Skip to content
Draft
Show file tree
Hide file tree
Changes from 12 commits
Commits
Show all changes
62 commits
Select commit Hold shift + click to select a range
8ceb4b2
feat: maxSupplyCap minter vault
dmytro-horbatenko Dec 2, 2025
f83e35c
feat: implement maxSupplyCap in minter vault configuration and migrat…
dmytro-horbatenko Dec 2, 2025
289872b
refactor: remove migrate-minter-vault script
dmytro-horbatenko Dec 2, 2025
74cc2b0
fix: move local scripts to verify
dmytro-horbatenko Dec 8, 2025
7790383
Merge pull request #15 from midas-apps/feat/max-supply-cap
dmytro-horbatenko Dec 8, 2025
6f9c085
feat: add safe approval methods for mint and redeem requests with sup…
dmytro-horbatenko Dec 11, 2025
7e0cd4c
refactor: update vault_common account attributes in mint and redeem r…
dmytro-horbatenko Dec 11, 2025
831d781
fix: improve error handling in amount conversion for redeemer
dmytro-horbatenko Dec 11, 2025
e1eccb7
fix: pull feed util
dmytro-horbatenko Dec 22, 2025
6ad2028
fix: approve redeem request script args
dmytro-horbatenko Dec 22, 2025
3ce30d4
Merge pull request #16 from midas-apps/feat/approve-at-price
dmytro-horbatenko Dec 23, 2025
22e1b53
Merge branch 'main' into feat/chainlink-feed
kostyamospan Feb 11, 2026
f16970e
feat: arithemtic operaitions panic replaced with error code
kostyamospan Feb 13, 2026
1befe7b
chore: basic timelock tests
kostyamospan Feb 13, 2026
dc7314b
chore: more squads scripts
kostyamospan Feb 14, 2026
4644d35
chore: timelock deployment scripts
kostyamospan Feb 14, 2026
4cf5cbe
chore: upgrade scripts
kostyamospan Feb 16, 2026
f79eb80
fix: comments
kostyamospan Feb 16, 2026
56f8695
chore: timelock scripts
kostyamospan Feb 17, 2026
de43bdd
fix: timelock scripts
kostyamospan Feb 17, 2026
0f58758
fix: typo
kostyamospan Feb 17, 2026
fc365d0
fix: log
kostyamospan Feb 18, 2026
bb9f79d
fix: timelock transfer authority
kostyamospan Feb 18, 2026
d4d704d
Merge remote-tracking branch 'origin/main' into feat/timelock
kostyamospan Feb 18, 2026
601a014
fix: tests
kostyamospan Feb 18, 2026
8e08b02
fix: toolchain
kostyamospan Feb 18, 2026
fae25f1
fix: resize instruction
kostyamospan Feb 19, 2026
1b5268c
Merge branch 'feat/timelock' into feat/solana-missing-features
kostyamospan Feb 19, 2026
e221eed
fix: log
kostyamospan Feb 19, 2026
b02cea7
Merge branch 'feat/timelock' into feat/solana-missing-features
kostyamospan Feb 19, 2026
d0c3f5a
fix: target
kostyamospan Feb 19, 2026
abb8ccf
fix: timelock flows
kostyamospan Feb 19, 2026
d3cfbfc
Merge branch 'feat/timelock' into feat/solana-missing-features
kostyamospan Feb 20, 2026
291966a
chore: draft account migration
kostyamospan Feb 20, 2026
0cfa151
chore: migration to anchor 0.32.1
kostyamospan Feb 23, 2026
6575510
fix: box instruction accounts
kostyamospan Feb 23, 2026
52aad9b
feat: chainlink support
kostyamospan Feb 23, 2026
dd023c7
chore: draft growth feed
kostyamospan Feb 23, 2026
becd788
feat: growth feed with tests
kostyamospan Feb 24, 2026
894d903
feat: migration from bankrun to litesvm
kostyamospan Feb 25, 2026
cf57a53
feat: minter vault migration instruction
kostyamospan Feb 25, 2026
051d874
feat: manual feed migration instruction
kostyamospan Feb 25, 2026
cdfa03f
fix: migration folder rename
kostyamospan Feb 25, 2026
563d3cd
fix: bankrun fn names removed
kostyamospan Feb 25, 2026
036018a
chore: log level added tests
kostyamospan Feb 25, 2026
56f9643
fix: todos removed
kostyamospan Feb 25, 2026
f281b36
chore: manual feed growth deployment scripts
kostyamospan Feb 26, 2026
d16fe18
fix: lint config toml
kostyamospan Feb 26, 2026
efd829d
chore: migration ts scripts
kostyamospan Feb 26, 2026
247271d
fix: ts format/lint
kostyamospan Feb 26, 2026
05df587
fix: lint commands package json
kostyamospan Feb 26, 2026
67a81b0
fix: rust codestyle
kostyamospan Feb 26, 2026
c424dd6
fix: tests
kostyamospan Feb 26, 2026
687067b
fix: int errors, clippy configuration
kostyamospan Feb 26, 2026
4578177
fix: price utils additional validation
kostyamospan Feb 27, 2026
9a6e52e
fix: midas vault utils downcast handle
kostyamospan Feb 27, 2026
cbf1619
fix: get deviatioin zero div check
kostyamospan Feb 27, 2026
be91335
fix: squads tests
kostyamospan Feb 27, 2026
75e1c39
fix: transfer upgrade authority
kostyamospan Feb 27, 2026
d963a54
feat: separate roles for price update and request approve/reject
kostyamospan Mar 10, 2026
bf4c78c
fix: package
kostyamospan Mar 10, 2026
554b12d
fix: tests
kostyamospan Mar 17, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion package.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
{
"type": "module",
"scripts": {
"anchor:script": "anchor run script --",
"build": "RUSTUP_TOOLCHAIN=\"nightly-2024-05-09\" anchor build",
"test": "yarn test:anchor && yarn test:cargo",
"test:cargo": "anchor run test-cargo",
Expand Down
1 change: 1 addition & 0 deletions programs/access-control/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ no-entrypoint = []
no-idl = []
no-log-ix-name = []
idl-build = ["anchor-lang/idl-build"]
anchor-debug = []

[dependencies]
anchor-lang = "0.30.1"
1 change: 1 addition & 0 deletions programs/data-feed/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ no-entrypoint = []
no-idl = []
no-log-ix-name = []
idl-build = ["anchor-lang/idl-build"]
anchor-debug = []

[dependencies]
anchor-lang = "0.30.1"
Expand Down
1 change: 1 addition & 0 deletions programs/midas-vault/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ no-entrypoint = []
no-idl = []
no-log-ix-name = []
idl-build = ["anchor-lang/idl-build", "anchor-spl/idl-build"]
anchor-debug = []

[dependencies]
anchor-lang = "0.30.1"
Expand Down
2 changes: 2 additions & 0 deletions programs/midas-vault/src/errors.rs
Original file line number Diff line number Diff line change
Expand Up @@ -42,4 +42,6 @@ pub enum MidasVaultsError {
InvalidVaultProvided,
#[msg("The new value is the same as the old one")]
ValueDidntChange,
#[msg("Max supply cap exceeded")]
MaxSupplyCapExceeded,
}
2 changes: 2 additions & 0 deletions programs/midas-vault/src/events.rs
Original file line number Diff line number Diff line change
Expand Up @@ -113,6 +113,8 @@ pub struct MinterVaultUpdatedEvent {
pub first_deposit_min_m_tokens: Option<u64>,
/// mint authority pda (token-authority program)
pub mint_authority_pda: Option<Pubkey>,
/// max supply cap for mToken minting
pub max_supply_cap: Option<u64>,
}

#[event]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,10 +7,9 @@ use token_authority::{
};

use crate::{
constants::{ac_roles, ONE},
events::MinterVaultRequestApprovedEvent,
constants::ac_roles,
state::{MintVaultRequestState, MinterVaultState, VaultCommonState},
utils::{close_account, mint_token, require_variation_tolerance, Closable},
utils::{close_account, minter, Closable},
};

#[derive(Accounts)]
Expand All @@ -29,7 +28,9 @@ pub struct ApproveMintRequest<'info> {
pub user_account: AccountInfo<'info>,

/// Vault common state account
#[account()]
#[account(
address = minter_vault.common_vault
)]
pub vault_common: Account<'info, VaultCommonState>,

/// Admin role of authority
Expand Down Expand Up @@ -121,49 +122,36 @@ impl<'info> Closable for ApproveMintRequest<'info> {
/// - `new_out_rate` - new out rate for the mint request.
/// Using this value admin can correct the output mToken amount
/// - `is_safe` - if true, will check variation tolerance before minting
/// - `skip_on_supply_cap_exceeded` - if true, will skip minting and return success
pub fn handle(
ctx: Context<ApproveMintRequest>,
request_id: u64,
new_out_rate: u64,
is_safe: bool,
skip_on_supply_cap_exceeded: bool,
) -> Result<()> {
let request = &ctx.accounts.mint_request;

if is_safe {
require_variation_tolerance(
&ctx.accounts.vault_common,
request.m_mint_rate.into(),
new_out_rate.into(),
)?;
match minter::approve_mint_request(
&ctx.accounts.mint_request,
&ctx.accounts.vault_common,
&ctx.accounts.minter_vault,
&ctx.accounts.m_mint,
&ctx.accounts.m_mint_user_ata,
&ctx.accounts.m_mint_token_program,
&ctx.accounts.user_account,
&ctx.accounts.token_authority,
&ctx.accounts.vault_minter_role,
&ctx.accounts.system_program,
&ctx.accounts.token_authority_program,
request_id,
new_out_rate.into(),
is_safe,
skip_on_supply_cap_exceeded,
) {
Ok(true) => {
ctx.accounts.close()?;
Ok(())
}
Ok(false) => Ok(()),
Err(e) => Err(e),
}
Comment on lines +133 to 156
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The match statement for handling the Result<bool> can be simplified for better readability and conciseness. Using if let or the ? operator is more idiomatic in this case.

    if minter::approve_mint_request(
        &ctx.accounts.mint_request,
        &ctx.accounts.vault_common,
        &ctx.accounts.minter_vault,
        &ctx.accounts.m_mint,
        &ctx.accounts.m_mint_user_ata,
        &ctx.accounts.m_mint_token_program,
        &ctx.accounts.user_account,
        &ctx.accounts.token_authority,
        &ctx.accounts.vault_minter_role,
        &ctx.accounts.system_program,
        &ctx.accounts.token_authority_program,
        request_id,
        new_out_rate.into(),
        is_safe,
        skip_on_supply_cap_exceeded,
    )? {
        ctx.accounts.close()?;
    }

    Ok(())


let amount_to_mint = (request.deposited_usd_wo_fees as u128)
.checked_mul(ONE.into())
.unwrap()
.checked_div(new_out_rate.into())
.unwrap();

mint_token(
&ctx.accounts.vault_common.key(),
&ctx.accounts.minter_vault.to_account_info(),
&ctx.accounts.user_account.to_account_info(),
&ctx.accounts.token_authority.to_account_info(),
&ctx.accounts.vault_minter_role.to_account_info(),
&ctx.accounts.m_mint.to_account_info(),
&ctx.accounts.m_mint_user_ata.to_account_info(),
&ctx.accounts.m_mint_token_program.to_account_info(),
&ctx.accounts.system_program.to_account_info(),
&ctx.accounts.token_authority_program.to_account_info(),
amount_to_mint.try_into().unwrap(),
)?;

ctx.accounts.close()?;

emit!(MinterVaultRequestApprovedEvent {
common_vault: ctx.accounts.vault_common.key(),
new_out_rate,
request_id
});

Ok(())
}
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,8 @@ use crate::{
utils::{
mint_token,
minter::{self},
require_and_update_limit, transfer_token, validate_common, Validate, VaultActionId,
require_and_update_limit, transfer_token, validate_common, validate_max_supply_cap,
Validate, VaultActionId,
},
};

Expand Down Expand Up @@ -259,6 +260,14 @@ pub fn handle(
)?;
}

if !validate_max_supply_cap(
&ctx.accounts.m_mint,
&ctx.accounts.minter_vault,
params.m_token_amount.try_into().unwrap(),
) {
return Err(MidasVaultsError::MaxSupplyCapExceeded.into());
}

mint_token(
&ctx.accounts.vault_common.key(),
&ctx.accounts.minter_vault.to_account_info(),
Expand Down
8 changes: 8 additions & 0 deletions programs/midas-vault/src/instructions/minter_vault/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,14 @@ pub mod approve_mint_request;
#[allow(ambiguous_glob_reexports)]
pub use approve_mint_request::*;

pub mod safe_approve_mint_request_at_current_rate;
#[allow(ambiguous_glob_reexports)]
pub use safe_approve_mint_request_at_current_rate::*;

pub mod safe_approve_mint_request_at_request_rate;
#[allow(ambiguous_glob_reexports)]
pub use safe_approve_mint_request_at_request_rate::*;

pub mod reject_mint_request;
#[allow(ambiguous_glob_reexports)]
pub use reject_mint_request::*;
Original file line number Diff line number Diff line change
Expand Up @@ -57,15 +57,22 @@ pub struct NewMinterVault<'info> {
/// # Arguments
///
/// - `first_deposit_min_m_tokens` - minimum amount of mTokens required for the first deposit
pub fn handle(ctx: Context<NewMinterVault>, first_deposit_min_m_tokens: u64) -> Result<()> {
/// - `max_supply_cap` - maximum supply cap for mToken minting (use u64::MAX for no cap)
pub fn handle(
ctx: Context<NewMinterVault>,
first_deposit_min_m_tokens: u64,
max_supply_cap: u64,
) -> Result<()> {
ctx.accounts.minter_vault.common_vault = ctx.accounts.vault_common.key();
ctx.accounts.minter_vault.first_deposit_min_m_tokens = first_deposit_min_m_tokens;
ctx.accounts.minter_vault.mint_authority_pda = ctx.accounts.token_authority.key();
ctx.accounts.minter_vault.max_supply_cap = max_supply_cap;

emit!(MinterVaultUpdatedEvent {
common_vault: ctx.accounts.vault_common.key(),
first_deposit_min_m_tokens: Some(first_deposit_min_m_tokens),
mint_authority_pda: Some(ctx.accounts.token_authority.key())
mint_authority_pda: Some(ctx.accounts.token_authority.key()),
max_supply_cap: Some(max_supply_cap),
});

Ok(())
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,9 @@ pub struct RejectMintRequest<'info> {
pub user_account: AccountInfo<'info>,

/// Vault common state account
#[account()]
#[account(
address = minter_vault.common_vault
)]
pub vault_common: Account<'info, VaultCommonState>,

/// Admin role of authority
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,173 @@
use access_control::{program::AccessControl, state::AccountAccessControlRoleState};
use anchor_lang::prelude::*;
use anchor_spl::token_interface::{Mint, TokenAccount, TokenInterface};
use data_feed::state::FeedState;
use token_authority::{
constants::ac_roles as ac_roles_token_authority, program::TokenAuthority,
state::TokenAuthorityState,
};

use crate::{
constants::ac_roles,
state::{MintVaultRequestState, MinterVaultState, VaultCommonState},
utils::{close_account, get_token_rate, minter, Closable},
};

#[derive(Accounts)]
#[instruction(request_id: u64)]
pub struct SafeApproveMintRequestAtCurrentRate<'info> {
/// Account with vault admin role
#[account(mut)]
pub authority: Signer<'info>,

/// CHECK:
/// request user account
#[account(
mut,
address = mint_request.user
)]
pub user_account: AccountInfo<'info>,

/// Vault common state account
#[account(
address = minter_vault.common_vault
)]
pub vault_common: Account<'info, VaultCommonState>,

/// Admin role of authority
#[account(
seeds = [AccountAccessControlRoleState::SEED, vault_common.ac_role.as_ref(), authority.key().as_ref(), ac_roles::VAULT_ADMIN],
seeds::program = AccessControl::id(),
bump,
)]
pub authority_ac_role: Account<'info, AccountAccessControlRoleState>,

/// Vault minter role
#[account(
seeds = [AccountAccessControlRoleState::SEED, token_authority.ac_role.as_ref(), minter_vault.key().as_ref(), ac_roles_token_authority::M_MINTER],
seeds::program = AccessControl::id(),
bump,
)]
pub vault_minter_role: Account<'info, AccountAccessControlRoleState>,

/// Minter vault state account
#[account(
mut,
seeds = [MinterVaultState::SEED, vault_common.key().as_ref()],
bump
)]
pub minter_vault: Account<'info, MinterVaultState>,

/// Mint vault request state account
#[account(
mut,
seeds = [MintVaultRequestState::SEED, minter_vault.key().as_ref(), &request_id.to_le_bytes()],
bump
)]
pub mint_request: Account<'info, MintVaultRequestState>,

/// Token authority state account (token-authority program)
#[account(
mut,
address = minter_vault.mint_authority_pda,
owner = TokenAuthority::id()
)]
pub token_authority: Account<'info, TokenAuthorityState>,

/// mMint ATA of `user_account`
#[account(
mut,
associated_token::token_program = m_mint_token_program,
associated_token::mint = m_mint,
associated_token::authority = user_account,
)]
pub m_mint_user_ata: Box<InterfaceAccount<'info, TokenAccount>>,

/// SPL mint account
#[account(
mut,
mint::token_program = m_mint_token_program,
address = vault_common.m_mint
)]
pub m_mint: Box<InterfaceAccount<'info, Mint>>,

/// mMint data feed state account
#[account(
address = vault_common.m_mint_feed
)]
pub m_mint_data_feed: Account<'info, FeedState>,

/// CHECK:
/// mMint underlying feed account
#[account(
address = m_mint_data_feed.underlying_feed
)]
pub m_mint_feed: AccountInfo<'info>,

/// SPL token program for mMint
pub m_mint_token_program: Interface<'info, TokenInterface>,
/// Token authority program
pub token_authority_program: Program<'info, TokenAuthority>,
/// System program
pub system_program: Program<'info, System>,
}

impl<'info> Closable for SafeApproveMintRequestAtCurrentRate<'info> {
/// close implementation for closing mint request
/// after it was processed
fn close(&mut self) -> Result<()> {
close_account(
&mut self.mint_request.to_account_info(),
&mut self.user_account,
&self.system_program,
)?;

Ok(())
}
}

/// Safely approves mint request at the current mToken rate from data feed.
/// Validates variation tolerance between request rate and current rate.
/// Will close mint request account after processing.
/// Can only be called by the vault admin.
///
/// # Arguments
///
/// - `request_id` - id of the mint request
/// - `skip_on_supply_cap_exceeded` - if true, will skip minting and return success
pub fn handle(
ctx: Context<SafeApproveMintRequestAtCurrentRate>,
request_id: u64,
skip_on_supply_cap_exceeded: bool,
) -> Result<()> {
let current_rate = get_token_rate(
&ctx.accounts.m_mint_data_feed,
&ctx.accounts.m_mint_feed,
false,
)?;

match minter::approve_mint_request(
&ctx.accounts.mint_request,
&ctx.accounts.vault_common,
&ctx.accounts.minter_vault,
&ctx.accounts.m_mint,
&ctx.accounts.m_mint_user_ata,
&ctx.accounts.m_mint_token_program,
&ctx.accounts.user_account,
&ctx.accounts.token_authority,
&ctx.accounts.vault_minter_role,
&ctx.accounts.system_program,
&ctx.accounts.token_authority_program,
request_id,
current_rate,
true,
skip_on_supply_cap_exceeded,
) {
Ok(true) => {
ctx.accounts.close()?;
Ok(())
}
Ok(false) => Ok(()),
Err(e) => Err(e),
}
Comment on lines +149 to +172
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The match statement for handling the Result<bool> can be simplified for better readability and conciseness. Using if let or the ? operator is more idiomatic in this case.

    if minter::approve_mint_request(
        &ctx.accounts.mint_request,
        &ctx.accounts.vault_common,
        &ctx.accounts.minter_vault,
        &ctx.accounts.m_mint,
        &ctx.accounts.m_mint_user_ata,
        &ctx.accounts.m_mint_token_program,
        &ctx.accounts.user_account,
        &ctx.accounts.token_authority,
        &ctx.accounts.vault_minter_role,
        &ctx.accounts.system_program,
        &ctx.accounts.token_authority_program,
        request_id,
        current_rate,
        true,
        skip_on_supply_cap_exceeded,
    )? {
        ctx.accounts.close()?;
    }

    Ok(())

}
Loading