@@ -10,7 +10,6 @@ use solana_zk_sdk::zk_elgamal_proof_program::{
10
10
CiphertextCiphertextEqualityProofData , CiphertextCommitmentEqualityProofData ,
11
11
} ,
12
12
} ;
13
- use spl_pod:: optional_keys:: OptionalNonZeroPubkey ;
14
13
#[ cfg( feature = "serde-traits" ) ]
15
14
use {
16
15
crate :: serialization:: aeciphertext_fromstr,
30
29
pubkey:: Pubkey ,
31
30
} ,
32
31
solana_zk_sdk:: encryption:: pod:: { auth_encryption:: PodAeCiphertext , elgamal:: PodElGamalPubkey } ,
33
- spl_pod:: optional_keys:: OptionalNonZeroElGamalPubkey ,
32
+ spl_pod:: optional_keys:: { OptionalNonZeroElGamalPubkey , OptionalNonZeroPubkey } ,
34
33
} ;
35
34
36
35
/// Confidential Transfer extension instructions
@@ -186,6 +185,7 @@ pub struct InitializeMintData {
186
185
/// The ElGamal pubkey used to encrypt the confidential supply
187
186
pub supply_elgamal_pubkey : OptionalNonZeroElGamalPubkey ,
188
187
/// The initial 0 supply ecrypted with the supply aes key
188
+ #[ cfg_attr( feature = "serde-traits" , serde( with = "aeciphertext_fromstr" ) ) ]
189
189
pub decryptable_supply : PodAeCiphertext ,
190
190
}
191
191
@@ -268,7 +268,7 @@ pub struct BurnInstructionData {
268
268
pub fn initialize_mint (
269
269
token_program_id : & Pubkey ,
270
270
mint : & Pubkey ,
271
- authority : Option < Pubkey > ,
271
+ authority : Pubkey ,
272
272
confidential_supply_pubkey : Option < PodElGamalPubkey > ,
273
273
decryptable_supply : Option < PodAeCiphertext > ,
274
274
) -> Result < Instruction , ProgramError > {
@@ -281,6 +281,7 @@ pub fn initialize_mint(
281
281
PodAeCiphertext :: zeroed ( )
282
282
} ;
283
283
284
+ let authority = Some ( authority) ;
284
285
Ok ( encode_instruction (
285
286
token_program_id,
286
287
accounts,
0 commit comments