| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318 |
- import yargs from "yargs";
- const {hideBin} = require('yargs/helpers')
- import * as elliptic from "elliptic";
- import * as ethers from "ethers";
- import * as web3s from '@solana/web3.js';
- import {PublicKey, TransactionInstruction, AccountMeta, Keypair, Connection} from "@solana/web3.js";
- import {solidityKeccak256} from "ethers/lib/utils";
- import {setDefaultWasm, importCoreWasm, importNftWasm, ixFromRust, BridgeImplementation__factory} from '@certusone/wormhole-sdk'
- setDefaultWasm("node")
- const signAndEncodeVM = function (
- timestamp,
- nonce,
- emitterChainId,
- emitterAddress,
- sequence,
- data,
- signers,
- guardianSetIndex,
- consistencyLevel
- ) {
- const body = [
- ethers.utils.defaultAbiCoder.encode(["uint32"], [timestamp]).substring(2 + (64 - 8)),
- ethers.utils.defaultAbiCoder.encode(["uint32"], [nonce]).substring(2 + (64 - 8)),
- ethers.utils.defaultAbiCoder.encode(["uint16"], [emitterChainId]).substring(2 + (64 - 4)),
- ethers.utils.defaultAbiCoder.encode(["bytes32"], [emitterAddress]).substring(2),
- ethers.utils.defaultAbiCoder.encode(["uint64"], [sequence]).substring(2 + (64 - 16)),
- ethers.utils.defaultAbiCoder.encode(["uint8"], [consistencyLevel]).substring(2 + (64 - 2)),
- data.substr(2)
- ]
- const hash = solidityKeccak256(["bytes"], [solidityKeccak256(["bytes"], ["0x" + body.join("")])])
- let signatures = "";
- for (let i in signers) {
- const ec = new elliptic.ec("secp256k1");
- const key = ec.keyFromPrivate(signers[i]);
- const signature = key.sign(Buffer.from(hash.substr(2), "hex"), {canonical: true});
- const packSig = [
- ethers.utils.defaultAbiCoder.encode(["uint8"], [i]).substring(2 + (64 - 2)),
- zeroPadBytes(signature.r.toString(16), 32),
- zeroPadBytes(signature.s.toString(16), 32),
- ethers.utils.defaultAbiCoder.encode(["uint8"], [signature.recoveryParam]).substr(2 + (64 - 2)),
- ]
- signatures += packSig.join("")
- }
- const vm = [
- ethers.utils.defaultAbiCoder.encode(["uint8"], [1]).substring(2 + (64 - 2)),
- ethers.utils.defaultAbiCoder.encode(["uint32"], [guardianSetIndex]).substring(2 + (64 - 8)),
- ethers.utils.defaultAbiCoder.encode(["uint8"], [signers.length]).substring(2 + (64 - 2)),
- signatures,
- body.join("")
- ].join("");
- return vm
- }
- function zeroPadBytes(value, length) {
- while (value.length < 2 * length) {
- value = "0" + value;
- }
- return value;
- }
- yargs(hideBin(process.argv))
- .command('generate_register_chain_vaa [chain_id] [contract_address]', 'create a VAA to register a chain (debug-only)', (yargs) => {
- return yargs
- .positional('chain_id', {
- describe: 'chain id to register',
- type: "number",
- required: true
- })
- .positional('contract_address', {
- describe: 'contract to register',
- type: "string",
- required: true
- })
- }, async (argv: any) => {
- let data = [
- "0x",
- "00000000000000000000000000000000000000000000004e4654427269646765", // NFT Bridge header
- "01",
- "0000",
- ethers.utils.defaultAbiCoder.encode(["uint16"], [argv.chain_id]).substring(2 + (64 - 4)),
- ethers.utils.defaultAbiCoder.encode(["bytes32"], [argv.contract_address]).substring(2),
- ].join('')
- const vm = signAndEncodeVM(
- 1,
- 1,
- 1,
- "0x0000000000000000000000000000000000000000000000000000000000000004",
- Math.floor(Math.random() * 100000000),
- data,
- [
- "cfb12303a19cde580bb4dd771639b0d26bc68353645571a8cff516ab2ee113a0"
- ],
- 0,
- 0
- );
- console.log(vm)
- })
- .command('solana execute_governance_vaa [vaa]', 'execute a governance VAA on Solana', (yargs) => {
- return yargs
- .positional('vaa', {
- describe: 'vaa to post',
- type: "string",
- required: true
- })
- .option('rpc', {
- alias: 'u',
- type: 'string',
- description: 'URL of the Solana RPC',
- default: "http://localhost:8899"
- })
- .option('bridge', {
- alias: 'b',
- type: 'string',
- description: 'Bridge address',
- default: "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o"
- })
- .option('nft_bridge', {
- alias: 't',
- type: 'string',
- description: 'NFT Bridge address',
- default: "NFTWqJR8YnRVqPDvTJrYuLrQDitTG5AScqbeghi4zSA"
- })
- }, async (argv: any) => {
- const bridge = await importCoreWasm()
- const nft_bridge = await importNftWasm()
- let connection = setupConnection(argv);
- let bridge_id = new PublicKey(argv.bridge);
- let nft_bridge_id = new PublicKey(argv.nft_bridge);
- // Generate a new random public key
- let from = web3s.Keypair.generate();
- let airdropSignature = await connection.requestAirdrop(
- from.publicKey,
- web3s.LAMPORTS_PER_SOL,
- );
- await connection.confirmTransaction(airdropSignature);
- let vaa = Buffer.from(argv.vaa, "hex");
- await post_vaa(connection, bridge_id, from, vaa);
- let parsed_vaa = await bridge.parse_vaa(vaa);
- let ix: TransactionInstruction;
- switch (parsed_vaa.payload[32]) {
- case 1:
- console.log("Registering chain")
- ix = nft_bridge.register_chain_ix(nft_bridge_id.toString(), bridge_id.toString(), from.publicKey.toString(), vaa);
- break
- case 2:
- console.log("Upgrading contract")
- ix = nft_bridge.upgrade_contract_ix(nft_bridge_id.toString(), bridge_id.toString(), from.publicKey.toString(), from.publicKey.toString(), vaa);
- break
- default:
- throw new Error("unknown governance action")
- }
- let transaction = new web3s.Transaction().add(ixFromRust(ix));
- // Sign transaction, broadcast, and confirm
- let signature = await web3s.sendAndConfirmTransaction(
- connection,
- transaction,
- [from],
- {
- skipPreflight: true
- }
- );
- console.log('SIGNATURE', signature);
- })
- .command('eth execute_governance_vaa [vaa]', 'execute a governance VAA on Solana', (yargs) => {
- return yargs
- .positional('vaa', {
- describe: 'vaa to post',
- type: "string",
- required: true
- })
- .option('rpc', {
- alias: 'u',
- type: 'string',
- description: 'URL of the ETH RPC',
- default: "http://localhost:8545"
- })
- .option('nft_bridge', {
- alias: 't',
- type: 'string',
- description: 'NFT Bridge address',
- default: "0x26b4afb60d6c903165150c6f0aa14f8016be4aec"
- })
- .option('key', {
- alias: 'k',
- type: 'string',
- description: 'Private key of the wallet',
- default: "0x4f3edf983ac636a65a842ce7c78d9aa706d3b113bce9c46f30d7d21715b23b1d"
- })
- }, async (argv: any) => {
- const bridge = await importCoreWasm()
- let provider = new ethers.providers.JsonRpcProvider(argv.rpc)
- let signer = new ethers.Wallet(argv.key, provider)
- let t = new BridgeImplementation__factory(signer);
- let tb = t.attach(argv.nft_bridge);
- let vaa = Buffer.from(argv.vaa, "hex");
- let parsed_vaa = await bridge.parse_vaa(vaa);
- switch (parsed_vaa.payload[32]) {
- case 1:
- console.log("Registering chain")
- console.log("Hash: " + (await tb.registerChain(vaa)).hash)
- break
- case 2:
- console.log("Upgrading contract")
- console.log("Hash: " + (await tb.upgrade(vaa)).hash)
- break
- default:
- throw new Error("unknown governance action")
- }
- })
- .argv;
- async function post_vaa(connection: Connection, bridge_id: PublicKey, payer: Keypair, vaa: Buffer) {
- const bridge = await importCoreWasm()
- let bridge_state = await get_bridge_state(connection, bridge_id);
- let guardian_addr = new PublicKey(bridge.guardian_set_address(bridge_id.toString(), bridge_state.guardian_set_index));
- let acc = await connection.getAccountInfo(guardian_addr);
- if (acc?.data === undefined) {
- return
- }
- let guardian_data = bridge.parse_guardian_set(new Uint8Array(acc?.data));
- let signature_set = Keypair.generate();
- let txs = bridge.verify_signatures_ix(bridge_id.toString(), payer.publicKey.toString(), bridge_state.guardian_set_index, guardian_data, signature_set.publicKey.toString(), vaa)
- // Add transfer instruction to transaction
- for (let tx of txs) {
- let ixs: Array<TransactionInstruction> = tx.map((v: any) => {
- return ixFromRust(v)
- })
- let transaction = new web3s.Transaction().add(ixs[0], ixs[1]);
- // Sign transaction, broadcast, and confirm
- await web3s.sendAndConfirmTransaction(
- connection,
- transaction,
- [payer, signature_set],
- {
- skipPreflight: true
- }
- );
- }
- let ix = ixFromRust(bridge.post_vaa_ix(bridge_id.toString(), payer.publicKey.toString(), signature_set.publicKey.toString(), vaa));
- let transaction = new web3s.Transaction().add(ix);
- // Sign transaction, broadcast, and confirm
- let signature = await web3s.sendAndConfirmTransaction(
- connection,
- transaction,
- [payer],
- {
- skipPreflight: true
- }
- );
- console.log('SIGNATURE', signature);
- }
- async function get_bridge_state(connection: Connection, bridge_id: PublicKey): Promise<BridgeState> {
- const bridge = await importCoreWasm()
- let bridge_state = new PublicKey(bridge.state_address(bridge_id.toString()));
- let acc = await connection.getAccountInfo(bridge_state);
- if (acc?.data === undefined) {
- throw new Error("bridge state not found")
- }
- return bridge.parse_state(new Uint8Array(acc?.data));
- }
- function setupConnection(argv: yargs.Arguments): web3s.Connection {
- return new web3s.Connection(
- argv.rpc as string,
- 'confirmed',
- );
- }
- interface BridgeState {
- // The current guardian set index, used to decide which signature sets to accept.
- guardian_set_index: number,
- // Lamports in the collection account
- last_lamports: number,
- // Bridge configuration, which is set once upon initialization.
- config: BridgeConfig,
- }
- interface BridgeConfig {
- // Period for how long a guardian set is valid after it has been replaced by a new one. This
- // guarantees that VAAs issued by that set can still be submitted for a certain period. In
- // this period we still trust the old guardian set.
- guardian_set_expiration_time: number,
- // Amount of lamports that needs to be paid to the protocol to post a message
- fee: number,
- }
|