IC-Solana Gateway for interacting with Solana from the IC

IC-Solana: Connecting the Internet Computer to Solana

Project highlights

IC-Solana is a solution that bridges the Internet Computer with Solana. It allows developers to build decentralized applications (dApps) on the Internet Computer with functionality comparable to traditional Solana dApps. This integration combines the capabilities of both blockchain networks, making it easier to develop cross-chain applications and expand the possibilities for decentralized solutions.

Target users

  • Developers building cross-chain dApps that require access to Solana’s ecosystem.
  • ICP projects that need to integrate Solana data and transactions.
  • DeFi applications looking to expand interoperability between ICP and Solana.

Features

  • Multi-provider RPC support: Queries multiple RPC providers.
  • Quorum-based validation: Aggregates and validates responses across providers.
  • Secure transactions: Submits transactions to the Solana blockchain directly from ICP via t-sigs.
  • Logging and monitoring: Integrated metrics tracking and enhanced logging.
  • Inspired by the EVM RPC Canister: Shares architectural elements with the EVM RPC Canister to deliver consistent developer experience.

Components

RPC Canister

The RPC Canister enables communication with the Solana blockchain, using HTTPS outcalls to transmit raw transactions and messages via on-chain APIs of Solana JSON RPC providers, for example, Helius or Quicknode.

Key functionalities include:

  1. Retrieving Solana-specific data, such as block details, account information, node statistics, etc.
  2. Managing Solana RPC providers, including registration, updates, and provider configurations.
  3. Calculating and managing the cost of RPC requests.

Wallet Canister

The Wallet Canister is used for managing addresses and for securely signing transactions/messages for the Solana blockchain using the threshold Schnorr API.

Key functionalities include:

  1. Generating a Solana public key (Ed25519) for a user on the Internet Computer (ICP).
  2. Signing messages using distributed keys based on the Threshold Schnorr protocol.
  3. Signing and sending raw transactions to the Solana blockchain via the RPC Canister.

IC-Solana

A Rust library that provides the necessary tools for integrating Solana with ICP canisters.

Quick start

Add the following configuration to your dfx.json file (replace the ic principal with any option from the list of available canisters):

{
  "canisters": {
    "solana_rpc": {
      "type": "custom",
      "candid": "https://github.com/mfactory-lab/ic-solana/blob/main/src/ic-solana-rpc/ic-solana-rpc.did",
      "wasm": "https://github.com/mfactory-lab/ic-solana/blob/main/ic-solana-rpc.wasm.gz",
      "init_arg": "(record {})"
    },
    "solana_wallet": {
      "type": "custom",
      "candid": "https://github.com/mfactory-lab/ic-solana/blob/main/src/ic-solana-wallet/ic-solana-wallet.did",
      "wasm": "https://github.com/mfactory-lab/ic-solana/blob/main/ic-solana-wallet.wasm.gz",
      "init_arg": "(record {})"
    }
  }
}

Running the project locally

Requirements

Make sure you have the following installed:

Building the code

Start a local replica listening on port 4943:

dfx start --clean --host 127.0.0.1:4943

Build and deploy canisters:

# Deploy the `solana_rpc` canister locally
dfx deploy solana_rpc --argument '(record {})'

# Deploy the `solana_wallet` canister locally
dfx deploy solana_wallet --argument "(record { sol_canister = opt principal \"`dfx canister id solana_rpc`\"; schnorr_key = null })"

All the canisters will be deployed to the local network with their fixed canister IDs.

Once the build and deployment are complete, your application will be accessible at:

http://localhost:4943?canisterId={asset_canister_id}

Replace {asset_canister_id} with the actual canister’s ID generated during deployment.

Usage examples

Use the Solana mainnet cluster:

dfx canister call solana_rpc sol_getHealth '(variant{Mainnet},null)' --wallet $(dfx identity get-wallet)

Use the Solana devnet cluster:

dfx canister call solana_rpc sol_getHealth '(variant{Devnet},null)' --wallet $(dfx identity get-wallet)

Use a single custom RPC:

dfx canister call solana_rpc sol_getHealth '(variant{Custom=vec{record{network="https://mainnet.helius-rpc.com/"}}},null)' --wallet $(dfx identity get-wallet)

Use multiple custom RPCs:

dfx canister call solana_rpc sol_getHealth '(variant{Custom=vec{record{network="mainnet"},record{network="https://mainnet.helius-rpc.com/"}}},null)' --wallet $(dfx identity get-wallet)

Use a single RPC provider (predefined providers: mainnet|m, devnet|d, testnet|t):

dfx canister call solana_rpc sol_getHealth '(variant{Provider=vec{"mainnet"}},null)' --wallet $(dfx identity get-wallet)

Documentation

  • README file in the GitHub repo [mfactory-lab/ic-solana](https://github.com/mfactory-lab/ic-solana)

Dependencies

  • Rust 1.84.0 or later (stable): The project is written in Rust and is configured to use Rust version 1.84.0.
  • DFINITY SDK: Required for deploying and managing canisters on the Internet Computer. It provides the dfx command-line tool used in the deployment scripts and local testing.
  • Docker (optional): For reproducible builds, Docker is recommended.
  • PocketIC (optional): Can be used for local testing, offering a convenient way to emulate the Internet Computer network environment.

License

This project is open source and licensed under the Apache 2.0 License.

Future plans

We are working on a series of improvements to the project:

  • Implement transformation functions for each method to canonicalize the responses which allows ICP nodes to reach consensus.
  • Ensure that provider costs are reflected in the HTTP outcall cycle cost calculation.
  • Optimize performance and reduce cycle costs.
  • Improve developer tooling and SDK support.
  • Explore grant opportunities and community contributions.
8 Likes

You can find the source code here

Hi @korriganjr

Did you try to run solana_rpc on mainnet (not locally)? When I tried I encountered several problems (that was from 445ead1f4a33499352a6d22760e770bbad736a97):

  1. There will be a consensus error most of the time for getLatestBlockhash. The reason is that Solana blockheight changes very rapidly at any commitment level (even for finalized), which is too fast for the latency of HTTPs outcalls. This is problematic because the latest blockhash is required to send a transaction on Solana.
  2. The default providers given in the canister do not work on mainnet because they don’t support IPv6.
  3. There are some deser errors because Candid unfortunately doesn’t support the serde annotation rename_all.
1 Like

Hi @gregory-demay!

We haven’t launched on mainnet yet because we’re working on a few final issues.

  1. We know about this and it’s currently in progress.
  2. Do HTTP Outcalls on mainnet only support IPv6?
  3. Can I test this locally without deploying to mainnet?

A blockhash expires after 150 blocks (about 1 minute assuming 400ms block times), after which the transaction cannot be processed.

Yes, HTTPS outcalls require IPv6.

1 Like

also sharing the demo video here for everybody interested :slight_smile:

2 Likes

Hi @tiamo

A blockhash expires after 150 blocks (about 1 minute assuming 400ms block times), after which the transaction cannot be processed.

Sure, but the problem is that the canister cannot even see the response of getLatestBlockhash since there will be a consensus error. There are basically 2 solutions that I see:

  1. Use durable transactions, but this requires setting up a nonce account.
  2. Hacky way:
    1. retrieve current slot, round that number to artificially increase the block time and avoid consensus errors.
    2. Retrieve the block for that slot with getBlock, which contains blockhash. That hash will not be super fresh (due to HTTPs outcall latency) but should be fresh enough to send a transaction for example.
  1. Can I test this locally without deploying to mainnet?

Deser errors should be visible locally, but certain pitfalls of HTTPs outcalls (IPv6 + consensus) are only visible on mainnet. For this reason I would strongly encourage you to test on mainnet.

2 Likes

Yes, this is an issue, but only when using “consensus mode”. To address this, we are adding support for response transformation functions for methods like getLatestBlockhash, enabling their use in “consensus mode”.

This is rarely used but such support can be added.

This is actually the best solution in my view. It’s not a hack and is widely used in the Solana ecosystem. Yes, it should be fresh enough to send a transaction.

1 Like

I’m not sure what you mean with “consensus mode”. This is independent of what the caller requested. What I mean here is that the output of a single HTTP outcall (the response to http_request) will be a SYS_TRANSIENT error with a message along the lines of No consensus could be reached. Replicas had different responses. Since we are dealing with block hashes here, no transform functions will help (the block hash looks like a random string so consensus could only be reached by having some useless constant transform function) .

Does the wallet canister also craft the transactions or some transactions?
Or do I have to craft the transaction outside and the wallet canister only signs it?

Yes, I meant RpcConfig::response_consensus. I haven’t run it on the mainnet and didn’t immediately grasp what you meant… It seems that, in this case, durable transactions might be the best fit.

Is there a way to test the HttpOutcall SYS_TRANSIENT error locally?

The wallet canister is only used for signing and transferring raw transactions. We plan to implement support for SystemProgram, TokenProgram, and TokenProgram2022 instructions, as well as a universal solution for anchor IDL file support.

I don’t see any deserialization errors locally or when using PocketIC…

The creation of a nonce account also requires the submission of a transaction and a recent block hash :smile: This option does not seem to work either…

What is the worst that can happen if you use a bad block hash? Do you lose any fee?

Or asked another way, do you actually need to use consensus mode for that call? If the worst thing is that the rpc rejects the trx then you may just want to go with a single provider.

You will get expired blockhash error and loss of 5000 lamports fee )

This error will also occur on a single provider because that’s how HttpOutcall works. As @gregory-demay said earlier, the output of a single HTTP outcall will be an error with a message like “Unable to reach consensus. Replicas gave different answers.”

Ahhh…yes…makes sense. You need a provider that supports idempotency keys in the requests.

In this particular case, this error is caused by a consensus error, which you cannot reproduce locally (since the call is made from a single machine instead of being replicated like on ICP mainnet).

I don’t see any deserialization errors locally or when using PocketIC…

I had problems when specifying the CommitmentLevel, since the serde rename_all on the enum will be ignored by Candid.

The creation of a nonce account also requires the submission of a transaction and a recent block hash :smile: This option does not seem to work either…

It does, it just requires either a one-time setup phase outside of the IC or to setup the nonce account by the aforementioned hack (get hash for a concrete block that was retrieved by rounding the current slot). A downside is that this requires a nonce account per signing address, which depending on the application may be problematic.

1 Like