mirror of
https://github.com/logos-blockchain/lssa.git
synced 2026-01-06 23:33:10 +00:00
Merge branch 'main' into schouhy/add-program-deployment-transactions
This commit is contained in:
commit
2da861c2d2
@ -1297,6 +1297,37 @@ pub async fn test_program_deployment() {
|
|||||||
info!("Success!");
|
info!("Success!");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub async fn test_authenticated_transfer_initialize_function() {
|
||||||
|
info!("test initialize account for authenticated transfer");
|
||||||
|
let command = Command::AuthenticatedTransferInitializePublicAccount {};
|
||||||
|
|
||||||
|
let SubcommandReturnValue::RegisterAccount { addr } =
|
||||||
|
wallet::execute_subcommand(command).await.unwrap()
|
||||||
|
else {
|
||||||
|
panic!("Error creating account");
|
||||||
|
};
|
||||||
|
|
||||||
|
info!("Checking correct execution");
|
||||||
|
let wallet_config = fetch_config().unwrap();
|
||||||
|
let seq_client = SequencerClient::new(wallet_config.sequencer_addr.clone()).unwrap();
|
||||||
|
let account = seq_client
|
||||||
|
.get_account(addr.to_string())
|
||||||
|
.await
|
||||||
|
.unwrap()
|
||||||
|
.account;
|
||||||
|
|
||||||
|
let expected_program_owner = Program::authenticated_transfer_program().id();
|
||||||
|
let expected_nonce = 1;
|
||||||
|
let expected_balance = 0;
|
||||||
|
|
||||||
|
assert_eq!(account.program_owner, expected_program_owner);
|
||||||
|
assert_eq!(account.balance, expected_balance);
|
||||||
|
assert_eq!(account.nonce, expected_nonce);
|
||||||
|
assert!(account.data.is_empty());
|
||||||
|
|
||||||
|
info!("Success!");
|
||||||
|
}
|
||||||
|
|
||||||
pub async fn test_pinata_private_receiver() {
|
pub async fn test_pinata_private_receiver() {
|
||||||
info!("test_pinata_private_receiver");
|
info!("test_pinata_private_receiver");
|
||||||
let pinata_addr = "cafe".repeat(16);
|
let pinata_addr = "cafe".repeat(16);
|
||||||
@ -1496,6 +1527,9 @@ pub async fn main_tests_runner() -> Result<()> {
|
|||||||
"test_program_deployment" => {
|
"test_program_deployment" => {
|
||||||
test_cleanup_wrap!(home_dir, test_program_deployment);
|
test_cleanup_wrap!(home_dir, test_program_deployment);
|
||||||
}
|
}
|
||||||
|
"test_authenticated_transfer_initialize_function" => {
|
||||||
|
test_cleanup_wrap!(home_dir, test_authenticated_transfer_initialize_function);
|
||||||
|
}
|
||||||
"test_pinata_private_receiver" => {
|
"test_pinata_private_receiver" => {
|
||||||
test_cleanup_wrap!(home_dir, test_pinata_private_receiver);
|
test_cleanup_wrap!(home_dir, test_pinata_private_receiver);
|
||||||
}
|
}
|
||||||
@ -1518,6 +1552,7 @@ pub async fn main_tests_runner() -> Result<()> {
|
|||||||
test_cleanup_wrap!(home_dir, test_success_move_to_another_account);
|
test_cleanup_wrap!(home_dir, test_success_move_to_another_account);
|
||||||
test_cleanup_wrap!(home_dir, test_success);
|
test_cleanup_wrap!(home_dir, test_success);
|
||||||
test_cleanup_wrap!(home_dir, test_failure);
|
test_cleanup_wrap!(home_dir, test_failure);
|
||||||
|
test_cleanup_wrap!(home_dir, test_get_account);
|
||||||
test_cleanup_wrap!(home_dir, test_success_two_transactions);
|
test_cleanup_wrap!(home_dir, test_success_two_transactions);
|
||||||
test_cleanup_wrap!(home_dir, test_success_token_program);
|
test_cleanup_wrap!(home_dir, test_success_token_program);
|
||||||
test_cleanup_wrap!(
|
test_cleanup_wrap!(
|
||||||
@ -1544,10 +1579,13 @@ pub async fn main_tests_runner() -> Result<()> {
|
|||||||
home_dir,
|
home_dir,
|
||||||
test_success_private_transfer_to_another_owned_account_claiming_path
|
test_success_private_transfer_to_another_owned_account_claiming_path
|
||||||
);
|
);
|
||||||
|
test_cleanup_wrap!(home_dir, test_success_token_program_shielded_owned);
|
||||||
test_cleanup_wrap!(home_dir, test_pinata);
|
test_cleanup_wrap!(home_dir, test_pinata);
|
||||||
test_cleanup_wrap!(home_dir, test_program_deployment);
|
test_cleanup_wrap!(home_dir, test_program_deployment);
|
||||||
|
test_cleanup_wrap!(home_dir, test_authenticated_transfer_initialize_function);
|
||||||
test_cleanup_wrap!(home_dir, test_pinata_private_receiver);
|
test_cleanup_wrap!(home_dir, test_pinata_private_receiver);
|
||||||
test_cleanup_wrap!(home_dir, test_success_token_program_private_owned);
|
test_cleanup_wrap!(home_dir, test_success_token_program_private_owned);
|
||||||
|
test_cleanup_wrap!(home_dir, test_success_token_program_deshielded_owned);
|
||||||
test_cleanup_wrap!(home_dir, test_success_token_program_private_claiming_path);
|
test_cleanup_wrap!(home_dir, test_success_token_program_private_claiming_path);
|
||||||
test_cleanup_wrap!(home_dir, test_pinata_private_receiver_new_account);
|
test_cleanup_wrap!(home_dir, test_pinata_private_receiver_new_account);
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1,21 +1,30 @@
|
|||||||
use nssa_core::program::{ProgramInput, read_nssa_inputs, write_nssa_outputs};
|
use nssa_core::{
|
||||||
|
account::{Account, AccountWithMetadata},
|
||||||
|
program::{ProgramInput, read_nssa_inputs, write_nssa_outputs},
|
||||||
|
};
|
||||||
|
|
||||||
/// A transfer of balance program.
|
/// Initializes a default account under the ownership of this program.
|
||||||
/// To be used both in public and private contexts.
|
/// This is achieved by a noop.
|
||||||
fn main() {
|
fn initialize_account(pre_state: AccountWithMetadata) {
|
||||||
// Read input accounts.
|
let account_to_claim = pre_state.account.clone();
|
||||||
// It is expected to receive only two accounts: [sender_account, receiver_account]
|
let is_authorized = pre_state.is_authorized;
|
||||||
let ProgramInput {
|
|
||||||
pre_states,
|
|
||||||
instruction: balance_to_move,
|
|
||||||
} = read_nssa_inputs();
|
|
||||||
|
|
||||||
// Continue only if input_accounts is an array of two elements
|
// Continue only if the account to claim has default values
|
||||||
let [sender, receiver] = match pre_states.try_into() {
|
if account_to_claim != Account::default() {
|
||||||
Ok(array) => array,
|
return;
|
||||||
Err(_) => return,
|
}
|
||||||
};
|
|
||||||
|
|
||||||
|
// Continue only if the owner authorized this operation
|
||||||
|
if !is_authorized {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Noop will result in account being claimed for this program
|
||||||
|
write_nssa_outputs(vec![pre_state], vec![account_to_claim]);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Transfers `balance_to_move` native balance from `sender` to `recipient`.
|
||||||
|
fn transfer(sender: AccountWithMetadata, recipient: AccountWithMetadata, balance_to_move: u128) {
|
||||||
// Continue only if the sender has authorized this operation
|
// Continue only if the sender has authorized this operation
|
||||||
if !sender.is_authorized {
|
if !sender.is_authorized {
|
||||||
return;
|
return;
|
||||||
@ -28,10 +37,27 @@ fn main() {
|
|||||||
|
|
||||||
// Create accounts post states, with updated balances
|
// Create accounts post states, with updated balances
|
||||||
let mut sender_post = sender.account.clone();
|
let mut sender_post = sender.account.clone();
|
||||||
let mut receiver_post = receiver.account.clone();
|
let mut recipient_post = recipient.account.clone();
|
||||||
sender_post.balance -= balance_to_move;
|
sender_post.balance -= balance_to_move;
|
||||||
receiver_post.balance += balance_to_move;
|
recipient_post.balance += balance_to_move;
|
||||||
|
|
||||||
write_nssa_outputs(vec![sender, receiver], vec![sender_post, receiver_post]);
|
write_nssa_outputs(vec![sender, recipient], vec![sender_post, recipient_post]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// A transfer of balance program.
|
||||||
|
/// To be used both in public and private contexts.
|
||||||
|
fn main() {
|
||||||
|
// Read input accounts.
|
||||||
|
let ProgramInput {
|
||||||
|
pre_states,
|
||||||
|
instruction: balance_to_move,
|
||||||
|
} = read_nssa_inputs();
|
||||||
|
|
||||||
|
match (pre_states.as_slice(), balance_to_move) {
|
||||||
|
([account_to_claim], 0) => initialize_account(account_to_claim.clone()),
|
||||||
|
([sender, recipient], balance_to_move) => {
|
||||||
|
transfer(sender.clone(), recipient.clone(), balance_to_move)
|
||||||
|
}
|
||||||
|
_ => panic!("invalid params"),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
@ -326,6 +326,7 @@ pub enum Command {
|
|||||||
#[arg(long)]
|
#[arg(long)]
|
||||||
solution: u128,
|
solution: u128,
|
||||||
},
|
},
|
||||||
|
AuthenticatedTransferInitializePublicAccount {},
|
||||||
// Check the wallet can connect to the node and builtin local programs
|
// Check the wallet can connect to the node and builtin local programs
|
||||||
// match the remote versions
|
// match the remote versions
|
||||||
CheckHealth {},
|
CheckHealth {},
|
||||||
@ -665,7 +666,8 @@ pub async fn execute_subcommand(command: Command) -> Result<SubcommandReturnValu
|
|||||||
Command::GetPrivateAccount { addr } => {
|
Command::GetPrivateAccount { addr } => {
|
||||||
let addr: Address = addr.parse()?;
|
let addr: Address = addr.parse()?;
|
||||||
if let Some(account) = wallet_core.get_account_private(&addr) {
|
if let Some(account) = wallet_core.get_account_private(&addr) {
|
||||||
println!("{}", serde_json::to_string(&account).unwrap());
|
let account_hr: HumanReadableAccount = account.into();
|
||||||
|
println!("{}", serde_json::to_string(&account_hr).unwrap());
|
||||||
} else {
|
} else {
|
||||||
println!("Private account not found.");
|
println!("Private account not found.");
|
||||||
}
|
}
|
||||||
@ -768,6 +770,25 @@ pub async fn execute_subcommand(command: Command) -> Result<SubcommandReturnValu
|
|||||||
|
|
||||||
SubcommandReturnValue::PrivacyPreservingTransfer { tx_hash }
|
SubcommandReturnValue::PrivacyPreservingTransfer { tx_hash }
|
||||||
}
|
}
|
||||||
|
Command::AuthenticatedTransferInitializePublicAccount {} => {
|
||||||
|
let addr = wallet_core.create_new_account_public();
|
||||||
|
|
||||||
|
println!("Generated new account with addr {addr}");
|
||||||
|
|
||||||
|
let path = wallet_core.store_persistent_accounts()?;
|
||||||
|
|
||||||
|
println!("Stored persistent accounts at {path:#?}");
|
||||||
|
|
||||||
|
let res = wallet_core
|
||||||
|
.register_account_under_authenticated_transfers_programs(addr)
|
||||||
|
.await?;
|
||||||
|
|
||||||
|
println!("Results of tx send is {res:#?}");
|
||||||
|
|
||||||
|
let _transfer_tx = wallet_core.poll_native_token_transfer(res.tx_hash).await?;
|
||||||
|
|
||||||
|
SubcommandReturnValue::RegisterAccount { addr }
|
||||||
|
}
|
||||||
Command::TokenProgram(token_subcommand) => {
|
Command::TokenProgram(token_subcommand) => {
|
||||||
token_subcommand.handle_subcommand(&mut wallet_core).await?
|
token_subcommand.handle_subcommand(&mut wallet_core).await?
|
||||||
}
|
}
|
||||||
|
|||||||
@ -42,4 +42,30 @@ impl WalletCore {
|
|||||||
Err(ExecutionFailureKind::InsufficientFundsError)
|
Err(ExecutionFailureKind::InsufficientFundsError)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub async fn register_account_under_authenticated_transfers_programs(
|
||||||
|
&self,
|
||||||
|
from: Address,
|
||||||
|
) -> Result<SendTxResponse, ExecutionFailureKind> {
|
||||||
|
let Ok(nonces) = self.get_accounts_nonces(vec![from]).await else {
|
||||||
|
return Err(ExecutionFailureKind::SequencerError);
|
||||||
|
};
|
||||||
|
|
||||||
|
let instruction: u128 = 0;
|
||||||
|
let addresses = vec![from];
|
||||||
|
let program_id = Program::authenticated_transfer_program().id();
|
||||||
|
let message = Message::try_new(program_id, addresses, nonces, instruction).unwrap();
|
||||||
|
|
||||||
|
let signing_key = self.storage.user_data.get_pub_account_signing_key(&from);
|
||||||
|
|
||||||
|
let Some(signing_key) = signing_key else {
|
||||||
|
return Err(ExecutionFailureKind::KeyNotFoundError);
|
||||||
|
};
|
||||||
|
|
||||||
|
let witness_set = WitnessSet::for_message(&message, &[signing_key]);
|
||||||
|
|
||||||
|
let tx = PublicTransaction::new(message, witness_set);
|
||||||
|
|
||||||
|
Ok(self.sequencer_client.send_tx_public(tx).await?)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user