Pricecaster V2-alpha (#716)
* Removed unnecessary file. Change-Id: Ic85cb42fef37028bc99d266148fae35107d2cf5f * Update sample pyth VAA information on README Change-Id: I2a4d3b23bfbc525d25f3f0360605aece0c104f4b * Test and lib fixes. Change-Id: I4af5e0313ba04b322f428a15a19bc7b30c6ae027 * Check owner balance + Feed ALGOs to stateless account address. Change-Id: Ibf57c66b24153b917f5d33febff97a002c163b59 * Working VAA verification test. Change-Id: Ib44e96ce8979161cdf703b1c4c92742cdc3e9cae * Lot of new tests and a little refactoring. Change-Id: Ic1da9be0a91fc3ace136c80cc5b2329cb3bf2e77 * Removed parts of old Pricekeeper logic Change-Id: Id77f4366d30dac2b89d039cea9b115a46a189e2d * Proper fetching, parsing and unpacking of Pyth-Wormhole data Change-Id: Id3b5002f072873d8161fa619f387171483a3e66c * Pricekeeper V2 PyTEAL contract. Change-Id: Idc1771e1ade371f51befdfd36ab6add55b3081fc * Streamlined and refac support library. Removed old code. Change-Id: I1f9633700527b1e0ca5ea9a38d24d3960e3e2341 * Changes to successfully publish price in target contract. Change-Id: Ie346648cec5b7b0b70786c2a99373df9bf71633d * pclib: Concurrent internal group TXs supported. Change-Id: I78e16d0dbf71c86fbb6be61e956aa370a4c48130 * Fetching and publishing from Wormhole/Spy. Removed most of old Pricekeeper V1 functionality. Simplified code. Change-Id: I197436c52460c04143501a60e3db9609159e9f25 * README + Deployment tool updated Change-Id: Iaf1f76ce69ea303f734c2a79f529f60ebf55a4ca * Modifications to use compiled stateless program. Change-Id: Ibc294412728052c1e29c7df929b3d9e481d714be * Removed old settings file. Change-Id: I1b8ca64426983b0a56f55f99a69304aaca702fee * Implements Randlabs Logger (C3PROT-92) Change-Id: Ia527169dc56bb2622fcde2fcfad53ed2efb5f399 * STEPS updated to 8. Change-Id: I9b092bb321231cde003e12b5a68cf90404f670f8 * Fixed handling double-hashing Change-Id: I5695e2783d439a85a61af44cab03ba99898cb16b * Added option to dump failed TX and diagnostic information in README Change-Id: If3d7b068d8d408851bcaae443ff412dc9cc30c69 * Fixed chainId handling. Change-Id: Id798a2e7afc0d646a179e3bd682204ba738fa53a * Successfully push prices to priceKeeper V2. Change-Id: Ib04da78b819e17579677e0187c9f5bd6bb1e2feb * Fixed price output log Change-Id: I99df39a05c667b5eb1af6cda988326cd768f89ee * Update WIP Tests. Change-Id: I4c2f94306dcaab578c30e487ceb6c140ea902ac3 * Support for VAAs with minimal quorum (> 2/3+1 signers ) Change-Id: I65dc52f6ef531cd24f7d080108451c5302e08524 * Remove old files. Change-Id: I9fd2127d9374617f53cb1cc6f721a2a655b79385 * Removed unnecessary entries in gitignore file Change-Id: I498ee2e192eb87d090767d8a12fd59ac679c8579 Co-authored-by: Josh Siegel <jsiegel@jumptrading.com> Co-authored-by: jumpsiegel <83408952+jumpsiegel@users.noreply.github.com>
This commit is contained in:
parent
5d90af5195
commit
9fdda91368
|
@ -10,4 +10,3 @@ venv
|
|||
.env
|
||||
bigtable-admin.json
|
||||
bigtable-writer.json
|
||||
.DS_Store
|
||||
|
|
|
@ -103,7 +103,6 @@ dist
|
|||
# TernJS port file
|
||||
.tern-port
|
||||
|
||||
build/*
|
||||
teal/wormhole/pyteal/__pycache__/*
|
||||
teal/wormhole/build/*
|
||||
teal/wormhole/build/*.teal
|
||||
test/temp/*.teal
|
||||
|
|
|
@ -1,23 +1,16 @@
|
|||
|
||||
# Pricecaster Service
|
||||
# Pricecaster Service V2
|
||||
|
||||
## Introduction
|
||||
|
||||
This service consumes prices from "price fetchers" and feeds blockchain publishers. There are two basic flows implemented:
|
||||
This service consumes prices from "price fetchers" and feeds blockchain publishers.
|
||||
|
||||
* A basic Algorand publisher class with a TEAL program for messages containing signed price data. The program code validates signature and message validity, and if successful, subsequently stores the price information in the global application information for other contracts to retrieve. For the description of the data format used, see below.
|
||||
|
||||
* A Wormhole client that uses the JS SDK to get VAAs from Pyth network and feed the payload and cryptographic verification data to a transaction group for validation. Subsequently, the data is optionally processed and stored, either price or metrics. For details regarding Wormhole VAAs see design documents:
|
||||
The current implementation is a Wormhole client that uses the JS SDK to get VAAs from Pyth network and feed the payload and cryptographic verification data to a transaction group for validation. Subsequently, the data is optionally processed and stored, either price or metrics. For details regarding Wormhole VAAs see design documents:
|
||||
|
||||
https://github.com/certusone/wormhole/tree/dev.v2/whitepapers
|
||||
|
||||
All gathered price information is stored in a buffer by the Fetcher component -with a maximum size determined by settings-. The price to get from that buffer is selected by the **IStrategy** class implementation; the default implementation being to get the most recent price and clear the buffer for new items to arrive.
|
||||
|
||||
Alternative strategies for different purposes, such as getting averages and forecasting, can be implemented easily.
|
||||
|
||||
## System Overview
|
||||
|
||||
|
||||
**The objective is to receive signed messages -named as Verifiable Attestments (VAAs) in Wormhole jargon- from our relayer backend (Pricecaster) , verify them against a fixed (and upgradeable) set of "guardian public keys" and process them, publishing on-chain price information or doing governance chores depending on the VAA payload.**
|
||||
|
||||
|
||||
|
@ -26,7 +19,9 @@ The design is based in two contracts that work in tandem, a **Stateful contract
|
|||
Due to computation and space limits, the validation of the 19 guardian signatures against the payload is partitioned so each stateless contract validates a subset of the guardian signatures. If ECDSA decompress and validation opcodes are used, that yields 650+1750 = 2400 computation units * 7 = 16800, leaving 3200 free units for remaining opcodes.
|
||||
In our design, We call **verification step** to each of the app calls + stateless logic involved in verifying a block of signatures.
|
||||
|
||||
The number of signatures in each verification step is fixed at contract compilation stage, so with this in mind and example values:
|
||||
Keep in mind that *not all* the 19 signatures must be present in a VAA verification, but at least 1 + (2/3) of the current guardian set.
|
||||
|
||||
The maximum number of signatures in each verification step is fixed at contract compilation stage, so with this in mind and example values:
|
||||
|
||||
* let $N_S$ be the total signatures to verify $(19)$
|
||||
* let $N_V$ be the number of signatures per verification step $(7)$,
|
||||
|
@ -45,7 +40,22 @@ With the above in mind, and considering the space and computation limits in the
|
|||
| --- | --------- | --------------- |
|
||||
| 0 | _args_: guardian_pk[0..6], _txnote_: signed_digest | _args_: sig[0..6] |
|
||||
| 1 | _args_: guardian_pk[7..13], _txnote_: signed_digest | _args_: sig[7..13] |
|
||||
| 2 | _args_: guardian_pk[14..18], _txnote_: signed_digest | _args_: sig[14..18] |
|
||||
| 2 | _args_: guardian_pk[14..18], _txnote_: signed_digest | _args_: sig[14..18] |
|
||||
| 3 | VAA consume call | N/A |
|
||||
|
||||
The current design requires the last call to be a call to an authorized application. This is intended to process VAA price data. The authorized appid must be set accordingly using the `setauthid` call in the VAA Processor contract after deployment.
|
||||
If no call is going to be made, a dummy app call must be inserted in group for the transaction group to succeed.
|
||||
|
||||
To mantain the long-term transaction costs predictable, when not all signatures are provided but > TRUNC(N_S*2/3)+1, the number of transactions in the group does not change, but a transaction may have zero signatures as input, e.g for a VAA with 14 signatures:
|
||||
|
||||
| TX# | App calls | Stateless logic |
|
||||
| --- | --------- | --------------- |
|
||||
| 0 | _args_: guardian_pk[0..6], _txnote_: signed_digest | _args_: sig[0..6] |
|
||||
| 1 | _args_: guardian_pk[7..13], _txnote_: signed_digest | _args_: sig[7..13] |
|
||||
| 2 | _args_: guardian_pk[14..18], _txnote_: signed_digest | _args_: **empty** |
|
||||
| 3 | VAA consume call | N/A |
|
||||
|
||||
The backend will currently **call the Pricekeeper V2 contract to store data** as the last TX group. See below for details on how Pricekeeper works.
|
||||
|
||||
Regarding stateless logic we can say that,
|
||||
|
||||
|
@ -65,7 +75,7 @@ For the stateful app-calls we consider,
|
|||
* Note field must contain signed digest.
|
||||
* Passed guardian keys $[k..j]$ must match the current global state.
|
||||
* Passed guardian size set must match the current global state.
|
||||
* Last TX in group triggers VAA processing according to fields (e.g: do governance chores, unpack Pyth price ticker, etc)
|
||||
* Last TX in the verification step (total group size-1) triggers VAA processing according to fields (e.g: do governance chores, unpack Pyth price ticker, etc). Last TX in the entire group must be an authorized application call.
|
||||
|
||||
**VAA Structure**
|
||||
|
||||
|
@ -105,63 +115,31 @@ Each VAA is uniquely identified by tuple (emitter_chain_id, emitter_address, seq
|
|||
|
||||
* Pyth Ticker Data
|
||||
|
||||
After all signatures are verified the stateful app will execute the code to handle the VAA according to the tuple fields.
|
||||
## Pricekeeper V2 App
|
||||
|
||||
The Pricekeeper V2 App mantains a record of product/asset symbols (e.g ALGO/USD, BTC/USDT) and the price and metrics information associated. As the original Pyth Payload is 150-bytes long and it wouldn't fit in the key-value entry of the global state, the Pricekeeper contract slices the Pyth fields to a more compact format, discarding unneeded information.
|
||||
|
||||
The Pricekeeper V2 App will allow storage to succeed only if:
|
||||
|
||||
## System Overview (proof-of-concept work)
|
||||
* Sender is the contract owner.
|
||||
* Call is part of a group where all application calls are from the expected VAA processor Appid,
|
||||
* Call is part of a group where the verification slot has all bits set.
|
||||
|
||||
:warning: You can consider this a first proof-of-concept design, and in terms of our current approach, an obsolete technique.
|
||||
At deployment, the priceKeeper V2 contract must have the "vaapid" global field set accordingly.
|
||||
|
||||
This flow uses a validator to sign the messages when they arrive. This trusts the price feed, so this is not recommended for production purposes. It may be used as a base design for other data flows. **See the Wormhole Flow below for the verified, cryptographically safe and trustless approach**.
|
||||
|
||||
The Pricecaster backend can be configured with any class implementing **IPriceFetcher** and **IPublisher** interfaces. The following diagram shows the service operating with a fetcher from , feeding the Algorand chain through the `StdAlgoPublisher` class.
|
||||
|
||||

|
||||
|
||||
### Input Message Format
|
||||
|
||||
The TEAL contract expects a fixed-length message consisting of:
|
||||
Consumers must interpret the stored bytes as fields organized as:
|
||||
|
||||
```
|
||||
Field size
|
||||
9 header Literal "PRICEDATA"
|
||||
1 version int8 (Must be 1)
|
||||
8 dest This appId
|
||||
16 symbol String padded with spaces e.g ("ALGO/USD ")
|
||||
8 price Price. 64bit integer.
|
||||
8 priceexp Price exponent. Interpret as two-compliment, Big-Endian 64bit
|
||||
8 conf Confidence (stdev). 64bit integer.
|
||||
8 slot Valid-slot of this aggregate price.
|
||||
8 ts timestamp of this price submitted by PriceFetcher service
|
||||
32 s Signature s-component
|
||||
32 r Signature r-component
|
||||
|
||||
Size: 138 bytes.
|
||||
```
|
||||
|
||||
### Global state
|
||||
|
||||
The global state that is mantained by the contract consists of the following fields:
|
||||
|
||||
```
|
||||
sym : byte[] Symbol to keep price for
|
||||
vaddr : byte[] Validator account
|
||||
price : uint64 current price
|
||||
stdev : uint64 current confidence (standard deviation)
|
||||
slot : uint64 slot of this onchain publication
|
||||
exp : byte[] exponent. Interpret as two-compliment, Big-Endian 64bit
|
||||
ts : uint64 last timestamp
|
||||
```
|
||||
|
||||
#### Price parsing
|
||||
|
||||
The exponent is stored as a byte array containing a signed, two-complement 64-bit Big-Endian integer, as some networks like Pyth publish negative values here. For example, to parse the byte array from JS:
|
||||
|
||||
```
|
||||
const stExp = await tools.readAppGlobalStateByKey(algodClient, appId, VALIDATOR_ADDR, 'exp')
|
||||
const bufExp = Buffer.from(stExp, 'base64')
|
||||
const val = bufExp.readBigInt64BE()
|
||||
Bytes
|
||||
32 productId
|
||||
32 priceId
|
||||
8 price
|
||||
1 price_type
|
||||
4 exponent
|
||||
8 twap value
|
||||
8 twac value
|
||||
8 confidence
|
||||
8 timestamp (based on Solana contract call time)
|
||||
```
|
||||
|
||||
## Installation
|
||||
|
@ -176,48 +154,112 @@ npm install
|
|||
|
||||
Use the deployment tools in `tools` subdirectory.
|
||||
|
||||
* To deploy the proof-of-concept "Pricekeeper" system, use the `deploy` tool with proper arguments, and later point the settings file to the deployed Appid.
|
||||
|
||||
* To deploy the VAA processor to use with Wormhole, make sure you have Python environment running (preferably >=3.7.0), and `pyteal` installed with `pip3`.
|
||||
* To deploy the VAA processor and Pricekeeper V2 app to use with Wormhole, make sure you have Python environment running (preferably >=3.7.0), and `pyteal` installed with `pip3`.
|
||||
* The deployment program will: generate all TEAL files from PyTEAL sources, deploy the VAA Processor application, deploy the Pricekeeper V2 contract, compile the stateless program and set the correct parameters for the contracts: authid, vphash in VAA Processor and vaapid in the Pricekeeper app.
|
||||
|
||||
For example, using `deploy-wh` with sample output:
|
||||
|
||||
```
|
||||
node tools\deploy-wh.js tools\v1.prototxt.testnet 1000 OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU testnet
|
||||
$ node tools\deploy-wh.js tools\gkeys.test 1000 OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU testnet keys\owner.key
|
||||
|
||||
VAA Processor for Wormhole Deployment Tool -- (c)2021-22 Randlabs, Inc.
|
||||
-----------------------------------------------------------------------
|
||||
Pricecaster v2 Apps Deployment Tool
|
||||
Copyright (c) Randlabs Inc, 2021-22
|
||||
|
||||
Parameters for deployment:
|
||||
From: OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU
|
||||
Network: testnet
|
||||
Guardian expiration time: 1000
|
||||
Guardian Keys: (19) 13947Bd48b18E53fdAeEe77F3473391aC727C638,F18AbBac073741DD0F002147B735Ff642f3D113F,9925A94DC043D0803f8ef502D2dB15cAc9e02D76,9e4EC2D92af8602bCE74a27F99A836f93C4a31E4,9C40c4052A3092AfB8C99B985fcDfB586Ed19c98,B86020cF1262AA4dd5572Af76923E271169a2CA7,1937617fE1eD801fBa14Bd8BB9EDEcBA7A942FFe,9475b8D45DdE53614d92c779787C27fE2ef68752,15A53B22c28AbC7B108612146B6aAa4a537bA305,63842657C7aC7e37B04FBE76b8c54EFe014D04E1,948ca1bBF4B858DF1A505b4C69c5c61bD95A12Bd,A6923e2259F8B5541eD18e410b8DdEE618337ff0,F678Daf4b7f2789AA88A081618Aa966D6a39e064,8cF31021838A8B3fFA43a71a50609877846f9E6d,eB15bCF2ae4f957012330B4741ecE3242De96184,cc3766a03e4faec44Bda7a46D9Ea2A9D124e9Bf8,841f499Ba89a6a8E9dD273BAd82Beb175094E5d7,f5F2b82576e6CA17965dee853d08bbB471FA2433,2bC2B1204599D4cA0d4Dde4a658a42c4dD13103a
|
||||
Guardian Keys: (1) 13947Bd48b18E53fdAeEe77F3473391aC727C638
|
||||
|
||||
Enter YES to confirm parameters, anything else to abort. YES
|
||||
Compiling programs ...
|
||||
|
||||
Enter mnemonic for sender account.
|
||||
BE SURE TO DO THIS FROM A SECURED SYSTEM
|
||||
.
|
||||
.
|
||||
.
|
||||
Compiling VAA Processor program code...
|
||||
,VAA Processor Program, (c) 2021-22 Randlabs Inc.
|
||||
Compiling approval program...
|
||||
Written to teal/wormhole/build/vaa-processor-approval.teal
|
||||
Compiling clear state program...
|
||||
Written to teal/wormhole/build/vaa-processor-clear.teal
|
||||
,
|
||||
Creating new app...
|
||||
txId: DX7YIQ6L5QELSNZHJGKSZ4MQA7U26KJCPUJ42UFEGU22MJWDLY5Q
|
||||
Deployment App Id: 43816461
|
||||
,Pricekeeper V2 Program, (c) 2021-22 Randlabs Inc.
|
||||
Compiling approval program...
|
||||
Written to teal/wormhole/build/pricekeeper-v2-approval.teal
|
||||
Compiling clear state program...
|
||||
Written to teal/wormhole/build/pricekeeper-v2-clear.teal
|
||||
,
|
||||
Creating VAA Processor...
|
||||
txId: WS7GE5A6YAADHVNH5OU337MK7T325AE2GML5S3RWK2VTNCQ23HWA
|
||||
Deployment App Id: 52438261
|
||||
Creating Pricekeeper V2...
|
||||
txId: FICS3HFALLJTMFGEVC65IQ67NCYRJATR32QWZS5VMKGEXHBJJUVA
|
||||
Deployment App Id: 52438280
|
||||
Setting VAA Processor authid parameter...
|
||||
txId: 5NVJGG32DRWAURD3LUHPELJAZTFMM6HLAJPPGNPXNDC5FJFDNVUQ
|
||||
Compiling verify VAA stateless code...
|
||||
,VAA Verify Stateless Program, (c) 2021-22 Randlabs Inc.
|
||||
Compiling...
|
||||
Written to teal/wormhole/build/vaa-verify.teal
|
||||
,
|
||||
Stateless program address: KRNYKVVWZDCNOPLL63ZHFOKG2IIY7REBYTPVR5TJLD67JR6FMRJXYW63TI
|
||||
Setting VAA Processor stateless code...
|
||||
txId: 5NVJGG32DRWAURD3LUHPELJAZTFMM6HLAJPPGNPXNDC5FJFDNVUQ
|
||||
Writing deployment results file DEPLOY-1639769594911...
|
||||
Writing stateless code binary file VAA-VERIFY-1639769594911.BIN...
|
||||
Bye.
|
||||
```
|
||||
|
||||
* To operate, the stateless contract address must be supplied with funds to pay fees when submitting transactions.
|
||||
* Use the generated `DEPLOY-XXX` file to set values in the `settings-worm.ts` file (or your current one): app ids and stateless hash.
|
||||
* Copy the generated `VAA-VERIFY-xxx` file as `vaa-verify.bin` under the `bin` directory.
|
||||
|
||||
## Backend Configuration
|
||||
|
||||
The backend will read configuration from a `settings.ts` file pointed by the `PRICECASTER_SETTINGS` environment variable.
|
||||
|
||||
### Diagnosing failed transactions
|
||||
|
||||
If a transaction fails, a diagnostic system is available where the group TX is dumped in a directory. To use this, set the relevant settings file:
|
||||
|
||||
```
|
||||
algo: {
|
||||
...
|
||||
dumpFailedTx: true,
|
||||
dumpFailedTxDirectory: './dump'
|
||||
},
|
||||
```
|
||||
|
||||
The dump directory will be filled with files named `failed-xxxx.stxn`. You can use this file and `goal clerk` to trigger the stateless logic checks:
|
||||
|
||||
```
|
||||
root@47d99e4cfffc:~/testnetwork/Node# goal clerk dryrun -t failed-1641324602942.stxn
|
||||
tx[0] trace:
|
||||
1 intcblock 1 8 0 32 66 20 => <empty stack>
|
||||
9 bytecblock 0x => <empty stack>
|
||||
12 txn Fee => (1000 0x3e8)
|
||||
14 pushint 1000 => (1000 0x3e8)
|
||||
.
|
||||
.
|
||||
.
|
||||
47 txn ApplicationID => (622608992 0x251c4260)
|
||||
49 pushint 596576475 => (596576475 0x238f08db)
|
||||
55 == => (0 0x0)
|
||||
56 assert =>
|
||||
56 assert failed pc=56
|
||||
|
||||
REJECT
|
||||
ERROR: assert failed pc=56
|
||||
```
|
||||
|
||||
In this example output, this means the logic failed due to mismatched stateful application id.
|
||||
|
||||
|
||||
For a stateful run, you must do a remote dryrun. This is done by:
|
||||
|
||||
```
|
||||
goal clerk dryrun -t failed-1641324602942.stxn --dryrun-dump -o dump.dr
|
||||
goal clerk dryrun-remote -D dump.dr -v
|
||||
|
||||
```
|
||||
|
||||
## Running the system
|
||||
|
||||
Check the `package.json` file for `npm run tart-xxx` automated commands.
|
||||
|
@ -234,6 +276,13 @@ Backend tests will come shortly.
|
|||
|
||||
## Appendix
|
||||
|
||||
### Common errors
|
||||
|
||||
**TransactionPool.Remember: transaction XMGXHGC4GVEHQD2T7MZDKTFJWFRY5TFXX2WECCXBWTOZVHC7QLAA: overspend, account X**
|
||||
|
||||
If account X is the stateless program address, this means that this account is without enough balance to pay the fees for each TX group.
|
||||
|
||||
|
||||
### Sample Pyth VAA
|
||||
|
||||
This is a sample signed VAA from Pyth that we process.
|
||||
|
|
|
@ -0,0 +1,52 @@
|
|||
/* eslint-disable no-unused-vars */
|
||||
/* eslint-disable camelcase */
|
||||
/**
|
||||
* Pricecaster Service.
|
||||
*
|
||||
* Fetcher backend component.
|
||||
*
|
||||
* (c) 2021 Randlabs, Inc.
|
||||
*/
|
||||
|
||||
export type Symbol = {
|
||||
name: string,
|
||||
productId: string,
|
||||
priceId: string,
|
||||
publishIntervalSecs: number,
|
||||
pubCount: number
|
||||
}
|
||||
|
||||
export type VAA = {
|
||||
version: number,
|
||||
guardian_set_index: number,
|
||||
signatures: [],
|
||||
timestamp: number,
|
||||
nonce: number,
|
||||
emitter_chain: number,
|
||||
emitter_address: [],
|
||||
sequence: number,
|
||||
consistency_level: number,
|
||||
payload: []
|
||||
}
|
||||
|
||||
export type PythData = {
|
||||
vaaBody: Buffer,
|
||||
signatures: Buffer,
|
||||
|
||||
// Informational fields.
|
||||
|
||||
symbol?: string,
|
||||
price_type?: number,
|
||||
price?: BigInt,
|
||||
exponent?: number,
|
||||
twap?: BigInt,
|
||||
twap_num_upd?: BigInt,
|
||||
twap_denom_upd?: BigInt,
|
||||
twac?: BigInt,
|
||||
twac_num_upd?: BigInt,
|
||||
twac_denom_upd?: BigInt,
|
||||
confidence?: BigInt,
|
||||
status?: number,
|
||||
corporate_act?: number,
|
||||
timestamp?: BigInt
|
||||
}
|
|
@ -1,3 +1,4 @@
|
|||
/* eslint-disable camelcase */
|
||||
/**
|
||||
* Pricecaster Service.
|
||||
*
|
||||
|
@ -10,50 +11,110 @@
|
|||
* A generic Price ticker information class
|
||||
*/
|
||||
export class PriceTicker {
|
||||
constructor (price: BigInt, confidence: BigInt, exponent: number, networkTime: BigInt) {
|
||||
constructor (
|
||||
symbol: string,
|
||||
price: BigInt,
|
||||
price_type: number,
|
||||
confidence: BigInt,
|
||||
exponent: number,
|
||||
twap: BigInt,
|
||||
twac: BigInt,
|
||||
timestamp: BigInt,
|
||||
user_data?: any) {
|
||||
this._symbol = symbol
|
||||
this._price = price
|
||||
this._price_type = price_type
|
||||
this._confidence = confidence
|
||||
this._exponent = exponent
|
||||
this._networkTime = networkTime
|
||||
this._timestamp = timestamp
|
||||
this._twap = twap
|
||||
this._twac = twac
|
||||
this._user_data = user_data
|
||||
}
|
||||
|
||||
/** price */
|
||||
private _price: BigInt;
|
||||
public get price (): BigInt {
|
||||
return this._price
|
||||
}
|
||||
private _symbol: string
|
||||
public get symbol (): string {
|
||||
return this._symbol
|
||||
}
|
||||
|
||||
public set price (value: BigInt) {
|
||||
this._price = value
|
||||
}
|
||||
public set symbol (value: string) {
|
||||
this._symbol = value
|
||||
}
|
||||
|
||||
/** a confidence interval */
|
||||
private _confidence: BigInt;
|
||||
public get confidence (): BigInt {
|
||||
return this._confidence
|
||||
}
|
||||
/** price */
|
||||
private _price: BigInt;
|
||||
public get price (): BigInt {
|
||||
return this._price
|
||||
}
|
||||
|
||||
public set confidence (value: BigInt) {
|
||||
this._confidence = value
|
||||
}
|
||||
public set price (value: BigInt) {
|
||||
this._price = value
|
||||
}
|
||||
|
||||
/** exponent (fixed point) */
|
||||
private _exponent: number;
|
||||
public get exponent (): number {
|
||||
return this._exponent
|
||||
}
|
||||
/** price_type */
|
||||
private _price_type: number
|
||||
public get price_type (): number {
|
||||
return this._price_type
|
||||
}
|
||||
|
||||
public set exponent (value: number) {
|
||||
this._exponent = value
|
||||
}
|
||||
public set price_type (value: number) {
|
||||
this._price_type = value
|
||||
}
|
||||
|
||||
/** time in blockchain network units */
|
||||
private _networkTime: BigInt;
|
||||
public get networkTime (): BigInt {
|
||||
return this._networkTime
|
||||
}
|
||||
/** a confidence interval */
|
||||
private _confidence: BigInt;
|
||||
public get confidence (): BigInt {
|
||||
return this._confidence
|
||||
}
|
||||
|
||||
public set networkTime (value: BigInt) {
|
||||
this._networkTime = value
|
||||
}
|
||||
public set confidence (value: BigInt) {
|
||||
this._confidence = value
|
||||
}
|
||||
|
||||
/** exponent (fixed point) */
|
||||
private _exponent: number;
|
||||
public get exponent (): number {
|
||||
return this._exponent
|
||||
}
|
||||
|
||||
public set exponent (value: number) {
|
||||
this._exponent = value
|
||||
}
|
||||
|
||||
/** time in blockchain network units */
|
||||
private _timestamp: BigInt;
|
||||
public get timestamp (): BigInt {
|
||||
return this._timestamp
|
||||
}
|
||||
|
||||
public set timestamp (value: BigInt) {
|
||||
this._timestamp = value
|
||||
}
|
||||
|
||||
private _twac: BigInt
|
||||
public get twac (): BigInt {
|
||||
return this._twac
|
||||
}
|
||||
|
||||
public set twac (value: BigInt) {
|
||||
this._twac = value
|
||||
}
|
||||
|
||||
private _twap: BigInt
|
||||
public get twap (): BigInt {
|
||||
return this._twap
|
||||
}
|
||||
|
||||
public set twap (value: BigInt) {
|
||||
this._twap = value
|
||||
}
|
||||
|
||||
private _user_data: any
|
||||
public get user_data (): any {
|
||||
return this._user_data
|
||||
}
|
||||
|
||||
public set user_data (value: any) {
|
||||
this._user_data = value
|
||||
}
|
||||
}
|
||||
|
|
|
@ -6,23 +6,38 @@
|
|||
* (c) 2021 Randlabs, Inc.
|
||||
*/
|
||||
|
||||
import { Options } from '@randlabs/js-logger'
|
||||
import { Symbol } from './basetypes'
|
||||
|
||||
export interface IAppSettings extends Record<string, unknown> {
|
||||
mode: string,
|
||||
algo: {
|
||||
token: string,
|
||||
api: string,
|
||||
port: string,
|
||||
},
|
||||
pyth?: {
|
||||
solanaClusterName?: string
|
||||
},
|
||||
params: {
|
||||
verbose?: boolean,
|
||||
symbol: string,
|
||||
bufferSize: number,
|
||||
publishIntervalSecs: number,
|
||||
priceKeeperAppId: BigInt,
|
||||
validator: string,
|
||||
mnemo?: string
|
||||
}
|
||||
log: Options,
|
||||
algo: {
|
||||
token: string,
|
||||
api: string,
|
||||
port: string,
|
||||
dumpFailedTx: boolean,
|
||||
dumpFailedTxDirectory?: string
|
||||
},
|
||||
apps: {
|
||||
priceKeeperV2AppId: number,
|
||||
ownerAddress: string,
|
||||
ownerKeyFile: string,
|
||||
vaaVerifyProgramBinFile: string,
|
||||
vaaVerifyProgramHash: string,
|
||||
vaaProcessorAppId: number,
|
||||
},
|
||||
pyth: {
|
||||
chainId: number,
|
||||
emitterAddress: string,
|
||||
},
|
||||
debug?: {
|
||||
logAllVaa?: boolean,
|
||||
}
|
||||
wormhole: {
|
||||
spyServiceHost: string
|
||||
},
|
||||
strategy: {
|
||||
bufferSize: number
|
||||
},
|
||||
symbols: Symbol[]
|
||||
}
|
||||
|
|
|
@ -1,101 +0,0 @@
|
|||
/**
|
||||
* Pricecaster Service.
|
||||
*
|
||||
* Fetcher backend component.
|
||||
*
|
||||
* (c) 2021 Randlabs, Inc.
|
||||
*/
|
||||
|
||||
import { IEngine } from './IEngine'
|
||||
import { PythPriceFetcher } from '../fetcher/PythPriceFetcher'
|
||||
import { StdAlgoPublisher } from '../publisher/stdAlgoPublisher'
|
||||
import { StrategyLastPrice } from '../strategy/strategyLastPrice'
|
||||
import { IAppSettings } from '../common/settings'
|
||||
import { IPriceFetcher } from '../fetcher/IPriceFetcher'
|
||||
import { IPublisher, PublishInfo } from '../publisher/IPublisher'
|
||||
import { PriceTicker } from '../common/priceTicker'
|
||||
import { StatusCode } from '../common/statusCodes'
|
||||
import { sleep } from '../common/sleep'
|
||||
const algosdk = require('algosdk')
|
||||
const charm = require('charm')()
|
||||
|
||||
type WorkerRoutineStatus = {
|
||||
status: StatusCode,
|
||||
reason?: string,
|
||||
tick?: PriceTicker,
|
||||
pub?: PublishInfo
|
||||
}
|
||||
|
||||
async function workerRoutine (fetcher: IPriceFetcher, publisher: IPublisher): Promise<WorkerRoutineStatus> {
|
||||
const tick = fetcher.queryTicker()
|
||||
if (tick === undefined) {
|
||||
return { status: StatusCode.NO_TICKER }
|
||||
}
|
||||
const pub = await publisher.publish(tick)
|
||||
return { status: pub.status, reason: pub.reason, tick, pub }
|
||||
}
|
||||
|
||||
export class PriceKeeperEngine implements IEngine {
|
||||
private settings: IAppSettings
|
||||
|
||||
constructor (settings: IAppSettings) {
|
||||
this.settings = settings
|
||||
}
|
||||
|
||||
async start () {
|
||||
charm.write('Setting up for')
|
||||
.foreground('yellow')
|
||||
.write(` ${this.settings.params.symbol} `)
|
||||
.foreground('white')
|
||||
.write('for PriceKeeper App')
|
||||
.foreground('yellow')
|
||||
.write(` ${this.settings.params.priceKeeperAppId} `)
|
||||
.foreground('white')
|
||||
.write(`interval ${this.settings.params.publishIntervalSecs} secs\n`)
|
||||
|
||||
const publisher = new StdAlgoPublisher(this.settings.params.symbol,
|
||||
this.settings.params.priceKeeperAppId,
|
||||
this.settings.params.validator,
|
||||
(algosdk.mnemonicToSecretKey(this.settings.params.mnemo)).sk,
|
||||
this.settings.algo.token,
|
||||
this.settings.algo.api,
|
||||
this.settings.algo.port
|
||||
)
|
||||
|
||||
const fetcher = new PythPriceFetcher(this.settings.params.symbol,
|
||||
new StrategyLastPrice(this.settings.params.bufferSize), this.settings.pyth?.solanaClusterName!)
|
||||
await fetcher.start()
|
||||
|
||||
console.log('Waiting for fetcher to boot...')
|
||||
while (!fetcher.hasData()) {
|
||||
await sleep(250)
|
||||
}
|
||||
console.log('Waiting for publisher to boot...')
|
||||
await publisher.start()
|
||||
console.log('Starting worker.')
|
||||
|
||||
let active = true
|
||||
charm.removeAllListeners('^C')
|
||||
charm.on('^C', () => {
|
||||
console.log('CTRL+C: Aborted by user.')
|
||||
active = false
|
||||
})
|
||||
let pubCount = 0
|
||||
// eslint-disable-next-line no-unmodified-loop-condition
|
||||
while (active) {
|
||||
const wrs = await workerRoutine(fetcher, publisher)
|
||||
switch (wrs.status) {
|
||||
case StatusCode.OK: {
|
||||
console.log(`[PUB ${pubCount++}] ${wrs.tick!.price}±${wrs.tick!.confidence} exp:${wrs.tick!.exponent} t:${wrs.tick!.networkTime} TXID:${wrs.pub!.txid}`)
|
||||
break
|
||||
}
|
||||
case StatusCode.NO_TICKER:
|
||||
console.log('No ticker available from fetcher data source')
|
||||
break
|
||||
default:
|
||||
console.log('Error. Reason: ' + wrs.reason)
|
||||
}
|
||||
await sleep(this.settings.params.publishIntervalSecs * 1000)
|
||||
}
|
||||
}
|
||||
}
|
|
@ -7,19 +7,19 @@
|
|||
*/
|
||||
|
||||
import { IEngine } from './IEngine'
|
||||
import { PythPriceFetcher } from '../fetcher/PythPriceFetcher'
|
||||
import { StdAlgoPublisher } from '../publisher/stdAlgoPublisher'
|
||||
import { StrategyLastPrice } from '../strategy/strategyLastPrice'
|
||||
import { IAppSettings } from '../common/settings'
|
||||
import { IPriceFetcher } from '../fetcher/IPriceFetcher'
|
||||
import { IPublisher, PublishInfo } from '../publisher/IPublisher'
|
||||
import { PriceTicker } from '../common/priceTicker'
|
||||
import { StatusCode } from '../common/statusCodes'
|
||||
import { WormholePythPriceFetcher } from '../fetcher/WormholePythPriceFetcher'
|
||||
import { Symbol } from 'backend/common/basetypes'
|
||||
import { Pricekeeper2Publisher } from '../publisher/Pricekeeper2Publisher'
|
||||
import * as Logger from '@randlabs/js-logger'
|
||||
import { sleep } from '../common/sleep'
|
||||
import { WormholePythPriceFetcher } from 'backend/fetcher/WormholePythPriceFetcher'
|
||||
|
||||
const fs = require('fs')
|
||||
const algosdk = require('algosdk')
|
||||
const charm = require('charm')()
|
||||
|
||||
type WorkerRoutineStatus = {
|
||||
status: StatusCode,
|
||||
|
@ -28,8 +28,8 @@ type WorkerRoutineStatus = {
|
|||
pub?: PublishInfo
|
||||
}
|
||||
|
||||
async function workerRoutine (fetcher: IPriceFetcher, publisher: IPublisher): Promise<WorkerRoutineStatus> {
|
||||
const tick = fetcher.queryTicker()
|
||||
async function workerRoutine (sym: Symbol, fetcher: IPriceFetcher, publisher: IPublisher): Promise<WorkerRoutineStatus> {
|
||||
const tick = fetcher.queryData(sym.productId + sym.priceId)
|
||||
if (tick === undefined) {
|
||||
return { status: StatusCode.NO_TICKER }
|
||||
}
|
||||
|
@ -39,65 +39,74 @@ async function workerRoutine (fetcher: IPriceFetcher, publisher: IPublisher): Pr
|
|||
|
||||
export class WormholeClientEngine implements IEngine {
|
||||
private settings: IAppSettings
|
||||
|
||||
private shouldQuit: boolean
|
||||
constructor (settings: IAppSettings) {
|
||||
this.settings = settings
|
||||
this.shouldQuit = false
|
||||
}
|
||||
|
||||
async start () {
|
||||
charm.write('Setting up for')
|
||||
.foreground('yellow')
|
||||
.write(` ${this.settings.params.symbol} `)
|
||||
.foreground('white')
|
||||
.write('for PriceKeeper App')
|
||||
.foreground('yellow')
|
||||
.write(` ${this.settings.params.priceKeeperAppId} `)
|
||||
.foreground('white')
|
||||
.write(`interval ${this.settings.params.publishIntervalSecs} secs\n`)
|
||||
process.on('SIGINT', () => {
|
||||
console.log('Received SIGINT')
|
||||
Logger.finalize()
|
||||
this.shouldQuit = true
|
||||
})
|
||||
|
||||
const publisher = new StdAlgoPublisher(this.settings.params.symbol,
|
||||
this.settings.params.priceKeeperAppId,
|
||||
this.settings.params.validator,
|
||||
(algosdk.mnemonicToSecretKey(this.settings.params.mnemo)).sk,
|
||||
let mnemo, verifyProgramBinary
|
||||
try {
|
||||
mnemo = fs.readFileSync(this.settings.apps.ownerKeyFile)
|
||||
verifyProgramBinary = Uint8Array.from(fs.readFileSync(this.settings.apps.vaaVerifyProgramBinFile))
|
||||
} catch (e) {
|
||||
throw new Error('Cannot read account and/or verify program source: ' + e)
|
||||
}
|
||||
|
||||
const publisher = new Pricekeeper2Publisher(this.settings.apps.vaaProcessorAppId,
|
||||
this.settings.apps.priceKeeperV2AppId,
|
||||
this.settings.apps.ownerAddress,
|
||||
verifyProgramBinary,
|
||||
this.settings.apps.vaaVerifyProgramHash,
|
||||
algosdk.mnemonicToSecretKey(mnemo.toString()),
|
||||
this.settings.algo.token,
|
||||
this.settings.algo.api,
|
||||
this.settings.algo.port
|
||||
this.settings.algo.port,
|
||||
this.settings.algo.dumpFailedTx,
|
||||
this.settings.algo.dumpFailedTxDirectory
|
||||
)
|
||||
const fetcher = new WormholePythPriceFetcher(this.settings.wormhole.spyServiceHost,
|
||||
this.settings.pyth.chainId,
|
||||
this.settings.pyth.emitterAddress,
|
||||
this.settings.symbols,
|
||||
new StrategyLastPrice(this.settings.strategy.bufferSize))
|
||||
|
||||
const fetcher = new WormholePythPriceFetcher(this.settings.params.symbol,
|
||||
new StrategyLastPrice(this.settings.params.bufferSize), this.settings.pyth?.solanaClusterName!)
|
||||
Logger.info('Waiting for fetcher to boot...')
|
||||
await fetcher.start()
|
||||
|
||||
console.log('Waiting for fetcher to boot...')
|
||||
while (!fetcher.hasData()) {
|
||||
await sleep(250)
|
||||
}
|
||||
console.log('Waiting for publisher to boot...')
|
||||
Logger.info('Waiting for publisher to boot...')
|
||||
await publisher.start()
|
||||
console.log('Starting worker.')
|
||||
|
||||
let active = true
|
||||
charm.removeAllListeners('^C')
|
||||
charm.on('^C', () => {
|
||||
console.log('CTRL+C: Aborted by user.')
|
||||
active = false
|
||||
})
|
||||
let pubCount = 0
|
||||
// eslint-disable-next-line no-unmodified-loop-condition
|
||||
while (active) {
|
||||
const wrs = await workerRoutine(fetcher, publisher)
|
||||
switch (wrs.status) {
|
||||
case StatusCode.OK: {
|
||||
console.log(`[PUB ${pubCount++}] ${wrs.tick!.price}±${wrs.tick!.confidence} exp:${wrs.tick!.exponent} t:${wrs.tick!.networkTime} TXID:${wrs.pub!.txid}`)
|
||||
break
|
||||
}
|
||||
case StatusCode.NO_TICKER:
|
||||
console.log('No ticker available from fetcher data source')
|
||||
break
|
||||
default:
|
||||
console.log('Error. Reason: ' + wrs.reason)
|
||||
for (const sym of this.settings.symbols) {
|
||||
sym.pubCount = 0
|
||||
Logger.info(`Starting worker for symbol ${sym.name}, interval ${sym.publishIntervalSecs}s`)
|
||||
setInterval(this.callWorkerRoutine, sym.publishIntervalSecs * 1000, sym, fetcher, publisher)
|
||||
}
|
||||
|
||||
while (!this.shouldQuit) {
|
||||
await sleep(1000)
|
||||
}
|
||||
}
|
||||
|
||||
async callWorkerRoutine (sym: Symbol, fetcher: IPriceFetcher, publisher: IPublisher) {
|
||||
const wrs = await workerRoutine(sym, fetcher, publisher)
|
||||
switch (wrs.status) {
|
||||
case StatusCode.OK: {
|
||||
Logger.info(`${sym.name} [#${sym.pubCount++}] price: ${wrs.tick!.price} ± ${wrs.tick!.confidence} exp: ${wrs.tick!.exponent} t: ${wrs.tick!.timestamp} TxID: ${wrs.pub!.txid}`)
|
||||
break
|
||||
}
|
||||
await sleep(this.settings.params.publishIntervalSecs * 1000)
|
||||
case StatusCode.NO_TICKER:
|
||||
Logger.warn(`${sym.name}: No ticker available from fetcher data source`)
|
||||
break
|
||||
default:
|
||||
Logger.error(`${sym.name}: Error. Reason: ` + wrs.reason)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -6,7 +6,6 @@
|
|||
* (c) 2021 Randlabs, Inc.
|
||||
*/
|
||||
|
||||
import { PriceTicker } from '../common/priceTicker'
|
||||
import { IStrategy } from '../strategy/strategy'
|
||||
|
||||
export interface IPriceFetcher {
|
||||
|
@ -21,7 +20,7 @@ export interface IPriceFetcher {
|
|||
setStrategy(s: IStrategy): void
|
||||
|
||||
/**
|
||||
* Get the current price, according to running strategy.
|
||||
* Get the current price of a symbol, according to running strategy.
|
||||
*/
|
||||
queryTicker(): PriceTicker | undefined
|
||||
queryData(id: string): any | undefined
|
||||
}
|
||||
|
|
|
@ -1,59 +0,0 @@
|
|||
/**
|
||||
* Pricecaster Service.
|
||||
*
|
||||
* Fetcher backend component.
|
||||
*
|
||||
* (c) 2021 Randlabs, Inc.
|
||||
*/
|
||||
|
||||
import { IPriceFetcher } from './IPriceFetcher'
|
||||
import { IStrategy } from '../strategy/strategy'
|
||||
import { getPythProgramKeyForCluster, PriceData, Product, PythConnection } from '@pythnetwork/client'
|
||||
import { Cluster, clusterApiUrl, Connection } from '@solana/web3.js'
|
||||
import { PriceTicker } from '../common/priceTicker'
|
||||
|
||||
export class PythPriceFetcher implements IPriceFetcher {
|
||||
private strategy: IStrategy
|
||||
private symbol: string
|
||||
private pythConnection: PythConnection
|
||||
|
||||
constructor (symbol: string, strategy: IStrategy, solanaClusterName: string) {
|
||||
const SOLANA_CLUSTER_NAME: Cluster = solanaClusterName as Cluster
|
||||
const connection = new Connection(clusterApiUrl(SOLANA_CLUSTER_NAME))
|
||||
const pythPublicKey = getPythProgramKeyForCluster(SOLANA_CLUSTER_NAME)
|
||||
this.pythConnection = new PythConnection(connection, pythPublicKey)
|
||||
this.strategy = strategy
|
||||
this.symbol = symbol
|
||||
}
|
||||
|
||||
async start () {
|
||||
await this.pythConnection.start()
|
||||
this.pythConnection.onPriceChange((product: Product, price: PriceData) => {
|
||||
if (product.symbol === this.symbol) {
|
||||
this.onPriceChange(price)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
stop (): void {
|
||||
this.pythConnection.stop()
|
||||
}
|
||||
|
||||
setStrategy (s: IStrategy) {
|
||||
this.strategy = s
|
||||
}
|
||||
|
||||
hasData (): boolean {
|
||||
return this.strategy.bufferCount() > 0
|
||||
}
|
||||
|
||||
queryTicker (): PriceTicker | undefined {
|
||||
return this.strategy.getPrice()
|
||||
}
|
||||
|
||||
private onPriceChange (price: PriceData) {
|
||||
const pt: PriceTicker = new PriceTicker(price.priceComponent,
|
||||
price.confidenceComponent, price.exponent, price.publishSlot)
|
||||
this.strategy.put(pt)
|
||||
}
|
||||
}
|
|
@ -1,3 +1,4 @@
|
|||
/* eslint-disable camelcase */
|
||||
/**
|
||||
* Pricecaster Service.
|
||||
*
|
||||
|
@ -6,61 +7,134 @@
|
|||
* (c) 2021 Randlabs, Inc.
|
||||
*/
|
||||
|
||||
import { IPriceFetcher } from './IPriceFetcher'
|
||||
import {
|
||||
importCoreWasm,
|
||||
setDefaultWasm
|
||||
} from '@certusone/wormhole-sdk/lib/cjs/solana/wasm'
|
||||
import {
|
||||
createSpyRPCServiceClient, subscribeSignedVAA
|
||||
} from '@certusone/wormhole-spydk'
|
||||
import { SpyRPCServiceClient } from '@certusone/wormhole-spydk/lib/cjs/proto/spy/v1/spy'
|
||||
import { PythData, Symbol, VAA } from 'backend/common/basetypes'
|
||||
import { IStrategy } from '../strategy/strategy'
|
||||
import { getPythProgramKeyForCluster, PriceData, Product, PythConnection } from '@pythnetwork/client'
|
||||
import { Cluster, clusterApiUrl, Connection } from '@solana/web3.js'
|
||||
import { PriceTicker } from '../common/priceTicker'
|
||||
import { getEmitterAddressEth, getSignedVAA } from '@certusone/wormhole-sdk'
|
||||
import { IPriceFetcher } from './IPriceFetcher'
|
||||
import * as Logger from '@randlabs/js-logger'
|
||||
|
||||
export class WormholePythPriceFetcher implements IPriceFetcher {
|
||||
private strategy: IStrategy
|
||||
private symbol: string
|
||||
private pythConnection: PythConnection
|
||||
private symbolMap: Map<string, {
|
||||
name: string,
|
||||
publishIntervalSecs: number,
|
||||
pythData: PythData | undefined
|
||||
}>
|
||||
|
||||
constructor (symbol: string, strategy: IStrategy, solanaClusterName: string) {
|
||||
const SOLANA_CLUSTER_NAME: Cluster = solanaClusterName as Cluster
|
||||
const connection = new Connection(clusterApiUrl(SOLANA_CLUSTER_NAME))
|
||||
const pythPublicKey = getPythProgramKeyForCluster(SOLANA_CLUSTER_NAME)
|
||||
this.pythConnection = new PythConnection(connection, pythPublicKey)
|
||||
this.strategy = strategy
|
||||
this.symbol = symbol
|
||||
}
|
||||
private client: SpyRPCServiceClient
|
||||
private pythEmitterAddress: { s: string, data: number[] }
|
||||
private pythChainId: number
|
||||
private strategy: IStrategy
|
||||
private stream: any
|
||||
private _hasData: boolean
|
||||
private coreWasm: any
|
||||
|
||||
async start () {
|
||||
await this.pythConnection.start()
|
||||
this.pythConnection.onPriceChange((product: Product, price: PriceData) => {
|
||||
if (product.symbol === this.symbol) {
|
||||
this.onPriceChange(price)
|
||||
}
|
||||
})
|
||||
}
|
||||
constructor (spyRpcServiceHost: string, pythChainId: number, pythEmitterAddress: string, symbols: Symbol[], strategy: IStrategy) {
|
||||
setDefaultWasm('node')
|
||||
this._hasData = false
|
||||
this.client = createSpyRPCServiceClient(spyRpcServiceHost)
|
||||
this.pythChainId = pythChainId
|
||||
this.pythEmitterAddress = {
|
||||
data: Buffer.from(pythEmitterAddress, 'hex').toJSON().data,
|
||||
s: pythEmitterAddress
|
||||
}
|
||||
this.strategy = strategy
|
||||
this.symbolMap = new Map()
|
||||
|
||||
stop (): void {
|
||||
this.pythConnection.stop()
|
||||
}
|
||||
symbols.forEach((sym) => {
|
||||
this.symbolMap.set(sym.productId + sym.priceId, {
|
||||
name: sym.name,
|
||||
publishIntervalSecs: sym.publishIntervalSecs,
|
||||
pythData: undefined
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
setStrategy (s: IStrategy) {
|
||||
this.strategy = s
|
||||
}
|
||||
async start () {
|
||||
this.coreWasm = await importCoreWasm()
|
||||
// eslint-disable-next-line camelcase
|
||||
this.stream = await subscribeSignedVAA(this.client,
|
||||
{
|
||||
filters:
|
||||
[{
|
||||
emitterFilter: {
|
||||
chainId: this.pythChainId,
|
||||
emitterAddress: this.pythEmitterAddress.s
|
||||
}
|
||||
}]
|
||||
})
|
||||
|
||||
hasData (): boolean {
|
||||
return this.strategy.bufferCount() > 0
|
||||
}
|
||||
this.stream.on('data', (data: { vaaBytes: Buffer }) => {
|
||||
try {
|
||||
this._hasData = true
|
||||
this.onPythData(data.vaaBytes)
|
||||
} catch (e) {
|
||||
Logger.error(`Failed to parse VAA data. \nReason: ${e}\nData: ${data}`)
|
||||
}
|
||||
})
|
||||
|
||||
queryTicker (): PriceTicker | undefined {
|
||||
getEmitterAddressEth()
|
||||
|
||||
await getSignedVAA("https://wormhole-v2-testnet-api.certus.one", )
|
||||
//return this.strategy.getPrice()
|
||||
}
|
||||
this.stream.on('error', (e: Error) => {
|
||||
Logger.error('Stream error: ' + e)
|
||||
})
|
||||
}
|
||||
|
||||
private onPriceChange (price: PriceData) {
|
||||
GrpcWebImpl
|
||||
PublicRPCServiceClientImpl
|
||||
getSignedVAA()
|
||||
const pt: PriceTicker = new PriceTicker(price.priceComponent,
|
||||
price.confidenceComponent, price.exponent, price.publishSlot)
|
||||
this.strategy.put(pt)
|
||||
}
|
||||
stop (): void {
|
||||
this._hasData = false
|
||||
}
|
||||
|
||||
setStrategy (s: IStrategy) {
|
||||
this.strategy = s
|
||||
}
|
||||
|
||||
hasData (): boolean {
|
||||
// Return when any price is ready
|
||||
return this._hasData
|
||||
}
|
||||
|
||||
queryData (id: string): any | undefined {
|
||||
const v = this.symbolMap.get(id)
|
||||
if (v === undefined) {
|
||||
Logger.error(`Unsupported symbol with identifier ${id}`)
|
||||
} else {
|
||||
return v.pythData
|
||||
}
|
||||
}
|
||||
|
||||
private async onPythData (vaaBytes: Buffer) {
|
||||
// console.log(vaaBytes.toString('hex'))
|
||||
const v: VAA = this.coreWasm.parse_vaa(new Uint8Array(vaaBytes))
|
||||
const payload = Buffer.from(v.payload)
|
||||
const productId = payload.slice(7, 7 + 32)
|
||||
const priceId = payload.slice(7 + 32, 7 + 32 + 32)
|
||||
// console.log(productId.toString('hex'), priceId.toString('hex'))
|
||||
|
||||
const k = productId.toString('hex') + priceId.toString('hex')
|
||||
const sym = this.symbolMap.get(k)
|
||||
|
||||
if (sym !== undefined) {
|
||||
sym.pythData = {
|
||||
symbol: sym.name,
|
||||
vaaBody: vaaBytes.slice(6 + v.signatures.length * 66),
|
||||
signatures: vaaBytes.slice(6, 6 + v.signatures.length * 66),
|
||||
price_type: payload.readInt8(71),
|
||||
price: payload.readBigUInt64BE(72),
|
||||
exponent: payload.readInt32BE(80),
|
||||
confidence: payload.readBigUInt64BE(132),
|
||||
status: payload.readInt8(140),
|
||||
corporate_act: payload.readInt8(141),
|
||||
timestamp: payload.readBigUInt64BE(142)
|
||||
}
|
||||
}
|
||||
|
||||
// if (pythPayload.status === 0) {
|
||||
// console.log('WARNING: Symbol trading status currently halted (0). Publication will be skipped.')
|
||||
// } else
|
||||
// eslint-disable-next-line no-lone-blocks
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
/* eslint-disable func-call-spacing */
|
||||
/* eslint-disable no-unused-vars */
|
||||
/**
|
||||
* Pricecaster Service.
|
||||
|
@ -10,8 +11,8 @@
|
|||
import * as Config from '@randlabs/js-config-reader'
|
||||
import { IAppSettings } from './common/settings'
|
||||
import { exit } from 'process'
|
||||
import { PriceKeeperEngine } from './engine/PriceKeeperEngine'
|
||||
import { WormholeClientEngine } from './engine/WormholeEngine'
|
||||
import * as Logger from '@randlabs/js-logger'
|
||||
const charm = require('charm')();
|
||||
|
||||
(async () => {
|
||||
|
@ -25,25 +26,12 @@ const charm = require('charm')();
|
|||
try {
|
||||
await Config.initialize<IAppSettings>({ envVar: 'PRICECASTER_SETTINGS' })
|
||||
settings = Config.get<IAppSettings>()
|
||||
await Logger.initialize(settings.log)
|
||||
} catch (e: any) {
|
||||
console.error('Cannot initialize configuration: ' + e.toString())
|
||||
exit(1)
|
||||
}
|
||||
|
||||
let engine
|
||||
switch (settings.mode) {
|
||||
case 'pkeeper':
|
||||
engine = new PriceKeeperEngine(settings)
|
||||
break
|
||||
|
||||
case 'wormhole-client':
|
||||
engine = new WormholeClientEngine(settings)
|
||||
break
|
||||
|
||||
default:
|
||||
console.error('Invalid specified mode in settings')
|
||||
exit(2)
|
||||
}
|
||||
|
||||
engine.start()
|
||||
const engine = new WormholeClientEngine(settings)
|
||||
await engine.start()
|
||||
})()
|
||||
|
|
|
@ -21,5 +21,5 @@ export type PublishInfo = {
|
|||
export interface IPublisher {
|
||||
start(): void
|
||||
stop(): void
|
||||
publish(tick: PriceTicker): Promise<PublishInfo>
|
||||
publish(data: any): Promise<PublishInfo>
|
||||
}
|
||||
|
|
|
@ -0,0 +1,16 @@
|
|||
import { IPublisher, PublishInfo } from '../publisher/IPublisher'
|
||||
import { PriceTicker } from '../common/priceTicker'
|
||||
|
||||
export class NullPublisher implements IPublisher {
|
||||
start (): void {
|
||||
throw new Error('Method not implemented.')
|
||||
}
|
||||
|
||||
stop (): void {
|
||||
throw new Error('Method not implemented.')
|
||||
}
|
||||
|
||||
publish (tick: PriceTicker): Promise<PublishInfo> {
|
||||
throw new Error('Method not implemented.')
|
||||
}
|
||||
}
|
|
@ -0,0 +1,112 @@
|
|||
import algosdk from 'algosdk'
|
||||
import { IPublisher, PublishInfo } from './IPublisher'
|
||||
import { StatusCode } from '../common/statusCodes'
|
||||
import { PythData } from 'backend/common/basetypes'
|
||||
const PricecasterLib = require('../../lib/pricecaster')
|
||||
const tools = require('../../tools/app-tools')
|
||||
|
||||
export class Pricekeeper2Publisher implements IPublisher {
|
||||
private algodClient: algosdk.Algodv2
|
||||
private pclib: any
|
||||
private account: algosdk.Account
|
||||
private vaaProcessorAppId: number
|
||||
private vaaProcessorOwner: string
|
||||
private numOfVerifySteps: number = 0
|
||||
private guardianCount: number = 0
|
||||
private stepSize: number = 0
|
||||
private dumpFailedTx: boolean
|
||||
private dumpFailedTxDirectory: string | undefined
|
||||
private compiledVerifyProgram: { bytes: Uint8Array, hash: string } = { bytes: new Uint8Array(), hash: '' }
|
||||
constructor (vaaProcessorAppId: number,
|
||||
priceKeeperAppId: number,
|
||||
vaaProcessorOwner: string,
|
||||
verifyProgramBinary: Uint8Array,
|
||||
verifyProgramHash: string,
|
||||
signKey: algosdk.Account,
|
||||
algoClientToken: string,
|
||||
algoClientServer: string,
|
||||
algoClientPort: string,
|
||||
dumpFailedTx: boolean = false,
|
||||
dumpFailedTxDirectory: string = './') {
|
||||
this.account = signKey
|
||||
this.compiledVerifyProgram.bytes = verifyProgramBinary
|
||||
this.compiledVerifyProgram.hash = verifyProgramHash
|
||||
this.vaaProcessorAppId = vaaProcessorAppId
|
||||
this.vaaProcessorOwner = vaaProcessorOwner
|
||||
this.dumpFailedTx = dumpFailedTx
|
||||
this.dumpFailedTxDirectory = dumpFailedTxDirectory
|
||||
this.algodClient = new algosdk.Algodv2(algoClientToken, algoClientServer, algoClientPort)
|
||||
this.pclib = new PricecasterLib.PricecasterLib(this.algodClient)
|
||||
this.pclib.setAppId('vaaProcessor', vaaProcessorAppId)
|
||||
this.pclib.setAppId('pricekeeper', priceKeeperAppId)
|
||||
this.pclib.enableDumpFailedTx(this.dumpFailedTx)
|
||||
this.pclib.setDumpFailedTxDirectory(this.dumpFailedTxDirectory)
|
||||
}
|
||||
|
||||
async start () {
|
||||
}
|
||||
|
||||
stop () {
|
||||
}
|
||||
|
||||
signCallback (sender: string, tx: algosdk.Transaction) {
|
||||
const txSigned = tx.signTxn(this.account.sk)
|
||||
return txSigned
|
||||
}
|
||||
|
||||
async publish (data: PythData): Promise<PublishInfo> {
|
||||
const publishInfo: PublishInfo = { status: StatusCode.OK }
|
||||
|
||||
const txParams = await this.algodClient.getTransactionParams().do()
|
||||
txParams.fee = 1000
|
||||
txParams.flatFee = true
|
||||
|
||||
this.guardianCount = await tools.readAppGlobalStateByKey(this.algodClient, this.vaaProcessorAppId, this.vaaProcessorOwner, 'gscount')
|
||||
this.stepSize = await tools.readAppGlobalStateByKey(this.algodClient, this.vaaProcessorAppId, this.vaaProcessorOwner, 'vssize')
|
||||
this.numOfVerifySteps = Math.ceil(this.guardianCount / this.stepSize)
|
||||
if (this.guardianCount === 0 || this.stepSize === 0) {
|
||||
throw new Error('cannot get guardian count and/or step-size from global state')
|
||||
}
|
||||
//
|
||||
// (!)
|
||||
// Stateless programs cannot access state nor stack from stateful programs, so
|
||||
// for the VAA Verify program to use the guardian set, we pass the global state as TX argument,
|
||||
// (and check it against the current global list to be sure it's ok). This way it can be read by
|
||||
// VAA verifier as a stateless program CAN DO READS of call transaction arguments in a group.
|
||||
// The same technique is used for the note field, where the payload is set.
|
||||
//
|
||||
|
||||
try {
|
||||
const guardianKeys = []
|
||||
const buf = Buffer.alloc(8)
|
||||
for (let i = 0; i < this.guardianCount; i++) {
|
||||
buf.writeBigUInt64BE(BigInt(i++))
|
||||
const gk = await tools.readAppGlobalStateByKey(this.algodClient, this.vaaProcessorAppId, this.vaaProcessorOwner, buf.toString())
|
||||
guardianKeys.push(Buffer.from(gk, 'base64').toString('hex'))
|
||||
}
|
||||
|
||||
const strSig = data.signatures.toString('hex')
|
||||
|
||||
const gid = this.pclib.beginTxGroup()
|
||||
const sigSubsets = []
|
||||
for (let i = 0; i < this.numOfVerifySteps; i++) {
|
||||
const st = this.stepSize * i
|
||||
const sigSetLen = 132 * this.stepSize
|
||||
|
||||
const keySubset = guardianKeys.slice(st, i < this.numOfVerifySteps - 1 ? st + this.stepSize : undefined)
|
||||
|
||||
sigSubsets.push(strSig.slice(i * sigSetLen, i < this.numOfVerifySteps - 1 ? ((i * sigSetLen) + sigSetLen) : undefined))
|
||||
this.pclib.addVerifyTx(gid, this.compiledVerifyProgram.hash, txParams, data.vaaBody, keySubset, this.guardianCount)
|
||||
}
|
||||
this.pclib.addPriceStoreTx(gid, this.vaaProcessorOwner, txParams, data.symbol, data.vaaBody.slice(51))
|
||||
const txId = await this.pclib.commitVerifyTxGroup(gid, this.compiledVerifyProgram.bytes, sigSubsets, this.vaaProcessorOwner, this.signCallback.bind(this))
|
||||
publishInfo.txid = txId
|
||||
} catch (e: any) {
|
||||
publishInfo.status = StatusCode.ERROR_SUBMIT_MESSAGE
|
||||
publishInfo.reason = e.response.text ? e.response.text : e.toString()
|
||||
return publishInfo
|
||||
}
|
||||
|
||||
return publishInfo
|
||||
}
|
||||
}
|
|
@ -1,70 +0,0 @@
|
|||
import algosdk from 'algosdk'
|
||||
import { IPublisher, PublishInfo } from '../publisher/IPublisher'
|
||||
import { PriceTicker } from '../common/priceTicker'
|
||||
import { StatusCode } from '../common/statusCodes'
|
||||
const PricecasterLib = require('../../lib/pricecaster')
|
||||
|
||||
export class StdAlgoPublisher implements IPublisher {
|
||||
private pclib: any
|
||||
private symbol: string
|
||||
private signKey: Uint8Array
|
||||
private validator: string
|
||||
constructor (symbol: string, appId: BigInt, validator: string, signKey: Uint8Array,
|
||||
algoClientToken: string,
|
||||
algoClientServer: string,
|
||||
algoClientPort: string) {
|
||||
this.symbol = symbol
|
||||
this.signKey = signKey
|
||||
this.validator = validator
|
||||
const algodClient = new algosdk.Algodv2(algoClientToken, algoClientServer, algoClientPort)
|
||||
this.pclib = new PricecasterLib.PricecasterLib(algodClient)
|
||||
this.pclib.setAppId(appId)
|
||||
}
|
||||
|
||||
async start () {
|
||||
await this.pclib.compileApprovalProgram()
|
||||
}
|
||||
|
||||
stop () {
|
||||
|
||||
}
|
||||
|
||||
signCallback (sender: string, tx: algosdk.Transaction) {
|
||||
const txSigned = tx.signTxn(this.signKey)
|
||||
return txSigned
|
||||
}
|
||||
|
||||
async publish (tick: PriceTicker): Promise<PublishInfo> {
|
||||
const publishInfo: PublishInfo = { status: StatusCode.OK }
|
||||
let msg, txId
|
||||
try {
|
||||
msg = this.pclib.createMessage(
|
||||
this.symbol,
|
||||
tick.price,
|
||||
BigInt(tick.exponent),
|
||||
tick.confidence,
|
||||
tick.networkTime,
|
||||
this.signKey)
|
||||
publishInfo.msgb64 = msg.toString('base64')
|
||||
} catch (e: any) {
|
||||
publishInfo.status = StatusCode.ERROR_CREATE_MESSAGE
|
||||
publishInfo.reason = e.toString()
|
||||
return publishInfo
|
||||
}
|
||||
|
||||
try {
|
||||
txId = await this.pclib.submitMessage(
|
||||
this.validator,
|
||||
msg,
|
||||
this.signCallback.bind(this)
|
||||
)
|
||||
publishInfo.txid = txId
|
||||
} catch (e: any) {
|
||||
publishInfo.status = StatusCode.ERROR_SUBMIT_MESSAGE
|
||||
publishInfo.reason = e.response.text ? e.response.text : e.toString()
|
||||
return publishInfo
|
||||
}
|
||||
|
||||
return publishInfo
|
||||
}
|
||||
}
|
|
@ -0,0 +1 @@
|
|||
Output Failed transaction dumps here.
|
|
@ -0,0 +1 @@
|
|||
REPLACE WITH MNEMONIC WORDS.
|
|
@ -8,214 +8,222 @@
|
|||
const algosdk = require('algosdk')
|
||||
const fs = require('fs')
|
||||
// eslint-disable-next-line camelcase
|
||||
const { sha512_256 } = require('js-sha512')
|
||||
const tools = require('../tools/app-tools')
|
||||
const crypto = require('crypto')
|
||||
|
||||
const approvalProgramFilename = 'teal/pricekeeper/pricekeeper.teal'
|
||||
const clearProgramFilename = 'teal/pricekeeper/clearstate.teal'
|
||||
let vaaProcessorApprovalProgramFilename = 'teal/wormhole/build/vaa-processor-approval.teal'
|
||||
let vaaProcessorClearProgramFilename = 'teal/wormhole/build/vaa-processor-clear.teal'
|
||||
const vaaVerifyStatelessProgramFilename = 'teal/wormhole/build/vaa-verify.teal'
|
||||
const ContractInfo = {
|
||||
pricekeeper: {
|
||||
approvalProgramFile: 'teal/wormhole/build/pricekeeper-v2-approval.teal',
|
||||
clearStateProgramFile: 'teal/wormhole/build/pricekeeper-v2-clear.teal',
|
||||
compiledApproval: {
|
||||
bytes: undefined,
|
||||
hash: undefined
|
||||
},
|
||||
compiledClearState: {
|
||||
bytes: undefined,
|
||||
hash: undefined
|
||||
},
|
||||
appId: 0
|
||||
},
|
||||
vaaProcessor: {
|
||||
approvalProgramFile: 'teal/wormhole/build/vaa-processor-approval.teal',
|
||||
clearStateProgramFile: 'teal/wormhole/build/vaa-processor-clear.teal',
|
||||
approvalProgramHash: '',
|
||||
compiledApproval: {
|
||||
bytes: undefined,
|
||||
hash: undefined
|
||||
},
|
||||
compiledClearState: {
|
||||
bytes: undefined,
|
||||
hash: undefined
|
||||
},
|
||||
appId: 0
|
||||
}
|
||||
}
|
||||
|
||||
// --------------------------------------------------------------------------------------
|
||||
|
||||
class PricecasterLib {
|
||||
constructor (algodClient, ownerAddr = undefined) {
|
||||
constructor(algodClient, ownerAddr = undefined) {
|
||||
this.algodClient = algodClient
|
||||
this.ownerAddr = ownerAddr
|
||||
this.minFee = 1000
|
||||
this.groupTx = []
|
||||
this.groupTxSet = {}
|
||||
this.lsigs = {}
|
||||
this.dumpFailedTx = false
|
||||
this.dumpFailedTxDirectory = './'
|
||||
|
||||
/** Overrides the default VAA processor approval program filename
|
||||
* @param {string} filename New file name to use.
|
||||
/** Set the file dumping feature on failed group transactions
|
||||
* @param {boolean} f Set to true to enable function, false to disable.
|
||||
*/
|
||||
this.setVaaProcessorApprovalFile = function (filename) {
|
||||
vaaProcessorApprovalProgramFilename = filename
|
||||
this.enableDumpFailedTx = function (f) {
|
||||
this.dumpFailedTx = f
|
||||
}
|
||||
|
||||
/** Overrides the default VAA processor clear-state program filename
|
||||
/** Set the file dumping feature output directory
|
||||
* @param {string} dir The output directory.
|
||||
*/
|
||||
this.setDumpFailedTxDirectory = function (dir) {
|
||||
this.dumpFailedTxDirectory = dir
|
||||
}
|
||||
|
||||
/** Sets a contract approval program filename
|
||||
* @param {string} filename New file name to use.
|
||||
*/
|
||||
this.setVaaProcessorClearStateFile = function (filename) {
|
||||
vaaProcessorClearProgramFilename = filename
|
||||
this.setApprovalProgramFile = function (contract, filename) {
|
||||
ContractInfo[contract].approvalProgramFile = filename
|
||||
}
|
||||
|
||||
/** Sets a contract clear state program filename
|
||||
* @param {string} filename New file name to use.
|
||||
*/
|
||||
this.setClearStateProgramFile = function (contract, filename) {
|
||||
ContractInfo[contract].clearStateProgramFile = filename
|
||||
}
|
||||
|
||||
/**
|
||||
* Set Application Id used in all the functions of this class.
|
||||
* @param {number} applicationId application id
|
||||
* @returns {void}
|
||||
*/
|
||||
this.setAppId = function (applicationId) {
|
||||
this.appId = applicationId
|
||||
* Set Application Id for a contract.
|
||||
* @param {number} applicationId application id
|
||||
* @returns {void}
|
||||
*/
|
||||
this.setAppId = function (contract, applicationId) {
|
||||
ContractInfo[contract].appId = applicationId
|
||||
}
|
||||
|
||||
/**
|
||||
* Get minimum fee to pay for transactions.
|
||||
* @return {Number} minimum transaction fee
|
||||
*/
|
||||
* Get the Application id for a specific contract
|
||||
* @returns The requested application Id
|
||||
*/
|
||||
this.getAppId = function (contract) {
|
||||
return ContractInfo[contract].appId
|
||||
}
|
||||
|
||||
/**
|
||||
* Get minimum fee to pay for transactions.
|
||||
* @return {Number} minimum transaction fee
|
||||
*/
|
||||
this.minTransactionFee = function () {
|
||||
return this.minFee
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Read application local state related to the account.
|
||||
* @param {String} accountAddr account to retrieve local state
|
||||
* @return {Array} an array containing all the {key: value} pairs of the local state
|
||||
*/
|
||||
* Internal function.
|
||||
* Read application local state related to the account.
|
||||
* @param {String} accountAddr account to retrieve local state
|
||||
* @return {Array} an array containing all the {key: value} pairs of the local state
|
||||
*/
|
||||
this.readLocalState = function (accountAddr) {
|
||||
return tools.readAppLocalState(this.algodClient, this.appId, accountAddr)
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Read application global state.
|
||||
* @return {Array} an array containing all the {key: value} pairs of the global state
|
||||
* @returns {void}
|
||||
*/
|
||||
* Internal function.
|
||||
* Read application global state.
|
||||
* @return {Array} an array containing all the {key: value} pairs of the global state
|
||||
* @returns {void}
|
||||
*/
|
||||
this.readGlobalState = function () {
|
||||
return tools.readAppGlobalState(this.algodClient, this.appId, this.ownerAddr)
|
||||
}
|
||||
|
||||
/**
|
||||
* Print local state of accountAddr on stdout.
|
||||
* @param {String} accountAddr account to retrieve local state
|
||||
* @returns {void}
|
||||
*/
|
||||
* Print local state of accountAddr on stdout.
|
||||
* @param {String} accountAddr account to retrieve local state
|
||||
* @returns {void}
|
||||
*/
|
||||
this.printLocalState = async function (accountAddr) {
|
||||
await tools.printAppLocalState(this.algodClient, this.appId, accountAddr)
|
||||
}
|
||||
|
||||
/**
|
||||
* Print application global state on stdout.
|
||||
* @returns {void}
|
||||
*/
|
||||
* Print application global state on stdout.
|
||||
* @returns {void}
|
||||
*/
|
||||
this.printGlobalState = async function () {
|
||||
await tools.printAppGlobalState(this.algodClient, this.appId, this.ownerAddr)
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Read application local state variable related to accountAddr.
|
||||
* @param {String} accountAddr account to retrieve local state
|
||||
* @param {String} key variable key to get the value associated
|
||||
* @return {String/Number} it returns the value associated to the key that could be an address, a number or a
|
||||
* base64 string containing a ByteArray
|
||||
*/
|
||||
* Internal function.
|
||||
* Read application local state variable related to accountAddr.
|
||||
* @param {String} accountAddr account to retrieve local state
|
||||
* @param {String} key variable key to get the value associated
|
||||
* @return {String/Number} it returns the value associated to the key that could be an address, a number or a
|
||||
* base64 string containing a ByteArray
|
||||
*/
|
||||
this.readLocalStateByKey = function (accountAddr, key) {
|
||||
return tools.readAppLocalStateByKey(this.algodClient, this.appId, accountAddr, key)
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Read application global state variable.
|
||||
* @param {String} key variable key to get the value associated
|
||||
* @return {String/Number} it returns the value associated to the key that could be an address,
|
||||
* a number or a base64 string containing a ByteArray
|
||||
*/
|
||||
* Internal function.
|
||||
* Read application global state variable.
|
||||
* @param {String} key variable key to get the value associated
|
||||
* @return {String/Number} it returns the value associated to the key that could be an address,
|
||||
* a number or a base64 string containing a ByteArray
|
||||
*/
|
||||
this.readGlobalStateByKey = function (key) {
|
||||
return tools.readAppGlobalStateByKey(this.algodClient, this.appId, this.ownerAddr, key)
|
||||
}
|
||||
|
||||
/**
|
||||
* Compile program that programFilename contains.
|
||||
* @param {String} programFilename filepath to the program to compile
|
||||
* @return {String} base64 string containing the compiled program
|
||||
*/
|
||||
* Compile program that programFilename contains.
|
||||
* @param {String} programFilename filepath to the program to compile
|
||||
* @return {String} base64 string containing the compiled program
|
||||
*/
|
||||
this.compileProgram = async function (programBytes) {
|
||||
const compileResponse = await this.algodClient.compile(programBytes).do()
|
||||
const compiledBytes = new Uint8Array(Buffer.from(compileResponse.result, 'base64'))
|
||||
return { compiledBytes, hash: compileResponse.hash }
|
||||
return { bytes: compiledBytes, hash: compileResponse.hash }
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Compile application clear state program.
|
||||
* @return {String} base64 string containing the compiled program
|
||||
*/
|
||||
this.compileClearProgram = function () {
|
||||
const program = fs.readFileSync(clearProgramFilename, 'utf8')
|
||||
return this.compileProgram(program)
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Compile application clear state program.
|
||||
* @return {String} base64 string containing the compiled program
|
||||
*/
|
||||
this.compileVAAProcessorClearProgram = function () {
|
||||
const program = fs.readFileSync(vaaProcessorClearProgramFilename, 'utf8')
|
||||
return this.compileProgram(program)
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Compile pricekeeper application approval program.
|
||||
* @return {String} base64 string containing the compiled program
|
||||
*/
|
||||
this.compileApprovalProgram = async function () {
|
||||
const program = fs.readFileSync(approvalProgramFilename, 'utf8')
|
||||
const compiledApprovalProgram = await this.compileProgram(program)
|
||||
this.approvalProgramHash = compiledApprovalProgram.hash
|
||||
return compiledApprovalProgram
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Compile VAA Processor application approval program.
|
||||
* @return {String} base64 string containing the compiled program
|
||||
* Compile clear state program.
|
||||
*/
|
||||
this.compileVAAProcessorApprovalProgram = async function () {
|
||||
const program = fs.readFileSync(vaaProcessorApprovalProgramFilename, 'utf8')
|
||||
const compiledApprovalProgram = await this.compileProgram(program)
|
||||
this.approvalProgramHash = compiledApprovalProgram.hash
|
||||
return compiledApprovalProgram
|
||||
this.compileClearProgram = async function (contract) {
|
||||
const program = fs.readFileSync(ContractInfo[contract].clearStateProgramFile, 'utf8')
|
||||
ContractInfo[contract].compiledClearState = await this.compileProgram(program)
|
||||
}
|
||||
|
||||
/**
|
||||
* Helper function to retrieve the application id from a createApp transaction response.
|
||||
* @param {Object} txResponse object containig the transactionResponse of the createApp call
|
||||
* @return {Number} application id of the created application
|
||||
*/
|
||||
* Compile approval program.
|
||||
*/
|
||||
this.compileApprovalProgram = async function (contract) {
|
||||
const program = fs.readFileSync(ContractInfo[contract].approvalProgramFile, 'utf8')
|
||||
ContractInfo[contract].compiledApproval = await this.compileProgram(program)
|
||||
}
|
||||
|
||||
/**
|
||||
* Helper function to retrieve the application id from a createApp transaction response.
|
||||
* @param {Object} txResponse object containig the transactionResponse of the createApp call
|
||||
* @return {Number} application id of the created application
|
||||
*/
|
||||
this.appIdFromCreateAppResponse = function (txResponse) {
|
||||
return txResponse['application-index']
|
||||
}
|
||||
|
||||
/**
|
||||
* Create an application based on the default approval and clearState programs or based on the specified files.
|
||||
* @param {String} sender account used to sign the createApp transaction
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @return {String} transaction id of the created application
|
||||
*/
|
||||
this.createApp = async function (sender, validatorAddr, symbol, signCallback) {
|
||||
if (symbol.length > 16) {
|
||||
throw new Error('Symbol exceeds 16 characters')
|
||||
}
|
||||
symbol = symbol.padEnd(16, ' ')
|
||||
const localInts = 0
|
||||
const localBytes = 0
|
||||
const globalInts = 4
|
||||
const globalBytes = 3
|
||||
|
||||
// declare onComplete as NoOp
|
||||
* Create an application based on the default approval and clearState programs or based on the specified files.
|
||||
* @param {String} sender account used to sign the createApp transaction
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @return {String} transaction id of the created application
|
||||
*/
|
||||
this.createApp = async function (sender, contract, localInts, localBytes, globalInts, globalBytes, appArgs, signCallback) {
|
||||
const onComplete = algosdk.OnApplicationComplete.NoOpOC
|
||||
|
||||
// get node suggested parameters
|
||||
const params = await algodClient.getTransactionParams().do()
|
||||
|
||||
params.fee = this.minFee
|
||||
params.flatFee = true
|
||||
|
||||
const compiledProgram = await this.compileApprovalProgram()
|
||||
const approvalProgramCompiled = compiledProgram.compiledBytes
|
||||
const clearProgramCompiled = (await this.compileClearProgram()).compiledBytes
|
||||
|
||||
const enc = new TextEncoder()
|
||||
const appArgs = [new Uint8Array(algosdk.decodeAddress(validatorAddr).publicKey), enc.encode(symbol)]
|
||||
await this.compileApprovalProgram(contract)
|
||||
await this.compileClearProgram(contract)
|
||||
|
||||
// create unsigned transaction
|
||||
const txApp = algosdk.makeApplicationCreateTxn(
|
||||
sender, params, onComplete,
|
||||
approvalProgramCompiled, clearProgramCompiled,
|
||||
ContractInfo[contract].compiledApproval.bytes,
|
||||
ContractInfo[contract].compiledClearState.bytes,
|
||||
localInts, localBytes, globalInts, globalBytes, appArgs
|
||||
)
|
||||
const txId = txApp.txID().toString()
|
||||
|
@ -238,53 +246,34 @@ class PricecasterLib {
|
|||
* @return {String} transaction id of the created application
|
||||
*/
|
||||
this.createVaaProcessorApp = async function (sender, gexpTime, gsindex, gkeys, signCallback) {
|
||||
const localInts = 0
|
||||
const localBytes = 0
|
||||
const globalInts = 4
|
||||
const globalBytes = 20
|
||||
|
||||
// declare onComplete as NoOp
|
||||
const onComplete = algosdk.OnApplicationComplete.NoOpOC
|
||||
|
||||
// get node suggested parameters
|
||||
const params = await algodClient.getTransactionParams().do()
|
||||
|
||||
params.fee = this.minFee
|
||||
params.flatFee = true
|
||||
|
||||
const compiledProgram = await this.compileVAAProcessorApprovalProgram()
|
||||
const approvalProgramCompiled = compiledProgram.compiledBytes
|
||||
const clearProgramCompiled = (await this.compileVAAProcessorClearProgram()).compiledBytes
|
||||
const appArgs = [new Uint8Array(Buffer.from(gkeys, 'hex')),
|
||||
return await this.createApp(sender, 'vaaProcessor', 0, 0, 5, 20,
|
||||
[new Uint8Array(Buffer.from(gkeys, 'hex')),
|
||||
algosdk.encodeUint64(parseInt(gexpTime)),
|
||||
algosdk.encodeUint64(parseInt(gsindex))]
|
||||
|
||||
// create unsigned transaction
|
||||
const txApp = algosdk.makeApplicationCreateTxn(
|
||||
sender, params, onComplete,
|
||||
approvalProgramCompiled, clearProgramCompiled,
|
||||
localInts, localBytes, globalInts, globalBytes, appArgs
|
||||
)
|
||||
const txId = txApp.txID().toString()
|
||||
|
||||
// Sign the transaction
|
||||
const txAppSigned = signCallback(sender, txApp)
|
||||
|
||||
// Submit the transaction
|
||||
await algodClient.sendRawTransaction(txAppSigned).do()
|
||||
return txId
|
||||
algosdk.encodeUint64(parseInt(gsindex))], signCallback)
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Call application specifying args and accounts.
|
||||
* @param {String} sender caller address
|
||||
* @param {Array} appArgs array of arguments to pass to application call
|
||||
* @param {Array} appAccounts array of accounts to pass to application call
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @return {String} transaction id of the transaction
|
||||
*/
|
||||
this.callApp = async function (sender, appArgs, appAccounts, signCallback) {
|
||||
* Create the Pricekeeper application based on the default approval and clearState programs or based on the specified files.
|
||||
* @param {String} sender account used to sign the createApp transaction
|
||||
* @param {String} vaaProcessorAppId The application id of the VAA Processor program associated.
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @return {String} transaction id of the created application
|
||||
*/
|
||||
this.createPricekeeperApp = async function (sender, vaaProcessorAppId, signCallback) {
|
||||
return await this.createApp(sender, 'pricekeeper', 0, 0, 1, 63,
|
||||
[algosdk.encodeUint64(parseInt(vaaProcessorAppId))], signCallback)
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Call application specifying args and accounts.
|
||||
* @param {String} sender caller address
|
||||
* @param {Array} appArgs array of arguments to pass to application call
|
||||
* @param {Array} appAccounts array of accounts to pass to application call
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @return {String} transaction id of the transaction
|
||||
*/
|
||||
this.callApp = async function (sender, contract, appArgs, appAccounts, signCallback) {
|
||||
// get node suggested parameters
|
||||
const params = await this.algodClient.getTransactionParams().do()
|
||||
|
||||
|
@ -292,7 +281,7 @@ class PricecasterLib {
|
|||
params.flatFee = true
|
||||
|
||||
// create unsigned transaction
|
||||
const txApp = algosdk.makeApplicationNoOpTxn(sender, params, this.appId, appArgs, appAccounts.length === 0 ? undefined : appAccounts)
|
||||
const txApp = algosdk.makeApplicationNoOpTxn(sender, params, ContractInfo[contract].appId, appArgs, appAccounts.length === 0 ? undefined : appAccounts)
|
||||
const txId = txApp.txID().toString()
|
||||
|
||||
// Sign the transaction
|
||||
|
@ -305,56 +294,11 @@ class PricecasterLib {
|
|||
}
|
||||
|
||||
/**
|
||||
* Internal function.
|
||||
* Call application specifying args and accounts. Do it in a group of dummy TXs for maximizing computations.
|
||||
* @param {String} sender caller address
|
||||
* @param {Array} appArgs array of arguments to pass to application call
|
||||
* @param {Array} appAccounts array of accounts to pass to application call
|
||||
* ClearState sender. Remove all the sender associated local data.
|
||||
* @param {String} sender account to ClearState
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @param {number} dummyTxCount the number of dummyTx to submit, with the real call last.
|
||||
* @return {String} transaction id of the transaction
|
||||
* @return {[String]} transaction id of one of the transactions of the group
|
||||
*/
|
||||
this.callAppInDummyGroup = async function (sender, appArgs, appAccounts, signCallback, dummyTxCount) {
|
||||
// get node suggested parameters
|
||||
const params = await this.algodClient.getTransactionParams().do()
|
||||
|
||||
params.fee = this.minFee
|
||||
params.flatFee = true
|
||||
|
||||
// console.log(appArgs)
|
||||
|
||||
const txns = []
|
||||
const enc = new TextEncoder()
|
||||
for (let i = 0; i < dummyTxCount; ++i) {
|
||||
txns.push(algosdk.makeApplicationNoOpTxn(sender,
|
||||
params,
|
||||
this.appId,
|
||||
undefined, undefined, undefined, undefined,
|
||||
enc.encode(`dummy_TX_${i}`)))
|
||||
}
|
||||
const appTx = algosdk.makeApplicationNoOpTxn(sender, params, this.appId, appArgs)
|
||||
txns.push(appTx)
|
||||
algosdk.assignGroupID(txns)
|
||||
const txId = appTx.txID().toString()
|
||||
|
||||
// Sign the transactions
|
||||
const signedTxns = []
|
||||
for (const tx of txns) {
|
||||
signedTxns.push(signCallback(sender, tx))
|
||||
}
|
||||
|
||||
// Submit the transaction
|
||||
await this.algodClient.sendRawTransaction(signedTxns).do()
|
||||
|
||||
return txId
|
||||
}
|
||||
|
||||
/**
|
||||
* ClearState sender. Remove all the sender associated local data.
|
||||
* @param {String} sender account to ClearState
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @return {[String]} transaction id of one of the transactions of the group
|
||||
*/
|
||||
this.clearApp = async function (sender, signCallback, forcedAppId) {
|
||||
// get node suggested parameters
|
||||
const params = await this.algodClient.getTransactionParams().do()
|
||||
|
@ -381,12 +325,12 @@ class PricecasterLib {
|
|||
}
|
||||
|
||||
/**
|
||||
* Permanent delete the application.
|
||||
* @param {String} sender owner account
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @param {Function} applicationId use this application id instead of the one set
|
||||
* @return {String} transaction id of one of the transactions of the group
|
||||
*/
|
||||
* Permanent delete the application.
|
||||
* @param {String} sender owner account
|
||||
* @param {Function} signCallback callback with prototype signCallback(sender, tx) used to sign transactions
|
||||
* @param {Function} applicationId use this application id instead of the one set
|
||||
* @return {String} transaction id of one of the transactions of the group
|
||||
*/
|
||||
this.deleteApp = async function (sender, signCallback, applicationId) {
|
||||
// get node suggested parameters
|
||||
const params = await this.algodClient.getTransactionParams().do()
|
||||
|
@ -412,10 +356,10 @@ class PricecasterLib {
|
|||
}
|
||||
|
||||
/**
|
||||
* Helper function to wait until transaction txId is included in a block/round.
|
||||
* @param {String} txId transaction id to wait for
|
||||
* @return {VOID} VOID
|
||||
*/
|
||||
* Helper function to wait until transaction txId is included in a block/round.
|
||||
* @param {String} txId transaction id to wait for
|
||||
* @return {VOID} VOID
|
||||
*/
|
||||
this.waitForConfirmation = async function (txId) {
|
||||
const status = (await this.algodClient.status().do())
|
||||
let lastRound = status['last-round']
|
||||
|
@ -433,11 +377,11 @@ class PricecasterLib {
|
|||
}
|
||||
|
||||
/**
|
||||
* Helper function to wait until transaction txId is included in a block/round
|
||||
* and returns the transaction response associated to the transaction.
|
||||
* @param {String} txId transaction id to get transaction response
|
||||
* @return {Object} returns an object containing response information
|
||||
*/
|
||||
* Helper function to wait until transaction txId is included in a block/round
|
||||
* and returns the transaction response associated to the transaction.
|
||||
* @param {String} txId transaction id to get transaction response
|
||||
* @return {Object} returns an object containing response information
|
||||
*/
|
||||
this.waitForTransactionResponse = async function (txId) {
|
||||
// Wait for confirmation
|
||||
await this.waitForConfirmation(txId)
|
||||
|
@ -446,57 +390,6 @@ class PricecasterLib {
|
|||
return this.algodClient.pendingTransactionInformation(txId).do()
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates a message with price data for the PriceKeeper contract
|
||||
* @param {String} symbol Symbol, must match appid support, 16-char UTF long
|
||||
* @param {BigInt} price Aggregated price
|
||||
* @param {BigInt} confidence Confidence
|
||||
* @param {BigInt} exp Exponent (positive)
|
||||
* @param {BigInt} slot Valid-slot of price aggregation
|
||||
* @param {Uint8Array} sk Signing key.
|
||||
* @param {string} header (optional) Message header. 'PRICEDATA' if undefined.
|
||||
* @param {BigInt} appId (optional) AppId. Default is this contract appId.
|
||||
* @param {number} version (optional) Version. Default is 1 if undefined.
|
||||
* @param {BigInt} ts (optional) Timestamp of message. Current system ts if undefined.
|
||||
* @returns A base64-encoded message.
|
||||
*/
|
||||
this.createMessage = function (symbol, price, exp, confidence, slot, sk, header, appId, version, ts) {
|
||||
const buf = Buffer.alloc(138)
|
||||
buf.write(header === undefined ? 'PRICEDATA' : header, 0)
|
||||
buf.writeInt8(version === undefined ? 1 : version, 9)
|
||||
buf.writeBigUInt64BE(appId === undefined ? BigInt(this.appId) : appId, 10)
|
||||
buf.write(symbol, 18)
|
||||
buf.writeBigUInt64BE(price, 34)
|
||||
|
||||
// (!) Libraries like Pyth publish negative exponents. Write as signed 64bit
|
||||
|
||||
buf.writeBigInt64BE(exp, 42)
|
||||
buf.writeBigUInt64BE(confidence, 50)
|
||||
buf.writeBigUInt64BE(slot, 58)
|
||||
buf.writeBigUInt64BE(ts === undefined ? BigInt(Math.floor(Date.now() / 1000)) : ts, 66)
|
||||
|
||||
const digestu8 = Buffer.from(sha512_256(buf.slice(0, 74)), 'hex')
|
||||
|
||||
const signature = Buffer.from(algosdk.tealSign(sk, digestu8, this.approvalProgramHash))
|
||||
signature.copy(buf, 74)
|
||||
return buf
|
||||
}
|
||||
|
||||
/**
|
||||
* Submits message to the PriceKeeper contract.
|
||||
* @param {*} sender Sender account
|
||||
* @param {*} msgb64 Base64-encoded message.
|
||||
* @returns Transaction identifier (txid)
|
||||
*/
|
||||
this.submitMessage = async function (sender, msgBuffer, signCallback) {
|
||||
if (!algosdk.isValidAddress(sender)) {
|
||||
throw new Error('Invalid sender address: ' + sender)
|
||||
}
|
||||
const appArgs = []
|
||||
appArgs.push(new Uint8Array(msgBuffer))
|
||||
return await this.callAppInDummyGroup(sender, appArgs, [], signCallback, 3)
|
||||
}
|
||||
|
||||
/**
|
||||
* VAA Processor: Sets the stateless logic program hash
|
||||
* @param {*} sender Sender account
|
||||
|
@ -510,22 +403,43 @@ class PricecasterLib {
|
|||
const appArgs = []
|
||||
appArgs.push(new Uint8Array(Buffer.from('setvphash')),
|
||||
algosdk.decodeAddress(hash).publicKey)
|
||||
return await this.callApp(sender, appArgs, [], signCallback)
|
||||
return await this.callApp(sender, 'vaaProcessor', appArgs, [], signCallback)
|
||||
}
|
||||
|
||||
/**
|
||||
* VAA Processor: Sets the authorized application id for last call
|
||||
* @param {*} sender Sender account
|
||||
* @param {*} appId The assigned appId
|
||||
* @returns Transaction identifier.
|
||||
*/
|
||||
this.setAuthorizedAppId = async function (sender, appId, signCallback) {
|
||||
if (!algosdk.isValidAddress(sender)) {
|
||||
throw new Error('Invalid sender address: ' + sender)
|
||||
}
|
||||
const appArgs = []
|
||||
appArgs.push(new Uint8Array(Buffer.from('setauthid')),
|
||||
algosdk.encodeUint64(appId))
|
||||
return await this.callApp(sender, 'vaaProcessor', appArgs, [], signCallback)
|
||||
}
|
||||
|
||||
/**
|
||||
* Starts a begin...commit section for commiting grouped transactions.
|
||||
*/
|
||||
this.beginTxGroup = function () {
|
||||
this.groupTx = []
|
||||
const gid = crypto.randomBytes(16).toString('hex')
|
||||
this.groupTxSet[gid] = []
|
||||
return gid
|
||||
}
|
||||
|
||||
/**
|
||||
* Adds a transaction to the group.
|
||||
* @param {} tx Transaction to add.
|
||||
*/
|
||||
this.addTxToGroup = function (tx) {
|
||||
this.groupTx.push(tx)
|
||||
* Adds a transaction to the group.
|
||||
* @param {} tx Transaction to add.
|
||||
*/
|
||||
this.addTxToGroup = function (gid, tx) {
|
||||
if (this.groupTxSet[gid] === undefined) {
|
||||
throw new Error('unknown tx group id')
|
||||
}
|
||||
this.groupTxSet[gid].push(tx)
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -533,56 +447,73 @@ class PricecasterLib {
|
|||
* @param {function} signCallback The sign callback routine.
|
||||
* @returns Transaction id.
|
||||
*/
|
||||
this.commitTxGroup = async function (sender, signCallback) {
|
||||
algosdk.assignGroupID(this.groupTx)
|
||||
this.commitTxGroup = async function (gid, sender, signCallback) {
|
||||
if (this.groupTxSet[gid] === undefined) {
|
||||
throw new Error('unknown tx group id')
|
||||
}
|
||||
algosdk.assignGroupID(this.groupTxSet[gid])
|
||||
|
||||
// Sign the transactions
|
||||
const signedTxns = []
|
||||
for (const tx of this.groupTx) {
|
||||
for (const tx of this.groupTxSet[gid]) {
|
||||
signedTxns.push(signCallback(sender, tx))
|
||||
}
|
||||
|
||||
// Submit the transaction
|
||||
const tx = await this.algodClient.sendRawTransaction(signedTxns).do()
|
||||
this.groupTx = []
|
||||
delete this.groupTxSet[gid]
|
||||
return tx.txId
|
||||
}
|
||||
|
||||
/**
|
||||
* @param {*} sender The sender account.
|
||||
* @param {*} programBytes Compiled program bytes.
|
||||
* @param {*} sigSubsets The signature subsets i..j for logicsig arguments.
|
||||
* @param {*} totalSignatureCount Total signatures present in the VAA.
|
||||
* @param {*} sigSubsets An hex string with the signature subsets i..j for logicsig arguments.
|
||||
* @param {*} lastTxSender The sender of the last TX in the group.
|
||||
* @param {*} signCallback The signing callback function to use in the last TX of the group.
|
||||
* @returns Transaction id.
|
||||
*/
|
||||
this.commitVerifyTxGroup = async function (programBytes, sigSubsets) {
|
||||
algosdk.assignGroupID(this.groupTx)
|
||||
this.commitVerifyTxGroup = async function (gid, programBytes, totalSignatureCount, sigSubsets, lastTxSender, signCallback) {
|
||||
if (this.groupTxSet[gid] === undefined) {
|
||||
throw new Error('unknown group id')
|
||||
}
|
||||
algosdk.assignGroupID(this.groupTxSet[gid])
|
||||
const signedGroup = []
|
||||
let i = 0
|
||||
for (const tx of this.groupTx) {
|
||||
const lsig = new algosdk.LogicSigAccount(programBytes, [Buffer.from(sigSubsets[i++], 'hex')])
|
||||
const stxn = algosdk.signLogicSigTransaction(tx, lsig)
|
||||
signedGroup.push(stxn.blob)
|
||||
for (const tx of this.groupTxSet[gid]) {
|
||||
// All transactions except last must be signed by stateless code.
|
||||
|
||||
// console.log(`sigSubsets[${i}]: ${sigSubsets[i])
|
||||
|
||||
if (i === this.groupTxSet[gid].length - 1) {
|
||||
signedGroup.push(signCallback(lastTxSender, tx))
|
||||
} else {
|
||||
const lsig = new algosdk.LogicSigAccount(programBytes, [Buffer.from(sigSubsets[i], 'hex'), algosdk.encodeUint64(totalSignatureCount)])
|
||||
const stxn = algosdk.signLogicSigTransaction(tx, lsig)
|
||||
signedGroup.push(stxn.blob)
|
||||
}
|
||||
i++
|
||||
}
|
||||
|
||||
// Save transaction for debugging.
|
||||
|
||||
// fs.unlinkSync('signedgroup.stxn')
|
||||
|
||||
// for (let i = 0; i < signedGroup.length; ++i) {
|
||||
// fs.appendFileSync('signedgroup.stxn', signedGroup[i])
|
||||
// }
|
||||
|
||||
// const dr = await algosdk.createDryrun({
|
||||
// client: algodClient,
|
||||
// txns: drtxns,
|
||||
// sources: [new algosdk.modelsv2.DryrunSource('lsig', fs.readFileSync(vaaVerifyStatelessProgramFilename).toString('utf8'))]
|
||||
// })
|
||||
// // const drobj = await algodClient.dryrun(dr).do()
|
||||
// fs.writeFileSync('dump.dr', algosdk.encodeObj(dr.get_obj_for_encoding(true)))
|
||||
|
||||
// Submit the transaction
|
||||
const tx = await this.algodClient.sendRawTransaction(signedGroup).do()
|
||||
this.groupTx = []
|
||||
let tx
|
||||
try {
|
||||
tx = await this.algodClient.sendRawTransaction(signedGroup).do()
|
||||
} catch (e) {
|
||||
if (this.dumpFailedTx) {
|
||||
const id = tx ? tx.txId : Date.now().toString()
|
||||
const filename = `${this.dumpFailedTxDirectory}/failed-${id}.stxn`
|
||||
if (fs.existsSync(filename)) {
|
||||
fs.unlinkSync(filename)
|
||||
}
|
||||
for (let i = 0; i < signedGroup.length; ++i) {
|
||||
fs.appendFileSync(filename, signedGroup[i])
|
||||
}
|
||||
}
|
||||
throw e
|
||||
}
|
||||
delete this.groupTxSet[gid]
|
||||
return tx.txId
|
||||
}
|
||||
|
||||
|
@ -593,7 +524,10 @@ class PricecasterLib {
|
|||
* @param {*} gksubset An hex string containing the keys for the guardian subset in this step.
|
||||
* @param {*} totalguardians The total number of known guardians.
|
||||
*/
|
||||
this.addVerifyTx = function (sender, params, payload, gksubset, totalguardians) {
|
||||
this.addVerifyTx = function (gid, sender, params, payload, gksubset, totalguardians) {
|
||||
if (this.groupTxSet[gid] === undefined) {
|
||||
throw new Error('unknown group id')
|
||||
}
|
||||
const appArgs = []
|
||||
appArgs.push(new Uint8Array(Buffer.from('verify')),
|
||||
new Uint8Array(Buffer.from(gksubset.join(''), 'hex')),
|
||||
|
@ -601,10 +535,34 @@ class PricecasterLib {
|
|||
|
||||
const tx = algosdk.makeApplicationNoOpTxn(sender,
|
||||
params,
|
||||
this.appId,
|
||||
ContractInfo.vaaProcessor.appId,
|
||||
appArgs, undefined, undefined, undefined,
|
||||
new Uint8Array(payload))
|
||||
this.groupTx.push(tx)
|
||||
this.groupTxSet[gid].push(tx)
|
||||
|
||||
return tx.txID()
|
||||
}
|
||||
|
||||
/**
|
||||
* Pricekeeper-V2: Add store price transaction to TX Group.
|
||||
* @param {*} sender The sender account (typically the VAA verification stateless program)
|
||||
* @param {*} sym The symbol identifying the product to store price for.
|
||||
* @param {*} payload The VAA payload.
|
||||
*/
|
||||
this.addPriceStoreTx = function (gid, sender, params, sym, payload) {
|
||||
if (this.groupTxSet[gid] === undefined) {
|
||||
throw new Error('unknown group id')
|
||||
}
|
||||
const appArgs = []
|
||||
appArgs.push(new Uint8Array(Buffer.from('store')),
|
||||
new Uint8Array(Buffer.from(sym)),
|
||||
new Uint8Array(payload))
|
||||
|
||||
const tx = algosdk.makeApplicationNoOpTxn(sender,
|
||||
params,
|
||||
ContractInfo.pricekeeper.appId,
|
||||
appArgs)
|
||||
this.groupTxSet[gid].push(tx)
|
||||
|
||||
return tx.txID()
|
||||
}
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
Log file output in this directory.
|
File diff suppressed because it is too large
Load Diff
|
@ -1,31 +1,30 @@
|
|||
{
|
||||
"name": "pricecaster",
|
||||
"version": "1.0.0",
|
||||
"description": "Pricecaster Service",
|
||||
"version": "2.0.0",
|
||||
"description": "Pricecaster V2 Service",
|
||||
"main": "index.js",
|
||||
"scripts": {
|
||||
"compile": "tsc",
|
||||
"build": "rimraf build && npm run compile",
|
||||
"prepack": "npm run build",
|
||||
"start-btc": "npm run compile && cross-env PRICECASTER_SETTINGS=./settings/settings-btc.js node build/main.js",
|
||||
"start-eth": "npm run compile && cross-env PRICECASTER_SETTINGS=./settings/settings-eth.js node build/main.js",
|
||||
"start-doge": "npm run compile && cross-env PRICECASTER_SETTINGS=./settings/settings-doge.js node build/main.js",
|
||||
"test-pkeeper-sc": "mocha test/pkeeper-sc-test.js --timeout 60000 --bail",
|
||||
"test-wormhole-sc": "mocha test/wormhole-sc-test.js --timeout 60000 --bail"
|
||||
"start": "npm run compile && cross-env PRICECASTER_SETTINGS=./settings/settings-worm.js node build/main.js",
|
||||
"test-wormhole-sc": "mocha test/wormhole-sc-test.js --timeout 60000 --bail --allow-uncaught"
|
||||
},
|
||||
"author": "Randlabs inc",
|
||||
"license": "ISC",
|
||||
"dependencies": {
|
||||
"@certusone/wormhole-sdk": "^0.0.9",
|
||||
"@certusone/wormhole-sdk": "^0.1.3",
|
||||
"@certusone/wormhole-spydk": "^0.0.1",
|
||||
"@improbable-eng/grpc-web-node-http-transport": "^0.15.0",
|
||||
"@pythnetwork/client": "^2.3.1",
|
||||
"@randlabs/js-config-reader": "^1.1.0",
|
||||
"@randlabs/js-logger": "^1.2.0",
|
||||
"algosdk": "^1.12.0",
|
||||
"base58-universal": "^1.0.0",
|
||||
"charm": "^1.0.2",
|
||||
"elliptic": "^6.5.4",
|
||||
"esm": "^3.2.25",
|
||||
"ethers": "^5.5.1",
|
||||
"fastpriorityqueue": "^0.7.1",
|
||||
"js-sha512": "^0.8.0",
|
||||
"web3-eth-abi": "^1.6.1",
|
||||
"web3-utils": "^1.6.1"
|
||||
|
|
|
@ -1,20 +0,0 @@
|
|||
module.exports = {
|
||||
mode: 'pkeeper',
|
||||
algo: {
|
||||
token: '',
|
||||
api: 'https://api.testnet.algoexplorer.io',
|
||||
port: ''
|
||||
},
|
||||
pyth: {
|
||||
solanaClusterName: 'devnet'
|
||||
},
|
||||
params: {
|
||||
verbose: true,
|
||||
symbol: 'BTC/USD',
|
||||
bufferSize: 100,
|
||||
publishIntervalSecs: 30,
|
||||
priceKeeperAppId: 32968790,
|
||||
validator: 'OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU',
|
||||
mnemo: 'assault approve result rare float sugar power float soul kind galaxy edit unusual pretty tone tilt net range pelican avoid unhappy amused recycle abstract master'
|
||||
}
|
||||
}
|
|
@ -1,20 +0,0 @@
|
|||
module.exports = {
|
||||
mode: 'pkeeper',
|
||||
algo: {
|
||||
token: '',
|
||||
api: 'https://api.testnet.algoexplorer.io',
|
||||
port: ''
|
||||
},
|
||||
pyth: {
|
||||
solanaClusterName: 'devnet'
|
||||
},
|
||||
params: {
|
||||
verbose: true,
|
||||
symbol: 'DOGE/USD',
|
||||
bufferSize: 100,
|
||||
publishIntervalSecs: 30,
|
||||
priceKeeperAppId: 32984598,
|
||||
validator: 'OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU',
|
||||
mnemo: 'assault approve result rare float sugar power float soul kind galaxy edit unusual pretty tone tilt net range pelican avoid unhappy amused recycle abstract master'
|
||||
}
|
||||
}
|
|
@ -1,20 +0,0 @@
|
|||
module.exports = {
|
||||
mode: 'pkeeper',
|
||||
algo: {
|
||||
token: '',
|
||||
api: 'https://api.testnet.algoexplorer.io',
|
||||
port: ''
|
||||
},
|
||||
pyth: {
|
||||
solanaClusterName: 'devnet'
|
||||
},
|
||||
params: {
|
||||
verbose: true,
|
||||
symbol: 'ETH/USD',
|
||||
bufferSize: 100,
|
||||
publishIntervalSecs: 30,
|
||||
priceKeeperAppId: 32984466,
|
||||
validator: 'OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU',
|
||||
mnemo: 'assault approve result rare float sugar power float soul kind galaxy edit unusual pretty tone tilt net range pelican avoid unhappy amused recycle abstract master'
|
||||
}
|
||||
}
|
|
@ -0,0 +1,71 @@
|
|||
const path = require('path')
|
||||
|
||||
module.exports = {
|
||||
log: {
|
||||
appName: 'pricecaster-v2',
|
||||
disableConsoleLog: false,
|
||||
fileLog: {
|
||||
dir: './log',
|
||||
daysTokeep: 7
|
||||
},
|
||||
// sysLog: {
|
||||
// host: '127.0.0.1',
|
||||
// port: 514,
|
||||
// transport: 'udp',
|
||||
// protocol: 'bsd',
|
||||
// sendInfoNotifications: false
|
||||
// },
|
||||
debugLevel: 1
|
||||
},
|
||||
algo: {
|
||||
token: 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa',
|
||||
api: 'http://127.0.0.1',
|
||||
port: '4001',
|
||||
dumpFailedTx: true,
|
||||
dumpFailedTxDirectory: './dump'
|
||||
},
|
||||
apps: {
|
||||
vaaVerifyProgramBinFile: 'bin/vaa-verify.bin',
|
||||
vaaProcessorAppId: 622608992,
|
||||
priceKeeperV2AppId: 622609307,
|
||||
vaaVerifyProgramHash: 'ISTS5S7JLD5FBLM27NW7IWMQC4XPUOGGPFHOCEOL22Q557BIDOXHENLI6Y',
|
||||
ownerAddress: 'OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU',
|
||||
ownerKeyFile: './keys/owner.key'
|
||||
},
|
||||
pyth: {
|
||||
chainId: 1,
|
||||
emitterAddress: '3afda841c1f43dd7d546c8a581ba1f92a139f4133f9f6ab095558f6a359df5d4'
|
||||
},
|
||||
wormhole: {
|
||||
spyServiceHost: 'localhost:7073'
|
||||
},
|
||||
strategy: {
|
||||
bufferSize: 100
|
||||
},
|
||||
symbols: [
|
||||
{
|
||||
name: 'ETH/USD',
|
||||
productId: 'c67940be40e0cc7ffaa1acb08ee3fab30955a197da1ec297ab133d4d43d86ee6',
|
||||
priceId: 'ff61491a931112ddf1bd8147cd1b641375f79f5825126d665480874634fd0ace',
|
||||
publishIntervalSecs: 30
|
||||
},
|
||||
{
|
||||
name: 'ALGO/USD',
|
||||
productId: '30fabb4e8ee48aec78799e8835c1b744d10d212c64f2671bed98d7b76a5306b0',
|
||||
priceId: 'fa17ceaf30d19ba51112fdcc750cc83454776f47fb0112e4af07f15f4bb1ebc0',
|
||||
publishIntervalSecs: 15
|
||||
},
|
||||
{
|
||||
productId: '3515b3861e8fe93e5f540ba4077c216404782b86d5e78077b3cbfd27313ab3bc',
|
||||
priceId: 'e62df6c8b4a85fe1a67db44dc12de5db330f7ac66b72dc658afedf0f4a415b43',
|
||||
name: 'BTC/USD',
|
||||
publishIntervalSecs: 25
|
||||
},
|
||||
{
|
||||
productId: '230abfe0ec3b460bd55fc4fb36356716329915145497202b8eb8bf1af6a0a3b9',
|
||||
priceId: 'fe650f0367d4a7ef9815a593ea15d36593f0643aaaf0149bb04be67ab851decd',
|
||||
name: 'TEST',
|
||||
publishIntervalSecs: 20
|
||||
}
|
||||
]
|
||||
}
|
|
@ -7,7 +7,7 @@
|
|||
#
|
||||
from pyteal.types import *
|
||||
from pyteal.ast import *
|
||||
MAX_SIGNATURES_PER_VERIFICATION_STEP = 6
|
||||
MAX_SIGNATURES_PER_VERIFICATION_STEP = 8
|
||||
|
||||
"""
|
||||
Math ceil function.
|
||||
|
|
|
@ -0,0 +1,171 @@
|
|||
#!/usr/bin/python3
|
||||
"""
|
||||
================================================================================================
|
||||
|
||||
The Pricekeeper II Program
|
||||
|
||||
(c) 2021-22 Randlabs, Inc.
|
||||
|
||||
------------------------------------------------------------------------------------------------
|
||||
|
||||
This program stores price data verified from Pyth VAA messaging. To accept data, this application
|
||||
requires to be the last of the verification transaction group, and the verification condition
|
||||
bits must be set.
|
||||
|
||||
The following application calls are available.
|
||||
|
||||
submit: Submit payload.
|
||||
This must be 150-bytes long (Pyth native payload.)
|
||||
------------------------------------------------------------------------------------------------
|
||||
|
||||
Global state:
|
||||
|
||||
key name of symbol
|
||||
value packed fields as follow:
|
||||
|
||||
Bytes
|
||||
32 productId
|
||||
32 priceId
|
||||
8 price
|
||||
1 price_type
|
||||
4 exponent
|
||||
8 twap value
|
||||
8 twac value
|
||||
8 confidence
|
||||
8 timestamp (based on Solana contract call time)
|
||||
------------------------------
|
||||
Total: 109 bytes.
|
||||
|
||||
------------------------------------------------------------------------------------------------
|
||||
"""
|
||||
from pyteal.ast import *
|
||||
from pyteal.types import *
|
||||
from pyteal.compiler import *
|
||||
from pyteal.ir import *
|
||||
from globals import *
|
||||
import sys
|
||||
|
||||
METHOD = Txn.application_args[0]
|
||||
ARG_SYMBOL_NAME = Txn.application_args[1]
|
||||
ARG_PRICE_DATA = Txn.application_args[2]
|
||||
SLOTID_VERIFIED_BIT = 254
|
||||
SLOT_VERIFIED_BITFIELD = ScratchVar(TealType.uint64, SLOTID_VERIFIED_BIT)
|
||||
SLOT_TEMP = ScratchVar(TealType.uint64)
|
||||
VAA_PROCESSOR_APPID = App.globalGet(Bytes("vaapid"))
|
||||
PYTH_PAYLOAD_LENGTH_BYTES = 150
|
||||
|
||||
|
||||
@Subroutine(TealType.uint64)
|
||||
def is_creator():
|
||||
return Txn.sender() == Global.creator_address()
|
||||
|
||||
|
||||
@Subroutine(TealType.uint64)
|
||||
# Arg0: Bootstrap with the authorized VAA Processor appid.
|
||||
def bootstrap():
|
||||
return Seq([
|
||||
App.globalPut(Bytes("vaapid"), Btoi(Txn.application_args[0])),
|
||||
Approve()
|
||||
])
|
||||
|
||||
|
||||
@Subroutine(TealType.uint64)
|
||||
def check_group_tx():
|
||||
#
|
||||
# Verifies that previous steps had set their verification bits.
|
||||
# Verifies that previous steps are app calls issued from authorized appId.
|
||||
#
|
||||
i = SLOT_TEMP
|
||||
return Seq([
|
||||
For(i.store(Int(1)),
|
||||
i.load() < Global.group_size() - Int(1),
|
||||
i.store(i.load() + Int(1))).Do(Seq([
|
||||
Assert(Gtxn[i.load()].type_enum() == TxnType.ApplicationCall),
|
||||
Assert(Gtxn[i.load()].application_id()
|
||||
== VAA_PROCESSOR_APPID),
|
||||
Assert(GetBit(ImportScratchValue(i.load() - Int(1),
|
||||
SLOTID_VERIFIED_BIT), i.load() - Int(1)) == Int(1))
|
||||
])
|
||||
),
|
||||
Return(Int(1))
|
||||
])
|
||||
|
||||
|
||||
def store():
|
||||
# * Sender must be owner
|
||||
# * This must be part of a transaction group
|
||||
# * All calls in group must be issued from authorized appid.
|
||||
# * All calls in group must have verification bits set.
|
||||
# * Argument 0 must be price symbol name.
|
||||
# * Argument 1 must be Pyth payload (150 bytes long)
|
||||
|
||||
pyth_price_data = ScratchVar(TealType.bytes)
|
||||
packed_price_data = ScratchVar(TealType.bytes)
|
||||
return Seq([
|
||||
pyth_price_data.store(ARG_PRICE_DATA),
|
||||
Assert(Global.group_size() > Int(1)),
|
||||
Assert(Len(pyth_price_data.load()) == Int(PYTH_PAYLOAD_LENGTH_BYTES)),
|
||||
Assert(Txn.application_args.length() == Int(3)),
|
||||
Assert(is_creator()),
|
||||
Assert(check_group_tx()),
|
||||
|
||||
# Unpack Pyth payload and store the data we want (see doc at beginning)
|
||||
|
||||
packed_price_data.store(Concat(
|
||||
# store product_id, price_id, price_type, price, exponent, twap
|
||||
Extract(pyth_price_data.load(), Int(14), Int(85)),
|
||||
Extract(pyth_price_data.load(), Int(108), Int(8)), # store twac
|
||||
Extract(pyth_price_data.load(), Int(132), Int(8)), # confidence
|
||||
Extract(pyth_price_data.load(), Int(142), Int(8)), # timestamp
|
||||
)),
|
||||
App.globalPut(ARG_SYMBOL_NAME, packed_price_data.load()),
|
||||
Approve()])
|
||||
|
||||
|
||||
def pricekeeper_program():
|
||||
handle_create = Return(bootstrap())
|
||||
handle_update = Return(is_creator())
|
||||
handle_delete = Return(is_creator())
|
||||
handle_noop = Cond(
|
||||
[METHOD == Bytes("store"), store()],
|
||||
)
|
||||
return Cond(
|
||||
[Txn.application_id() == Int(0), handle_create],
|
||||
[Txn.on_completion() == OnComplete.UpdateApplication, handle_update],
|
||||
[Txn.on_completion() == OnComplete.DeleteApplication, handle_delete],
|
||||
[Txn.on_completion() == OnComplete.NoOp, handle_noop]
|
||||
)
|
||||
|
||||
|
||||
def clear_state_program():
|
||||
return Int(1)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
|
||||
approval_outfile = "teal/wormhole/build/pricekeeper-v2-approval.teal"
|
||||
clear_state_outfile = "teal/wormhole/build/pricekeeper-v2-clear.teal"
|
||||
|
||||
if len(sys.argv) >= 2:
|
||||
approval_outfile = sys.argv[1]
|
||||
|
||||
if len(sys.argv) >= 3:
|
||||
clear_state_outfile = sys.argv[2]
|
||||
|
||||
print("Pricekeeper V2 Program, (c) 2021-22 Randlabs Inc. ")
|
||||
print("Compiling approval program...")
|
||||
|
||||
with open(approval_outfile, "w") as f:
|
||||
compiled = compileTeal(pricekeeper_program(),
|
||||
mode=Mode.Application, version=5)
|
||||
f.write(compiled)
|
||||
|
||||
print("Written to " + approval_outfile)
|
||||
print("Compiling clear state program...")
|
||||
|
||||
with open(clear_state_outfile, "w") as f:
|
||||
compiled = compileTeal(clear_state_program(),
|
||||
mode=Mode.Application, version=5)
|
||||
f.write(compiled)
|
||||
|
||||
print("Written to " + clear_state_outfile)
|
|
@ -6,6 +6,11 @@ The VAA Processor Program
|
|||
|
||||
(c) 2021 Randlabs, Inc.
|
||||
|
||||
Changelog.
|
||||
|
||||
v1.0 - Initial design
|
||||
v1.1 211214 - Group must end with either a dummy or app-call such as Store price onchain.
|
||||
|
||||
------------------------------------------------------------------------------------------------
|
||||
|
||||
This program is the core client to signed VAAs from Wormhole, working in tandem with the
|
||||
|
@ -14,15 +19,19 @@ verify-vaa.teal stateless programs.
|
|||
The following application calls are available.
|
||||
|
||||
setvphash: Set verify program hash.
|
||||
|
||||
Must be part of group:
|
||||
setauthid: Set the authorized app-id of the last transaction call in the group, used as consumer
|
||||
of the verified VAA.
|
||||
|
||||
verify: Verify guardian signature subset i..j, works in tandem with stateless program.
|
||||
Arguments: #0 guardian public keys subset i..j (must match stored in global state)
|
||||
#1 guardian signatures subset i..j
|
||||
TX Note: payload to verify
|
||||
Last verification step (the last TX in group) triggers the VAA commiting stage,
|
||||
where we decide what to do based on the payload.
|
||||
Last verification step triggers the VAA commiting stage,
|
||||
where we decide what to do based on the payload. A last work transaction must be issued,
|
||||
with a call to an authorized app-id (authid). This serves for example to call a Pricekeeper
|
||||
contract to store price data on-chain.
|
||||
If nothing is to be done, any dummy app-call must be called for the group to be approved.
|
||||
|
||||
------------------------------------------------------------------------------------------------
|
||||
|
||||
Global state:
|
||||
|
@ -31,6 +40,8 @@ Global state:
|
|||
"gsexp" : Guardian set expiration time
|
||||
"gscount" : Guardian set size
|
||||
"vssize" : Verification step size.
|
||||
"authid" : The authorized app-id of the last transaction call in the group, used as consumer
|
||||
of the verified VAA.
|
||||
key N : address of guardian N
|
||||
|
||||
------------------------------------------------------------------------------------------------
|
||||
|
@ -56,6 +67,7 @@ SLOTID_TEMP_0 = 251
|
|||
SLOTID_VERIFIED_BIT = 254
|
||||
STATELESS_LOGIC_HASH = App.globalGet(Bytes("vphash"))
|
||||
NUM_GUARDIANS = App.globalGet(Bytes("gscount"))
|
||||
AUTHORIZED_APP_ID = App.globalGet(Bytes("authid"))
|
||||
SLOT_VERIFIED_BITFIELD = ScratchVar(TealType.uint64, SLOTID_VERIFIED_BIT)
|
||||
SLOT_TEMP = ScratchVar(TealType.uint64, SLOTID_TEMP_0)
|
||||
|
||||
|
@ -71,8 +83,8 @@ PYTH2WORMHOLE_EMITTER_ID = '0x3afda841c1f43dd7d546c8a581ba1f92a139f4133f9f6ab0
|
|||
|
||||
# VAA fields
|
||||
|
||||
VAA_RECORD_EMITTER_CHAIN_POS = 4
|
||||
VAA_RECORD_EMITTER_CHAIN_LEN = 4
|
||||
VAA_RECORD_EMITTER_CHAIN_POS = 8
|
||||
VAA_RECORD_EMITTER_CHAIN_LEN = 2
|
||||
VAA_RECORD_EMITTER_ADDR_POS = 10
|
||||
VAA_RECORD_EMITTER_ADDR_LEN = 32
|
||||
|
||||
|
@ -159,6 +171,10 @@ def handle_pyth_price_ticker():
|
|||
# Unpack the verified VAA payload and process it according to
|
||||
# the source based by emitterChainId, emitterAddress.
|
||||
#
|
||||
# NOTE: This will work when contract-to-contract call is available in the AVM.
|
||||
# Now, the transaction group must end with a call to process the VAA or
|
||||
# do-nothing, if you want only to do verification chores without processing anything.
|
||||
#
|
||||
def commit_vaa():
|
||||
chainId = Btoi(Extract(VERIFY_ARG_PAYLOAD, Int(
|
||||
VAA_RECORD_EMITTER_CHAIN_POS), Int(VAA_RECORD_EMITTER_CHAIN_LEN)))
|
||||
|
@ -188,7 +204,7 @@ def check_final_verification_state():
|
|||
i = SLOT_TEMP
|
||||
return Seq([
|
||||
For(i.store(Int(1)),
|
||||
i.load() < Global.group_size(),
|
||||
i.load() < Global.group_size() - Int(1),
|
||||
i.store(i.load() + Int(1))).Do(Seq([
|
||||
Assert(Gtxn[i.load()].type_enum() == TxnType.ApplicationCall),
|
||||
Assert(Gtxn[i.load()].application_id() == Txn.application_id()),
|
||||
|
@ -213,6 +229,19 @@ def setvphash():
|
|||
Approve()
|
||||
])
|
||||
|
||||
def setauthid():
|
||||
#
|
||||
# Sets the app-id of an authorized program to be executed as a
|
||||
# last call in the group to optionally consume the verified VAA.
|
||||
#
|
||||
|
||||
return Seq([
|
||||
Assert(is_creator()),
|
||||
Assert(Global.group_size() == Int(1)),
|
||||
Assert(Txn.application_args.length() == Int(2)),
|
||||
App.globalPut(Bytes("authid"), Btoi(Txn.application_args[1])),
|
||||
Approve()
|
||||
])
|
||||
|
||||
def verify():
|
||||
# * Sender must be stateless logic.
|
||||
|
@ -223,12 +252,15 @@ def verify():
|
|||
# * Passed guardian public keys [i..j] must match the current global state.
|
||||
# * Note must contain VAA message-in-digest (header+payload) (up to 1KB) (read by stateless logic)
|
||||
#
|
||||
# Last TX in group will trigger VAA handling depending on payload. It is required that
|
||||
# Last verify TX in group will trigger VAA handling depending on payload. It is required that
|
||||
# all previous transactions are app-calls for this AppId and all bitfields are set.
|
||||
# Last TX in group must be call to authorized applications.
|
||||
|
||||
return Seq([
|
||||
SLOT_VERIFIED_BITFIELD.store(Int(0)),
|
||||
Assert(Global.group_size() == get_group_size(NUM_GUARDIANS)),
|
||||
Assert(Global.group_size() == get_group_size(NUM_GUARDIANS) + Int(1)),
|
||||
Assert(Gtxn[Global.group_size() - Int(1)].type_enum() == TxnType.ApplicationCall),
|
||||
Assert(Gtxn[Global.group_size() - Int(1)].application_id() == AUTHORIZED_APP_ID),
|
||||
Assert(Txn.application_args.length() == Int(3)),
|
||||
Assert(Txn.sender() == STATELESS_LOGIC_HASH),
|
||||
Assert(check_guardian_set_size()),
|
||||
|
@ -236,7 +268,7 @@ def verify():
|
|||
SLOT_VERIFIED_BITFIELD.store(
|
||||
SetBit(SLOT_VERIFIED_BITFIELD.load(), Txn.group_index(), Int(1))),
|
||||
If(Txn.group_index() == Global.group_size() -
|
||||
Int(1)).Then(
|
||||
Int(2)).Then(
|
||||
Return(Seq([
|
||||
Assert(check_final_verification_state()),
|
||||
commit_vaa()
|
||||
|
@ -250,7 +282,9 @@ def vaa_processor_program():
|
|||
handle_delete = Return(is_creator())
|
||||
handle_noop = Cond(
|
||||
[METHOD == Bytes("setvphash"), setvphash()],
|
||||
[METHOD == Bytes("setauthid"), setauthid()],
|
||||
[METHOD == Bytes("verify"), verify()],
|
||||
[METHOD == Bytes("nop"), Return(Int(1))],
|
||||
)
|
||||
return Cond(
|
||||
[Txn.application_id() == Int(0), handle_create],
|
||||
|
|
|
@ -28,9 +28,10 @@ SLOTID_RECOVERED_PK_Y = 241
|
|||
|
||||
|
||||
@Subroutine(TealType.uint64)
|
||||
def sig_check(signatures, digest, keys):
|
||||
si = ScratchVar(TealType.uint64)
|
||||
ki = ScratchVar(TealType.uint64)
|
||||
def sig_check(signatures, digest, keys, vaa_signature_count):
|
||||
si = ScratchVar(TealType.uint64) # signature index (zero-based)
|
||||
ki = ScratchVar(TealType.uint64) # key index
|
||||
gi = ScratchVar(TealType.uint64) # guardian index (signature prefix)
|
||||
i = ScratchVar(TealType.uint64)
|
||||
rec_pk_x = ScratchVar(TealType.bytes, SLOTID_RECOVERED_PK_X)
|
||||
rec_pk_y = ScratchVar(TealType.bytes, SLOTID_RECOVERED_PK_Y)
|
||||
|
@ -39,6 +40,7 @@ def sig_check(signatures, digest, keys):
|
|||
[
|
||||
rec_pk_x.store(Bytes("")),
|
||||
rec_pk_y.store(Bytes("")),
|
||||
gi.store(Int(0)),
|
||||
For(Seq([
|
||||
i.store(Int(0)),
|
||||
si.store(Int(0)),
|
||||
|
@ -51,14 +53,19 @@ def sig_check(signatures, digest, keys):
|
|||
i.store(i.load() + Int(1)),
|
||||
])).Do(
|
||||
Seq([
|
||||
gi.store(Btoi(Extract(signatures, si.load(), Int(1)))),
|
||||
|
||||
# Bail out case if we must ignore all signatures past sig_count > 2/3+1
|
||||
If (gi.load() >= vaa_signature_count).Then(Break()),
|
||||
|
||||
# Index must be sequential
|
||||
|
||||
Assert(Btoi(Extract(signatures, si.load(), Int(1))) ==
|
||||
Assert(gi.load() ==
|
||||
i.load() + (Txn.group_index() * Int(MAX_SIGNATURES_PER_VERIFICATION_STEP))),
|
||||
|
||||
InlineAssembly(
|
||||
"ecdsa_pk_recover Secp256k1",
|
||||
Keccak256(digest),
|
||||
Keccak256(Keccak256(digest)),
|
||||
Btoi(Extract(signatures, si.load() + Int(65), Int(1))),
|
||||
Extract(signatures, si.load() + Int(1), Int(32)), # R
|
||||
Extract(signatures, si.load() + Int(33), Int(32)), # S
|
||||
|
@ -88,14 +95,16 @@ def sig_check(signatures, digest, keys):
|
|||
"""
|
||||
* Let N be the number of signatures per verification step, for the TX(i) in group, we verify signatures [j..k] where j = i*N, k = j+(N-1)
|
||||
* Input 0 is signatures [j..k] to verify as LogicSigArgs. (Format is GuardianIndex + signature)
|
||||
* Input 1 is signed digest of payload, contained in the note field of the TX in current slot.
|
||||
* Input 2 is public keys for guardians [j..k] contained in the first Argument of the TX in current slot.
|
||||
* Input 3 is guardian set size contained in the second argument of the TX in current slot.
|
||||
* Input 1 is the total signature count specified in the VAA. This must be > 2/3 of the guardian set plus 1.
|
||||
* Input 2 is signed digest of payload, contained in the note field of the TX in current slot.
|
||||
* Input 3 is public keys for guardians [j..k] contained in the first Argument of the TX in current slot.
|
||||
* Input 4 is guardian set size contained in the second argument of the TX in current slot.
|
||||
"""
|
||||
|
||||
|
||||
def vaa_verify_program(vaa_processor_app_id):
|
||||
signatures = Arg(0)
|
||||
vaa_signature_count = Arg(1)
|
||||
digest = Txn.note()
|
||||
keys = Txn.application_args[1]
|
||||
num_guardians = Txn.application_args[2]
|
||||
|
@ -103,13 +112,13 @@ def vaa_verify_program(vaa_processor_app_id):
|
|||
return Seq([
|
||||
Assert(Txn.fee() <= Int(1000)),
|
||||
Assert(Txn.application_args.length() == Int(3)),
|
||||
Assert(Len(signatures) == get_sig_count_in_step(
|
||||
Txn.group_index(), Btoi(num_guardians)) * Int(66)),
|
||||
Assert(Btoi(vaa_signature_count) > ((Btoi(num_guardians) * Int(10) / Int(3)) * Int(2)) / Int(10) + Int(1)),
|
||||
Assert(Len(signatures) == get_sig_count_in_step(Txn.group_index(), Btoi(num_guardians)) * Int(66)),
|
||||
Assert(Txn.rekey_to() == Global.zero_address()),
|
||||
Assert(Txn.application_id() == Int(vaa_processor_app_id)),
|
||||
Assert(Txn.type_enum() == TxnType.ApplicationCall),
|
||||
Assert(Global.group_size() == get_group_size(Btoi(num_guardians))),
|
||||
Assert(sig_check(signatures, digest, keys)),
|
||||
Assert(Global.group_size() == Int(1) + get_group_size(Btoi(num_guardians))),
|
||||
Assert(sig_check(signatures, digest, keys, Btoi(vaa_signature_count))),
|
||||
Approve()]
|
||||
)
|
||||
|
||||
|
|
|
@ -0,0 +1,25 @@
|
|||
module.exports = {
|
||||
// Configurations to use:
|
||||
//
|
||||
// Algoexplorer Betanet endpoint:
|
||||
//
|
||||
// ALGORAND_NODE_TOKEN: ''
|
||||
// ALGORAND_NODE_HOST: 'https://api.betanet.algoexplorer.io',
|
||||
// ALGORAND_NODE_PORT: ''
|
||||
//
|
||||
// Algoexplorer Testnet endpoint:
|
||||
//
|
||||
// ALGORAND_NODE_TOKEN: ''
|
||||
// ALGORAND_NODE_HOST: 'https://api.betanet.algoexplorer.io'
|
||||
// ALGORAND_NODE_PORT: ''
|
||||
//
|
||||
// Sandbox:
|
||||
//
|
||||
// ALGORAND_NODE_TOKEN: 'aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'
|
||||
// ALGORAND_NODE_HOST: 'localhost'
|
||||
// ALGORAND_NODE_PORT: '4001'
|
||||
// >
|
||||
ALGORAND_NODE_HOST: 'https://api.testnet.algoexplorer.io',
|
||||
ALGORAND_NODE_PORT: '',
|
||||
ALGORAND_NODE_TOKEN: ''
|
||||
}
|
|
@ -43,9 +43,9 @@ class TestLib {
|
|||
payload.substr(2)
|
||||
]
|
||||
|
||||
const hash = web3Utils.keccak256('0x' + body.join(''))
|
||||
const hash = web3Utils.keccak256(web3Utils.keccak256('0x' + body.join('')))
|
||||
|
||||
console.log('VAA body Hash: ', hash)
|
||||
// console.log('VAA body Hash: ', hash)
|
||||
|
||||
let signatures = ''
|
||||
|
||||
|
@ -83,6 +83,23 @@ class TestLib {
|
|||
}
|
||||
return value
|
||||
}
|
||||
|
||||
shuffle (array) {
|
||||
let currentIndex = array.length; let randomIndex
|
||||
|
||||
// While there remain elements to shuffle...
|
||||
while (currentIndex !== 0) {
|
||||
// Pick a remaining element...
|
||||
randomIndex = Math.floor(Math.random() * currentIndex)
|
||||
currentIndex--;
|
||||
|
||||
// And swap it with the current element.
|
||||
[array[currentIndex], array[randomIndex]] = [
|
||||
array[randomIndex], array[currentIndex]]
|
||||
}
|
||||
|
||||
return array
|
||||
}
|
||||
}
|
||||
|
||||
module.exports = {
|
||||
|
|
|
@ -4,16 +4,20 @@ const tools = require('../tools/app-tools')
|
|||
const algosdk = require('algosdk')
|
||||
const { expect } = require('chai')
|
||||
const chai = require('chai')
|
||||
chai.use(require('chai-as-promised'))
|
||||
const spawnSync = require('child_process').spawnSync
|
||||
const fs = require('fs')
|
||||
const TestLib = require('../test/testlib.js')
|
||||
const { makePaymentTxnWithSuggestedParams } = require('algosdk')
|
||||
const testLib = new TestLib.TestLib()
|
||||
const testConfig = require('./test-config')
|
||||
|
||||
chai.use(require('chai-as-promised'))
|
||||
|
||||
let pclib
|
||||
let algodClient
|
||||
let verifyProgramHash
|
||||
let compiledVerifyProgram
|
||||
|
||||
const OWNER_ADDR = 'OPDM7ACAW64Q4VBWAL77Z5SHSJVZZ44V3BAN7W44U43SUXEOUENZMZYOQU'
|
||||
const OWNER_MNEMO = 'assault approve result rare float sugar power float soul kind galaxy edit unusual pretty tone tilt net range pelican avoid unhappy amused recycle abstract master'
|
||||
const OTHER_ADDR = 'DMTBK62XZ6KNI7L5E6TRBTPB4B3YNVB4WYGSWR42SEV4XKV4LYHGBW4O34'
|
||||
|
@ -22,6 +26,8 @@ const SIGNATURES = {}
|
|||
SIGNATURES[OWNER_ADDR] = algosdk.mnemonicToSecretKey(OWNER_MNEMO)
|
||||
SIGNATURES[OTHER_ADDR] = algosdk.mnemonicToSecretKey(OTHER_MNEMO)
|
||||
|
||||
const TEST_SYMBOL = 'TEST/USDX'
|
||||
|
||||
const guardianKeys = [
|
||||
'52A26Ce40F8CAa8D36155d37ef0D5D783fc614d2',
|
||||
'389A74E8FFa224aeAD0778c786163a7A2150768C',
|
||||
|
@ -68,8 +74,8 @@ const guardianPrivKeys = [
|
|||
|
||||
const PYTH_EMITTER = '0x3afda841c1f43dd7d546c8a581ba1f92a139f4133f9f6ab095558f6a359df5d4'
|
||||
const OTHER_EMITTER = '0x1111111111111111111111111111111111111111111111111111111111111111'
|
||||
const PYTH_PAYLOAD = '50325748000101230abfe0ec3b460bd55fc4fb36356716329915145497202b8eb8bf1af6a0a3b9fe650f0367d4a7ef9815a593ea15d36593f0643aaaf0149bb04be67ab851decd010000002f17254388fffffff70000002eed73d9000000000070d3b43f0000000037faa03d000000000e9e555100000000894af11c0000000037faa03d000000000dda6eb801000000000061a5ff9a'
|
||||
const OTHER_PAYLOAD = 'f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0'
|
||||
const PYTH_PAYLOAD = '0x50325748000101230abfe0ec3b460bd55fc4fb36356716329915145497202b8eb8bf1af6a0a3b9fe650f0367d4a7ef9815a593ea15d36593f0643aaaf0149bb04be67ab851decd010000002f17254388fffffff70000002eed73d9000000000070d3b43f0000000037faa03d000000000e9e555100000000894af11c0000000037faa03d000000000dda6eb801000000000061a5ff9a'
|
||||
const OTHER_PAYLOAD = '0xf0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0'
|
||||
|
||||
let pythVaa
|
||||
let pythVaaBody
|
||||
|
@ -82,11 +88,19 @@ let otherVaaSignatures
|
|||
// Utility functions
|
||||
// --------------------------------------------------------------------------
|
||||
|
||||
async function createApp (gsexptime, gsindex, gkeys) {
|
||||
async function createVaaProcessorApp (gsexptime, gsindex, gkeys) {
|
||||
const txId = await pclib.createVaaProcessorApp(OWNER_ADDR, gsexptime, gsindex, gkeys.join(''), signCallback)
|
||||
const txResponse = await pclib.waitForTransactionResponse(txId)
|
||||
const appId = pclib.appIdFromCreateAppResponse(txResponse)
|
||||
pclib.setAppId(appId)
|
||||
pclib.setAppId('vaaProcessor', appId)
|
||||
return appId
|
||||
}
|
||||
|
||||
async function createPricekeeperApp (vaaProcessorAppid) {
|
||||
const txId = await pclib.createPricekeeperApp(OWNER_ADDR, vaaProcessorAppid, signCallback)
|
||||
const txResponse = await pclib.waitForTransactionResponse(txId)
|
||||
const appId = pclib.appIdFromCreateAppResponse(txResponse)
|
||||
pclib.setAppId('pricekeeper', appId)
|
||||
return appId
|
||||
}
|
||||
|
||||
|
@ -102,22 +116,38 @@ async function getTxParams () {
|
|||
return params
|
||||
}
|
||||
|
||||
async function execVerify (groupSize, vsSize, gkeys, signatures, vaaBody, gscount, fee, sender, verifyCallback) {
|
||||
async function buildTransactionGroup (numOfVerifySteps, stepSize, guardianKeys, guardianCount,
|
||||
signatures, vaaBody, fee, sender, addVerifyTxCallback, addLastTxCallback) {
|
||||
const params = await getTxParams()
|
||||
if (fee !== undefined) {
|
||||
params.fee = fee
|
||||
}
|
||||
const senderAddress = sender !== undefined ? sender : verifyProgramHash
|
||||
const verifyCallbackFn = verifyCallback !== undefined ? verifyCallback : pclib.addVerifyTx.bind(pclib)
|
||||
pclib.beginTxGroup()
|
||||
const sigSubsets = []
|
||||
for (let i = 0; i < groupSize; i++) {
|
||||
const st = vsSize * i
|
||||
const keySubset = gkeys.slice(st, i < groupSize - 1 ? st + vsSize : undefined)
|
||||
sigSubsets.push(signatures.slice(i * 132 * vsSize, i < groupSize - 1 ? ((i * 132 * vsSize) + 132 * vsSize) : undefined))
|
||||
verifyCallbackFn(senderAddress, params, vaaBody, keySubset, gscount)
|
||||
const addVerifyCallbackFn = addVerifyTxCallback !== undefined ? addVerifyTxCallback : pclib.addVerifyTx.bind(pclib)
|
||||
const addLastTxCallbackFn = addLastTxCallback !== undefined ? addLastTxCallback : pclib.addPriceStoreTx.bind(pclib)
|
||||
|
||||
// Fill remaining signatures with dummy ones for cases where not all guardians may sign.
|
||||
|
||||
const numOfSigs = signatures.length / 132
|
||||
const remaining = guardianCount - numOfSigs
|
||||
if (remaining > 0) {
|
||||
for (let i = guardianCount - remaining; i < guardianCount; ++i) {
|
||||
signatures += i.toString(16).padStart(2, '0') + ('0'.repeat(130))
|
||||
}
|
||||
}
|
||||
const tx = await pclib.commitVerifyTxGroup(compiledVerifyProgram.compiledBytes, sigSubsets)
|
||||
|
||||
const gid = pclib.beginTxGroup()
|
||||
const sigSubsets = []
|
||||
for (let i = 0; i < numOfVerifySteps; i++) {
|
||||
const st = stepSize * i
|
||||
const sigSetLen = 132 * stepSize
|
||||
const keySubset = guardianKeys.slice(st, i < numOfVerifySteps - 1 ? st + stepSize : undefined)
|
||||
sigSubsets.push(signatures.slice(i * sigSetLen, i < numOfVerifySteps - 1 ? ((i * sigSetLen) + sigSetLen) : undefined))
|
||||
addVerifyCallbackFn(gid, senderAddress, params, vaaBody, keySubset, guardianCount)
|
||||
}
|
||||
|
||||
addLastTxCallbackFn(gid, OWNER_ADDR, params, TEST_SYMBOL, vaaBody.slice(51))
|
||||
const tx = await pclib.commitVerifyTxGroup(gid, compiledVerifyProgram.bytes, numOfSigs, sigSubsets, OWNER_ADDR, signCallback)
|
||||
return tx
|
||||
}
|
||||
|
||||
|
@ -128,11 +158,10 @@ async function execVerify (groupSize, vsSize, gkeys, signatures, vaaBody, gscoun
|
|||
// ===============================================================================================================
|
||||
|
||||
describe('VAA Processor Smart-contract Tests', function () {
|
||||
let appId
|
||||
let appId, pkAppId
|
||||
|
||||
before(async function () {
|
||||
// algodClient = new algosdk.Algodv2('', 'https://api.betanet.algoexplorer.io', '')
|
||||
algodClient = new algosdk.Algodv2('aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', 'http://localhost', '4001')
|
||||
algodClient = new algosdk.Algodv2(testConfig.ALGORAND_NODE_TOKEN, testConfig.ALGORAND_NODE_HOST, testConfig.ALGORAND_NODE_PORT)
|
||||
pclib = new PricecasterLib.PricecasterLib(algodClient)
|
||||
const ownerAcc = algosdk.mnemonicToSecretKey(OWNER_MNEMO)
|
||||
|
||||
|
@ -153,15 +182,25 @@ describe('VAA Processor Smart-contract Tests', function () {
|
|||
|
||||
const vaaProcessorClearState = 'test/temp/vaa-clear-state.teal'
|
||||
const vaaProcessorApproval = 'test/temp/vaa-processor.teal'
|
||||
const priceKeeperApproval = 'test/temp/pricekeeper-v2.teal'
|
||||
const priceKeeperClearState = 'test/temp/pricekeeper-clear-state.teal'
|
||||
|
||||
pclib.setApprovalProgramFile('vaaProcessor', vaaProcessorApproval)
|
||||
pclib.setApprovalProgramFile('pricekeeper', priceKeeperApproval)
|
||||
pclib.setClearStateProgramFile('vaaProcessor', vaaProcessorClearState)
|
||||
pclib.setClearStateProgramFile('pricekeeper', priceKeeperClearState)
|
||||
|
||||
// (!) ENABLE FOR DIAGNOSING FAILED TESTS
|
||||
//
|
||||
pclib.enableDumpFailedTx(true)
|
||||
pclib.setDumpFailedTxDirectory('./test/temp')
|
||||
|
||||
pclib.setVaaProcessorApprovalFile(vaaProcessorApproval)
|
||||
pclib.setVaaProcessorClearStateFile(vaaProcessorClearState)
|
||||
console.log(spawnSync('python', ['teal/wormhole/pyteal/vaa-processor.py', vaaProcessorApproval, vaaProcessorClearState]).output.toString())
|
||||
console.log(spawnSync('python', ['teal/wormhole/pyteal/pricekeeper-v2.py', priceKeeperApproval, priceKeeperClearState]).output.toString())
|
||||
|
||||
pythVaa = testLib.createSignedVAA(0, guardianPrivKeys, 1, 1, 1, PYTH_EMITTER, 0, 0, PYTH_PAYLOAD)
|
||||
pythVaaBody = Buffer.from(pythVaa.substr(12 + guardianPrivKeys.length * 132), 'hex')
|
||||
pythVaaSignatures = pythVaa.substr(12, guardianPrivKeys.length * 132)
|
||||
|
||||
otherVaa = testLib.createSignedVAA(0, guardianPrivKeys, 1, 1, 1, OTHER_EMITTER, 0, 0, OTHER_PAYLOAD)
|
||||
otherVaaBody = Buffer.from(otherVaa.substr(12 + guardianPrivKeys.length * 132), 'hex')
|
||||
otherVaaSignatures = otherVaa.substr(12, guardianPrivKeys.length * 132)
|
||||
|
@ -170,13 +209,13 @@ describe('VAA Processor Smart-contract Tests', function () {
|
|||
|
||||
it('Must fail to create app with incorrect guardian keys length', async function () {
|
||||
const gsexptime = 2524618800
|
||||
await expect(createApp(gsexptime, 0, ['BADADDRESS'])).to.be.rejectedWith('Bad Request')
|
||||
await expect(createVaaProcessorApp(gsexptime, 0, ['BADADDRESS'])).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
|
||||
it('Must create app with initial guardians and proper initial state', async function () {
|
||||
it('Must create VAA Processor app with initial guardians and proper initial state', async function () {
|
||||
const gsexptime = 2524618800
|
||||
appId = await createApp(gsexptime, 0, guardianKeys)
|
||||
console.log(' - [Created appId: %d]', appId)
|
||||
appId = await createVaaProcessorApp(gsexptime, 0, guardianKeys)
|
||||
console.log(' - [Created VAA Processor appId: %d]', appId)
|
||||
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const gsexp = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gsexp')
|
||||
|
@ -192,6 +231,14 @@ describe('VAA Processor Smart-contract Tests', function () {
|
|||
}
|
||||
})
|
||||
|
||||
it('Must create Pricekeeper V2 app with VAA Processor app id set', async function () {
|
||||
pkAppId = await createPricekeeperApp(pclib.getAppId('vaaProcessor'))
|
||||
console.log(' - [Created pricekeeper appId: %d]', pkAppId)
|
||||
|
||||
const vaapid = await tools.readAppGlobalStateByKey(algodClient, pclib.getAppId('pricekeeper'), OWNER_ADDR, 'vaapid')
|
||||
expect(vaapid.toString()).to.equal(pclib.getAppId('vaaProcessor').toString())
|
||||
})
|
||||
|
||||
it('Must set stateless logic hash from owner', async function () {
|
||||
const teal = 'test/temp/vaa-verify.teal'
|
||||
spawnSync('python', ['teal/wormhole/pyteal/vaa-verify.py', appId, teal])
|
||||
|
@ -213,6 +260,13 @@ describe('VAA Processor Smart-contract Tests', function () {
|
|||
await pclib.waitForTransactionResponse(tx.txID().toString())
|
||||
})
|
||||
|
||||
it('Must set authorized appcall id from owner', async function () {
|
||||
const txid = await pclib.setAuthorizedAppId(OWNER_ADDR, pkAppId, signCallback)
|
||||
await pclib.waitForTransactionResponse(txid)
|
||||
const authid = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'authid')
|
||||
expect(authid).to.equal(pkAppId)
|
||||
})
|
||||
|
||||
it('Must disallow setting stateless logic hash from non-owner', async function () {
|
||||
await expect(pclib.setVAAVerifyProgramHash(OTHER_ADDR, verifyProgramHash, signCallback)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
|
@ -221,128 +275,181 @@ describe('VAA Processor Smart-contract Tests', function () {
|
|||
const appArgs = [new Uint8Array(Buffer.from('setvphash')), new Uint8Array(verifyProgramHash)]
|
||||
const params = await getTxParams()
|
||||
|
||||
pclib.beginTxGroup()
|
||||
const gid = pclib.beginTxGroup()
|
||||
const appTx = algosdk.makeApplicationNoOpTxn(OWNER_ADDR, params, this.appId, appArgs)
|
||||
const dummyTx = algosdk.makeApplicationNoOpTxn(OWNER_ADDR, params, this.appId, appArgs)
|
||||
pclib.addTxToGroup(appTx)
|
||||
pclib.addTxToGroup(dummyTx)
|
||||
await expect(pclib.commitTxGroup(OWNER_ADDR, signCallback)).to.be.rejectedWith('Bad Request')
|
||||
pclib.addTxToGroup(gid, appTx)
|
||||
pclib.addTxToGroup(gid, dummyTx)
|
||||
await expect(pclib.commitTxGroup(gid, OWNER_ADDR, signCallback)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
|
||||
it('Must reject setting stateless logic hash with invalid address length', async function () {
|
||||
const appArgs = [new Uint8Array(Buffer.from('setvphash')), new Uint8Array(verifyProgramHash).subarray(0, 10)]
|
||||
await expect(pclib.callApp(OWNER_ADDR, appArgs, [], signCallback)).to.be.rejectedWith('Bad Request')
|
||||
await expect(pclib.callApp(OWNER_ADDR, 'vaaProcessor', appArgs, [], signCallback)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
|
||||
it('Must reject incorrect transaction group size', async function () {
|
||||
// it('Must reject incorrect transaction group size', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const badSize = 4 + Math.ceil(gscount / vssize)
|
||||
// await expect(execVerify(badSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
|
||||
// it('Must reject incorrect argument count for verify call', async function () {
|
||||
// const verifyFunc = function (sender, params, payload, gksubset, totalguardians) {
|
||||
// const appArgs = []
|
||||
// appArgs.push(new Uint8Array(Buffer.from('verify')))
|
||||
// const tx = algosdk.makeApplicationNoOpTxn(sender,
|
||||
// params,
|
||||
// appId,
|
||||
// appArgs, undefined, undefined, undefined,
|
||||
// new Uint8Array(payload))
|
||||
// pclib.groupTx.push(tx)
|
||||
|
||||
// return tx.txID()
|
||||
// }
|
||||
// pclib.beginTxGroup()
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount, undefined, undefined, verifyFunc)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
|
||||
// it('Must reject unknown sender for verify call', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount, undefined, OTHER_ADDR)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
|
||||
// it('Must reject guardian set count argument not matching global state', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, 2)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
|
||||
// it('Must reject guardian key list argument not matching global state', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// const gkBad = guardianKeys.slice(0, guardianKeys.length - 3)
|
||||
// await expect(execVerify(groupSize, vssize, gkBad, pythVaaSignatures, pythVaaBody, 2)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
// it('Must reject non-app call transaction in group', async function () {
|
||||
|
||||
// })
|
||||
// it('Must reject app-call with mismatched AppId in group', async function () {
|
||||
|
||||
// })
|
||||
// it('Must reject transaction with not verified bit set in group', async function () {
|
||||
|
||||
// })
|
||||
|
||||
it('Must verify and handle Pyth VAA - all signers present', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const badSize = 1 + Math.ceil(gscount / vssize)
|
||||
await expect(execVerify(badSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
const vsSize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vsSize)
|
||||
const tx = await buildTransactionGroup(groupSize, vsSize, guardianKeys, gscount, pythVaaSignatures, pythVaaBody)
|
||||
await pclib.waitForConfirmation(tx)
|
||||
|
||||
// console.log(await tools.readAppGlobalStateByKey(algodClient, pkAppId, OWNER_ADDR, TEST_SYMBOL))
|
||||
})
|
||||
|
||||
it('Must reject incorrect argument count for verify call', async function () {
|
||||
const verifyFunc = function (sender, params, payload, gksubset, totalguardians) {
|
||||
const appArgs = []
|
||||
appArgs.push(new Uint8Array(Buffer.from('verify')))
|
||||
const tx = algosdk.makeApplicationNoOpTxn(sender,
|
||||
params,
|
||||
appId,
|
||||
appArgs, undefined, undefined, undefined,
|
||||
new Uint8Array(payload))
|
||||
pclib.groupTx.push(tx)
|
||||
|
||||
return tx.txID()
|
||||
}
|
||||
pclib.beginTxGroup()
|
||||
it('Must fail to verify VAA - (shuffle signers)', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount, undefined, undefined, verifyFunc)).to.be.rejectedWith('Bad Request')
|
||||
const vsSize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vsSize)
|
||||
|
||||
let shuffleGuardianPrivKeys = [...guardianPrivKeys]
|
||||
shuffleGuardianPrivKeys = testLib.shuffle(shuffleGuardianPrivKeys)
|
||||
|
||||
pythVaa = testLib.createSignedVAA(0, shuffleGuardianPrivKeys, 1, 1, 1, PYTH_EMITTER, 0, 0, PYTH_PAYLOAD)
|
||||
pythVaaBody = Buffer.from(pythVaa.substr(12 + shuffleGuardianPrivKeys.length * 132), 'hex')
|
||||
pythVaaSignatures = pythVaa.substr(12, shuffleGuardianPrivKeys.length * 132)
|
||||
|
||||
await expect(buildTransactionGroup(groupSize, vsSize, guardianKeys, gscount, pythVaaSignatures, pythVaaBody)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
|
||||
it('Must reject unknown sender for verify call', async function () {
|
||||
it('Must verify VAA with signers > 2/3 + 1', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount, undefined, OTHER_ADDR)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
const vsSize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
|
||||
it('Must reject guardian set count argument not matching global state', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, 2)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
// Fixed-point division
|
||||
// https://github.com/certusone/wormhole/blob/00ddd5f02ba34e6570823b23518af8bbd6d91231/ethereum/contracts/Messages.sol#L30
|
||||
|
||||
it('Must reject guardian key list argument not matching global state', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
const gkBad = guardianKeys.slice(0, guardianKeys.length - 3)
|
||||
await expect(execVerify(groupSize, vssize, gkBad, pythVaaSignatures, pythVaaBody, 2)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
it('Must reject non-app call transaction in group', async function () {
|
||||
const quorum = Math.trunc(((gscount * 10 / 3) * 2) / 10 + 1)
|
||||
const slicedGuardianPrivKeys = guardianPrivKeys.slice(0, quorum + 1)
|
||||
|
||||
})
|
||||
it('Must reject app-call with mismatched AppId in group', async function () {
|
||||
|
||||
})
|
||||
it('Must reject transaction with not verified bit set in group', async function () {
|
||||
|
||||
})
|
||||
|
||||
it('Must verify and handle Pyth VAA', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
const tx = await execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount)
|
||||
pythVaa = testLib.createSignedVAA(0, slicedGuardianPrivKeys, 1, 1, 1, PYTH_EMITTER, 0, 0, PYTH_PAYLOAD)
|
||||
pythVaaBody = Buffer.from(pythVaa.substr(12 + slicedGuardianPrivKeys.length * 132), 'hex')
|
||||
pythVaaSignatures = pythVaa.substr(12, slicedGuardianPrivKeys.length * 132)
|
||||
const groupSize = Math.ceil(gscount / vsSize)
|
||||
const tx = await buildTransactionGroup(groupSize, vsSize, guardianKeys, gscount, pythVaaSignatures, pythVaaBody)
|
||||
await pclib.waitForConfirmation(tx)
|
||||
})
|
||||
it('Must verify and handle governance VAA', async function () {
|
||||
// TBD
|
||||
})
|
||||
|
||||
it('Must reject unknown emitter VAA', async function () {
|
||||
it('Must fail to verify VAA with <= 2/3 + 1 signers (no quorum)', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
await expect(execVerify(groupSize, vssize, guardianKeys, otherVaaSignatures, otherVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
const vsSize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
|
||||
// Fixed-point division
|
||||
// https://github.com/certusone/wormhole/blob/00ddd5f02ba34e6570823b23518af8bbd6d91231/ethereum/contracts/Messages.sol#L30
|
||||
|
||||
const quorum = Math.trunc(((gscount * 10 / 3) * 2) / 10 + 1)
|
||||
const slicedGuardianPrivKeys = guardianPrivKeys.slice(0, quorum)
|
||||
|
||||
pythVaa = testLib.createSignedVAA(0, slicedGuardianPrivKeys, 1, 1, 1, PYTH_EMITTER, 0, 0, PYTH_PAYLOAD)
|
||||
pythVaaBody = Buffer.from(pythVaa.substr(12 + slicedGuardianPrivKeys.length * 132), 'hex')
|
||||
pythVaaSignatures = pythVaa.substr(12, slicedGuardianPrivKeys.length * 132)
|
||||
const groupSize = Math.ceil(gscount / vsSize)
|
||||
|
||||
await expect(buildTransactionGroup(groupSize, vsSize, guardianKeys, gscount, pythVaaSignatures, pythVaaBody)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
// it('Must verify and handle governance VAA', async function () {
|
||||
// // TBD
|
||||
// })
|
||||
|
||||
it('Stateless: Must reject transaction with excess fee', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount, 800000)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
// it('Must reject unknown emitter VAA', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// await expect(execVerify(groupSize, vssize, guardianKeys, otherVaaSignatures, otherVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
|
||||
it('Stateless: Must reject incorrect number of logic program arguments', async function () {
|
||||
// it('Stateless: Must reject transaction with excess fee', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures, pythVaaBody, gscount, 800000)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
|
||||
})
|
||||
// it('Stateless: Must reject incorrect number of logic program arguments', async function () {
|
||||
|
||||
it('Stateless: Must reject transaction with mismatching number of signatures', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
const pythVaaSignatures2 = pythVaaSignatures.substr(0, pythVaaSignatures.length - 132 - 1)
|
||||
await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures2, pythVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
// })
|
||||
|
||||
it('Stateless: Must reject transaction with non-zero rekey', async function () {
|
||||
// it('Stateless: Must reject transaction with mismatching number of signatures', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// const pythVaaSignatures2 = pythVaaSignatures.substr(0, pythVaaSignatures.length - 132 - 1)
|
||||
// await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures2, pythVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
|
||||
})
|
||||
// it('Stateless: Must reject transaction with non-zero rekey', async function () {
|
||||
|
||||
it('Stateless: Must reject transaction call from bad app-id', async function () {
|
||||
// })
|
||||
|
||||
})
|
||||
// it('Stateless: Must reject transaction call from bad app-id', async function () {
|
||||
|
||||
it('Stateless: Must reject signature verification failure', async function () {
|
||||
const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
const groupSize = Math.ceil(gscount / vssize)
|
||||
let pythVaaSignatures2 = pythVaaSignatures.substr(0, pythVaaSignatures.length - 132 - 1)
|
||||
pythVaaSignatures2 += '0d525ac1524ec9d9ee623ef535a867e8f86d9b3f8e4c7b4234dbe7bb40dc8494327af2fa37c3db50064d6114f2e1441c4eee444b83636f11ce1f730f7b38490e2800'
|
||||
await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures2, pythVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
})
|
||||
// })
|
||||
|
||||
// it('Stateless: Must reject signature verification failure', async function () {
|
||||
// const gscount = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'gscount')
|
||||
// const vssize = await tools.readAppGlobalStateByKey(algodClient, appId, OWNER_ADDR, 'vssize')
|
||||
// const groupSize = Math.ceil(gscount / vssize)
|
||||
// let pythVaaSignatures2 = pythVaaSignatures.substr(0, pythVaaSignatures.length - 132 - 1)
|
||||
// pythVaaSignatures2 += '0d525ac1524ec9d9ee623ef535a867e8f86d9b3f8e4c7b4234dbe7bb40dc8494327af2fa37c3db50064d6114f2e1441c4eee444b83636f11ce1f730f7b38490e2800'
|
||||
// await expect(execVerify(groupSize, vssize, guardianKeys, pythVaaSignatures2, pythVaaBody, gscount)).to.be.rejectedWith('Bad Request')
|
||||
// })
|
||||
})
|
||||
|
|
|
@ -24,35 +24,74 @@ function signCallback (sender, tx) {
|
|||
}
|
||||
|
||||
async function startOp (algodClient, fromAddress, gexpTime, gkeys) {
|
||||
console.log('Compiling VAA Processor program code...')
|
||||
const out = spawnSync('python', ['teal/wormhole/pyteal/vaa-processor.py'])
|
||||
console.log('Compiling programs ...\n')
|
||||
let out = spawnSync('python', ['teal/wormhole/pyteal/vaa-processor.py'])
|
||||
console.log(out.output.toString())
|
||||
out = spawnSync('python', ['teal/wormhole/pyteal/pricekeeper-v2.py'])
|
||||
console.log(out.output.toString())
|
||||
|
||||
// console.log('Compiling VAA Verify stateless program code...')
|
||||
// out = spawnSync('python', ['teal/wormhole/pyteal/vaa-verify.py'])
|
||||
// console.log(out.output.toString())
|
||||
|
||||
const pclib = new PricecasterLib.PricecasterLib(algodClient)
|
||||
console.log('Creating new app...')
|
||||
const txId = await pclib.createVaaProcessorApp(fromAddress, gexpTime, gkeys.join(''), signCallback)
|
||||
console.log('Creating VAA Processor...')
|
||||
let txId = await pclib.createVaaProcessorApp(fromAddress, gexpTime, 0, gkeys.join(''), signCallback)
|
||||
console.log('txId: ' + txId)
|
||||
const txResponse = await pclib.waitForTransactionResponse(txId)
|
||||
let txResponse = await pclib.waitForTransactionResponse(txId)
|
||||
const appId = pclib.appIdFromCreateAppResponse(txResponse)
|
||||
console.log('Deployment App Id: %d', appId)
|
||||
pclib.setAppId('vaaProcessor', appId)
|
||||
|
||||
console.log('Creating Pricekeeper V2...')
|
||||
txId = await pclib.createPricekeeperApp(fromAddress, appId, signCallback)
|
||||
console.log('txId: ' + txId)
|
||||
txResponse = await pclib.waitForTransactionResponse(txId)
|
||||
const pkAppId = pclib.appIdFromCreateAppResponse(txResponse)
|
||||
console.log('Deployment App Id: %d', pkAppId)
|
||||
pclib.setAppId('pricekeeper', pkAppId)
|
||||
|
||||
console.log('Setting VAA Processor authid parameter...')
|
||||
txId = await pclib.setAuthorizedAppId(fromAddress, pkAppId, signCallback)
|
||||
console.log('txId: ' + txId)
|
||||
txResponse = await pclib.waitForTransactionResponse(txId)
|
||||
|
||||
console.log('Compiling verify VAA stateless code...')
|
||||
out = spawnSync('python', ['teal/wormhole/pyteal/vaa-verify.py'])
|
||||
console.log(out.output.toString())
|
||||
|
||||
spawnSync('python', ['teal/wormhole/pyteal/vaa-verify.py', appId])
|
||||
const program = fs.readFileSync('teal/wormhole/build/vaa-verify.teal', 'utf8')
|
||||
const compiledVerifyProgram = await pclib.compileProgram(program)
|
||||
console.log('Stateless program address: ', compiledVerifyProgram.hash)
|
||||
|
||||
console.log('Setting VAA Processor stateless code...')
|
||||
const txid = await pclib.setVAAVerifyProgramHash(fromAddress, compiledVerifyProgram.hash, signCallback)
|
||||
console.log('txId: ' + txId)
|
||||
await pclib.waitForTransactionResponse(txid)
|
||||
|
||||
const dt = Date.now().toString()
|
||||
const resultsFileName = 'DEPLOY-' + dt
|
||||
const binaryFileName = 'VAA-VERIFY-' + dt + '.BIN'
|
||||
|
||||
console.log(`Writing deployment results file ${resultsFileName}...`)
|
||||
fs.writeFileSync(resultsFileName, `vaaProcessorAppId: ${appId}\npriceKeeperV2AppId: ${pkAppId}\nvaaVerifyProgramHash: '${compiledVerifyProgram.hash}'`)
|
||||
|
||||
console.log(`Writing stateless code binary file ${binaryFileName}...`)
|
||||
fs.writeFileSync(binaryFileName, compiledVerifyProgram.bytes)
|
||||
}
|
||||
|
||||
(async () => {
|
||||
console.log('\nVAA Processor for Wormhole Deployment Tool -- (c)2021-22 Randlabs, Inc.')
|
||||
console.log('-----------------------------------------------------------------------\n')
|
||||
console.log('\nPricecaster v2 Apps Deployment Tool')
|
||||
console.log('Copyright (c) Randlabs Inc, 2021-22\n')
|
||||
|
||||
if (process.argv.length !== 6) {
|
||||
if (process.argv.length !== 7) {
|
||||
console.log('Usage: deploy <glistfile> <from> <network>\n')
|
||||
console.log('where:\n')
|
||||
console.log('glistfile File containing the initial list of guardians')
|
||||
console.log('gexptime Guardian set expiration time')
|
||||
console.log('from Deployer account')
|
||||
console.log('network Testnet, betanet or mainnet')
|
||||
console.log('\nFile must contain one guardian key per line, formatted in hex, without hex prefix.')
|
||||
console.log('keyfile Secret file containing signing key mnemonic')
|
||||
console.log('\n- File must contain one guardian key per line, formatted in hex, without hex prefix.')
|
||||
console.log('\n- Deployment process will generate one DEPLOY-xxxx file with application Ids, stateless hash, and')
|
||||
console.log(' a VAA-VERIFY-XXXX.bin with stateless compiled bytes, to use with backend configuration')
|
||||
exit(0)
|
||||
}
|
||||
|
||||
|
@ -60,6 +99,7 @@ async function startOp (algodClient, fromAddress, gexpTime, gkeys) {
|
|||
const gexpTime = process.argv[3]
|
||||
const fromAddress = process.argv[4]
|
||||
const network = process.argv[5]
|
||||
const keyfile = process.argv[6]
|
||||
|
||||
const config = { server: '', apiToken: '', port: '' }
|
||||
if (network === 'betanet') {
|
||||
|
@ -92,7 +132,7 @@ async function startOp (algodClient, fromAddress, gexpTime, gkeys) {
|
|||
console.warn('Aborted by user.')
|
||||
exit(1)
|
||||
}
|
||||
globalMnemo = await ask('\nEnter mnemonic for sender account.\nBE SURE TO DO THIS FROM A SECURED SYSTEM\n')
|
||||
globalMnemo = fs.readFileSync(keyfile).toString()
|
||||
try {
|
||||
await startOp(algodClient, fromAddress, gexpTime, gkeys)
|
||||
} catch (e) {
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
13947Bd48b18E53fdAeEe77F3473391aC727C638
|
Loading…
Reference in New Issue