use nssa_core::{ account::{Account, AccountId, AccountWithMetadata, Data}, program::{ AccountPostState, DEFAULT_PROGRAM_ID, ProgramInput, read_nssa_inputs, write_nssa_outputs, }, }; // The token program has three functions: // 1. New token definition. // Arguments to this function are: // * Two **default** accounts: [definition_account, holding_account]. // The first default account will be initialized with the token definition account values. The second account will // be initialized to a token holding account for the new token, holding the entire total supply. // * An instruction data of 23-bytes, indicating the total supply and the token name, with // the following layout: // [0x00 || total_supply (little-endian 16 bytes) || name (6 bytes)] // The name cannot be equal to [0x00, 0x00, 0x00, 0x00, 0x00, 0x00] // 2. Token transfer // Arguments to this function are: // * Two accounts: [sender_account, recipient_account]. // * An instruction data byte string of length 23, indicating the total supply with the following layout // [0x01 || amount (little-endian 16 bytes) || 0x00 || 0x00 || 0x00 || 0x00 || 0x00 || 0x00]. // 3. Initialize account with zero balance // Arguments to this function are: // * Two accounts: [definition_account, account_to_initialize]. // * An dummy byte string of length 23, with the following layout // [0x02 || 0x00 || 0x00 || 0x00 || ... || 0x00 || 0x00]. const TOKEN_DEFINITION_TYPE: u8 = 0; const TOKEN_DEFINITION_DATA_SIZE: usize = 23; const TOKEN_HOLDING_TYPE: u8 = 1; const TOKEN_HOLDING_DATA_SIZE: usize = 49; struct TokenDefinition { account_type: u8, name: [u8; 6], total_supply: u128, } struct TokenHolding { account_type: u8, definition_id: AccountId, balance: u128, } impl TokenDefinition { fn into_data(self) -> Vec { let mut bytes = [0; TOKEN_DEFINITION_DATA_SIZE]; bytes[0] = self.account_type; bytes[1..7].copy_from_slice(&self.name); bytes[7..].copy_from_slice(&self.total_supply.to_le_bytes()); bytes.into() } fn parse(data: &[u8]) -> Option { if data.len() != TOKEN_DEFINITION_DATA_SIZE || data[0] != TOKEN_DEFINITION_TYPE { None } else { let account_type = data[0]; let name = data[1..7].try_into().unwrap(); let total_supply = u128::from_le_bytes( data[7..] .try_into() .expect("Total supply must be 16 bytes little-endian"), ); Some(Self { account_type, name, total_supply, }) } } } impl TokenHolding { fn new(definition_id: &AccountId) -> Self { Self { account_type: TOKEN_HOLDING_TYPE, definition_id: definition_id.clone(), balance: 0, } } fn parse(data: &[u8]) -> Option { if data.len() != TOKEN_HOLDING_DATA_SIZE || data[0] != TOKEN_HOLDING_TYPE { None } else { let account_type = data[0]; let definition_id = AccountId::new( data[1..33] .try_into() .expect("Defintion ID must be 32 bytes long"), ); let balance = u128::from_le_bytes( data[33..] .try_into() .expect("balance must be 16 bytes little-endian"), ); Some(Self { definition_id, balance, account_type, }) } } fn into_data(self) -> Data { let mut bytes = [0; TOKEN_HOLDING_DATA_SIZE]; bytes[0] = self.account_type; bytes[1..33].copy_from_slice(&self.definition_id.to_bytes()); bytes[33..].copy_from_slice(&self.balance.to_le_bytes()); bytes.into() } } fn transfer(pre_states: &[AccountWithMetadata], balance_to_move: u128) -> Vec { if pre_states.len() != 2 { panic!("Invalid number of input accounts"); } let sender = &pre_states[0]; let recipient = &pre_states[1]; let mut sender_holding = TokenHolding::parse(&sender.account.data).expect("Invalid sender data"); let mut recipient_holding = if recipient.account == Account::default() { TokenHolding::new(&sender_holding.definition_id) } else { TokenHolding::parse(&recipient.account.data).expect("Invalid recipient data") }; if sender_holding.definition_id != recipient_holding.definition_id { panic!("Sender and recipient definition id mismatch"); } if sender_holding.balance < balance_to_move { panic!("Insufficient balance"); } if !sender.is_authorized { panic!("Sender authorization is missing"); } sender_holding.balance -= balance_to_move; recipient_holding.balance = recipient_holding .balance .checked_add(balance_to_move) .expect("Recipient balance overflow."); let sender_post = { let mut this = sender.account.clone(); this.data = sender_holding.into_data(); AccountPostState::new(this) }; let recipient_post = { let mut this = recipient.account.clone(); this.data = recipient_holding.into_data(); // Claim the recipient account if it has default program owner if this.program_owner == DEFAULT_PROGRAM_ID { AccountPostState::new_claimed(this) } else { AccountPostState::new(this) } }; vec![sender_post, recipient_post] } fn new_definition( pre_states: &[AccountWithMetadata], name: [u8; 6], total_supply: u128, ) -> Vec { if pre_states.len() != 2 { panic!("Invalid number of input accounts"); } let definition_target_account = &pre_states[0]; let holding_target_account = &pre_states[1]; if definition_target_account.account != Account::default() { panic!("Definition target account must have default values"); } if holding_target_account.account != Account::default() { panic!("Holding target account must have default values"); } let token_definition = TokenDefinition { account_type: TOKEN_DEFINITION_TYPE, name, total_supply, }; let token_holding = TokenHolding { account_type: TOKEN_HOLDING_TYPE, definition_id: definition_target_account.account_id.clone(), balance: total_supply, }; let mut definition_target_account_post = definition_target_account.account.clone(); definition_target_account_post.data = token_definition.into_data(); let mut holding_target_account_post = holding_target_account.account.clone(); holding_target_account_post.data = token_holding.into_data(); vec![ AccountPostState::new_claimed(definition_target_account_post), AccountPostState::new_claimed(holding_target_account_post), ] } fn initialize_account(pre_states: &[AccountWithMetadata]) -> Vec { if pre_states.len() != 2 { panic!("Invalid number of accounts"); } let definition = &pre_states[0]; let account_to_initialize = &pre_states[1]; if account_to_initialize.account != Account::default() { panic!("Only uninitialized accounts can be initialized"); } // TODO: We should check that this is an account owned by the token program. // This check can't be done here since the ID of the program is known only after compiling it // // Check definition account is valid let _definition_values = TokenDefinition::parse(&definition.account.data).expect("Definition account must be valid"); let holding_values = TokenHolding::new(&definition.account_id); let definition_post = definition.account.clone(); let mut account_to_initialize = account_to_initialize.account.clone(); account_to_initialize.data = holding_values.into_data(); vec![ AccountPostState::new(definition_post), AccountPostState::new_claimed(account_to_initialize), ] } type Instruction = [u8; 23]; fn main() { let ProgramInput { pre_states, instruction, } = read_nssa_inputs::(); let (pre_states, post_states) = match instruction[0] { 0 => { // Parse instruction let total_supply = u128::from_le_bytes( instruction[1..17] .try_into() .expect("Total supply must be 16 bytes little-endian"), ); let name: [u8; 6] = instruction[17..] .try_into() .expect("Name must be 6 bytes long"); assert_ne!(name, [0; 6]); // Execute let post_states = new_definition(&pre_states, name, total_supply); (pre_states, post_states) } 1 => { // Parse instruction let balance_to_move = u128::from_le_bytes( instruction[1..17] .try_into() .expect("Balance to move must be 16 bytes little-endian"), ); let name: [u8; 6] = instruction[17..] .try_into() .expect("Name must be 6 bytes long"); assert_eq!(name, [0; 6]); // Execute let post_states = transfer(&pre_states, balance_to_move); (pre_states, post_states) } 2 => { // Initialize account assert_eq!(instruction[1..], [0; 22]); let post_states = initialize_account(&pre_states); (pre_states, post_states) } _ => panic!("Invalid instruction"), }; write_nssa_outputs(pre_states, post_states); } #[cfg(test)] mod tests { use nssa_core::account::{Account, AccountId, AccountWithMetadata}; use crate::{ TOKEN_DEFINITION_DATA_SIZE, TOKEN_HOLDING_DATA_SIZE, TOKEN_HOLDING_TYPE, initialize_account, new_definition, transfer, }; #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_new_definition_with_invalid_number_of_accounts_1() { let pre_states = vec![AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_new_definition_with_invalid_number_of_accounts_2() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([3; 32]), }, ]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[should_panic(expected = "Definition target account must have default values")] #[test] fn test_new_definition_non_default_first_account_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { program_owner: [1, 2, 3, 4, 5, 6, 7, 8], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[should_panic(expected = "Holding target account must have default values")] #[test] fn test_new_definition_non_default_second_account_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { program_owner: [1, 2, 3, 4, 5, 6, 7, 8], ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[test] fn test_new_definition_with_valid_inputs_succeeds() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: false, account_id: AccountId::new([ 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, ]), }, AccountWithMetadata { account: Account { ..Account::default() }, is_authorized: false, account_id: AccountId::new([2; 32]), }, ]; let post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); let [definition_account, holding_account] = post_states.try_into().ok().unwrap(); assert_eq!( definition_account.account.data, vec![ 0, 0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe, 10, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); assert_eq!( holding_account.account.data, vec![ 1, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 10, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); } #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_transfer_with_invalid_number_of_accounts_1() { let pre_states = vec![AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_transfer_with_invalid_number_of_accounts_2() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([3; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid sender data")] #[test] fn test_transfer_invalid_instruction_type_should_fail() { let invalid_type = TOKEN_HOLDING_TYPE ^ 1; let pre_states = vec![ AccountWithMetadata { account: Account { // First byte should be `TOKEN_HOLDING_TYPE` for token holding accounts data: vec![invalid_type; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid sender data")] #[test] fn test_transfer_invalid_data_size_should_fail_1() { let pre_states = vec![ AccountWithMetadata { account: Account { // Data must be of exact length `TOKEN_HOLDING_DATA_SIZE` data: vec![1; TOKEN_HOLDING_DATA_SIZE - 1], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid sender data")] #[test] fn test_transfer_invalid_data_size_should_fail_2() { let pre_states = vec![ AccountWithMetadata { account: Account { // Data must be of exact length `TOKEN_HOLDING_DATA_SIZE` data: vec![1; TOKEN_HOLDING_DATA_SIZE + 1], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Sender and recipient definition id mismatch")] #[test] fn test_transfer_with_different_definition_ids_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { data: vec![1; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { data: vec![1] .into_iter() .chain(vec![2; TOKEN_HOLDING_DATA_SIZE - 1]) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Insufficient balance")] #[test] fn test_transfer_with_insufficient_balance_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { // Account with balance 37 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(37)) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { data: vec![1; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; // Attempt to transfer 38 tokens let _post_states = transfer(&pre_states, 38); } #[should_panic(expected = "Sender authorization is missing")] #[test] fn test_transfer_without_sender_authorization_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { // Account with balance 37 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(37)) .collect(), ..Account::default() }, is_authorized: false, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { data: vec![1; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 37); } #[test] fn test_transfer_with_valid_inputs_succeeds() { let pre_states = vec![ AccountWithMetadata { account: Account { // Account with balance 37 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(37)) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { // Account with balance 255 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(255)) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let post_states = transfer(&pre_states, 11); let [sender_post, recipient_post] = post_states.try_into().ok().unwrap(); assert_eq!( sender_post.account.data, vec![ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 26, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); assert_eq!( recipient_post.account.data, vec![ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 10, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); } #[test] fn test_token_initialize_account_succeeds() { let pre_states = vec![ AccountWithMetadata { account: Account { // Definition ID with data: vec![0; TOKEN_DEFINITION_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(1000)) .collect(), ..Account::default() }, is_authorized: false, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: false, account_id: AccountId::new([2; 32]), }, ]; let post_states = initialize_account(&pre_states); let [definition, holding] = post_states.try_into().ok().unwrap(); assert_eq!(definition.account.data, pre_states[0].account.data); assert_eq!( holding.account.data, vec![ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); } }