You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
933 lines
31 KiB
933 lines
31 KiB
1 year ago
|
//! Contains functional tests for things that cannot be done
|
||
|
//! strictly in unit tests. This includes CPIs, like creating
|
||
|
//! new PDA accounts.
|
||
|
|
||
|
use account_utils::DiscriminatorEncode;
|
||
|
use hyperlane_core::{Encode, HyperlaneMessage, H256, U256};
|
||
|
use solana_program::{
|
||
|
instruction::{AccountMeta, Instruction},
|
||
|
pubkey,
|
||
|
pubkey::Pubkey,
|
||
|
};
|
||
|
use std::collections::HashMap;
|
||
|
|
||
|
use hyperlane_sealevel_connection_client::router::RemoteRouterConfig;
|
||
|
use hyperlane_sealevel_mailbox::{
|
||
|
accounts::{DispatchedMessage, DispatchedMessageAccount},
|
||
|
mailbox_dispatched_message_pda_seeds, mailbox_message_dispatch_authority_pda_seeds,
|
||
|
mailbox_process_authority_pda_seeds,
|
||
|
};
|
||
|
use hyperlane_sealevel_message_recipient_interface::{
|
||
|
HandleInstruction, MessageRecipientInstruction,
|
||
|
};
|
||
|
use hyperlane_sealevel_token_lib::{
|
||
|
accounts::{convert_decimals, HyperlaneToken, HyperlaneTokenAccount},
|
||
|
hyperlane_token_pda_seeds,
|
||
|
instruction::{Init, Instruction as HyperlaneTokenInstruction, TransferRemote},
|
||
|
message::TokenMessage,
|
||
|
};
|
||
|
use hyperlane_sealevel_token_native::{
|
||
|
hyperlane_token_native_collateral_pda_seeds, plugin::NativePlugin,
|
||
|
processor::process_instruction,
|
||
|
};
|
||
|
use hyperlane_test_utils::{
|
||
|
assert_lamports, assert_transaction_error, initialize_mailbox, mailbox_id, new_funded_keypair,
|
||
|
process, transfer_lamports,
|
||
|
};
|
||
|
use solana_program_test::*;
|
||
|
use solana_sdk::{
|
||
|
commitment_config::CommitmentLevel,
|
||
|
instruction::InstructionError,
|
||
|
signature::Signer,
|
||
|
signer::keypair::Keypair,
|
||
|
transaction::{Transaction, TransactionError},
|
||
|
};
|
||
|
use tarpc::context::Context;
|
||
|
|
||
|
/// There are 1e9 lamports in one SOL.
|
||
|
const ONE_SOL_IN_LAMPORTS: u64 = 1000000000;
|
||
|
const LOCAL_DOMAIN: u32 = 1234;
|
||
|
const LOCAL_DECIMALS: u8 = 9;
|
||
|
const LOCAL_DECIMALS_U32: u32 = LOCAL_DECIMALS as u32;
|
||
|
const REMOTE_DOMAIN: u32 = 4321;
|
||
|
const REMOTE_DECIMALS: u8 = 18;
|
||
|
|
||
|
fn hyperlane_sealevel_token_native_id() -> Pubkey {
|
||
|
pubkey!("CGn8yNtSD3aTTqJfYhUb6s1aVTN75NzwtsFKo1e83aga")
|
||
|
}
|
||
|
|
||
|
async fn setup_client() -> (BanksClient, Keypair) {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
let mut program_test = ProgramTest::new(
|
||
|
"hyperlane_sealevel_token_native",
|
||
|
program_id,
|
||
|
processor!(process_instruction),
|
||
|
);
|
||
|
|
||
|
program_test.add_program("spl_noop", spl_noop::id(), processor!(spl_noop::noop));
|
||
|
|
||
|
let mailbox_program_id = mailbox_id();
|
||
|
program_test.add_program(
|
||
|
"hyperlane_sealevel_mailbox",
|
||
|
mailbox_program_id,
|
||
|
processor!(hyperlane_sealevel_mailbox::processor::process_instruction),
|
||
|
);
|
||
|
|
||
|
// This serves as the default ISM on the Mailbox
|
||
|
program_test.add_program(
|
||
|
"hyperlane_sealevel_test_ism",
|
||
|
hyperlane_sealevel_test_ism::id(),
|
||
|
processor!(hyperlane_sealevel_test_ism::program::process_instruction),
|
||
|
);
|
||
|
|
||
|
let (banks_client, payer, _recent_blockhash) = program_test.start().await;
|
||
|
|
||
|
(banks_client, payer)
|
||
|
}
|
||
|
|
||
|
struct HyperlaneTokenAccounts {
|
||
|
token: Pubkey,
|
||
|
token_bump: u8,
|
||
|
mailbox_process_authority: Pubkey,
|
||
|
dispatch_authority: Pubkey,
|
||
|
dispatch_authority_bump: u8,
|
||
|
native_collateral: Pubkey,
|
||
|
native_collateral_bump: u8,
|
||
|
}
|
||
|
|
||
|
async fn initialize_hyperlane_token(
|
||
|
program_id: &Pubkey,
|
||
|
banks_client: &mut BanksClient,
|
||
|
payer: &Keypair,
|
||
|
) -> Result<HyperlaneTokenAccounts, BanksClientError> {
|
||
|
let (mailbox_process_authority_key, _mailbox_process_authority_bump) =
|
||
|
Pubkey::find_program_address(
|
||
|
mailbox_process_authority_pda_seeds!(program_id),
|
||
|
&mailbox_id(),
|
||
|
);
|
||
|
|
||
|
let (token_account_key, token_account_bump_seed) =
|
||
|
Pubkey::find_program_address(hyperlane_token_pda_seeds!(), program_id);
|
||
|
|
||
|
let (dispatch_authority_key, dispatch_authority_seed) =
|
||
|
Pubkey::find_program_address(mailbox_message_dispatch_authority_pda_seeds!(), program_id);
|
||
|
|
||
|
let (native_collateral_account_key, native_collateral_account_bump_seed) =
|
||
|
Pubkey::find_program_address(hyperlane_token_native_collateral_pda_seeds!(), program_id);
|
||
|
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
*program_id,
|
||
|
&HyperlaneTokenInstruction::Init(Init {
|
||
|
mailbox: mailbox_id(),
|
||
|
interchain_security_module: None,
|
||
|
decimals: LOCAL_DECIMALS,
|
||
|
remote_decimals: REMOTE_DECIMALS,
|
||
|
})
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
// 0. [executable] The system program.
|
||
|
// 1. [writable] The token PDA account.
|
||
|
// 2. [writable] The dispatch authority PDA account.
|
||
|
// 3. [signer] The payer and mailbox payer.
|
||
|
// 4. [writable] The native collateral PDA account.
|
||
|
AccountMeta::new_readonly(solana_program::system_program::id(), false),
|
||
|
AccountMeta::new(token_account_key, false),
|
||
|
AccountMeta::new(dispatch_authority_key, false),
|
||
|
AccountMeta::new_readonly(payer.pubkey(), true),
|
||
|
AccountMeta::new(native_collateral_account_key, false),
|
||
|
],
|
||
|
)],
|
||
|
Some(&payer.pubkey()),
|
||
|
&[payer],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
banks_client.process_transaction(transaction).await?;
|
||
|
|
||
|
Ok(HyperlaneTokenAccounts {
|
||
|
token: token_account_key,
|
||
|
token_bump: token_account_bump_seed,
|
||
|
mailbox_process_authority: mailbox_process_authority_key,
|
||
|
dispatch_authority: dispatch_authority_key,
|
||
|
dispatch_authority_bump: dispatch_authority_seed,
|
||
|
native_collateral: native_collateral_account_key,
|
||
|
native_collateral_bump: native_collateral_account_bump_seed,
|
||
|
})
|
||
|
}
|
||
|
|
||
|
async fn enroll_remote_router(
|
||
|
banks_client: &mut BanksClient,
|
||
|
program_id: &Pubkey,
|
||
|
payer: &Keypair,
|
||
|
token_account: &Pubkey,
|
||
|
domain: u32,
|
||
|
router: H256,
|
||
|
) -> Result<(), BanksClientError> {
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
// Enroll the remote router
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
*program_id,
|
||
|
&HyperlaneTokenInstruction::EnrollRemoteRouter(RemoteRouterConfig {
|
||
|
domain,
|
||
|
router: Some(router),
|
||
|
})
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
AccountMeta::new(*token_account, false),
|
||
|
AccountMeta::new_readonly(payer.pubkey(), true),
|
||
|
],
|
||
|
)],
|
||
|
Some(&payer.pubkey()),
|
||
|
&[payer],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
banks_client.process_transaction(transaction).await?;
|
||
|
|
||
|
Ok(())
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_initialize() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
let mailbox_program_id = mailbox_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let mailbox_accounts =
|
||
|
initialize_mailbox(&mut banks_client, &mailbox_program_id, &payer, LOCAL_DOMAIN)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Get the token account.
|
||
|
let token_account_data = banks_client
|
||
|
.get_account(hyperlane_token_accounts.token)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap()
|
||
|
.data;
|
||
|
let token = HyperlaneTokenAccount::<NativePlugin>::fetch(&mut &token_account_data[..])
|
||
|
.unwrap()
|
||
|
.into_inner();
|
||
|
assert_eq!(
|
||
|
token,
|
||
|
Box::new(HyperlaneToken {
|
||
|
bump: hyperlane_token_accounts.token_bump,
|
||
|
mailbox: mailbox_accounts.program,
|
||
|
mailbox_process_authority: hyperlane_token_accounts.mailbox_process_authority,
|
||
|
dispatch_authority_bump: hyperlane_token_accounts.dispatch_authority_bump,
|
||
|
decimals: LOCAL_DECIMALS,
|
||
|
remote_decimals: REMOTE_DECIMALS,
|
||
|
owner: Some(payer.pubkey()),
|
||
|
interchain_security_module: None,
|
||
|
remote_routers: HashMap::new(),
|
||
|
plugin_data: NativePlugin {
|
||
|
native_collateral_bump: hyperlane_token_accounts.native_collateral_bump,
|
||
|
},
|
||
|
}),
|
||
|
);
|
||
|
|
||
|
// Verify the ATA payer account was created.
|
||
|
let native_collateral_account = banks_client
|
||
|
.get_account(hyperlane_token_accounts.native_collateral)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap();
|
||
|
assert!(native_collateral_account.lamports > 0);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_initialize_errors_if_called_twice() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let other_payer = new_funded_keypair(&mut banks_client, &payer, ONE_SOL_IN_LAMPORTS).await;
|
||
|
|
||
|
// To ensure a different signature is used, we'll use a different payer
|
||
|
let init_result =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &other_payer).await;
|
||
|
|
||
|
assert_transaction_error(
|
||
|
init_result,
|
||
|
TransactionError::InstructionError(0, InstructionError::AccountAlreadyInitialized),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_transfer_remote() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
let mailbox_program_id = mailbox_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let mailbox_accounts =
|
||
|
initialize_mailbox(&mut banks_client, &mailbox_program_id, &payer, LOCAL_DOMAIN)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Enroll the remote router
|
||
|
let remote_router = H256::random();
|
||
|
enroll_remote_router(
|
||
|
&mut banks_client,
|
||
|
&program_id,
|
||
|
&payer,
|
||
|
&hyperlane_token_accounts.token,
|
||
|
REMOTE_DOMAIN,
|
||
|
remote_router,
|
||
|
)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Send 100 SOL for the token sender to start with.
|
||
|
let token_sender =
|
||
|
new_funded_keypair(&mut banks_client, &payer, 100 * ONE_SOL_IN_LAMPORTS).await;
|
||
|
let token_sender_pubkey = token_sender.pubkey();
|
||
|
|
||
|
// Call transfer_remote
|
||
|
let unique_message_account_keypair = Keypair::new();
|
||
|
let (dispatched_message_key, _dispatched_message_bump) = Pubkey::find_program_address(
|
||
|
mailbox_dispatched_message_pda_seeds!(&unique_message_account_keypair.pubkey()),
|
||
|
&mailbox_program_id,
|
||
|
);
|
||
|
|
||
|
let remote_token_recipient = H256::random();
|
||
|
// Transfer 69 tokens.
|
||
|
let transfer_amount = 69 * ONE_SOL_IN_LAMPORTS;
|
||
|
let remote_transfer_amount =
|
||
|
convert_decimals(transfer_amount.into(), LOCAL_DECIMALS, REMOTE_DECIMALS).unwrap();
|
||
|
|
||
|
let sender_balance_before = banks_client.get_balance(token_sender_pubkey).await.unwrap();
|
||
|
let native_collateral_account_lamports_before = banks_client
|
||
|
.get_balance(hyperlane_token_accounts.native_collateral)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
program_id,
|
||
|
&HyperlaneTokenInstruction::TransferRemote(TransferRemote {
|
||
|
destination_domain: REMOTE_DOMAIN,
|
||
|
recipient: remote_token_recipient,
|
||
|
amount_or_id: transfer_amount.into(),
|
||
|
})
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
// 0. [executable] The system program.
|
||
|
// 1. [executable] The spl_noop program.
|
||
|
// 2. [] The token PDA account.
|
||
|
// 3. [executable] The mailbox program.
|
||
|
// 4. [writeable] The mailbox outbox account.
|
||
|
// 5. [] Message dispatch authority.
|
||
|
// 6. [signer] The token sender and mailbox payer.
|
||
|
// 7. [signer] Unique message account.
|
||
|
// 8. [writeable] Message storage PDA.
|
||
|
// 9. [executable] The system program.
|
||
|
// 10. [writeable] The native token collateral PDA account.
|
||
|
vec![
|
||
|
AccountMeta::new_readonly(solana_program::system_program::id(), false),
|
||
|
AccountMeta::new_readonly(spl_noop::id(), false),
|
||
|
AccountMeta::new_readonly(hyperlane_token_accounts.token, false),
|
||
|
AccountMeta::new_readonly(mailbox_accounts.program, false),
|
||
|
AccountMeta::new(mailbox_accounts.outbox, false),
|
||
|
AccountMeta::new_readonly(hyperlane_token_accounts.dispatch_authority, false),
|
||
|
AccountMeta::new_readonly(token_sender_pubkey, true),
|
||
|
AccountMeta::new_readonly(unique_message_account_keypair.pubkey(), true),
|
||
|
AccountMeta::new(dispatched_message_key, false),
|
||
|
AccountMeta::new_readonly(solana_program::system_program::id(), false),
|
||
|
AccountMeta::new(hyperlane_token_accounts.native_collateral, false),
|
||
|
],
|
||
|
)],
|
||
|
Some(&token_sender_pubkey),
|
||
|
&[&token_sender, &unique_message_account_keypair],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
|
||
|
let transaction_fee = banks_client
|
||
|
.get_fee_for_message_with_commitment_and_context(
|
||
|
Context::current(),
|
||
|
CommitmentLevel::Processed,
|
||
|
transaction.message.clone(),
|
||
|
)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap();
|
||
|
|
||
|
let tx_signature = transaction.signatures[0];
|
||
|
banks_client.process_transaction(transaction).await.unwrap();
|
||
|
|
||
|
// The transaction fee doesn't seem to be entirely accurate -
|
||
|
// this may be due to a mismatch between the SDK and the actual
|
||
|
// transaction fee calculation.
|
||
|
// For now, we'll just check that the sender's balance roughly correct.
|
||
|
let sender_balance_after = banks_client.get_balance(token_sender_pubkey).await.unwrap();
|
||
|
let expected_balance_after = sender_balance_before - transfer_amount - transaction_fee;
|
||
|
// Allow 0.005 SOL of extra transaction fees
|
||
|
assert!(
|
||
|
sender_balance_after >= expected_balance_after - 5000000
|
||
|
&& sender_balance_after <= expected_balance_after
|
||
|
);
|
||
|
|
||
|
// And that the native collateral account's balance is 69 tokens.
|
||
|
assert_lamports(
|
||
|
&mut banks_client,
|
||
|
&hyperlane_token_accounts.native_collateral,
|
||
|
native_collateral_account_lamports_before + transfer_amount,
|
||
|
)
|
||
|
.await;
|
||
|
|
||
|
// And let's take a look at the dispatched message account data to verify the message looks right.
|
||
|
let dispatched_message_account_data = banks_client
|
||
|
.get_account(dispatched_message_key)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap()
|
||
|
.data;
|
||
|
let dispatched_message =
|
||
|
DispatchedMessageAccount::fetch(&mut &dispatched_message_account_data[..])
|
||
|
.unwrap()
|
||
|
.into_inner();
|
||
|
|
||
|
let transfer_remote_tx_status = banks_client
|
||
|
.get_transaction_status(tx_signature)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap();
|
||
|
|
||
|
let message = HyperlaneMessage {
|
||
|
version: 0,
|
||
|
nonce: 0,
|
||
|
origin: LOCAL_DOMAIN,
|
||
|
sender: program_id.to_bytes().into(),
|
||
|
destination: REMOTE_DOMAIN,
|
||
|
recipient: remote_router,
|
||
|
// Expect the remote_transfer_amount to be in the message.
|
||
|
body: TokenMessage::new(remote_token_recipient, remote_transfer_amount, vec![]).to_vec(),
|
||
|
};
|
||
|
|
||
|
assert_eq!(
|
||
|
dispatched_message,
|
||
|
Box::new(DispatchedMessage::new(
|
||
|
message.nonce,
|
||
|
transfer_remote_tx_status.slot,
|
||
|
unique_message_account_keypair.pubkey(),
|
||
|
message.to_vec(),
|
||
|
)),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
async fn transfer_from_remote(
|
||
|
initial_native_collateral_balance: u64,
|
||
|
remote_transfer_amount: U256,
|
||
|
sender_override: Option<H256>,
|
||
|
origin_override: Option<u32>,
|
||
|
) -> Result<(BanksClient, HyperlaneTokenAccounts, Pubkey), BanksClientError> {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
let mailbox_program_id = mailbox_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let mailbox_accounts =
|
||
|
initialize_mailbox(&mut banks_client, &mailbox_program_id, &payer, LOCAL_DOMAIN)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Enroll the remote router
|
||
|
let remote_router = H256::random();
|
||
|
enroll_remote_router(
|
||
|
&mut banks_client,
|
||
|
&program_id,
|
||
|
&payer,
|
||
|
&hyperlane_token_accounts.token,
|
||
|
REMOTE_DOMAIN,
|
||
|
remote_router,
|
||
|
)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// The native collateral account will have some lamports because it's rent-exempt.
|
||
|
let current_native_collateral_balance = banks_client
|
||
|
.get_balance(hyperlane_token_accounts.native_collateral)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Give an initial balance to the native collateral account which will be used by the
|
||
|
// transfer_from_remote.
|
||
|
transfer_lamports(
|
||
|
&mut banks_client,
|
||
|
&payer,
|
||
|
&hyperlane_token_accounts.native_collateral,
|
||
|
initial_native_collateral_balance.saturating_sub(current_native_collateral_balance),
|
||
|
)
|
||
|
.await;
|
||
|
|
||
|
let recipient_pubkey = Pubkey::new_unique();
|
||
|
let recipient: H256 = recipient_pubkey.to_bytes().into();
|
||
|
|
||
|
let message = HyperlaneMessage {
|
||
|
version: 0,
|
||
|
nonce: 0,
|
||
|
origin: origin_override.unwrap_or(REMOTE_DOMAIN),
|
||
|
// Default to the remote router as the sender
|
||
|
sender: sender_override.unwrap_or(remote_router),
|
||
|
destination: LOCAL_DOMAIN,
|
||
|
recipient: program_id.to_bytes().into(),
|
||
|
body: TokenMessage::new(recipient, remote_transfer_amount, vec![]).to_vec(),
|
||
|
};
|
||
|
|
||
|
process(
|
||
|
&mut banks_client,
|
||
|
&payer,
|
||
|
&mailbox_accounts,
|
||
|
vec![],
|
||
|
&message,
|
||
|
)
|
||
|
.await?;
|
||
|
|
||
|
Ok((banks_client, hyperlane_token_accounts, recipient_pubkey))
|
||
|
}
|
||
|
|
||
|
// Tests when the SPL token is the non-2022 version
|
||
|
#[tokio::test]
|
||
|
async fn test_transfer_from_success() {
|
||
|
let initial_native_collateral_balance = 100 * 10u64.pow(LOCAL_DECIMALS_U32);
|
||
|
let local_transfer_amount = 69 * 10u64.pow(LOCAL_DECIMALS_U32);
|
||
|
let remote_transfer_amount = convert_decimals(
|
||
|
local_transfer_amount.into(),
|
||
|
LOCAL_DECIMALS,
|
||
|
REMOTE_DECIMALS,
|
||
|
)
|
||
|
.unwrap();
|
||
|
|
||
|
let (mut banks_client, hyperlane_token_accounts, recipient_associated_token_account) =
|
||
|
transfer_from_remote(
|
||
|
initial_native_collateral_balance,
|
||
|
remote_transfer_amount,
|
||
|
None,
|
||
|
None,
|
||
|
)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Check that the recipient's ATA got the tokens!
|
||
|
assert_lamports(
|
||
|
&mut banks_client,
|
||
|
&recipient_associated_token_account,
|
||
|
local_transfer_amount,
|
||
|
)
|
||
|
.await;
|
||
|
|
||
|
// And that the native collateral's balance is lower because it was spent in the transfer.
|
||
|
assert_lamports(
|
||
|
&mut banks_client,
|
||
|
&hyperlane_token_accounts.native_collateral,
|
||
|
initial_native_collateral_balance - local_transfer_amount,
|
||
|
)
|
||
|
.await;
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_transfer_from_remote_errors_if_sender_not_router() {
|
||
|
let initial_native_collateral_balance = 100 * 10u64.pow(LOCAL_DECIMALS_U32);
|
||
|
let local_transfer_amount = 69 * 10u64.pow(LOCAL_DECIMALS_U32);
|
||
|
let remote_transfer_amount = convert_decimals(
|
||
|
local_transfer_amount.into(),
|
||
|
LOCAL_DECIMALS,
|
||
|
REMOTE_DECIMALS,
|
||
|
)
|
||
|
.unwrap();
|
||
|
|
||
|
// Same remote domain origin, but wrong sender.
|
||
|
let result = transfer_from_remote(
|
||
|
initial_native_collateral_balance,
|
||
|
remote_transfer_amount,
|
||
|
Some(H256::random()),
|
||
|
None,
|
||
|
)
|
||
|
.await;
|
||
|
assert_transaction_error(
|
||
|
result,
|
||
|
TransactionError::InstructionError(0, InstructionError::InvalidInstructionData),
|
||
|
);
|
||
|
|
||
|
// Wrong remote domain origin, but correct sender.
|
||
|
let result = transfer_from_remote(
|
||
|
initial_native_collateral_balance,
|
||
|
remote_transfer_amount,
|
||
|
None,
|
||
|
Some(REMOTE_DOMAIN + 1),
|
||
|
)
|
||
|
.await;
|
||
|
assert_transaction_error(
|
||
|
result,
|
||
|
TransactionError::InstructionError(0, InstructionError::InvalidInstructionData),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_transfer_from_remote_errors_if_process_authority_not_signer() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
let mailbox_program_id = mailbox_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let _mailbox_accounts =
|
||
|
initialize_mailbox(&mut banks_client, &mailbox_program_id, &payer, LOCAL_DOMAIN)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Enroll the remote router
|
||
|
let remote_router = H256::random();
|
||
|
enroll_remote_router(
|
||
|
&mut banks_client,
|
||
|
&program_id,
|
||
|
&payer,
|
||
|
&hyperlane_token_accounts.token,
|
||
|
REMOTE_DOMAIN,
|
||
|
remote_router,
|
||
|
)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let recipient_pubkey = Pubkey::new_unique();
|
||
|
let recipient: H256 = recipient_pubkey.to_bytes().into();
|
||
|
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
// Try calling directly into the message handler, skipping the mailbox.
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
program_id,
|
||
|
&MessageRecipientInstruction::Handle(HandleInstruction {
|
||
|
origin: REMOTE_DOMAIN,
|
||
|
sender: remote_router,
|
||
|
message: TokenMessage::new(recipient, 12345u64.into(), vec![]).to_vec(),
|
||
|
})
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
// Recipient.handle accounts
|
||
|
// 0. [signer] Mailbox processor authority specific to this program.
|
||
|
// 1. [executable] system_program
|
||
|
// 2. [] hyperlane_token storage
|
||
|
// 3. [writeable] recipient wallet address
|
||
|
// 4. [executable] The system program.
|
||
|
// 5. [writeable] The native token collateral PDA account.
|
||
|
AccountMeta::new_readonly(
|
||
|
hyperlane_token_accounts.mailbox_process_authority,
|
||
|
false,
|
||
|
),
|
||
|
AccountMeta::new_readonly(solana_program::system_program::id(), false),
|
||
|
AccountMeta::new_readonly(hyperlane_token_accounts.token, false),
|
||
|
AccountMeta::new(recipient_pubkey, false),
|
||
|
AccountMeta::new_readonly(solana_program::system_program::id(), false),
|
||
|
AccountMeta::new(hyperlane_token_accounts.native_collateral, false),
|
||
|
],
|
||
|
)],
|
||
|
Some(&payer.pubkey()),
|
||
|
&[&payer],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
let result = banks_client.process_transaction(transaction).await;
|
||
|
|
||
|
assert_transaction_error(
|
||
|
result,
|
||
|
TransactionError::InstructionError(0, InstructionError::MissingRequiredSignature),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_enroll_remote_router() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Enroll the remote router
|
||
|
let remote_router = H256::random();
|
||
|
enroll_remote_router(
|
||
|
&mut banks_client,
|
||
|
&program_id,
|
||
|
&payer,
|
||
|
&hyperlane_token_accounts.token,
|
||
|
REMOTE_DOMAIN,
|
||
|
remote_router,
|
||
|
)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
// Verify the remote router was enrolled.
|
||
|
let token_account_data = banks_client
|
||
|
.get_account(hyperlane_token_accounts.token)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap()
|
||
|
.data;
|
||
|
let token = HyperlaneTokenAccount::<NativePlugin>::fetch(&mut &token_account_data[..])
|
||
|
.unwrap()
|
||
|
.into_inner();
|
||
|
assert_eq!(
|
||
|
token.remote_routers,
|
||
|
vec![(REMOTE_DOMAIN, remote_router)].into_iter().collect(),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_enroll_remote_router_errors_if_not_signed_by_owner() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let non_owner = new_funded_keypair(&mut banks_client, &payer, ONE_SOL_IN_LAMPORTS).await;
|
||
|
|
||
|
// Use the mint authority as the payer, which has a balance but is not the owner,
|
||
|
// so we expect this to fail.
|
||
|
let result = enroll_remote_router(
|
||
|
&mut banks_client,
|
||
|
&program_id,
|
||
|
&non_owner,
|
||
|
&hyperlane_token_accounts.token,
|
||
|
REMOTE_DOMAIN,
|
||
|
H256::random(),
|
||
|
)
|
||
|
.await;
|
||
|
|
||
|
assert_transaction_error(
|
||
|
result,
|
||
|
TransactionError::InstructionError(0, InstructionError::InvalidArgument),
|
||
|
);
|
||
|
|
||
|
// Also try using the mint authority as the payer and specifying the correct
|
||
|
// owner account, but the owner isn't a signer:
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
// Enroll the remote router
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
program_id,
|
||
|
&HyperlaneTokenInstruction::EnrollRemoteRouter(RemoteRouterConfig {
|
||
|
domain: REMOTE_DOMAIN,
|
||
|
router: Some(H256::random()),
|
||
|
})
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
AccountMeta::new(hyperlane_token_accounts.token, false),
|
||
|
AccountMeta::new_readonly(payer.pubkey(), false),
|
||
|
],
|
||
|
)],
|
||
|
Some(&non_owner.pubkey()),
|
||
|
&[&non_owner],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
let result = banks_client.process_transaction(transaction).await;
|
||
|
assert_transaction_error(
|
||
|
result,
|
||
|
TransactionError::InstructionError(0, InstructionError::MissingRequiredSignature),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_transfer_ownership() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let new_owner = Some(Pubkey::new_unique());
|
||
|
|
||
|
// Transfer ownership
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
program_id,
|
||
|
&HyperlaneTokenInstruction::TransferOwnership(new_owner)
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
AccountMeta::new(hyperlane_token_accounts.token, false),
|
||
|
AccountMeta::new_readonly(payer.pubkey(), true),
|
||
|
],
|
||
|
)],
|
||
|
Some(&payer.pubkey()),
|
||
|
&[&payer],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
banks_client.process_transaction(transaction).await.unwrap();
|
||
|
|
||
|
// Verify the new owner is set
|
||
|
let token_account_data = banks_client
|
||
|
.get_account(hyperlane_token_accounts.token)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap()
|
||
|
.data;
|
||
|
let token = HyperlaneTokenAccount::<NativePlugin>::fetch(&mut &token_account_data[..])
|
||
|
.unwrap()
|
||
|
.into_inner();
|
||
|
assert_eq!(token.owner, new_owner);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_transfer_ownership_errors_if_owner_not_signer() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let new_owner = Some(Pubkey::new_unique());
|
||
|
let non_owner = new_funded_keypair(&mut banks_client, &payer, ONE_SOL_IN_LAMPORTS).await;
|
||
|
|
||
|
// Try transferring ownership using the mint authority key
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
program_id,
|
||
|
&HyperlaneTokenInstruction::TransferOwnership(new_owner)
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
AccountMeta::new(hyperlane_token_accounts.token, false),
|
||
|
AccountMeta::new_readonly(non_owner.pubkey(), true),
|
||
|
],
|
||
|
)],
|
||
|
Some(&non_owner.pubkey()),
|
||
|
&[&non_owner],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
let result = banks_client.process_transaction(transaction).await;
|
||
|
|
||
|
assert_transaction_error(
|
||
|
result,
|
||
|
TransactionError::InstructionError(0, InstructionError::InvalidArgument),
|
||
|
);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_set_interchain_security_module() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let new_ism = Some(Pubkey::new_unique());
|
||
|
|
||
|
// Set the ISM
|
||
|
// Transfer ownership
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
program_id,
|
||
|
&HyperlaneTokenInstruction::SetInterchainSecurityModule(new_ism)
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
AccountMeta::new(hyperlane_token_accounts.token, false),
|
||
|
AccountMeta::new_readonly(payer.pubkey(), true),
|
||
|
],
|
||
|
)],
|
||
|
Some(&payer.pubkey()),
|
||
|
&[&payer],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
banks_client.process_transaction(transaction).await.unwrap();
|
||
|
|
||
|
// Verify the new ISM is set
|
||
|
let token_account_data = banks_client
|
||
|
.get_account(hyperlane_token_accounts.token)
|
||
|
.await
|
||
|
.unwrap()
|
||
|
.unwrap()
|
||
|
.data;
|
||
|
let token = HyperlaneTokenAccount::<NativePlugin>::fetch(&mut &token_account_data[..])
|
||
|
.unwrap()
|
||
|
.into_inner();
|
||
|
assert_eq!(token.interchain_security_module, new_ism);
|
||
|
}
|
||
|
|
||
|
#[tokio::test]
|
||
|
async fn test_set_interchain_security_module_errors_if_owner_not_signer() {
|
||
|
let program_id = hyperlane_sealevel_token_native_id();
|
||
|
|
||
|
let (mut banks_client, payer) = setup_client().await;
|
||
|
|
||
|
let hyperlane_token_accounts =
|
||
|
initialize_hyperlane_token(&program_id, &mut banks_client, &payer)
|
||
|
.await
|
||
|
.unwrap();
|
||
|
|
||
|
let new_ism = Some(Pubkey::new_unique());
|
||
|
let non_owner = new_funded_keypair(&mut banks_client, &payer, ONE_SOL_IN_LAMPORTS).await;
|
||
|
|
||
|
// Try setting the ISM using the non_owner key
|
||
|
let recent_blockhash = banks_client.get_latest_blockhash().await.unwrap();
|
||
|
let transaction = Transaction::new_signed_with_payer(
|
||
|
&[Instruction::new_with_bytes(
|
||
|
program_id,
|
||
|
&HyperlaneTokenInstruction::SetInterchainSecurityModule(new_ism)
|
||
|
.encode()
|
||
|
.unwrap(),
|
||
|
vec![
|
||
|
AccountMeta::new(hyperlane_token_accounts.token, false),
|
||
|
AccountMeta::new_readonly(non_owner.pubkey(), true),
|
||
|
],
|
||
|
)],
|
||
|
Some(&non_owner.pubkey()),
|
||
|
&[&non_owner],
|
||
|
recent_blockhash,
|
||
|
);
|
||
|
let result = banks_client.process_transaction(transaction).await;
|
||
|
|
||
|
assert_transaction_error(
|
||
|
result,
|
||
|
TransactionError::InstructionError(0, InstructionError::InvalidArgument),
|
||
|
);
|
||
|
}
|