mirror of
https://github.com/logos-blockchain/lez-programs.git
synced 2026-05-19 23:49:52 +00:00
- Updated `nssa_core` and `spel-framework` dependencies to their respective release candidates in `Cargo.toml` and `Cargo.lock` files for `amm`, `ata`, and `token` modules. - Enhanced the `new_definition` function in `amm/src/new_definition.rs` to include new claim logic and updated PDA seed calculations. - Modified tests in `integration_tests/tests/amm.rs`, `integration_tests/tests/ata.rs`, and `integration_tests/tests/token.rs` to accommodate changes in transaction handling and account initialization. - Refactored account initialization logic in `ata/src/create.rs` and `token/src/initialize.rs` to include authorization claims. - Updated various functions in `token/src/mint.rs`, `token/src/new_definition.rs`, and `token/src/transfer.rs` to utilize the new claim system for account states. - Adjusted the IDL generation tool to use the latest version of `spel-framework-core`.
165 lines
4.6 KiB
Rust
165 lines
4.6 KiB
Rust
use ata_core::{compute_ata_seed, get_associated_token_account_id};
|
|
use nssa_core::{
|
|
account::{Account, AccountId, AccountWithMetadata, Data},
|
|
program::{ChainedCall, Claim},
|
|
};
|
|
use token_core::{TokenDefinition, TokenHolding};
|
|
|
|
const ATA_PROGRAM_ID: nssa_core::program::ProgramId = [1u32; 8];
|
|
const TOKEN_PROGRAM_ID: nssa_core::program::ProgramId = [2u32; 8];
|
|
|
|
fn owner_id() -> AccountId {
|
|
AccountId::new([0x01u8; 32])
|
|
}
|
|
|
|
fn definition_id() -> AccountId {
|
|
AccountId::new([0x02u8; 32])
|
|
}
|
|
|
|
fn ata_id() -> AccountId {
|
|
get_associated_token_account_id(
|
|
&ATA_PROGRAM_ID,
|
|
&compute_ata_seed(owner_id(), definition_id()),
|
|
)
|
|
}
|
|
|
|
fn owner_account() -> AccountWithMetadata {
|
|
AccountWithMetadata {
|
|
account: Account::default(),
|
|
is_authorized: true,
|
|
account_id: owner_id(),
|
|
}
|
|
}
|
|
|
|
fn definition_account() -> AccountWithMetadata {
|
|
AccountWithMetadata {
|
|
account: Account {
|
|
program_owner: TOKEN_PROGRAM_ID,
|
|
balance: 0,
|
|
data: Data::from(&TokenDefinition::Fungible {
|
|
name: "TEST".to_string(),
|
|
total_supply: 1000,
|
|
metadata_id: None,
|
|
}),
|
|
nonce: nssa_core::account::Nonce(0),
|
|
},
|
|
is_authorized: false,
|
|
account_id: definition_id(),
|
|
}
|
|
}
|
|
|
|
fn uninitialized_ata_account() -> AccountWithMetadata {
|
|
AccountWithMetadata {
|
|
account: Account::default(),
|
|
is_authorized: false,
|
|
account_id: ata_id(),
|
|
}
|
|
}
|
|
|
|
fn initialized_ata_account() -> AccountWithMetadata {
|
|
AccountWithMetadata {
|
|
account: Account {
|
|
program_owner: TOKEN_PROGRAM_ID,
|
|
balance: 0,
|
|
data: Data::from(&TokenHolding::Fungible {
|
|
definition_id: definition_id(),
|
|
balance: 100,
|
|
}),
|
|
nonce: nssa_core::account::Nonce(0),
|
|
},
|
|
is_authorized: false,
|
|
account_id: ata_id(),
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn create_emits_chained_call_for_uninitialized_ata() {
|
|
let (post_states, chained_calls) = crate::create::create_associated_token_account(
|
|
owner_account(),
|
|
definition_account(),
|
|
uninitialized_ata_account(),
|
|
ATA_PROGRAM_ID,
|
|
);
|
|
|
|
assert_eq!(post_states.len(), 3);
|
|
assert_eq!(post_states[0].required_claim(), Some(Claim::Authorized));
|
|
|
|
let mut authorized_ata = uninitialized_ata_account();
|
|
authorized_ata.is_authorized = true;
|
|
let expected_call = ChainedCall::new(
|
|
TOKEN_PROGRAM_ID,
|
|
vec![definition_account(), authorized_ata],
|
|
&token_core::Instruction::InitializeAccount,
|
|
)
|
|
.with_pda_seeds(vec![compute_ata_seed(owner_id(), definition_id())]);
|
|
|
|
assert_eq!(chained_calls, vec![expected_call]);
|
|
}
|
|
|
|
#[test]
|
|
fn create_is_idempotent_for_initialized_ata() {
|
|
let (post_states, chained_calls) = crate::create::create_associated_token_account(
|
|
owner_account(),
|
|
definition_account(),
|
|
initialized_ata_account(),
|
|
ATA_PROGRAM_ID,
|
|
);
|
|
|
|
assert_eq!(post_states.len(), 3);
|
|
assert!(
|
|
chained_calls.is_empty(),
|
|
"Should emit no chained call for already-initialized ATA"
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "ATA account ID does not match expected derivation")]
|
|
fn create_panics_on_wrong_ata_address() {
|
|
let wrong_ata = AccountWithMetadata {
|
|
account: Account::default(),
|
|
is_authorized: false,
|
|
account_id: AccountId::new([0xFFu8; 32]),
|
|
};
|
|
|
|
crate::create::create_associated_token_account(
|
|
owner_account(),
|
|
definition_account(),
|
|
wrong_ata,
|
|
ATA_PROGRAM_ID,
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn get_associated_token_account_id_is_deterministic() {
|
|
let seed = compute_ata_seed(owner_id(), definition_id());
|
|
let id1 = get_associated_token_account_id(&ATA_PROGRAM_ID, &seed);
|
|
let id2 = get_associated_token_account_id(&ATA_PROGRAM_ID, &seed);
|
|
assert_eq!(id1, id2);
|
|
}
|
|
|
|
#[test]
|
|
fn get_associated_token_account_id_differs_by_owner() {
|
|
let other_owner = AccountId::new([0x99u8; 32]);
|
|
let id1 = get_associated_token_account_id(
|
|
&ATA_PROGRAM_ID,
|
|
&compute_ata_seed(owner_id(), definition_id()),
|
|
);
|
|
let id2 = get_associated_token_account_id(
|
|
&ATA_PROGRAM_ID,
|
|
&compute_ata_seed(other_owner, definition_id()),
|
|
);
|
|
assert_ne!(id1, id2);
|
|
}
|
|
|
|
#[test]
|
|
fn get_associated_token_account_id_differs_by_definition() {
|
|
let other_def = AccountId::new([0x99u8; 32]);
|
|
let id1 = get_associated_token_account_id(
|
|
&ATA_PROGRAM_ID,
|
|
&compute_ata_seed(owner_id(), definition_id()),
|
|
);
|
|
let id2 =
|
|
get_associated_token_account_id(&ATA_PROGRAM_ID, &compute_ata_seed(owner_id(), other_def));
|
|
assert_ne!(id1, id2);
|
|
}
|