| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411 |
- use pyth::byte_buffer::{ByteBuffer, ByteBufferImpl};
- use pyth::reader::ReaderImpl;
- use pyth::util::{array_try_into, one_shift_left_bytes_u256};
- use pyth::wormhole::{
- Event as WormholeEvent, GuardianSetAdded, IWormholeDispatcher, IWormholeDispatcherTrait,
- };
- use snforge_std::{
- ContractClass, ContractClassTrait, DeclareResultTrait, Event, EventSpyTrait, EventsFilterTrait,
- declare, spy_events,
- };
- use starknet::{ContractAddress, EthAddress};
- use super::wormhole_guardians::{
- guardian_set0, guardian_set1, guardian_set2, guardian_set3, guardian_set4,
- };
- use super::data;
- #[generate_trait]
- impl DecodeEventHelpers of DecodeEventHelpersTrait {
- fn pop<T, +TryInto<felt252, T>>(ref self: Array<felt252>) -> T {
- self.pop_front().unwrap().try_into().unwrap()
- }
- }
- fn decode_event(mut event: Event) -> WormholeEvent {
- let key0: felt252 = event.keys.pop();
- let output = if key0 == selector!("GuardianSetAdded") {
- let event = GuardianSetAdded { index: event.data.pop() };
- WormholeEvent::GuardianSetAdded(event)
- } else {
- panic!("unrecognized event")
- };
- assert!(event.keys.len() == 0);
- assert!(event.data.len() == 0);
- output
- }
- #[test]
- fn test_parse_and_verify_vm_works() {
- let dispatcher = deploy_with_mainnet_guardians();
- assert!(dispatcher.chain_id() == CHAIN_ID);
- assert!(dispatcher.governance_chain_id() == GOVERNANCE_CHAIN_ID);
- assert!(dispatcher.governance_contract() == GOVERNANCE_CONTRACT);
- assert!(dispatcher.get_current_guardian_set_index() == 4);
- let hash1 = 107301215816534416941414788869570552056251358022232518071775510605007996627157;
- assert!(dispatcher.governance_action_is_consumed(hash1));
- let hash2 = 69383087152252644362837994811527963218617951938616206795754532940371100771846;
- assert!(dispatcher.governance_action_is_consumed(hash2));
- let hash3 = 98574986520203705693876007869045870422906099682167905265431258750902697716275;
- assert!(dispatcher.governance_action_is_consumed(hash3));
- let hash4 = 108039149047034949008762260417639972218494870245424949643402483285149262098173;
- assert!(dispatcher.governance_action_is_consumed(hash4));
- let not_hash4 = 108039149047034949008762260417639972218494870245424949643402483285149262098174;
- assert!(!dispatcher.governance_action_is_consumed(not_hash4));
- let vm = dispatcher.parse_and_verify_vm(data::good_vm1());
- assert!(vm.version == 1);
- assert!(vm.guardian_set_index == 3);
- assert!(vm.signatures.len() == 13);
- assert!(*vm.signatures.at(0).guardian_index == 1);
- assert!(*vm.signatures.at(1).guardian_index == 2);
- assert!(*vm.signatures.at(12).guardian_index == 18);
- assert!(vm.timestamp == 1712589207);
- assert!(vm.nonce == 0);
- assert!(vm.emitter_chain_id == 26);
- assert!(
- vm.emitter_address == 0xe101faedac5851e32b9b23b5f9411a8c2bac4aae3ed4dd7b811dd1a72ea4aa71,
- );
- assert!(vm.sequence == 0x2f03161);
- assert!(vm.consistency_level == 1);
- assert!(vm.payload.len() == 37);
- let mut reader = ReaderImpl::new(vm.payload);
- assert!(reader.read_u8() == 65);
- assert!(reader.read_u8() == 85);
- assert!(reader.read_u8() == 87);
- }
- #[test]
- #[fuzzer(runs: 100, seed: 0)]
- #[should_panic]
- fn test_parse_and_verify_vm_rejects_corrupted_vm(pos: usize, random1: usize, random2: usize) {
- let dispatcher = deploy_with_mainnet_guardians();
- let input = corrupted_vm(data::good_vm1(), pos, random1, random2);
- let vm = dispatcher.parse_and_verify_vm(input);
- println!("no error, output: {:?}", vm);
- }
- #[test]
- #[should_panic(expected: ('wrong governance contract',))]
- fn test_submit_guardian_set_rejects_invalid_emitter() {
- let dispatcher = deploy_with_test_guardian();
- dispatcher.submit_new_guardian_set(data::wrong_emitter_upgrade());
- }
- #[test]
- #[should_panic(expected: ('invalid guardian set index',))]
- fn test_submit_guardian_set_rejects_wrong_index_in_signer() {
- let dispatcher = deploy_with_mainnet_guardian_set0();
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade1());
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade3());
- }
- #[test]
- fn test_submit_guardian_set_emits_events() {
- let dispatcher = deploy_with_mainnet_guardian_set0();
- let mut spy = spy_events();
- assert!(dispatcher.get_current_guardian_set_index() == 0);
- let hash1 = 107301215816534416941414788869570552056251358022232518071775510605007996627157;
- assert!(!dispatcher.governance_action_is_consumed(hash1));
- let hash2 = 69383087152252644362837994811527963218617951938616206795754532940371100771846;
- assert!(!dispatcher.governance_action_is_consumed(hash2));
- let hash3 = 98574986520203705693876007869045870422906099682167905265431258750902697716275;
- assert!(!dispatcher.governance_action_is_consumed(hash3));
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade1());
- let mut events = spy.get_events().emitted_by(dispatcher.contract_address).events;
- assert!(events.len() == 1);
- let (from, event) = events.pop_front().unwrap();
- assert!(from == dispatcher.contract_address);
- let event = decode_event(event);
- let expected = GuardianSetAdded { index: 1 };
- assert!(event == WormholeEvent::GuardianSetAdded(expected));
- assert!(dispatcher.get_current_guardian_set_index() == 1);
- assert!(dispatcher.governance_action_is_consumed(hash1));
- assert!(!dispatcher.governance_action_is_consumed(hash2));
- assert!(!dispatcher.governance_action_is_consumed(hash3));
- let mut spy = spy_events();
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade2());
- let mut events = spy.get_events().emitted_by(dispatcher.contract_address).events;
- assert!(events.len() == 1);
- let (from, event) = events.pop_front().unwrap();
- assert!(from == dispatcher.contract_address);
- let event = decode_event(event);
- let expected = GuardianSetAdded { index: 2 };
- assert!(event == WormholeEvent::GuardianSetAdded(expected));
- assert!(dispatcher.get_current_guardian_set_index() == 2);
- assert!(dispatcher.governance_action_is_consumed(hash1));
- assert!(dispatcher.governance_action_is_consumed(hash2));
- assert!(!dispatcher.governance_action_is_consumed(hash3));
- }
- #[test]
- fn test_get_guardian_set_works() {
- let dispatcher = deploy_with_mainnet_guardian_set0();
- let set0 = dispatcher.get_guardian_set(0);
- assert!(set0.keys == guardian_set0());
- assert!(set0.expiration_time.is_none());
- assert!(dispatcher.get_current_guardian_set_index() == 0);
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade1());
- let set0 = dispatcher.get_guardian_set(0);
- assert!(set0.keys == guardian_set0());
- assert!(set0.expiration_time.is_some());
- let set1 = dispatcher.get_guardian_set(1);
- assert!(set1.keys == guardian_set1());
- assert!(set1.expiration_time.is_none());
- assert!(dispatcher.get_current_guardian_set_index() == 1);
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade2());
- let set0 = dispatcher.get_guardian_set(0);
- assert!(set0.keys == guardian_set0());
- assert!(set0.expiration_time.is_some());
- let set1 = dispatcher.get_guardian_set(1);
- assert!(set1.keys == guardian_set1());
- assert!(set1.expiration_time.is_some());
- let set2 = dispatcher.get_guardian_set(2);
- assert!(set2.keys == guardian_set2());
- assert!(set2.expiration_time.is_none());
- assert!(dispatcher.get_current_guardian_set_index() == 2);
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade3());
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade4());
- let set3 = dispatcher.get_guardian_set(3);
- assert!(set3.keys == guardian_set3());
- assert!(set3.expiration_time.is_some());
- let set4 = dispatcher.get_guardian_set(4);
- assert!(set4.keys == guardian_set4());
- assert!(set4.expiration_time.is_none());
- assert!(dispatcher.get_current_guardian_set_index() == 4);
- }
- #[test]
- #[should_panic(expected: ('invalid index',))]
- fn test_get_guardian_set_rejects_invalid_index() {
- let dispatcher = deploy_with_mainnet_guardian_set0();
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade1());
- dispatcher.get_guardian_set(2);
- }
- #[test]
- #[should_panic(expected: ('invalid guardian set sequence',))]
- fn test_submit_guardian_set_rejects_wrong_index_in_payload() {
- let dispatcher = deploy_with_test_guardian();
- dispatcher.submit_new_guardian_set(data::wrong_index_upgrade());
- }
- #[test]
- #[should_panic(expected: ('no guardians specified',))]
- fn test_deploy_rejects_empty() {
- deploy(0, array![], CHAIN_ID, GOVERNANCE_CHAIN_ID, GOVERNANCE_CONTRACT);
- }
- #[test]
- #[should_panic(expected: ('no guardians specified',))]
- fn test_submit_guardian_set_rejects_empty() {
- let dispatcher = deploy_with_test_guardian();
- dispatcher.submit_new_guardian_set(data::empty_set_upgrade());
- }
- #[test]
- #[fuzzer(runs: 100, seed: 0)]
- #[should_panic]
- fn test_submit_guardian_set_rejects_corrupted(pos: usize, random1: usize, random2: usize) {
- let dispatcher = deploy_with_mainnet_guardian_set0();
- let vm = corrupted_vm(data::mainnet_guardian_set_upgrade1(), pos, random1, random2);
- dispatcher.submit_new_guardian_set(vm);
- }
- #[test]
- #[fuzzer(runs: 100, seed: 0)]
- #[should_panic(expected: ('wrong governance chain',))]
- fn test_submit_guardian_set_rejects_non_governance(pos: usize, random1: usize, random2: usize) {
- let dispatcher = deploy_with_mainnet_guardian_set0();
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade1());
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade2());
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade3());
- dispatcher.submit_new_guardian_set(data::good_vm1());
- }
- // Deploys a previously declared wormhole contract class at the specified address.
- // If address is not specified, the default address derivation is used.
- pub fn deploy_declared_at(
- class: @ContractClass,
- guardian_set_index: u32,
- guardians: Array<EthAddress>,
- chain_id: u16,
- governance_chain_id: u16,
- governance_contract: u256,
- address: Option<ContractAddress>,
- ) -> IWormholeDispatcher {
- let mut args = array![];
- guardian_set_index.serialize(ref args);
- (guardians, chain_id, governance_chain_id, governance_contract).serialize(ref args);
- let result = match address {
- Option::Some(address) => class.deploy_at(@args, address),
- Option::None => class.deploy(@args),
- };
- let (contract_address, _) = match result {
- Result::Ok(v) => { v },
- Result::Err(err) => { panic(err) },
- };
- IWormholeDispatcher { contract_address }
- }
- // Declares and deploys the contract.
- fn deploy(
- guardian_set_index: u32,
- guardians: Array<EthAddress>,
- chain_id: u16,
- governance_chain_id: u16,
- governance_contract: u256,
- ) -> IWormholeDispatcher {
- let class = declare("wormhole").unwrap().contract_class().deref();
- deploy_declared_at(
- @class,
- guardian_set_index,
- guardians,
- chain_id,
- governance_chain_id,
- governance_contract,
- Option::None,
- )
- }
- // Declares and deploys the contract and initializes it with mainnet guardian set upgrades.
- pub fn deploy_with_mainnet_guardians() -> IWormholeDispatcher {
- let dispatcher = deploy_with_mainnet_guardian_set0();
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade1());
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade2());
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade3());
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade4());
- dispatcher
- }
- pub fn deploy_with_mainnet_guardian_sets_3_4() -> IWormholeDispatcher {
- let dispatcher = deploy(3, guardian_set3(), CHAIN_ID, GOVERNANCE_CHAIN_ID, GOVERNANCE_CONTRACT);
- dispatcher.submit_new_guardian_set(data::mainnet_guardian_set_upgrade4());
- dispatcher
- }
- pub fn deploy_with_mainnet_guardian_set4() -> IWormholeDispatcher {
- deploy(4, guardian_set4(), CHAIN_ID, GOVERNANCE_CHAIN_ID, GOVERNANCE_CONTRACT)
- }
- pub fn deploy_with_mainnet_guardian_set0() -> IWormholeDispatcher {
- deploy(0, guardian_set0(), CHAIN_ID, GOVERNANCE_CHAIN_ID, GOVERNANCE_CONTRACT)
- }
- // Declares and deploys the contract with the test guardian address that's used to sign VAAs
- // generated in `test_vaas`.
- pub fn deploy_with_test_guardian() -> IWormholeDispatcher {
- deploy(
- 0,
- array_try_into(array![data::TEST_GUARDIAN_ADDRESS1]),
- CHAIN_ID,
- GOVERNANCE_CHAIN_ID,
- GOVERNANCE_CONTRACT,
- )
- }
- // Deploys a previously declared wormhole contract class
- // with the test guardian address that's used to sign VAAs generated in `test_vaas`.
- pub fn deploy_declared_with_test_guardian_at(
- class: @ContractClass, address: ContractAddress,
- ) -> IWormholeDispatcher {
- deploy_declared_at(
- class,
- 0,
- array_try_into(array![data::TEST_GUARDIAN_ADDRESS1]),
- CHAIN_ID,
- GOVERNANCE_CHAIN_ID,
- GOVERNANCE_CONTRACT,
- Option::Some(address),
- )
- }
- pub fn corrupted_vm(
- mut real_data: ByteBuffer, pos: usize, random1: usize, random2: usize,
- ) -> ByteBuffer {
- let mut new_data = array![];
- // Make sure we select a position not on the last item because
- // we didn't implement corrupting an incomplete bytes31.
- let pos = pos % (real_data.len() - 31);
- let bad_index = pos / 31;
- let mut num_last_bytes = 0;
- let mut i = 0;
- loop {
- let (real_bytes, num_bytes) = match real_data.pop_front() {
- Option::Some(v) => v,
- Option::None => { break; },
- };
- if num_bytes < 31 {
- new_data.append(real_bytes);
- num_last_bytes = num_bytes;
- break;
- }
- if i == bad_index {
- new_data.append(corrupted_bytes(real_bytes, pos % 31, random1, random2));
- } else {
- new_data.append(real_bytes);
- }
- i += 1;
- }
- ByteBufferImpl::new(new_data, num_last_bytes)
- }
- // Returns an item of ByteBuffer data with 2 bytes changed. We need to change at least 2 bytes
- // because a single byte can be a recovery id, where only 1 bit matters so
- // a modification of recovery id can result in a valid VM.
- fn corrupted_bytes(input: felt252, index: usize, random1: usize, random2: usize) -> felt252 {
- let index2 = (index + 1) % 31;
- let input: u256 = input.into();
- let mut value: u256 = 0;
- let mut i: usize = 0;
- while i < 31 {
- let real_byte = (input / one_shift_left_bytes_u256(30 - i.try_into().unwrap())) % 0x100;
- let real_byte: u8 = real_byte.try_into().unwrap();
- let new_byte = if i == index {
- corrupted_byte(real_byte, random1)
- } else if i == index2 {
- corrupted_byte(real_byte, random2)
- } else {
- real_byte
- };
- value = value * 256 + new_byte.into();
- i += 1;
- }
- let value: felt252 = value.try_into().expect('corrupted bytes overflow');
- value.try_into().expect('corrupted bytes overflow')
- }
- // Returns a byte that's not equal to `value`.
- fn corrupted_byte(value: u8, random: usize) -> u8 {
- let v: u16 = value.into() + 1 + (random % 255).try_into().unwrap();
- (v % 256).try_into().unwrap()
- }
- pub const CHAIN_ID: u16 = 60051;
- pub const GOVERNANCE_CHAIN_ID: u16 = 1;
- pub const GOVERNANCE_CONTRACT: u256 = 4;
|