You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`config`| <nobr>`Account<Config>`</nobr> | No | Router config PDA. <br/>**Derivation**: `["config"]` under the `ccip_router` program. |
452
-
|`token_admin_registry`| <nobr>`Account<TokenAdminRegistry>`</nobr> | Yes | Existing token admin registry PDA. <br/>**Derivation**: `["token_admin_registry", mint]` under the `ccip_router` program. |
453
-
|`authority`| <nobr>`Signer<'info>`</nobr> | Yes | Must be the current administrator of the token admin registry. |
454
-
455
-
##### Authorization
456
-
457
-
-**Caller**: Must be the current `administrator` listed in the TokenAdminRegistry PDA
458
-
459
-
##### Auto-Derivation Impact
460
-
461
-
-**Enabled (`true`)**: The Router validates only static accounts in the Address Lookup Table, allowing the pool to handle additional dynamically-derived accounts
462
-
-**Disabled (`false`)**: The Router validates all accounts against the static Address Lookup Table, expecting a complete and fixed account set
Copy file name to clipboardExpand all lines: src/content/ccip/concepts/cross-chain-token/svm/architecture.mdx
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,12 +95,11 @@ The CCIP Router program is central to cross-chain token management. It has two f
95
95
96
96
For detailed step-by-step procedures, sequence diagrams, and complete registration workflows, see [Registration & Administration](/ccip/concepts/cross-chain-token/svm/registration-administration).
97
97
98
-
-**Pool configuration:** The TokenAdminRegistry maps each mint to exactly one token pool configuration through the ALT. This ensures that during cross-chain transfers, only the authorized token pool implementation can interact with the token. The registry also includes a `supports_auto_derivation` flag for enhanced account derivation capabilities.
98
+
-**Pool configuration:** The TokenAdminRegistry maps each mint to exactly one token pool configuration through the ALT. This ensures that during cross-chain transfers, only the authorized token pool implementation can interact with the token.
99
99
-**Security Architecture:** The one-to-one mapping between tokens and pools provides critical security guarantees:
100
100
-**Single Authorized Pool:** Each token mint can only have one authorized pool configuration, preventing unauthorized token handling
101
101
-**Atomic Pool Updates:** Changing pool configurations requires updating the entire ALT reference, ensuring consistent state
102
102
-**Access Control:** Only the registry administrator can modify pool assignments, maintaining strict governance
103
-
-**Enhanced Account Derivation:** When `supports_auto_derivation` is enabled, token pools can dynamically derive additional accounts during cross-chain operations. This allows pools to handle complex transfer scenarios with varying account requirements while maintaining security through the registry's controlled environment.
104
103
105
104
1.**Lock or Burn Flow (when sending tokens cross-chain)**
The [`set_pool_supports_auto_derivation`](/ccip/api-reference/svm/v1.6.0/router#set_pool_supports_auto_derivation) instruction allows a token administrator to configure whether their token pool supports automatic account derivation for cross-chain transfers. This setting affects how the CCIP Router validates and handles account lists during token transfer operations.
171
-
172
-
**Auto-Derivation Capability:** When enabled (`supports_auto_derivation = true`), the token pool can dynamically derive additional accounts and lookup tables required for cross-chain operations by implementing `derive_accounts_lock_or_burn` and `derive_accounts_release_or_mint` functions. This provides flexibility for pools that need message-dependent or dynamically calculated account sets.
173
-
174
-
**Account Validation Impact:**
175
-
176
-
-**Auto-derivation enabled**: The Router validates only the static accounts present in the Address Lookup Table, allowing the pool to handle validation of additional dynamically-derived accounts.
177
-
-**Auto-derivation disabled**: The Router validates all accounts against the static Address Lookup Table, expecting a complete and fixed account set.
178
-
179
-
**Administrative Control:** Only the current token administrator can modify this setting, ensuring that pool configuration changes are properly authorized. The function updates the `supports_auto_derivation` flag in the `TokenAdminRegistry` PDA and emits a `PoolEdited` event for transparency.
Once you have registered your token and set the token pool via the Router, you need to configure the specific pool parameters. These operations are performed directly on the Token Pool programs, not the Router.
@@ -253,7 +233,7 @@ Configure transfer limits and access controls for your token pool:
-**Use Case:** Apply or modify the remote blockchain's inbound/outbound rate-limit configuration. This uses a token bucket algorithm in which you can configure the capacity (maximum tokens) and rate (tokens per second refill rate) for both inbound and outbound transfers.
256
-
-**Authorization:** Pool Owner OR Rate Limit Admin
236
+
-**Authorization:** Pool Owner only
257
237
- Read the [API reference](/ccip/api-reference/svm/v1.6.0/burn-mint-token-pool#set_chain_rate_limit) to learn more.
0 commit comments