pyth-crosschain/target_chains/solana
guibescos 9875bc2ba4
feat(target-chains/solana): Implement governance for the solana pull oracle (#1175)
* Do it

* Go

* Address some feedback

* Update size of config
2023-12-14 19:11:34 +07:00
..
cli Solana receiver decode vaa accumulator (#1145) 2023-11-30 16:04:41 -05:00
migrations [solana] Start to implement the solana receiver contract (#557) 2023-02-15 15:43:51 +00:00
programs/pyth-solana-receiver feat(target-chains/solana): Implement governance for the solana pull oracle (#1175) 2023-12-14 19:11:34 +07:00
.gitignore [solana] Start to implement the solana receiver contract (#557) 2023-02-15 15:43:51 +00:00
.prettierignore [solana] Start to implement the solana receiver contract (#557) 2023-02-15 15:43:51 +00:00
Anchor.toml Solana receiver decode vaa accumulator (#1145) 2023-11-30 16:04:41 -05:00
Cargo.lock feat(target-chains/solana): Implement governance for the solana pull oracle (#1175) 2023-12-14 19:11:34 +07:00
Cargo.toml Solana receiver decode vaa accumulator (#1145) 2023-11-30 16:04:41 -05:00
README.md Solana receiver decode vaa accumulator (#1145) 2023-11-30 16:04:41 -05:00
program_address.json Solana receiver decode vaa accumulator (#1145) 2023-11-30 16:04:41 -05:00
program_address_orig.json Solana receiver decode vaa accumulator (#1145) 2023-11-30 16:04:41 -05:00
rust-toolchain.toml Solana receiver decode vaa accumulator (#1145) 2023-11-30 16:04:41 -05:00

README.md

Solana program for receiving price VAA from Pythnet

The program under cli receives a VAA string from the shell, verifies the VAA with wormhole, posts the VAA on solana and then invokes the receiver program under programs. The receiver program verifies that the VAA comes from wormhole (through the owner function in state.rs) and deserializes the price information (in decode_posted_vaa function of lib.rs).

# Generate the program key
# and use the key to replace the following two places
#     "pyth-solana-receiver" in Anchor.toml
#     "declare_id!()" in programs/pyth-solana-receiver/src/lib.rs
> solana-keygen new -o program_address.json

# Build and deploy the receiver program
 > anchor build -- features devnet # use --features mainnet for mainnet
> anchor run deploy

# Build and test the cli program
> anchor run cli_build_devnet
> anchor run cli_test_devnet
# Example output
...
[1/5] Decode the VAA
[2/5] Get wormhole guardian set configuration
[3/5] Invoke wormhole on solana to verify the VAA
Transaction successful : 3VbrqQBCf1RsNLxrcvxN3aTb5fZRht4n8XDUVPM8NKniRmo84NZQUu5iFw5groAQgQYox3YCqaMjKc2WTpPU1yqV
[4/5] Post the VAA data onto a solana account
Transaction successful : 3L1vxzSHQv6B6TwtoMv2Y6m7vFGz3hzqApGHEhHSLA9Jn5dNKeWRWKv29UDPDc3vsgt1mYueamUPPt6bHGGEkbxh
[5/5] Receive and deserialize the VAA on solana
Receiver program ID is 5dXnHcDXdXaiEp9QgknCDPsEhJStSqZqJ4ATirWfEqeY
Transaction successful : u5y9Hqc18so3BnjSUvZkLZR4mvA8zkiBgzGKHSEYyWkHQhH3uQatM7xWf4kdrhjZFVGbfBLdR8RJJUmuf28ePtG

Unit tests

Run anchor run test to run the unit tests in the src/tests/ directory. Warning: do not confuse this command with anchor test, which doesn't do anything useful.