From 7ddf910faa08a50beda32d6858ad15ac304c89eb Mon Sep 17 00:00:00 2001 From: Hendrik Hofstadt Date: Mon, 3 Aug 2020 14:55:58 +0200 Subject: [PATCH] Implement initial solana program (#3) * add rust program * update rust program * first VAA actions * implement full transfer * remove token copy * restructure and copy --- .gitignore | 2 + docs/solana_program.md | 60 +- solana/bpf-sdk-install.sh | 22 + solana/bridge/Cargo.lock | 2283 ++++++++++++++++++++++++++++++ solana/bridge/Cargo.toml | 36 + solana/bridge/Dockerfile | 4 + solana/bridge/Xargo.toml | 2 + solana/bridge/src/entrypoint.rs | 24 + solana/bridge/src/error.rs | 153 ++ solana/bridge/src/instruction.rs | 175 +++ solana/bridge/src/lib.rs | 12 + solana/bridge/src/processor.rs | 702 +++++++++ solana/bridge/src/state.rs | 528 +++++++ solana/bridge/src/syscalls.rs | 41 + solana/bridge/src/vaa.rs | 299 ++++ solana/do.sh | 171 +++ 16 files changed, 4491 insertions(+), 23 deletions(-) create mode 100755 solana/bpf-sdk-install.sh create mode 100644 solana/bridge/Cargo.lock create mode 100644 solana/bridge/Cargo.toml create mode 100644 solana/bridge/Dockerfile create mode 100644 solana/bridge/Xargo.toml create mode 100644 solana/bridge/src/entrypoint.rs create mode 100644 solana/bridge/src/error.rs create mode 100644 solana/bridge/src/instruction.rs create mode 100644 solana/bridge/src/lib.rs create mode 100644 solana/bridge/src/processor.rs create mode 100644 solana/bridge/src/state.rs create mode 100644 solana/bridge/src/syscalls.rs create mode 100644 solana/bridge/src/vaa.rs create mode 100755 solana/do.sh diff --git a/.gitignore b/.gitignore index c3594af5..2edfc835 100644 --- a/.gitignore +++ b/.gitignore @@ -3,3 +3,5 @@ node_modules .idea .arcconfig *.iml +target +bin diff --git a/docs/solana_program.md b/docs/solana_program.md index 5b48e252..3abbc8d2 100644 --- a/docs/solana_program.md +++ b/docs/solana_program.md @@ -10,8 +10,10 @@ Initializes a new Bridge at `bridge`. | Index | Name | Type | signer | writeable | empty | derived | | ----- | ------ | ------------ | ------ | --------- | ----- | ------- | -| 0 | owner | Account | ✅️ | | | | | 0 | bridge | BridgeConfig | | | ✅️ | ✅️ | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | guardian_set | GuardianSet | | ✅ | ✅ | ✅ | +| 3 | sender | Account | ✅ | | | | #### TransferOut @@ -24,9 +26,10 @@ Parameters: | Index | Name | Type | signer | writeable | empty | derived | | ----- | -------- | ------------------- | ------ | --------- | ----- | ------- | | 0 | sender | TokenAccount | | ✅ | | | -| 1 | bridge | BridgeConfig | | | | | -| 2 | proposal | TransferOutProposal | | ✅ | ✅ | ✅ | -| 3 | token | WrappedAsset | | ✅ | | ✅ | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | bridge | BridgeConfig | | | | | +| 3 | proposal | TransferOutProposal | | ✅ | ✅ | ✅ | +| 4 | token | WrappedAsset | | ✅ | | ✅ | #### TransferOutNative @@ -41,7 +44,8 @@ The transfer proposal will be tracked at a new account `proposal` where a VAA wi | 1 | bridge | BridgeConfig | | | | | | 2 | proposal | TransferOutProposal | | ✅ | ✅ | ✅ | | 3 | token | Mint | | ✅ | | | -| 4 | custody_account | Mint | | ✅ | opt | ✅ | +| 4 | custody_account | TokenAccount | | ✅ | opt | ✅ | +| 5-n | sender_owner | Account | ✅ | | | | #### EvictTransferOut @@ -50,8 +54,10 @@ Deletes a `proposal` after the `VAA_EXPIRATION_TIME` to free up space on chain. | Index | Name | Type | signer | writeable | empty | derived | | ----- | -------- | ------------------- | ------ | --------- | ----- | ------- | | 0 | guardian | Account | ✅ | | | | -| 1 | bridge | BridgeConfig | | | | | -| 2 | proposal | TransferOutProposal | | ✅ | | ✅ | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | bridge | BridgeConfig | | | | | +| 3 | proposal | TransferOutProposal | | ✅ | | ✅ | +| 4-n | sender_owner | Account | ✅ | | | | #### EvictExecutedVAA @@ -60,8 +66,9 @@ Deletes a `ExecutedVAA` after the `VAA_EXPIRATION_TIME` to free up space on chai | Index | Name | Type | signer | writeable | empty | derived | | ----- | -------- | ------------------- | ------ | --------- | ----- | ------- | | 0 | guardian | Account | ✅ | | | | -| 1 | bridge | BridgeConfig | | | | | -| 2 | proposal | ExecutedVAA | | ✅ | | ✅ | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | bridge | BridgeConfig | | | | | +| 3 | proposal | ExecutedVAA | | ✅ | | ✅ | #### PostVAA @@ -74,38 +81,45 @@ The required accounts depend on the `action` of the VAA: | Index | Name | Type | signer | writeable | empty | derived | | ----- | ------------ | ------------------- | ------ | --------- | ----- | ------- | | 0 | bridge | BridgeConfig | | ✅ | | | -| 1 | guardian_set | GuardianSet | | ✅ | ✅ | ✅ | -| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | guardian_set_old | GuardianSet | | ✅ | | ✅ | +| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | +| 4 | guardian_set | GuardianSet | | ✅ | ✅ | ✅ | ##### Transfer: Ethereum (native) -> Solana (wrapped) | Index | Name | Type | signer | writeable | empty | derived | | ----- | ------------ | ------------ | ------ | --------- | ----- | ------- | | 0 | bridge | BridgeConfig | | | | | -| 1 | guardian_set | GuardianSet | | | | | -| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | -| 3 | token | WrappedAsset | | | opt | ✅ | -| 4 | destination | TokenAccount | | ✅ | opt | | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | guardian_set | GuardianSet | | | | | +| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | +| 4 | token | WrappedAsset | | | opt | ✅ | +| 5 | destination | TokenAccount | | ✅ | opt | | +| 6 | sender | Account | ✅ | | | | ##### Transfer: Ethereum (wrapped) -> Solana (native) | Index | Name | Type | signer | writeable | empty | derived | | ----- | ------------ | ------------ | ------ | --------- | ----- | ------- | | 0 | bridge | BridgeConfig | | | | | -| 1 | guardian_set | GuardianSet | | | | | -| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | -| 3 | token | Mint | | | | ✅ | -| 4 | custody_src | TokenAccount | | ✅ | | ✅ | -| 5 | destination | TokenAccount | | ✅ | opt | | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | guardian_set | GuardianSet | | | | | +| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | +| 4 | token | Mint | | | | ✅ | +| 6 | destination | TokenAccount | | ✅ | opt | | +| 5 | custody_src | TokenAccount | | ✅ | | ✅ | ##### Transfer: Solana (any) -> Ethereum (any) | Index | Name | Type | signer | writeable | empty | derived | | ----- | ------------ | ------------------- | ------ | --------- | ----- | ------- | | 0 | bridge | BridgeConfig | | | | | -| 1 | guardian_set | GuardianSet | | | | | -| 2 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | -| 3 | out_proposal | TransferOutProposal | | ✅ | | ✅ | +| 1 | clock | Sysvar | | | ️ | ✅ | +| 2 | guardian_set | GuardianSet | | | | | +| 3 | claim | ExecutedVAA | | ✅ | ✅ | ✅ | +| 4 | out_proposal | TransferOutProposal | | ✅ | | ✅ | +| 5 | sender | Account | ✅ | | | | ## Accounts diff --git a/solana/bpf-sdk-install.sh b/solana/bpf-sdk-install.sh new file mode 100755 index 00000000..20a667cb --- /dev/null +++ b/solana/bpf-sdk-install.sh @@ -0,0 +1,22 @@ +#!/usr/bin/env bash +set -e + +installDir=$1 +channel=beta + +if [[ -n $2 ]]; then + channel=$2 +fi + +echo "Installing $channel BPF SDK into $installDir" + +set -x +cd "$installDir/" +curl -L --retry 5 --retry-delay 2 -o bpf-sdk.tar.bz2 \ + http://solana-sdk.s3.amazonaws.com/"$channel"/bpf-sdk.tar.bz2 +rm -rf bpf-sdk +mkdir -p bpf-sdk +tar jxf bpf-sdk.tar.bz2 +rm -f bpf-sdk.tar.bz2 + +cat bpf-sdk/version.txt diff --git a/solana/bridge/Cargo.lock b/solana/bridge/Cargo.lock new file mode 100644 index 00000000..eb01b3b6 --- /dev/null +++ b/solana/bridge/Cargo.lock @@ -0,0 +1,2283 @@ +# This file is automatically @generated by Cargo. +# It is not intended for manual editing. +[[package]] +name = "addr2line" +version = "0.13.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1b6a2d3371669ab3ca9797670853d61402b03d0b4b9ebf33d677dfa720203072" +dependencies = [ + "gimli", +] + +[[package]] +name = "adler" +version = "0.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ee2a4ec343196209d6594e19543ae87a39f96d5534d7174822a3ad825dd6ed7e" + +[[package]] +name = "aho-corasick" +version = "0.7.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "043164d8ba5c4c3035fec9bbee8647c0261d788f3474306f93bb65901cae0e86" +dependencies = [ + "memchr", +] + +[[package]] +name = "ansi_term" +version = "0.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b" +dependencies = [ + "winapi 0.3.9", +] + +[[package]] +name = "arrayref" +version = "0.3.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544" + +[[package]] +name = "assert_matches" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7deb0a829ca7bcfaf5da70b073a8d128619259a7be8216a355e23f00763059e5" + +[[package]] +name = "atty" +version = "0.2.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8" +dependencies = [ + "hermit-abi", + "libc", + "winapi 0.3.9", +] + +[[package]] +name = "autocfg" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f8aac770f1885fd7e387acedd76065302551364496e46b3dd00860b2f8359b9d" + +[[package]] +name = "backtrace" +version = "0.3.50" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "46254cf2fdcdf1badb5934448c1bcbe046a56537b3987d96c51a7afc5d03f293" +dependencies = [ + "addr2line", + "cfg-if", + "libc", + "miniz_oxide", + "object", + "rustc-demangle", + "serde", +] + +[[package]] +name = "base64" +version = "0.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff" + +[[package]] +name = "bincode" +version = "1.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f30d3a39baa26f9651f17b375061f3233dde33424a8b72b0dbe93a68a0bc896d" +dependencies = [ + "byteorder", + "serde", +] + +[[package]] +name = "bitflags" +version = "1.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693" + +[[package]] +name = "block-buffer" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c0940dc441f31689269e10ac70eb1002a3a1d3ad1390e030043662eb7fe4688b" +dependencies = [ + "block-padding 0.1.5", + "byte-tools", + "byteorder", + "generic-array 0.12.3", +] + +[[package]] +name = "block-buffer" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4152116fd6e9dadb291ae18fc1ec3575ed6d84c29642d97890f4b4a3417297e4" +dependencies = [ + "block-padding 0.2.0", + "generic-array 0.14.3", +] + +[[package]] +name = "block-padding" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fa79dedbb091f449f1f39e53edf88d5dbe95f895dae6135a8d7b881fb5af73f5" +dependencies = [ + "byte-tools", +] + +[[package]] +name = "block-padding" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c98bfd7c112b6399fef97cc0614af1cd375b27a112e552ce60f94c1b5f13cb74" + +[[package]] +name = "bs58" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "476e9cd489f9e121e02ffa6014a8ef220ecb15c05ed23fc34cca13925dc283fb" + +[[package]] +name = "bumpalo" +version = "3.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820" + +[[package]] +name = "bv" +version = "0.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8834bb1d8ee5dc048ee3124f2c7c1afcc6bc9aed03f11e9dfd8c69470a5db340" +dependencies = [ + "feature-probe", + "serde", +] + +[[package]] +name = "byte-tools" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3b5ca7a04898ad4bcd41c90c5285445ff5b791899bb1b0abdd2a2aa791211d7" + +[[package]] +name = "byteorder" +version = "1.3.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "08c48aae112d48ed9f069b33538ea9e3e90aa263cfa3d1c24309612b1f7472de" + +[[package]] +name = "bytes" +version = "0.4.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "206fdffcfa2df7cbe15601ef46c813fce0965eb3286db6b56c583b814b51c81c" +dependencies = [ + "byteorder", + "either", + "iovec", +] + +[[package]] +name = "bytes" +version = "0.5.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38" + +[[package]] +name = "cbindgen" +version = "0.14.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "104ca409bbff8293739438c71820a2606111b5f8f81835536dc673dfd807369e" +dependencies = [ + "clap", + "heck", + "log", + "proc-macro2 1.0.19", + "quote 1.0.7", + "serde", + "serde_json", + "syn 1.0.36", + "tempfile", + "toml", +] + +[[package]] +name = "cc" +version = "1.0.49" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e450b8da92aa6f274e7c6437692f9f2ce6d701fb73bacfcf87897b3f89a4c20e" +dependencies = [ + "jobserver", + "num_cpus", +] + +[[package]] +name = "cfg-if" +version = "0.1.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822" + +[[package]] +name = "chrono" +version = "0.4.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c74d84029116787153e02106bf53e66828452a4b325cc8652b788b5967c0a0b6" +dependencies = [ + "num-integer", + "num-traits", + "time", +] + +[[package]] +name = "clap" +version = "2.33.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bdfa80d47f954d53a35a64987ca1422f495b8d6483c0fe9f7117b36c2a792129" +dependencies = [ + "ansi_term", + "atty", + "bitflags", + "strsim", + "textwrap", + "unicode-width", + "vec_map", +] + +[[package]] +name = "cloudabi" +version = "0.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ddfc5b9aa5d4507acaf872de71051dfd0e309860e88966e1051e462a077aac4f" +dependencies = [ + "bitflags", +] + +[[package]] +name = "crossbeam-deque" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9f02af974daeee82218205558e51ec8768b48cf524bd01d550abe5573a608285" +dependencies = [ + "crossbeam-epoch", + "crossbeam-utils", + "maybe-uninit", +] + +[[package]] +name = "crossbeam-epoch" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "058ed274caafc1f60c4997b5fc07bf7dc7cca454af7c6e81edffe5f33f70dace" +dependencies = [ + "autocfg", + "cfg-if", + "crossbeam-utils", + "lazy_static", + "maybe-uninit", + "memoffset", + "scopeguard", +] + +[[package]] +name = "crossbeam-queue" +version = "0.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "774ba60a54c213d409d5353bda12d49cd68d14e45036a285234c8d6f91f92570" +dependencies = [ + "cfg-if", + "crossbeam-utils", + "maybe-uninit", +] + +[[package]] +name = "crossbeam-utils" +version = "0.7.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c3c7c73a2d1e9fc0886a08b93e98eb643461230d5f1925e4036204d5f2e261a8" +dependencies = [ + "autocfg", + "cfg-if", + "lazy_static", +] + +[[package]] +name = "crypto-mac" +version = "0.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4434400df11d95d556bac068ddfedd482915eb18fe8bea89bc80b6e4b1c179e5" +dependencies = [ + "generic-array 0.12.3", + "subtle 1.0.0", +] + +[[package]] +name = "curve25519-dalek" +version = "2.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5d85653f070353a16313d0046f173f70d1aadd5b42600a14de626f0dfb3473a5" +dependencies = [ + "byteorder", + "digest 0.8.1", + "rand_core", + "subtle 2.2.3", + "zeroize", +] + +[[package]] +name = "digest" +version = "0.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f3d0c8c8752312f9713efd397ff63acb9f85585afbf179282e720e7704954dd5" +dependencies = [ + "generic-array 0.12.3", +] + +[[package]] +name = "digest" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d3dd60d1080a57a05ab032377049e0591415d2b31afd7028356dbf3cc6dcb066" +dependencies = [ + "generic-array 0.14.3", +] + +[[package]] +name = "dtoa" +version = "0.4.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "134951f4028bdadb9b84baf4232681efbf277da25144b9b0ad65df75946c422b" + +[[package]] +name = "ed25519" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bf038a7b6fd7ef78ad3348b63f3a17550877b0e28f8d68bcc94894d1412158bc" +dependencies = [ + "serde", + "signature", +] + +[[package]] +name = "ed25519-dalek" +version = "1.0.0-pre.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "21a8a37f4e8b35af971e6db5e3897e7a6344caa3f92f6544f88125a1f5f0035a" +dependencies = [ + "curve25519-dalek", + "ed25519", + "rand", + "serde", + "sha2", + "zeroize", +] + +[[package]] +name = "either" +version = "1.5.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bb1f6b1ce1c140482ea30ddd3335fc0024ac7ee112895426e0a629a6c20adfe3" + +[[package]] +name = "encoding_rs" +version = "0.8.23" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e8ac63f94732332f44fe654443c46f6375d1939684c17b0afb6cb56b0456e171" +dependencies = [ + "cfg-if", +] + +[[package]] +name = "env_logger" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "44533bbbb3bb3c1fa17d9f2e4e38bbbaf8396ba82193c4cb1b6445d711445d36" +dependencies = [ + "atty", + "humantime", + "log", + "regex", + "termcolor", +] + +[[package]] +name = "failure" +version = "0.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d32e9bd16cc02eae7db7ef620b392808b89f6a5e16bb3497d159c6b92a0f4f86" +dependencies = [ + "backtrace", + "failure_derive", +] + +[[package]] +name = "failure_derive" +version = "0.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "aa4da3c766cd7a0db8242e326e9e4e081edd567072893ed320008189715366a4" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", + "synstructure", +] + +[[package]] +name = "fake-simd" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e88a8acf291dafb59c2d96e8f59828f3838bb1a70398823ade51a84de6a6deed" + +[[package]] +name = "feature-probe" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "835a3dc7d1ec9e75e2b5fb4ba75396837112d2060b03f7d43bc1897c7f7211da" + +[[package]] +name = "fnv" +version = "1.0.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1" + +[[package]] +name = "fuchsia-zircon" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82" +dependencies = [ + "bitflags", + "fuchsia-zircon-sys", +] + +[[package]] +name = "fuchsia-zircon-sys" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7" + +[[package]] +name = "futures" +version = "0.1.29" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1b980f2816d6ee8673b6517b52cb0e808a180efc92e5c19d02cdda79066703ef" + +[[package]] +name = "futures-channel" +version = "0.3.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f366ad74c28cca6ba456d95e6422883cfb4b252a83bed929c83abfdbbf2967d5" +dependencies = [ + "futures-core", +] + +[[package]] +name = "futures-core" +version = "0.3.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "59f5fff90fd5d971f936ad674802482ba441b6f09ba5e15fd8b39145582ca399" + +[[package]] +name = "futures-io" +version = "0.3.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "de27142b013a8e869c14957e6d2edeef89e97c289e69d042ee3a49acd8b51789" + +[[package]] +name = "futures-macro" +version = "0.3.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d0b5a30a4328ab5473878237c447333c093297bded83a4983d10f4deea240d39" +dependencies = [ + "proc-macro-hack", + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", +] + +[[package]] +name = "futures-sink" +version = "0.3.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3f2032893cb734c7a05d85ce0cc8b8c4075278e93b24b66f9de99d6eb0fa8acc" + +[[package]] +name = "futures-task" +version = "0.3.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bdb66b5f09e22019b1ab0830f7785bcea8e7a42148683f99214f73f8ec21a626" +dependencies = [ + "once_cell", +] + +[[package]] +name = "futures-util" +version = "0.3.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8764574ff08b701a084482c3c7031349104b07ac897393010494beaa18ce32c6" +dependencies = [ + "futures-core", + "futures-io", + "futures-macro", + "futures-task", + "memchr", + "pin-project", + "pin-utils", + "proc-macro-hack", + "proc-macro-nested", + "slab", +] + +[[package]] +name = "generic-array" +version = "0.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c68f0274ae0e023facc3c97b2e00f076be70e254bc851d972503b328db79b2ec" +dependencies = [ + "typenum", +] + +[[package]] +name = "generic-array" +version = "0.14.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "60fb4bb6bba52f78a471264d9a3b7d026cc0af47b22cd2cffbc0b787ca003e63" +dependencies = [ + "serde", + "typenum", + "version_check", +] + +[[package]] +name = "getrandom" +version = "0.1.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7abc8dd8451921606d809ba32e95b6111925cd2906060d2dcc29c070220503eb" +dependencies = [ + "cfg-if", + "libc", + "wasi", +] + +[[package]] +name = "gimli" +version = "0.22.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "aaf91faf136cb47367fa430cd46e37a788775e7fa104f8b4bcb3861dc389b724" + +[[package]] +name = "h2" +version = "0.2.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "993f9e0baeed60001cf565546b0d3dbe6a6ad23f2bd31644a133c641eccf6d53" +dependencies = [ + "bytes 0.5.6", + "fnv", + "futures-core", + "futures-sink", + "futures-util", + "http", + "indexmap", + "slab", + "tokio 0.2.22", + "tokio-util", + "tracing", +] + +[[package]] +name = "hashbrown" +version = "0.8.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "34f595585f103464d8d2f6e9864682d74c1601fed5e07d62b1c9058dba8246fb" +dependencies = [ + "autocfg", +] + +[[package]] +name = "heck" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "20564e78d53d2bb135c343b3f47714a56af2061f1c928fdb541dc7b9fdd94205" +dependencies = [ + "unicode-segmentation", +] + +[[package]] +name = "hermit-abi" +version = "0.1.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3deed196b6e7f9e44a2ae8d94225d80302d81208b1bb673fd21fe634645c85a9" +dependencies = [ + "libc", +] + +[[package]] +name = "hex" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "644f9158b2f133fd50f5fb3242878846d9eb792e445c893805ff0e3824006e35" + +[[package]] +name = "hmac" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5dcb5e64cda4c23119ab41ba960d1e170a774c8e4b9d9e6a9bc18aabf5e59695" +dependencies = [ + "crypto-mac", + "digest 0.8.1", +] + +[[package]] +name = "http" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9" +dependencies = [ + "bytes 0.5.6", + "fnv", + "itoa", +] + +[[package]] +name = "http-body" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b" +dependencies = [ + "bytes 0.5.6", + "http", +] + +[[package]] +name = "httparse" +version = "1.3.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9" + +[[package]] +name = "humantime" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "df004cfca50ef23c36850aaaa59ad52cc70d0e90243c3c7737a4dd32dc7a3c4f" +dependencies = [ + "quick-error", +] + +[[package]] +name = "hyper" +version = "0.13.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3e68a8dd9716185d9e64ea473ea6ef63529252e3e27623295a0378a19665d5eb" +dependencies = [ + "bytes 0.5.6", + "futures-channel", + "futures-core", + "futures-util", + "h2", + "http", + "http-body", + "httparse", + "itoa", + "pin-project", + "socket2", + "time", + "tokio 0.2.22", + "tower-service", + "tracing", + "want", +] + +[[package]] +name = "hyper-rustls" +version = "0.21.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "37743cc83e8ee85eacfce90f2f4102030d9ff0a95244098d781e9bee4a90abb6" +dependencies = [ + "bytes 0.5.6", + "futures-util", + "hyper", + "log", + "rustls", + "tokio 0.2.22", + "tokio-rustls", + "webpki", +] + +[[package]] +name = "idna" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9" +dependencies = [ + "matches", + "unicode-bidi", + "unicode-normalization", +] + +[[package]] +name = "indexmap" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5b88cd59ee5f71fea89a62248fc8f387d44400cefe05ef548466d61ced9029a7" +dependencies = [ + "autocfg", + "hashbrown", +] + +[[package]] +name = "iovec" +version = "0.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e" +dependencies = [ + "libc", +] + +[[package]] +name = "ipnet" +version = "2.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "47be2f14c678be2fdcab04ab1171db51b2762ce6f0a8ee87c8dd4a04ed216135" + +[[package]] +name = "itertools" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "284f18f85651fe11e8a991b2adb42cb078325c996ed026d994719efcfca1d54b" +dependencies = [ + "either", +] + +[[package]] +name = "itoa" +version = "0.4.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6" + +[[package]] +name = "jobserver" +version = "0.1.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c71313ebb9439f74b00d9d2dcec36440beaf57a6aa0623068441dd7cd81a7f2" +dependencies = [ + "libc", +] + +[[package]] +name = "js-sys" +version = "0.3.44" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "85a7e2c92a4804dd459b86c339278d0fe87cf93757fae222c3fa3ae75458bc73" +dependencies = [ + "wasm-bindgen", +] + +[[package]] +name = "keccak" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "67c21572b4949434e4fc1e1978b99c5f77064153c59d998bf13ecd96fb5ecba7" + +[[package]] +name = "kernel32-sys" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d" +dependencies = [ + "winapi 0.2.8", + "winapi-build", +] + +[[package]] +name = "lazy_static" +version = "1.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646" +dependencies = [ + "spin", +] + +[[package]] +name = "libc" +version = "0.2.74" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a2f02823cf78b754822df5f7f268fb59822e7296276d3e069d8e8cb26a14bd10" + +[[package]] +name = "lock_api" +version = "0.3.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c4da24a77a3d8a6d4862d95f72e6fdb9c09a643ecdb402d754004a557f2bec75" +dependencies = [ + "scopeguard", +] + +[[package]] +name = "log" +version = "0.4.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b" +dependencies = [ + "cfg-if", +] + +[[package]] +name = "matches" +version = "0.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08" + +[[package]] +name = "maybe-uninit" +version = "2.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "60302e4db3a61da70c0cb7991976248362f30319e88850c487b9b95bbf059e00" + +[[package]] +name = "memchr" +version = "2.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400" + +[[package]] +name = "memmap" +version = "0.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6585fd95e7bb50d6cc31e20d4cf9afb4e2ba16c5846fc76793f11218da9c475b" +dependencies = [ + "libc", + "winapi 0.3.9", +] + +[[package]] +name = "memoffset" +version = "0.5.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c198b026e1bbf08a937e94c6c60f9ec4a2267f5b0d2eec9c1b21b061ce2be55f" +dependencies = [ + "autocfg", +] + +[[package]] +name = "mime" +version = "0.3.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2a60c7ce501c71e03a9c9c0d35b861413ae925bd979cc7a4e30d060069aaac8d" + +[[package]] +name = "mime_guess" +version = "2.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2684d4c2e97d99848d30b324b00c8fcc7e5c897b7cbb5819b09e7c90e8baf212" +dependencies = [ + "mime", + "unicase", +] + +[[package]] +name = "miniz_oxide" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "be0f75932c1f6cfae3c04000e40114adf955636e19040f9c0a2c380702aa1c7f" +dependencies = [ + "adler", +] + +[[package]] +name = "mio" +version = "0.6.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430" +dependencies = [ + "cfg-if", + "fuchsia-zircon", + "fuchsia-zircon-sys", + "iovec", + "kernel32-sys", + "libc", + "log", + "miow", + "net2", + "slab", + "winapi 0.2.8", +] + +[[package]] +name = "mio-uds" +version = "0.6.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "afcb699eb26d4332647cc848492bbc15eafb26f08d0304550d5aa1f612e066f0" +dependencies = [ + "iovec", + "libc", + "mio", +] + +[[package]] +name = "miow" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919" +dependencies = [ + "kernel32-sys", + "net2", + "winapi 0.2.8", + "ws2_32-sys", +] + +[[package]] +name = "net2" +version = "0.2.34" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2ba7c918ac76704fb42afcbbb43891e72731f3dcca3bef2a19786297baf14af7" +dependencies = [ + "cfg-if", + "libc", + "winapi 0.3.9", +] + +[[package]] +name = "num-derive" +version = "0.2.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eafd0b45c5537c3ba526f79d3e75120036502bebacbb3f3220914067ce39dbf2" +dependencies = [ + "proc-macro2 0.4.30", + "quote 0.6.13", + "syn 0.15.44", +] + +[[package]] +name = "num-derive" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e0396233fb2d5b0ae3f05ff6aba9a09185f7f6e70f87fb01147d545f85364665" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", +] + +[[package]] +name = "num-integer" +version = "0.1.43" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b" +dependencies = [ + "autocfg", + "num-traits", +] + +[[package]] +name = "num-traits" +version = "0.2.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611" +dependencies = [ + "autocfg", +] + +[[package]] +name = "num_cpus" +version = "1.13.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "05499f3756671c15885fee9034446956fff3f243d6077b91e5767df161f766b3" +dependencies = [ + "hermit-abi", + "libc", +] + +[[package]] +name = "object" +version = "0.20.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ab52be62400ca80aa00285d25253d7f7c437b7375c4de678f5405d3afe82ca5" + +[[package]] +name = "once_cell" +version = "1.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b631f7e854af39a1739f401cf34a8a013dfe09eac4fa4dba91e9768bd28168d" + +[[package]] +name = "opaque-debug" +version = "0.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2839e79665f131bdb5782e51f2c6c9599c133c6098982a54c794358bf432529c" + +[[package]] +name = "opaque-debug" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "624a8340c38c1b80fd549087862da4ba43e08858af025b236e509b6649fc13d5" + +[[package]] +name = "parking_lot" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f842b1982eb6c2fe34036a4fbfb06dd185a3f5c8edfaacdf7d1ea10b07de6252" +dependencies = [ + "lock_api", + "parking_lot_core", + "rustc_version", +] + +[[package]] +name = "parking_lot_core" +version = "0.6.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b876b1b9e7ac6e1a74a6da34d25c42e17e8862aa409cbbbdcfc8d86c6f3bc62b" +dependencies = [ + "cfg-if", + "cloudabi", + "libc", + "redox_syscall", + "rustc_version", + "smallvec", + "winapi 0.3.9", +] + +[[package]] +name = "pbkdf2" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "006c038a43a45995a9670da19e67600114740e8511d4333bf97a56e66a7542d9" +dependencies = [ + "byteorder", + "crypto-mac", +] + +[[package]] +name = "percent-encoding" +version = "2.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e" + +[[package]] +name = "pin-project" +version = "0.4.23" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ca4433fff2ae79342e497d9f8ee990d174071408f28f726d6d83af93e58e48aa" +dependencies = [ + "pin-project-internal", +] + +[[package]] +name = "pin-project-internal" +version = "0.4.23" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2c0e815c3ee9a031fdf5af21c10aa17c573c9c6a566328d99e3936c34e36461f" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", +] + +[[package]] +name = "pin-project-lite" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "282adbf10f2698a7a77f8e983a74b2d18176c19a7fd32a45446139ae7b02b715" + +[[package]] +name = "pin-utils" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184" + +[[package]] +name = "ppv-lite86" +version = "0.2.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "237a5ed80e274dbc66f86bd59c1e25edc039660be53194b5fe0a482e0f2612ea" + +[[package]] +name = "proc-macro-hack" +version = "0.5.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598" + +[[package]] +name = "proc-macro-nested" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a" + +[[package]] +name = "proc-macro2" +version = "0.4.30" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cf3d2011ab5c909338f7887f4fc896d35932e29146c12c8d01da6b22a80ba759" +dependencies = [ + "unicode-xid 0.1.0", +] + +[[package]] +name = "proc-macro2" +version = "1.0.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "04f5f085b5d71e2188cb8271e5da0161ad52c3f227a661a3c135fdf28e258b12" +dependencies = [ + "unicode-xid 0.2.1", +] + +[[package]] +name = "quick-error" +version = "1.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a1d01941d82fa2ab50be1e79e6714289dd7cde78eba4c074bc5a4374f650dfe0" + +[[package]] +name = "quote" +version = "0.6.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6ce23b6b870e8f94f81fb0a363d65d86675884b34a09043c81e5562f11c1f8e1" +dependencies = [ + "proc-macro2 0.4.30", +] + +[[package]] +name = "quote" +version = "1.0.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37" +dependencies = [ + "proc-macro2 1.0.19", +] + +[[package]] +name = "rand" +version = "0.7.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03" +dependencies = [ + "getrandom", + "libc", + "rand_chacha", + "rand_core", + "rand_hc", +] + +[[package]] +name = "rand_chacha" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402" +dependencies = [ + "ppv-lite86", + "rand_core", +] + +[[package]] +name = "rand_core" +version = "0.5.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19" +dependencies = [ + "getrandom", +] + +[[package]] +name = "rand_hc" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c" +dependencies = [ + "rand_core", +] + +[[package]] +name = "redox_syscall" +version = "0.1.57" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce" + +[[package]] +name = "regex" +version = "1.3.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9c3780fcf44b193bc4d09f36d2a3c87b251da4a046c87795a0d35f4f927ad8e6" +dependencies = [ + "aho-corasick", + "memchr", + "regex-syntax", + "thread_local", +] + +[[package]] +name = "regex-syntax" +version = "0.6.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "26412eb97c6b088a6997e05f69403a802a92d520de2f8e63c2b65f9e0f47c4e8" + +[[package]] +name = "remove_dir_all" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dfc5b3ce5d5ea144bb04ebd093a9e14e9765bcfec866aecda9b6dec43b3d1e24" +dependencies = [ + "winapi 0.3.9", +] + +[[package]] +name = "reqwest" +version = "0.10.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "12427a5577082c24419c9c417db35cfeb65962efc7675bb6b0d5f1f9d315bfe6" +dependencies = [ + "base64", + "bytes 0.5.6", + "encoding_rs", + "futures-core", + "futures-util", + "http", + "http-body", + "hyper", + "hyper-rustls", + "ipnet", + "js-sys", + "lazy_static", + "log", + "mime", + "mime_guess", + "percent-encoding", + "pin-project-lite", + "rustls", + "serde", + "serde_json", + "serde_urlencoded", + "tokio 0.2.22", + "tokio-rustls", + "url", + "wasm-bindgen", + "wasm-bindgen-futures", + "web-sys", + "webpki-roots", + "winreg", +] + +[[package]] +name = "ring" +version = "0.16.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ba5a8ec64ee89a76c98c549af81ff14813df09c3e6dc4766c3856da48597a0c" +dependencies = [ + "cc", + "lazy_static", + "libc", + "spin", + "untrusted", + "web-sys", + "winapi 0.3.9", +] + +[[package]] +name = "rustc-demangle" +version = "0.1.16" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4c691c0e608126e00913e33f0ccf3727d5fc84573623b8d65b2df340b5201783" + +[[package]] +name = "rustc_version" +version = "0.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "138e3e0acb6c9fb258b19b67cb8abd63c00679d2851805ea151465464fe9030a" +dependencies = [ + "semver", +] + +[[package]] +name = "rustls" +version = "0.18.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cac94b333ee2aac3284c5b8a1b7fb4dd11cba88c244e3fe33cdbd047af0eb693" +dependencies = [ + "base64", + "log", + "ring", + "sct", + "webpki", +] + +[[package]] +name = "rustversion" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b9bdc5e856e51e685846fb6c13a1f5e5432946c2c90501bdc76a1319f19e29da" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", +] + +[[package]] +name = "ryu" +version = "1.0.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e" + +[[package]] +name = "scopeguard" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d29ab0c6d3fc0ee92fe66e2d99f700eab17a8d57d1c1d3b748380fb20baa78cd" + +[[package]] +name = "sct" +version = "0.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c" +dependencies = [ + "ring", + "untrusted", +] + +[[package]] +name = "semver" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1d7eb9ef2c18661902cc47e535f9bc51b78acd254da71d375c2f6720d9a40403" +dependencies = [ + "semver-parser", +] + +[[package]] +name = "semver-parser" +version = "0.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "388a1df253eca08550bef6c72392cfe7c30914bf41df5269b68cbd6ff8f570a3" + +[[package]] +name = "serde" +version = "1.0.114" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5317f7588f0a5078ee60ef675ef96735a1442132dc645eb1d12c018620ed8cd3" +dependencies = [ + "serde_derive", +] + +[[package]] +name = "serde_bytes" +version = "0.11.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "16ae07dd2f88a366f15bd0632ba725227018c69a1c8550a927324f8eb8368bb9" +dependencies = [ + "serde", +] + +[[package]] +name = "serde_derive" +version = "1.0.114" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2a0be94b04690fbaed37cddffc5c134bf537c8e3329d53e982fe04c374978f8e" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", +] + +[[package]] +name = "serde_json" +version = "1.0.57" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "164eacbdb13512ec2745fb09d51fd5b22b0d65ed294a1dcf7285a360c80a675c" +dependencies = [ + "itoa", + "ryu", + "serde", +] + +[[package]] +name = "serde_urlencoded" +version = "0.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ec5d77e2d4c73717816afac02670d5c4f534ea95ed430442cad02e7a6e32c97" +dependencies = [ + "dtoa", + "itoa", + "serde", + "url", +] + +[[package]] +name = "sha2" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a256f46ea78a0c0d9ff00077504903ac881a1dafdc20da66545699e7776b3e69" +dependencies = [ + "block-buffer 0.7.3", + "digest 0.8.1", + "fake-simd", + "opaque-debug 0.2.3", +] + +[[package]] +name = "sha3" +version = "0.9.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f81199417d4e5de3f04b1e871023acea7389672c4135918f05aa9cbf2f2fa809" +dependencies = [ + "block-buffer 0.9.0", + "digest 0.9.0", + "keccak", + "opaque-debug 0.3.0", +] + +[[package]] +name = "signature" +version = "1.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "29f060a7d147e33490ec10da418795238fd7545bba241504d6b31a409f2e6210" + +[[package]] +name = "slab" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8" + +[[package]] +name = "smallvec" +version = "0.6.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f7b0758c52e15a8b5e3691eae6cc559f08eee9406e548a4477ba4e67770a82b6" +dependencies = [ + "maybe-uninit", +] + +[[package]] +name = "socket2" +version = "0.3.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "03088793f677dce356f3ccc2edb1b314ad191ab702a5de3faf49304f7e104918" +dependencies = [ + "cfg-if", + "libc", + "redox_syscall", + "winapi 0.3.9", +] + +[[package]] +name = "solana-crate-features" +version = "1.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "610ba71932d0bf4abf88eabb081ee43fa1ee6bb5137c4fa6776ea9dd8630ca5c" +dependencies = [ + "backtrace", + "bytes 0.4.12", + "cc", + "curve25519-dalek", + "ed25519-dalek", + "either", + "failure", + "lazy_static", + "libc", + "rand_chacha", + "regex-syntax", + "reqwest", + "serde", + "syn 0.15.44", + "syn 1.0.36", + "tokio 0.1.22", + "winapi 0.3.9", +] + +[[package]] +name = "solana-logger" +version = "1.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bc703cb2807e9d713f70df32ac8c3a7a9c8af437dd0d468b1b77cfd8e8b4cbc8" +dependencies = [ + "env_logger", + "lazy_static", + "log", +] + +[[package]] +name = "solana-sdk" +version = "1.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a556c1b456609b760ff47b933912f27563ea8a9a1692864cbc1014c02f5b981e" +dependencies = [ + "assert_matches", + "bincode", + "bs58", + "bv", + "byteorder", + "chrono", + "ed25519-dalek", + "generic-array 0.14.3", + "hex", + "hmac", + "itertools", + "log", + "memmap", + "num-derive 0.3.1", + "num-traits", + "pbkdf2", + "rand", + "rand_chacha", + "rustc_version", + "rustversion", + "serde", + "serde_bytes", + "serde_derive", + "serde_json", + "sha2", + "solana-crate-features", + "solana-logger", + "solana-sdk-macro", + "thiserror", +] + +[[package]] +name = "solana-sdk-macro" +version = "1.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "38bc386020de692562a29c0696a71c14a3d94455a9a785a97c7b254c38d6a2c8" +dependencies = [ + "bs58", + "proc-macro2 1.0.19", + "quote 1.0.7", + "rustversion", + "syn 1.0.36", +] + +[[package]] +name = "spin" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d" + +[[package]] +name = "spl-token" +version = "1.0.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07c8482ae4aac6bb7d73aef79df5fb403a16a0cfbe200442532cff6b98613383" +dependencies = [ + "cbindgen", + "num-derive 0.2.5", + "num-traits", + "remove_dir_all", + "solana-sdk", + "thiserror", +] + +[[package]] +name = "strsim" +version = "0.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a" + +[[package]] +name = "subtle" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2d67a5a62ba6e01cb2192ff309324cb4875d0c451d55fe2319433abe7a05a8ee" + +[[package]] +name = "subtle" +version = "2.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "502d53007c02d7605a05df1c1a73ee436952781653da5d0bf57ad608f66932c1" + +[[package]] +name = "syn" +version = "0.15.44" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ca4b3b69a77cbe1ffc9e198781b7acb0c7365a883670e8f1c1bc66fba79a5c5" +dependencies = [ + "proc-macro2 0.4.30", + "quote 0.6.13", + "unicode-xid 0.1.0", +] + +[[package]] +name = "syn" +version = "1.0.36" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4cdb98bcb1f9d81d07b536179c269ea15999b5d14ea958196413869445bb5250" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "unicode-xid 0.2.1", +] + +[[package]] +name = "synstructure" +version = "0.12.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b834f2d66f734cb897113e34aaff2f1ab4719ca946f9a7358dba8f8064148701" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", + "unicode-xid 0.2.1", +] + +[[package]] +name = "tempfile" +version = "3.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7a6e24d9338a0a5be79593e2fa15a648add6138caa803e2d5bc782c371732ca9" +dependencies = [ + "cfg-if", + "libc", + "rand", + "redox_syscall", + "remove_dir_all", + "winapi 0.3.9", +] + +[[package]] +name = "termcolor" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f" +dependencies = [ + "winapi-util", +] + +[[package]] +name = "textwrap" +version = "0.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060" +dependencies = [ + "unicode-width", +] + +[[package]] +name = "thiserror" +version = "1.0.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7dfdd070ccd8ccb78f4ad66bf1982dc37f620ef696c6b5028fe2ed83dd3d0d08" +dependencies = [ + "thiserror-impl", +] + +[[package]] +name = "thiserror-impl" +version = "1.0.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bd80fc12f73063ac132ac92aceea36734f04a1d93c1240c6944e23a3b8841793" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", +] + +[[package]] +name = "thread_local" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14" +dependencies = [ + "lazy_static", +] + +[[package]] +name = "time" +version = "0.1.43" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ca8a50ef2360fbd1eeb0ecd46795a87a19024eb4b53c5dc916ca1fd95fe62438" +dependencies = [ + "libc", + "winapi 0.3.9", +] + +[[package]] +name = "tinyvec" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "53953d2d3a5ad81d9f844a32f14ebb121f50b650cd59d0ee2a07cf13c617efed" + +[[package]] +name = "tokio" +version = "0.1.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a09c0b5bb588872ab2f09afa13ee6e9dac11e10a0ec9e8e3ba39a5a5d530af6" +dependencies = [ + "bytes 0.4.12", + "futures", + "mio", + "num_cpus", + "tokio-codec", + "tokio-current-thread", + "tokio-executor", + "tokio-fs", + "tokio-io", + "tokio-reactor", + "tokio-sync", + "tokio-tcp", + "tokio-threadpool", + "tokio-timer", + "tokio-udp", + "tokio-uds", +] + +[[package]] +name = "tokio" +version = "0.2.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd" +dependencies = [ + "bytes 0.5.6", + "fnv", + "futures-core", + "iovec", + "lazy_static", + "memchr", + "mio", + "num_cpus", + "pin-project-lite", + "slab", +] + +[[package]] +name = "tokio-codec" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "25b2998660ba0e70d18684de5d06b70b70a3a747469af9dea7618cc59e75976b" +dependencies = [ + "bytes 0.4.12", + "futures", + "tokio-io", +] + +[[package]] +name = "tokio-current-thread" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b1de0e32a83f131e002238d7ccde18211c0a5397f60cbfffcb112868c2e0e20e" +dependencies = [ + "futures", + "tokio-executor", +] + +[[package]] +name = "tokio-executor" +version = "0.1.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fb2d1b8f4548dbf5e1f7818512e9c406860678f29c300cdf0ebac72d1a3a1671" +dependencies = [ + "crossbeam-utils", + "futures", +] + +[[package]] +name = "tokio-fs" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "297a1206e0ca6302a0eed35b700d292b275256f596e2f3fea7729d5e629b6ff4" +dependencies = [ + "futures", + "tokio-io", + "tokio-threadpool", +] + +[[package]] +name = "tokio-io" +version = "0.1.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "57fc868aae093479e3131e3d165c93b1c7474109d13c90ec0dda2a1bbfff0674" +dependencies = [ + "bytes 0.4.12", + "futures", + "log", +] + +[[package]] +name = "tokio-reactor" +version = "0.1.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09bc590ec4ba8ba87652da2068d150dcada2cfa2e07faae270a5e0409aa51351" +dependencies = [ + "crossbeam-utils", + "futures", + "lazy_static", + "log", + "mio", + "num_cpus", + "parking_lot", + "slab", + "tokio-executor", + "tokio-io", + "tokio-sync", +] + +[[package]] +name = "tokio-rustls" +version = "0.14.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "228139ddd4fea3fa345a29233009635235833e52807af7ea6448ead03890d6a9" +dependencies = [ + "futures-core", + "rustls", + "tokio 0.2.22", + "webpki", +] + +[[package]] +name = "tokio-sync" +version = "0.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "edfe50152bc8164fcc456dab7891fa9bf8beaf01c5ee7e1dd43a397c3cf87dee" +dependencies = [ + "fnv", + "futures", +] + +[[package]] +name = "tokio-tcp" +version = "0.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "98df18ed66e3b72e742f185882a9e201892407957e45fbff8da17ae7a7c51f72" +dependencies = [ + "bytes 0.4.12", + "futures", + "iovec", + "mio", + "tokio-io", + "tokio-reactor", +] + +[[package]] +name = "tokio-threadpool" +version = "0.1.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "df720b6581784c118f0eb4310796b12b1d242a7eb95f716a8367855325c25f89" +dependencies = [ + "crossbeam-deque", + "crossbeam-queue", + "crossbeam-utils", + "futures", + "lazy_static", + "log", + "num_cpus", + "slab", + "tokio-executor", +] + +[[package]] +name = "tokio-timer" +version = "0.2.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "93044f2d313c95ff1cb7809ce9a7a05735b012288a888b62d4434fd58c94f296" +dependencies = [ + "crossbeam-utils", + "futures", + "slab", + "tokio-executor", +] + +[[package]] +name = "tokio-udp" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e2a0b10e610b39c38b031a2fcab08e4b82f16ece36504988dcbd81dbba650d82" +dependencies = [ + "bytes 0.4.12", + "futures", + "log", + "mio", + "tokio-codec", + "tokio-io", + "tokio-reactor", +] + +[[package]] +name = "tokio-uds" +version = "0.2.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ab57a4ac4111c8c9dbcf70779f6fc8bc35ae4b2454809febac840ad19bd7e4e0" +dependencies = [ + "bytes 0.4.12", + "futures", + "iovec", + "libc", + "log", + "mio", + "mio-uds", + "tokio-codec", + "tokio-io", + "tokio-reactor", +] + +[[package]] +name = "tokio-util" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499" +dependencies = [ + "bytes 0.5.6", + "futures-core", + "futures-sink", + "log", + "pin-project-lite", + "tokio 0.2.22", +] + +[[package]] +name = "toml" +version = "0.5.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ffc92d160b1eef40665be3a05630d003936a3bc7da7421277846c2613e92c71a" +dependencies = [ + "serde", +] + +[[package]] +name = "tower-service" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860" + +[[package]] +name = "tracing" +version = "0.1.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f0aae59226cf195d8e74d4b34beae1859257efb4e5fed3f147d2dc2c7d372178" +dependencies = [ + "cfg-if", + "log", + "tracing-core", +] + +[[package]] +name = "tracing-core" +version = "0.1.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b2734b5a028fa697686f16c6d18c2c6a3c7e41513f9a213abb6754c4acb3c8d7" +dependencies = [ + "lazy_static", +] + +[[package]] +name = "try-lock" +version = "0.2.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642" + +[[package]] +name = "typenum" +version = "1.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "373c8a200f9e67a0c95e62a4f52fbf80c23b4381c05a17845531982fa99e6b33" + +[[package]] +name = "unicase" +version = "2.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "50f37be617794602aabbeee0be4f259dc1778fabe05e2d67ee8f79326d5cb4f6" +dependencies = [ + "version_check", +] + +[[package]] +name = "unicode-bidi" +version = "0.3.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5" +dependencies = [ + "matches", +] + +[[package]] +name = "unicode-normalization" +version = "0.1.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977" +dependencies = [ + "tinyvec", +] + +[[package]] +name = "unicode-segmentation" +version = "1.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e83e153d1053cbb5a118eeff7fd5be06ed99153f00dbcd8ae310c5fb2b22edc0" + +[[package]] +name = "unicode-width" +version = "0.1.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9337591893a19b88d8d87f2cec1e73fad5cdfd10e5a6f349f498ad6ea2ffb1e3" + +[[package]] +name = "unicode-xid" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fc72304796d0818e357ead4e000d19c9c174ab23dc11093ac919054d20a6a7fc" + +[[package]] +name = "unicode-xid" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564" + +[[package]] +name = "untrusted" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a" + +[[package]] +name = "url" +version = "2.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb" +dependencies = [ + "idna", + "matches", + "percent-encoding", +] + +[[package]] +name = "vec_map" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f1bddf1187be692e79c5ffeab891132dfb0f236ed36a43c7ed39f1165ee20191" + +[[package]] +name = "version_check" +version = "0.9.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b5a972e5669d67ba988ce3dc826706fb0a8b01471c088cb0b6110b805cc36aed" + +[[package]] +name = "want" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0" +dependencies = [ + "log", + "try-lock", +] + +[[package]] +name = "wasi" +version = "0.9.0+wasi-snapshot-preview1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519" + +[[package]] +name = "wasm-bindgen" +version = "0.2.67" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f0563a9a4b071746dd5aedbc3a28c6fe9be4586fb3fbadb67c400d4f53c6b16c" +dependencies = [ + "cfg-if", + "serde", + "serde_json", + "wasm-bindgen-macro", +] + +[[package]] +name = "wasm-bindgen-backend" +version = "0.2.67" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bc71e4c5efa60fb9e74160e89b93353bc24059999c0ae0fb03affc39770310b0" +dependencies = [ + "bumpalo", + "lazy_static", + "log", + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-futures" +version = "0.4.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "95f8d235a77f880bcef268d379810ea6c0af2eacfa90b1ad5af731776e0c4699" +dependencies = [ + "cfg-if", + "js-sys", + "wasm-bindgen", + "web-sys", +] + +[[package]] +name = "wasm-bindgen-macro" +version = "0.2.67" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "97c57cefa5fa80e2ba15641578b44d36e7a64279bc5ed43c6dbaf329457a2ed2" +dependencies = [ + "quote 1.0.7", + "wasm-bindgen-macro-support", +] + +[[package]] +name = "wasm-bindgen-macro-support" +version = "0.2.67" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "841a6d1c35c6f596ccea1f82504a192a60378f64b3bb0261904ad8f2f5657556" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", + "wasm-bindgen-backend", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-shared" +version = "0.2.67" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "93b162580e34310e5931c4b792560108b10fd14d64915d7fff8ff00180e70092" + +[[package]] +name = "web-sys" +version = "0.3.44" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dda38f4e5ca63eda02c059d243aa25b5f35ab98451e518c51612cd0f1bd19a47" +dependencies = [ + "js-sys", + "wasm-bindgen", +] + +[[package]] +name = "webpki" +version = "0.21.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f1f50e1972865d6b1adb54167d1c8ed48606004c2c9d0ea5f1eeb34d95e863ef" +dependencies = [ + "ring", + "untrusted", +] + +[[package]] +name = "webpki-roots" +version = "0.19.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f8eff4b7516a57307f9349c64bf34caa34b940b66fed4b2fb3136cb7386e5739" +dependencies = [ + "webpki", +] + +[[package]] +name = "winapi" +version = "0.2.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a" + +[[package]] +name = "winapi" +version = "0.3.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419" +dependencies = [ + "winapi-i686-pc-windows-gnu", + "winapi-x86_64-pc-windows-gnu", +] + +[[package]] +name = "winapi-build" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc" + +[[package]] +name = "winapi-i686-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6" + +[[package]] +name = "winapi-util" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178" +dependencies = [ + "winapi 0.3.9", +] + +[[package]] +name = "winapi-x86_64-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" + +[[package]] +name = "winreg" +version = "0.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0120db82e8a1e0b9fb3345a539c478767c0048d842860994d96113d5b667bd69" +dependencies = [ + "winapi 0.3.9", +] + +[[package]] +name = "wormhole-bridge" +version = "0.1.0" +dependencies = [ + "arrayref", + "byteorder", + "hex", + "num-derive 0.2.5", + "num-traits", + "rand", + "remove_dir_all", + "sha3", + "solana-sdk", + "spl-token", + "thiserror", + "zerocopy", +] + +[[package]] +name = "ws2_32-sys" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e" +dependencies = [ + "winapi 0.2.8", + "winapi-build", +] + +[[package]] +name = "zerocopy" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6580539ad917b7c026220c4b3f2c08d52ce54d6ce0dc491e66002e35388fab46" +dependencies = [ + "byteorder", + "zerocopy-derive", +] + +[[package]] +name = "zerocopy-derive" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d498dbd1fd7beb83c86709ae1c33ca50942889473473d287d56ce4770a18edfb" +dependencies = [ + "proc-macro2 1.0.19", + "syn 1.0.36", + "synstructure", +] + +[[package]] +name = "zeroize" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3cbac2ed2ba24cc90f5e06485ac8c7c1e5449fe8911aef4d8877218af021a5b8" +dependencies = [ + "zeroize_derive", +] + +[[package]] +name = "zeroize_derive" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "de251eec69fc7c1bc3923403d18ececb929380e016afe103da75f396704f8ca2" +dependencies = [ + "proc-macro2 1.0.19", + "quote 1.0.7", + "syn 1.0.36", + "synstructure", +] diff --git a/solana/bridge/Cargo.toml b/solana/bridge/Cargo.toml new file mode 100644 index 00000000..299113ab --- /dev/null +++ b/solana/bridge/Cargo.toml @@ -0,0 +1,36 @@ +# Note: This crate must be built using do.sh + +[package] +name = "wormhole-bridge" +version = "0.1.0" +description = "Solana Program Library Token Swap" +authors = ["Certus One Team "] +repository = "https://github.com/solana-labs/solana-program-library" +license = "Apache-2.0" +edition = "2018" + +[features] +no-entrypoint = [] +skip-no-mangle = ["solana-sdk/skip-no-mangle"] +program = ["solana-sdk/program", "spl-token/program", "spl-token/no-entrypoint"] +default = ["solana-sdk/default", "spl-token/default"] + +[dependencies] +num-derive = "0.2" +num-traits = "0.2" +remove_dir_all = "=0.5.0" +solana-sdk = { version = "=1.2.17", default-features = false, optional = true } +spl-token = { package = "spl-token", version = "1.0.6", default-features = false, optional = true } +thiserror = "1.0" +arrayref = "0.3.6" +byteorder = "1.3.4" +zerocopy = "0.3.0" +sha3 = "0.9.1" + +[dev-dependencies] +rand = { version = "0.7.0" } +hex = "0.4.2" + +[lib] +name = "spl_bridge" +crate-type = ["cdylib", "lib"] diff --git a/solana/bridge/Dockerfile b/solana/bridge/Dockerfile new file mode 100644 index 00000000..30c44e1c --- /dev/null +++ b/solana/bridge/Dockerfile @@ -0,0 +1,4 @@ +FROM centos:8 + +RUN dnf install -y dnf install bzip2 git gcc wget +RUN curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh diff --git a/solana/bridge/Xargo.toml b/solana/bridge/Xargo.toml new file mode 100644 index 00000000..1744f098 --- /dev/null +++ b/solana/bridge/Xargo.toml @@ -0,0 +1,2 @@ +[target.bpfel-unknown-unknown.dependencies.std] +features = [] \ No newline at end of file diff --git a/solana/bridge/src/entrypoint.rs b/solana/bridge/src/entrypoint.rs new file mode 100644 index 00000000..fa89d478 --- /dev/null +++ b/solana/bridge/src/entrypoint.rs @@ -0,0 +1,24 @@ +//! Program entrypoint definitions +#![cfg(feature = "program")] +#![cfg(not(feature = "no-entrypoint"))] + +use solana_sdk::{ + account_info::AccountInfo, entrypoint, entrypoint::ProgramResult, + program_error::PrintProgramError, pubkey::Pubkey, +}; + +use crate::{error::Error, state::Bridge}; + +entrypoint!(process_instruction); +fn process_instruction<'a>( + program_id: &Pubkey, + accounts: &'a [AccountInfo<'a>], + instruction_data: &[u8], +) -> ProgramResult { + if let Err(error) = Bridge::process(program_id, accounts, instruction_data) { + // catch the error so we can print it + error.print::(); + return Err(error); + } + Ok(()) +} diff --git a/solana/bridge/src/error.rs b/solana/bridge/src/error.rs new file mode 100644 index 00000000..ff25ffc0 --- /dev/null +++ b/solana/bridge/src/error.rs @@ -0,0 +1,153 @@ +//! Error types + +use std::io; + +use num_derive::FromPrimitive; +use num_traits::FromPrimitive; +use solana_sdk::{ + decode_error::DecodeError, + info, + program_error::{PrintProgramError, ProgramError}, +}; +use thiserror::Error; + +/// Errors that may be returned by the TokenSwap program. +#[derive(Clone, Debug, Eq, Error, FromPrimitive, PartialEq)] +pub enum VAAError { + /// The given action is unknown or invalid + #[error("InvalidAction")] + InvalidAction, + + /// An io error occurred + #[error("IOError")] + IOError, +} + +/// Errors that may be returned by the TokenSwap program. +#[derive(Clone, Debug, Eq, Error, FromPrimitive, PartialEq)] +pub enum Error { + /// The deserialization of the Token state returned something besides State::Token. + #[error("ExpectedToken")] + ExpectedToken, + /// The deserialization of the Bridge returned something besides State::Bridge. + #[error("ExpectedBridge")] + ExpectedBridge, + /// The deserialization of the Token state returned something besides State::Account. + #[error("ExpectedAccount")] + ExpectedAccount, + /// The deserialization of the GuardianSet state returned something besides State::GuardianSet. + #[error("ExpectedGuardianSet")] + ExpectedGuardianSet, + /// The deserialization of the TransferOutProposal state returned something besides State::TransferOutProposal. + #[error("ExpectedTransferOutProposal")] + ExpectedTransferOutProposal, + /// State is uninitialized. + #[error("State is unititialized")] + UninitializedState, + /// The program address provided doesn't match the value generated by the program. + #[error("InvalidProgramAddress")] + InvalidProgramAddress, + /// The submitted VAA is invalid + #[error("InvalidVAAFormat")] + InvalidVAAFormat, + /// The submitted VAA is invalid form + #[error("InvalidVAAAction")] + InvalidVAAAction, + /// The submitted VAA has an invalid signature + #[error("InvalidVAASignature")] + InvalidVAASignature, + /// The account is already initialized + #[error("AlreadyExists")] + AlreadyExists, + /// An account was not derived correctly + #[error("InvalidDerivedAccount")] + InvalidDerivedAccount, + /// A given token account does not belong to the given mint + #[error("TokenMintMismatch")] + TokenMintMismatch, + /// A given mint account does not belong to the program + #[error("WrongMintOwner")] + WrongMintOwner, + /// A given bridge account does not belong to the program + #[error("WrongBridgeOwner")] + WrongBridgeOwner, + /// A given token account does not belong to the program + #[error("WrongTokenAccountOwner")] + WrongTokenAccountOwner, + /// A parsing operation failed + #[error("ParseFailed")] + ParseFailed, + /// The guardian set that signed this VAA has expired + #[error("GuardianSetExpired")] + GuardianSetExpired, + /// The given VAA has expired + #[error("VAAExpired")] + VAAExpired, + /// The given VAA has already been claimed + #[error("VAAClaimed")] + VAAClaimed, + /// The given VAA was not signed by the latest guardian set + #[error("OldGuardianSet")] + OldGuardianSet, + /// The guardian set index must increase on update + #[error("GuardianIndexNotIncreasing")] + GuardianIndexNotIncreasing, + /// The given VAA does not match the proposal + #[error("VAAProposalMismatch")] + VAAProposalMismatch, + /// Invalid transfer with src=dst + #[error("SameChainTransfer")] + SameChainTransfer, +} + +impl From for ProgramError { + fn from(e: Error) -> Self { + ProgramError::Custom(e as u32) + } +} + +impl From for Error { + fn from(_: std::io::Error) -> Self { + Error::ParseFailed + } +} + +impl DecodeError for Error { + fn type_of() -> &'static str { + "Swap Error" + } +} + +impl PrintProgramError for Error { + fn print(&self) + where + E: 'static + std::error::Error + DecodeError + PrintProgramError + FromPrimitive, + { + match self { + Error::ExpectedToken => info!("Error: ExpectedToken"), + Error::ExpectedAccount => info!("Error: ExpectedAccount"), + Error::ExpectedBridge => info!("Error: ExpectedBridge"), + Error::ExpectedGuardianSet => info!("Error: ExpectedGuardianSet"), + Error::UninitializedState => info!("Error: State is unititialized"), + Error::InvalidProgramAddress => info!("Error: InvalidProgramAddress"), + Error::InvalidVAAFormat => info!("Error: InvalidVAAFormat"), + Error::InvalidVAAAction => info!("Error: InvalidVAAAction"), + Error::InvalidVAASignature => info!("Error: InvalidVAASignature"), + Error::AlreadyExists => info!("Error: AlreadyExists"), + Error::InvalidDerivedAccount => info!("Error: InvalidDerivedAccount"), + Error::TokenMintMismatch => info!("Error: TokenMintMismatch"), + Error::WrongMintOwner => info!("Error: WrongMintOwner"), + Error::WrongTokenAccountOwner => info!("Error: WrongTokenAccountOwner"), + Error::ParseFailed => info!("Error: ParseFailed"), + Error::GuardianSetExpired => info!("Error: GuardianSetExpired"), + Error::VAAExpired => info!("Error: VAAExpired"), + Error::VAAClaimed => info!("Error: VAAClaimed"), + Error::WrongBridgeOwner => info!("Error: WrongBridgeOwner"), + Error::OldGuardianSet => info!("Error: OldGuardianSet"), + Error::GuardianIndexNotIncreasing => info!("Error: GuardianIndexNotIncreasing"), + Error::ExpectedTransferOutProposal => info!("Error: ExpectedTransferOutProposal"), + Error::VAAProposalMismatch => info!("Error: VAAProposalMismatch"), + Error::SameChainTransfer => info!("Error: SameChainTransfer"), + } + } +} diff --git a/solana/bridge/src/instruction.rs b/solana/bridge/src/instruction.rs new file mode 100644 index 00000000..13299d7c --- /dev/null +++ b/solana/bridge/src/instruction.rs @@ -0,0 +1,175 @@ +#![allow(clippy::too_many_arguments)] + +//! Instruction types + +use std::io::Write; +use std::mem::size_of; + +use solana_sdk::{ + instruction::{AccountMeta, Instruction}, + program_error::ProgramError, + pubkey::Pubkey, +}; +use zerocopy::{AsBytes, FromBytes}; + +use crate::error::Error; +use crate::instruction::BridgeInstruction::Initialize; +use crate::state::{AssetMeta, BridgeConfig}; +use crate::syscalls::RawKey; + +/// chain id of this chain +pub const CHAIN_ID_SOLANA: u8 = 1; + +/// size of a VAA in bytes +const VAA_SIZE: usize = 100; + +/// size of a foreign address in bytes +const FOREIGN_ADDRESS_SIZE: usize = 32; + +/// validator payment approval +pub type VAA_BODY = [u8; VAA_SIZE]; +/// X and Y point of P for guardians +pub type GuardianKey = [u8; 64]; +/// address on a foreign chain +pub type ForeignAddress = [u8; FOREIGN_ADDRESS_SIZE]; + +#[repr(C)] +#[derive(Clone, Copy)] +pub struct InitializePayload { + /// guardians that are allowed to sign mints + pub initial_guardian: RawKey, + /// config for the bridge + pub config: BridgeConfig, +} + +#[repr(C)] +#[derive(Clone, Copy)] +pub struct TransferOutPayload { + /// amount to transfer + pub amount: u64, + /// chain id to transfer to + pub chain_id: u8, + /// Information about the asset to be transferred + pub asset: AssetMeta, + /// address on the foreign chain to transfer to + pub target: ForeignAddress, +} + +/// Instructions supported by the SwapInfo program. +#[repr(C)] +pub enum BridgeInstruction { + /// Initializes a new Bridge + /// Accounts expected by this instruction: + /// + /// 0. `[writable, derived]` The bridge to initialize. + /// 1. `[]` The clock SysVar + /// 2. `[writable, derived]` The initial guardian set account + /// 3. `[signer]` The fee payer for new account creation + Initialize(InitializePayload), + + /// Burns or locks a (wrapped) asset `token` from `sender` on the Solana chain. + TransferOut(TransferOutPayload), + + /// Submits a VAA signed by `guardian` on a valid `proposal`. + PostVAA(VAA_BODY), + + /// Deletes a `proposal` after the `VAA_EXPIRATION_TIME` is over to free up space on chain. + /// This returns the rent to the sender. + EvictTransferOut(), + + /// Deletes a `ExecutedVAA` after the `VAA_EXPIRATION_TIME` is over to free up space on chain. + /// This returns the rent to the sender. + EvictExecutedVAA(), +} + +impl BridgeInstruction { + /// Deserializes a byte buffer into a BridgeInstruction + pub fn deserialize(input: &[u8]) -> Result { + if input.len() < size_of::() { + return Err(ProgramError::InvalidAccountData); + } + Ok(match input[0] { + 0 => { + let payload: &InitializePayload = unpack(input)?; + + Initialize(*payload) + } + _ => return Err(ProgramError::InvalidInstructionData), + }) + } + + /// Serializes a BridgeInstruction into a byte buffer. + pub fn serialize(self: Self) -> Result, ProgramError> { + let mut output = vec![0u8; size_of::()]; + + match self { + Self::Initialize(payload) => { + output[0] = 0; + #[allow(clippy::cast_ptr_alignment)] + let value = unsafe { + &mut *(&mut output[size_of::()] as *mut u8 as *mut InitializePayload) + }; + *value = payload; + } + Self::TransferOut(payload) => { + output[0] = 1; + #[allow(clippy::cast_ptr_alignment)] + let value = unsafe { + &mut *(&mut output[size_of::()] as *mut u8 as *mut TransferOutPayload) + }; + *value = payload; + } + Self::PostVAA(payload) => { + output[0] = 2; + #[allow(clippy::cast_ptr_alignment)] + let value = + unsafe { &mut *(&mut output[size_of::()] as *mut u8 as *mut VAA_BODY) }; + *value = payload; + } + Self::EvictTransferOut() => { + output[0] = 3; + } + Self::EvictExecutedVAA() => { + output[0] = 4; + } + _ => panic!(""), + } + Ok(output) + } +} + +/// Creates an 'initialize' instruction. +pub fn initialize( + program_id: &Pubkey, + sender: &Pubkey, + bridge: &Pubkey, + initial_guardian: RawKey, + config: &BridgeConfig, +) -> Result { + let data = BridgeInstruction::Initialize(InitializePayload { + config: *config, + initial_guardian, + }) + .serialize()?; + + let accounts = vec![ + AccountMeta::new(*sender, true), + AccountMeta::new(*bridge, false), + ]; + + Ok(Instruction { + program_id: *program_id, + accounts, + data, + }) +} + +/// Unpacks a reference from a bytes buffer. +pub fn unpack(input: &[u8]) -> Result<&T, ProgramError> { + if input.len() < size_of::() + size_of::() { + return Err(ProgramError::InvalidAccountData); + } + #[allow(clippy::cast_ptr_alignment)] + let val: &T = unsafe { &*(&input[1] as *const u8 as *const T) }; + Ok(val) +} diff --git a/solana/bridge/src/lib.rs b/solana/bridge/src/lib.rs new file mode 100644 index 00000000..8af6e669 --- /dev/null +++ b/solana/bridge/src/lib.rs @@ -0,0 +1,12 @@ +#[macro_use] +extern crate arrayref; +#[macro_use] +extern crate zerocopy; + +pub mod entrypoint; +pub mod error; +pub mod instruction; +pub mod processor; +pub mod state; +pub mod syscalls; +pub mod vaa; diff --git a/solana/bridge/src/processor.rs b/solana/bridge/src/processor.rs new file mode 100644 index 00000000..8cb232fd --- /dev/null +++ b/solana/bridge/src/processor.rs @@ -0,0 +1,702 @@ +//! Program instruction processing logic + +use std::io::Write; +use std::mem::size_of; +use std::slice::Iter; +use std::str; + +use num_traits::AsPrimitive; +use sha3::Digest; +use solana_sdk::clock::Clock; +use solana_sdk::hash::hash; +#[cfg(not(target_arch = "bpf"))] +use solana_sdk::instruction::Instruction; +use solana_sdk::log::sol_log; +#[cfg(target_arch = "bpf")] +use solana_sdk::program::invoke_signed; +use solana_sdk::rent::Rent; +use solana_sdk::system_instruction::{create_account, SystemInstruction}; +use solana_sdk::sysvar::Sysvar; +use solana_sdk::{ + account_info::next_account_info, account_info::AccountInfo, entrypoint::ProgramResult, info, + program_error::ProgramError, pubkey::bs58, pubkey::Pubkey, +}; +use spl_token::state::Mint; + +use crate::instruction::BridgeInstruction::*; +use crate::instruction::{ + BridgeInstruction, ForeignAddress, GuardianKey, TransferOutPayload, CHAIN_ID_SOLANA, VAA_BODY, +}; +use crate::state::*; +use crate::syscalls::{sol_verify_schnorr, RawKey, SchnorrifyInput}; +use crate::vaa::{BodyTransfer, BodyUpdateGuardianSet, VAABody, VAA}; +use crate::{error::Error, instruction::unpack}; + +/// Instruction processing logic +impl Bridge { + /// Processes an [Instruction](enum.Instruction.html). + pub fn process(program_id: &Pubkey, accounts: &[AccountInfo], input: &[u8]) -> ProgramResult { + let instruction = BridgeInstruction::deserialize(input)?; + match instruction { + Initialize(payload) => { + info!("Instruction: Initialize"); + Self::process_initialize( + program_id, + accounts, + payload.initial_guardian, + payload.config, + ) + } + TransferOut(p) => { + info!("Instruction: TransferOut"); + + if p.asset.chain == CHAIN_ID_SOLANA { + Self::process_transfer_native_out(program_id, accounts, &p) + } else { + Self::process_transfer_out(program_id, accounts, &p) + } + } + PostVAA(vaa_body) => { + info!("Instruction: PostVAA"); + let len = vaa_body[0] as usize; + let vaa_data = &vaa_body[..len]; + let vaa = VAA::deserialize(vaa_data)?; + + let mut k = sha3::Keccak256::default(); + if let Err(_) = k.write(vaa_data) { + return Err(Error::ParseFailed.into()); + }; + let hash = k.finalize(); + + Self::process_vaa(program_id, accounts, &vaa_body, &vaa, hash.as_ref()) + } + _ => panic!(""), + } + } + + /// Unpacks a token state from a bytes buffer while assuring that the state is initialized. + pub fn process_initialize( + program_id: &Pubkey, + accounts: &[AccountInfo], + initial_guardian_key: RawKey, + config: BridgeConfig, + ) -> ProgramResult { + let account_info_iter = &mut accounts.iter(); + let new_account_info = next_account_info(account_info_iter)?; + let new_guardian_info = next_account_info(account_info_iter)?; + let clock_info = next_account_info(account_info_iter)?; + let clock = Clock::from_account_info(clock_info)?; + + let mut new_account_data = new_account_info.data.borrow_mut(); + let mut bridge: &mut Bridge = Self::unpack_unchecked(&mut new_account_data)?; + if bridge.is_initialized { + return Err(Error::AlreadyExists.into()); + } + + let expected_bridge_key = Bridge::derive_bridge_id(program_id)?; + if expected_bridge_key != *new_account_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + let expected_guardian_set_key = + Bridge::derive_guardian_set_id(program_id, new_account_info.key, 0)?; + if expected_guardian_set_key != *new_guardian_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + let mut new_guardian_data = new_guardian_info.data.borrow_mut(); + let mut guardian_info: &mut GuardianSet = Self::unpack_unchecked(&mut new_guardian_data)?; + if guardian_info.is_initialized { + return Err(Error::AlreadyExists.into()); + } + + // Initialize bridge params + bridge.is_initialized = true; + bridge.guardian_set_index = 0; + bridge.config = config; + + // Initialize the initial guardian set + guardian_info.is_initialized = true; + guardian_info.index = 0; + guardian_info.creation_time = clock.unix_timestamp.as_(); + guardian_info.pubkey = initial_guardian_key; + + Ok(()) + } + + /// Transfers a wrapped asset out + pub fn process_transfer_out( + program_id: &Pubkey, + accounts: &[AccountInfo], + t: &TransferOutPayload, + ) -> ProgramResult { + let account_info_iter = &mut accounts.iter(); + let sender_account_info = next_account_info(account_info_iter)?; + let clock_info = next_account_info(account_info_iter)?; + let bridge_info = next_account_info(account_info_iter)?; + let proposal_info = next_account_info(account_info_iter)?; + let mint_info = next_account_info(account_info_iter)?; + let sender_info = next_account_info(account_info_iter)?; + + let clock = Clock::from_account_info(clock_info)?; + let sender = Bridge::token_account_deserialize(sender_account_info)?; + let bridge = Bridge::bridge_deserialize(bridge_info)?; + let mint = Bridge::mint_deserialize(mint_info)?; + + // Does the token belong to the mint + if sender.mint != *mint_info.key { + return Err(Error::TokenMintMismatch.into()); + } + + // Is the mint owned by the program + if mint.owner.unwrap() != *program_id { + return Err(Error::WrongMintOwner.into()); + } + + // Check that the mint is actually a wrapped asset belonging to *this* bridge instance + let expected_mint_address = Bridge::derive_wrapped_asset_id( + program_id, + bridge_info.key, + t.asset.chain, + t.asset.address, + )?; + if expected_mint_address != *mint_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // Check that the transfer account was derived correctly + let expected_transfer_id = Bridge::derive_transfer_id( + program_id, + bridge_info.key, + t.asset.chain, + t.asset.address, + t.chain_id, + t.target, + sender.owner.to_bytes(), + clock.slot.as_(), + )?; + if expected_transfer_id != *proposal_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // Load proposal account + let mut proposal_data = proposal_info.data.borrow_mut(); + let proposal: &mut TransferOutProposal = Bridge::unpack_unchecked(&mut proposal_data)?; + if proposal.is_initialized { + return Err(Error::AlreadyExists.into()); + } + + // Burn tokens + Bridge::wrapped_burn( + accounts, + &bridge.config.token_program, + sender_info.key, + sender_account_info.key, + t.amount, + )?; + + // Initialize proposal + proposal.is_initialized = true; + proposal.foreign_address = t.target; + proposal.amount = t.amount; + proposal.to_chain_id = t.chain_id; + proposal.asset = t.asset; + + Ok(()) + } + + /// Transfers a native token to a foreign chain + pub fn process_transfer_native_out( + program_id: &Pubkey, + accounts: &[AccountInfo], + t: &TransferOutPayload, + ) -> ProgramResult { + let account_info_iter = &mut accounts.iter(); + let sender_account_info = next_account_info(account_info_iter)?; + let clock_info = next_account_info(account_info_iter)?; + let bridge_info = next_account_info(account_info_iter)?; + let proposal_info = next_account_info(account_info_iter)?; + let mint_info = next_account_info(account_info_iter)?; + let custody_info = next_account_info(account_info_iter)?; + let sender_info = next_account_info(account_info_iter)?; + + let clock = Clock::from_account_info(clock_info)?; + let sender = Bridge::token_account_deserialize(sender_account_info)?; + let bridge = Bridge::bridge_deserialize(bridge_info)?; + let mint = Bridge::mint_deserialize(mint_info)?; + + // Does the token belong to the mint + if sender.mint != *mint_info.key { + return Err(Error::TokenMintMismatch.into()); + } + + // If the mint is owned by the program, it's a wrapped asset + if mint.owner.unwrap() == *program_id { + return Err(Error::WrongMintOwner.into()); + } + + // Check that the transfer account was derived correctly + let expected_transfer_id = Bridge::derive_transfer_id( + program_id, + bridge_info.key, + t.asset.chain, + t.asset.address, + t.chain_id, + t.target, + sender.owner.to_bytes(), + clock.slot.as_(), + )?; + if expected_transfer_id != *proposal_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // Load proposal account + let mut proposal_data = proposal_info.data.borrow_mut(); + let proposal: &mut TransferOutProposal = Bridge::unpack_unchecked(&mut proposal_data)?; + if proposal.is_initialized { + return Err(Error::AlreadyExists.into()); + } + + let expected_custody_id = + Bridge::derive_custody_id(program_id, bridge_info.key, mint_info.key)?; + if expected_custody_id != *custody_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // Create the account if it does not exist + if custody_info.data_is_empty() { + Bridge::create_custody_account( + program_id, + accounts, + &bridge.config.token_program, + bridge_info.key, + custody_info.key, + mint_info.key, + sender_info.key, + )?; + } + + // Check that the custody token account is owned by the derived key + let custody = Self::token_account_deserialize(custody_info)?; + if custody.owner != *bridge_info.key { + return Err(Error::WrongTokenAccountOwner.into()); + } + + // Transfer tokens to custody + Bridge::token_transfer_caller( + accounts, + &bridge.config.token_program, + sender_account_info.key, + custody_info.key, + sender_info.key, + t.amount, + )?; + + // Initialize proposal + proposal.is_initialized = true; + proposal.foreign_address = t.target; + proposal.amount = t.amount; + proposal.to_chain_id = t.chain_id; + + // Don't use the user-given data as we don't check mint = AssetMeta.address + proposal.asset = AssetMeta { + chain: CHAIN_ID_SOLANA, + address: mint_info.key.to_bytes(), + }; + + Ok(()) + } + + /// Processes a VAA + pub fn process_vaa( + program_id: &Pubkey, + accounts: &[AccountInfo], + vaa_data: &[u8; 100], + vaa: &VAA, + hash: &[u8; 32], + ) -> ProgramResult { + let account_info_iter = &mut accounts.iter(); + let bridge_info = next_account_info(account_info_iter)?; + let clock_info = next_account_info(account_info_iter)?; + let guardian_set_info = next_account_info(account_info_iter)?; + let claim_info = next_account_info(account_info_iter)?; + + let mut bridge = Bridge::bridge_deserialize(bridge_info)?; + let clock = Clock::from_account_info(clock_info)?; + let mut guardian_set = Bridge::guardian_set_deserialize(guardian_set_info)?; + + // Check that the guardian set is valid + let expected_guardian_set = + Bridge::derive_guardian_set_id(program_id, bridge_info.key, vaa.guardian_set_index)?; + if expected_guardian_set != *guardian_set_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // Check that the claim is valid + let expected_claim = Bridge::derive_claim_id(program_id, bridge_info.key, hash)?; + if expected_claim != *claim_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // Check that the guardian set is still active + if (guardian_set.expiration_time as i64) < clock.unix_timestamp { + return Err(Error::GuardianSetExpired.into()); + } + + // Check that the VAA is still valid + if (guardian_set.expiration_time as i64) + (bridge.config.vaa_expiration_time as i64) + < clock.unix_timestamp + { + return Err(Error::VAAExpired.into()); + } + + // Verify VAA signature + if !vaa.verify(&guardian_set.pubkey) { + return Err(Error::InvalidVAASignature.into()); + } + + let payload = vaa.payload.ok_or(Error::InvalidVAAAction)?; + match payload { + VAABody::UpdateGuardianSet(v) => Self::process_vaa_set_update( + program_id, + account_info_iter, + &clock, + bridge_info, + &mut bridge, + &mut guardian_set, + &v, + ), + VAABody::Transfer(v) => { + if v.source_chain == CHAIN_ID_SOLANA { + Self::process_vaa_transfer( + program_id, + accounts, + account_info_iter, + bridge_info, + &mut bridge, + &v, + ) + } else { + Self::process_vaa_transfer_post( + program_id, + account_info_iter, + bridge_info, + vaa, + &v, + vaa_data, + ) + } + } + }?; + + // Load proposal account + let mut claim_data = claim_info.data.borrow_mut(); + let claim: &mut ClaimedVAA = Bridge::unpack_unchecked(&mut claim_data)?; + if claim.is_initialized { + return Err(Error::VAAClaimed.into()); + } + + // Set claimed + claim.is_initialized = true; + claim.vaa_time = clock.unix_timestamp as u32; + + Ok(()) + } + + /// Processes a Guardian set update + pub fn process_vaa_set_update( + program_id: &Pubkey, + account_info_iter: &mut Iter, + clock: &Clock, + bridge_info: &AccountInfo, + bridge: &mut Bridge, + old_guardian_set: &mut GuardianSet, + b: &BodyUpdateGuardianSet, + ) -> ProgramResult { + let guardian_set_new_info = next_account_info(account_info_iter)?; + + // TODO this could deadlock the bridge if an update is performed with an invalid key + // The new guardian set must be signed by the current one + if bridge.guardian_set_index != old_guardian_set.index { + return Err(Error::OldGuardianSet.into()); + } + + // The new guardian set must have an index > current + // We don't check +1 because we trust the set to not set something close to max(u32) + if bridge.guardian_set_index >= b.new_index { + return Err(Error::GuardianIndexNotIncreasing.into()); + } + + // Set the exirity on the old guardian set + // The guardian set will expire once all currently issues vaas have expired + old_guardian_set.expiration_time = + (clock.unix_timestamp as u32) + bridge.config.vaa_expiration_time; + + // Check whether the new guardian set was derived correctly + let expected_guardian_set = + Bridge::derive_guardian_set_id(program_id, bridge_info.key, b.new_index)?; + if expected_guardian_set != *guardian_set_new_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + let mut guardian_set_new_data = guardian_set_new_info.data.borrow_mut(); + let guardian_set_new: &mut GuardianSet = + Bridge::unpack_unchecked(&mut guardian_set_new_data)?; + + // The new guardian set must not exist + if guardian_set_new.is_initialized { + return Err(Error::AlreadyExists.into()); + } + + // Set values on the new guardian set + guardian_set_new.is_initialized = true; + guardian_set_new.index = b.new_index; + guardian_set_new.pubkey = b.new_key; + guardian_set_new.creation_time = clock.unix_timestamp as u32; + + // Update the bridge guardian set id + bridge.guardian_set_index = b.new_index; + + Ok(()) + } + + /// Processes a VAA transfer in + pub fn process_vaa_transfer( + program_id: &Pubkey, + accounts: &[AccountInfo], + account_info_iter: &mut Iter, + bridge_info: &AccountInfo, + bridge: &mut Bridge, + b: &BodyTransfer, + ) -> ProgramResult { + let mint_info = next_account_info(account_info_iter)?; + let destination_info = next_account_info(account_info_iter)?; + + let destination = Self::token_account_deserialize(destination_info)?; + if destination.mint != *mint_info.key { + return Err(Error::TokenMintMismatch.into()); + } + + if b.asset.chain == CHAIN_ID_SOLANA { + let custody_info = next_account_info(account_info_iter)?; + let expected_custody_id = + Bridge::derive_custody_id(program_id, bridge_info.key, mint_info.key)?; + if expected_custody_id != *custody_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // Native Solana asset, transfer from custody + Bridge::token_transfer_custody( + accounts, + &bridge.config.token_program, + bridge_info.key, + custody_info.key, + destination_info.key, + b.amount, + )?; + } else { + // Foreign chain asset, mint wrapped asset + let expected_mint_address = Bridge::derive_wrapped_asset_id( + program_id, + bridge_info.key, + b.asset.chain, + b.asset.address, + )?; + if expected_mint_address != *mint_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + // If wrapped mint does not exist, create it + if mint_info.data_is_empty() { + let sender_info = next_account_info(account_info_iter)?; + Self::create_wrapped_mint( + program_id, + accounts, + &bridge.config.token_program, + mint_info.key, + bridge_info.key, + sender_info.key, + &b.asset, + )?; + } + + Bridge::wrapped_mint_to( + accounts, + &bridge.config.token_program, + mint_info.key, + destination_info.key, + bridge_info.key, + b.amount, + )?; + } + + Ok(()) + } + + /// Processes a VAA post for data availability (for Solana -> foreign transfers) + pub fn process_vaa_transfer_post( + program_id: &Pubkey, + account_info_iter: &mut Iter, + bridge_info: &AccountInfo, + vaa: &VAA, + b: &BodyTransfer, + vaa_data: &[u8; 100], + ) -> ProgramResult { + let proposal_info = next_account_info(account_info_iter)?; + + // Check whether the proposal was derived correctly + let expected_proposal = Bridge::derive_transfer_id( + program_id, + bridge_info.key, + b.asset.chain, + b.asset.address, + b.target_chain, + b.target_address, + b.source_address, + b.ref_block, + )?; + if expected_proposal != *proposal_info.key { + return Err(Error::InvalidDerivedAccount.into()); + } + + let mut proposal = Self::transfer_out_proposal_deserialize(proposal_info)?; + if !proposal.matches_vaa(b) { + return Err(Error::VAAProposalMismatch.into()); + } + + // Set vaa + proposal.vaa = *vaa_data; + proposal.vaa_time = vaa.timestamp; + + Ok(()) + } +} + +// Test program id for the swap program. +#[cfg(not(target_arch = "bpf"))] +const WORMHOLE_PROGRAM_ID: Pubkey = Pubkey::new_from_array([2u8; 32]); +const TOKEN_PROGRAM_ID: Pubkey = Pubkey::new_from_array([2u8; 32]); + +/// Routes invokes to the token program, used for testing. +#[cfg(not(target_arch = "bpf"))] +pub fn invoke_signed<'a>( + instruction: &Instruction, + account_infos: &[AccountInfo<'a>], + signers_seeds: &[&[&[u8]]], +) -> ProgramResult { + let mut new_account_infos = vec![]; + for meta in instruction.accounts.iter() { + for account_info in account_infos.iter() { + if meta.pubkey == *account_info.key { + let mut new_account_info = account_info.clone(); + for seeds in signers_seeds.iter() { + let signer = + Pubkey::create_program_address(seeds, &WORMHOLE_PROGRAM_ID).unwrap(); + if *account_info.key == signer { + new_account_info.is_signer = true; + } + } + new_account_infos.push(new_account_info); + } + } + } + + match instruction.program_id { + TOKEN_PROGRAM_ID => spl_token::state::State::process( + &instruction.program_id, + &new_account_infos, + &instruction.data, + ), + _ => panic!(), + } +} + +#[cfg(test)] +mod tests { + use solana_sdk::{ + account::Account, account_info::create_is_signer_account_infos, instruction::Instruction, + }; + use spl_token::{ + instruction::{initialize_account, initialize_mint}, + state::{Account as SplAccount, Mint as SplMint, State as SplState}, + }; + + use crate::instruction::initialize; + + use super::*; + + const TOKEN_PROGRAM_ID: Pubkey = Pubkey::new_from_array([1u8; 32]); + + // Pulls in the stubs required for `info!()` + #[cfg(not(target_arch = "bpf"))] + solana_sdk::program_stubs!(); + + fn pubkey_rand() -> Pubkey { + Pubkey::new(&rand::random::<[u8; 32]>()) + } + + fn do_process_instruction( + instruction: Instruction, + accounts: Vec<&mut Account>, + ) -> ProgramResult { + let mut meta = instruction + .accounts + .iter() + .zip(accounts) + .map(|(account_meta, account)| (&account_meta.pubkey, account_meta.is_signer, account)) + .collect::>(); + + let account_infos = create_is_signer_account_infos(&mut meta); + if instruction.program_id == WORMHOLE_PROGRAM_ID { + Bridge::process(&instruction.program_id, &account_infos, &instruction.data) + } else { + SplState::process(&instruction.program_id, &account_infos, &instruction.data) + } + } + + fn create_bridge( + program_id: &Pubkey, + config: &BridgeConfig, + initial_guardians: &RawKey, + ) -> (Pubkey, Account) { + let token_key = pubkey_rand(); + let mut token_account = Account::new(0, size_of::(), &program_id); + let account_key = pubkey_rand(); + let mut account_account = Account::new(0, size_of::(), &program_id); + + // create pool and pool account + do_process_instruction( + initialize_account(&program_id, &account_key, &token_key, &authority_key).unwrap(), + vec![ + &mut account_account, + &mut Account::default(), + &mut token_account, + ], + ) + .unwrap(); + let mut authority_account = Account::default(); + do_process_instruction( + initialize_mint( + &program_id, + &token_key, + Some(&account_key), + Some(&authority_key), + amount, + 2, + ) + .unwrap(), + if amount == 0 { + vec![&mut token_account, &mut authority_account] + } else { + vec![ + &mut token_account, + &mut account_account, + &mut authority_account, + ] + }, + ) + .unwrap(); + + return ((account_key, account_account)); + } +} diff --git a/solana/bridge/src/state.rs b/solana/bridge/src/state.rs new file mode 100644 index 00000000..8f363ac7 --- /dev/null +++ b/solana/bridge/src/state.rs @@ -0,0 +1,528 @@ +//! Bridge transition types + +use std::io::Write; +use std::mem::size_of; +use std::slice::Iter; +use std::str; + +use num_traits::AsPrimitive; +use sha3::Digest; +use solana_sdk::clock::Clock; +use solana_sdk::hash::hash; +#[cfg(not(target_arch = "bpf"))] +use solana_sdk::instruction::Instruction; +use solana_sdk::log::sol_log; +#[cfg(target_arch = "bpf")] +use solana_sdk::program::invoke_signed; +use solana_sdk::rent::Rent; +use solana_sdk::system_instruction::{create_account, SystemInstruction}; +use solana_sdk::sysvar::Sysvar; +use solana_sdk::{ + account_info::next_account_info, account_info::AccountInfo, entrypoint::ProgramResult, info, + program_error::ProgramError, pubkey::bs58, pubkey::Pubkey, +}; +use spl_token::state::Mint; + +use crate::instruction::BridgeInstruction::*; +use crate::instruction::{ + BridgeInstruction, ForeignAddress, GuardianKey, TransferOutPayload, CHAIN_ID_SOLANA, VAA_BODY, +}; +#[cfg(not(target_arch = "bpf"))] +use crate::processor::invoke_signed; + +use crate::syscalls::{sol_verify_schnorr, RawKey, SchnorrifyInput}; +use crate::vaa::{BodyTransfer, BodyUpdateGuardianSet, VAABody, VAA}; +use crate::{error::Error, instruction::unpack}; +use zerocopy::AsBytes; + +/// fee rate as a ratio +#[repr(C)] +#[derive(Clone, Copy)] +pub struct Fee { + /// denominator of the fee ratio + pub denominator: u64, + /// numerator of the fee ratio + pub numerator: u64, +} + +/// guardian set +#[repr(C)] +#[derive(Clone, Copy)] +pub struct GuardianSet { + /// index of the set + pub index: u32, + /// public key of the threshold schnorr set + pub pubkey: RawKey, + /// creation time + pub creation_time: u32, + /// expiration time when VAAs issued by this set are no longer valid + pub expiration_time: u32, + + /// Is `true` if this structure has been initialized. + pub is_initialized: bool, +} + +impl IsInitialized for GuardianSet { + fn is_initialized(&self) -> bool { + self.is_initialized + } +} + +/// proposal to transfer tokens to a foreign chain +#[repr(C)] +#[derive(Clone, Copy)] +pub struct TransferOutProposal { + /// amount to transfer + pub amount: u64, + /// chain id to transfer to + pub to_chain_id: u8, + /// address on the foreign chain to transfer to + pub foreign_address: ForeignAddress, + /// asset that is being transferred + pub asset: AssetMeta, + /// vaa to unlock the tokens on the foreign chain + pub vaa: VAA_BODY, + /// time the vaa was submitted + pub vaa_time: u32, + + /// Is `true` if this structure has been initialized. + pub is_initialized: bool, +} + +impl IsInitialized for TransferOutProposal { + fn is_initialized(&self) -> bool { + self.is_initialized + } +} + +impl TransferOutProposal { + pub fn matches_vaa(&self, b: &BodyTransfer) -> bool { + return b.amount == self.amount + && b.target_address == self.foreign_address + && b.target_chain == self.to_chain_id + && b.asset == self.asset; + } +} + +/// record of a claimed VAA +#[repr(C)] +#[derive(Clone, Copy, Debug, Default, PartialEq)] +pub struct ClaimedVAA { + /// hash of the vaa + pub hash: [u8; 32], + /// time the vaa was submitted + pub vaa_time: u32, + + /// Is `true` if this structure has been initialized. + pub is_initialized: bool, +} + +impl IsInitialized for ClaimedVAA { + fn is_initialized(&self) -> bool { + self.is_initialized + } +} + +/// Metadata about an asset +#[repr(C)] +#[derive(Clone, Copy, Debug, Default, PartialEq)] +pub struct AssetMeta { + /// Address of the token + pub address: ForeignAddress, + + /// Chain of the token + pub chain: u8, +} + +/// Config for a bridge. +#[repr(C)] +#[derive(Clone, Copy, Debug, Default, PartialEq)] +pub struct BridgeConfig { + /// Period for how long a VAA is valid. This is also the period after a valid VAA has been + /// published to a `TransferOutProposal` or `ClaimedVAA` after which the account can be evicted. + /// This exists to guarantee data availability and prevent replays. + pub vaa_expiration_time: u32, + + /// Token program that is used for this bridge + pub token_program: Pubkey, +} + +/// Bridge state. +#[repr(C)] +#[derive(Clone, Copy, Debug, PartialEq)] +pub struct Bridge { + /// the currently active guardian set + pub guardian_set_index: u32, + + /// read-only config parameters for a bridge instance. + pub config: BridgeConfig, + + /// Is `true` if this structure has been initialized. + pub is_initialized: bool, +} + +impl IsInitialized for Bridge { + fn is_initialized(&self) -> bool { + self.is_initialized + } +} + +/// Implementation of serialization functions +impl Bridge { + /// Deserializes a spl_token `Account`. + pub fn token_account_deserialize( + info: &AccountInfo, + ) -> Result { + Ok(*spl_token::state::unpack(&mut info.data.borrow_mut()) + .map_err(|_| Error::ExpectedAccount)?) + } + + /// Deserializes a spl_token `Mint`. + pub fn mint_deserialize(info: &AccountInfo) -> Result { + Ok(*spl_token::state::unpack(&mut info.data.borrow_mut()) + .map_err(|_| Error::ExpectedToken)?) + } + + /// Deserializes a `Bridge`. + pub fn bridge_deserialize(info: &AccountInfo) -> Result { + Ok(*Bridge::unpack(&mut info.data.borrow_mut()).map_err(|_| Error::ExpectedBridge)?) + } + + /// Deserializes a `GuardianSet`. + pub fn guardian_set_deserialize(info: &AccountInfo) -> Result { + Ok(*Bridge::unpack(&mut info.data.borrow_mut()).map_err(|_| Error::ExpectedGuardianSet)?) + } + + /// Deserializes a `TransferOutProposal`. + pub fn transfer_out_proposal_deserialize( + info: &AccountInfo, + ) -> Result { + Ok(*Bridge::unpack(&mut info.data.borrow_mut()) + .map_err(|_| Error::ExpectedTransferOutProposal)?) + } + + /// Unpacks a token state from a bytes buffer while assuring that the state is initialized. + pub fn unpack(input: &mut [u8]) -> Result<&mut T, ProgramError> { + let mut_ref: &mut T = Self::unpack_unchecked(input)?; + if !mut_ref.is_initialized() { + return Err(Error::UninitializedState.into()); + } + Ok(mut_ref) + } + /// Unpacks a token state from a bytes buffer without checking that the state is initialized. + pub fn unpack_unchecked(input: &mut [u8]) -> Result<&mut T, ProgramError> { + if input.len() != size_of::() { + return Err(ProgramError::InvalidAccountData); + } + #[allow(clippy::cast_ptr_alignment)] + Ok(unsafe { &mut *(&mut input[0] as *mut u8 as *mut T) }) + } +} + +/// Implementation of actions +impl Bridge { + /// Burn a wrapped asset from account + pub fn wrapped_burn( + accounts: &[AccountInfo], + token_program_id: &Pubkey, + authority: &Pubkey, + token_account: &Pubkey, + amount: u64, + ) -> Result<(), ProgramError> { + let all_signers: Vec<&Pubkey> = accounts + .iter() + .filter_map(|item| if item.is_signer { Some(item.key) } else { None }) + .collect(); + let ix = spl_token::instruction::burn( + token_program_id, + token_account, + authority, + all_signers.as_slice(), + amount, + )?; + invoke_signed(&ix, accounts, &[]) + } + + /// Mint a wrapped asset to account + pub fn wrapped_mint_to( + accounts: &[AccountInfo], + token_program_id: &Pubkey, + mint: &Pubkey, + destination: &Pubkey, + bridge: &Pubkey, + amount: u64, + ) -> Result<(), ProgramError> { + let ix = spl_token::instruction::mint_to( + token_program_id, + mint, + destination, + bridge, + &[], + amount, + )?; + invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]]) + } + + /// Transfer tokens from a caller + pub fn token_transfer_caller( + accounts: &[AccountInfo], + token_program_id: &Pubkey, + source: &Pubkey, + destination: &Pubkey, + authority: &Pubkey, + amount: u64, + ) -> Result<(), ProgramError> { + let all_signers: Vec<&Pubkey> = accounts + .iter() + .filter_map(|item| if item.is_signer { Some(item.key) } else { None }) + .collect(); + let ix = spl_token::instruction::transfer( + token_program_id, + source, + destination, + authority, + all_signers.as_slice(), + amount, + )?; + invoke_signed(&ix, accounts, &[]) + } + + /// Transfer tokens from a custody account + pub fn token_transfer_custody( + accounts: &[AccountInfo], + token_program_id: &Pubkey, + bridge: &Pubkey, + source: &Pubkey, + destination: &Pubkey, + amount: u64, + ) -> Result<(), ProgramError> { + let ix = spl_token::instruction::transfer( + token_program_id, + source, + destination, + bridge, + &[], + amount, + )?; + invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]]) + } + + /// Create a new account + pub fn create_custody_account( + program_id: &Pubkey, + accounts: &[AccountInfo], + token_program: &Pubkey, + bridge: &Pubkey, + account: &Pubkey, + mint: &Pubkey, + payer: &Pubkey, + ) -> Result<(), ProgramError> { + Self::create_account::( + program_id, + accounts, + mint, + payer, + Self::derive_custody_seeds(bridge, mint), + )?; + let ix = spl_token::instruction::initialize_account(token_program, account, mint, bridge)?; + invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]]) + } + + /// Create a mint for a wrapped asset + pub fn create_wrapped_mint( + program_id: &Pubkey, + accounts: &[AccountInfo], + token_program: &Pubkey, + mint: &Pubkey, + bridge: &Pubkey, + payer: &Pubkey, + asset: &AssetMeta, + ) -> Result<(), ProgramError> { + Self::create_account::( + program_id, + accounts, + mint, + payer, + Self::derive_wrapped_asset_seeds(bridge, asset.chain, asset.address), + )?; + let ix = + spl_token::instruction::initialize_mint(token_program, mint, None, Some(bridge), 0, 8)?; + invoke_signed(&ix, accounts, &[&[&bridge.to_bytes()[..32]][..]]) + } + + /// Create a new account + pub fn create_account( + program_id: &Pubkey, + accounts: &[AccountInfo], + new_account: &Pubkey, + payer: &Pubkey, + seeds: Vec>, + ) -> Result<(), ProgramError> { + let size = size_of::(); + let ix = create_account( + payer, + new_account, + Rent::default().minimum_balance(size as usize), + size as u64, + program_id, + ); + let s: Vec<_> = seeds.iter().map(|item| item.as_slice()).collect(); + invoke_signed(&ix, accounts, &[s.as_slice()]) + } +} + +/// Implementation of derivations +impl Bridge { + /// Calculates derived seeds for a guardian set + pub fn derive_guardian_set_seeds(bridge_key: &Pubkey, guardian_set_index: u32) -> Vec> { + vec![ + "guardian".as_bytes().to_vec(), + bridge_key.to_bytes().to_vec(), + guardian_set_index.as_bytes().to_vec(), + ] + } + + /// Calculates derived seeds for a wrapped asset + pub fn derive_wrapped_asset_seeds( + bridge_key: &Pubkey, + asset_chain: u8, + asset: ForeignAddress, + ) -> Vec> { + vec![ + "wrapped".as_bytes().to_vec(), + bridge_key.to_bytes().to_vec(), + asset_chain.as_bytes().to_vec(), + asset.as_bytes().to_vec(), + ] + } + + /// Calculates derived seeds for a transfer out + pub fn derive_transfer_id_seeds( + bridge_key: &Pubkey, + asset_chain: u8, + asset: ForeignAddress, + target_chain: u8, + target_address: ForeignAddress, + user: ForeignAddress, + slot: u64, + ) -> Vec> { + vec![ + "transfer".as_bytes().to_vec(), + bridge_key.to_bytes().to_vec(), + asset_chain.as_bytes().to_vec(), + asset.as_bytes().to_vec(), + target_chain.as_bytes().to_vec(), + target_address.as_bytes().to_vec(), + user.as_bytes().to_vec(), + slot.as_bytes().to_vec(), + ] + } + + /// Calculates derived seeds for a bridge + pub fn derive_bridge_seeds(program_id: &Pubkey) -> Vec> { + vec![program_id.to_bytes().to_vec()] + } + + /// Calculates derived seeds for a custody account + pub fn derive_custody_seeds<'a>(bridge: &Pubkey, mint: &Pubkey) -> Vec> { + vec![ + "custody".as_bytes().to_vec(), + bridge.to_bytes().to_vec(), + mint.to_bytes().to_vec(), + ] + } + + /// Calculates derived seeds for a claim + pub fn derive_claim_seeds<'a>(bridge: &Pubkey, hash: &[u8; 32]) -> Vec> { + vec![ + "claim".as_bytes().to_vec(), + bridge.to_bytes().to_vec(), + hash.as_bytes().to_vec(), + ] + } + + /// Calculates a derived address for this program + pub fn derive_bridge_id(program_id: &Pubkey) -> Result { + Self::derive_key(program_id, Self::derive_bridge_seeds(program_id)) + } + + /// Calculates a derived address for a custody account + pub fn derive_custody_id( + program_id: &Pubkey, + bridge: &Pubkey, + mint: &Pubkey, + ) -> Result { + Self::derive_key(program_id, Self::derive_custody_seeds(bridge, mint)) + } + + /// Calculates a derived address for a claim account + pub fn derive_claim_id( + program_id: &Pubkey, + bridge: &Pubkey, + hash: &[u8; 32], + ) -> Result { + Self::derive_key(program_id, Self::derive_claim_seeds(bridge, hash)) + } + + /// Calculates a derived address for this program + pub fn derive_guardian_set_id( + program_id: &Pubkey, + bridge_key: &Pubkey, + guardian_set_index: u32, + ) -> Result { + Self::derive_key( + program_id, + Self::derive_guardian_set_seeds(bridge_key, guardian_set_index), + ) + } + + /// Calculates a derived seeds for a wrapped asset + pub fn derive_wrapped_asset_id( + program_id: &Pubkey, + bridge_key: &Pubkey, + asset_chain: u8, + asset: ForeignAddress, + ) -> Result { + Self::derive_key( + program_id, + Self::derive_wrapped_asset_seeds(bridge_key, asset_chain, asset), + ) + } + + /// Calculates a derived address for a transfer out + pub fn derive_transfer_id( + program_id: &Pubkey, + bridge_key: &Pubkey, + asset_chain: u8, + asset: ForeignAddress, + target_chain: u8, + target_address: ForeignAddress, + user: ForeignAddress, + slot: u64, + ) -> Result { + Self::derive_key( + program_id, + Self::derive_transfer_id_seeds( + bridge_key, + asset_chain, + asset, + target_chain, + target_address, + user, + slot, + ), + ) + } + + fn derive_key(program_id: &Pubkey, seeds: Vec>) -> Result { + let s: Vec<_> = seeds.iter().map(|item| item.as_slice()).collect(); + Pubkey::create_program_address(s.as_slice(), program_id) + .or(Err(Error::InvalidProgramAddress)) + } +} + +/// Check is a token state is initialized +pub trait IsInitialized { + /// Is initialized + fn is_initialized(&self) -> bool; +} diff --git a/solana/bridge/src/syscalls.rs b/solana/bridge/src/syscalls.rs new file mode 100644 index 00000000..5e535b1f --- /dev/null +++ b/solana/bridge/src/syscalls.rs @@ -0,0 +1,41 @@ +#[repr(C)] +pub struct SchnorrifyInput { + message: [u8; 32], + addr: [u8; 20], + signature: [u8; 32], + pub_key: RawKey, +} + +#[repr(C)] +#[derive(Copy, Clone, Debug, PartialOrd, PartialEq)] +pub struct RawKey { + pub x: [u8; 32], + pub y: [u8; 32], +} + +impl SchnorrifyInput { + pub fn new(pub_key: RawKey, message: [u8; 32], signature: [u8; 32], addr: [u8; 20]) -> SchnorrifyInput { + SchnorrifyInput { + message, + addr, + signature, + pub_key, + } + } +} + +/// Verify an ETH optimized Schnorr signature +/// +/// @param input - Input for signature verification +#[inline] +pub fn sol_verify_schnorr(input: &SchnorrifyInput) -> bool { + let res = unsafe { + sol_verify_ethschnorr(input as *const _ as *const u8) + }; + + res == 1 +} + +extern "C" { + fn sol_verify_ethschnorr(input: *const u8) -> u64; +} diff --git a/solana/bridge/src/vaa.rs b/solana/bridge/src/vaa.rs new file mode 100644 index 00000000..a96d73c5 --- /dev/null +++ b/solana/bridge/src/vaa.rs @@ -0,0 +1,299 @@ +use std::any::Any; +use std::io::{Cursor, Read, Write}; +use std::mem::size_of; + +use byteorder::{BigEndian, ReadBytesExt, WriteBytesExt}; +use sha3::Digest; +use solana_sdk::program_error::ProgramError; + +use crate::error::Error; +use crate::error::Error::InvalidVAAFormat; +use crate::instruction::unpack; +use crate::state::AssetMeta; +use crate::syscalls::{RawKey, SchnorrifyInput, sol_verify_schnorr}; +use crate::vaa::VAABody::UpdateGuardianSet; + +pub type ForeignAddress = [u8; 32]; + +#[derive(Clone, Debug, Default, PartialEq)] +pub struct VAA { + // Header part + pub version: u8, + pub guardian_set_index: u32, + pub signature_sig: [u8; 32], + pub signature_addr: [u8; 20], + + // Body part + pub timestamp: u32, + pub payload: Option, +} + +impl VAA { + pub fn new() -> VAA { + return VAA { + version: 0, + guardian_set_index: 0, + signature_sig: [0; 32], + signature_addr: [0; 20], + timestamp: 0, + payload: None, + }; + } + + pub fn verify(&self, guardian_key: &RawKey) -> bool { + let body = match self.signature_body() { + Ok(v) => { v } + Err(_) => { return false; } + }; + + let mut h = sha3::Keccak256::default(); + if let Err(_) = h.write(body.as_slice()) { return false; }; + let hash = h.finalize().into(); + + let schnorr_input = SchnorrifyInput::new(*guardian_key, hash, + self.signature_sig, self.signature_addr); + sol_verify_schnorr(&schnorr_input) + } + + pub fn serialize(&self) -> Result, Error> { + let mut v = Cursor::new(Vec::new()); + + v.write_u8(self.version)?; + v.write_u32::(self.guardian_set_index)?; + v.write(self.signature_sig.as_ref())?; + v.write(self.signature_addr.as_ref())?; + v.write_u32::(self.timestamp)?; + + let payload = self.payload.as_ref().ok_or(Error::InvalidVAAAction)?; + v.write_u8(payload.action_id())?; + + let payload_data = payload.serialize()?; + v.write(payload_data.as_slice())?; + + Ok(v.into_inner()) + } + + pub fn signature_body(&self) -> Result, Error> { + let mut v = Cursor::new(Vec::new()); + + v.write_u32::(self.timestamp)?; + + let payload = self.payload.as_ref().ok_or(Error::InvalidVAAAction)?; + v.write_u8(payload.action_id())?; + + let payload_data = payload.serialize()?; + v.write_u8(payload_data.len() as u8)?; + v.write(payload_data.as_slice())?; + + Ok(v.into_inner()) + } + + pub fn deserialize(data: &[u8]) -> Result { + let mut rdr = Cursor::new(data); + let mut v = VAA::new(); + + v.version = rdr.read_u8()?; + v.guardian_set_index = rdr.read_u32::()?; + rdr.read_exact(&mut v.signature_sig)?; + rdr.read_exact(&mut v.signature_addr)?; + + v.timestamp = rdr.read_u32::()?; + + let mut payload_d = Vec::new(); + rdr.read_to_end(&mut payload_d)?; + v.payload = Some(VAABody::deserialize(&payload_d)?); + + Ok(v) + } +} + +#[derive(Clone, Copy, Debug, PartialEq)] +pub enum VAABody { + UpdateGuardianSet(BodyUpdateGuardianSet), + Transfer(BodyTransfer), +} + +impl VAABody { + fn action_id(&self) -> u8 { + match self { + VAABody::UpdateGuardianSet(_) => 0x01, + VAABody::Transfer(_) => 0x10, + } + } + + fn deserialize(data: &Vec) -> Result { + let mut payload_data = Cursor::new(data); + let action = payload_data.read_u8()?; + + let payload = match action { + 0x01 => { + VAABody::UpdateGuardianSet(BodyUpdateGuardianSet::deserialize(&mut payload_data)?) + } + 0x10 => { + VAABody::Transfer(BodyTransfer::deserialize(&mut payload_data)?) + } + _ => { + return Err(Error::InvalidVAAAction); + } + }; + + Ok(payload) + } + + fn serialize(&self) -> Result, Error> { + match self { + VAABody::Transfer(b) => { + b.serialize() + } + VAABody::UpdateGuardianSet(b) => { + b.serialize() + } + } + } +} + +#[derive(Copy, Clone, Debug, PartialEq)] +pub struct BodyUpdateGuardianSet { + pub new_index: u32, + pub new_key: RawKey, +} + +#[derive(Copy, Clone, Debug, PartialEq)] +pub struct BodyTransfer { + pub ref_block: u64, + pub source_chain: u8, + pub source_address: ForeignAddress, + pub target_chain: u8, + pub target_address: ForeignAddress, + pub asset: AssetMeta, + pub amount: u64, +} + +impl BodyUpdateGuardianSet { + fn deserialize(data: &mut Cursor<&Vec>) -> Result { + let new_index = data.read_u32::()?; + let mut new_key_x: [u8; 32] = [0; 32]; + data.read(&mut new_key_x)?; + let mut new_key_y: [u8; 32] = [0; 32]; + data.read(&mut new_key_y)?; + + Ok(BodyUpdateGuardianSet { + new_index, + new_key: RawKey { + x: new_key_x, + y: new_key_y, + }, + }) + } + + fn serialize(&self) -> Result, Error> { + let mut v: Cursor> = Cursor::new(Vec::new()); + v.write_u32::(self.new_index)?; + v.write(&self.new_key.x)?; + v.write(&self.new_key.y)?; + + Ok(v.into_inner()) + } +} + +impl BodyTransfer { + fn deserialize(data: &mut Cursor<&Vec>) -> Result { + let ref_block = data.read_u64::()?; + let source_chain = data.read_u8()?; + let mut source_address: ForeignAddress = ForeignAddress::default(); + data.read(&mut source_address)?; + let target_chain = data.read_u8()?; + let mut target_address: ForeignAddress = ForeignAddress::default(); + data.read(&mut target_address)?; + let token_chain = data.read_u8()?; + let mut token_address: ForeignAddress = ForeignAddress::default(); + data.read(&mut token_address)?; + let amount = data.read_u64::()?; + + Ok(BodyTransfer { + ref_block, + source_chain, + source_address, + target_chain, + target_address, + asset: AssetMeta { + address: target_address, + chain: token_chain, + }, + amount, + }) + } + + fn serialize(&self) -> Result, Error> { + let mut v: Cursor> = Cursor::new(Vec::new()); + v.write_u8(self.source_chain)?; + v.write_u8(self.target_chain)?; + v.write(&self.target_address)?; + v.write_u8(self.asset.chain)?; + v.write(&self.asset.address)?; + v.write_u64::(self.amount)?; + + Ok(v.into_inner()) + } +} + +#[cfg(test)] +mod tests { + use std::io::Write; + + use hex; + + use crate::error::Error; + use crate::state::AssetMeta; + use crate::syscalls::RawKey; + use crate::vaa::{BodyTransfer, BodyUpdateGuardianSet, VAA, VAABody}; + + #[test] + fn serialize_deserialize_vaa_transfer() { + let vaa = VAA { + version: 8, + guardian_set_index: 3, + signature_sig: [7; 32], + signature_addr: [9; 20], + timestamp: 83, + payload: Some(VAABody::Transfer(BodyTransfer { + ref_block: 28, + source_chain: 1, + source_address: [9; 32], + target_chain: 2, + target_address: [1; 32], + asset: AssetMeta { + address: [2; 32], + chain: 8, + }, + amount: 4, + })), + }; + + let data = vaa.serialize().unwrap(); + let parsed_vaa = VAA::deserialize(data.as_slice()).unwrap(); + assert_eq!(vaa, parsed_vaa) + } + + #[test] + fn serialize_deserialize_vaa_guardian() { + let vaa = VAA { + version: 8, + guardian_set_index: 3, + signature_sig: [7; 32], + signature_addr: [9; 20], + timestamp: 83, + payload: Some(VAABody::UpdateGuardianSet(BodyUpdateGuardianSet { + new_index: 29, + new_key: RawKey { + x: [2; 32], + y: [3; 32], + }, + })), + }; + + let data = vaa.serialize().unwrap(); + let parsed_vaa = VAA::deserialize(data.as_slice()).unwrap(); + assert_eq!(vaa, parsed_vaa) + } +} diff --git a/solana/do.sh b/solana/do.sh new file mode 100755 index 00000000..138e33c5 --- /dev/null +++ b/solana/do.sh @@ -0,0 +1,171 @@ + +#!/usr/bin/env bash + +cd "$(dirname "$0")" + +usage() { + cat < +Supported actions: + build + build-lib + clean + clippy + doc + dump + fmt + test + update +Supported projects: + all + any directory containing a Cargo.toml file +EOF +} + +sdkParentDir=bin +sdkDir="$sdkParentDir"/bpf-sdk +profile=bpfel-unknown-unknown/release + +perform_action() { + set -e + projectDir="$PWD"/$2 + targetDir="$projectDir"/target + case "$1" in + build) + if [[ -f "$projectDir"/Xargo.toml ]]; then + "$sdkDir"/rust/build.sh "$projectDir" + + so_path="$targetDir/$profile" + so_name="spl_${2//\-/_}" + cp "$so_path/${so_name}.so" "$so_path/${so_name}_debug.so" + "$sdkDir"/dependencies/llvm-native/bin/llvm-objcopy --strip-all "$so_path/${so_name}.so" "$so_path/$so_name.so" + else + echo "$projectDir does not contain a program, skipping" + fi + ;; + build-lib) + ( + cd "$projectDir" + echo "build $projectDir" + export RUSTFLAGS="${@:3}" + cargo build + ) + ;; + clean) + "$sdkDir"/rust/clean.sh "$projectDir" + ;; + clippy) + ( + cd "$projectDir" + echo "clippy $projectDir" + cargo +nightly clippy --features=program ${@:3} + ) + ;; + doc) + ( + cd "$projectDir" + echo "generating docs $projectDir" + cargo doc ${@:3} + ) + ;; + dump) + # Dump depends on tools that are not installed by default and must be installed manually + # - greadelf + # - rustfilt + ( + pwd + "$0" build "$2" + + so_path="$targetDir/$profile" + so_name="spl_${2//\-/_}" + so="$so_path/${so_name}_debug.so" + dump="$so_path/${so_name}_dump" + + echo $so_path + echo $so_name + echo $so + echo $dump + + if [ -f "$so" ]; then + ls \ + -la \ + "$so" \ + >"${dump}_mangled.txt" + greadelf \ + -aW \ + "$so" \ + >>"${dump}_mangled.txt" + "$sdkDir/dependencies/llvm-native/bin/llvm-objdump" \ + -print-imm-hex \ + --source \ + --disassemble \ + "$so" \ + >>"${dump}_mangled.txt" + sed \ + s/://g \ + <"${dump}_mangled.txt" | + rustfilt \ + >"${dump}.txt" + else + echo "Warning: No dump created, cannot find: $so" + fi + ) + ;; + fmt) + ( + cd "$projectDir" + echo "formatting $projectDir" + cargo fmt ${@:3} + ) + ;; + help) + usage + exit + ;; + test) + ( + cd "$projectDir" + echo "test $projectDir" + cargo test --features=program ${@:3} + ) + ;; + update) + mkdir -p $sdkParentDir + ./bpf-sdk-install.sh $sdkParentDir + ./do.sh clean all + ;; + *) + echo "Error: Unknown command" + usage + exit + ;; + esac +} + +set -e +if [[ $1 == "update" ]]; then + perform_action "$1" + exit +else + if [[ "$#" -lt 2 ]]; then + usage + exit + fi + if [[ ! -d "$sdkDir" ]]; then + ./do.sh update + fi +fi + +if [[ $2 == "all" ]]; then + # Perform operation on all projects + for project in */; do + if [[ -f "$project"Cargo.toml ]]; then + perform_action "$1" "${project%/}" ${@:3} + else + continue + fi + done +else + # Perform operation on requested project + perform_action "$1" "$2" "${@:3}" +fi