John Saigle 1ea7d1cbe9 deps: Update elliptic to >= 6.6.1 (round 2) (#4392) 4 сар өмнө
..
bridge 6c7d44ca85 ci: Fix flaky solana tests and improve CI time (#2148) 2 жил өмнө
external 6f8c8430ac solana: fix token metadata program interaction (#2913) 2 жил өмнө
idl e109024e99 sdk/js: Remove Solana WASM Dependencies (#1375) 3 жил өмнө
keys 291051c5fb fixed solana devnet key 2 typo 2 жил өмнө
migration fbefb3aced tob-worm-4-panics: using options rather than unwrap & tob-worm-9: cosmwasm test build (#1672) 3 жил өмнө
modules d860566f74 solana: complete token transfer payload docs (#2550) 2 жил өмнө
scripts 1ea7d1cbe9 deps: Update elliptic to >= 6.6.1 (round 2) (#4392) 4 сар өмнө
solitaire fbefb3aced tob-worm-4-panics: using options rather than unwrap & tob-worm-9: cosmwasm test build (#1672) 3 жил өмнө
tests 9b9c07b4b1 add svm/wormhole-core-shims (#4311) 7 сар өмнө
.dockerignore 9d74a80aa0 Optimise solana dockerfiles (#1334) 3 жил өмнө
Cargo.lock 6f8c8430ac solana: fix token metadata program interaction (#2913) 2 жил өмнө
Cargo.toml a8d1ed129b solitaire: remove unused client code 3 жил өмнө
DOCKER.md f28e39c490 certusone -> wormhole-foundation 3 жил өмнө
Dockerfile 094a404902 tilt: remove additional root CA support 1 жил өмнө
Dockerfile.base 18eac4e3d3 solana: bump: Rust nightly-2022-07-12, SOL SDK v1.10.31, rust container 1.60 3 жил өмнө
Dockerfile.client 2e31789c70 dockerfile: update nodesource installer (#3487) 2 жил өмнө
Dockerfile.test-validator 9b9c07b4b1 add svm/wormhole-core-shims (#4311) 7 сар өмнө
Dockerfile.wasm 094a404902 tilt: remove additional root CA support 1 жил өмнө
Makefile d5b7bee86e solana: Add fmt, check, clippy, and test targets to Makefile 3 жил өмнө
README.md b175dd43c8 docs: quit the spelling spam typo fix PRs with cspell magic (#3845) 1 жил өмнө
UPGRADE.md d43d015c57 solana: Add solana sdk upgrade instructions 3 жил өмнө
devnet_setup.sh 0ecc427d6f docker: build CLI in shared image 2 жил өмнө
rust-toolchain 18eac4e3d3 solana: bump: Rust nightly-2022-07-12, SOL SDK v1.10.31, rust container 1.60 3 жил өмнө
rustfmt.toml 99c3e40968 Fix Governance Headers 4 жил өмнө
verify f4b890f342 solana: Fix verify script (#1356) 3 жил өмнө

README.md

Solana Wormhole Contract Deployment

This readme describes the steps for building, verifying, and deploying Solana smart contracts for Wormhole.

WARNING: This process is only Linux host compatible at this time.

Verify Tilt

Before building Solana contracts, ensure that the specific commit you will be building from passes in tilt. This ensures the basic functionality of the Solana smart contracts that you are about to build and deploy.

Build Contracts

The following command can be used to build contracts for Solana contracts via Docker.

Build Target Options: [mainnet|testnet|devnet]

These network names correspond to the naming convention used by wormhole elsewhere. This means that mainnet corresponds to Solana mainnet-beta, testnet corresponds to Solana devnet, and devnet is Solana localhost.

wormhole/solana $ make NETWORK=BUILD_TARGET artifacts

Example: make NETWORK=testnet artifacts

Upon completion, the compiled bytecode for the Solana contracts will be placed into an artifacts directory with a convention of artifacts-BUILD_TARGET (eg. artifacts-testnet)

The contract addresses are compiled into the binaries, which is why these build outputs are kept separate. The deploy script below makes sure that only the right binaries can be deployed to each network.

You may set the build target in the NETWORK environment variable, and then omit it from all of the subsequent commands. Example:

export NETWORK=testnet
make artifacts

Verify Checksums

Now that you have built the Solana Contracts, you should ask a peer to build using the same process and compare the equivalent checksums.txt files to make sure the contract bytecode(s) are deterministic.

Verify Target Options: [mainnet|testnet|devnet]

wormhole/solana $ cat artifacts-VERIFY_TARGET/checksums.txt

Example: cat artifacts-testnet/checksums.txt

Once you have verified the Solana contracts are deterministic with a peer, you can now move to the deploy step.

Deploy Contracts

Now that you have built and verified checksums, you can now deploy one or more relevant contracts to the Solana blockchain.

Deploy Target Options: [mainnet|testnet|devnet]

You will need to define a payer-DEPLOY_TARGET.json for the relevant deploy target (eg. payer-testnet.json). This will contain the relevant wallet private key that you will be using to deploy the contracts.

wormhole/solana $ make NETWORK=DEPLOY_TARGET deploy/bridge
wormhole/solana $ make NETWORK=DEPLOY_TARGET deploy/token_bridge
wormhole/solana $ make NETWORK=DEPLOY_TARGET deploy/nft_bridge

Example: make NETWORK=testnet deploy/bridge

For each deployed contract, you will get an account address for that relevant account address for the deployment, make note of these so you can use them in the next step for on-chain verification.

Verify On-Chain

Now that you have deployed one or more contracts on-chain, you can verify the onchain bytecode and make sure it matches the same checksums you identified above.

For each contract you wish to verify on-chain, you will need the following elements:

  • Path to the contracts bytecode (eg. artifacts-testnet/bridge.so)
  • Solana account address for the relevant contract (eg. 9GRbmSbdrWGNf9z27YrhPbWnL7zZ3doeQAq2LrkmCB4Y)
  • A network to verify on (mainnet, testnet, or devnet)

Below is how to verify all three contracts on testnet:

wormhole/solana $ verify -n testnet artifacts-testnet/bridge.so NEW_BRIDGE_ACCOUNT_ADDRESS
wormhole/solana $ verify -n testnet artifacts-testnet/token_bridge.so NEW_TOKEN_BRIDGE_ACCOUNT_ADDRESS
wormhole/solana $ verify -n testnet artifacts-testnet/nft_bridge.so NEW_NFT_BRIDGE_ACCOUNT_ADDRESS

Example: verify -n testnet artifacts-testnet/bridge.so 9GRbmSbdrWGNf9z27YrhPbWnL7zZ3doeQAq2LrkmCB4Y

Again, if you have the NETWORK environment variable set, then the -n flag is optional:

verify artifacts-testnet/bridge.so 9GRbmSbdrWGNf9z27YrhPbWnL7zZ3doeQAq2LrkmCB4Y

For each contract, you should expect a Successfully verified output message. If all contracts can be successfully verified, you can engage in Wormhole protocol governance to obtain an authorized VAA for the contract upgrade(s).

A verification failure should never happen, and is a sign of some error in the deployment process.

If you instead get Failed to verify for any contract, you can debug the differences between the compiled and on-chain byte code using hashdump and vimdiff. The verify script temporarily caches bytecode in /tmp/account.dump, so you can run the verify command for a contract that doesn't verify and then debug as needed.

Below is an example of the commands you'd need to hexdump and vimdiff the differences in contract bytecode:

wormhole/solana $ hexdump -C /tmp/account.dump > deployed.bin
wormhole/solana $ hexdump -C artifacts-testnet/bridge.so > compiled.bin
wormhole/solana $ vimdiff compiled.bin deployed.bin

Do not proceed with governance until you can verify the on-chain bytecode with the locally compiled bytecode.