|
|
8 miesięcy temu | |
|---|---|---|
| .. | ||
| contracts | 176ba64b6e fix(target_chains/ton): soft throw instead of revert (#2413) | 8 miesięcy temu |
| scripts | 1b5195aa0a fix: run turbo fix | 8 miesięcy temu |
| tests | 1b5195aa0a fix: run turbo fix | 8 miesięcy temu |
| wrappers | 1b5195aa0a fix: run turbo fix | 8 miesięcy temu |
| .prettierignore | b1dc4c27f5 chore: move prettier to individual packages & upgrade prettier | 8 miesięcy temu |
| README.md | 7bf23f24b8 add comments and ignore bounced messages (#2151) | 11 miesięcy temu |
| jest.config.ts | e82158d82f feat(target_chains/ton): wormhole contract (#1814) | 1 rok temu |
| package.json | b1dc4c27f5 chore: move prettier to individual packages & upgrade prettier | 8 miesięcy temu |
| tsconfig.json | e73fff2726 feat(target_chains/ton): initialize ton contracts (#1810) | 1 rok temu |
contracts - source code of all the smart contracts of the project and their dependencies.wrappers - wrapper classes (implementing Contract from ton-core) for the contracts, including any [de]serialization primitives and compilation functions.tests - tests for the contracts.scripts - scripts used by the project, mainly the deployment scripts.npx blueprint build or yarn blueprint build
npx blueprint test or yarn blueprint test
First, visit TON Center and register to get an API key to bypass rate limits. Replace <YOUR-API-KEY> with the API key you obtained from TON Center. <CUSTOM-TYPE> is either testnet or mainnet. <CHAIN-ID> is the chain ID of the chain you want to deploy to.
Then run:
CHAIN_ID=<CHAIN-ID> npx blueprint run --custom https://testnet.toncenter.com/api/v2/jsonRPC --custom-version v2 --custom-type <CUSTOM-TYPE> --custom-key <YOUR-API-KEY>
npx blueprint create ContractName or yarn blueprint create ContractName
When using the Pyth price feed in the recommended flow (User/App -> Pyth -> Protocol), be aware that:
CRITICAL: Integrators MUST validate the sender address in their receive function to ensure messages are coming from the Pyth Oracle contract. Failure to do so could allow attackers to: