|
|
@@ -95,7 +95,7 @@ mod test {
|
|
|
) {
|
|
|
pyth_wormhole_init(&pyth_contract, &wormhole_contract, &alice);
|
|
|
|
|
|
- let hex_str = "0x010000000001008eb96d664888b3424e81758b7015c4cc42f20cb03891ed9335724b779262c5571de6ad26372cff8300ba2767239f1f9d412b007118731e62ed7b888cab0c9ac701499602d200000000000100000000000000000000000000000000000000000000000000000000000000110000000000000001005054474d010300020100010000000000000000000000000000000000000000000000000000000000001111";
|
|
|
+ let hex_str = "0100000000010069825ef00344cf745b6e72a41d4f869d4e90de517849360c72bf94efc97681671d826e484747b21a80c8f1e7816021df9f55e458a6e7a717cb2bd2a1e85fd57100499602d200000000000100000000000000000000000000000000000000000000000000000000000000110000000000000001005054474d010200020100010000000000000000000000000000000000000000000000000000000000001111";
|
|
|
let bytes = Vec::from_hex(hex_str).expect("Invalid hex string");
|
|
|
|
|
|
println!("Executing set_data_sources with bytes: {:?}", bytes);
|