| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478 |
- #![allow(warnings)]
- use borsh::{
- BorshDeserialize,
- BorshSerialize,
- };
- use byteorder::{
- BigEndian,
- WriteBytesExt,
- };
- use hex_literal::hex;
- use secp256k1::{
- Message as Secp256k1Message,
- PublicKey,
- SecretKey,
- };
- use sha3::Digest;
- use solana_client::{
- client_error::ClientError,
- rpc_client::RpcClient,
- rpc_config::RpcSendTransactionConfig,
- };
- use solana_program::{
- borsh::try_from_slice_unchecked,
- hash,
- instruction::{
- AccountMeta,
- Instruction,
- },
- program_pack::Pack,
- pubkey::Pubkey,
- system_instruction::{
- self,
- create_account,
- },
- system_program,
- sysvar,
- };
- use solana_sdk::{
- commitment_config::CommitmentConfig,
- secp256k1_instruction::new_secp256k1_instruction,
- signature::{
- read_keypair_file,
- Keypair,
- Signature,
- Signer,
- },
- transaction::Transaction,
- };
- use std::{
- convert::TryInto,
- env,
- io::{
- Cursor,
- Write,
- },
- time::{
- Duration,
- SystemTime,
- },
- };
- use bridge::{
- accounts::{
- BridgeConfig,
- FeeCollector,
- GuardianSet,
- GuardianSetDerivationData,
- PostedVAAData,
- PostedVAADerivationData,
- Sequence,
- SequenceDerivationData,
- SequenceTracker,
- SignatureSet,
- },
- instruction,
- instructions,
- types::ConsistencyLevel,
- Initialize,
- InitializeData,
- PostMessageData,
- PostVAAData,
- UninitializedMessage,
- VerifySignaturesData,
- };
- use solitaire::{
- processors::seeded::Seeded,
- AccountState,
- };
- pub use helpers::*;
- /// Simple API wrapper for quickly preparing and sending transactions.
- pub fn execute(
- client: &RpcClient,
- payer: &Keypair,
- signers: &[&Keypair],
- instructions: &[Instruction],
- commitment_level: CommitmentConfig,
- ) -> Result<Signature, ClientError> {
- let mut transaction = Transaction::new_with_payer(instructions, Some(&payer.pubkey()));
- let recent_blockhash = client.get_recent_blockhash().unwrap().0;
- transaction.sign(&signers.to_vec(), recent_blockhash);
- client.send_and_confirm_transaction_with_spinner_and_config(
- &transaction,
- commitment_level,
- RpcSendTransactionConfig {
- skip_preflight: true,
- preflight_commitment: None,
- encoding: None,
- },
- )
- }
- mod helpers {
- use super::*;
- /// Initialize the test environment, spins up a solana-test-validator in the background so that
- /// each test has a fresh environment to work within.
- pub fn setup() -> (Keypair, RpcClient, Pubkey) {
- let payer = env::var("BRIDGE_PAYER").unwrap_or("./payer.json".to_string());
- let rpc_address = env::var("BRIDGE_RPC").unwrap_or("http://127.0.0.1:8899".to_string());
- let payer = read_keypair_file(payer).unwrap();
- let rpc = RpcClient::new(rpc_address);
- let program = env::var("BRIDGE_PROGRAM")
- .unwrap_or("Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o".to_string())
- .parse::<Pubkey>()
- .unwrap();
- (payer, rpc, program)
- }
- /// Wait for a single transaction to fully finalize, guaranteeing chain state has been
- /// confirmed. Useful for consistently fetching data during state checks.
- pub fn sync(client: &RpcClient, payer: &Keypair) {
- execute(
- client,
- payer,
- &[payer],
- &[system_instruction::transfer(
- &payer.pubkey(),
- &payer.pubkey(),
- 1,
- )],
- CommitmentConfig::finalized(),
- )
- .unwrap();
- }
- /// Fetch account data, the loop is there to re-attempt until data is available.
- pub fn get_account_data<T: BorshDeserialize>(client: &RpcClient, account: &Pubkey) -> T {
- let account = client.get_account(account).unwrap();
- T::try_from_slice(&account.data).unwrap()
- }
- /// Generate `count` secp256k1 private keys, along with their ethereum-styled public key
- /// encoding: 0x0123456789ABCDEF01234
- pub fn generate_keys(count: u8) -> (Vec<[u8; 20]>, Vec<SecretKey>) {
- use rand::Rng;
- use sha3::Digest;
- let mut rng = rand::thread_rng();
- // Generate Guardian Keys
- let secret_keys: Vec<SecretKey> = std::iter::repeat_with(|| SecretKey::random(&mut rng))
- .take(count as usize)
- .collect();
- (
- secret_keys
- .iter()
- .map(|key| {
- let public_key = PublicKey::from_secret_key(&key);
- let mut h = sha3::Keccak256::default();
- h.write(&public_key.serialize()[1..]).unwrap();
- let key: [u8; 32] = h.finalize().into();
- let mut address = [0u8; 20];
- address.copy_from_slice(&key[12..]);
- address
- })
- .collect(),
- secret_keys,
- )
- }
- /// Utility function for generating VAA's from message data.
- pub fn generate_vaa(
- emitter: &Keypair,
- data: Vec<u8>,
- nonce: u32,
- guardian_set_index: u32,
- emitter_chain: u16,
- ) -> (PostVAAData, [u8; 32], [u8; 32]) {
- let mut vaa = PostVAAData {
- version: 0,
- guardian_set_index,
- // Body part
- emitter_chain,
- emitter_address: emitter.pubkey().to_bytes(),
- sequence: 0,
- payload: data,
- timestamp: SystemTime::now()
- .duration_since(SystemTime::UNIX_EPOCH)
- .unwrap()
- .as_secs() as u32,
- nonce,
- consistency_level: ConsistencyLevel::Confirmed as u8,
- };
- // Hash data, the thing we wish to actually sign.
- let body = {
- let mut v = Cursor::new(Vec::new());
- v.write_u32::<BigEndian>(vaa.timestamp).unwrap();
- v.write_u32::<BigEndian>(vaa.nonce).unwrap();
- v.write_u16::<BigEndian>(vaa.emitter_chain).unwrap();
- v.write(&vaa.emitter_address).unwrap();
- v.write_u64::<BigEndian>(vaa.sequence).unwrap();
- v.write_u8(vaa.consistency_level).unwrap();
- v.write(&vaa.payload).unwrap();
- v.into_inner()
- };
- // Hash this body, which is expected to be the same as the hash currently stored in the
- // signature account, binding that set of signatures to this VAA.
- let body: [u8; 32] = {
- let mut h = sha3::Keccak256::default();
- h.write(body.as_slice()).unwrap();
- h.finalize().into()
- };
- let body_hash: [u8; 32] = {
- let mut h = sha3::Keccak256::default();
- h.write(&body).unwrap();
- h.finalize().into()
- };
- (vaa, body, body_hash)
- }
- pub fn transfer(
- client: &RpcClient,
- from: &Keypair,
- to: &Pubkey,
- lamports: u64,
- ) -> Result<Signature, ClientError> {
- execute(
- client,
- from,
- &[from],
- &[system_instruction::transfer(&from.pubkey(), to, lamports)],
- CommitmentConfig::processed(),
- )
- }
- pub fn initialize(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- initial_guardians: &[[u8; 20]],
- fee: u64,
- ) -> Result<Signature, ClientError> {
- execute(
- client,
- payer,
- &[payer],
- &[instructions::initialize(
- *program,
- payer.pubkey(),
- fee,
- 2_000_000_000,
- initial_guardians,
- )
- .unwrap()],
- CommitmentConfig::processed(),
- )
- }
- pub fn post_message(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- emitter: &Keypair,
- nonce: u32,
- data: Vec<u8>,
- fee: u64,
- ) -> Result<Pubkey, ClientError> {
- // Transfer money into the fee collector as it needs a balance/must exist.
- let fee_collector = FeeCollector::<'_>::key(None, program);
- let message = Keypair::new();
- // Capture the resulting message, later functions will need this.
- let instruction = instructions::post_message(
- *program,
- payer.pubkey(),
- emitter.pubkey(),
- message.pubkey(),
- nonce,
- data,
- ConsistencyLevel::Confirmed,
- )
- .unwrap();
- execute(
- client,
- payer,
- &[payer, emitter, &message],
- &[
- system_instruction::transfer(&payer.pubkey(), &fee_collector, fee),
- instruction,
- ],
- CommitmentConfig::processed(),
- )?;
- Ok(message.pubkey())
- }
- pub fn verify_signatures(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- body: [u8; 32],
- secret_keys: &[SecretKey],
- guardian_set_version: u32,
- ) -> Result<Pubkey, ClientError> {
- let signature_set = Keypair::new();
- let tx_signers = &[payer, &signature_set];
- // Push Secp256k1 instructions for each signature we want to verify.
- for (i, key) in secret_keys.iter().enumerate() {
- // Set this signers signature position as present at 0.
- let mut signers = [-1; 19];
- signers[i] = 0;
- execute(
- client,
- payer,
- tx_signers,
- &vec![
- new_secp256k1_instruction(&key, &body),
- instructions::verify_signatures(
- *program,
- payer.pubkey(),
- guardian_set_version,
- signature_set.pubkey(),
- VerifySignaturesData { signers },
- )
- .unwrap(),
- ],
- CommitmentConfig::processed(),
- )?;
- }
- Ok(signature_set.pubkey())
- }
- pub fn post_vaa(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- signature_set: Pubkey,
- vaa: PostVAAData,
- ) -> Result<Signature, ClientError> {
- execute(
- client,
- payer,
- &[payer],
- &[instructions::post_vaa(
- *program,
- payer.pubkey(),
- signature_set,
- vaa,
- )],
- CommitmentConfig::processed(),
- )
- }
- pub fn upgrade_guardian_set(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- payload_message: Pubkey,
- emitter: Pubkey,
- old_index: u32,
- new_index: u32,
- sequence: u64,
- ) -> Result<Signature, ClientError> {
- execute(
- client,
- payer,
- &[payer],
- &[instructions::upgrade_guardian_set(
- *program,
- payer.pubkey(),
- payload_message,
- emitter,
- old_index,
- new_index,
- sequence,
- )],
- CommitmentConfig::processed(),
- )
- }
- pub fn upgrade_contract(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- payload_message: Pubkey,
- emitter: Pubkey,
- new_contract: Pubkey,
- spill: Pubkey,
- sequence: u64,
- ) -> Result<Signature, ClientError> {
- execute(
- client,
- payer,
- &[payer],
- &[instructions::upgrade_contract(
- *program,
- payer.pubkey(),
- payload_message,
- emitter,
- new_contract,
- spill,
- sequence,
- )],
- CommitmentConfig::processed(),
- )
- }
- pub fn set_fees(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- message: Pubkey,
- emitter: Pubkey,
- sequence: u64,
- ) -> Result<Signature, ClientError> {
- execute(
- client,
- payer,
- &[payer],
- &[instructions::set_fees(
- *program,
- payer.pubkey(),
- message,
- emitter,
- sequence,
- )],
- CommitmentConfig::processed(),
- )
- }
- pub fn transfer_fees(
- client: &RpcClient,
- program: &Pubkey,
- payer: &Keypair,
- message: Pubkey,
- emitter: Pubkey,
- recipient: Pubkey,
- sequence: u64,
- ) -> Result<Signature, ClientError> {
- execute(
- client,
- payer,
- &[payer],
- &[instructions::transfer_fees(
- *program,
- payer.pubkey(),
- message,
- emitter,
- sequence,
- recipient,
- )],
- CommitmentConfig::processed(),
- )
- }
- }
|