feat: create v2-prep branch with comprehensive planning

Restructured project for V2 refactor:

**Structure Changes:**
- Moved all V1 code to orig/ folder (preserved with git mv)
- Created docs/planning/ directory
- Added orig/README_V1.md explaining V1 preservation

**Planning Documents:**
- 00_V2_MASTER_PLAN.md: Complete architecture overview
  - Executive summary of critical V1 issues
  - High-level component architecture diagrams
  - 5-phase implementation roadmap
  - Success metrics and risk mitigation

- 07_TASK_BREAKDOWN.md: Atomic task breakdown
  - 99+ hours of detailed tasks
  - Every task < 2 hours (atomic)
  - Clear dependencies and success criteria
  - Organized by implementation phase

**V2 Key Improvements:**
- Per-exchange parsers (factory pattern)
- Multi-layer strict validation
- Multi-index pool cache
- Background validation pipeline
- Comprehensive observability

**Critical Issues Addressed:**
- Zero address tokens (strict validation + cache enrichment)
- Parsing accuracy (protocol-specific parsers)
- No audit trail (background validation channel)
- Inefficient lookups (multi-index cache)
- Stats disconnection (event-driven metrics)

Next Steps:
1. Review planning documents
2. Begin Phase 1: Foundation (P1-001 through P1-010)
3. Implement parsers in Phase 2
4. Build cache system in Phase 3
5. Add validation pipeline in Phase 4
6. Migrate and test in Phase 5

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
Administrator
2025-11-10 10:14:26 +01:00
parent 1773daffe7
commit 803de231ba
411 changed files with 20390 additions and 8680 deletions

View File

@@ -0,0 +1,43 @@
package main
import (
"log/slog"
"github.com/ethereum/go-ethereum/ethclient"
"github.com/fraktal/mev-beta/pkg/dex"
)
// InitializeDEXIntegration initializes the multi-DEX system
func InitializeDEXIntegration(client *ethclient.Client, logger *slog.Logger) (*dex.MEVBotIntegration, error) {
logger.Info("Initializing multi-DEX integration...")
// Create integration
integration, err := dex.NewMEVBotIntegration(client, logger)
if err != nil {
return nil, err
}
// Log active DEXes
activeDEXes := integration.GetActiveDEXes()
dexCount := integration.GetDEXCount()
logger.Info("Multi-DEX integration ready",
"active_dexes", dexCount,
"dexes", activeDEXes,
)
return integration, nil
}
// DEXConfig holds DEX configuration loaded from file
type DEXConfig struct {
Config *dex.Config
}
// LoadDEXConfig loads DEX configuration
func LoadDEXConfig() *dex.Config {
// For now, use production config
// TODO: Load from config file when implementing full config system
return dex.ProductionConfig()
}

800
orig/cmd/mev-bot/main.go Normal file
View File

@@ -0,0 +1,800 @@
package main
import (
"context"
// "crypto/tls" // Temporarily commented out - not used without security manager
"fmt"
"math/big"
"net/url"
"os"
"os/signal"
"strconv"
"strings"
"syscall"
"time"
// "github.com/ethereum/go-ethereum/common" // Not used - pool discovery disabled
"github.com/joho/godotenv"
"github.com/urfave/cli/v2"
"github.com/fraktal/mev-beta/internal/config"
"github.com/fraktal/mev-beta/internal/logger"
"github.com/fraktal/mev-beta/internal/monitoring"
// "github.com/fraktal/mev-beta/internal/tokens" // Not used - pool discovery disabled
"github.com/fraktal/mev-beta/pkg/arbitrage"
"github.com/fraktal/mev-beta/pkg/metrics"
"github.com/fraktal/mev-beta/pkg/pools"
"github.com/fraktal/mev-beta/pkg/security"
pkgtokens "github.com/fraktal/mev-beta/pkg/tokens"
"github.com/fraktal/mev-beta/pkg/transport"
)
func main() {
app := &cli.App{
Name: "mev-bot",
Usage: "An MEV bot that monitors Arbitrum sequencer for swap opportunities",
Commands: []*cli.Command{
{
Name: "start",
Usage: "Start the MEV bot",
Action: func(c *cli.Context) error {
return startBot()
},
},
{
Name: "scan",
Usage: "Scan for potential arbitrage opportunities",
Action: func(c *cli.Context) error {
return scanOpportunities()
},
},
},
}
if err := app.Run(os.Args); err != nil {
fmt.Fprintf(os.Stderr, "Error: %v\n", err)
os.Exit(1)
}
}
func startBot() error {
// Load environment variables based on GO_ENV
envMode := strings.ToLower(os.Getenv("GO_ENV"))
if envMode == "" {
envMode = "development"
}
var envFile string
if envMode == "development" {
envFile = ".env"
} else {
envFile = fmt.Sprintf(".env.%s", envMode)
}
if _, err := os.Stat(envFile); err == nil {
if err := godotenv.Load(envFile); err != nil {
fmt.Printf("Warning: failed to load %s: %v\n", envFile, err)
} else {
fmt.Printf("Loaded environment variables from %s\n", envFile)
}
} else {
fmt.Printf("Warning: %s not found; proceeding without mode-specific env overrides\n", envFile)
}
// Load configuration based on GO_ENV
// SECURITY FIX: Respect GO_ENV to prevent accidental production config loading in development
var configFile string
switch envMode {
case "production":
configFile = "config/arbitrum_production.yaml"
if _, err := os.Stat(configFile); err != nil {
return fmt.Errorf("production config not found: %s (create from arbitrum_production.yaml.template)", configFile)
}
case "staging":
configFile = "config/staging.yaml"
if _, err := os.Stat(configFile); err != nil {
return fmt.Errorf("staging config not found: %s", configFile)
}
default: // development
// In development, prefer local.yaml > config.yaml
if _, err := os.Stat("config/local.yaml"); err == nil {
configFile = "config/local.yaml"
} else {
configFile = "config/config.yaml"
}
}
fmt.Printf("Using configuration: %s (GO_ENV=%s)\n", configFile, envMode)
fmt.Printf("DEBUG: [1/20] About to load config file...\n")
cfg, err := config.Load(configFile)
if err != nil {
return fmt.Errorf("failed to load config: %w", err)
}
fmt.Printf("DEBUG: [2/20] ✅ Config loaded successfully\n")
// Initialize logger
fmt.Printf("DEBUG: [3/20] Initializing logger...\n")
log := logger.New(cfg.Log.Level, cfg.Log.Format, cfg.Log.File)
fmt.Printf("DEBUG: [4/20] ✅ Logger initialized\n")
log.Info(fmt.Sprintf("Starting MEV bot with Enhanced Security - Config: %s", configFile))
// Validate RPC endpoints for security
fmt.Printf("DEBUG: [5/20] Validating RPC endpoints...\n")
if err := validateRPCEndpoint(cfg.Arbitrum.RPCEndpoint); err != nil {
return fmt.Errorf("RPC endpoint validation failed: %w", err)
}
if cfg.Arbitrum.WSEndpoint != "" {
if err := validateRPCEndpoint(cfg.Arbitrum.WSEndpoint); err != nil {
return fmt.Errorf("WebSocket endpoint validation failed: %w", err)
}
}
fmt.Printf("DEBUG: [6/20] ✅ RPC endpoints validated\n")
log.Debug(fmt.Sprintf("RPC Endpoint: %s", cfg.Arbitrum.RPCEndpoint))
log.Debug(fmt.Sprintf("WS Endpoint: %s", cfg.Arbitrum.WSEndpoint))
log.Debug(fmt.Sprintf("Chain ID: %d", cfg.Arbitrum.ChainID))
// Initialize comprehensive security framework
// Check if security manager should be enabled via environment variable
var securityManager *security.SecurityManager
if os.Getenv("SECURITY_MANAGER_ENABLED") == "true" || envMode == "production" {
log.Info("🔒 Initializing security manager...")
securityKeyDir := getEnvOrDefault("MEV_BOT_KEYSTORE_PATH", "keystore")
securityConfig := &security.SecurityConfig{
KeyStoreDir: securityKeyDir,
EncryptionEnabled: true,
TransactionRPS: 100,
RPCRPS: 200,
MaxBurstSize: 50,
FailureThreshold: 5,
RecoveryTimeout: 5 * time.Minute,
// TLSMinVersion: tls.VersionTLS12, // TLS 1.2 minimum - commented out to avoid import
EmergencyStopFile: "emergency.stop",
MaxGasPrice: "50000000000", // 50 gwei
AlertWebhookURL: os.Getenv("SECURITY_WEBHOOK_URL"),
LogLevel: cfg.Log.Level,
RPCURL: cfg.Arbitrum.RPCEndpoint,
}
var err error
securityManager, err = security.NewSecurityManager(securityConfig)
if err != nil {
log.Warn(fmt.Sprintf("Failed to initialize security manager: %v (continuing without security)", err))
securityManager = nil
} else {
defer func() {
shutdownCtx, cancelShutdown := context.WithTimeout(context.Background(), 15*time.Second)
defer cancelShutdown()
if err := securityManager.Shutdown(shutdownCtx); err != nil {
log.Error("Failed to shutdown security manager", "error", err)
}
}()
log.Info("✅ Security framework initialized successfully")
}
} else {
log.Warn("⚠️ Security manager DISABLED (set SECURITY_MANAGER_ENABLED=true to enable)")
}
// Initialize metrics collector
fmt.Printf("DEBUG: [7/20] Initializing metrics collector...\n")
metricsCollector := metrics.NewMetricsCollector(log)
fmt.Printf("DEBUG: [8/20] ✅ Metrics collector initialized\n")
// Start metrics server if enabled
var metricsServer *metrics.MetricsServer
if os.Getenv("METRICS_ENABLED") == "true" {
fmt.Printf("DEBUG: Starting metrics server...\n")
metricsPort := os.Getenv("METRICS_PORT")
if metricsPort == "" {
metricsPort = "9090"
}
metricsServer = metrics.NewMetricsServer(metricsCollector, log, metricsPort)
go func() {
if err := metricsServer.Start(); err != nil {
log.Error("Metrics server error: ", err)
}
}()
log.Info(fmt.Sprintf("Metrics server started on port %s", metricsPort))
}
// Initialize unified provider manager
fmt.Printf("DEBUG: [9/20] Initializing provider manager...\n")
log.Info("Initializing provider manager with separate read-only, execution, and testing pools...")
// Use existing providers.yaml config file for runtime
// SECURITY NOTE: providers.yaml should not be committed with actual credentials
// Use providers.yaml.template as reference and create providers.yaml locally
providerConfigPath := "config/providers.yaml"
if _, err := os.Stat(providerConfigPath); err != nil {
return fmt.Errorf("providers config not found: %s (create from providers.yaml.template)", providerConfigPath)
}
providerManager, err := transport.NewUnifiedProviderManager(providerConfigPath)
if err != nil {
return fmt.Errorf("failed to initialize provider manager: %w", err)
}
fmt.Printf("DEBUG: [10/20] ✅ Provider manager initialized\n")
defer func() {
if err := providerManager.Close(); err != nil {
log.Error("Failed to close provider manager", "error", err)
}
}()
// Get execution client for transaction operations
fmt.Printf("DEBUG: [11/20] Getting execution client...\n")
executionClient, err := providerManager.GetExecutionHTTPClient()
if err != nil {
return fmt.Errorf("failed to get execution client: %w", err)
}
fmt.Printf("DEBUG: [12/20] ✅ Execution client obtained\n")
// Log provider statistics
providerStats := providerManager.GetAllStats()
log.Info(fmt.Sprintf("Provider manager initialized with %d pool(s)", len(providerStats)-1)) // -1 for summary
// Create key manager for secure transaction signing
fmt.Printf("DEBUG: [13/20] Creating key manager...\n")
encryptionKey := os.Getenv("MEV_BOT_ENCRYPTION_KEY")
if encryptionKey == "" {
return fmt.Errorf("MEV_BOT_ENCRYPTION_KEY environment variable is required for secure operations")
}
keystorePath := getEnvOrDefault("MEV_BOT_KEYSTORE_PATH", "keystore")
if strings.TrimSpace(keystorePath) == "" {
keystorePath = "keystore"
}
log.Info(fmt.Sprintf("Using keystore path: %s", keystorePath))
keyManagerConfig := &security.KeyManagerConfig{
KeystorePath: keystorePath,
EncryptionKey: encryptionKey,
KeyRotationDays: 30,
MaxSigningRate: 100,
SessionTimeout: time.Hour,
AuditLogPath: getEnvOrDefault("MEV_BOT_AUDIT_LOG", "logs/audit.log"),
BackupPath: getEnvOrDefault("MEV_BOT_BACKUP_PATH", "backups"),
}
keyManager, err := security.NewKeyManager(keyManagerConfig, log)
if err != nil {
return fmt.Errorf("failed to create key manager: %w", err)
}
fmt.Printf("DEBUG: [14/20] ✅ Key manager created\n")
// Setup graceful shutdown BEFORE creating services
fmt.Printf("DEBUG: [15/20] Setting up context and shutdown handlers...\n")
ctx, cancel := context.WithCancel(context.Background())
defer cancel() // Ensure context is canceled on function exit
// Get read-only provider pool for RPC operations
fmt.Printf("DEBUG: [16/20] Getting read-only provider pool...\n")
readOnlyPool, err := providerManager.GetPoolForMode(transport.ModeReadOnly)
if err != nil {
return fmt.Errorf("failed to get read-only provider pool: %w", err)
}
// Get RPC client for pool discovery
fmt.Printf("DEBUG: [17/20] Getting RPC client for pool discovery...\n")
rpcClient, err := readOnlyPool.GetRPCClient(false) // Use HTTP for reliability
if err != nil {
return fmt.Errorf("failed to get RPC client for pool discovery: %w", err)
}
fmt.Printf("DEBUG: [18/20] ✅ RPC client obtained\n")
// Initialize Pool Discovery System BEFORE arbitrage check
fmt.Printf("DEBUG: [19/20] Initializing pool discovery system...\n")
log.Info("Initializing pool discovery system...")
poolDiscovery := pools.NewPoolDiscovery(rpcClient, log)
poolCount := poolDiscovery.GetPoolCount()
log.Info(fmt.Sprintf("✅ Loaded %d pools from cache", poolCount))
fmt.Printf("DEBUG: [20/20] ✅ Pool discovery initialized (loaded %d pools)\n", poolCount)
// 🚀 ACTIVE POOL DISCOVERY: DISABLED during startup to prevent hang
// CRITICAL FIX: The comprehensive pool discovery loop makes 190 RPC calls
// Some calls to DiscoverPoolsForTokenPair() hang/timeout (especially WETH/GRT pair 0-9)
// This blocks bot startup for 5+ minutes, preventing operational use
//
// SOLUTION: Skip discovery loop during startup - we already have 314 pools from cache
// Pool discovery can be run as a background task AFTER bot starts
//
// Evidence from logs:
// - Bot hangs at pair 0-9 (WETH/GRT) consistently
// - Bot was working with 330 pools at 06:02 UTC (no discovery loop blocking)
// - 314 pools already loaded from cache is sufficient for initial operation
fmt.Printf("DEBUG: [21/25] Skipping comprehensive pool discovery (prevents startup hang)\n")
fmt.Printf("DEBUG: [22/25] About to call first log.Info...\n")
log.Info("⚠️ SKIPPED: Comprehensive pool discovery loop (prevents 5min startup hang)")
fmt.Printf("DEBUG: [23/25] ✅ First log.Info completed\n")
fmt.Printf("DEBUG: [24/25] About to call poolDiscovery.GetPoolCount()...\n")
poolCount2 := poolDiscovery.GetPoolCount()
fmt.Printf("DEBUG: [25/25] ✅ GetPoolCount returned: %d\n", poolCount2)
log.Info(fmt.Sprintf("📊 Using cached pools only - %d pools loaded from data/pools.json", poolCount2))
fmt.Printf("DEBUG: [26/30] ✅ Second log.Info completed\n")
log.Info("💡 TIP: Run pool discovery as background task after bot starts")
fmt.Printf("DEBUG: [27/30] ✅ Third log.Info completed\n")
// Variables kept for future use when pool discovery is re-enabled
_ = poolCount2 // totalPools - unused but kept for later
_ = 0 // discoveredPools - unused
_ = 0 // discoveredPairs - unused
fmt.Printf("DEBUG: [28/30] ✅ Pool discovery section complete\n")
// Pool discovery loop DISABLED - uncomment below to re-enable (causes 5min+ startup hang)
/*
fmt.Printf("DEBUG: [21/25] About to start pool discovery...\n")
log.Info("🔍 Starting comprehensive pool discovery for TOP 20 tokens (190 pairs expected)...")
fmt.Printf("DEBUG: [22/25] Pool discovery log message sent\n")
discoveredPools := 0
discoveredPairs := 0
// Get all token addresses from configuration
fmt.Printf("DEBUG: [23/25] Getting Arbitrum tokens...\n")
arbTokens := tokens.GetArbitrumTokens()
fmt.Printf("DEBUG: [24/25] ✅ Got Arbitrum tokens\n")
// Build comprehensive token list - TOP 20 TOKENS
fmt.Printf("DEBUG: [25/30] Building token list...\n")
tokenList := []struct {
name string
address common.Address
}{
// Tier 1 - Major Assets (10)
{"WETH", arbTokens.WETH},
{"USDC", arbTokens.USDC},
{"USDT", arbTokens.USDT},
{"ARB", arbTokens.ARB},
{"WBTC", arbTokens.WBTC},
{"DAI", arbTokens.DAI},
{"LINK", arbTokens.LINK},
{"UNI", arbTokens.UNI},
{"GMX", arbTokens.GMX},
{"GRT", arbTokens.GRT},
// Tier 2 - DeFi Blue Chips (5)
{"USDC.e", arbTokens.USDCe},
{"PENDLE", arbTokens.PENDLE},
{"RDNT", arbTokens.RDNT},
{"MAGIC", arbTokens.MAGIC},
{"GRAIL", arbTokens.GRAIL},
// Tier 3 - Additional High Volume (5)
{"AAVE", arbTokens.AAVE},
{"CRV", arbTokens.CRV},
{"BAL", arbTokens.BAL},
{"COMP", arbTokens.COMP},
{"MKR", arbTokens.MKR},
}
fmt.Printf("DEBUG: [26/30] ✅ Token list built (%d tokens)\n", len(tokenList))
// Discover pools for all token pairs
fmt.Printf("DEBUG: [27/30] Creating discovery context with 5min timeout...\n")
discoveryCtx, discoveryCancel := context.WithTimeout(ctx, 5*time.Minute)
defer discoveryCancel()
fmt.Printf("DEBUG: [28/30] ✅ Discovery context created\n")
fmt.Printf("DEBUG: [29/30] Starting nested loop for %d token pairs...\n", (len(tokenList)*(len(tokenList)-1))/2)
for i := 0; i < len(tokenList); i++ {
for j := i + 1; j < len(tokenList); j++ {
token0 := tokenList[i]
token1 := tokenList[j]
fmt.Printf("DEBUG: [LOOP] Discovering pools for %s/%s (pair %d-%d)...\n", token0.name, token1.name, i, j)
// Discover pools for this token pair
pools, err := poolDiscovery.DiscoverPoolsForTokenPair(token0.address, token1.address)
if err != nil {
log.Debug(fmt.Sprintf("No pools found for %s/%s: %v", token0.name, token1.name, err))
continue
}
if len(pools) > 0 {
discoveredPools += len(pools)
discoveredPairs++
log.Info(fmt.Sprintf("✅ Found %d pool(s) for %s/%s", len(pools), token0.name, token1.name))
}
// Check context to allow early termination if needed
select {
case <-discoveryCtx.Done():
log.Warn("Pool discovery interrupted by context cancellation")
goto discoveryComplete
default:
// Continue discovery
}
}
}
discoveryComplete:
totalPools := poolDiscovery.GetPoolCount()
log.Info(fmt.Sprintf("🎉 Pool discovery complete! Monitoring %d pools across %d pairs", totalPools, discoveredPairs))
log.Info(fmt.Sprintf("📊 Discovery summary: %d new pools discovered, %d pairs active", discoveredPools, discoveredPairs))
// 🔧 FIX #1: Save discovered pools to disk cache
log.Info("💾 Saving pool cache to disk...")
poolDiscovery.SavePoolCache()
log.Info("✅ Pool cache saved successfully to data/pools.json")
*/
// Create arbitrage database
fmt.Printf("DEBUG: [29/35] Creating arbitrage database...\n")
arbitrageDB, err := arbitrage.NewSQLiteDatabase(cfg.Database.File, log)
if err != nil {
return fmt.Errorf("failed to create arbitrage database: %w", err)
}
fmt.Printf("DEBUG: [30/35] ✅ Arbitrage database created\n")
defer func() {
if err := arbitrageDB.Close(); err != nil {
log.Error("Failed to close arbitrage database", "error", err)
}
}()
// Check if arbitrage service is enabled
fmt.Printf("DEBUG: [31/35] Checking if arbitrage service is enabled...\n")
if !cfg.Arbitrage.Enabled {
log.Info("Arbitrage service is disabled in configuration")
return fmt.Errorf("arbitrage service disabled - enable in config to run")
}
fmt.Printf("DEBUG: [32/35] ✅ Arbitrage service is enabled\n")
// Initialize Token Metadata Cache
fmt.Printf("DEBUG: [33/35] Initializing token metadata cache...\n")
log.Info("Initializing token metadata cache...")
tokenCache := pkgtokens.NewMetadataCache(log)
fmt.Printf("DEBUG: [34/35] ✅ Token metadata cache initialized\n")
// CRITICAL FIX #4: Populate token cache with all 20 known Arbitrum tokens
// This ensures the detection engine has pricing data for all major tokens
// Previously only 6 tokens were loaded, preventing pair creation
fmt.Printf("DEBUG: [34.5/35] Populating token cache with 20 known tokens...\n")
tokenCache.PopulateWithKnownTokens()
fmt.Printf("DEBUG: [34.7/35] ✅ Token cache populated\n")
fmt.Printf("DEBUG: [35/45] Calling tokenCache.Count()...\n")
tokenCount := tokenCache.Count()
fmt.Printf("DEBUG: [36/45] ✅ tokenCache.Count() returned: %d\n", tokenCount)
log.Info(fmt.Sprintf("✅ Loaded %d tokens from cache (including 20 known Arbitrum tokens)", tokenCount))
fmt.Printf("DEBUG: [37/45] ✅ Token count logged\n")
// Create arbitrage service with context and pool discovery
fmt.Printf("DEBUG: [38/45] About to log 'Creating arbitrage service'...\n")
log.Info("Creating arbitrage service...")
fmt.Printf("DEBUG: [39/45] About to call arbitrage.NewArbitrageServiceWithFullConfig()...\n")
// PHASE 1: Pass full config for L2 optimizations
arbitrageService, err := arbitrage.NewArbitrageServiceWithFullConfig(
ctx,
executionClient,
log,
cfg, // Full config for L2 optimizations
&cfg.Arbitrage, // Legacy arbitrage config
keyManager,
arbitrageDB,
poolDiscovery,
tokenCache,
)
if err != nil {
return fmt.Errorf("failed to create arbitrage service: %w", err)
}
fmt.Printf("DEBUG: [40/45] ✅ Arbitrage service created successfully\n")
// Initialize data integrity monitoring system
fmt.Printf("DEBUG: [41/45] Initializing integrity monitor...\n")
log.Info("Initializing data integrity monitoring system...")
integrityMonitor := monitoring.NewIntegrityMonitor(log)
fmt.Printf("DEBUG: [42/45] ✅ Integrity monitor initialized\n")
// Initialize dashboard server
fmt.Printf("DEBUG: [43/45] Setting up dashboard server...\n")
dashboardPort := 60376
if portEnv := os.Getenv("DASHBOARD_PORT"); portEnv != "" {
if port, err := strconv.Atoi(portEnv); err == nil {
dashboardPort = port
}
}
fmt.Printf("DEBUG: [44/45] Creating dashboard server on port %d...\n", dashboardPort)
dashboardServer := monitoring.NewDashboardServer(log, integrityMonitor, integrityMonitor.GetHealthCheckRunner(), dashboardPort)
fmt.Printf("DEBUG: [45/45] ✅ Dashboard server created\n")
// Start dashboard server
fmt.Printf("DEBUG: [46/50] Starting dashboard server goroutine...\n")
go func() {
// TEMPORARY FIX: Skip log.Info inside goroutine - may be causing deadlock
// log.Info(fmt.Sprintf("Starting monitoring dashboard on port %d...", dashboardPort))
fmt.Printf("DEBUG: [GOROUTINE] Starting dashboard server on port %d...\n", dashboardPort)
if err := dashboardServer.Start(); err != nil {
fmt.Printf("DEBUG: [GOROUTINE] Dashboard server error: %v\n", err)
// log.Error("Dashboard server error", "error", err)
}
}()
fmt.Printf("DEBUG: [47/50] ✅ Dashboard goroutine started\n")
// Start integrity monitoring
fmt.Printf("DEBUG: [48/50] Starting integrity monitor goroutine...\n")
go func() {
// TEMPORARY FIX: Skip log.Info inside goroutine - may be causing deadlock
// log.Info("Starting integrity monitoring...")
fmt.Printf("DEBUG: [GOROUTINE] Starting integrity monitoring...\n")
integrityMonitor.StartHealthCheckRunner(ctx)
}()
fmt.Printf("DEBUG: [49/50] ✅ Integrity monitor goroutine started\n")
fmt.Printf("DEBUG: [50/50] About to log monitoring system messages...\n")
log.Info("Data integrity monitoring system initialized successfully")
fmt.Printf("DEBUG: [51/55] ✅ First monitoring log completed\n")
log.Info(fmt.Sprintf("Dashboard available at http://localhost:%d", dashboardPort))
fmt.Printf("DEBUG: [52/55] ✅ Second monitoring log completed\n")
fmt.Printf("DEBUG: [53/60] Setting up signal handlers...\n")
sigChan := make(chan os.Signal, 1)
signal.Notify(sigChan, syscall.SIGINT, syscall.SIGTERM)
// Handle signals in a goroutine to cancel context immediately
go func() {
<-sigChan
fmt.Printf("DEBUG: [SIGNAL] Shutdown signal received\n")
log.Info("Shutdown signal received, canceling context...")
cancel() // This will cancel the context and stop all operations
}()
fmt.Printf("DEBUG: [54/60] ✅ Signal handlers ready\n")
// Start the arbitrage service with context
fmt.Printf("DEBUG: [55/60] About to start arbitrage service...\n")
log.Info("Starting arbitrage service...")
fmt.Printf("DEBUG: [56/60] ✅ Log message completed\n")
errChan := make(chan error, 1)
fmt.Printf("DEBUG: [57/60] Starting arbitrage service goroutine...\n")
go func() {
fmt.Printf("DEBUG: [GOROUTINE] Calling arbitrageService.Start()...\n")
if err := arbitrageService.Start(); err != nil {
errChan <- fmt.Errorf("arbitrage service error: %w", err)
}
}()
defer func() {
if err := arbitrageService.Stop(); err != nil {
log.Error("Failed to stop arbitrage service", "error", err)
}
}()
fmt.Printf("DEBUG: [58/60] ✅ Arbitrage service goroutine started\n")
log.Info("Arbitrage service started successfully")
fmt.Printf("DEBUG: [59/60] ✅ Arbitrage service confirmed started\n")
log.Info("MEV bot started successfully - monitoring for arbitrage opportunities...")
log.Info("Press Ctrl+C to stop the bot gracefully...")
fmt.Printf("DEBUG: [60/60] ✅✅✅ BOT FULLY STARTED - Entering main loop ✅✅✅\n")
// Wait for context cancellation or error
select {
case <-ctx.Done():
log.Info("Context canceled, stopping MEV bot...")
case err := <-errChan:
log.Error("Service error occurred: ", err)
return err
}
// Stop monitoring services
log.Info("Stopping monitoring services...")
if err := dashboardServer.Stop(); err != nil {
log.Error("Failed to stop dashboard server gracefully", "error", err)
}
integrityMonitor.StopHealthCheckRunner()
// Stop metrics server if running
if metricsServer != nil {
if err := metricsServer.Stop(); err != nil {
log.Error("Failed to stop metrics server gracefully", "error", err)
}
}
// Get final stats
stats := arbitrageService.GetStats()
log.Info(fmt.Sprintf("Final Statistics - Opportunities: %d, Executions: %d, Successful: %d, Total Profit: %s ETH",
stats.TotalOpportunitiesDetected,
stats.TotalOpportunitiesExecuted,
stats.TotalSuccessfulExecutions,
formatEther(stats.TotalProfitRealized)))
log.Info("MEV bot stopped gracefully")
return nil
}
// formatEther formats wei amount to ether string
func formatEther(wei *big.Int) string {
if wei == nil {
return "0.000000"
}
eth := new(big.Float).SetInt(wei)
eth.Quo(eth, big.NewFloat(1e18))
return fmt.Sprintf("%.6f", eth)
}
// getEnvOrDefault returns environment variable value or default if not set
func getEnvOrDefault(key, defaultValue string) string {
if value := os.Getenv(key); value != "" {
return value
}
return defaultValue
}
// validateRPCEndpoint validates RPC endpoint URL for security
func validateRPCEndpoint(endpoint string) error {
if endpoint == "" {
return fmt.Errorf("RPC endpoint cannot be empty")
}
u, err := url.Parse(endpoint)
if err != nil {
return fmt.Errorf("invalid RPC endpoint URL: %w", err)
}
// Check for valid schemes
switch u.Scheme {
case "http", "https", "ws", "wss":
// Valid schemes
default:
return fmt.Errorf("invalid RPC scheme: %s (must be http, https, ws, or wss)", u.Scheme)
}
// Check for localhost/private networks in production
if strings.Contains(u.Hostname(), "localhost") || strings.Contains(u.Hostname(), "127.0.0.1") {
// Allow localhost only if explicitly enabled
if os.Getenv("MEV_BOT_ALLOW_LOCALHOST") != "true" {
return fmt.Errorf("localhost RPC endpoints not allowed in production (set MEV_BOT_ALLOW_LOCALHOST=true to override)")
}
}
// Validate hostname is not empty
if u.Hostname() == "" {
return fmt.Errorf("RPC endpoint must have a valid hostname")
}
return nil
}
func scanOpportunities() error {
fmt.Println("Scanning for arbitrage opportunities...")
// Load configuration (scan mode uses same config loading as startBot)
envMode := strings.ToLower(os.Getenv("GO_ENV"))
if envMode == "" {
envMode = "development"
}
var configFile string
switch envMode {
case "production":
configFile = "config/arbitrum_production.yaml"
case "staging":
configFile = "config/staging.yaml"
default:
if _, err := os.Stat("config/local.yaml"); err == nil {
configFile = "config/local.yaml"
} else {
configFile = "config/config.yaml"
}
}
cfg, err := config.Load(configFile)
if err != nil {
return fmt.Errorf("failed to load config: %w", err)
}
// Initialize logger
log := logger.New(cfg.Log.Level, cfg.Log.Format, cfg.Log.File)
log.Info(fmt.Sprintf("Starting one-time arbitrage opportunity scan (config: %s)...", configFile))
// Initialize provider manager for scanning
providerManager, err := transport.NewUnifiedProviderManager("config/providers.yaml")
if err != nil {
return fmt.Errorf("failed to initialize provider manager: %w", err)
}
defer func() {
if err := providerManager.Close(); err != nil {
log.Error("Failed to close provider manager in scan mode", "error", err)
}
}()
// Get read-only client for scanning (more efficient)
client, err := providerManager.GetReadOnlyHTTPClient()
if err != nil {
return fmt.Errorf("failed to get read-only client: %w", err)
}
// Create key manager (not used for scanning but needed for service)
encryptionKey := os.Getenv("MEV_BOT_ENCRYPTION_KEY")
if encryptionKey == "" {
return fmt.Errorf("MEV_BOT_ENCRYPTION_KEY environment variable is required")
}
keyManagerConfig := &security.KeyManagerConfig{
KeystorePath: getEnvOrDefault("MEV_BOT_KEYSTORE_PATH", "keystore"),
EncryptionKey: encryptionKey,
KeyRotationDays: 30,
MaxSigningRate: 100,
SessionTimeout: time.Hour,
AuditLogPath: getEnvOrDefault("MEV_BOT_AUDIT_LOG", "logs/audit.log"),
BackupPath: getEnvOrDefault("MEV_BOT_BACKUP_PATH", "backups"),
}
keyManager, err := security.NewKeyManager(keyManagerConfig, log)
if err != nil {
return fmt.Errorf("failed to create key manager: %w", err)
}
// Create arbitrage database
arbitrageDB, err := arbitrage.NewSQLiteDatabase(cfg.Database.File, log)
if err != nil {
return fmt.Errorf("failed to create arbitrage database: %w", err)
}
defer func() {
if err := arbitrageDB.Close(); err != nil {
log.Error("Failed to close arbitrage database in scan mode", "error", err)
}
}()
// Get read-only provider pool for RPC operations in scan mode
readOnlyPool, err := providerManager.GetPoolForMode(transport.ModeReadOnly)
if err != nil {
return fmt.Errorf("failed to get read-only provider pool in scan mode: %w", err)
}
// Get RPC client for pool discovery in scan mode
rpcClient, err := readOnlyPool.GetRPCClient(false)
if err != nil {
return fmt.Errorf("failed to get RPC client for pool discovery in scan mode: %w", err)
}
// Initialize pool discovery and token cache for scan mode
poolDiscovery := pools.NewPoolDiscovery(rpcClient, log)
tokenCache := pkgtokens.NewMetadataCache(log)
// Create arbitrage service with scanning enabled but execution disabled
scanConfig := cfg.Arbitrage
scanConfig.MaxConcurrentExecutions = 0 // Disable execution for scan mode
arbitrageService, err := arbitrage.NewArbitrageService(
context.Background(),
client,
log,
&scanConfig,
keyManager,
arbitrageDB,
poolDiscovery,
tokenCache,
)
if err != nil {
return fmt.Errorf("failed to create arbitrage service: %w", err)
}
// Start the service in scan mode
if err := arbitrageService.Start(); err != nil {
return fmt.Errorf("failed to start arbitrage service: %w", err)
}
defer func() {
if err := arbitrageService.Stop(); err != nil {
log.Error("Failed to stop arbitrage service in scan mode", "error", err)
}
}()
// Create context with timeout for scanning
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
defer cancel()
log.Info("Scanning for 30 seconds...")
// Wait for scan duration
<-ctx.Done()
// Get and display results
stats := arbitrageService.GetStats()
log.Info(fmt.Sprintf("Scan Results - Opportunities Detected: %d", stats.TotalOpportunitiesDetected))
// Get recent opportunities from database
history, err := arbitrageDB.GetExecutionHistory(ctx, 10)
if err == nil && len(history) > 0 {
log.Info(fmt.Sprintf("Found %d recent opportunities in database", len(history)))
}
fmt.Printf("Scan completed. Found %d arbitrage opportunities.\n", stats.TotalOpportunitiesDetected)
fmt.Println("Check the database and logs for detailed results.")
return nil
}

BIN
orig/cmd/mev-bot/mev-bot Executable file

Binary file not shown.

233
orig/cmd/swap-cli/README.md Normal file
View File

@@ -0,0 +1,233 @@
# Swap CLI Tool
A standalone command-line interface for executing swaps on Arbitrum using various DEX protocols.
## Features
- Support for multiple DEX protocols:
- Uniswap V2 & V3
- SushiSwap
- Camelot V3
- TraderJoe V2
- KyberSwap Elastic
- Dry-run simulation mode
- Gas estimation
- Token allowance management
- Configurable slippage and deadlines
- Comprehensive logging
## Installation
```bash
# Build the CLI tool
cd cmd/swap-cli
go build -o swap-cli .
# Or build from project root
make build-swap-cli
```
## Configuration
The CLI tool uses environment variables and command-line flags for configuration:
### Required Environment Variables
```bash
export ARBITRUM_RPC_ENDPOINT="https://arb1.arbitrum.io/rpc"
export PRIVATE_KEY="your-private-key-hex" # Optional for dry-run mode
```
### Optional Environment Variables
```bash
export WALLET_ADDRESS="0x..." # If not using private key
export LOG_LEVEL="info" # debug, info, warn, error
```
## Usage
### Basic Swap Commands
```bash
# Dry-run swap simulation (no actual transaction)
./swap-cli --dry-run uniswap-v3 \
--token-in 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--token-out 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 \
--amount-in 1000000000 \
--slippage 0.5
# Execute actual swap on Uniswap V3
./swap-cli uniswap-v3 \
--token-in 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--token-out 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 \
--amount-in 1000000000 \
--slippage 0.5 \
--deadline 300
# Swap on different protocols
./swap-cli sushiswap --token-in ... --token-out ... --amount-in ...
./swap-cli camelot-v3 --token-in ... --token-out ... --amount-in ...
./swap-cli traderjoe-v2 --token-in ... --token-out ... --amount-in ...
./swap-cli kyber-elastic --token-in ... --token-out ... --amount-in ...
```
### Gas Estimation
```bash
# Estimate gas for a swap
./swap-cli estimate-gas \
--token-in 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--token-out 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 \
--amount-in 1000000000
```
### Token Management
```bash
# Check token allowance
./swap-cli check-allowance \
--token 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--spender 0xE592427A0AEce92De3Edee1F18E0157C05861564
# Approve token spending
./swap-cli approve \
--token 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--spender 0xE592427A0AEce92De3Edee1F18E0157C05861564 \
--amount max
```
## Command-Line Options
### Global Flags
- `--rpc-endpoint`: Arbitrum RPC endpoint URL
- `--private-key`: Private key for signing transactions
- `--wallet-address`: Wallet address (if using external signer)
- `--dry-run`: Simulate without executing
- `--log-level`: Logging level (debug, info, warn, error)
### Swap Flags
- `--token-in`: Input token contract address
- `--token-out`: Output token contract address
- `--amount-in`: Amount of input tokens (in smallest unit)
- `--min-amount-out`: Minimum output tokens (optional)
- `--recipient`: Recipient address (defaults to sender)
- `--slippage`: Slippage tolerance percentage (default: 0.5%)
- `--deadline`: Transaction deadline in seconds (default: 300)
- `--pool-fee`: V3 pool fee tier (500, 3000, 10000)
- `--gas-price`: Gas price in gwei
- `--gas-limit`: Gas limit
## Examples
### Common Token Addresses on Arbitrum
```bash
# USDC
USDC="0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48"
# WETH
WETH="0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2"
# ARB
ARB="0x912CE59144191C1204E64559FE8253a0e49E6548"
# USDT
USDT="0xdAC17F958D2ee523a2206206994597C13D831ec7"
```
### Example Swaps
```bash
# Swap 100 USDC for WETH on Uniswap V3
./swap-cli uniswap-v3 \
--token-in 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--token-out 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 \
--amount-in 100000000 \
--slippage 0.5
# Swap 1 WETH for USDC on SushiSwap
./swap-cli sushiswap \
--token-in 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 \
--token-out 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--amount-in 1000000000000000000 \
--slippage 1.0
# High-precision swap with custom gas settings
./swap-cli uniswap-v3 \
--token-in 0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48 \
--token-out 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 \
--amount-in 1000000000 \
--min-amount-out 995000000000000000 \
--slippage 0.1 \
--gas-price 0.1 \
--gas-limit 200000 \
--deadline 600
```
## Security Considerations
1. **Private Key Management**: Never commit private keys to version control
2. **Dry-Run First**: Always test with `--dry-run` before executing
3. **Slippage Settings**: Be careful with slippage on volatile tokens
4. **Gas Price**: Monitor network conditions for optimal gas pricing
5. **Token Verification**: Always verify token contract addresses
## Error Handling
The CLI provides detailed error messages for common issues:
- Insufficient balance
- Invalid token addresses
- Network connectivity issues
- Gas estimation failures
- Transaction reverts
## Development
### Adding New Protocols
1. Add the protocol to the router address mapping in `getRouterAddress()`
2. Implement the protocol-specific swap function
3. Add any protocol-specific parameters to the CLI flags
4. Update this README with usage examples
### Testing
```bash
# Test with dry-run mode
./swap-cli --dry-run uniswap-v3 --token-in ... --token-out ... --amount-in ...
# Test gas estimation
./swap-cli estimate-gas --token-in ... --token-out ... --amount-in ...
```
## Troubleshooting
### Common Issues
1. **"Insufficient balance"**: Check token balance and decimals
2. **"Transaction reverted"**: Check allowances and slippage settings
3. **"Gas estimation failed"**: Try setting manual gas limits
4. **"Invalid private key"**: Ensure key is in hex format without 0x prefix
### Debug Mode
Enable debug logging for detailed information:
```bash
./swap-cli --log-level debug ...
```
## Contributing
1. Follow the existing code structure
2. Add comprehensive error handling
3. Include dry-run simulation support
4. Update documentation for new features
## License
This tool is part of the MEV Bot project and follows the same license terms.

612
orig/cmd/swap-cli/main.go Normal file
View File

@@ -0,0 +1,612 @@
package main
import (
"context"
"fmt"
"math/big"
"os"
"strconv"
"strings"
"time"
"github.com/ethereum/go-ethereum/accounts/abi/bind"
"github.com/ethereum/go-ethereum/common"
"github.com/ethereum/go-ethereum/crypto"
"github.com/ethereum/go-ethereum/ethclient"
"github.com/urfave/cli/v2"
"github.com/fraktal/mev-beta/internal/config"
"github.com/fraktal/mev-beta/internal/logger"
)
// SwapParams represents the parameters for a swap operation
type SwapParams struct {
TokenIn common.Address
TokenOut common.Address
AmountIn *big.Int
MinAmountOut *big.Int
Recipient common.Address
Deadline uint64
Protocol string
Slippage float64
}
// SwapExecutor handles the execution of swaps
type SwapExecutor struct {
client *ethclient.Client
logger *logger.Logger
config *config.Config
auth *bind.TransactOpts
}
func main() {
app := &cli.App{
Name: "swap-cli",
Usage: "CLI tool for executing swaps on Arbitrum using various DEX protocols",
Flags: []cli.Flag{
&cli.StringFlag{
Name: "rpc-endpoint",
Usage: "Arbitrum RPC endpoint URL",
EnvVars: []string{"ARBITRUM_RPC_ENDPOINT"},
Required: true,
},
&cli.StringFlag{
Name: "private-key",
Usage: "Private key for transaction signing (hex format without 0x)",
EnvVars: []string{"PRIVATE_KEY"},
},
&cli.StringFlag{
Name: "wallet-address",
Usage: "Wallet address (if using external signer)",
EnvVars: []string{"WALLET_ADDRESS"},
},
&cli.BoolFlag{
Name: "dry-run",
Usage: "Simulate the swap without executing",
Value: false,
},
&cli.StringFlag{
Name: "log-level",
Usage: "Log level (debug, info, warn, error)",
Value: "info",
},
},
Commands: []*cli.Command{
{
Name: "uniswap-v3",
Usage: "Execute swap on Uniswap V3",
Flags: getSwapFlags(),
Action: func(c *cli.Context) error {
return executeSwap(c, "uniswap-v3")
},
},
{
Name: "uniswap-v2",
Usage: "Execute swap on Uniswap V2",
Flags: getSwapFlags(),
Action: func(c *cli.Context) error {
return executeSwap(c, "uniswap-v2")
},
},
{
Name: "sushiswap",
Usage: "Execute swap on SushiSwap",
Flags: getSwapFlags(),
Action: func(c *cli.Context) error {
return executeSwap(c, "sushiswap")
},
},
{
Name: "camelot-v3",
Usage: "Execute swap on Camelot V3",
Flags: getSwapFlags(),
Action: func(c *cli.Context) error {
return executeSwap(c, "camelot-v3")
},
},
{
Name: "traderjoe-v2",
Usage: "Execute swap on TraderJoe V2",
Flags: getSwapFlags(),
Action: func(c *cli.Context) error {
return executeSwap(c, "traderjoe-v2")
},
},
{
Name: "kyber-elastic",
Usage: "Execute swap on KyberSwap Elastic",
Flags: getSwapFlags(),
Action: func(c *cli.Context) error {
return executeSwap(c, "kyber-elastic")
},
},
{
Name: "estimate-gas",
Usage: "Estimate gas cost for a swap",
Flags: getSwapFlags(),
Action: func(c *cli.Context) error {
return estimateGas(c)
},
},
{
Name: "check-allowance",
Usage: "Check token allowance for a protocol",
Flags: []cli.Flag{
&cli.StringFlag{
Name: "token",
Usage: "Token contract address",
Required: true,
},
&cli.StringFlag{
Name: "spender",
Usage: "Spender contract address (router)",
Required: true,
},
&cli.StringFlag{
Name: "owner",
Usage: "Owner address (defaults to wallet address)",
},
},
Action: func(c *cli.Context) error {
return checkAllowance(c)
},
},
{
Name: "approve",
Usage: "Approve token spending for a protocol",
Flags: []cli.Flag{
&cli.StringFlag{
Name: "token",
Usage: "Token contract address",
Required: true,
},
&cli.StringFlag{
Name: "spender",
Usage: "Spender contract address (router)",
Required: true,
},
&cli.StringFlag{
Name: "amount",
Usage: "Amount to approve (use 'max' for maximum approval)",
Required: true,
},
},
Action: func(c *cli.Context) error {
return approveToken(c)
},
},
},
}
if err := app.Run(os.Args); err != nil {
fmt.Fprintf(os.Stderr, "Error: %v\n", err)
os.Exit(1)
}
}
func getSwapFlags() []cli.Flag {
return []cli.Flag{
&cli.StringFlag{
Name: "token-in",
Usage: "Input token contract address",
Required: true,
},
&cli.StringFlag{
Name: "token-out",
Usage: "Output token contract address",
Required: true,
},
&cli.StringFlag{
Name: "amount-in",
Usage: "Amount of input tokens (in smallest unit, e.g., wei for ETH)",
Required: true,
},
&cli.StringFlag{
Name: "min-amount-out",
Usage: "Minimum amount of output tokens (calculated from slippage if not provided)",
},
&cli.StringFlag{
Name: "recipient",
Usage: "Recipient address (defaults to sender)",
},
&cli.Float64Flag{
Name: "slippage",
Usage: "Slippage tolerance in percentage (e.g., 0.5 for 0.5%)",
Value: 0.5,
},
&cli.Uint64Flag{
Name: "deadline",
Usage: "Transaction deadline in seconds from now",
Value: 300, // 5 minutes default
},
&cli.StringFlag{
Name: "pool-fee",
Usage: "Pool fee tier for V3 swaps (500, 3000, 10000)",
Value: "3000",
},
&cli.StringFlag{
Name: "gas-price",
Usage: "Gas price in gwei (optional, uses network default if not specified)",
},
&cli.Uint64Flag{
Name: "gas-limit",
Usage: "Gas limit (optional, estimated if not specified)",
},
}
}
func executeSwap(c *cli.Context, protocol string) error {
// Initialize logger
log := logger.New(c.String("log-level"), "text", "")
// Parse swap parameters
params, err := parseSwapParams(c)
if err != nil {
return fmt.Errorf("failed to parse swap parameters: %w", err)
}
// Initialize swap executor
executor, err := newSwapExecutor(c, log)
if err != nil {
return fmt.Errorf("failed to initialize swap executor: %w", err)
}
log.Info("Swap Parameters",
"protocol", protocol,
"tokenIn", params.TokenIn.Hex(),
"tokenOut", params.TokenOut.Hex(),
"amountIn", params.AmountIn.String(),
"minAmountOut", params.MinAmountOut.String(),
"recipient", params.Recipient.Hex(),
"slippage", fmt.Sprintf("%.2f%%", params.Slippage),
)
if c.Bool("dry-run") {
return executor.simulateSwap(params, protocol)
}
return executor.executeSwap(params, protocol)
}
func parseSwapParams(c *cli.Context) (*SwapParams, error) {
// Parse token addresses
tokenIn := common.HexToAddress(c.String("token-in"))
tokenOut := common.HexToAddress(c.String("token-out"))
// Parse amount in
amountInStr := c.String("amount-in")
amountIn, ok := new(big.Int).SetString(amountInStr, 10)
if !ok {
return nil, fmt.Errorf("invalid amount-in: %s", amountInStr)
}
// Parse minimum amount out
var minAmountOut *big.Int
if minAmountOutStr := c.String("min-amount-out"); minAmountOutStr != "" {
var ok bool
minAmountOut, ok = new(big.Int).SetString(minAmountOutStr, 10)
if !ok {
return nil, fmt.Errorf("invalid min-amount-out: %s", minAmountOutStr)
}
} else {
// Calculate from slippage (simplified - in real implementation would fetch price)
slippage := c.Float64("slippage")
minAmountOut = calculateMinAmountOut(amountIn, slippage)
}
// Parse recipient
var recipient common.Address
if recipientStr := c.String("recipient"); recipientStr != "" {
recipient = common.HexToAddress(recipientStr)
} else {
// Use wallet address as recipient
if walletAddr := c.String("wallet-address"); walletAddr != "" {
recipient = common.HexToAddress(walletAddr)
} else {
return nil, fmt.Errorf("recipient address required")
}
}
// Calculate deadline
deadline := uint64(time.Now().Unix()) + c.Uint64("deadline")
return &SwapParams{
TokenIn: tokenIn,
TokenOut: tokenOut,
AmountIn: amountIn,
MinAmountOut: minAmountOut,
Recipient: recipient,
Deadline: deadline,
Protocol: "",
Slippage: c.Float64("slippage"),
}, nil
}
func newSwapExecutor(c *cli.Context, log *logger.Logger) (*SwapExecutor, error) {
// Connect to Arbitrum RPC
client, err := ethclient.Dial(c.String("rpc-endpoint"))
if err != nil {
return nil, fmt.Errorf("failed to connect to Arbitrum RPC: %w", err)
}
// Load configuration (simplified)
cfg := &config.Config{
Arbitrum: config.ArbitrumConfig{
RPCEndpoint: c.String("rpc-endpoint"),
ChainID: 42161, // Arbitrum mainnet
},
}
// Setup auth if private key is provided
var auth *bind.TransactOpts
if privateKeyHex := c.String("private-key"); privateKeyHex != "" {
privateKey, err := crypto.HexToECDSA(privateKeyHex)
if err != nil {
return nil, fmt.Errorf("invalid private key: %w", err)
}
chainID := big.NewInt(42161) // Arbitrum mainnet
auth, err = bind.NewKeyedTransactorWithChainID(privateKey, chainID)
if err != nil {
return nil, fmt.Errorf("failed to create transactor: %w", err)
}
// Set gas price if specified
if gasPriceStr := c.String("gas-price"); gasPriceStr != "" {
gasPriceGwei, err := strconv.ParseFloat(gasPriceStr, 64)
if err != nil {
return nil, fmt.Errorf("invalid gas price: %w", err)
}
gasPrice := new(big.Int).Mul(
big.NewInt(int64(gasPriceGwei*1e9)),
big.NewInt(1),
)
auth.GasPrice = gasPrice
}
// Set gas limit if specified
if gasLimit := c.Uint64("gas-limit"); gasLimit > 0 {
auth.GasLimit = gasLimit
}
}
return &SwapExecutor{
client: client,
logger: log,
config: cfg,
auth: auth,
}, nil
}
func (se *SwapExecutor) simulateSwap(params *SwapParams, protocol string) error {
se.logger.Info("🔍 SIMULATION MODE - No actual transaction will be sent")
ctx := context.Background()
// Check balances
balance, err := se.getTokenBalance(ctx, params.TokenIn, params.Recipient)
if err != nil {
return fmt.Errorf("failed to get token balance: %w", err)
}
se.logger.Info("Balance Check",
"token", params.TokenIn.Hex(),
"balance", balance.String(),
"required", params.AmountIn.String(),
"sufficient", balance.Cmp(params.AmountIn) >= 0,
)
if balance.Cmp(params.AmountIn) < 0 {
se.logger.Warn("⚠️ Insufficient balance for swap")
return fmt.Errorf("insufficient balance: have %s, need %s", balance.String(), params.AmountIn.String())
}
// Estimate gas
gasEstimate, err := se.estimateSwapGas(params, protocol)
if err != nil {
se.logger.Warn("Failed to estimate gas", "error", err.Error())
gasEstimate = 200000 // Default estimate
}
se.logger.Info("Gas Estimation",
"estimatedGas", gasEstimate,
"protocol", protocol,
)
se.logger.Info("✅ Simulation completed successfully")
return nil
}
func (se *SwapExecutor) executeSwap(params *SwapParams, protocol string) error {
if se.auth == nil {
return fmt.Errorf("no private key provided - cannot execute transaction")
}
se.logger.Info("🚀 Executing swap transaction")
ctx := context.Background()
// Pre-flight checks
if err := se.preFlightChecks(ctx, params); err != nil {
return fmt.Errorf("pre-flight checks failed: %w", err)
}
// Get router address for protocol
routerAddr, err := se.getRouterAddress(protocol)
if err != nil {
return fmt.Errorf("failed to get router address: %w", err)
}
se.logger.Info("Router Information",
"protocol", protocol,
"router", routerAddr.Hex(),
)
// Execute the swap based on protocol
switch protocol {
case "uniswap-v3":
return se.executeUniswapV3Swap(ctx, params, routerAddr)
case "uniswap-v2":
return se.executeUniswapV2Swap(ctx, params, routerAddr)
case "sushiswap":
return se.executeSushiSwap(ctx, params, routerAddr)
case "camelot-v3":
return se.executeCamelotV3Swap(ctx, params, routerAddr)
case "traderjoe-v2":
return se.executeTraderJoeV2Swap(ctx, params, routerAddr)
case "kyber-elastic":
return se.executeKyberElasticSwap(ctx, params, routerAddr)
default:
return fmt.Errorf("unsupported protocol: %s", protocol)
}
}
func (se *SwapExecutor) preFlightChecks(ctx context.Context, params *SwapParams) error {
// Check balance
balance, err := se.getTokenBalance(ctx, params.TokenIn, params.Recipient)
if err != nil {
return fmt.Errorf("failed to get token balance: %w", err)
}
if balance.Cmp(params.AmountIn) < 0 {
return fmt.Errorf("insufficient balance: have %s, need %s", balance.String(), params.AmountIn.String())
}
se.logger.Info("✅ Balance check passed",
"balance", balance.String(),
"required", params.AmountIn.String(),
)
return nil
}
// Helper functions for protocol-specific implementations
func (se *SwapExecutor) executeUniswapV3Swap(ctx context.Context, params *SwapParams, router common.Address) error {
se.logger.Info("Executing Uniswap V3 swap")
// Implementation would go here - this is a placeholder
return fmt.Errorf("uniswap V3 swap implementation pending")
}
func (se *SwapExecutor) executeUniswapV2Swap(ctx context.Context, params *SwapParams, router common.Address) error {
se.logger.Info("Executing Uniswap V2 swap")
// Implementation would go here - this is a placeholder
return fmt.Errorf("uniswap V2 swap implementation pending")
}
func (se *SwapExecutor) executeSushiSwap(ctx context.Context, params *SwapParams, router common.Address) error {
se.logger.Info("Executing SushiSwap swap")
// Implementation would go here - this is a placeholder
return fmt.Errorf("SushiSwap swap implementation pending")
}
func (se *SwapExecutor) executeCamelotV3Swap(ctx context.Context, params *SwapParams, router common.Address) error {
se.logger.Info("Executing Camelot V3 swap")
// Implementation would go here - this is a placeholder
return fmt.Errorf("camelot V3 swap implementation pending")
}
func (se *SwapExecutor) executeTraderJoeV2Swap(ctx context.Context, params *SwapParams, router common.Address) error {
se.logger.Info("Executing TraderJoe V2 swap")
// Implementation would go here - this is a placeholder
return fmt.Errorf("TraderJoe V2 swap implementation pending")
}
func (se *SwapExecutor) executeKyberElasticSwap(ctx context.Context, params *SwapParams, router common.Address) error {
se.logger.Info("Executing KyberSwap Elastic swap")
// Implementation would go here - this is a placeholder
return fmt.Errorf("KyberSwap Elastic swap implementation pending")
}
// Utility functions
func (se *SwapExecutor) getTokenBalance(ctx context.Context, token common.Address, owner common.Address) (*big.Int, error) {
// Implementation would call ERC20 balanceOf
// For now, return a placeholder
return big.NewInt(1000000000000000000), nil // 1 ETH worth
}
func (se *SwapExecutor) estimateSwapGas(params *SwapParams, protocol string) (uint64, error) {
// Implementation would estimate gas for the specific protocol
// For now, return reasonable estimates
switch protocol {
case "uniswap-v3":
return 150000, nil
case "uniswap-v2":
return 120000, nil
default:
return 200000, nil
}
}
func (se *SwapExecutor) getRouterAddress(protocol string) (common.Address, error) {
// Return known router addresses for each protocol on Arbitrum
switch protocol {
case "uniswap-v3":
return common.HexToAddress("0xE592427A0AEce92De3Edee1F18E0157C05861564"), nil
case "uniswap-v2":
return common.HexToAddress("0x4752ba5dbc23f44d87826276bf6fd6b1c372ad24"), nil
case "sushiswap":
return common.HexToAddress("0x1b02dA8Cb0d097eB8D57A175b88c7D8b47997506"), nil
case "camelot-v3":
return common.HexToAddress("0x1a3c9B1d2F0529D97f2afC5136Cc23e58f1FD35B"), nil
case "traderjoe-v2":
return common.HexToAddress("0x18556DA13313f3532c54711497A8FedAC273220E"), nil
case "kyber-elastic":
return common.HexToAddress("0x5F1dddbf348aC2fbe22a163e30F99F9ECE3DD50a"), nil
default:
return common.Address{}, fmt.Errorf("unknown protocol: %s", protocol)
}
}
func calculateMinAmountOut(amountIn *big.Int, slippage float64) *big.Int {
// Simple calculation: amountOut = amountIn * (1 - slippage/100)
// In a real implementation, this would fetch current prices
slippageMultiplier := 1.0 - (slippage / 100.0)
amountInFloat := new(big.Float).SetInt(amountIn)
minAmountOutFloat := new(big.Float).Mul(amountInFloat, big.NewFloat(slippageMultiplier))
minAmountOut, _ := minAmountOutFloat.Int(nil)
return minAmountOut
}
// Additional commands
func estimateGas(c *cli.Context) error {
log := logger.New(c.String("log-level"), "text", "")
params, err := parseSwapParams(c)
if err != nil {
return err
}
executor, err := newSwapExecutor(c, log)
if err != nil {
return err
}
protocol := strings.TrimPrefix(c.Command.FullName(), "estimate-gas ")
if protocol == "estimate-gas" {
protocol = "uniswap-v3" // default
}
gasEstimate, err := executor.estimateSwapGas(params, protocol)
if err != nil {
return err
}
log.Info("Gas Estimation",
"protocol", protocol,
"estimatedGas", gasEstimate,
)
return nil
}
func checkAllowance(c *cli.Context) error {
log := logger.New(c.String("log-level"), "text", "")
log.Info("Checking token allowance - implementation pending")
return nil
}
func approveToken(c *cli.Context) error {
log := logger.New(c.String("log-level"), "text", "")
log.Info("Approving token - implementation pending")
return nil
}