From 574f90ddee5a49e8b0bff695cdc13a64c18cd738 Mon Sep 17 00:00:00 2001 From: SinuS Von SifriduS Date: Tue, 28 Apr 2026 20:03:57 +0200 Subject: [PATCH] 0.7.6 --- CHANGELOG.md | 1 + Cargo.toml | 2 +- ROADMAP.md | 16 +- kb_lib/src/dex.rs | 7 + kb_lib/src/dex/meteora_dbc.rs | 627 ++++++++++++++++++++++++++++++++++ kb_lib/src/dex_decode.rs | 305 +++++++++++++++++ kb_lib/src/dex_detect.rs | 423 ++++++++++++++++++++++- kb_lib/src/lib.rs | 5 + 8 files changed, 1367 insertions(+), 19 deletions(-) create mode 100644 kb_lib/src/dex/meteora_dbc.rs diff --git a/CHANGELOG.md b/CHANGELOG.md index 0b9ae07..e3ba7e9 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -36,3 +36,4 @@ 0.7.3 - Ajout de la détection métier depuis les événements DEX décodés, avec alimentation de kb_pools, kb_pairs, kb_pool_tokens et kb_pool_listings, et signaux de première apparition 0.7.4 - Ajout du premier lot multi-DEX v1 avec décodeurs Pump.fun (create_v2) et PumpSwap (buy/sell), plus détection métier Pump.fun vers token/pool/pair/listing 0.7.5 - Enrichissement de PumpSwap avec extraction des mints et du pool_v2, persistance des événements décodés enrichis et détection métier automatique pool/pair/listing +0.7.6 - Ajout du premier support Meteora DBC avec décodage create_pool/swap, persistance des événements décodés et détection métier automatique pool/pair/listing diff --git a/Cargo.toml b/Cargo.toml index a603a5a..97d6e2d 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -8,7 +8,7 @@ members = [ ] [workspace.package] -version = "0.7.5" +version = "0.7.6" edition = "2024" license = "MIT" repository = "https://git.sasedev.com/Sasedev/khadhroony-bobobot" diff --git a/ROADMAP.md b/ROADMAP.md index d620390..468b1d5 100644 --- a/ROADMAP.md +++ b/ROADMAP.md @@ -508,16 +508,14 @@ Réalisé : - préparation du lot suivant pour `Meteora`, `Meteora DBC` et `LaunchLab`. ### 6.038. Version `0.7.6` — Connecteurs DEX v1, vague 3 -Objectif : compléter la couverture des protocoles restants et stabiliser l’intégration globale. +Réalisé : -À faire : - -- ajouter les décodeurs et la détection métier pour `Heaven`, -- ajouter les décodeurs et la détection métier pour `Moonit`, -- ajouter les décodeurs et la détection métier pour `Zora`, -- consolider les connecteurs déjà ajoutés, -- documenter les limites, versions supportées et motifs de détection par protocole, -- préparer une matrice de compatibilité par DEX / programme / type d’événement. +- ajout du premier décodeur `Meteora DBC`, +- prise en charge initiale des événements `create_pool` et `swap`, +- persistance des événements `Meteora DBC` dans `kb_dex_decoded_events`, +- ajout de la détection métier `Meteora DBC` vers `pool / pair / listing`, +- émission des signaux dédiés `new_pool`, `new_pair` et `first_listing_seen`, +- préparation du lot suivant pour `DAMM v1`, `DAMM v2` et `LaunchLab`. ### 6.039. Version `0.7.7` — Consolidation multi-DEX Objectif : unifier le comportement des connecteurs DEX v1 avant l’ouverture des couches analytiques plus riches. diff --git a/kb_lib/src/dex.rs b/kb_lib/src/dex.rs index 5eed93d..91e9a3b 100644 --- a/kb_lib/src/dex.rs +++ b/kb_lib/src/dex.rs @@ -2,10 +2,17 @@ //! DEX-specific transaction decoders. +mod meteora_dbc; mod pump_fun; mod pump_swap; mod raydium_amm_v4; +pub use meteora_dbc::KB_METEORA_DBC_PROGRAM_ID; +pub use meteora_dbc::KbMeteoraDbcCreatePoolDecoded; +pub use meteora_dbc::KbMeteoraDbcDecodedEvent; +pub use meteora_dbc::KbMeteoraDbcDecoder; +pub use meteora_dbc::KbMeteoraDbcSwapDecoded; + pub use pump_fun::KB_PUMP_FUN_PROGRAM_ID; pub use pump_fun::KbPumpFunCreateV2TokenDecoded; pub use pump_fun::KbPumpFunDecodedEvent; diff --git a/kb_lib/src/dex/meteora_dbc.rs b/kb_lib/src/dex/meteora_dbc.rs new file mode 100644 index 0000000..db41fc6 --- /dev/null +++ b/kb_lib/src/dex/meteora_dbc.rs @@ -0,0 +1,627 @@ +// file: kb_lib/src/dex/meteora_dbc.rs + +//! Meteora Dynamic Bonding Curve (DBC) transaction decoder. + +/// Meteora DBC program id. +pub const KB_METEORA_DBC_PROGRAM_ID: &str = "dbcij3LWUppWqq96dh6gJWwBifmcGfLSB5D4DuSMaqN"; + +/// Decoded Meteora DBC create-pool event. +#[derive(Debug, Clone, serde::Serialize, serde::Deserialize)] +pub struct KbMeteoraDbcCreatePoolDecoded { + /// Parent transaction id. + pub transaction_id: i64, + /// Parent instruction id. + pub instruction_id: i64, + /// Transaction signature. + pub signature: std::string::String, + /// Program id. + pub program_id: std::string::String, + /// Optional pool account. + pub pool_account: std::option::Option, + /// Optional base mint. + pub token_a_mint: std::option::Option, + /// Optional quote mint. + pub token_b_mint: std::option::Option, + /// Optional config account. + pub config_account: std::option::Option, + /// Optional creator. + pub creator: std::option::Option, + /// Decoded payload. + pub payload_json: serde_json::Value, +} + +/// Decoded Meteora DBC swap event. +#[derive(Debug, Clone, serde::Serialize, serde::Deserialize)] +pub struct KbMeteoraDbcSwapDecoded { + /// Parent transaction id. + pub transaction_id: i64, + /// Parent instruction id. + pub instruction_id: i64, + /// Transaction signature. + pub signature: std::string::String, + /// Program id. + pub program_id: std::string::String, + /// Trade side relative to normalized base. + pub trade_side: crate::KbSwapTradeSide, + /// Optional pool account. + pub pool_account: std::option::Option, + /// Optional base mint. + pub token_a_mint: std::option::Option, + /// Optional quote mint. + pub token_b_mint: std::option::Option, + /// Decoded payload. + pub payload_json: serde_json::Value, +} + +/// Decoded Meteora DBC event. +#[derive(Debug, Clone, serde::Serialize, serde::Deserialize)] +pub enum KbMeteoraDbcDecodedEvent { + /// Create pool / launch pool. + CreatePool(KbMeteoraDbcCreatePoolDecoded), + /// Swap / swap2. + Swap(KbMeteoraDbcSwapDecoded), +} + +/// Meteora DBC decoder. +#[derive(Debug, Clone, Default)] +pub struct KbMeteoraDbcDecoder; + +impl KbMeteoraDbcDecoder { + /// Creates a new decoder. + pub fn new() -> Self { + Self + } + + /// Decodes one projected transaction into zero or more Meteora DBC events. + pub fn decode_transaction( + &self, + transaction: &crate::KbChainTransactionDto, + instructions: &[crate::KbChainInstructionDto], + ) -> Result, crate::KbError> { + let transaction_id_option = transaction.id; + let transaction_id = match transaction_id_option { + Some(transaction_id) => transaction_id, + None => { + return Err(crate::KbError::InvalidState(format!( + "chain transaction '{}' has no internal id", + transaction.signature + ))); + } + }; + let transaction_json_result = + serde_json::from_str::(transaction.transaction_json.as_str()); + let transaction_json = match transaction_json_result { + Ok(transaction_json) => transaction_json, + Err(error) => { + return Err(crate::KbError::Json(format!( + "cannot parse transaction_json for signature '{}': {}", + transaction.signature, error + ))); + } + }; + let log_messages = kb_extract_log_messages(&transaction_json); + let mut decoded_events = std::vec::Vec::new(); + for instruction in instructions { + if instruction.parent_instruction_id.is_some() { + continue; + } + let program_id_option = &instruction.program_id; + let program_id = match program_id_option { + Some(program_id) => program_id, + None => continue, + }; + if program_id.as_str() != crate::KB_METEORA_DBC_PROGRAM_ID { + continue; + } + let instruction_id_option = instruction.id; + let instruction_id = match instruction_id_option { + Some(instruction_id) => instruction_id, + None => continue, + }; + let accounts_result = kb_parse_accounts_json(instruction.accounts_json.as_str()); + let accounts = match accounts_result { + Ok(accounts) => accounts, + Err(error) => return Err(error), + }; + let parsed_json_result = + kb_parse_optional_parsed_json(instruction.parsed_json.as_ref()); + let parsed_json = match parsed_json_result { + Ok(parsed_json) => parsed_json, + Err(error) => return Err(error), + }; + let is_create_pool = kb_log_messages_contain_any_keyword( + &log_messages, + &[ + "create_pool", + "createpool", + "initialize_pool", + "initializepool", + "launch_pool", + ], + ) || kb_value_contains_any_key( + parsed_json.as_ref(), + &[ + "poolConfig", + "migrationQuoteThreshold", + "curveConfig", + "dbcConfig", + ], + ); + let is_swap = kb_log_messages_contain_any_keyword(&log_messages, &["swap2", "swap"]); + let pool_account = kb_extract_string_by_candidate_keys( + parsed_json.as_ref(), + &["pool", "poolAccount", "poolState", "virtualPool", "poolKey"], + ) + .or_else(|| kb_extract_account(&accounts, 0)); + let token_a_mint = kb_extract_string_by_candidate_keys( + parsed_json.as_ref(), + &["baseMint", "tokenAMint", "mintA", "token0Mint", "mint0"], + ) + .or_else(|| kb_extract_account(&accounts, 1)); + let token_b_mint = kb_extract_string_by_candidate_keys( + parsed_json.as_ref(), + &["quoteMint", "tokenBMint", "mintB", "token1Mint", "mint1"], + ) + .or_else(|| kb_extract_account(&accounts, 2)); + let config_account = kb_extract_string_by_candidate_keys( + parsed_json.as_ref(), + &["poolConfig", "config", "dbcConfig", "curveConfig"], + ) + .or_else(|| kb_extract_account(&accounts, 3)); + let creator = kb_extract_string_by_candidate_keys( + parsed_json.as_ref(), + &["creator", "poolCreator", "owner", "user"], + ) + .or_else(|| kb_extract_account(&accounts, 4)); + if is_create_pool { + let payload_json = serde_json::json!({ + "decoder": "meteora_dbc", + "eventKind": "create_pool", + "signature": transaction.signature, + "instructionId": instruction_id, + "instructionIndex": instruction.instruction_index, + "accounts": accounts, + "parsed": parsed_json, + "logMessages": log_messages, + "poolAccount": pool_account, + "tokenAMint": token_a_mint, + "tokenBMint": token_b_mint, + "configAccount": config_account, + "creator": creator + }); + decoded_events.push(crate::KbMeteoraDbcDecodedEvent::CreatePool( + crate::KbMeteoraDbcCreatePoolDecoded { + transaction_id, + instruction_id, + signature: transaction.signature.clone(), + program_id: program_id.clone(), + pool_account, + token_a_mint, + token_b_mint, + config_account, + creator, + payload_json, + }, + )); + continue; + } + if is_swap { + let trade_side = kb_infer_trade_side(&log_messages); + let payload_json = serde_json::json!({ + "decoder": "meteora_dbc", + "eventKind": "swap", + "signature": transaction.signature, + "instructionId": instruction_id, + "instructionIndex": instruction.instruction_index, + "accounts": accounts, + "parsed": parsed_json, + "logMessages": log_messages, + "poolAccount": pool_account, + "tokenAMint": token_a_mint, + "tokenBMint": token_b_mint, + "tradeSide": format!("{:?}", trade_side) + }); + decoded_events.push(crate::KbMeteoraDbcDecodedEvent::Swap( + crate::KbMeteoraDbcSwapDecoded { + transaction_id, + instruction_id, + signature: transaction.signature.clone(), + program_id: program_id.clone(), + trade_side, + pool_account, + token_a_mint, + token_b_mint, + payload_json, + }, + )); + } + } + Ok(decoded_events) + } +} + +fn kb_extract_log_messages( + transaction_json: &serde_json::Value, +) -> std::vec::Vec { + let mut messages = std::vec::Vec::new(); + let meta_option = transaction_json.get("meta"); + let meta = match meta_option { + Some(meta) => meta, + None => return messages, + }; + let logs_option = meta.get("logMessages"); + let logs = match logs_option { + Some(logs) => logs, + None => return messages, + }; + let logs_array_option = logs.as_array(); + let logs_array = match logs_array_option { + Some(logs_array) => logs_array, + None => return messages, + }; + for value in logs_array { + let text_option = value.as_str(); + if let Some(text) = text_option { + messages.push(text.to_string()); + } + } + messages +} + +fn kb_log_messages_contain_any_keyword( + log_messages: &[std::string::String], + keywords: &[&str], +) -> bool { + for keyword in keywords { + if kb_log_messages_contain_keyword(log_messages, keyword) { + return true; + } + } + false +} + +fn kb_log_messages_contain_keyword(log_messages: &[std::string::String], keyword: &str) -> bool { + let keyword_normalized = kb_normalize_log_text(keyword); + for log_message in log_messages { + let log_normalized = kb_normalize_log_text(log_message.as_str()); + if log_normalized.contains(keyword_normalized.as_str()) { + return true; + } + } + false +} + +fn kb_normalize_log_text(value: &str) -> std::string::String { + let mut normalized = std::string::String::new(); + for character in value.chars() { + if character.is_ascii_alphanumeric() { + normalized.push(character.to_ascii_lowercase()); + } + } + normalized +} + +fn kb_parse_accounts_json( + accounts_json: &str, +) -> Result, crate::KbError> { + let values_result = serde_json::from_str::>(accounts_json); + let values = match values_result { + Ok(values) => values, + Err(error) => { + return Err(crate::KbError::Json(format!( + "cannot parse instruction accounts_json '{}': {}", + accounts_json, error + ))); + } + }; + let mut accounts = std::vec::Vec::new(); + for value in values { + let text_option = value.as_str(); + if let Some(text) = text_option { + accounts.push(text.to_string()); + } + } + Ok(accounts) +} + +fn kb_parse_optional_parsed_json( + parsed_json: std::option::Option<&std::string::String>, +) -> Result, crate::KbError> { + let parsed_json = match parsed_json { + Some(parsed_json) => parsed_json, + None => return Ok(None), + }; + let value_result = serde_json::from_str::(parsed_json.as_str()); + match value_result { + Ok(value) => Ok(Some(value)), + Err(error) => Err(crate::KbError::Json(format!( + "cannot parse instruction parsed_json '{}': {}", + parsed_json, error + ))), + } +} + +fn kb_extract_string_by_candidate_keys( + value: std::option::Option<&serde_json::Value>, + candidate_keys: &[&str], +) -> std::option::Option { + let value = match value { + Some(value) => value, + None => return None, + }; + kb_extract_string_by_candidate_keys_inner(value, candidate_keys) +} + +fn kb_extract_string_by_candidate_keys_inner( + value: &serde_json::Value, + candidate_keys: &[&str], +) -> std::option::Option { + if let Some(object) = value.as_object() { + for candidate_key in candidate_keys { + let direct_option = object.get(*candidate_key); + if let Some(direct) = direct_option { + let direct_text_option = direct.as_str(); + if let Some(direct_text) = direct_text_option { + return Some(direct_text.to_string()); + } + } + } + for nested_value in object.values() { + let nested_result = + kb_extract_string_by_candidate_keys_inner(nested_value, candidate_keys); + if nested_result.is_some() { + return nested_result; + } + } + return None; + } + if let Some(array) = value.as_array() { + for nested_value in array { + let nested_result = + kb_extract_string_by_candidate_keys_inner(nested_value, candidate_keys); + if nested_result.is_some() { + return nested_result; + } + } + } + None +} + +fn kb_value_contains_any_key( + value: std::option::Option<&serde_json::Value>, + candidate_keys: &[&str], +) -> bool { + let value = match value { + Some(value) => value, + None => return false, + }; + kb_value_contains_any_key_inner(value, candidate_keys) +} + +fn kb_value_contains_any_key_inner(value: &serde_json::Value, candidate_keys: &[&str]) -> bool { + if let Some(object) = value.as_object() { + for candidate_key in candidate_keys { + if object.contains_key(*candidate_key) { + return true; + } + } + for nested_value in object.values() { + if kb_value_contains_any_key_inner(nested_value, candidate_keys) { + return true; + } + } + return false; + } + if let Some(array) = value.as_array() { + for nested_value in array { + if kb_value_contains_any_key_inner(nested_value, candidate_keys) { + return true; + } + } + } + false +} + +fn kb_extract_account( + accounts: &[std::string::String], + index: usize, +) -> std::option::Option { + if index >= accounts.len() { + return None; + } + Some(accounts[index].clone()) +} + +fn kb_infer_trade_side(log_messages: &[std::string::String]) -> crate::KbSwapTradeSide { + if kb_log_messages_contain_keyword(log_messages, "buy") { + return crate::KbSwapTradeSide::BuyBase; + } + if kb_log_messages_contain_keyword(log_messages, "sell") { + return crate::KbSwapTradeSide::SellBase; + } + crate::KbSwapTradeSide::Unknown +} + +#[cfg(test)] +mod tests { + fn make_create_transaction() -> crate::KbChainTransactionDto { + let mut dto = crate::KbChainTransactionDto::new( + "sig-meteora-dbc-create-1".to_string(), + Some(888001), + Some(1779300001), + Some("helius_primary_http".to_string()), + Some("0".to_string()), + None, + None, + serde_json::json!({ + "slot": 888001, + "meta": { + "logMessages": [ + "Program log: Instruction: CreatePool" + ] + }, + "transaction": { + "message": { + "instructions": [] + } + } + }) + .to_string(), + ); + dto.id = Some(301); + dto + } + + fn make_create_instruction() -> crate::KbChainInstructionDto { + let mut dto = crate::KbChainInstructionDto::new( + 301, + None, + 0, + None, + Some(crate::KB_METEORA_DBC_PROGRAM_ID.to_string()), + Some("meteora-dbc".to_string()), + Some(1), + serde_json::json!([ + "DbcPool111", + "DbcTokenA111", + "So11111111111111111111111111111111111111112", + "DbcConfig111", + "DbcCreator111" + ]) + .to_string(), + None, + None, + Some( + serde_json::json!({ + "info": { + "pool": "DbcPool111", + "baseMint": "DbcTokenA111", + "quoteMint": "So11111111111111111111111111111111111111112", + "poolConfig": "DbcConfig111", + "creator": "DbcCreator111" + } + }) + .to_string(), + ), + ); + dto.id = Some(302); + dto + } + + fn make_swap_transaction() -> crate::KbChainTransactionDto { + let mut dto = crate::KbChainTransactionDto::new( + "sig-meteora-dbc-swap-1".to_string(), + Some(888002), + Some(1779300002), + Some("helius_primary_http".to_string()), + Some("0".to_string()), + None, + None, + serde_json::json!({ + "slot": 888002, + "meta": { + "logMessages": [ + "Program log: Instruction: Swap2" + ] + }, + "transaction": { + "message": { + "instructions": [] + } + } + }) + .to_string(), + ); + dto.id = Some(303); + dto + } + + fn make_swap_instruction() -> crate::KbChainInstructionDto { + let mut dto = crate::KbChainInstructionDto::new( + 303, + None, + 0, + None, + Some(crate::KB_METEORA_DBC_PROGRAM_ID.to_string()), + Some("meteora-dbc".to_string()), + Some(1), + serde_json::json!([ + "DbcPoolSwap111", + "DbcSwapTokenA111", + "So11111111111111111111111111111111111111112" + ]) + .to_string(), + None, + None, + Some( + serde_json::json!({ + "info": { + "pool": "DbcPoolSwap111", + "baseMint": "DbcSwapTokenA111", + "quoteMint": "So11111111111111111111111111111111111111112" + } + }) + .to_string(), + ), + ); + dto.id = Some(304); + dto + } + + #[test] + fn meteora_dbc_create_pool_is_detected() { + let decoder = crate::KbMeteoraDbcDecoder::new(); + let transaction = make_create_transaction(); + let instructions = vec![make_create_instruction()]; + let decoded_result = decoder.decode_transaction(&transaction, &instructions); + let decoded = match decoded_result { + Ok(decoded) => decoded, + Err(error) => panic!("decode must succeed: {}", error), + }; + assert_eq!(decoded.len(), 1); + match &decoded[0] { + crate::KbMeteoraDbcDecodedEvent::CreatePool(event) => { + assert_eq!(event.transaction_id, 301); + assert_eq!(event.instruction_id, 302); + assert_eq!(event.pool_account, Some("DbcPool111".to_string())); + assert_eq!(event.token_a_mint, Some("DbcTokenA111".to_string())); + assert_eq!( + event.token_b_mint, + Some("So11111111111111111111111111111111111111112".to_string()) + ); + assert_eq!(event.config_account, Some("DbcConfig111".to_string())); + } + crate::KbMeteoraDbcDecodedEvent::Swap(_) => { + panic!("unexpected swap event") + } + } + } + + #[test] + fn meteora_dbc_swap_is_detected() { + let decoder = crate::KbMeteoraDbcDecoder::new(); + let transaction = make_swap_transaction(); + let instructions = vec![make_swap_instruction()]; + let decoded_result = decoder.decode_transaction(&transaction, &instructions); + let decoded = match decoded_result { + Ok(decoded) => decoded, + Err(error) => panic!("decode must succeed: {}", error), + }; + assert_eq!(decoded.len(), 1); + match &decoded[0] { + crate::KbMeteoraDbcDecodedEvent::Swap(event) => { + assert_eq!(event.transaction_id, 303); + assert_eq!(event.instruction_id, 304); + assert_eq!(event.pool_account, Some("DbcPoolSwap111".to_string())); + assert_eq!(event.token_a_mint, Some("DbcSwapTokenA111".to_string())); + assert_eq!( + event.token_b_mint, + Some("So11111111111111111111111111111111111111112".to_string()) + ); + } + crate::KbMeteoraDbcDecodedEvent::CreatePool(_) => { + panic!("unexpected create event") + } + } + } +} diff --git a/kb_lib/src/dex_decode.rs b/kb_lib/src/dex_decode.rs index 778f953..a4e009a 100644 --- a/kb_lib/src/dex_decode.rs +++ b/kb_lib/src/dex_decode.rs @@ -10,6 +10,7 @@ pub struct KbDexDecodeService { raydium_amm_v4_decoder: crate::KbRaydiumAmmV4Decoder, pump_fun_decoder: crate::KbPumpFunDecoder, pump_swap_decoder: crate::KbPumpSwapDecoder, + meteora_dbc_decoder: crate::KbMeteoraDbcDecoder, } impl KbDexDecodeService { @@ -22,6 +23,7 @@ impl KbDexDecodeService { raydium_amm_v4_decoder: crate::KbRaydiumAmmV4Decoder::new(), pump_fun_decoder: crate::KbPumpFunDecoder::new(), pump_swap_decoder: crate::KbPumpSwapDecoder::new(), + meteora_dbc_decoder: crate::KbMeteoraDbcDecoder::new(), } } @@ -116,9 +118,223 @@ impl KbDexDecodeService { }; persisted.push(persisted_event); } + let meteora_dbc_decoded_result = self + .meteora_dbc_decoder + .decode_transaction(&transaction, &instructions); + let meteora_dbc_decoded = match meteora_dbc_decoded_result { + Ok(meteora_dbc_decoded) => meteora_dbc_decoded, + Err(error) => return Err(error), + }; + for decoded_event in &meteora_dbc_decoded { + let persist_result = self + .persist_meteora_dbc_event(&transaction, decoded_event) + .await; + let persisted_event = match persist_result { + Ok(persisted_event) => persisted_event, + Err(error) => return Err(error), + }; + persisted.push(persisted_event); + } Ok(persisted) } + async fn persist_meteora_dbc_event( + &self, + transaction: &crate::KbChainTransactionDto, + decoded_event: &crate::KbMeteoraDbcDecodedEvent, + ) -> Result { + match decoded_event { + crate::KbMeteoraDbcDecodedEvent::CreatePool(event) => { + let payload_json_result = serde_json::to_string(&event.payload_json); + let payload_json = match payload_json_result { + Ok(payload_json) => payload_json, + Err(error) => { + return Err(crate::KbError::Json(format!( + "cannot serialize decoded meteora dbc payload: {}", + error + ))); + } + }; + let existing_result = crate::get_dex_decoded_event_by_key( + self.database.as_ref(), + event.transaction_id, + Some(event.instruction_id), + "meteora_dbc.create_pool", + ) + .await; + let existing_option = match existing_result { + Ok(existing_option) => existing_option, + Err(error) => return Err(error), + }; + let already_present = existing_option.is_some(); + let dto = crate::KbDexDecodedEventDto::new( + event.transaction_id, + Some(event.instruction_id), + "meteora_dbc".to_string(), + event.program_id.clone(), + "meteora_dbc.create_pool".to_string(), + event.pool_account.clone(), + None, + event.token_a_mint.clone(), + event.token_b_mint.clone(), + event.config_account.clone(), + payload_json, + ); + let upsert_result = + crate::upsert_dex_decoded_event(self.database.as_ref(), &dto).await; + if let Err(error) = upsert_result { + return Err(error); + } + let fetched_result = crate::get_dex_decoded_event_by_key( + self.database.as_ref(), + event.transaction_id, + Some(event.instruction_id), + "meteora_dbc.create_pool", + ) + .await; + let fetched_option = match fetched_result { + Ok(fetched_option) => fetched_option, + Err(error) => return Err(error), + }; + let fetched = match fetched_option { + Some(fetched) => fetched, + None => { + return Err(crate::KbError::InvalidState( + "decoded event disappeared after upsert".to_string(), + )); + } + }; + if !already_present { + let payload_value = event.payload_json.clone(); + let observation_result = self + .persistence + .record_observation(&crate::KbDetectionObservationInput::new( + "dex.meteora_dbc.create_pool".to_string(), + crate::KbObservationSourceKind::HttpRpc, + transaction.source_endpoint_name.clone(), + transaction.signature.clone(), + transaction.slot, + payload_value.clone(), + )) + .await; + let observation_id = match observation_result { + Ok(observation_id) => observation_id, + Err(error) => return Err(error), + }; + let signal_result = self + .persistence + .record_signal(&crate::KbDetectionSignalInput::new( + "signal.dex.meteora_dbc.create_pool".to_string(), + crate::KbAnalysisSignalSeverity::Low, + transaction.signature.clone(), + Some(observation_id), + None, + payload_value, + )) + .await; + if let Err(error) = signal_result { + return Err(error); + } + } + Ok(fetched) + } + crate::KbMeteoraDbcDecodedEvent::Swap(event) => { + let payload_json_result = serde_json::to_string(&event.payload_json); + let payload_json = match payload_json_result { + Ok(payload_json) => payload_json, + Err(error) => { + return Err(crate::KbError::Json(format!( + "cannot serialize decoded meteora dbc payload: {}", + error + ))); + } + }; + let existing_result = crate::get_dex_decoded_event_by_key( + self.database.as_ref(), + event.transaction_id, + Some(event.instruction_id), + "meteora_dbc.swap", + ) + .await; + let existing_option = match existing_result { + Ok(existing_option) => existing_option, + Err(error) => return Err(error), + }; + let already_present = existing_option.is_some(); + let dto = crate::KbDexDecodedEventDto::new( + event.transaction_id, + Some(event.instruction_id), + "meteora_dbc".to_string(), + event.program_id.clone(), + "meteora_dbc.swap".to_string(), + event.pool_account.clone(), + None, + event.token_a_mint.clone(), + event.token_b_mint.clone(), + None, + payload_json, + ); + let upsert_result = + crate::upsert_dex_decoded_event(self.database.as_ref(), &dto).await; + if let Err(error) = upsert_result { + return Err(error); + } + let fetched_result = crate::get_dex_decoded_event_by_key( + self.database.as_ref(), + event.transaction_id, + Some(event.instruction_id), + "meteora_dbc.swap", + ) + .await; + let fetched_option = match fetched_result { + Ok(fetched_option) => fetched_option, + Err(error) => return Err(error), + }; + let fetched = match fetched_option { + Some(fetched) => fetched, + None => { + return Err(crate::KbError::InvalidState( + "decoded event disappeared after upsert".to_string(), + )); + } + }; + if !already_present { + let payload_value = event.payload_json.clone(); + let observation_result = self + .persistence + .record_observation(&crate::KbDetectionObservationInput::new( + "dex.meteora_dbc.swap".to_string(), + crate::KbObservationSourceKind::HttpRpc, + transaction.source_endpoint_name.clone(), + transaction.signature.clone(), + transaction.slot, + payload_value.clone(), + )) + .await; + let observation_id = match observation_result { + Ok(observation_id) => observation_id, + Err(error) => return Err(error), + }; + let signal_result = self + .persistence + .record_signal(&crate::KbDetectionSignalInput::new( + "signal.dex.meteora_dbc.swap".to_string(), + crate::KbAnalysisSignalSeverity::Low, + transaction.signature.clone(), + Some(observation_id), + None, + payload_value, + )) + .await; + if let Err(error) = signal_result { + return Err(error); + } + } + Ok(fetched) + } + } + } + async fn persist_raydium_event( &self, transaction: &crate::KbChainTransactionDto, @@ -718,4 +934,93 @@ mod tests { Some("PumpSwapPoolV2_111".to_string()) ); } + + async fn seed_projected_meteora_dbc_transaction( + database: std::sync::Arc, + signature: &str, + ) { + let service = crate::KbTransactionModelService::new(database); + let resolved_transaction = serde_json::json!({ + "slot": 999004, + "blockTime": 1779000004, + "version": 0, + "transaction": { + "message": { + "instructions": [ + { + "programId": crate::KB_METEORA_DBC_PROGRAM_ID, + "program": "meteora-dbc", + "stackHeight": 1, + "accounts": [ + "DbcPoolDecode111", + "DbcTokenDecode111", + "So11111111111111111111111111111111111111112", + "DbcConfigDecode111", + "DbcCreatorDecode111" + ], + "parsed": { + "info": { + "pool": "DbcPoolDecode111", + "baseMint": "DbcTokenDecode111", + "quoteMint": "So11111111111111111111111111111111111111112", + "poolConfig": "DbcConfigDecode111", + "creator": "DbcCreatorDecode111" + } + }, + "data": "opaque" + } + ] + } + }, + "meta": { + "err": null, + "logMessages": [ + "Program log: Instruction: CreatePool" + ] + } + }); + let persist_result = service + .persist_resolved_transaction( + signature, + Some("helius_primary_http".to_string()), + &resolved_transaction, + ) + .await; + if let Err(error) = persist_result { + panic!("projection must succeed: {}", error); + } + } + + #[tokio::test] + async fn decode_transaction_by_signature_persists_decoded_meteora_dbc_event() { + let database = make_database().await; + seed_projected_meteora_dbc_transaction(database.clone(), "sig-dex-decode-dbc-1").await; + let service = crate::KbDexDecodeService::new(database.clone()); + let decoded_result = service + .decode_transaction_by_signature("sig-dex-decode-dbc-1") + .await; + let decoded = match decoded_result { + Ok(decoded) => decoded, + Err(error) => panic!("decode must succeed: {}", error), + }; + assert_eq!(decoded.len(), 1); + assert_eq!(decoded[0].protocol_name, "meteora_dbc"); + assert_eq!(decoded[0].event_kind, "meteora_dbc.create_pool"); + assert_eq!( + decoded[0].pool_account, + Some("DbcPoolDecode111".to_string()) + ); + assert_eq!( + decoded[0].token_a_mint, + Some("DbcTokenDecode111".to_string()) + ); + assert_eq!( + decoded[0].token_b_mint, + Some("So11111111111111111111111111111111111111112".to_string()) + ); + assert_eq!( + decoded[0].market_account, + Some("DbcConfigDecode111".to_string()) + ); + } } diff --git a/kb_lib/src/dex_detect.rs b/kb_lib/src/dex_detect.rs index f6d771a..83e240a 100644 --- a/kb_lib/src/dex_detect.rs +++ b/kb_lib/src/dex_detect.rs @@ -129,6 +129,30 @@ impl KbDexDetectService { }; detection_results.push(detect_result); } + if decoded_event.protocol_name == "meteora_dbc" + && decoded_event.event_kind == "meteora_dbc.create_pool" + { + let detect_result = self + .detect_meteora_dbc_pool(&transaction, decoded_event) + .await; + let detect_result = match detect_result { + Ok(detect_result) => detect_result, + Err(error) => return Err(error), + }; + detection_results.push(detect_result); + } + if decoded_event.protocol_name == "meteora_dbc" + && decoded_event.event_kind == "meteora_dbc.swap" + { + let detect_result = self + .detect_meteora_dbc_pool(&transaction, decoded_event) + .await; + let detect_result = match detect_result { + Ok(detect_result) => detect_result, + Err(error) => return Err(error), + }; + detection_results.push(detect_result); + } } Ok(detection_results) } @@ -882,6 +906,276 @@ impl KbDexDetectService { }) } + async fn detect_meteora_dbc_pool( + &self, + transaction: &crate::KbChainTransactionDto, + decoded_event: &crate::KbDexDecodedEventDto, + ) -> Result { + let decoded_event_id_option = decoded_event.id; + let decoded_event_id = match decoded_event_id_option { + Some(decoded_event_id) => decoded_event_id, + None => { + return Err(crate::KbError::InvalidState( + "decoded dex event has no internal id".to_string(), + )); + } + }; + let dex_id_result = self.ensure_meteora_dbc_dex().await; + let dex_id = match dex_id_result { + Ok(dex_id) => dex_id, + Err(error) => return Err(error), + }; + let pool_address_option = decoded_event.pool_account.clone(); + let pool_address = match pool_address_option { + Some(pool_address) => pool_address, + None => { + return Err(crate::KbError::InvalidState(format!( + "decoded event '{}' has no pool_account", + decoded_event_id + ))); + } + }; + let token_a_mint_option = decoded_event.token_a_mint.clone(); + let token_a_mint = match token_a_mint_option { + Some(token_a_mint) => token_a_mint, + None => { + return Err(crate::KbError::InvalidState(format!( + "decoded event '{}' has no token_a_mint", + decoded_event_id + ))); + } + }; + let token_b_mint_option = decoded_event.token_b_mint.clone(); + let token_b_mint = match token_b_mint_option { + Some(token_b_mint) => token_b_mint, + None => { + return Err(crate::KbError::InvalidState(format!( + "decoded event '{}' has no token_b_mint", + decoded_event_id + ))); + } + }; + let base_is_token_a = + kb_choose_base_quote_order(token_a_mint.as_str(), token_b_mint.as_str()); + let base_mint = if base_is_token_a { + token_a_mint.clone() + } else { + token_b_mint.clone() + }; + let quote_mint = if base_is_token_a { + token_b_mint.clone() + } else { + token_a_mint.clone() + }; + let base_token_id_result = self.ensure_token(base_mint.as_str()).await; + let base_token_id = match base_token_id_result { + Ok(base_token_id) => base_token_id, + Err(error) => return Err(error), + }; + let quote_token_id_result = self.ensure_token(quote_mint.as_str()).await; + let quote_token_id = match quote_token_id_result { + Ok(quote_token_id) => quote_token_id, + Err(error) => return Err(error), + }; + let existing_pool_result = + crate::get_pool_by_address(self.database.as_ref(), pool_address.as_str()).await; + let existing_pool_option = match existing_pool_result { + Ok(existing_pool_option) => existing_pool_option, + Err(error) => return Err(error), + }; + let created_pool = existing_pool_option.is_none(); + let pool_id = match existing_pool_option { + Some(pool) => { + let pool_id_option = pool.id; + match pool_id_option { + Some(pool_id) => pool_id, + None => { + return Err(crate::KbError::InvalidState(format!( + "pool '{}' has no internal id", + pool.address + ))); + } + } + } + None => { + let pool_dto = crate::KbPoolDto::new( + dex_id, + pool_address.clone(), + crate::KbPoolKind::BondingCurve, + crate::KbPoolStatus::Pending, + ); + let upsert_result = crate::upsert_pool(self.database.as_ref(), &pool_dto).await; + match upsert_result { + Ok(pool_id) => pool_id, + Err(error) => return Err(error), + } + } + }; + let existing_pair_result = + crate::get_pair_by_pool_id(self.database.as_ref(), pool_id).await; + let existing_pair_option = match existing_pair_result { + Ok(existing_pair_option) => existing_pair_option, + Err(error) => return Err(error), + }; + let created_pair = existing_pair_option.is_none(); + let pair_symbol = kb_build_pair_symbol(base_mint.as_str(), quote_mint.as_str()); + let pair_id = match existing_pair_option { + Some(pair) => { + let pair_id_option = pair.id; + match pair_id_option { + Some(pair_id) => pair_id, + None => { + return Err(crate::KbError::InvalidState(format!( + "pair for pool '{}' has no internal id", + pool_id + ))); + } + } + } + None => { + let pair_dto = crate::KbPairDto::new( + dex_id, + pool_id, + base_token_id, + quote_token_id, + pair_symbol, + ); + let upsert_result = crate::upsert_pair(self.database.as_ref(), &pair_dto).await; + match upsert_result { + Ok(pair_id) => pair_id, + Err(error) => return Err(error), + } + } + }; + let upsert_base_pool_token_result = crate::upsert_pool_token( + self.database.as_ref(), + &crate::KbPoolTokenDto::new( + pool_id, + base_token_id, + crate::KbPoolTokenRole::Base, + None, + Some(0), + ), + ) + .await; + if let Err(error) = upsert_base_pool_token_result { + return Err(error); + } + let upsert_quote_pool_token_result = crate::upsert_pool_token( + self.database.as_ref(), + &crate::KbPoolTokenDto::new( + pool_id, + quote_token_id, + crate::KbPoolTokenRole::Quote, + None, + Some(1), + ), + ) + .await; + if let Err(error) = upsert_quote_pool_token_result { + return Err(error); + } + let existing_listing_result = + crate::get_pool_listing_by_pool_id(self.database.as_ref(), pool_id).await; + let existing_listing_option = match existing_listing_result { + Ok(existing_listing_option) => existing_listing_option, + Err(error) => return Err(error), + }; + let created_listing = existing_listing_option.is_none(); + let pool_listing_id = match existing_listing_option { + Some(pool_listing) => pool_listing.id, + None => { + let listing_id_result = self + .upsert_pool_listing_from_decoded_event(dex_id, pool_id, pair_id, transaction) + .await; + match listing_id_result { + Ok(listing_id) => Some(listing_id), + Err(error) => return Err(error), + } + } + }; + let payload_value_result = kb_parse_payload_json(decoded_event.payload_json.as_str()); + let payload_value = match payload_value_result { + Ok(payload_value) => payload_value, + Err(error) => return Err(error), + }; + if created_pool { + let signal_result = self + .record_detection_signal( + transaction, + "signal.dex.meteora_dbc.new_pool", + crate::KbAnalysisSignalSeverity::Low, + payload_value.clone(), + ) + .await; + if let Err(error) = signal_result { + return Err(error); + } + } + if created_pair { + let signal_result = self + .record_detection_signal( + transaction, + "signal.dex.meteora_dbc.new_pair", + crate::KbAnalysisSignalSeverity::Low, + payload_value.clone(), + ) + .await; + if let Err(error) = signal_result { + return Err(error); + } + } + if created_listing { + let signal_result = self + .record_detection_signal( + transaction, + "signal.dex.meteora_dbc.first_listing_seen", + crate::KbAnalysisSignalSeverity::Low, + payload_value, + ) + .await; + if let Err(error) = signal_result { + return Err(error); + } + } + Ok(crate::KbDexPoolDetectionResult { + decoded_event_id, + dex_id, + pool_id, + pair_id, + pool_listing_id, + created_pool, + created_pair, + created_listing, + }) + } + + async fn ensure_meteora_dbc_dex(&self) -> Result { + let dex_result = crate::get_dex_by_code(self.database.as_ref(), "meteora_dbc").await; + let dex_option = match dex_result { + Ok(dex_option) => dex_option, + Err(error) => return Err(error), + }; + match dex_option { + Some(dex) => match dex.id { + Some(dex_id) => Ok(dex_id), + None => Err(crate::KbError::InvalidState( + "meteora_dbc dex has no internal id".to_string(), + )), + }, + None => { + let dex_dto = crate::KbDexDto::new( + "meteora_dbc".to_string(), + "Meteora DBC".to_string(), + Some(crate::KB_METEORA_DBC_PROGRAM_ID.to_string()), + None, + true, + ); + crate::upsert_dex(self.database.as_ref(), &dex_dto).await + } + } + } + async fn ensure_pump_swap_dex(&self) -> Result { let dex_result = crate::get_dex_by_code(self.database.as_ref(), "pump_swap").await; let dex_option = match dex_result { @@ -1399,7 +1693,7 @@ mod tests { }; assert_eq!(pool_tokens.len(), 2); } - + async fn seed_decoded_pump_swap_event( database: std::sync::Arc, signature: &str, @@ -1458,14 +1752,12 @@ mod tests { panic!("dex decode must succeed: {}", error); } } - + #[tokio::test] async fn detect_transaction_by_signature_creates_pump_swap_pool_pair_and_listing() { let database = make_database().await; seed_decoded_pump_swap_event(database.clone(), "sig-dex-detect-pumpswap-1").await; - let detect_service = crate::KbDexDetectService::new(database.clone()); - let detect_result = detect_service .detect_transaction_by_signature("sig-dex-detect-pumpswap-1") .await; @@ -1473,12 +1765,10 @@ mod tests { Ok(results) => results, Err(error) => panic!("dex detect must succeed: {}", error), }; - assert_eq!(results.len(), 1); assert!(results[0].created_pool); assert!(results[0].created_pair); assert!(results[0].created_listing); - let pool_result = crate::get_pool_by_address(database.as_ref(), "PumpSwapDetectPool111").await; let pool_option = match pool_result { @@ -1491,7 +1781,6 @@ mod tests { }; assert_eq!(pool.id, Some(results[0].pool_id)); assert_eq!(pool.pool_kind, crate::KbPoolKind::Amm); - let pair_result = crate::get_pair_by_pool_id(database.as_ref(), results[0].pool_id).await; let pair_option = match pair_result { Ok(pair_option) => pair_option, @@ -1502,7 +1791,6 @@ mod tests { None => panic!("pair must exist"), }; assert_eq!(pair.id, Some(results[0].pair_id)); - let listing_result = crate::get_pool_listing_by_pool_id(database.as_ref(), results[0].pool_id).await; let listing_option = match listing_result { @@ -1514,7 +1802,6 @@ mod tests { None => panic!("listing must exist"), }; assert_eq!(listing.id, results[0].pool_listing_id); - let pool_tokens_result = crate::list_pool_tokens_by_pool_id(database.as_ref(), results[0].pool_id).await; let pool_tokens = match pool_tokens_result { @@ -1552,4 +1839,122 @@ mod tests { assert!(!second_results[0].created_pair); assert!(!second_results[0].created_listing); } + + async fn seed_decoded_meteora_dbc_event( + database: std::sync::Arc, + signature: &str, + ) { + let transaction_model = crate::KbTransactionModelService::new(database.clone()); + let dex_decode = crate::KbDexDecodeService::new(database); + let resolved_transaction = serde_json::json!({ + "slot": 910004, + "blockTime": 1779100004, + "version": 0, + "transaction": { + "message": { + "instructions": [ + { + "programId": crate::KB_METEORA_DBC_PROGRAM_ID, + "program": "meteora-dbc", + "stackHeight": 1, + "accounts": [ + "DbcDetectPool111", + "DbcDetectTokenA111", + "So11111111111111111111111111111111111111112", + "DbcDetectConfig111", + "DbcDetectCreator111" + ], + "parsed": { + "info": { + "pool": "DbcDetectPool111", + "baseMint": "DbcDetectTokenA111", + "quoteMint": "So11111111111111111111111111111111111111112", + "poolConfig": "DbcDetectConfig111", + "creator": "DbcDetectCreator111" + } + }, + "data": "opaque" + } + ] + } + }, + "meta": { + "err": null, + "logMessages": [ + "Program log: Instruction: CreatePool" + ] + } + }); + let project_result = transaction_model + .persist_resolved_transaction( + signature, + Some("helius_primary_http".to_string()), + &resolved_transaction, + ) + .await; + if let Err(error) = project_result { + panic!("projection must succeed: {}", error); + } + let decode_result = dex_decode.decode_transaction_by_signature(signature).await; + if let Err(error) = decode_result { + panic!("dex decode must succeed: {}", error); + } + } + + #[tokio::test] + async fn detect_transaction_by_signature_creates_meteora_dbc_pool_pair_and_listing() { + let database = make_database().await; + seed_decoded_meteora_dbc_event(database.clone(), "sig-dex-detect-dbc-1").await; + let detect_service = crate::KbDexDetectService::new(database.clone()); + let detect_result = detect_service + .detect_transaction_by_signature("sig-dex-detect-dbc-1") + .await; + let results = match detect_result { + Ok(results) => results, + Err(error) => panic!("dex detect must succeed: {}", error), + }; + assert_eq!(results.len(), 1); + assert!(results[0].created_pool); + assert!(results[0].created_pair); + assert!(results[0].created_listing); + let pool_result = crate::get_pool_by_address(database.as_ref(), "DbcDetectPool111").await; + let pool_option = match pool_result { + Ok(pool_option) => pool_option, + Err(error) => panic!("pool fetch must succeed: {}", error), + }; + let pool = match pool_option { + Some(pool) => pool, + None => panic!("pool must exist"), + }; + assert_eq!(pool.id, Some(results[0].pool_id)); + assert_eq!(pool.pool_kind, crate::KbPoolKind::BondingCurve); + let pair_result = crate::get_pair_by_pool_id(database.as_ref(), results[0].pool_id).await; + let pair_option = match pair_result { + Ok(pair_option) => pair_option, + Err(error) => panic!("pair fetch must succeed: {}", error), + }; + let pair = match pair_option { + Some(pair) => pair, + None => panic!("pair must exist"), + }; + assert_eq!(pair.id, Some(results[0].pair_id)); + let listing_result = + crate::get_pool_listing_by_pool_id(database.as_ref(), results[0].pool_id).await; + let listing_option = match listing_result { + Ok(listing_option) => listing_option, + Err(error) => panic!("listing fetch must succeed: {}", error), + }; + let listing = match listing_option { + Some(listing) => listing, + None => panic!("listing must exist"), + }; + assert_eq!(listing.id, results[0].pool_listing_id); + let pool_tokens_result = + crate::list_pool_tokens_by_pool_id(database.as_ref(), results[0].pool_id).await; + let pool_tokens = match pool_tokens_result { + Ok(pool_tokens) => pool_tokens, + Err(error) => panic!("pool tokens list must succeed: {}", error), + }; + assert_eq!(pool_tokens.len(), 2); + } } diff --git a/kb_lib/src/lib.rs b/kb_lib/src/lib.rs index 6696abe..d8bf584 100644 --- a/kb_lib/src/lib.rs +++ b/kb_lib/src/lib.rs @@ -212,6 +212,11 @@ pub use dex::KB_PUMP_SWAP_PROGRAM_ID; pub use dex::KbPumpSwapDecodedEvent; pub use dex::KbPumpSwapDecoder; pub use dex::KbPumpSwapTradeDecoded; +pub use dex::KB_METEORA_DBC_PROGRAM_ID; +pub use dex::KbMeteoraDbcCreatePoolDecoded; +pub use dex::KbMeteoraDbcDecodedEvent; +pub use dex::KbMeteoraDbcDecoder; +pub use dex::KbMeteoraDbcSwapDecoded; pub use dex_decode::KbDexDecodeService; pub use dex_detect::KbDexDetectService; pub use dex_detect::KbDexPoolDetectionResult;