1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
use {
crate::{state::*, errors::ErrorCode},
anchor_lang::{prelude::*, solana_program::program::invoke_signed, AccountsClose},
anchor_spl::{token::{self, Token, TokenAccount, Mint, Transfer, FreezeAccount, Approve}},
mpl_token_metadata::{instruction::freeze_delegated_account, utils::assert_derivation},
};
#[derive(Accounts)]
pub struct ClaimCtx<'info> {
#[account(mut, constraint = token_manager.state == TokenManagerState::Issued as u8 @ ErrorCode::InvalidTokenManagerState)]
token_manager: Box<Account<'info, TokenManager>>,
#[account(mut, constraint =
token_manager_token_account.owner == token_manager.key()
&& token_manager_token_account.mint == token_manager.mint
@ ErrorCode::InvalidTokenManagerTokenAccount
)]
token_manager_token_account: Box<Account<'info, TokenAccount>>,
#[account(constraint = mint.key() == token_manager.mint @ ErrorCode::InvalidMint)]
mint: Box<Account<'info, Mint>>,
#[account(mut)]
recipient: Signer<'info>,
#[account(mut, constraint =
recipient_token_account.owner == recipient.key()
&& recipient_token_account.mint == token_manager.mint
@ ErrorCode::InvalidRecipientTokenAccount
)]
recipient_token_account: Box<Account<'info, TokenAccount>>,
token_program: Program<'info, Token>,
}
pub fn handler<'key, 'accounts, 'remaining, 'info>(ctx: Context<'key, 'accounts, 'remaining, 'info, ClaimCtx<'info>>) -> Result<()> {
let token_manager = &mut ctx.accounts.token_manager;
token_manager.recipient_token_account = ctx.accounts.recipient_token_account.key();
token_manager.state = TokenManagerState::Claimed as u8;
token_manager.state_changed_at = Clock::get().unwrap().unix_timestamp;
let remaining_accs = &mut ctx.remaining_accounts.iter();
let token_manager_seeds = &[TOKEN_MANAGER_SEED.as_bytes(), token_manager.mint.as_ref(), &[token_manager.bump]];
let token_manager_signer = &[&token_manager_seeds[..]];
let cpi_accounts = Transfer {
from: ctx.accounts.token_manager_token_account.to_account_info(),
to: ctx.accounts.recipient_token_account.to_account_info(),
authority: token_manager.to_account_info(),
};
let cpi_program = ctx.accounts.token_program.to_account_info();
let cpi_context = CpiContext::new(cpi_program, cpi_accounts).with_signer(token_manager_signer);
token::transfer(cpi_context, token_manager.amount)?;
if token_manager.kind == TokenManagerKind::Managed as u8 {
let cpi_accounts = Approve {
to: ctx.accounts.recipient_token_account.to_account_info(),
delegate: token_manager.to_account_info(),
authority: ctx.accounts.recipient.to_account_info(),
};
let cpi_program = ctx.accounts.token_program.to_account_info();
let cpi_context = CpiContext::new(cpi_program, cpi_accounts);
token::approve(cpi_context, token_manager.amount)?;
let mint_manager_info = next_account_info(remaining_accs)?;
let mut mint_manager = Account::<MintManager>::try_from(mint_manager_info)?;
mint_manager.token_managers += 1;
let mint = ctx.accounts.mint.key();
let path = &[MINT_MANAGER_SEED.as_bytes(), mint.as_ref()];
let bump_seed = assert_derivation(ctx.program_id, mint_manager_info, path)?;
let mint_manager_seeds = &[MINT_MANAGER_SEED.as_bytes(), mint.as_ref(), &[bump_seed]];
let mint_manager_signer = &[&mint_manager_seeds[..]];
let cpi_accounts = FreezeAccount {
account: ctx.accounts.recipient_token_account.to_account_info(),
mint: ctx.accounts.mint.to_account_info(),
authority: mint_manager_info.clone(),
};
let cpi_program = ctx.accounts.token_program.to_account_info();
let cpi_context = CpiContext::new(cpi_program, cpi_accounts).with_signer(mint_manager_signer);
token::freeze_account(cpi_context)?;
} else if token_manager.kind == TokenManagerKind::Edition as u8 {
let edition_info = next_account_info(remaining_accs)?;
let metadata_program = next_account_info(remaining_accs)?;
if metadata_program.key() != mpl_token_metadata::id() { return Err(error!(ErrorCode::PublicKeyMismatch)); }
let cpi_accounts = Approve {
to: ctx.accounts.recipient_token_account.to_account_info(),
delegate: token_manager.to_account_info(),
authority: ctx.accounts.recipient.to_account_info(),
};
let cpi_program = ctx.accounts.token_program.to_account_info();
let cpi_context = CpiContext::new(cpi_program, cpi_accounts);
token::approve(cpi_context, token_manager.amount)?;
invoke_signed(
&freeze_delegated_account(
*metadata_program.key,
token_manager.key(),
ctx.accounts.recipient_token_account.key(),
*edition_info.key,
ctx.accounts.mint.key(),
),
&vec![
token_manager.to_account_info(),
ctx.accounts.recipient_token_account.to_account_info(),
edition_info.to_account_info(),
ctx.accounts.mint.to_account_info(),
],
&[token_manager_seeds],
)?;
}
if token_manager.claim_approver != None {
let claim_receipt_info = next_account_info(remaining_accs)?;
let claim_receipt = Account::<ClaimReceipt>::try_from(claim_receipt_info)?;
if claim_receipt.mint_count != token_manager.count { return Err(error!(ErrorCode::InvalidClaimReceipt)); }
if claim_receipt.token_manager != token_manager.key() { return Err(error!(ErrorCode::InvalidClaimReceipt)); }
if claim_receipt.target != ctx.accounts.recipient.key() { return Err(error!(ErrorCode::InvalidClaimReceipt)); }
claim_receipt.close(token_manager.to_account_info())?;
}
return Ok(())
}