use nssa_core::{ account::{Account, AccountId, AccountWithMetadata, Data}, program::{ProgramInput, read_nssa_inputs, write_nssa_outputs}, }; // The token program has two functions: // 1. New token definition. // Arguments to this function are: // * Two **default** accounts: [definition_account, holding_account]. // The first default account will be initialized with the token definition account values. The second account will // be initialized to a token holding account for the new token, holding the entire total supply. // * An instruction data of 23-bytes, indicating the total supply and the token name, with // the following layout: // [0x00 || total_supply (little-endian 16 bytes) || name (6 bytes)] // The name cannot be equal to [0x00, 0x00, 0x00, 0x00, 0x00, 0x00] // 2. Token transfer // Arguments to this function are: // * Two accounts: [sender_account, recipient_account]. // * An instruction data byte string of length 23, indicating the total supply with the following layout // [0x01 || amount (little-endian 16 bytes) || 0x00 || 0x00 || 0x00 || 0x00 || 0x00 || 0x00]. const TOKEN_DEFINITION_TYPE: u8 = 0; const TOKEN_DEFINITION_DATA_SIZE: usize = 23; const TOKEN_HOLDING_TYPE: u8 = 1; const TOKEN_HOLDING_DATA_SIZE: usize = 49; struct TokenDefinition { account_type: u8, name: [u8; 6], total_supply: u128, } struct TokenHolding { account_type: u8, definition_id: AccountId, balance: u128, } impl TokenDefinition { fn into_data(self) -> Vec { let mut bytes = [0; TOKEN_DEFINITION_DATA_SIZE]; bytes[0] = self.account_type; bytes[1..7].copy_from_slice(&self.name); bytes[7..].copy_from_slice(&self.total_supply.to_le_bytes()); bytes.into() } } impl TokenHolding { fn new(definition_id: &AccountId) -> Self { Self { account_type: TOKEN_HOLDING_TYPE, definition_id: definition_id.clone(), balance: 0, } } fn parse(data: &[u8]) -> Option { if data.len() != TOKEN_HOLDING_DATA_SIZE || data[0] != TOKEN_HOLDING_TYPE { None } else { let account_type = data[0]; let definition_id = AccountId::new(data[1..33].try_into().unwrap()); let balance = u128::from_le_bytes(data[33..].try_into().unwrap()); Some(Self { definition_id, balance, account_type, }) } } fn into_data(self) -> Data { let mut bytes = [0; TOKEN_HOLDING_DATA_SIZE]; bytes[0] = self.account_type; bytes[1..33].copy_from_slice(&self.definition_id.to_bytes()); bytes[33..].copy_from_slice(&self.balance.to_le_bytes()); bytes.into() } } fn transfer(pre_states: &[AccountWithMetadata], balance_to_move: u128) -> Vec { if pre_states.len() != 2 { panic!("Invalid number of input accounts"); } let sender = &pre_states[0]; let recipient = &pre_states[1]; let mut sender_holding = TokenHolding::parse(&sender.account.data).expect("Invalid sender data"); let mut recipient_holding = if recipient.account == Account::default() { TokenHolding::new(&sender_holding.definition_id) } else { TokenHolding::parse(&recipient.account.data).expect("Invalid recipient data") }; if sender_holding.definition_id != recipient_holding.definition_id { panic!("Sender and recipient definition id mismatch"); } if sender_holding.balance < balance_to_move { panic!("Insufficient balance"); } if !sender.is_authorized { panic!("Sender authorization is missing"); } sender_holding.balance -= balance_to_move; recipient_holding.balance = recipient_holding .balance .checked_add(balance_to_move) .expect("Recipient balance overflow."); let sender_post = { let mut this = sender.account.clone(); this.data = sender_holding.into_data(); this }; let recipient_post = { let mut this = recipient.account.clone(); this.data = recipient_holding.into_data(); this }; vec![sender_post, recipient_post] } fn new_definition( pre_states: &[AccountWithMetadata], name: [u8; 6], total_supply: u128, ) -> Vec { if pre_states.len() != 2 { panic!("Invalid number of input accounts"); } let definition_target_account = &pre_states[0]; let holding_target_account = &pre_states[1]; if definition_target_account.account != Account::default() { panic!("Definition target account must have default values"); } if holding_target_account.account != Account::default() { panic!("Holding target account must have default values"); } let token_definition = TokenDefinition { account_type: TOKEN_DEFINITION_TYPE, name, total_supply, }; let token_holding = TokenHolding { account_type: TOKEN_HOLDING_TYPE, definition_id: definition_target_account.account_id.clone(), balance: total_supply, }; let mut definition_target_account_post = definition_target_account.account.clone(); definition_target_account_post.data = token_definition.into_data(); let mut holding_target_account_post = holding_target_account.account.clone(); holding_target_account_post.data = token_holding.into_data(); vec![definition_target_account_post, holding_target_account_post] } type Instruction = [u8; 23]; fn main() { let ( ProgramInput { pre_states, instruction, }, instruction_words, ) = read_nssa_inputs::(); match instruction[0] { 0 => { // Parse instruction let total_supply = u128::from_le_bytes(instruction[1..17].try_into().unwrap()); let name: [u8; 6] = instruction[17..].try_into().unwrap(); assert_ne!(name, [0; 6]); // Execute let post_states = new_definition(&pre_states, name, total_supply); write_nssa_outputs(instruction_words, pre_states, post_states); } 1 => { // Parse instruction let balance_to_move = u128::from_le_bytes(instruction[1..17].try_into().unwrap()); let name: [u8; 6] = instruction[17..].try_into().unwrap(); assert_eq!(name, [0; 6]); // Execute let post_states = transfer(&pre_states, balance_to_move); write_nssa_outputs(instruction_words, pre_states, post_states); } _ => panic!("Invalid instruction"), }; } #[cfg(test)] mod tests { use nssa_core::account::{Account, AccountId, AccountWithMetadata}; use crate::{TOKEN_HOLDING_DATA_SIZE, TOKEN_HOLDING_TYPE, new_definition, transfer}; #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_new_definition_with_invalid_number_of_accounts_1() { let pre_states = vec![AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_new_definition_with_invalid_number_of_accounts_2() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([3; 32]), }, ]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[should_panic(expected = "Definition target account must have default values")] #[test] fn test_new_definition_non_default_first_account_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { program_owner: [1, 2, 3, 4, 5, 6, 7, 8], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[should_panic(expected = "Holding target account must have default values")] #[test] fn test_new_definition_non_default_second_account_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { program_owner: [1, 2, 3, 4, 5, 6, 7, 8], ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); } #[test] fn test_new_definition_with_valid_inputs_succeeds() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: false, account_id: AccountId::new([ 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, ]), }, AccountWithMetadata { account: Account { ..Account::default() }, is_authorized: false, account_id: AccountId::new([2; 32]), }, ]; let post_states = new_definition(&pre_states, [0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe], 10); let [definition_account, holding_account] = post_states.try_into().ok().unwrap(); assert_eq!( definition_account.data, vec![ 0, 0xca, 0xfe, 0xca, 0xfe, 0xca, 0xfe, 10, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); assert_eq!( holding_account.data, vec![ 1, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 10, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); } #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_transfer_with_invalid_number_of_accounts_1() { let pre_states = vec![AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid number of input accounts")] #[test] fn test_call_transfer_with_invalid_number_of_accounts_2() { let pre_states = vec![ AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([3; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid sender data")] #[test] fn test_transfer_invalid_instruction_type_should_fail() { let invalid_type = TOKEN_HOLDING_TYPE ^ 1; let pre_states = vec![ AccountWithMetadata { account: Account { // First byte should be `TOKEN_HOLDING_TYPE` for token holding accounts data: vec![invalid_type; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid sender data")] #[test] fn test_transfer_invalid_data_size_should_fail_1() { let pre_states = vec![ AccountWithMetadata { account: Account { // Data must be of exact length `TOKEN_HOLDING_DATA_SIZE` data: vec![1; TOKEN_HOLDING_DATA_SIZE - 1], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Invalid sender data")] #[test] fn test_transfer_invalid_data_size_should_fail_2() { let pre_states = vec![ AccountWithMetadata { account: Account { // Data must be of exact length `TOKEN_HOLDING_DATA_SIZE` data: vec![1; TOKEN_HOLDING_DATA_SIZE + 1], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account::default(), is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Sender and recipient definition id mismatch")] #[test] fn test_transfer_with_different_definition_ids_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { data: vec![1; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { data: vec![1] .into_iter() .chain(vec![2; TOKEN_HOLDING_DATA_SIZE - 1]) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 10); } #[should_panic(expected = "Insufficient balance")] #[test] fn test_transfer_with_insufficient_balance_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { // Account with balance 37 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(37)) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { data: vec![1; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; // Attempt to transfer 38 tokens let _post_states = transfer(&pre_states, 38); } #[should_panic(expected = "Sender authorization is missing")] #[test] fn test_transfer_without_sender_authorization_should_fail() { let pre_states = vec![ AccountWithMetadata { account: Account { // Account with balance 37 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(37)) .collect(), ..Account::default() }, is_authorized: false, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { data: vec![1; TOKEN_HOLDING_DATA_SIZE], ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let _post_states = transfer(&pre_states, 37); } #[test] fn test_transfer_with_valid_inputs_succeeds() { let pre_states = vec![ AccountWithMetadata { account: Account { // Account with balance 37 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(37)) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([1; 32]), }, AccountWithMetadata { account: Account { // Account with balance 255 data: vec![1; TOKEN_HOLDING_DATA_SIZE - 16] .into_iter() .chain(u128::to_le_bytes(255)) .collect(), ..Account::default() }, is_authorized: true, account_id: AccountId::new([2; 32]), }, ]; let post_states = transfer(&pre_states, 11); let [sender_post, recipient_post] = post_states.try_into().ok().unwrap(); assert_eq!( sender_post.data, vec![ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 26, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); assert_eq!( recipient_post.data, vec![ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 10, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ] ); } }