Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add solana ampd implementation #744

Open
wants to merge 138 commits into
base: main
Choose a base branch
from

Conversation

eloylp
Copy link
Contributor

@eloylp eloylp commented Jan 13, 2025

At Eiger, we are implementing the integration between Axelar and Solana.

This PR introduces the necessary logic for the ampd component, including:

  • The Solana message verifier handler.
  • The Solana verifier set verifier handler.
  • The logic required to validate Solana addresses.

Both verifier components share the same Solana transaction fetch and log parsing logic, which facilitates identifying event sequences within Solana programs execution outputs.

Todos

  • Unit tests
  • Manual tests (pending - waiting Axelar contract deployment approval)
  • Documentation
  • Connect epics/issues

Steps to Test

  1. Configure ampd with an updated ampd.toml file, pointing to a local tofnd setup.
  2. tofnd must be up and running.
  3. Compile and start the ampd daemon.
  4. Execute the memo program flow, which sends a message from Evm to Solana and viceversa. Scripts can be found at solana-axelar-scripts

Expected Behaviour

It should forward GMP messages from one chain to the another, passing them through the axelar devnet network.

Other Notes

Manual testing is missing because we are waiting for Axelar contract approval.

eloylp and others added 30 commits February 6, 2024 20:44
* Add Solana account parsing tools.
* Add solana verification functionality

* Add unit tests to Solana message verifier

* Refactor

* Solana msg verifier reshape (#4)

* remove comment

* Use Solana types from Solana crates

We were using hand crafted Solana types for interacting with RPC.

* refactor: make clippy happy

* Add some traces to Solana msg verifier

* Remove outdated todos

* refactor: re-use already calculated variable

* Clarify test code usage

* Solana msg verifier, try till one program log matches gw event

* Add note to axelar to review when in PR

* fail if tx_id is not found in signatures

* Always fail on chain at handler level

* Handle errors in case a tx cannot be found (finish the handler)

* Remove commented code

* Use original type from solana-axelar repo

* Ensure that we verify sender address in sol msg verifier

* Do not panic on PartialEq

* refactor: clippy

* remove no longer used code

* Add more tests definition to solana msg verify iteration logic

---------

Co-authored-by: eloylp <[email protected]>
Were only intended during development to understand the API.
Co-authored-by: tilacog <[email protected]>
Co-authored-by: tilacog <[email protected]>
Co-authored-by: tilacog <[email protected]>
roberts-pumpurs and others added 27 commits November 25, 2024 15:35
Signed-off-by: Guilherme Felipe da Silva <[email protected]>
It will be managed later. This prepares this branch for merge with upstream.
@eloylp eloylp requested a review from a team as a code owner January 13, 2025 13:11
bugfix on event parsing
Comment on lines +139 to +140
let poll_id_str: String = poll_id.into();
let source_chain_str: String = source_chain.into();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

might be cleaner to just do this inline

Comment on lines +120 to +121
};
if !participants.contains(&self.verifier) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
};
if !participants.contains(&self.verifier) {
};
if !participants.contains(&self.verifier) {

Comment on lines +19 to +30
GatewayEvent::CallContract(event) => (
&event.sender_key,
&event.payload_hash,
&event.destination_chain,
&event.destination_contract_address,
),
GatewayEvent::CallContractOffchainData(event) => (
&event.sender_key,
&event.payload_hash,
&event.destination_chain,
&event.destination_contract_address,
),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

might want to add some comments here about why there are two events

}
};

// pare the events
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// pare the events
// compare the events

where
F: Fn(&GatewayEvent) -> bool,
{
// the event idx cannot be larger than usize
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why? also we might want to fail earlier in this case, there's no point to even make the RPC call

if !participants.contains(&self.verifier) {
return Ok(vec![]);
}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should check the source chain

if !participants.contains(&self.verifier) {
return Ok(vec![]);
}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should check the source chain

@@ -69,7 +69,7 @@ impl PartialEq<ContractEventBody> for VerifierSetConfirmation {
}
}

pub fn verify_message(gateway_address: &ScAddress, tx_receipt: &TxResponse, msg: &Message) -> Vote {
pub fn verify_message(gateway_address: &ScAddress, tx_receipt: &TxResponse, msg: &Message) -> Vote {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
pub fn verify_message(gateway_address: &ScAddress, tx_receipt: &TxResponse, msg: &Message) -> Vote {
pub fn verify_message(gateway_address: &ScAddress, tx_receipt: &TxResponse, msg: &Message) -> Vote {

Comment on lines +44 to +53
AddressFormat::Base58Solana => {
const SOLANA_PUBKEY_LEN: usize = 32;

let pubkey_vec = bs58::decode(address)
.into_vec()
.change_context(Error::InvalidAddress(address.to_string()))?;
if pubkey_vec.len() != SOLANA_PUBKEY_LEN {
bail!(Error::InvalidAddress(address.to_string()))
}
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

where is this being used?

cosmwasm_contract = "axelar1qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqecnww6"
chain_name = "solana"
chain_rpc_url = "https://api.devnet.solana.com"
max_tx_cache_entries = 6
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this correct? Where is this handled?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants