
||||
account_info::AccountInfo, entrypoint, entrypoint::ProgramResult,
|
||||
program_error::PrintProgramError, pubkey::Pubkey,
|
||||
};
|
||||
|
||||
use crate::{error::Error, state::Bridge};
|
||||
|
||||
entrypoint!(process_instruction);
|
||||
fn process_instruction<'a>(
|
||||
program_id: &Pubkey,
|
||||
accounts: &'a [AccountInfo<'a>],
|
||||
instruction_data: &[u8],
|
||||
) -> ProgramResult {
|
||||
if let Err(error) = Bridge::process(program_id, accounts, instruction_data) {
|
||||
// catch the error so we can print it
|
||||
error.print::<Error>();
|
||||
return Err(error);
|
||||
}
|
||||
Ok(())
|
||||
}
|
|
@ -0,0 +1,153 @@
|
|||
//! Error types
|
||||
|
||||
use std::io;
|
||||
|
||||
use num_derive::FromPrimitive;
|
||||
use num_traits::FromPrimitive;
|
||||
use solana_sdk::{
|
||||
decode_error::DecodeError,
|
||||
info,
|
||||
program_error::{PrintProgramError, ProgramError},
|
||||
};
|
||||
use thiserror::Error;
|
||||
|
||||
/// Errors that may be returned by the TokenSwap program.
|
||||
#[derive(Clone, Debug, Eq, Error, FromPrimitive, PartialEq)]
|
||||
pub enum VAAError {
|
||||
/// The given action is unknown or invalid
|
||||
#[error("InvalidAction")]
|
||||
InvalidAction,
|
||||
|
||||
/// An io error occurred
|
||||
#[error("IOError")]
|
||||
IOError,
|
||||
}
|
||||
|
||||
/// Errors that may be returned by the TokenSwap program.
|
||||
#[derive(Clone, Debug, Eq, Error, FromPrimitive, PartialEq)]
|
||||
pub enum Error {
|
||||
/// The deserialization of the Token state returned something besides State::Token.
|
||||
#[error("ExpectedToken")]
|
||||
ExpectedToken,
|
||||
/// The deserialization of the Bridge returned something besides State::Bridge.
|
||||
#[error("ExpectedBridge")]
|
||||
ExpectedBridge,
|
||||
/// The deserialization of the Token state returned something besides State::Account.
|
||||
#[error("ExpectedAccount")]
|
||||
ExpectedAccount,
|
||||
/// The deserialization of the GuardianSet state returned something besides State::GuardianSet.
|
||||
#[error("ExpectedGuardianSet")]
|
||||
ExpectedGuardianSet,
|
||||
/// The deserialization of the TransferOutProposal state returned something besides State::TransferOutProposal.
|
||||
#[error("ExpectedTransferOutProposal")]
|
||||
ExpectedTransferOutProposal,
|
||||
/// State is uninitialized.
|
||||
#[error("State is unititialized")]
|
||||
UninitializedState,
|
||||
/// The program address provided doesn't match the value generated by the program.
|
||||
#[error("InvalidProgramAddress")]
|
||||
InvalidProgramAddress,
|
||||
/// The submitted VAA is invalid
|
||||
#[error("InvalidVAAFormat")]
|
||||
InvalidVAAFormat,
|
||||
/// The submitted VAA is invalid form
|
||||
#[error("InvalidVAAAction")]
|
||||
InvalidVAAAction,
|
||||
/// The submitted VAA has an invalid signature
|
||||
#[error("InvalidVAASignature")]
|
||||
InvalidVAASignature,
|
||||
/// The account is already initialized
|
||||
#[error("AlreadyExists")]
|
||||
AlreadyExists,
|
||||
/// An account was not derived correctly
|
||||
#[error("InvalidDerivedAccount")]
|
||||
InvalidDerivedAccount,
|
||||
/// A given token account does not belong to the given mint
|
||||
#[error("TokenMintMismatch")]
|
||||
TokenMintMismatch,
|
||||
/// A given mint account does not belong to the program
|
||||
#[error("WrongMintOwner")]
|
||||
WrongMintOwner,
|
||||
/// A given bridge account does not belong to the program
|
||||
#[error("WrongBridgeOwner")]
|
||||
WrongBridgeOwner,
|
||||
/// A given token account does not belong to the program
|
||||
#[error("WrongTokenAccountOwner")]
|
||||
WrongTokenAccountOwner,
|
||||
/// A parsing operation failed
|
||||
#[error("ParseFailed")]
|
||||
ParseFailed,
|
||||
/// The guardian set that signed this VAA has expired
|
||||
#[error("GuardianSetExpired")]
|
||||
GuardianSetExpired,
|
||||
/// The given VAA has expired
|
||||
#[error("VAAExpired")]
|
||||
VAAExpired,
|
||||
/// The given VAA has already been claimed
|
||||
#[error("VAAClaimed")]
|
||||
VAAClaimed,
|
||||
/// The given VAA was not signed by the latest guardian set
|
||||
#[error("OldGuardianSet")]
|
||||
OldGuardianSet,
|
||||
/// The guardian set index must increase on update
|
||||
#[error("GuardianIndexNotIncreasing")]
|
||||
GuardianIndexNotIncreasing,
|
||||
/// The given VAA does not match the proposal
|
||||
#[error("VAAProposalMismatch")]
|
||||
VAAProposalMismatch,
|
||||
/// Invalid transfer with src=dst
|
||||
#[error("SameChainTransfer")]
|
||||
SameChainTransfer,
|
||||
}
|
||||
|
||||
impl From<Error> for ProgramError {
|
||||
fn from(e: Error) -> Self {
|
||||
ProgramError::Custom(e as u32)
|
||||
}
|
||||
}
|
||||
|
||||
impl From<std::io::Error> for Error {
|
||||
fn from(_: std::io::Error) -> Self {
|
||||
Error::ParseFailed
|
||||
}
|
||||
}
|
||||
|
||||
impl<T> DecodeError<T> for Error {
|
||||
fn type_of() -> &'static str {
|
||||
"Swap Error"
|
||||
}
|
||||
}
|
||||
|
||||
impl PrintProgramError for Error {
|
||||
fn print<E>(&self)
|
||||
where
|
||||
E: 'static + std::error::Error + DecodeError<E> + PrintProgramError + FromPrimitive,
|
||||
{
|
||||
match self {
|
||||
Error::ExpectedToken => info!("Error: ExpectedToken"),
|
||||
Error::ExpectedAccount => info!("Error: ExpectedAccount"),
|
||||
Error::ExpectedBridge => info!("Error: ExpectedBridge"),
|
||||
Error::ExpectedGuardianSet => info!("Error: ExpectedGuardianSet"),
|
||||
Error::UninitializedState => info!("Error: State is unititialized"),
|
||||
Error::InvalidProgramAddress => info!("Error: InvalidProgramAddress"),
|
||||
Error::InvalidVAAFormat => info!("Error: InvalidVAAFormat"),
|
||||
Error::InvalidVAAAction => info!("Error: InvalidVAAAction"),
|
||||
Error::InvalidVAASignature => info!("Error: InvalidVAASignature"),
|
||||
Error::AlreadyExists => info!("Error: AlreadyExists"),
|
||||
Error::InvalidDerivedAccount => info!("Error: InvalidDerivedAccount"),
|
||||
Error::TokenMintMismatch => info!("Error: TokenMintMismatch"),
|
||||
Error::WrongMintOwner => info!("Error: WrongMintOwner"),
|
||||
Error::WrongTokenAccountOwner => info!("Error: WrongTokenAccountOwner"),
|
||||
Error::ParseFailed => info!("Error: ParseFailed"),
|
||||
Error::GuardianSetExpired => info!("Error: GuardianSetExpired"),
|
||||
Error::VAAExpired => info!("Error: VAAExpired"),
|
||||
Error::VAAClaimed => info!("Error: VAAClaimed"),
|
||||
Error::WrongBridgeOwner => info!("Error: WrongBridgeOwner"),
|
||||
Error::OldGuardianSet => info!("Error: OldGuardianSet"),
|
||||
Error::GuardianIndexNotIncreasing => info!("Error: GuardianIndexNotIncreasing"),
|
||||
Error::ExpectedTransferOutProposal => info!("Error: ExpectedTransferOutProposal"),
|
||||
Error::VAAProposalMismatch => info!("Error: VAAProposalMismatch"),
|
||||
Error::SameChainTransfer => info!("Error: SameChainTransfer"),
|
||||
}
|
||||
}
|
||||
}
|
|
@ -0,0 +1,175 @@
|
|||
#![allow(clippy::too_many_arguments)]
|
||||
|
||||
//! Instruction types
|
||||
|
||||
use std::io::Write;
|
||||
use std::mem::size_of;
|
||||
|
||||
use solana_sdk::{
|
||||
instruction::{AccountMeta, Instruction},
|
||||
program_error::ProgramError,
|
||||
pubkey::Pubkey,
|
||||
};
|
||||
use zerocopy::{AsBytes, FromBytes};
|
||||
|
||||
use crate::error::Error;
|
||||
use crate::instruction::BridgeInstruction::Initialize;
|
||||
use crate::state::{AssetMeta, BridgeConfig};
|
||||
use crate::syscalls::RawKey;
|
||||
|
||||
/// chain id of this chain
|
||||
pub const CHAIN_ID_SOLANA: u8 = 1;
|
||||
|
||||
/// size of a VAA in bytes
|
||||
const VAA_SIZE: usize = 100;
|
||||
|
||||
/// size of a foreign address in bytes
|
||||
const FOREIGN_ADDRESS_SIZE: usize = 32;
|
||||
|
||||
/// validator payment approval
|
||||
pub type VAA_BODY = [u8; VAA_SIZE];
|
||||
/// X and Y point of P for guardians
|
||||
pub type GuardianKey = [u8; 64];
|
||||
/// address on a foreign chain
|
||||
pub type ForeignAddress = [u8; FOREIGN_ADDRESS_SIZE];
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy)]
|
||||
pub struct InitializePayload {
|
||||
/// guardians that are allowed to sign mints
|
||||
pub initial_guardian: RawKey,
|
||||
/// config for the bridge
|
||||
pub config: BridgeConfig,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy)]
|
||||
pub struct TransferOutPayload {
|
||||
/// amount to transfer
|
||||
pub amount: u64,
|
||||
/// chain id to transfer to
|
||||
pub chain_id: u8,
|
||||
/// Information about the asset to be transferred
|
||||
pub asset: AssetMeta,
|
||||
/// address on the foreign chain to transfer to
|
||||
pub target: ForeignAddress,
|
||||
}
|
||||
|
||||
/// Instructions supported by the SwapInfo program.
|
||||
#[repr(C)]
|
||||
pub enum BridgeInstruction {
|
||||
/// Initializes a new Bridge
|
||||
/// Accounts expected by this instruction:
|
||||
///
|
||||
/// 0. `[writable, derived]` The bridge to initialize.
|
||||
/// 1. `[]` The clock SysVar
|
||||
/// 2. `[writable, derived]` The initial guardian set account
|
||||
/// 3. `[signer]` The fee payer for new account creation
|
||||
Initialize(InitializePayload),
|
||||
|
||||
/// Burns or locks a (wrapped) asset `token` from `sender` on the Solana chain.
|
||||
TransferOut(TransferOutPayload),
|
||||
|
||||
/// Submits a VAA signed by `guardian` on a valid `proposal`.
|
||||
PostVAA(VAA_BODY),
|
||||
|
||||
/// Deletes a `proposal` after the `VAA_EXPIRATION_TIME` is over to free up space on chain.
|
||||
/// This returns the rent to the sender.
|
||||
EvictTransferOut(),
|
||||
|
||||
/// Deletes a `ExecutedVAA` after the `VAA_EXPIRATION_TIME` is over to free up space on chain.
|
||||
/// This returns the rent to the sender.
|
||||
EvictExecutedVAA(),
|
||||
}
|
||||
|
||||
impl BridgeInstruction {
|
||||
/// Deserializes a byte buffer into a BridgeInstruction
|
||||
pub fn deserialize(input: &[u8]) -> Result<Self, ProgramError> {
|
||||
if input.len() < size_of::<u8>() {
|
||||
return Err(ProgramError::InvalidAccountData);
|
||||
}
|
||||
Ok(match input[0] {
|
||||
0 => {
|
||||
let payload: &InitializePayload = unpack(input)?;
|
||||
|
||||
Initialize(*payload)
|
||||
}
|
||||
_ => return Err(ProgramError::InvalidInstructionData),
|
||||
})
|
||||
}
|
||||
|
||||
/// Serializes a BridgeInstruction into a byte buffer.
|
||||
pub fn serialize(self: Self) -> Result<Vec<u8>, ProgramError> {
|
||||
let mut output = vec![0u8; size_of::<BridgeInstruction>()];
|
||||
|
||||
match self {
|
||||
Self::Initialize(payload) => {
|
||||
output[0] = 0;
|
||||
#[allow(clippy::cast_ptr_alignment)]
|
||||
let value = unsafe {
|
||||
&mut *(&mut output[size_of::<u8>()] as *mut u8 as *mut InitializePayload)
|
||||
};
|
||||
*value = payload;
|
||||
}
|
||||
Self::TransferOut(payload) => {
|
||||
output[0] = 1;
|
||||
#[allow(clippy::cast_ptr_alignment)]
|
||||
let value = unsafe {
|
||||
&mut *(&mut output[size_of::<u8>()] as *mut u8 as *mut TransferOutPayload)
|
||||
};
|
||||
*value = payload;
|
||||
}
|
||||
Self::PostVAA(payload) => {
|
||||
output[0] = 2;
|
||||
#[allow(clippy::cast_ptr_alignment)]
|
||||
let value =
|
||||
unsafe { &mut *(&mut output[size_of::<u8>()] as *mut u8 as *mut VAA_BODY) };
|
||||
*value = payload;
|
||||
}
|
||||
Self::EvictTransferOut() => {
|
||||
output[0] = 3;
|
||||
}
|
||||
Self::EvictExecutedVAA() => {
|
||||
output[0] = 4;
|
||||
}
|
||||
_ => panic!(""),
|
||||
}
|
||||
Ok(output)
|
||||
}
|
||||
}
|
||||
|
||||
/// Creates an 'initialize' instruction.
|
||||
pub fn initialize(
|
||||
program_id: &Pubkey,
|
||||
sender: &Pubkey,
|
||||
bridge: &Pubkey,
|
||||
initial_guardian: RawKey,
|
||||
config: &BridgeConfig,
|
||||
) -> Result<Instruction, ProgramError> {
|
||||
let data = BridgeInstruction::Initialize(InitializePayload {
|
||||
config: *config,
|
||||
initial_guardian,
|
||||
})
|
||||
.serialize()?;
|
||||
|
||||
let accounts = vec![
|
||||
AccountMeta::new(*sender, true),
|
||||
AccountMeta::new(*bridge, false),
|
||||
];
|
||||
|
||||
Ok(Instruction {
|
||||
program_id: *program_id,
|
||||
accounts,
|
||||
data,
|
||||
})
|
||||
}
|
||||
|
||||
/// Unpacks a reference from a bytes buffer.
|
||||
pub fn unpack<T>(input: &[u8]) -> Result<&T, ProgramError> {
|
||||
if input.len() < size_of::<u8>() + size_of::<T>() {
|
||||
return Err(ProgramError::InvalidAccountData);
|
||||
}
|
||||
#[allow(clippy::cast_ptr_alignment)]
|
||||
let val: &T = unsafe { &*(&input[1] as *const u8 as *const T) };
|
||||
Ok(val)
|
||||
}
|
|
@ -0,0 +1,12 @@
|
|||
#[macro_use]
|
||||
extern crate arrayref;
|
||||
#[macro_use]
|
||||
extern crate zerocopy;
|
||||
|
||||
pub mod entrypoint;
|
||||
pub mod error;
|
||||
pub mod instruction;
|
||||
pub mod processor;
|
||||
pub mod state;
|
||||
pub mod syscalls;
|
||||
pub mod vaa;
|
|
@ -0,0 +1,702 @@
|
|||
//! Program instruction processing logic
|
||||
|
||||
use std::io::Write;
|
||||
use std::mem::size_of;
|
||||
use std::slice::Iter;
|
||||
use std::str;
|
||||
|
||||
use num_traits::AsPrimitive;
|
||||
use sha3::Digest;
|
||||
use solana_sdk::clock::Clock;
|
||||
use solana_sdk::hash::hash;
|
||||
#[cfg(not(target_arch = "bpf"))]
|
||||
use solana_sdk::instruction::Instruction;
|
||||
use solana_sdk::log::sol_log;
|
||||
#[cfg(target_arch = "bpf")]
|
||||
use solana_sdk::program::invoke_signed;
|
||||
use solana_sdk::rent::Rent;
|
||||
use solana_sdk::system_instruction::{create_account, SystemInstruction};
|
||||
use solana_sdk::sysvar::Sysvar;
|
||||
use solana_sdk::{
|
||||
account_info::next_account_info, account_info::AccountInfo, entrypoint::ProgramResult, info,
|
||||
program_error::ProgramError, pubkey::bs58, pubkey::Pubkey,
|
||||
};
|
||||
use spl_token::state::Mint;
|
||||
|
||||
use crate::instruction::BridgeInstruction::*;
|
||||
use crate::instruction::{
|
||||
BridgeInstruction, ForeignAddress, GuardianKey, TransferOutPayload, CHAIN_ID_SOLANA, VAA_BODY,
|
||||
};
|
||||
use crate::state::*;
|
||||
use crate::syscalls::{sol_verify_schnorr, RawKey, SchnorrifyInput};
|
||||
use crate::vaa::{BodyTransfer, BodyUpdateGuardianSet, VAABody, VAA};
|
||||
use crate::{error::Error, instruction::unpack};
|
||||
|
||||
/// Instruction processing logic
|
||||
impl Bridge {
|
||||
/// Processes an [Instruction](enum.Instruction.html).
|
||||
pub fn process(program_id: &Pubkey, accounts: &[AccountInfo], input: &[u8]) -> ProgramResult {
|
||||
let instruction = BridgeInstruction::deserialize(input)?;
|
||||
match instruction {
|
||||
Initialize(payload) => {
|
||||
info!("Instruction: Initialize");
|
||||
Self::process_initialize(
|
||||
program_id,
|
||||
accounts,
|
||||
payload.initial_guardian,
|
||||
payload.config,
|
||||
)
|
||||
}
|
||||
TransferOut(p) => {
|
||||
info!("Instruction: TransferOut");
|
||||
|
||||
if p.asset.chain == CHAIN_ID_SOLANA {
|
||||
Self::process_transfer_native_out(program_id, accounts, &p)
|
||||
} else {
|
||||
Self::process_transfer_out(program_id, accounts, &p)
|
||||
}
|
||||
}
|
||||
PostVAA(vaa_body) => {
|
||||
info!("Instruction: PostVAA");
|
||||
let len = vaa_body[0] as usize;
|
||||
let vaa_data = &vaa_body[..len];
|
||||
let vaa = VAA::deserialize(vaa_data)?;
|
||||
|
||||
let mut k = sha3::Keccak256::default();
|
||||
if let Err(_) = k.write(vaa_data) {
|
||||
return Err(Error::ParseFailed.into());
|
||||
};
|
||||
let hash = k.finalize();
|
||||
|
||||
Self::process_vaa(program_id, accounts, &vaa_body, &vaa, hash.as_ref())
|
||||
}
|
||||
_ => panic!(""),
|
||||
}
|
||||
}
|
||||
|
||||
/// Unpacks a token state from a bytes buffer while assuring that the state is initialized.
|
||||
pub fn process_initialize(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
initial_guardian_key: RawKey,
|
||||
config: BridgeConfig,
|
||||
) -> ProgramResult {
|
||||
let account_info_iter = &mut accounts.iter();
|
||||
let new_account_info = next_account_info(account_info_iter)?;
|
||||
let new_guardian_info = next_account_info(account_info_iter)?;
|
||||
let clock_info = next_account_info(account_info_iter)?;
|
||||
let clock = Clock::from_account_info(clock_info)?;
|
||||
|
||||
let mut new_account_data = new_account_info.data.borrow_mut();
|
||||
let mut bridge: &mut Bridge = Self::unpack_unchecked(&mut new_account_data)?;
|
||||
if bridge.is_initialized {
|
||||
return Err(Error::AlreadyExists.into());
|
||||
}
|
||||
|
||||
let expected_bridge_key = Bridge::derive_bridge_id(program_id)?;
|
||||
if expected_bridge_key != *new_account_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
let expected_guardian_set_key =
|
||||
Bridge::derive_guardian_set_id(program_id, new_account_info.key, 0)?;
|
||||
if expected_guardian_set_key != *new_guardian_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
let mut new_guardian_data = new_guardian_info.data.borrow_mut();
|
||||
let mut guardian_info: &mut GuardianSet = Self::unpack_unchecked(&mut new_guardian_data)?;
|
||||
if guardian_info.is_initialized {
|
||||
return Err(Error::AlreadyExists.into());
|
||||
}
|
||||
|
||||
// Initialize bridge params
|
||||
bridge.is_initialized = true;
|
||||
bridge.guardian_set_index = 0;
|
||||
bridge.config = config;
|
||||
|
||||
// Initialize the initial guardian set
|
||||
guardian_info.is_initialized = true;
|
||||
guardian_info.index = 0;
|
||||
guardian_info.creation_time = clock.unix_timestamp.as_();
|
||||
guardian_info.pubkey = initial_guardian_key;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Transfers a wrapped asset out
|
||||
pub fn process_transfer_out(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
t: &TransferOutPayload,
|
||||
) -> ProgramResult {
|
||||
let account_info_iter = &mut accounts.iter();
|
||||
let sender_account_info = next_account_info(account_info_iter)?;
|
||||
let clock_info = next_account_info(account_info_iter)?;
|
||||
let bridge_info = next_account_info(account_info_iter)?;
|
||||
let proposal_info = next_account_info(account_info_iter)?;
|
||||
let mint_info = next_account_info(account_info_iter)?;
|
||||
let sender_info = next_account_info(account_info_iter)?;
|
||||
|
||||
let clock = Clock::from_account_info(clock_info)?;
|
||||
let sender = Bridge::token_account_deserialize(sender_account_info)?;
|
||||
let bridge = Bridge::bridge_deserialize(bridge_info)?;
|
||||
let mint = Bridge::mint_deserialize(mint_info)?;
|
||||
|
||||
// Does the token belong to the mint
|
||||
if sender.mint != *mint_info.key {
|
||||
return Err(Error::TokenMintMismatch.into());
|
||||
}
|
||||
|
||||
// Is the mint owned by the program
|
||||
if mint.owner.unwrap() != *program_id {
|
||||
return Err(Error::WrongMintOwner.into());
|
||||
}
|
||||
|
||||
// Check that the mint is actually a wrapped asset belonging to *this* bridge instance
|
||||
let expected_mint_address = Bridge::derive_wrapped_asset_id(
|
||||
program_id,
|
||||
bridge_info.key,
|
||||
t.asset.chain,
|
||||
t.asset.address,
|
||||
)?;
|
||||
if expected_mint_address != *mint_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// Check that the transfer account was derived correctly
|
||||
let expected_transfer_id = Bridge::derive_transfer_id(
|
||||
program_id,
|
||||
bridge_info.key,
|
||||
t.asset.chain,
|
||||
t.asset.address,
|
||||
t.chain_id,
|
||||
t.target,
|
||||
sender.owner.to_bytes(),
|
||||
clock.slot.as_(),
|
||||
)?;
|
||||
if expected_transfer_id != *proposal_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// Load proposal account
|
||||
let mut proposal_data = proposal_info.data.borrow_mut();
|
||||
let proposal: &mut TransferOutProposal = Bridge::unpack_unchecked(&mut proposal_data)?;
|
||||
if proposal.is_initialized {
|
||||
return Err(Error::AlreadyExists.into());
|
||||
}
|
||||
|
||||
// Burn tokens
|
||||
Bridge::wrapped_burn(
|
||||
accounts,
|
||||
&bridge.config.token_program,
|
||||
sender_info.key,
|
||||
sender_account_info.key,
|
||||
t.amount,
|
||||
)?;
|
||||
|
||||
// Initialize proposal
|
||||
proposal.is_initialized = true;
|
||||
proposal.foreign_address = t.target;
|
||||
proposal.amount = t.amount;
|
||||
proposal.to_chain_id = t.chain_id;
|
||||
proposal.asset = t.asset;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Transfers a native token to a foreign chain
|
||||
pub fn process_transfer_native_out(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
t: &TransferOutPayload,
|
||||
) -> ProgramResult {
|
||||
let account_info_iter = &mut accounts.iter();
|
||||
let sender_account_info = next_account_info(account_info_iter)?;
|
||||
let clock_info = next_account_info(account_info_iter)?;
|
||||
let bridge_info = next_account_info(account_info_iter)?;
|
||||
let proposal_info = next_account_info(account_info_iter)?;
|
||||
let mint_info = next_account_info(account_info_iter)?;
|
||||
let custody_info = next_account_info(account_info_iter)?;
|
||||
let sender_info = next_account_info(account_info_iter)?;
|
||||
|
||||
let clock = Clock::from_account_info(clock_info)?;
|
||||
let sender = Bridge::token_account_deserialize(sender_account_info)?;
|
||||
let bridge = Bridge::bridge_deserialize(bridge_info)?;
|
||||
let mint = Bridge::mint_deserialize(mint_info)?;
|
||||
|
||||
// Does the token belong to the mint
|
||||
if sender.mint != *mint_info.key {
|
||||
return Err(Error::TokenMintMismatch.into());
|
||||
}
|
||||
|
||||
// If the mint is owned by the program, it's a wrapped asset
|
||||
if mint.owner.unwrap() == *program_id {
|
||||
return Err(Error::WrongMintOwner.into());
|
||||
}
|
||||
|
||||
// Check that the transfer account was derived correctly
|
||||
let expected_transfer_id = Bridge::derive_transfer_id(
|
||||
program_id,
|
||||
bridge_info.key,
|
||||
t.asset.chain,
|
||||
t.asset.address,
|
||||
t.chain_id,
|
||||
t.target,
|
||||
sender.owner.to_bytes(),
|
||||
clock.slot.as_(),
|
||||
)?;
|
||||
if expected_transfer_id != *proposal_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// Load proposal account
|
||||
let mut proposal_data = proposal_info.data.borrow_mut();
|
||||
let proposal: &mut TransferOutProposal = Bridge::unpack_unchecked(&mut proposal_data)?;
|
||||
if proposal.is_initialized {
|
||||
return Err(Error::AlreadyExists.into());
|
||||
}
|
||||
|
||||
let expected_custody_id =
|
||||
Bridge::derive_custody_id(program_id, bridge_info.key, mint_info.key)?;
|
||||
if expected_custody_id != *custody_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// Create the account if it does not exist
|
||||
if custody_info.data_is_empty() {
|
||||
Bridge::create_custody_account(
|
||||
program_id,
|
||||
accounts,
|
||||
&bridge.config.token_program,
|
||||
bridge_info.key,
|
||||
custody_info.key,
|
||||
mint_info.key,
|
||||
sender_info.key,
|
||||
)?;
|
||||
}
|
||||
|
||||
// Check that the custody token account is owned by the derived key
|
||||
let custody = Self::token_account_deserialize(custody_info)?;
|
||||
if custody.owner != *bridge_info.key {
|
||||
return Err(Error::WrongTokenAccountOwner.into());
|
||||
}
|
||||
|
||||
// Transfer tokens to custody
|
||||
Bridge::token_transfer_caller(
|
||||
accounts,
|
||||
&bridge.config.token_program,
|
||||
sender_account_info.key,
|
||||
custody_info.key,
|
||||
sender_info.key,
|
||||
t.amount,
|
||||
)?;
|
||||
|
||||
// Initialize proposal
|
||||
proposal.is_initialized = true;
|
||||
proposal.foreign_address = t.target;
|
||||
proposal.amount = t.amount;
|
||||
proposal.to_chain_id = t.chain_id;
|
||||
|
||||
// Don't use the user-given data as we don't check mint = AssetMeta.address
|
||||
proposal.asset = AssetMeta {
|
||||
chain: CHAIN_ID_SOLANA,
|
||||
address: mint_info.key.to_bytes(),
|
||||
};
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Processes a VAA
|
||||
pub fn process_vaa(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
vaa_data: &[u8; 100],
|
||||
vaa: &VAA,
|
||||
hash: &[u8; 32],
|
||||
) -> ProgramResult {
|
||||
let account_info_iter = &mut accounts.iter();
|
||||
let bridge_info = next_account_info(account_info_iter)?;
|
||||
let clock_info = next_account_info(account_info_iter)?;
|
||||
let guardian_set_info = next_account_info(account_info_iter)?;
|
||||
let claim_info = next_account_info(account_info_iter)?;
|
||||
|
||||
let mut bridge = Bridge::bridge_deserialize(bridge_info)?;
|
||||
let clock = Clock::from_account_info(clock_info)?;
|
||||
let mut guardian_set = Bridge::guardian_set_deserialize(guardian_set_info)?;
|
||||
|
||||
// Check that the guardian set is valid
|
||||
let expected_guardian_set =
|
||||
Bridge::derive_guardian_set_id(program_id, bridge_info.key, vaa.guardian_set_index)?;
|
||||
if expected_guardian_set != *guardian_set_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// Check that the claim is valid
|
||||
let expected_claim = Bridge::derive_claim_id(program_id, bridge_info.key, hash)?;
|
||||
if expected_claim != *claim_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// Check that the guardian set is still active
|
||||
if (guardian_set.expiration_time as i64) < clock.unix_timestamp {
|
||||
return Err(Error::GuardianSetExpired.into());
|
||||
}
|
||||
|
||||
// Check that the VAA is still valid
|
||||
if (guardian_set.expiration_time as i64) + (bridge.config.vaa_expiration_time as i64)
|
||||
< clock.unix_timestamp
|
||||
{
|
||||
return Err(Error::VAAExpired.into());
|
||||
}
|
||||
|
||||
// Verify VAA signature
|
||||
if !vaa.verify(&guardian_set.pubkey) {
|
||||
return Err(Error::InvalidVAASignature.into());
|
||||
}
|
||||
|
||||
let payload = vaa.payload.ok_or(Error::InvalidVAAAction)?;
|
||||
match payload {
|
||||
VAABody::UpdateGuardianSet(v) => Self::process_vaa_set_update(
|
||||
program_id,
|
||||
account_info_iter,
|
||||
&clock,
|
||||
bridge_info,
|
||||
&mut bridge,
|
||||
&mut guardian_set,
|
||||
&v,
|
||||
),
|
||||
VAABody::Transfer(v) => {
|
||||
if v.source_chain == CHAIN_ID_SOLANA {
|
||||
Self::process_vaa_transfer(
|
||||
program_id,
|
||||
accounts,
|
||||
account_info_iter,
|
||||
bridge_info,
|
||||
&mut bridge,
|
||||
&v,
|
||||
)
|
||||
} else {
|
||||
Self::process_vaa_transfer_post(
|
||||
program_id,
|
||||
account_info_iter,
|
||||
bridge_info,
|
||||
vaa,
|
||||
&v,
|
||||
vaa_data,
|
||||
)
|
||||
}
|
||||
}
|
||||
}?;
|
||||
|
||||
// Load proposal account
|
||||
let mut claim_data = claim_info.data.borrow_mut();
|
||||
let claim: &mut ClaimedVAA = Bridge::unpack_unchecked(&mut claim_data)?;
|
||||
if claim.is_initialized {
|
||||
return Err(Error::VAAClaimed.into());
|
||||
}
|
||||
|
||||
// Set claimed
|
||||
claim.is_initialized = true;
|
||||
claim.vaa_time = clock.unix_timestamp as u32;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Processes a Guardian set update
|
||||
pub fn process_vaa_set_update(
|
||||
program_id: &Pubkey,
|
||||
account_info_iter: &mut Iter<AccountInfo>,
|
||||
clock: &Clock,
|
||||
bridge_info: &AccountInfo,
|
||||
bridge: &mut Bridge,
|
||||
old_guardian_set: &mut GuardianSet,
|
||||
b: &BodyUpdateGuardianSet,
|
||||
) -> ProgramResult {
|
||||
let guardian_set_new_info = next_account_info(account_info_iter)?;
|
||||
|
||||
// TODO this could deadlock the bridge if an update is performed with an invalid key
|
||||
// The new guardian set must be signed by the current one
|
||||
if bridge.guardian_set_index != old_guardian_set.index {
|
||||
return Err(Error::OldGuardianSet.into());
|
||||
}
|
||||
|
||||
// The new guardian set must have an index > current
|
||||
// We don't check +1 because we trust the set to not set something close to max(u32)
|
||||
if bridge.guardian_set_index >= b.new_index {
|
||||
return Err(Error::GuardianIndexNotIncreasing.into());
|
||||
}
|
||||
|
||||
// Set the exirity on the old guardian set
|
||||
// The guardian set will expire once all currently issues vaas have expired
|
||||
old_guardian_set.expiration_time =
|
||||
(clock.unix_timestamp as u32) + bridge.config.vaa_expiration_time;
|
||||
|
||||
// Check whether the new guardian set was derived correctly
|
||||
let expected_guardian_set =
|
||||
Bridge::derive_guardian_set_id(program_id, bridge_info.key, b.new_index)?;
|
||||
if expected_guardian_set != *guardian_set_new_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
let mut guardian_set_new_data = guardian_set_new_info.data.borrow_mut();
|
||||
let guardian_set_new: &mut GuardianSet =
|
||||
Bridge::unpack_unchecked(&mut guardian_set_new_data)?;
|
||||
|
||||
// The new guardian set must not exist
|
||||
if guardian_set_new.is_initialized {
|
||||
return Err(Error::AlreadyExists.into());
|
||||
}
|
||||
|
||||
// Set values on the new guardian set
|
||||
guardian_set_new.is_initialized = true;
|
||||
guardian_set_new.index = b.new_index;
|
||||
guardian_set_new.pubkey = b.new_key;
|
||||
guardian_set_new.creation_time = clock.unix_timestamp as u32;
|
||||
|
||||
// Update the bridge guardian set id
|
||||
bridge.guardian_set_index = b.new_index;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Processes a VAA transfer in
|
||||
pub fn process_vaa_transfer(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
account_info_iter: &mut Iter<AccountInfo>,
|
||||
bridge_info: &AccountInfo,
|
||||
bridge: &mut Bridge,
|
||||
b: &BodyTransfer,
|
||||
) -> ProgramResult {
|
||||
let mint_info = next_account_info(account_info_iter)?;
|
||||
let destination_info = next_account_info(account_info_iter)?;
|
||||
|
||||
let destination = Self::token_account_deserialize(destination_info)?;
|
||||
if destination.mint != *mint_info.key {
|
||||
return Err(Error::TokenMintMismatch.into());
|
||||
}
|
||||
|
||||
if b.asset.chain == CHAIN_ID_SOLANA {
|
||||
let custody_info = next_account_info(account_info_iter)?;
|
||||
let expected_custody_id =
|
||||
Bridge::derive_custody_id(program_id, bridge_info.key, mint_info.key)?;
|
||||
if expected_custody_id != *custody_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// Native Solana asset, transfer from custody
|
||||
Bridge::token_transfer_custody(
|
||||
accounts,
|
||||
&bridge.config.token_program,
|
||||
bridge_info.key,
|
||||
custody_info.key,
|
||||
destination_info.key,
|
||||
b.amount,
|
||||
)?;
|
||||
} else {
|
||||
// Foreign chain asset, mint wrapped asset
|
||||
let expected_mint_address = Bridge::derive_wrapped_asset_id(
|
||||
program_id,
|
||||
bridge_info.key,
|
||||
b.asset.chain,
|
||||
b.asset.address,
|
||||
)?;
|
||||
if expected_mint_address != *mint_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
// If wrapped mint does not exist, create it
|
||||
if mint_info.data_is_empty() {
|
||||
let sender_info = next_account_info(account_info_iter)?;
|
||||
Self::create_wrapped_mint(
|
||||
program_id,
|
||||
accounts,
|
||||
&bridge.config.token_program,
|
||||
mint_info.key,
|
||||
bridge_info.key,
|
||||
sender_info.key,
|
||||
&b.asset,
|
||||
)?;
|
||||
}
|
||||
|
||||
Bridge::wrapped_mint_to(
|
||||
accounts,
|
||||
&bridge.config.token_program,
|
||||
mint_info.key,
|
||||
destination_info.key,
|
||||
bridge_info.key,
|
||||
b.amount,
|
||||
)?;
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Processes a VAA post for data availability (for Solana -> foreign transfers)
|
||||
pub fn process_vaa_transfer_post(
|
||||
program_id: &Pubkey,
|
||||
account_info_iter: &mut Iter<AccountInfo>,
|
||||
bridge_info: &AccountInfo,
|
||||
vaa: &VAA,
|
||||
b: &BodyTransfer,
|
||||
vaa_data: &[u8; 100],
|
||||
) -> ProgramResult {
|
||||
let proposal_info = next_account_info(account_info_iter)?;
|
||||
|
||||
// Check whether the proposal was derived correctly
|
||||
let expected_proposal = Bridge::derive_transfer_id(
|
||||
program_id,
|
||||
bridge_info.key,
|
||||
b.asset.chain,
|
||||
b.asset.address,
|
||||
b.target_chain,
|
||||
b.target_address,
|
||||
b.source_address,
|
||||
b.ref_block,
|
||||
)?;
|
||||
if expected_proposal != *proposal_info.key {
|
||||
return Err(Error::InvalidDerivedAccount.into());
|
||||
}
|
||||
|
||||
let mut proposal = Self::transfer_out_proposal_deserialize(proposal_info)?;
|
||||
if !proposal.matches_vaa(b) {
|
||||
return Err(Error::VAAProposalMismatch.into());
|
||||
}
|
||||
|
||||
// Set vaa
|
||||
proposal.vaa = *vaa_data;
|
||||
proposal.vaa_time = vaa.timestamp;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
// Test program id for the swap program.
|
||||
#[cfg(not(target_arch = "bpf"))]
|
||||
const WORMHOLE_PROGRAM_ID: Pubkey = Pubkey::new_from_array([2u8; 32]);
|
||||
const TOKEN_PROGRAM_ID: Pubkey = Pubkey::new_from_array([2u8; 32]);
|
||||
|
||||
/// Routes invokes to the token program, used for testing.
|
||||
#[cfg(not(target_arch = "bpf"))]
|
||||
pub fn invoke_signed<'a>(
|
||||
instruction: &Instruction,
|
||||
account_infos: &[AccountInfo<'a>],
|
||||
signers_seeds: &[&[&[u8]]],
|
||||
) -> ProgramResult {
|
||||
let mut new_account_infos = vec![];
|
||||
for meta in instruction.accounts.iter() {
|
||||
for account_info in account_infos.iter() {
|
||||
if meta.pubkey == *account_info.key {
|
||||
let mut new_account_info = account_info.clone();
|
||||
for seeds in signers_seeds.iter() {
|
||||
let signer =
|
||||
Pubkey::create_program_address(seeds, &WORMHOLE_PROGRAM_ID).unwrap();
|
||||
if *account_info.key == signer {
|
||||
new_account_info.is_signer = true;
|
||||
}
|
||||
}
|
||||
new_account_infos.push(new_account_info);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
match instruction.program_id {
|
||||
TOKEN_PROGRAM_ID => spl_token::state::State::process(
|
||||
&instruction.program_id,
|
||||
&new_account_infos,
|
||||
&instruction.data,
|
||||
),
|
||||
_ => panic!(),
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use solana_sdk::{
|
||||
account::Account, account_info::create_is_signer_account_infos, instruction::Instruction,
|
||||
};
|
||||
use spl_token::{
|
||||
instruction::{initialize_account, initialize_mint},
|
||||
state::{Account as SplAccount, Mint as SplMint, State as SplState},
|
||||
};
|
||||
|
||||
use crate::instruction::initialize;
|
||||
|
||||
use super::*;
|
||||
|
||||
const TOKEN_PROGRAM_ID: Pubkey = Pubkey::new_from_array([1u8; 32]);
|
||||
|
||||
// Pulls in the stubs required for `info!()`
|
||||
#[cfg(not(target_arch = "bpf"))]
|
||||
solana_sdk::program_stubs!();
|
||||
|
||||
fn pubkey_rand() -> Pubkey {
|
||||
Pubkey::new(&rand::random::<[u8; 32]>())
|
||||
}
|
||||
|
||||
fn do_process_instruction(
|
||||
instruction: Instruction,
|
||||
accounts: Vec<&mut Account>,
|
||||
) -> ProgramResult {
|
||||
let mut meta = instruction
|
||||
.accounts
|
||||
.iter()
|
||||
.zip(accounts)
|
||||
.map(|(account_meta, account)| (&account_meta.pubkey, account_meta.is_signer, account))
|
||||
.collect::<Vec<_>>();
|
||||
|
||||
let account_infos = create_is_signer_account_infos(&mut meta);
|
||||
if instruction.program_id == WORMHOLE_PROGRAM_ID {
|
||||
Bridge::process(&instruction.program_id, &account_infos, &instruction.data)
|
||||
} else {
|
||||
SplState::process(&instruction.program_id, &account_infos, &instruction.data)
|
||||
}
|
||||
}
|
||||
|
||||
fn create_bridge(
|
||||
program_id: &Pubkey,
|
||||
config: &BridgeConfig,
|
||||
initial_guardians: &RawKey,
|
||||
) -> (Pubkey, Account) {
|
||||
let token_key = pubkey_rand();
|
||||
let mut token_account = Account::new(0, size_of::<SplMint>(), &program_id);
|
||||
let account_key = pubkey_rand();
|
||||
let mut account_account = Account::new(0, size_of::<SplAccount>(), &program_id);
|
||||
|
||||
// create pool and pool account
|
||||
do_process_instruction(
|
||||
initialize_account(&program_id, &account_key, &token_key, &authority_key).unwrap(),
|
||||
vec![
|
||||
&mut account_account,
|
||||
&mut Account::default(),
|
||||
&mut token_account,
|
||||
],
|
||||
)
|
||||
.unwrap();
|
||||
let mut authority_account = Account::default();
|
||||
do_process_instruction(
|
||||
initialize_mint(
|
||||
&program_id,
|
||||
&token_key,
|
||||
Some(&account_key),
|
||||
Some(&authority_key),
|
||||
amount,
|
||||
2,
|
||||
)
|
||||
.unwrap(),
|
||||
if amount == 0 {
|
||||
vec![&mut token_account, &mut authority_account]
|
||||
} else {
|
||||
vec![
|
||||
&mut token_account,
|
||||
&mut account_account,
|
||||
&mut authority_account,
|
||||
]
|
||||
},
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
return ((account_key, account_account));
|
||||
}
|
||||
}
|
|
@ -0,0 +1,528 @@
|
|||
//! Bridge transition types
|
||||
|
||||
use std::io::Write;
|
||||
use std::mem::size_of;
|
||||
use std::slice::Iter;
|
||||
use std::str;
|
||||
|
||||
use num_traits::AsPrimitive;
|
||||
use sha3::Digest;
|
||||
use solana_sdk::clock::Clock;
|
||||
use solana_sdk::hash::hash;
|
||||
#[cfg(not(target_arch = "bpf"))]
|
||||
use solana_sdk::instruction::Instruction;
|
||||
use solana_sdk::log::sol_log;
|
||||
#[cfg(target_arch = "bpf")]
|
||||
use solana_sdk::program::invoke_signed;
|
||||
use solana_sdk::rent::Rent;
|
||||
use solana_sdk::system_instruction::{create_account, SystemInstruction};
|
||||
use solana_sdk::sysvar::Sysvar;
|
||||
use solana_sdk::{
|
||||
account_info::next_account_info, account_info::AccountInfo, entrypoint::ProgramResult, info,
|
||||
program_error::ProgramError, pubkey::bs58, pubkey::Pubkey,
|
||||
};
|
||||
use spl_token::state::Mint;
|
||||
|
||||
use crate::instruction::BridgeInstruction::*;
|
||||
use crate::instruction::{
|
||||
BridgeInstruction, ForeignAddress, GuardianKey, TransferOutPayload, CHAIN_ID_SOLANA, VAA_BODY,
|
||||
};
|
||||
#[cfg(not(target_arch = "bpf"))]
|
||||
use crate::processor::invoke_signed;
|
||||
|
||||
use crate::syscalls::{sol_verify_schnorr, RawKey, SchnorrifyInput};
|
||||
use crate::vaa::{BodyTransfer, BodyUpdateGuardianSet, VAABody, VAA};
|
||||
use crate::{error::Error, instruction::unpack};
|
||||
use zerocopy::AsBytes;
|
||||
|
||||
/// fee rate as a ratio
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy)]
|
||||
pub struct Fee {
|
||||
/// denominator of the fee ratio
|
||||
pub denominator: u64,
|
||||
/// numerator of the fee ratio
|
||||
pub numerator: u64,
|
||||
}
|
||||
|
||||
/// guardian set
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy)]
|
||||
pub struct GuardianSet {
|
||||
/// index of the set
|
||||
pub index: u32,
|
||||
/// public key of the threshold schnorr set
|
||||
pub pubkey: RawKey,
|
||||
/// creation time
|
||||
pub creation_time: u32,
|
||||
/// expiration time when VAAs issued by this set are no longer valid
|
||||
pub expiration_time: u32,
|
||||
|
||||
/// Is `true` if this structure has been initialized.
|
||||
pub is_initialized: bool,
|
||||
}
|
||||
|
||||
impl IsInitialized for GuardianSet {
|
||||
fn is_initialized(&self) -> bool {
|
||||
self.is_initialized
|
||||
}
|
||||
}
|
||||
|
||||
/// proposal to transfer tokens to a foreign chain
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy)]
|
||||
pub struct TransferOutProposal {
|
||||
/// amount to transfer
|
||||
pub amount: u64,
|
||||
/// chain id to transfer to
|
||||
pub to_chain_id: u8,
|
||||
/// address on the foreign chain to transfer to
|
||||
pub foreign_address: ForeignAddress,
|
||||
/// asset that is being transferred
|
||||
pub asset: AssetMeta,
|
||||
/// vaa to unlock the tokens on the foreign chain
|
||||
pub vaa: VAA_BODY,
|
||||
/// time the vaa was submitted
|
||||
pub vaa_time: u32,
|
||||
|
||||
/// Is `true` if this structure has been initialized.
|
||||
pub is_initialized: bool,
|
||||
}
|
||||
|
||||
impl IsInitialized for TransferOutProposal {
|
||||
fn is_initialized(&self) -> bool {
|
||||
self.is_initialized
|
||||
}
|
||||
}
|
||||
|
||||
impl TransferOutProposal {
|
||||
pub fn matches_vaa(&self, b: &BodyTransfer) -> bool {
|
||||
return b.amount == self.amount
|
||||
&& b.target_address == self.foreign_address
|
||||
&& b.target_chain == self.to_chain_id
|
||||
&& b.asset == self.asset;
|
||||
}
|
||||
}
|
||||
|
||||
/// record of a claimed VAA
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default, PartialEq)]
|
||||
pub struct ClaimedVAA {
|
||||
/// hash of the vaa
|
||||
pub hash: [u8; 32],
|
||||
/// time the vaa was submitted
|
||||
pub vaa_time: u32,
|
||||
|
||||
/// Is `true` if this structure has been initialized.
|
||||
pub is_initialized: bool,
|
||||
}
|
||||
|
||||
impl IsInitialized for ClaimedVAA {
|
||||
fn is_initialized(&self) -> bool {
|
||||
self.is_initialized
|
||||
}
|
||||
}
|
||||
|
||||
/// Metadata about an asset
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default, PartialEq)]
|
||||
pub struct AssetMeta {
|
||||
/// Address of the token
|
||||
pub address: ForeignAddress,
|
||||
|
||||
/// Chain of the token
|
||||
pub chain: u8,
|
||||
}
|
||||
|
||||
/// Config for a bridge.
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, Default, PartialEq)]
|
||||
pub struct BridgeConfig {
|
||||
/// Period for how long a VAA is valid. This is also the period after a valid VAA has been
|
||||
/// published to a `TransferOutProposal` or `ClaimedVAA` after which the account can be evicted.
|
||||
/// This exists to guarantee data availability and prevent replays.
|
||||
pub vaa_expiration_time: u32,
|
||||
|
||||
/// Token program that is used for this bridge
|
||||
pub token_program: Pubkey,
|
||||
}
|
||||
|
||||
/// Bridge state.
|
||||
#[repr(C)]
|
||||
#[derive(Clone, Copy, Debug, PartialEq)]
|
||||
pub struct Bridge {
|
||||
/// the currently active guardian set
|
||||
pub guardian_set_index: u32,
|
||||
|
||||
/// read-only config parameters for a bridge instance.
|
||||
pub config: BridgeConfig,
|
||||
|
||||
/// Is `true` if this structure has been initialized.
|
||||
pub is_initialized: bool,
|
||||
}
|
||||
|
||||
impl IsInitialized for Bridge {
|
||||
fn is_initialized(&self) -> bool {
|
||||
self.is_initialized
|
||||
}
|
||||
}
|
||||
|
||||
/// Implementation of serialization functions
|
||||
impl Bridge {
|
||||
/// Deserializes a spl_token `Account`.
|
||||
pub fn token_account_deserialize(
|
||||
info: &AccountInfo,
|
||||
) -> Result<spl_token::state::Account, Error> {
|
||||
Ok(*spl_token::state::unpack(&mut info.data.borrow_mut())
|
||||
.map_err(|_| Error::ExpectedAccount)?)
|
||||
}
|
||||
|
||||
/// Deserializes a spl_token `Mint`.
|
||||
pub fn mint_deserialize(info: &AccountInfo) -> Result<spl_token::state::Mint, Error> {
|
||||
Ok(*spl_token::state::unpack(&mut info.data.borrow_mut())
|
||||
.map_err(|_| Error::ExpectedToken)?)
|
||||
}
|
||||
|
||||
/// Deserializes a `Bridge`.
|
||||
pub fn bridge_deserialize(info: &AccountInfo) -> Result<Bridge, Error> {
|
||||
Ok(*Bridge::unpack(&mut info.data.borrow_mut()).map_err(|_| Error::ExpectedBridge)?)
|
||||
}
|
||||
|
||||
/// Deserializes a `GuardianSet`.
|
||||
pub fn guardian_set_deserialize(info: &AccountInfo) -> Result<GuardianSet, Error> {
|
||||
Ok(*Bridge::unpack(&mut info.data.borrow_mut()).map_err(|_| Error::ExpectedGuardianSet)?)
|
||||
}
|
||||
|
||||
/// Deserializes a `TransferOutProposal`.
|
||||
pub fn transfer_out_proposal_deserialize(
|
||||
info: &AccountInfo,
|
||||
) -> Result<TransferOutProposal, Error> {
|
||||
Ok(*Bridge::unpack(&mut info.data.borrow_mut())
|
||||
.map_err(|_| Error::ExpectedTransferOutProposal)?)
|
||||
}
|
||||
|
||||
/// Unpacks a token state from a bytes buffer while assuring that the state is initialized.
|
||||
pub fn unpack<T: IsInitialized>(input: &mut [u8]) -> Result<&mut T, ProgramError> {
|
||||
let mut_ref: &mut T = Self::unpack_unchecked(input)?;
|
||||
if !mut_ref.is_initialized() {
|
||||
return Err(Error::UninitializedState.into());
|
||||
}
|
||||
Ok(mut_ref)
|
||||
}
|
||||
/// Unpacks a token state from a bytes buffer without checking that the state is initialized.
|
||||
pub fn unpack_unchecked<T: IsInitialized>(input: &mut [u8]) -> Result<&mut T, ProgramError> {
|
||||
if input.len() != size_of::<T>() {
|
||||
return Err(ProgramError::InvalidAccountData);
|
||||
}
|
||||
#[allow(clippy::cast_ptr_alignment)]
|
||||
Ok(unsafe { &mut *(&mut input[0] as *mut u8 as *mut T) })
|
||||
}
|
||||
}
|
||||
|
||||
/// Implementation of actions
|
||||
impl Bridge {
|
||||
/// Burn a wrapped asset from account
|
||||
pub fn wrapped_burn(
|
||||
accounts: &[AccountInfo],
|
||||
token_program_id: &Pubkey,
|
||||
authority: &Pubkey,
|
||||
token_account: &Pubkey,
|
||||
amount: u64,
|
||||
) -> Result<(), ProgramError> {
|
||||
let all_signers: Vec<&Pubkey> = accounts
|
||||
.iter()
|
||||
.filter_map(|item| if item.is_signer { Some(item.key) } else { None })
|
||||
.collect();
|
||||
let ix = spl_token::instruction::burn(
|
||||
token_program_id,
|
||||
token_account,
|
||||
authority,
|
||||
all_signers.as_slice(),
|
||||
amount,
|
||||
)?;
|
||||
invoke_signed(&ix, accounts, &[])
|
||||
}
|
||||
|
||||
/// Mint a wrapped asset to account
|
||||
pub fn wrapped_mint_to(
|
||||
accounts: &[AccountInfo],
|
||||
token_program_id: &Pubkey,
|
||||
mint: &Pubkey,
|
||||
destination: &Pubkey,
|
||||
bridge: &Pubkey,
|
||||
amount: u64,
|
||||
) -> Result<(), ProgramError> {
|
||||
let ix = spl_token::instruction::mint_to(
|
||||
token_program_id,
|
||||
mint,
|
||||
destination,
|
||||
bridge,
|
||||
&[],
|
||||
amount,
|
||||
)?;
|
||||
invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]])
|
||||
}
|
||||
|
||||
/// Transfer tokens from a caller
|
||||
pub fn token_transfer_caller(
|
||||
accounts: &[AccountInfo],
|
||||
token_program_id: &Pubkey,
|
||||
source: &Pubkey,
|
||||
destination: &Pubkey,
|
||||
authority: &Pubkey,
|
||||
amount: u64,
|
||||
) -> Result<(), ProgramError> {
|
||||
let all_signers: Vec<&Pubkey> = accounts
|
||||
.iter()
|
||||
.filter_map(|item| if item.is_signer { Some(item.key) } else { None })
|
||||
.collect();
|
||||
let ix = spl_token::instruction::transfer(
|
||||
token_program_id,
|
||||
source,
|
||||
destination,
|
||||
authority,
|
||||
all_signers.as_slice(),
|
||||
amount,
|
||||
)?;
|
||||
invoke_signed(&ix, accounts, &[])
|
||||
}
|
||||
|
||||
/// Transfer tokens from a custody account
|
||||
pub fn token_transfer_custody(
|
||||
accounts: &[AccountInfo],
|
||||
token_program_id: &Pubkey,
|
||||
bridge: &Pubkey,
|
||||
source: &Pubkey,
|
||||
destination: &Pubkey,
|
||||
amount: u64,
|
||||
) -> Result<(), ProgramError> {
|
||||
let ix = spl_token::instruction::transfer(
|
||||
token_program_id,
|
||||
source,
|
||||
destination,
|
||||
bridge,
|
||||
&[],
|
||||
amount,
|
||||
)?;
|
||||
invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]])
|
||||
}
|
||||
|
||||
/// Create a new account
|
||||
pub fn create_custody_account(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
token_program: &Pubkey,
|
||||
bridge: &Pubkey,
|
||||
account: &Pubkey,
|
||||
mint: &Pubkey,
|
||||
payer: &Pubkey,
|
||||
) -> Result<(), ProgramError> {
|
||||
Self::create_account::<Mint>(
|
||||
program_id,
|
||||
accounts,
|
||||
mint,
|
||||
payer,
|
||||
Self::derive_custody_seeds(bridge, mint),
|
||||
)?;
|
||||
let ix = spl_token::instruction::initialize_account(token_program, account, mint, bridge)?;
|
||||
invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]])
|
||||
}
|
||||
|
||||
/// Create a mint for a wrapped asset
|
||||
pub fn create_wrapped_mint(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
token_program: &Pubkey,
|
||||
mint: &Pubkey,
|
||||
bridge: &Pubkey,
|
||||
payer: &Pubkey,
|
||||
asset: &AssetMeta,
|
||||
) -> Result<(), ProgramError> {
|
||||
Self::create_account::<Mint>(
|
||||
program_id,
|
||||
accounts,
|
||||
mint,
|
||||
payer,
|
||||
Self::derive_wrapped_asset_seeds(bridge, asset.chain, asset.address),
|
||||
)?;
|
||||
let ix =
|
||||
spl_token::instruction::initialize_mint(token_program, mint, None, Some(bridge), 0, 8)?;
|
||||
invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]])
|
||||
}
|
||||
|
||||
/// Create a new account
|
||||
pub fn create_account<T: Sized>(
|
||||
program_id: &Pubkey,
|
||||
accounts: &[AccountInfo],
|
||||
new_account: &Pubkey,
|
||||
payer: &Pubkey,
|
||||
seeds: Vec<Vec<u8>>,
|
||||
) -> Result<(), ProgramError> {
|
||||
let size = size_of::<T>();
|
||||
let ix = create_account(
|
||||
payer,
|
||||
new_account,
|
||||
Rent::default().minimum_balance(size as usize),
|
||||
size as u64,
|
||||
program_id,
|
||||
);
|
||||
let s: Vec<_> = seeds.iter().map(|item| item.as_slice()).collect();
|
||||
invoke_signed(&ix, accounts, &[s.as_slice()])
|
||||
}
|
||||
}
|
||||
|
||||
/// Implementation of derivations
|
||||
impl Bridge {
|
||||
/// Calculates derived seeds for a guardian set
|
||||
pub fn derive_guardian_set_seeds(bridge_key: &Pubkey, guardian_set_index: u32) -> Vec<Vec<u8>> {
|
||||
vec![
|
||||
"guardian".as_bytes().to_vec(),
|
||||
bridge_key.to_bytes().to_vec(),
|
||||
guardian_set_index.as_bytes().to_vec(),
|
||||
]
|
||||
}
|
||||
|
||||
/// Calculates derived seeds for a wrapped asset
|
||||
pub fn derive_wrapped_asset_seeds(
|
||||
bridge_key: &Pubkey,
|
||||
asset_chain: u8,
|
||||
asset: ForeignAddress,
|
||||
) -> Vec<Vec<u8>> {
|
||||
vec![
|
||||
"wrapped".as_bytes().to_vec(),
|
||||
bridge_key.to_bytes().to_vec(),
|
||||
asset_chain.as_bytes().to_vec(),
|
||||
asset.as_bytes().to_vec(),
|
||||
]
|
||||
}
|
||||
|
||||
/// Calculates derived seeds for a transfer out
|
||||
pub fn derive_transfer_id_seeds(
|
||||
bridge_key: &Pubkey,
|
||||
asset_chain: u8,
|
||||
asset: ForeignAddress,
|
||||
target_chain: u8,
|
||||
target_address: ForeignAddress,
|
||||
user: ForeignAddress,
|
||||
slot: u64,
|
||||
) -> Vec<Vec<u8>> {
|
||||
vec![
|
||||
"transfer".as_bytes().to_vec(),
|
||||
bridge_key.to_bytes().to_vec(),
|
||||
asset_chain.as_bytes().to_vec(),
|
||||
asset.as_bytes().to_vec(),
|
||||
target_chain.as_bytes().to_vec(),
|
||||
target_address.as_bytes().to_vec(),
|
||||
user.as_bytes().to_vec(),
|
||||
slot.as_bytes().to_vec(),
|
||||
]
|
||||
}
|
||||
|
||||
/// Calculates derived seeds for a bridge
|
||||
pub fn derive_bridge_seeds(program_id: &Pubkey) -> Vec<Vec<u8>> {
|
||||
vec![program_id.to_bytes().to_vec()]
|
||||
}
|
||||
|
||||
/// Calculates derived seeds for a custody account
|
||||
pub fn derive_custody_seeds<'a>(bridge: &Pubkey, mint: &Pubkey) -> Vec<Vec<u8>> {
|
||||
vec![
|
||||
"custody".as_bytes().to_vec(),
|
||||
bridge.to_bytes().to_vec(),
|
||||
mint.to_bytes().to_vec(),
|
||||
]
|
||||
}
|
||||
|
||||
/// Calculates derived seeds for a claim
|
||||
pub fn derive_claim_seeds<'a>(bridge: &Pubkey, hash: &[u8; 32]) -> Vec<Vec<u8>> {
|
||||
vec![
|
||||
"claim".as_bytes().to_vec(),
|
||||
bridge.to_bytes().to_vec(),
|
||||
hash.as_bytes().to_vec(),
|
||||
]
|
||||
}
|
||||
|
||||
/// Calculates a derived address for this program
|
||||
pub fn derive_bridge_id(program_id: &Pubkey) -> Result<Pubkey, Error> {
|
||||
Self::derive_key(program_id, Self::derive_bridge_seeds(program_id))
|
||||
}
|
||||
|
||||
/// Calculates a derived address for a custody account
|
||||
pub fn derive_custody_id(
|
||||
program_id: &Pubkey,
|
||||
bridge: &Pubkey,
|
||||
mint: &Pubkey,
|
||||
) -> Result<Pubkey, Error> {
|
||||
Self::derive_key(program_id, Self::derive_custody_seeds(bridge, mint))
|
||||
}
|
||||
|
||||
/// Calculates a derived address for a claim account
|
||||
pub fn derive_claim_id(
|
||||
program_id: &Pubkey,
|
||||
bridge: &Pubkey,
|
||||
hash: &[u8; 32],
|
||||
) -> Result<Pubkey, Error> {
|
||||
Self::derive_key(program_id, Self::derive_claim_seeds(bridge, hash))
|
||||
}
|
||||
|
||||
/// Calculates a derived address for this program
|
||||
pub fn derive_guardian_set_id(
|
||||
program_id: &Pubkey,
|
||||
bridge_key: &Pubkey,
|
||||
guardian_set_index: u32,
|
||||
) -> Result<Pubkey, Error> {
|
||||
Self::derive_key(
|
||||
program_id,
|
||||
Self::derive_guardian_set_seeds(bridge_key, guardian_set_index),
|
||||
)
|
||||
}
|
||||
|
||||
/// Calculates a derived seeds for a wrapped asset
|
||||
pub fn derive_wrapped_asset_id(
|
||||
program_id: &Pubkey,
|
||||
bridge_key: &Pubkey,
|
||||
asset_chain: u8,
|
||||
asset: ForeignAddress,
|
||||
) -> Result<Pubkey, Error> {
|
||||
Self::derive_key(
|
||||
program_id,
|
||||
Self::derive_wrapped_asset_seeds(bridge_key, asset_chain, asset),
|
||||
)
|
||||
}
|
||||
|
||||
/// Calculates a derived address for a transfer out
|
||||
pub fn derive_transfer_id(
|
||||
program_id: &Pubkey,
|
||||
bridge_key: &Pubkey,
|
||||
asset_chain: u8,
|
||||
asset: ForeignAddress,
|
||||
target_chain: u8,
|
||||
target_address: ForeignAddress,
|
||||
user: ForeignAddress,
|
||||
slot: u64,
|
||||
) -> Result<Pubkey, Error> {
|
||||
Self::derive_key(
|
||||
program_id,
|
||||
Self::derive_transfer_id_seeds(
|
||||
bridge_key,
|
||||
asset_chain,
|
||||
asset,
|
||||
target_chain,
|
||||
target_address,
|
||||
user,
|
||||
slot,
|
||||
),
|
||||
)
|
||||
}
|
||||
|
||||
fn derive_key(program_id: &Pubkey, seeds: Vec<Vec<u8>>) -> Result<Pubkey, Error> {
|
||||
let s: Vec<_> = seeds.iter().map(|item| item.as_slice()).collect();
|
||||
Pubkey::create_program_address(s.as_slice(), program_id)
|
||||
.or(Err(Error::InvalidProgramAddress))
|
||||
}
|
||||
}
|
||||
|
||||
/// Check is a token state is initialized
|
||||
pub trait IsInitialized {
|
||||
/// Is initialized
|
||||
fn is_initialized(&self) -> bool;
|
||||
}
|
|
@ -0,0 +1,41 @@
|
|||
#[repr(C)]
|
||||
pub struct SchnorrifyInput {
|
||||
message: [u8; 32],
|
||||
addr: [u8; 20],
|
||||
signature: [u8; 32],
|
||||
pub_key: RawKey,
|
||||
}
|
||||
|
||||
#[repr(C)]
|
||||
#[derive(Copy, Clone, Debug, PartialOrd, PartialEq)]
|
||||
pub struct RawKey {
|
||||
pub x: [u8; 32],
|
||||
pub y: [u8; 32],
|
||||
}
|
||||
|
||||
impl SchnorrifyInput {
|
||||
pub fn new(pub_key: RawKey, message: [u8; 32], signature: [u8; 32], addr: [u8; 20]) -> SchnorrifyInput {
|
||||
SchnorrifyInput {
|
||||
message,
|
||||
addr,
|
||||
signature,
|
||||
pub_key,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Verify an ETH optimized Schnorr signature
|
||||
///
|
||||
/// @param input - Input for signature verification
|
||||
#[inline]
|
||||
pub fn sol_verify_schnorr(input: &SchnorrifyInput) -> bool {
|
||||
let res = unsafe {
|
||||
sol_verify_ethschnorr(input as *const _ as *const u8)
|
||||
};
|
||||
|
||||
res == 1
|
||||
}
|
||||
|
||||
extern "C" {
|
||||
fn sol_verify_ethschnorr(input: *const u8) -> u64;
|
||||
}
|
|
@ -0,0 +1,299 @@
|
|||
use std::any::Any;
|
||||
use std::io::{Cursor, Read, Write};
|
||||
use std::mem::size_of;
|
||||
|
||||
use byteorder::{BigEndian, ReadBytesExt, WriteBytesExt};
|
||||
use sha3::Digest;
|
||||
use solana_sdk::program_error::ProgramError;
|
||||
|
||||
use crate::error::Error;
|
||||
use crate::error::Error::InvalidVAAFormat;
|
||||
use crate::instruction::unpack;
|
||||
use crate::state::AssetMeta;
|
||||
use crate::syscalls::{RawKey, SchnorrifyInput, sol_verify_schnorr};
|
||||
use crate::vaa::VAABody::UpdateGuardianSet;
|
||||
|
||||
pub type ForeignAddress = [u8; 32];
|
||||
|
||||
#[derive(Clone, Debug, Default, PartialEq)]
|
||||
pub struct VAA {
|
||||
// Header part
|
||||
pub version: u8,
|
||||
pub guardian_set_index: u32,
|
||||
pub signature_sig: [u8; 32],
|
||||
pub signature_addr: [u8; 20],
|
||||
|
||||
// Body part
|
||||
pub timestamp: u32,
|
||||
pub payload: Option<VAABody>,
|
||||
}
|
||||
|
||||
impl VAA {
|
||||
pub fn new() -> VAA {
|
||||
return VAA {
|
||||
version: 0,
|
||||
guardian_set_index: 0,
|
||||
signature_sig: [0; 32],
|
||||
signature_addr: [0; 20],
|
||||
timestamp: 0,
|
||||
payload: None,
|
||||
};
|
||||
}
|
||||
|
||||
pub fn verify(&self, guardian_key: &RawKey) -> bool {
|
||||
let body = match self.signature_body() {
|
||||
Ok(v) => { v }
|
||||
Err(_) => { return false; }
|
||||
};
|
||||
|
||||
let mut h = sha3::Keccak256::default();
|
||||
if let Err(_) = h.write(body.as_slice()) { return false; };
|
||||
let hash = h.finalize().into();
|
||||
|
||||
let schnorr_input = SchnorrifyInput::new(*guardian_key, hash,
|
||||
self.signature_sig, self.signature_addr);
|
||||
sol_verify_schnorr(&schnorr_input)
|
||||
}
|
||||
|
||||
pub fn serialize(&self) -> Result<Vec<u8>, Error> {
|
||||
let mut v = Cursor::new(Vec::new());
|
||||
|
||||
v.write_u8(self.version)?;
|
||||
v.write_u32::<BigEndian>(self.guardian_set_index)?;
|
||||
v.write(self.signature_sig.as_ref())?;
|
||||
v.write(self.signature_addr.as_ref())?;
|
||||
v.write_u32::<BigEndian>(self.timestamp)?;
|
||||
|
||||
let payload = self.payload.as_ref().ok_or(Error::InvalidVAAAction)?;
|
||||
v.write_u8(payload.action_id())?;
|
||||
|
||||
let payload_data = payload.serialize()?;
|
||||
v.write(payload_data.as_slice())?;
|
||||
|
||||
Ok(v.into_inner())
|
||||
}
|
||||
|
||||
pub fn signature_body(&self) -> Result<Vec<u8>, Error> {
|
||||
let mut v = Cursor::new(Vec::new());
|
||||
|
||||
v.write_u32::<BigEndian>(self.timestamp)?;
|
||||
|
||||
let payload = self.payload.as_ref().ok_or(Error::InvalidVAAAction)?;
|
||||
v.write_u8(payload.action_id())?;
|
||||
|
||||
let payload_data = payload.serialize()?;
|
||||
v.write_u8(payload_data.len() as u8)?;
|
||||
v.write(payload_data.as_slice())?;
|
||||
|
||||
Ok(v.into_inner())
|
||||
}
|
||||
|
||||
pub fn deserialize(data: &[u8]) -> Result<VAA, Error> {
|
||||
let mut rdr = Cursor::new(data);
|
||||
let mut v = VAA::new();
|
||||
|
||||
v.version = rdr.read_u8()?;
|
||||
v.guardian_set_index = rdr.read_u32::<BigEndian>()?;
|
||||
rdr.read_exact(&mut v.signature_sig)?;
|
||||
rdr.read_exact(&mut v.signature_addr)?;
|
||||
|
||||
v.timestamp = rdr.read_u32::<BigEndian>()?;
|
||||
|
||||
let mut payload_d = Vec::new();
|
||||
rdr.read_to_end(&mut payload_d)?;
|
||||
v.payload = Some(VAABody::deserialize(&payload_d)?);
|
||||
|
||||
Ok(v)
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone, Copy, Debug, PartialEq)]
|
||||
pub enum VAABody {
|
||||
UpdateGuardianSet(BodyUpdateGuardianSet),
|
||||
Transfer(BodyTransfer),
|
||||
}
|
||||
|
||||
impl VAABody {
|
||||
fn action_id(&self) -> u8 {
|
||||
match self {
|
||||
VAABody::UpdateGuardianSet(_) => 0x01,
|
||||
VAABody::Transfer(_) => 0x10,
|
||||
}
|
||||
}
|
||||
|
||||
fn deserialize(data: &Vec<u8>) -> Result<VAABody, Error> {
|
||||
let mut payload_data = Cursor::new(data);
|
||||
let action = payload_data.read_u8()?;
|
||||
|
||||
let payload = match action {
|
||||
0x01 => {
|
||||
VAABody::UpdateGuardianSet(BodyUpdateGuardianSet::deserialize(&mut payload_data)?)
|
||||
}
|
||||
0x10 => {
|
||||
VAABody::Transfer(BodyTransfer::deserialize(&mut payload_data)?)
|
||||
}
|
||||
_ => {
|
||||
return Err(Error::InvalidVAAAction);
|
||||
}
|
||||
};
|
||||
|
||||
Ok(payload)
|
||||
}
|
||||
|
||||
fn serialize(&self) -> Result<Vec<u8>, Error> {
|
||||
match self {
|
||||
VAABody::Transfer(b) => {
|
||||
b.serialize()
|
||||
}
|
||||
VAABody::UpdateGuardianSet(b) => {
|
||||
b.serialize()
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Copy, Clone, Debug, PartialEq)]
|
||||
pub struct BodyUpdateGuardianSet {
|
||||
pub new_index: u32,
|
||||
pub new_key: RawKey,
|
||||
}
|
||||
|
||||
#[derive(Copy, Clone, Debug, PartialEq)]
|
||||
pub struct BodyTransfer {
|
||||
pub ref_block: u64,
|
||||
pub source_chain: u8,
|
||||
pub source_address: ForeignAddress,
|
||||
pub target_chain: u8,
|
||||
pub target_address: ForeignAddress,
|
||||
pub asset: AssetMeta,
|
||||
pub amount: u64,
|
||||
}
|
||||
|
||||
impl BodyUpdateGuardianSet {
|
||||
fn deserialize(data: &mut Cursor<&Vec<u8>>) -> Result<BodyUpdateGuardianSet, Error> {
|
||||
let new_index = data.read_u32::<BigEndian>()?;
|
||||
let mut new_key_x: [u8; 32] = [0; 32];
|
||||
data.read(&mut new_key_x)?;
|
||||
let mut new_key_y: [u8; 32] = [0; 32];
|
||||
data.read(&mut new_key_y)?;
|
||||
|
||||
Ok(BodyUpdateGuardianSet {
|
||||
new_index,
|
||||
new_key: RawKey {
|
||||
x: new_key_x,
|
||||
y: new_key_y,
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
fn serialize(&self) -> Result<Vec<u8>, Error> {
|
||||
let mut v: Cursor<Vec<u8>> = Cursor::new(Vec::new());
|
||||
v.write_u32::<BigEndian>(self.new_index)?;
|
||||
v.write(&self.new_key.x)?;
|
||||
v.write(&self.new_key.y)?;
|
||||
|
||||
Ok(v.into_inner())
|
||||
}
|
||||
}
|
||||
|
||||
impl BodyTransfer {
|
||||
fn deserialize(data: &mut Cursor<&Vec<u8>>) -> Result<BodyTransfer, Error> {
|
||||
let ref_block = data.read_u64::<BigEndian>()?;
|
||||
let source_chain = data.read_u8()?;
|
||||
let mut source_address: ForeignAddress = ForeignAddress::default();
|
||||
data.read(&mut source_address)?;
|
||||
let target_chain = data.read_u8()?;
|
||||
let mut target_address: ForeignAddress = ForeignAddress::default();
|
||||
data.read(&mut target_address)?;
|
||||
let token_chain = data.read_u8()?;
|
||||
let mut token_address: ForeignAddress = ForeignAddress::default();
|
||||
data.read(&mut token_address)?;
|
||||
let amount = data.read_u64::<BigEndian>()?;
|
||||
|
||||
Ok(BodyTransfer {
|
||||
ref_block,
|
||||
source_chain,
|
||||
source_address,
|
||||
target_chain,
|
||||
target_address,
|
||||
asset: AssetMeta {
|
||||
address: target_address,
|
||||
chain: token_chain,
|
||||
},
|
||||
amount,
|
||||
})
|
||||
}
|
||||
|
||||
fn serialize(&self) -> Result<Vec<u8>, Error> {
|
||||
let mut v: Cursor<Vec<u8>> = Cursor::new(Vec::new());
|
||||
v.write_u8(self.source_chain)?;
|
||||
v.write_u8(self.target_chain)?;
|
||||
v.write(&self.target_address)?;
|
||||
v.write_u8(self.asset.chain)?;
|
||||
v.write(&self.asset.address)?;
|
||||
v.write_u64::<BigEndian>(self.amount)?;
|
||||
|
||||
Ok(v.into_inner())
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use std::io::Write;
|
||||
|
||||
use hex;
|
||||
|
||||
use crate::error::Error;
|
||||
use crate::state::AssetMeta;
|
||||
use crate::syscalls::RawKey;
|
||||
use crate::vaa::{BodyTransfer, BodyUpdateGuardianSet, VAA, VAABody};
|
||||
|
||||
#[test]
|
||||
fn serialize_deserialize_vaa_transfer() {
|
||||
let vaa = VAA {
|
||||
version: 8,
|
||||
guardian_set_index: 3,
|
||||
signature_sig: [7; 32],
|
||||
signature_addr: [9; 20],
|
||||
timestamp: 83,
|
||||
payload: Some(VAABody::Transfer(BodyTransfer {
|
||||
ref_block: 28,
|
||||
source_chain: 1,
|
||||
source_address: [9; 32],
|
||||
target_chain: 2,
|
||||
target_address: [1; 32],
|
||||
asset: AssetMeta {
|
||||
address: [2; 32],
|
||||
chain: 8,
|
||||
},
|
||||
amount: 4,
|
||||
})),
|
||||
};
|
||||
|
||||
let data = vaa.serialize().unwrap();
|
||||
let parsed_vaa = VAA::deserialize(data.as_slice()).unwrap();
|
||||
assert_eq!(vaa, parsed_vaa)
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn serialize_deserialize_vaa_guardian() {
|
||||
let vaa = VAA {
|
||||
version: 8,
|
||||
guardian_set_index: 3,
|
||||
signature_sig: [7; 32],
|
||||
signature_addr: [9; 20],
|
||||
timestamp: 83,
|
||||
payload: Some(VAABody::UpdateGuardianSet(BodyUpdateGuardianSet {
|
||||
new_index: 29,
|
||||
new_key: RawKey {
|
||||
x: [2; 32],
|
||||
y: [3; 32],
|
||||
},
|
||||
})),
|
||||
};
|
||||
|
||||
let data = vaa.serialize().unwrap();
|
||||
let parsed_vaa = VAA::deserialize(data.as_slice()).unwrap();
|
||||
assert_eq!(vaa, parsed_vaa)
|
||||
}
|
||||
}
|
|
@ -0,0 +1,171 @@
|
|||
|
||||
#!/usr/bin/env bash
|
||||
|
||||
cd "$(dirname "$0")"
|
||||
|
||||
usage() {
|
||||
cat <<EOF
|
||||
Usage: do.sh <action> <project> <action specific arguments>
|
||||
Supported actions:
|
||||
build
|
||||
build-lib
|
||||
clean
|
||||
clippy
|
||||
doc
|
||||
dump
|
||||
fmt
|
||||
test
|
||||
update
|
||||
Supported projects:
|
||||
all
|
||||
any directory containing a Cargo.toml file
|
||||
EOF
|
||||
}
|
||||
|
||||
sdkParentDir=bin
|
||||
sdkDir="$sdkParentDir"/bpf-sdk
|
||||
profile=bpfel-unknown-unknown/release
|
||||
|
||||
perform_action() {
|
||||
set -e
|
||||
projectDir="$PWD"/$2
|
||||
targetDir="$projectDir"/target
|
||||
case "$1" in
|
||||
build)
|
||||
if [[ -f "$projectDir"/Xargo.toml ]]; then
|
||||
"$sdkDir"/rust/build.sh "$projectDir"
|
||||
|
||||
so_path="$targetDir/$profile"
|
||||
so_name="spl_${2//\-/_}"
|
||||
cp "$so_path/${so_name}.so" "$so_path/${so_name}_debug.so"
|
||||
"$sdkDir"/dependencies/llvm-native/bin/llvm-objcopy --strip-all "$so_path/${so_name}.so" "$so_path/$so_name.so"
|
||||
else
|
||||
echo "$projectDir does not contain a program, skipping"
|
||||
fi
|
||||
;;
|
||||
build-lib)
|
||||
(
|
||||
cd "$projectDir"
|
||||
echo "build $projectDir"
|
||||
export RUSTFLAGS="${@:3}"
|
||||
cargo build
|
||||
)
|
||||
;;
|
||||
clean)
|
||||
"$sdkDir"/rust/clean.sh "$projectDir"
|
||||
;;
|
||||
clippy)
|
||||
(
|
||||
cd "$projectDir"
|
||||
echo "clippy $projectDir"
|
||||
cargo +nightly clippy --features=program ${@:3}
|
||||
)
|
||||
;;
|
||||
doc)
|
||||
(
|
||||
cd "$projectDir"
|
||||
echo "generating docs $projectDir"
|
||||
cargo doc ${@:3}
|
||||
)
|
||||
;;
|
||||
dump)
|
||||
# Dump depends on tools that are not installed by default and must be installed manually
|
||||
# - greadelf
|
||||
# - rustfilt
|
||||
(
|
||||
pwd
|
||||
"$0" build "$2"
|
||||
|
||||
so_path="$targetDir/$profile"
|
||||
so_name="spl_${2//\-/_}"
|
||||
so="$so_path/${so_name}_debug.so"
|
||||
dump="$so_path/${so_name}_dump"
|
||||
|
||||
echo $so_path
|
||||
echo $so_name
|
||||
echo $so
|
||||
echo $dump
|
||||
|
||||
if [ -f "$so" ]; then
|
||||
ls \
|
||||
-la \
|
||||
"$so" \
|
||||
>"${dump}_mangled.txt"
|
||||
greadelf \
|
||||
-aW \
|
||||
"$so" \
|
||||
>>"${dump}_mangled.txt"
|
||||
"$sdkDir/dependencies/llvm-native/bin/llvm-objdump" \
|
||||
-print-imm-hex \
|
||||
--source \
|
||||
--disassemble \
|
||||
"$so" \
|
||||
>>"${dump}_mangled.txt"
|
||||
sed \
|
||||
s/://g \
|
||||
<"${dump}_mangled.txt" |
|
||||
rustfilt \
|
||||
>"${dump}.txt"
|
||||
else
|
||||
echo "Warning: No dump created, cannot find: $so"
|
||||
fi
|
||||
)
|
||||
;;
|
||||
fmt)
|
||||
(
|
||||
cd "$projectDir"
|
||||
echo "formatting $projectDir"
|
||||
cargo fmt ${@:3}
|
||||
)
|
||||
;;
|
||||
help)
|
||||
usage
|
||||
exit
|
||||
;;
|
||||
test)
|
||||
(
|
||||
cd "$projectDir"
|
||||
echo "test $projectDir"
|
||||
cargo test --features=program ${@:3}
|
||||
)
|
||||
;;
|
||||
update)
|
||||
mkdir -p $sdkParentDir
|
||||
./bpf-sdk-install.sh $sdkParentDir
|
||||
./do.sh clean all
|
||||
;;
|
||||
*)
|
||||
echo "Error: Unknown command"
|
||||
usage
|
||||
exit
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
set -e
|
||||
if [[ $1 == "update" ]]; then
|
||||
perform_action "$1"
|
||||
exit
|
||||
else
|
||||
if [[ "$#" -lt 2 ]]; then
|
||||
usage
|
||||
exit
|
||||
fi
|
||||
if [[ ! -d "$sdkDir" ]]; then
|
||||
./do.sh update
|
||||
fi
|
||||
fi
|
||||
|
||||
if [[ $2 == "all" ]]; then
|
||||
# Perform operation on all projects
|
||||
for project in */; do
|
||||
if [[ -f "$project"Cargo.toml ]]; then
|
||||
perform_action "$1" "${project%/}" ${@:3}
|
||||
else
|
||||
continue
|
||||
fi
|
||||
done
|
||||
else
|
||||
# Perform operation on requested project
|
||||
perform_action "$1" "$2" "${@:3}"
|
||||
fi
|
Loading…
Reference in New Issue