#![cfg(feature = "test-bpf")] pub mod utils; use mpl_token_auth_rules::{ error::RuleSetError, instruction::{builders::ValidateBuilder, InstructionBuilder, ValidateArgs}, payload::{Payload, PayloadType}, state::{CompareOp, Rule, RuleSetV1}, }; use solana_program::instruction::AccountMeta; use solana_program_test::tokio; use solana_sdk::{signature::Signer, signer::keypair::Keypair}; use utils::{program_test, Operation, PayloadKey}; #[tokio::test] async fn composed_rule() { let mut context = program_test().start_with_context().await; // -------------------------------- // Create RuleSet // -------------------------------- // Create some rules. let adtl_signer = Rule::AdditionalSigner { account: context.payer.pubkey(), }; // Second signer. let second_signer = Keypair::new(); let adtl_signer2 = Rule::AdditionalSigner { account: second_signer.pubkey(), }; let amount_check = Rule::Amount { amount: 1, operator: CompareOp::Eq, field: PayloadKey::Amount.to_string(), }; let not_amount_check = Rule::Not { rule: Box::new(amount_check), }; let first_rule = Rule::All { rules: vec![adtl_signer, adtl_signer2], }; let overall_rule = Rule::All { rules: vec![first_rule, not_amount_check], }; // Create a RuleSet. let mut rule_set = RuleSetV1::new("test rule_set".to_string(), context.payer.pubkey()); rule_set .add(Operation::SimpleOwnerTransfer.to_string(), overall_rule) .unwrap(); println!("{:#?}", rule_set); // Put the RuleSet on chain. let rule_set_addr = create_rule_set_on_chain!(&mut context, rule_set, "test rule_set".to_string()).await; // -------------------------------- // Validate fail missing account // -------------------------------- // Create a Keypair to simulate a token mint address. let mint = Keypair::new().pubkey(); // Store a payload of data with an amount not allowed by the Amount Rule (Amount Rule NOT'd). let payload = Payload::from([(PayloadKey::Amount.to_string(), PayloadType::Number(2))]); // Create a `validate` instruction WITHOUT the second signer. let validate_ix = ValidateBuilder::new() .rule_set_pda(rule_set_addr) .mint(mint) .additional_rule_accounts(vec![AccountMeta::new_readonly( context.payer.pubkey(), true, )]) .build(ValidateArgs::V1 { operation: Operation::SimpleOwnerTransfer.to_string(), payload: payload.clone(), update_rule_state: false, rule_set_revision: None, }) .unwrap() .instruction(); // Fail to validate Transfer operation. let err = process_failing_validate_ix!(&mut context, validate_ix, vec![], None).await; // Check that error is what we expect. assert_custom_error!(err, RuleSetError::MissingAccount); // -------------------------------- // Validate pass // -------------------------------- // Create a `validate` instruction WITH the second signer. let validate_ix = ValidateBuilder::new() .rule_set_pda(rule_set_addr) .mint(mint) .additional_rule_accounts(vec![ AccountMeta::new_readonly(context.payer.pubkey(), true), AccountMeta::new_readonly(second_signer.pubkey(), true), ]) .build(ValidateArgs::V1 { operation: Operation::SimpleOwnerTransfer.to_string(), payload, update_rule_state: false, rule_set_revision: None, }) .unwrap() .instruction(); // Validate Transfer operation. process_passing_validate_ix!(&mut context, validate_ix, vec![&second_signer], None).await; // -------------------------------- // Validate fail wrong amount // -------------------------------- // Store a payload of data with an amount allowed by the Amount Rule (Amount Rule NOT'd). let payload = Payload::from([(PayloadKey::Amount.to_string(), PayloadType::Number(1))]); // Create a `validate` instruction WITH the second signer. Will fail as Amount Rule is NOT'd. let validate_ix = ValidateBuilder::new() .rule_set_pda(rule_set_addr) .mint(mint) .additional_rule_accounts(vec![ AccountMeta::new_readonly(context.payer.pubkey(), true), AccountMeta::new_readonly(second_signer.pubkey(), true), ]) .build(ValidateArgs::V1 { operation: Operation::SimpleOwnerTransfer.to_string(), payload, update_rule_state: false, rule_set_revision: None, }) .unwrap() .instruction(); // Fail to validate Transfer operation. let err = process_failing_validate_ix!(&mut context, validate_ix, vec![&second_signer], None).await; // Check that error is what we expect. assert_custom_error!(err, RuleSetError::AmountCheckFailed); }