Skip to content
This repository has been archived by the owner on Sep 7, 2023. It is now read-only.

Commit

Permalink
Update verifier
Browse files Browse the repository at this point in the history
  • Loading branch information
abishekk92 committed Jun 25, 2023
1 parent 78fa278 commit fa99378
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions programs/gpl_core/src/instructions/badge.rs
Original file line number Diff line number Diff line change
Expand Up @@ -193,7 +193,7 @@ pub fn create_schema_handler(
ctx.accounts.authority.key(),
// FIXME: Move this to constant byte and importantly use a different key before deploying.
// This is a quick hack to test the patch.
Pubkey::from_str("Bi2ZL1UijCXwtNYi132NyMDRnzVxpuAVcgsqVuUgee5A").unwrap(),
Pubkey::from_str("9fyuDiDxZJ6Nfey7EhZchYkF11M6gUhfXvUyB1oFWZmX").unwrap(),
GumError::UnauthorizedSigner
);
require!(metadata_uri.len() <= MAX_LEN_URI, GumError::URITooLong);
Expand Down Expand Up @@ -230,7 +230,7 @@ pub fn update_schema_handler(ctx: Context<UpdateSchema>, metadata_uri: String) -
ctx.accounts.authority.key(),
// FIXME: Move this to constant byte and importantly use a different key before deploying.
// This is a quick hack to test the patch.
Pubkey::from_str("Bi2ZL1UijCXwtNYi132NyMDRnzVxpuAVcgsqVuUgee5A").unwrap(),
Pubkey::from_str("9fyuDiDxZJ6Nfey7EhZchYkF11M6gUhfXvUyB1oFWZmX").unwrap(),
GumError::UnauthorizedSigner
);
require!(metadata_uri.len() <= MAX_LEN_URI, GumError::URITooLong);
Expand Down Expand Up @@ -263,7 +263,7 @@ pub fn delete_schema_handler(ctx: Context<DeleteSchema>) -> Result<()> {
ctx.accounts.authority.key(),
// FIXME: Move this to constant byte and importantly use a different key before deploying.
// This is a quick hack to test the patch.
Pubkey::from_str("Bi2ZL1UijCXwtNYi132NyMDRnzVxpuAVcgsqVuUgee5A").unwrap(),
Pubkey::from_str("9fyuDiDxZJ6Nfey7EhZchYkF11M6gUhfXvUyB1oFWZmX").unwrap(),
GumError::UnauthorizedSigner
);
Ok(())
Expand Down Expand Up @@ -332,7 +332,7 @@ pub fn verify_issuer_handler(ctx: Context<VerifyIssuer>) -> Result<()> {
ctx.accounts.signer.key(),
// FIXME: Move this to constant byte and importantly use a different key before deploying.
// This is a quick hack to test the patch.
Pubkey::from_str("Bi2ZL1UijCXwtNYi132NyMDRnzVxpuAVcgsqVuUgee5A").unwrap(),
Pubkey::from_str("9fyuDiDxZJ6Nfey7EhZchYkF11M6gUhfXvUyB1oFWZmX").unwrap(),
GumError::InvalidSignerToVerify
);

Expand Down

0 comments on commit fa99378

Please sign in to comment.