Skip to content
This repository was archived by the owner on Mar 11, 2025. It is now read-only.

Commit 6ddba8e

Browse files
committed
remove debug statements
1 parent fd29474 commit 6ddba8e

File tree

2 files changed

+0
-21
lines changed

2 files changed

+0
-21
lines changed

token/program-2022/src/extension/confidential_mint_burn/processor.rs

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -150,48 +150,39 @@ fn process_confidential_mint(
150150
accounts: &[AccountInfo],
151151
data: &MintInstructionData,
152152
) -> ProgramResult {
153-
println!("MINT 1");
154153
let account_info_iter = &mut accounts.iter();
155154
let token_account_info = next_account_info(account_info_iter)?;
156155
let mint_info = next_account_info(account_info_iter)?;
157-
println!("MINT 2");
158156

159157
check_program_account(mint_info.owner)?;
160158
let mint_data = &mut mint_info.data.borrow_mut();
161159
let mut mint = PodStateWithExtensionsMut::<PodMint>::unpack(mint_data)?;
162160
let mint_authority = mint.base.mint_authority;
163-
println!("MINT 3");
164161

165162
let auditor_elgamal_pubkey = mint
166163
.get_extension::<ConfidentialTransferMint>()?
167164
.auditor_elgamal_pubkey;
168-
println!("MINT 4");
169165
if let Ok(extension) = mint.get_extension::<PausableConfig>() {
170166
if extension.paused.into() {
171167
return Err(TokenError::MintPaused.into());
172168
}
173169
}
174-
println!("MINT 5");
175170
let mint_burn_extension = mint.get_extension_mut::<ConfidentialMintBurn>()?;
176-
println!("MINT 6");
177171

178172
let proof_context = verify_mint_proof(
179173
account_info_iter,
180174
data.equality_proof_instruction_offset,
181175
data.ciphertext_validity_proof_instruction_offset,
182176
data.range_proof_instruction_offset,
183177
)?;
184-
println!("MINT 7");
185178

186179
check_program_account(token_account_info.owner)?;
187180
let token_account_data = &mut token_account_info.data.borrow_mut();
188181
let mut token_account = PodStateWithExtensionsMut::<PodAccount>::unpack(token_account_data)?;
189-
println!("MINT 8");
190182

191183
let authority_info = next_account_info(account_info_iter)?;
192184
let authority_info_data_len = authority_info.data_len();
193185
let authority = mint_authority.ok_or(TokenError::NoAuthorityExists)?;
194-
println!("MINT 9");
195186

196187
Processor::validate_owner(
197188
program_id,
@@ -200,7 +191,6 @@ fn process_confidential_mint(
200191
authority_info_data_len,
201192
account_info_iter.as_slice(),
202193
)?;
203-
println!("MINT 10");
204194

205195
if token_account.base.is_frozen() {
206196
return Err(TokenError::AccountFrozen.into());
@@ -216,7 +206,6 @@ fn process_confidential_mint(
216206
token_account.get_extension_mut::<ConfidentialTransferAccount>()?;
217207
confidential_transfer_account.valid_as_destination()?;
218208

219-
println!("MINT 12");
220209
if proof_context.mint_pubkeys.destination != confidential_transfer_account.elgamal_pubkey {
221210
return Err(ProgramError::InvalidInstructionData);
222211
}
@@ -226,7 +215,6 @@ fn process_confidential_mint(
226215
return Err(ProgramError::InvalidInstructionData);
227216
}
228217
}
229-
println!("MINT 13");
230218

231219
let proof_context_auditor_ciphertext_lo = proof_context
232220
.mint_amount_ciphertext_lo
@@ -236,15 +224,13 @@ fn process_confidential_mint(
236224
.mint_amount_ciphertext_hi
237225
.try_extract_ciphertext(2)
238226
.map_err(TokenError::from)?;
239-
println!("MINT 14");
240227

241228
check_auditor_ciphertext(
242229
&data.mint_amount_auditor_ciphertext_lo,
243230
&data.mint_amount_auditor_ciphertext_hi,
244231
&proof_context_auditor_ciphertext_lo,
245232
&proof_context_auditor_ciphertext_hi,
246233
)?;
247-
println!("MINT 15");
248234

249235
confidential_transfer_account.pending_balance_lo = ciphertext_arithmetic::add(
250236
&confidential_transfer_account.pending_balance_lo,
@@ -254,7 +240,6 @@ fn process_confidential_mint(
254240
.map_err(TokenError::from)?,
255241
)
256242
.ok_or(TokenError::CiphertextArithmeticFailed)?;
257-
println!("MINT 16");
258243
confidential_transfer_account.pending_balance_hi = ciphertext_arithmetic::add(
259244
&confidential_transfer_account.pending_balance_hi,
260245
&proof_context
@@ -263,7 +248,6 @@ fn process_confidential_mint(
263248
.map_err(TokenError::from)?,
264249
)
265250
.ok_or(TokenError::CiphertextArithmeticFailed)?;
266-
println!("MINT 17");
267251

268252
confidential_transfer_account.increment_pending_balance_credit_counter()?;
269253

@@ -284,7 +268,6 @@ fn process_confidential_mint(
284268
.map_err(|_| ProgramError::InvalidAccountData)?,
285269
)
286270
.ok_or(TokenError::CiphertextArithmeticFailed)?;
287-
println!("MINT 18");
288271
mint_burn_extension.decryptable_supply = data.new_decryptable_supply;
289272

290273
Ok(())

token/program-2022/src/processor.rs

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1903,10 +1903,6 @@ impl Processor {
19031903
owner_account_data_len: usize,
19041904
signers: &[AccountInfo],
19051905
) -> ProgramResult {
1906-
println!(
1907-
"expected owner: {expected_owner}; acc_info_owner: {}",
1908-
owner_account_info.key
1909-
);
19101906
if expected_owner != owner_account_info.key {
19111907
return Err(TokenError::OwnerMismatch.into());
19121908
}

0 commit comments

Comments
 (0)