diff --git a/core/services/ocr2/plugins/ccip/exportinternal.go b/core/services/ocr2/plugins/ccip/exportinternal.go index 3558a8d807..1fab843830 100644 --- a/core/services/ocr2/plugins/ccip/exportinternal.go +++ b/core/services/ocr2/plugins/ccip/exportinternal.go @@ -112,10 +112,6 @@ func NewLBTCReader(lggr logger.Logger, jobID string, transmitter common.Address, return ccipdata.NewLBTCReader(lggr, jobID, transmitter, lp, registerFilters) } -func CloseLBTCReader(lggr logger.Logger, jobID string, transmitter common.Address, lp logpoller.LogPoller) error { - return ccipdata.CloseLBTCReader(lggr, jobID, transmitter, lp) -} - type USDCReaderImpl = ccipdata.USDCReaderImpl type LBTCReaderImpl = ccipdata.LBTCReaderImpl diff --git a/core/services/ocr2/plugins/ccip/internal/ccipdata/lbtc_reader.go b/core/services/ocr2/plugins/ccip/internal/ccipdata/lbtc_reader.go index d1c26f7d6c..a4ccd6fab9 100644 --- a/core/services/ocr2/plugins/ccip/internal/ccipdata/lbtc_reader.go +++ b/core/services/ocr2/plugins/ccip/internal/ccipdata/lbtc_reader.go @@ -1,23 +1,137 @@ package ccipdata import ( + "bytes" + "context" + "fmt" + "github.com/ethereum/go-ethereum/common" + "github.com/ethereum/go-ethereum/common/hexutil" + "github.com/patrickmn/go-cache" + "github.com/pkg/errors" "github.com/smartcontractkit/chainlink/v2/core/chains/evm/logpoller" + "github.com/smartcontractkit/chainlink/v2/core/chains/evm/utils" "github.com/smartcontractkit/chainlink/v2/core/logger" + "github.com/smartcontractkit/chainlink/v2/core/services/ocr2/plugins/ccip/abihelpers" +) + +var ( + _ LBTCReader = &LBTCReaderImpl{} ) -// TODO: Implement lbtc token reader +const ( + LBTC_DEPOSIT_FILTER_NAME = "LBTC deposited" + LBTC_PAYLOAD_ABI = `[{"type": "bytes"}]` +) + +type lbtcPayload []byte + +func (d lbtcPayload) AbiString() string { + return LBTC_PAYLOAD_ABI +} + +func (d lbtcPayload) Validate() error { + if len(d) == 0 { + return errors.New("must be non-empty") + } + return nil +} + type LBTCReader interface { + GetLBTCMessageInTx(ctx context.Context, payloadHash []byte, txHash string) ([]byte, error) + Close() error } type LBTCReaderImpl struct { + eventID common.Hash + lp logpoller.LogPoller + filter logpoller.Filter + lggr logger.Logger + transmitterAddress common.Address + + // shortLivedInMemLogs is a short-lived cache (items expire every few seconds) + // used to prevent frequent log fetching from the log poller + shortLivedInMemLogs *cache.Cache } func NewLBTCReader(lggr logger.Logger, jobID string, transmitter common.Address, lp logpoller.LogPoller, registerFilters bool) (*LBTCReaderImpl, error) { - return &LBTCReaderImpl{}, nil + return NewLBTCReaderWithCache(lggr, jobID, transmitter, lp, cache.New(shortLivedInMemLogsCacheExpiration, 2*shortLivedInMemLogsCacheExpiration), registerFilters) } -func CloseLBTCReader(lggr logger.Logger, jobID string, transmitter common.Address, lp logpoller.LogPoller) error { - return nil +func NewLBTCReaderWithCache(lggr logger.Logger, jobID string, transmitter common.Address, lp logpoller.LogPoller, cache *cache.Cache, registerFilters bool) (*LBTCReaderImpl, error) { + eventSig := utils.Keccak256Fixed([]byte("DepositToBridge(address,bytes32,bytes32,bytes)")) + r := &LBTCReaderImpl{ + lggr: lggr, + lp: lp, + eventID: eventSig, + filter: logpoller.Filter{ + Name: logpoller.FilterName(LBTC_DEPOSIT_FILTER_NAME, jobID, transmitter.Hex()), + EventSigs: []common.Hash{eventSig}, + Addresses: []common.Address{transmitter}, + Retention: CommitExecLogsRetention, + }, + transmitterAddress: transmitter, + shortLivedInMemLogs: cache, + } + + if registerFilters { + if err := r.RegisterFilters(); err != nil { + return nil, fmt.Errorf("register filters: %w", err) + } + } + return r, nil +} + +func (r *LBTCReaderImpl) GetLBTCMessageInTx(ctx context.Context, payloadHash []byte, txHash string) ([]byte, error) { + var lpLogs []logpoller.Log + + // fetch all the lbtc logs for the provided tx hash + key := fmt.Sprintf("lbtc-%s", txHash) + if rawLogs, foundInMem := r.shortLivedInMemLogs.Get(key); foundInMem { + inMemLogs, ok := rawLogs.([]logpoller.Log) + if !ok { + return nil, errors.Errorf("unexpected in-mem logs type %T", rawLogs) + } + r.lggr.Debugw("found logs in memory", "key", key, "len", len(inMemLogs)) + lpLogs = inMemLogs + } + if len(lpLogs) == 0 { + r.lggr.Debugw("fetching logs from lp") + var err error + lpLogs, err = r.lp.IndexedLogsByTxHash( + ctx, + r.eventID, + r.transmitterAddress, + common.HexToHash(txHash), + ) + if err != nil { + return nil, err + } + r.shortLivedInMemLogs.Set(key, lpLogs, cache.DefaultExpiration) + r.lggr.Debugw("fetched logs from lp", "logs", len(lpLogs)) + } + for _, log := range lpLogs { + topics := log.GetTopics() + if currentPayloadHash := topics[3]; bytes.Equal(currentPayloadHash[:], payloadHash) { + return parseLBTCDeositPayload(log.Data) + } + } + return nil, fmt.Errorf("payload with hash=%s not found in logs", hexutil.Encode(payloadHash)) +} + +func parseLBTCDeositPayload(logData []byte) ([]byte, error) { + decodeAbiStruct, err := abihelpers.DecodeAbiStruct[lbtcPayload](logData) + if err != nil { + return nil, err + } + return decodeAbiStruct, nil +} + +func (r *LBTCReaderImpl) RegisterFilters() error { + return r.lp.RegisterFilter(context.Background(), r.filter) +} + +func (r *LBTCReaderImpl) Close() error { + return r.lp.UnregisterFilter(context.Background(), r.filter.Name) } diff --git a/core/services/ocr2/plugins/ccip/internal/ccipdata/lbtc_reader_test.go b/core/services/ocr2/plugins/ccip/internal/ccipdata/lbtc_reader_test.go new file mode 100644 index 0000000000..2378b320f6 --- /dev/null +++ b/core/services/ocr2/plugins/ccip/internal/ccipdata/lbtc_reader_test.go @@ -0,0 +1,198 @@ +package ccipdata + +import ( + "context" + "crypto/sha256" + "math/big" + "testing" + "time" + + "github.com/ethereum/go-ethereum/common" + "github.com/ethereum/go-ethereum/common/hexutil" + "github.com/ethereum/go-ethereum/core/types" + "github.com/ethereum/go-ethereum/crypto" + "github.com/patrickmn/go-cache" + "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/mock" + "github.com/stretchr/testify/require" + + evmclimocks "github.com/smartcontractkit/chainlink/v2/core/chains/evm/client/mocks" + "github.com/smartcontractkit/chainlink/v2/core/chains/evm/headtracker" + "github.com/smartcontractkit/chainlink/v2/core/chains/evm/logpoller" + lpmocks "github.com/smartcontractkit/chainlink/v2/core/chains/evm/logpoller/mocks" + types2 "github.com/smartcontractkit/chainlink/v2/core/chains/evm/types" + "github.com/smartcontractkit/chainlink/v2/core/chains/evm/utils" + ubig "github.com/smartcontractkit/chainlink/v2/core/chains/evm/utils/big" + "github.com/smartcontractkit/chainlink/v2/core/internal/testutils" + "github.com/smartcontractkit/chainlink/v2/core/internal/testutils/pgtest" + "github.com/smartcontractkit/chainlink/v2/core/logger" + "github.com/smartcontractkit/chainlink/v2/core/services/ocr2/plugins/ccip/abihelpers" +) + +func TestLBTCParse(t *testing.T) { + encodedPayload, err := hexutil.Decode("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") + require.NoError(t, err) + payload, err := parseLBTCDeositPayload(encodedPayload) + require.NoError(t, err) + expected := "0x5c70a5050000000000000000000000000000000000000000000000000000000000aa36a7000000000000000000000000845f8e3c214d8d0e4d83fc094f302aa26a12a0bc0000000000000000000000000000000000000000000000000000000000014a34000000000000000000000000845f8e3c214d8d0e4d83fc094f302aa26a12a0bc00000000000000000000000062f10ce5b727edf787ea45776bd050308a61150800000000000000000000000000000000000000000000000000000000000003e60000000000000000000000000000000000000000000000000000000000000006" + assert.Equal(t, expected, hexutil.Encode(payload)) +} + +func Test_MockLogPoller(t *testing.T) { + lggr := logger.TestLogger(t) + payload := []byte("0x1111") + payloadHash := sha256.Sum256(payload) + t.Run("found one", func(t *testing.T) { + lp := lpmocks.NewLogPoller(t) + reader, err := NewLBTCReader(lggr, "job_1", utils.RandomAddress(), lp, false) + require.NoError(t, err) + lp.On("IndexedLogsByTxHash", mock.Anything, reader.eventID, reader.transmitterAddress, mock.Anything). + Return([]logpoller.Log{ + LogWithPayload(t, 20, payload), + }, nil) + + data, err := reader.GetLBTCMessageInTx(context.Background(), payloadHash[:], "0x0001") + assert.NoError(t, err) + assert.Equal(t, payload, data) + }) + + t.Run("found multiple", func(t *testing.T) { + lp := lpmocks.NewLogPoller(t) + reader, err := NewLBTCReader(lggr, "job_1", utils.RandomAddress(), lp, false) + require.NoError(t, err) + lp.On("IndexedLogsByTxHash", mock.Anything, reader.eventID, reader.transmitterAddress, mock.Anything). + Return([]logpoller.Log{ + LogWithPayload(t, 10, []byte("0x1110")), + LogWithPayload(t, 20, payload), + LogWithPayload(t, 30, []byte("0x2222")), + }, nil) + + data, err := reader.GetLBTCMessageInTx(context.Background(), payloadHash[:], "0x0001") + assert.NoError(t, err) + assert.Equal(t, payload, data) + }) + + t.Run("found multiple none match", func(t *testing.T) { + lp := lpmocks.NewLogPoller(t) + reader, err := NewLBTCReader(lggr, "job_1", utils.RandomAddress(), lp, false) + require.NoError(t, err) + lp.On("IndexedLogsByTxHash", mock.Anything, reader.eventID, reader.transmitterAddress, mock.Anything). + Return([]logpoller.Log{ + LogWithPayload(t, 10, []byte("0x1110")), + LogWithPayload(t, 30, []byte("0x2222")), + }, nil) + + data, err := reader.GetLBTCMessageInTx(context.Background(), payloadHash[:], "0x0001") + assert.Nil(t, data) + assert.Errorf(t, err, "payload with hash=%s not found in logs", payloadHash) + }) + + t.Run("no logs found", func(t *testing.T) { + lp := lpmocks.NewLogPoller(t) + reader, err := NewLBTCReader(lggr, "job_1", utils.RandomAddress(), lp, false) + require.NoError(t, err) + lp.On("IndexedLogsByTxHash", mock.Anything, reader.eventID, reader.transmitterAddress, mock.Anything). + Return([]logpoller.Log{}, nil) + + data, err := reader.GetLBTCMessageInTx(context.Background(), payloadHash[:], "0x0001") + assert.Nil(t, data) + assert.Errorf(t, err, "payload with hash=%s not found in logs", payloadHash) + }) + + t.Run("cache hit", func(t *testing.T) { + rCache := cache.New(cache.NoExpiration, cache.NoExpiration) + err := rCache.Add("lbtc-0x0001", []logpoller.Log{LogWithPayload(t, 20, payload)}, cache.NoExpiration) + require.NoError(t, err) + r, err := NewLBTCReaderWithCache(lggr, "job_1", utils.RandomAddress(), nil, rCache, false) + require.NoError(t, err) + data, err := r.GetLBTCMessageInTx(context.Background(), payloadHash[:], "0x0001") + assert.NoError(t, err) + assert.Equal(t, payload, data) + }) +} + +func Test_SimulatedLogPoller_FoundMultiple(t *testing.T) { + lggr := logger.TestLogger(t) + chainID := testutils.NewRandomEVMChainID() + db := pgtest.NewSqlxDB(t) + o := logpoller.NewORM(chainID, db, lggr) + + transmitter := utils.RandomAddress() + payload := []byte("0x1111") + payloadHash := sha256.Sum256(payload) + logs := []types.Log{ + EthLogWithPayload(t, 10, transmitter, []byte("0x2222")), + EthLogWithPayload(t, 20, utils.RandomAddress(), payload), + EthLogWithPayload(t, 30, transmitter, payload), + } + + ec := evmclimocks.NewClient(t) + head := types2.NewHead(big.NewInt(1), common.Hash{}, common.Hash{}, 0, ubig.New(chainID)) + ec.On("HeadByNumber", mock.Anything, mock.Anything).Return(&head, nil) + ec.On("FilterLogs", mock.Anything, mock.Anything).Return(logs, nil) + ec.On("ConfiguredChainID").Return(chainID, nil) + + lpOpts := logpoller.Opts{ + PollPeriod: time.Hour, + FinalityDepth: 1, + BackfillBatchSize: 1, + RpcBatchSize: 1, + KeepFinalizedBlocksDepth: 100, + } + headTracker := headtracker.NewSimulatedHeadTracker(ec, lpOpts.UseFinalityTag, lpOpts.FinalityDepth) + lp := logpoller.NewLogPoller(o, ec, lggr, headTracker, lpOpts) + lp.PollAndSaveLogs(context.Background(), 1) + + reader, err := NewLBTCReader(lggr, "job_1", transmitter, lp, true) + require.NoError(t, err) + + data, err := reader.GetLBTCMessageInTx(context.Background(), payloadHash[:], common.Hash{}.Hex()) + assert.NoError(t, err) + assert.Equal(t, payload, data) +} + +func EthLogWithPayload(t *testing.T, logIndex uint, transmitter common.Address, payload []byte) types.Log { + encodedPayload, err := abihelpers.ABIEncode(LBTC_PAYLOAD_ABI, payload) + require.NoError(t, err) + payloadHash := sha256.Sum256(payload) + topics := make([]common.Hash, 4, 4) + topics[0] = crypto.Keccak256Hash([]byte("DepositToBridge(address,bytes32,bytes32,bytes)")) + topics[3] = common.BytesToHash(payloadHash[:]) + return types.Log{ + Address: transmitter, + Topics: topics, + Data: encodedPayload, + BlockNumber: 1, + TxHash: common.Hash{}, + TxIndex: 1, + BlockHash: common.Hash{}, + Index: logIndex, + Removed: false, + } +} + +func LogWithPayload(t *testing.T, index int64, payload []byte) logpoller.Log { + payloadHash := sha256.Sum256(payload) + topics := make([][]byte, 4, 4) + topics[3] = payloadHash[:] + logData, err := abihelpers.ABIEncode(LBTC_PAYLOAD_ABI, payload) + require.NoError(t, err) + return logpoller.Log{ + LogIndex: index, + Topics: topics, + Data: logData, + } +} + +//func EthLogWithPayload(t *testing.T, index int64, payload []byte) logpoller.Log { +// payloadHash := sha256.Sum256(payload) +// topics := make([][]byte, 4, 4) +// topics[3] = payloadHash[:] +// logData, err := abihelpers.ABIEncode(LBTC_PAYLOAD_ABI, payload) +// require.NoError(t, err) +// return types.Log{ +// LogIndex: index, +// Topics: topics, +// Data: logData, +// } +//} diff --git a/core/services/ocr2/plugins/ccip/tokendata/lbtc/lbtc.go b/core/services/ocr2/plugins/ccip/tokendata/lbtc/lbtc.go index 0060f99d95..2748149fa4 100644 --- a/core/services/ocr2/plugins/ccip/tokendata/lbtc/lbtc.go +++ b/core/services/ocr2/plugins/ccip/tokendata/lbtc/lbtc.go @@ -1,6 +1,7 @@ package lbtc import ( + "bytes" "context" "crypto/sha256" "fmt" @@ -11,10 +12,13 @@ import ( "github.com/ethereum/go-ethereum/common" "github.com/ethereum/go-ethereum/common/hexutil" "github.com/pkg/errors" + "github.com/umbracle/ethgo/abi" "golang.org/x/time/rate" cciptypes "github.com/smartcontractkit/chainlink-common/pkg/types/ccip" "github.com/smartcontractkit/chainlink/v2/core/logger" + "github.com/smartcontractkit/chainlink/v2/core/services/ocr2/plugins/ccip/abihelpers" + "github.com/smartcontractkit/chainlink/v2/core/services/ocr2/plugins/ccip/internal/ccipdata" "github.com/smartcontractkit/chainlink/v2/core/services/ocr2/plugins/ccip/tokendata" "github.com/smartcontractkit/chainlink/v2/core/services/ocr2/plugins/ccip/tokendata/http" ) @@ -61,6 +65,7 @@ type TokenDataReader struct { httpClient http.IHttpClient attestationApi *url.URL attestationApiTimeout time.Duration + lbtcReader ccipdata.LBTCReader lbtcTokenAddress common.Address rate *rate.Limiter @@ -82,10 +87,44 @@ type attestationResponse struct { // TODO: Implement encoding/decoding +type sourceTokenData struct { + sourcePoolAddress []byte + destTokenAddress []byte + extraData []byte + destGasAmount uint32 +} + +type payloadAndProof struct { + Payload []byte + Proof []byte +} + +func (m payloadAndProof) AbiString() string { + return ` + [{ + "components": [ + {"name": "payload", "type": "bytes"}, + {"name": "proof", "type": "bytes"} + ], + "type": "tuple" + }]` +} + +func (m payloadAndProof) Validate() error { + if len(m.Payload) == 0 { + return errors.New("payload must be non-empty") + } + if len(m.Proof) == 0 { + return errors.New("proof must be non-empty") + } + return nil +} + var _ tokendata.Reader = &TokenDataReader{} func NewLBTCTokenDataReader( lggr logger.Logger, + lbtcReader ccipdata.LBTCReader, lbtcAttestationApi *url.URL, lbtcAttestationApiTimeoutSeconds int, lbtcTokenAddress common.Address, @@ -107,6 +146,7 @@ func NewLBTCTokenDataReader( httpClient: http.NewObservedIHttpClient(&http.HttpClient{}), attestationApi: lbtcAttestationApi, attestationApiTimeout: timeout, + lbtcReader: lbtcReader, lbtcTokenAddress: lbtcTokenAddress, coolDownMu: &sync.RWMutex{}, rate: rate.NewLimiter(rate.Every(requestInterval), 1), @@ -149,17 +189,16 @@ func (s *TokenDataReader) ReadTokenData(ctx context.Context, msg cciptypes.EVM2E } } - messageBody, err := s.getLBTCMessageBody(ctx, msg, tokenIndex) + payload, payloadHash, err := s.getLBTCPayloadAndHash(ctx, msg, tokenIndex) if err != nil { return []byte{}, errors.Wrap(err, "failed getting the LBTC message body") } msgID := hexutil.Encode(msg.MessageID[:]) - messageBodyHash := sha256.Sum256(messageBody) - messageBodyHashHex := hexutil.Encode(messageBodyHash[:]) - s.lggr.Infow("Calling attestation API", "messageBodyHash", messageBodyHashHex, "messageID", msgID) + payloadHashHex := hexutil.Encode(payloadHash[:]) + s.lggr.Infow("Calling attestation API", "messageBodyHash", payloadHashHex, "messageID", msgID) - attestationResp, err := s.callAttestationApi(ctx, messageBodyHash) + attestationResp, err := s.callAttestationApi(ctx, payloadHash) if err != nil { return nil, err } @@ -171,7 +210,7 @@ func (s *TokenDataReader) ReadTokenData(ctx context.Context, msg cciptypes.EVM2E } var attestation messageAttestationResponse for _, attestationCandidate := range attestationResp.Attestations { - if attestationCandidate.MessageHash == messageBodyHashHex { + if attestationCandidate.MessageHash == payloadHashHex { attestation = attestationCandidate } } @@ -179,11 +218,11 @@ func (s *TokenDataReader) ReadTokenData(ctx context.Context, msg cciptypes.EVM2E "attestationStatus", attestation.Status, "attestation", attestation) switch attestation.Status { case attestationStatusSessionApproved: - messageAndAttestation, err := encodeMessageAndAttestation(messageBody, attestation.Attestation) + payloadAndProof, err := encodePayloadAndProof(payload, attestation.Attestation) if err != nil { - return nil, fmt.Errorf("failed to encode messageAndAttestation : %w", err) + return nil, fmt.Errorf("failed to encode payloadAndProof : %w", err) } - return messageAndAttestation, nil + return payloadAndProof, nil case attestationStatusPending: return nil, tokendata.ErrNotReady case attestationStatusSubmitted: @@ -194,8 +233,30 @@ func (s *TokenDataReader) ReadTokenData(ctx context.Context, msg cciptypes.EVM2E } } -func (s *TokenDataReader) getLBTCMessageBody(ctx context.Context, msg cciptypes.EVM2EVMOnRampCCIPSendRequestedWithMeta, tokenIndex int) ([]byte, error) { - return nil, nil +func (s *TokenDataReader) getLBTCPayloadAndHash(ctx context.Context, msg cciptypes.EVM2EVMOnRampCCIPSendRequestedWithMeta, tokenIndex int) ([]byte, [32]byte, error) { + encodedSourceTokenData := msg.SourceTokenData[tokenIndex] + sourceTokenDataType, err := abi.NewType("tuple(bytes sourcePoolAddress, bytes destTokenAddress, bytes extraData, uint32 destGasAmount)") + if err != nil { + return nil, [32]byte{}, err + } + var decodedSourceTokenData sourceTokenData + err = sourceTokenDataType.DecodeStruct(encodedSourceTokenData, &decodedSourceTokenData) + if err != nil { + return nil, [32]byte{}, err + } + payloadHash := decodedSourceTokenData.extraData + if len(payloadHash) != 32 { + s.lggr.Warnw("SourceTokenData.extraData is not 32 bytes. LBTC Attestation probably disabled onchain", "payloadHash", payloadHash) + } + payload, err := s.lbtcReader.GetLBTCMessageInTx(ctx, payloadHash, msg.TxHash) + if err != nil { + return nil, [32]byte{}, err + } + actualPayloadHash := sha256.Sum256(payload) + if bytes.Equal(actualPayloadHash[:], payloadHash) { + return payload, [32]byte(payloadHash), nil + } + return nil, [32]byte{}, fmt.Errorf("payload hash mismatch: expected %x, got %x", payloadHash, actualPayloadHash) } func (s *TokenDataReader) callAttestationApi(ctx context.Context, lbtcMessageHash [32]byte) (attestationResponse, error) { @@ -210,8 +271,15 @@ func (s *TokenDataReader) callAttestationApi(ctx context.Context, lbtcMessageHas return attestationResponse{}, nil } -func encodeMessageAndAttestation(messageBody []byte, attestation string) ([]byte, error) { - return nil, nil +func encodePayloadAndProof(payload []byte, attestation string) ([]byte, error) { + proofBytes, err := hexutil.Decode(attestation) + if err != nil { + return nil, fmt.Errorf("failed to decode response attestation: %w", err) + } + return abihelpers.EncodeAbiStruct[payloadAndProof](payloadAndProof{ + Payload: payload, + Proof: proofBytes, + }) } func (s *TokenDataReader) setCoolDownPeriod(d time.Duration) { diff --git a/core/services/relay/evm/exec_provider.go b/core/services/relay/evm/exec_provider.go index 2b167ed74f..5c8723d2e0 100644 --- a/core/services/relay/evm/exec_provider.go +++ b/core/services/relay/evm/exec_provider.go @@ -131,7 +131,7 @@ func (s *SrcExecProvider) Close() error { if s.lbtcConfig.AttestationAPI == "" { return nil } - return ccip.CloseLBTCReader(s.lggr, s.lggr.Name(), s.lbtcConfig.SourceMessageTransmitterAddress, s.lp) + return s.lbtcReader.Close() }) var multiErr error for _, fn := range unregisterFuncs { @@ -233,6 +233,7 @@ func (s *SrcExecProvider) NewTokenDataReader(ctx context.Context, tokenAddress c } return lbtc.NewLBTCTokenDataReader( s.lggr, + s.lbtcReader, attestationURI, int(s.lbtcConfig.AttestationAPITimeoutSeconds), tokenAddr,