1241 lines
53 KiB
Solidity
1241 lines
53 KiB
Solidity
// SPDX-License-Identifier: Apache 2
|
|
|
|
pragma solidity ^0.8.0;
|
|
|
|
import {IRelayProvider} from "../contracts/interfaces/IRelayProvider.sol";
|
|
import {RelayProvider} from "../contracts/relayProvider/RelayProvider.sol";
|
|
import {RelayProviderSetup} from "../contracts/relayProvider/RelayProviderSetup.sol";
|
|
import {RelayProviderImplementation} from "../contracts/relayProvider/RelayProviderImplementation.sol";
|
|
import {RelayProviderProxy} from "../contracts/relayProvider/RelayProviderProxy.sol";
|
|
import {RelayProviderMessages} from "../contracts/relayProvider/RelayProviderMessages.sol";
|
|
import {RelayProviderStructs} from "../contracts/relayProvider/RelayProviderStructs.sol";
|
|
import {IWormholeRelayer} from "../contracts/interfaces/IWormholeRelayer.sol";
|
|
import {IDelivery} from "../contracts/interfaces/IDelivery.sol";
|
|
import {CoreRelayer} from "../contracts/coreRelayer/CoreRelayer.sol";
|
|
import {IWormholeRelayerInternalStructs} from "../contracts/interfaces/IWormholeRelayerInternalStructs.sol";
|
|
import {CoreRelayerSetup} from "../contracts/coreRelayer/CoreRelayerSetup.sol";
|
|
import {CoreRelayerImplementation} from "../contracts/coreRelayer/CoreRelayerImplementation.sol";
|
|
import {CoreRelayerProxy} from "../contracts/coreRelayer/CoreRelayerProxy.sol";
|
|
import {CoreRelayerMessages} from "../contracts/coreRelayer/CoreRelayerMessages.sol";
|
|
import {IWormholeRelayerInternalStructs} from "../contracts/interfaces/IWormholeRelayerInternalStructs.sol";
|
|
import {CoreRelayerGovernance} from "../contracts/coreRelayer/CoreRelayerGovernance.sol";
|
|
import {MockGenericRelayer} from "./MockGenericRelayer.sol";
|
|
import {MockWormhole} from "../contracts/mock/MockWormhole.sol";
|
|
import {IWormhole} from "../contracts/interfaces/IWormhole.sol";
|
|
import {WormholeSimulator, FakeWormholeSimulator} from "./WormholeSimulator.sol";
|
|
import {IWormholeReceiver} from "../contracts/interfaces/IWormholeReceiver.sol";
|
|
import {AttackForwardIntegration} from "../contracts/mock/AttackForwardIntegration.sol";
|
|
import {MockRelayerIntegration, Structs} from "../contracts/mock/MockRelayerIntegration.sol";
|
|
import {ForwardTester} from "./ForwardTester.sol";
|
|
import {TestHelpers} from "./TestHelpers.sol";
|
|
import "../contracts/libraries/external/BytesLib.sol";
|
|
|
|
import "forge-std/Test.sol";
|
|
import "forge-std/console.sol";
|
|
import "forge-std/Vm.sol";
|
|
|
|
contract WormholeRelayerTests is Test {
|
|
using BytesLib for bytes;
|
|
|
|
uint16 MAX_UINT16_VALUE = 65535;
|
|
uint96 MAX_UINT96_VALUE = 79228162514264337593543950335;
|
|
|
|
struct GasParameters {
|
|
uint32 evmGasOverhead;
|
|
uint32 targetGasLimit;
|
|
uint128 targetGasPrice;
|
|
uint128 sourceGasPrice;
|
|
}
|
|
|
|
struct FeeParameters {
|
|
uint128 targetNativePrice;
|
|
uint128 sourceNativePrice;
|
|
uint128 wormholeFeeOnSource;
|
|
uint128 wormholeFeeOnTarget;
|
|
uint256 receiverValueTarget;
|
|
}
|
|
|
|
IWormhole relayerWormhole;
|
|
WormholeSimulator relayerWormholeSimulator;
|
|
MockGenericRelayer genericRelayer;
|
|
TestHelpers helpers;
|
|
|
|
function setUp() public {
|
|
// deploy Wormhole
|
|
MockWormhole wormhole = new MockWormhole({
|
|
initChainId: 2,
|
|
initEvmChainId: block.chainid
|
|
});
|
|
|
|
relayerWormhole = wormhole;
|
|
relayerWormholeSimulator = new FakeWormholeSimulator(
|
|
wormhole
|
|
);
|
|
|
|
helpers = new TestHelpers();
|
|
|
|
genericRelayer =
|
|
new MockGenericRelayer(address(wormhole), address(relayerWormholeSimulator), address(helpers.setUpCoreRelayer(2, wormhole, address(0x1))));
|
|
|
|
setUpChains(5);
|
|
|
|
//
|
|
}
|
|
|
|
struct StandardSetupTwoChains {
|
|
uint16 sourceChainId;
|
|
uint16 targetChainId;
|
|
uint16 differentChainId;
|
|
Contracts source;
|
|
Contracts target;
|
|
}
|
|
|
|
function standardAssumeAndSetupTwoChains(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
uint32 minTargetGasLimit
|
|
) public returns (StandardSetupTwoChains memory s) {
|
|
vm.assume(gasParams.evmGasOverhead > 0);
|
|
vm.assume(gasParams.targetGasLimit > 0);
|
|
vm.assume(feeParams.targetNativePrice > 0);
|
|
vm.assume(gasParams.targetGasPrice > 0);
|
|
vm.assume(gasParams.sourceGasPrice > 0);
|
|
vm.assume(feeParams.sourceNativePrice > 0);
|
|
vm.assume(
|
|
feeParams.targetNativePrice
|
|
< (uint256(2) ** 239)
|
|
/ (
|
|
uint256(1) * gasParams.targetGasPrice
|
|
* (uint256(0) + gasParams.targetGasLimit + gasParams.evmGasOverhead) + feeParams.wormholeFeeOnTarget
|
|
)
|
|
);
|
|
vm.assume(
|
|
feeParams.sourceNativePrice
|
|
< (uint256(2) ** 239)
|
|
/ (
|
|
uint256(1) * gasParams.sourceGasPrice
|
|
* (uint256(0) + gasParams.targetGasLimit + gasParams.evmGasOverhead) + feeParams.wormholeFeeOnSource
|
|
)
|
|
);
|
|
vm.assume(gasParams.sourceGasPrice < (uint256(2) ** 239) / feeParams.sourceNativePrice);
|
|
vm.assume(gasParams.targetGasLimit >= minTargetGasLimit);
|
|
vm.assume(
|
|
1
|
|
< (uint256(2) ** 239) / gasParams.targetGasLimit / gasParams.targetGasPrice
|
|
/ (uint256(0) + feeParams.sourceNativePrice / feeParams.targetNativePrice + 2) / gasParams.targetGasLimit
|
|
);
|
|
vm.assume(
|
|
1
|
|
< (uint256(2) ** 239) / gasParams.targetGasLimit / gasParams.sourceGasPrice
|
|
/ (uint256(0) + feeParams.targetNativePrice / feeParams.sourceNativePrice + 2) / gasParams.targetGasLimit
|
|
);
|
|
vm.assume(feeParams.receiverValueTarget < uint256(1) * (uint256(2) ** 239) / feeParams.targetNativePrice);
|
|
|
|
s.sourceChainId = 1;
|
|
s.targetChainId = 2;
|
|
s.differentChainId = 3;
|
|
s.source = map[s.sourceChainId];
|
|
s.target = map[s.targetChainId];
|
|
|
|
vm.deal(s.source.relayer, type(uint256).max / 2);
|
|
vm.deal(s.target.relayer, type(uint256).max / 2);
|
|
vm.deal(address(this), type(uint256).max / 2);
|
|
vm.deal(address(s.target.integration), type(uint256).max / 2);
|
|
vm.deal(address(s.source.integration), type(uint256).max / 2);
|
|
|
|
// set relayProvider prices
|
|
s.source.relayProvider.updatePrice(s.targetChainId, gasParams.targetGasPrice, feeParams.targetNativePrice);
|
|
s.source.relayProvider.updatePrice(s.sourceChainId, gasParams.sourceGasPrice, feeParams.sourceNativePrice);
|
|
s.target.relayProvider.updatePrice(s.targetChainId, gasParams.targetGasPrice, feeParams.targetNativePrice);
|
|
s.target.relayProvider.updatePrice(s.sourceChainId, gasParams.sourceGasPrice, feeParams.sourceNativePrice);
|
|
|
|
s.source.relayProvider.updateDeliverGasOverhead(s.targetChainId, gasParams.evmGasOverhead);
|
|
s.target.relayProvider.updateDeliverGasOverhead(s.sourceChainId, gasParams.evmGasOverhead);
|
|
|
|
s.source.wormholeSimulator.setMessageFee(feeParams.wormholeFeeOnSource);
|
|
s.target.wormholeSimulator.setMessageFee(feeParams.wormholeFeeOnTarget);
|
|
}
|
|
|
|
struct Contracts {
|
|
IWormhole wormhole;
|
|
WormholeSimulator wormholeSimulator;
|
|
RelayProvider relayProvider;
|
|
IWormholeRelayer coreRelayer;
|
|
CoreRelayer coreRelayerFull;
|
|
MockRelayerIntegration integration;
|
|
address relayer;
|
|
address payable rewardAddress;
|
|
address payable refundAddress;
|
|
uint16 chainId;
|
|
}
|
|
|
|
mapping(uint16 => Contracts) map;
|
|
|
|
function setUpChains(uint16 numChains) internal {
|
|
for (uint16 i = 1; i <= numChains; i++) {
|
|
Contracts memory mapEntry;
|
|
(mapEntry.wormhole, mapEntry.wormholeSimulator) = helpers.setUpWormhole(i);
|
|
mapEntry.relayProvider = helpers.setUpRelayProvider(i);
|
|
mapEntry.coreRelayer = helpers.setUpCoreRelayer(i, mapEntry.wormhole, address(mapEntry.relayProvider));
|
|
mapEntry.coreRelayerFull = CoreRelayer(payable(address(mapEntry.coreRelayer)));
|
|
genericRelayer.setWormholeRelayerContract(i, address(mapEntry.coreRelayer));
|
|
mapEntry.integration = new MockRelayerIntegration(address(mapEntry.wormhole), address(mapEntry.coreRelayer));
|
|
mapEntry.relayer = address(uint160(uint256(keccak256(abi.encodePacked(bytes("relayer"), i)))));
|
|
genericRelayer.setProviderDeliveryAddress(i, mapEntry.relayer);
|
|
mapEntry.refundAddress =
|
|
payable(address(uint160(uint256(keccak256(abi.encodePacked(bytes("refundAddress"), i))))));
|
|
mapEntry.rewardAddress =
|
|
payable(address(uint160(uint256(keccak256(abi.encodePacked(bytes("rewardAddress"), i))))));
|
|
mapEntry.chainId = i;
|
|
map[i] = mapEntry;
|
|
}
|
|
|
|
uint256 maxBudget = type(uint256).max;
|
|
for (uint16 i = 1; i <= numChains; i++) {
|
|
for (uint16 j = 1; j <= numChains; j++) {
|
|
map[i].relayProvider.updateSupportedChain(j, true);
|
|
map[i].relayProvider.updateAssetConversionBuffer(j, 500, 10000);
|
|
map[i].relayProvider.updateRewardAddress(map[i].rewardAddress);
|
|
helpers.registerCoreRelayerContract(
|
|
map[i].coreRelayerFull,
|
|
map[i].wormhole,
|
|
i,
|
|
j,
|
|
bytes32(uint256(uint160(address(map[j].coreRelayer))))
|
|
);
|
|
map[i].relayProvider.updateMaximumBudget(j, maxBudget);
|
|
map[i].integration.registerEmitter(j, bytes32(uint256(uint160(address(map[j].integration)))));
|
|
Structs.XAddress[] memory addresses = new Structs.XAddress[](1);
|
|
addresses[0] = Structs.XAddress(j, bytes32(uint256(uint160(address(map[j].integration)))));
|
|
map[i].integration.registerEmitters(addresses);
|
|
}
|
|
}
|
|
}
|
|
|
|
function getDeliveryVAAHash() internal returns (bytes32 vaaHash) {
|
|
vaaHash = vm.getRecordedLogs()[0].data.toBytes32(0);
|
|
}
|
|
|
|
function getDeliveryStatus(Vm.Log memory log) internal returns (DeliveryStatus status) {
|
|
status = DeliveryStatus(log.data.toUint256(32));
|
|
}
|
|
|
|
function getDeliveryStatus() internal returns (DeliveryStatus status) {
|
|
Vm.Log[] memory logs = vm.getRecordedLogs();
|
|
status = getDeliveryStatus(logs[logs.length - 1]);
|
|
}
|
|
|
|
function messageInfoArray(uint64 sequence, address emitterAddress)
|
|
internal
|
|
returns (IWormholeRelayer.MessageInfo[] memory messageInfos)
|
|
{
|
|
messageInfos = new IWormholeRelayer.MessageInfo[](1);
|
|
messageInfos[0] = IWormholeRelayer.MessageInfo(
|
|
IWormholeRelayer.MessageInfoType.EMITTER_SEQUENCE,
|
|
map[1].coreRelayer.toWormholeFormat(emitterAddress),
|
|
sequence,
|
|
bytes32(0x0)
|
|
);
|
|
}
|
|
|
|
function messageInfoArray(uint64 sequence1, address emitterAddress1, uint64 sequence2, address emitterAddress2)
|
|
internal
|
|
returns (IWormholeRelayer.MessageInfo[] memory messageInfos)
|
|
{
|
|
messageInfos = new IWormholeRelayer.MessageInfo[](2);
|
|
messageInfos[0] = IWormholeRelayer.MessageInfo(
|
|
IWormholeRelayer.MessageInfoType.EMITTER_SEQUENCE,
|
|
map[1].coreRelayer.toWormholeFormat(emitterAddress1),
|
|
sequence1,
|
|
bytes32(0x0)
|
|
);
|
|
messageInfos[1] = IWormholeRelayer.MessageInfo(
|
|
IWormholeRelayer.MessageInfoType.EMITTER_SEQUENCE,
|
|
map[1].coreRelayer.toWormholeFormat(emitterAddress2),
|
|
sequence2,
|
|
bytes32(0x0)
|
|
);
|
|
}
|
|
|
|
function testSend(GasParameters memory gasParams, FeeParameters memory feeParams, bytes memory message) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
// estimate the cost based on the intialized values
|
|
uint256 maxTransactionFee = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
);
|
|
|
|
setup.source.integration.sendMessageWithRefundAddress{
|
|
value: maxTransactionFee + uint256(3) * setup.source.wormhole.messageFee()
|
|
}(message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress));
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(message));
|
|
}
|
|
|
|
function testFundsCorrectForASend(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
uint256 refundAddressBalance = setup.target.refundAddress.balance;
|
|
uint256 relayerBalance = setup.target.relayer.balance;
|
|
uint256 rewardAddressBalance = setup.source.rewardAddress.balance;
|
|
uint256 receiverValueSource = setup.source.coreRelayer.quoteReceiverValue(
|
|
setup.targetChainId, feeParams.receiverValueTarget, address(setup.source.relayProvider)
|
|
);
|
|
uint256 payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + uint256(3) * setup.source.wormhole.messageFee() + receiverValueSource;
|
|
|
|
setup.source.integration.sendMessageGeneral{value: payment}(
|
|
message,
|
|
setup.targetChainId,
|
|
address(setup.target.integration),
|
|
address(setup.target.refundAddress),
|
|
receiverValueSource
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(message));
|
|
|
|
uint256 USDcost = (uint256(payment) - uint256(3) * map[setup.sourceChainId].wormhole.messageFee())
|
|
* feeParams.sourceNativePrice
|
|
- (setup.target.refundAddress.balance - refundAddressBalance) * feeParams.targetNativePrice;
|
|
uint256 relayerProfit = uint256(feeParams.sourceNativePrice)
|
|
* (setup.source.rewardAddress.balance - rewardAddressBalance)
|
|
- feeParams.targetNativePrice * (relayerBalance - setup.target.relayer.balance);
|
|
|
|
uint256 howMuchGasRelayerCouldHavePaidForAndStillProfited =
|
|
relayerProfit / gasParams.targetGasPrice / feeParams.targetNativePrice;
|
|
assertTrue(howMuchGasRelayerCouldHavePaidForAndStillProfited >= 30000); // takes around this much gas (seems to go from 36k-200k?!?)
|
|
assertTrue(
|
|
USDcost - (relayerProfit + (uint256(1) * feeParams.receiverValueTarget * feeParams.targetNativePrice)) >= 0,
|
|
"We paid enough"
|
|
);
|
|
assertTrue(
|
|
USDcost - (relayerProfit + (uint256(1) * feeParams.receiverValueTarget * feeParams.targetNativePrice))
|
|
< feeParams.sourceNativePrice,
|
|
"We paid the least amount necessary"
|
|
);
|
|
}
|
|
|
|
function testFundsCorrectForASendIfReceiveWormholeMessagesReverts(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
uint256 refundAddressBalance = setup.target.refundAddress.balance;
|
|
uint256 relayerBalance = setup.target.relayer.balance;
|
|
uint256 rewardAddressBalance = setup.source.rewardAddress.balance;
|
|
uint256 receiverValueSource = setup.source.coreRelayer.quoteReceiverValue(
|
|
setup.targetChainId, feeParams.receiverValueTarget, address(setup.source.relayProvider)
|
|
);
|
|
|
|
uint256 payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, 21000, address(setup.source.relayProvider)
|
|
) + uint256(3) * setup.source.wormhole.messageFee() + receiverValueSource;
|
|
|
|
setup.source.integration.sendMessageGeneral{value: payment}(
|
|
message,
|
|
setup.targetChainId,
|
|
address(setup.target.integration),
|
|
address(setup.target.refundAddress),
|
|
receiverValueSource
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
uint256 USDcost = uint256(payment - uint256(3) * map[setup.sourceChainId].wormhole.messageFee())
|
|
* feeParams.sourceNativePrice
|
|
- (setup.target.refundAddress.balance - refundAddressBalance) * feeParams.targetNativePrice;
|
|
uint256 relayerProfit = uint256(feeParams.sourceNativePrice)
|
|
* (setup.source.rewardAddress.balance - rewardAddressBalance)
|
|
- feeParams.targetNativePrice * (relayerBalance - setup.target.relayer.balance);
|
|
console.log(USDcost);
|
|
console.log(relayerProfit);
|
|
assertTrue(USDcost == relayerProfit, "We paid the exact amount");
|
|
}
|
|
|
|
function assumeAndGetForwardPayment(
|
|
uint32 gasFirst,
|
|
uint32 gasSecond,
|
|
StandardSetupTwoChains memory setup,
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams
|
|
) internal returns (uint256) {
|
|
vm.assume(
|
|
uint256(1) * gasParams.targetGasPrice * feeParams.targetNativePrice
|
|
> uint256(1) * gasParams.sourceGasPrice * feeParams.sourceNativePrice
|
|
);
|
|
|
|
vm.assume(
|
|
setup.source.coreRelayer.quoteGas(setup.targetChainId, gasFirst, address(setup.source.relayProvider))
|
|
< uint256(2) ** 221
|
|
);
|
|
vm.assume(
|
|
setup.target.coreRelayer.quoteGas(setup.sourceChainId, gasSecond, address(setup.target.relayProvider))
|
|
< uint256(2) ** 221 / feeParams.targetNativePrice
|
|
);
|
|
|
|
uint256 payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasFirst, address(setup.source.relayProvider)
|
|
) + 3 * setup.source.wormhole.messageFee();
|
|
|
|
uint256 payment2 = (
|
|
setup.target.coreRelayer.quoteGas(setup.sourceChainId, gasSecond, address(setup.target.relayProvider))
|
|
+ uint256(2) * setup.target.wormhole.messageFee()
|
|
) * feeParams.targetNativePrice / feeParams.sourceNativePrice + 1;
|
|
|
|
vm.assume((payment + payment2) < (uint256(2) ** 222));
|
|
|
|
return payment + payment2;
|
|
}
|
|
|
|
function testForward(GasParameters memory gasParams, FeeParameters memory feeParams, bytes memory message) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
uint256 payment = assumeAndGetForwardPayment(gasParams.targetGasLimit, 700000, setup, gasParams, feeParams);
|
|
|
|
vm.recordLogs();
|
|
|
|
setup.source.integration.sendMessageWithForwardedResponse{value: payment}(
|
|
message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress)
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(message));
|
|
|
|
genericRelayer.relay(setup.targetChainId);
|
|
|
|
assertTrue(keccak256(setup.source.integration.getMessage()) == keccak256(bytes("received!")));
|
|
}
|
|
|
|
struct ForwardRequestFailStack {
|
|
uint256 payment;
|
|
uint256 wormholeFee;
|
|
uint16[] chains;
|
|
uint32[] gasLimits;
|
|
bytes[] newMessages;
|
|
uint64 sequence1;
|
|
uint64 sequence2;
|
|
bytes32 targetAddress;
|
|
bytes encodedFurtherInstructions;
|
|
}
|
|
|
|
function testForwardRequestFail(GasParameters memory gasParams, FeeParameters memory feeParams) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
ForwardRequestFailStack memory stack;
|
|
vm.assume(
|
|
uint256(1) * feeParams.targetNativePrice * gasParams.targetGasPrice * 10
|
|
< uint256(1) * feeParams.sourceNativePrice * gasParams.sourceGasPrice
|
|
);
|
|
stack.payment =
|
|
setup.source.coreRelayer.quoteGas(setup.targetChainId, 1000000, address(setup.source.relayProvider));
|
|
|
|
vm.recordLogs();
|
|
|
|
IWormhole wormhole = setup.source.wormhole;
|
|
stack.wormholeFee = wormhole.messageFee();
|
|
vm.prank(address(setup.source.integration));
|
|
stack.sequence1 = wormhole.publishMessage{value: stack.wormholeFee}(0, bytes("hello!"), 200);
|
|
|
|
stack.chains = new uint16[](1);
|
|
stack.chains[0] = wormhole.chainId();
|
|
stack.gasLimits = new uint32[](1);
|
|
stack.gasLimits[0] = 1000000;
|
|
stack.newMessages = new bytes[](2);
|
|
stack.newMessages[0] = bytes("received!");
|
|
stack.newMessages[1] = abi.encodePacked(uint8(0));
|
|
MockRelayerIntegration.FurtherInstructions memory instructions = MockRelayerIntegration.FurtherInstructions({
|
|
keepSending: true,
|
|
newMessages: stack.newMessages,
|
|
chains: stack.chains,
|
|
gasLimits: stack.gasLimits
|
|
});
|
|
stack.encodedFurtherInstructions = setup.source.integration.encodeFurtherInstructions(instructions);
|
|
vm.prank(address(setup.source.integration));
|
|
stack.sequence2 = wormhole.publishMessage{value: stack.wormholeFee}(0, stack.encodedFurtherInstructions, 200);
|
|
stack.targetAddress = setup.source.coreRelayer.toWormholeFormat(address(setup.target.integration));
|
|
|
|
setup.source.coreRelayer.send{value: stack.payment + stack.wormholeFee}(
|
|
setup.targetChainId,
|
|
stack.targetAddress,
|
|
stack.targetAddress,
|
|
stack.payment,
|
|
0,
|
|
messageInfoArray(
|
|
stack.sequence1, address(setup.source.integration), stack.sequence2, address(setup.source.integration)
|
|
)
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
Vm.Log[] memory logs = vm.getRecordedLogs();
|
|
|
|
DeliveryStatus status = getDeliveryStatus(logs[logs.length - 1]);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) != keccak256(bytes("hello!")));
|
|
|
|
assertTrue(status == DeliveryStatus.FORWARD_REQUEST_FAILURE);
|
|
}
|
|
|
|
function testAttackForwardRequestCache(GasParameters memory gasParams, FeeParameters memory feeParams) public {
|
|
// General idea:
|
|
// 1. Attacker sets up a malicious integration contract in the target chain.
|
|
// 2. Attacker requests a message send to `target` chain.
|
|
// The message destination and the refund address are both the malicious integration contract in the target chain.
|
|
// 3. The delivery of the message triggers a refund to the malicious integration contract.
|
|
// 4. During the refund, the integration contract activates the forwarding mechanism.
|
|
// This is allowed due to the integration contract also being the target of the delivery.
|
|
// 5. The forward request is left as is in the `CoreRelayer` state.
|
|
// 6. The next message (i.e. the victim's message) delivery on `target` chain, from any relayer, using any `RelayProvider` and any integration contract,
|
|
// will see the forward request placed by the malicious integration contract and act on it.
|
|
// Caveat: the delivery of the victim's message must not invoke the forwarding mechanism for the attack test to be meaningful.
|
|
//
|
|
// In essence, this tries to attack the shared forwarding request cache present in the contract state.
|
|
// This attack doesn't work thanks to the check inside the `requestForward` function that only allows requesting a forward when there is a delivery being processed.
|
|
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
// Collected funds from the attack are meant to be sent here.
|
|
address attackerSourceAddress =
|
|
address(uint160(uint256(keccak256(abi.encodePacked(bytes("attackerAddress"), setup.sourceChainId)))));
|
|
assertTrue(attackerSourceAddress.balance == 0);
|
|
|
|
// Borrowed assumes from testForward. They should help since this test is similar.
|
|
vm.assume(
|
|
uint256(1) * gasParams.targetGasPrice * feeParams.targetNativePrice
|
|
> uint256(1) * gasParams.sourceGasPrice * feeParams.sourceNativePrice
|
|
);
|
|
|
|
vm.assume(
|
|
setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) < uint256(2) ** 222
|
|
);
|
|
vm.assume(
|
|
setup.target.coreRelayer.quoteGas(setup.sourceChainId, 500000, address(setup.target.relayProvider))
|
|
< uint256(2) ** 222 / feeParams.targetNativePrice
|
|
);
|
|
|
|
// Estimate the cost based on the initialized values
|
|
uint256 computeBudget = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
);
|
|
|
|
{
|
|
AttackForwardIntegration attackerContract =
|
|
new AttackForwardIntegration(setup.target.wormhole, setup.target.coreRelayer, setup.targetChainId, attackerSourceAddress);
|
|
bytes memory attackMsg = "attack";
|
|
|
|
vm.recordLogs();
|
|
|
|
// The attacker requests the message to be sent to the malicious contract.
|
|
// It is critical that the refund and destination (aka integrator) addresses are the same.
|
|
setup.source.integration.sendMessage{value: computeBudget + uint256(3) * setup.source.wormhole.messageFee()}(
|
|
attackMsg, setup.targetChainId, address(attackerContract)
|
|
);
|
|
|
|
// The relayer triggers the call to the malicious contract.
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
// The message delivery should fail
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) != keccak256(attackMsg));
|
|
}
|
|
|
|
{
|
|
// Now one victim sends their message. It doesn't need to be from the same source chain.
|
|
// What's necessary is that a message is delivered to the chain targeted by the attacker.
|
|
bytes memory victimMsg = "relay my message";
|
|
|
|
uint256 victimBalancePreDelivery = setup.target.refundAddress.balance;
|
|
|
|
// We will reutilize the compute budget estimated for the attacker to simplify the code here.
|
|
// The victim requests their message to be sent.
|
|
setup.source.integration.sendMessageWithRefundAddress{
|
|
value: computeBudget + uint256(3) * setup.source.wormhole.messageFee()
|
|
}(victimMsg, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress));
|
|
|
|
// The relayer delivers the victim's message.
|
|
// During the delivery process, the forward request injected by the malicious contract is acknowledged.
|
|
// The victim's refund address is not called due to this.
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
// Ensures the message was received.
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(victimMsg));
|
|
// Here we assert that the victim's refund is safe.
|
|
assertTrue(victimBalancePreDelivery < setup.target.refundAddress.balance);
|
|
}
|
|
|
|
genericRelayer.relay(setup.targetChainId);
|
|
|
|
// Assert that the attack wasn't successful.
|
|
assertTrue(attackerSourceAddress.balance == 0);
|
|
}
|
|
|
|
function sendWithoutEnoughMaxTransactionFee(bytes memory message, StandardSetupTwoChains memory setup)
|
|
internal
|
|
returns (bytes32 deliveryVaaHash, uint64 sequence)
|
|
{
|
|
uint256 paymentNotEnough = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, 10, address(setup.source.relayProvider)
|
|
) + setup.source.wormhole.messageFee() * 3;
|
|
|
|
vm.deal(address(this), paymentNotEnough);
|
|
sequence = setup.source.integration.sendMessageWithRefundAddress{value: paymentNotEnough}(
|
|
message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress)
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(
|
|
(keccak256(setup.target.integration.getMessage()) != keccak256(message))
|
|
|| (keccak256(message) == keccak256(bytes("")))
|
|
);
|
|
|
|
deliveryVaaHash = getDeliveryVAAHash();
|
|
}
|
|
|
|
function testQuoteReceiverValueIsEnough(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
vm.assume(feeParams.receiverValueTarget > 0);
|
|
vm.recordLogs();
|
|
|
|
// estimate the cost based on the intialized values
|
|
uint256 payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + 3 * setup.source.wormhole.messageFee();
|
|
|
|
uint256 oldBalance = address(setup.target.integration).balance;
|
|
|
|
uint256 newReceiverValueSource = setup.source.coreRelayer.quoteReceiverValue(
|
|
setup.targetChainId, feeParams.receiverValueTarget, address(setup.source.relayProvider)
|
|
);
|
|
|
|
vm.deal(address(this), payment + newReceiverValueSource);
|
|
|
|
setup.source.integration.sendMessageGeneral{value: payment + newReceiverValueSource}(
|
|
message, setup.targetChainId, address(setup.target.integration), address(0x0), newReceiverValueSource
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(message));
|
|
|
|
assertTrue(address(setup.target.integration).balance >= oldBalance + feeParams.receiverValueTarget);
|
|
}
|
|
|
|
function testQuoteReceiverValueIsNotMoreThanNecessary(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
vm.assume(feeParams.receiverValueTarget > 0);
|
|
vm.recordLogs();
|
|
|
|
// estimate the cost based on the intialized values
|
|
uint256 payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + 3 * setup.source.wormhole.messageFee();
|
|
|
|
uint256 oldBalance = address(setup.target.integration).balance;
|
|
|
|
uint256 newReceiverValueSource = setup.source.coreRelayer.quoteReceiverValue(
|
|
setup.targetChainId, feeParams.receiverValueTarget, address(setup.source.relayProvider)
|
|
);
|
|
|
|
vm.deal(address(this), payment + newReceiverValueSource - 1);
|
|
|
|
setup.source.integration.sendMessageGeneral{value: payment + newReceiverValueSource - 1}(
|
|
message, setup.targetChainId, address(setup.target.integration), address(0x0), newReceiverValueSource - 1
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(message));
|
|
|
|
assertTrue(address(setup.target.integration).balance < oldBalance + feeParams.receiverValueTarget);
|
|
}
|
|
|
|
function testTwoSends(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message,
|
|
bytes memory secondMessage
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
// estimate the cost based on the intialized values
|
|
uint256 payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + uint256(3) * setup.source.wormhole.messageFee();
|
|
|
|
// This avoids payment overflow in the target.
|
|
vm.assume(payment <= type(uint256).max >> 1);
|
|
|
|
// start listening to events
|
|
vm.recordLogs();
|
|
|
|
setup.source.integration.sendMessageWithRefundAddress{value: payment}(
|
|
message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress)
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(message));
|
|
|
|
vm.getRecordedLogs();
|
|
|
|
vm.deal(address(this), payment);
|
|
|
|
setup.source.integration.sendMessageWithRefundAddress{value: payment}(
|
|
secondMessage, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress)
|
|
);
|
|
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
|
|
assertTrue(keccak256(setup.target.integration.getMessage()) == keccak256(secondMessage));
|
|
}
|
|
|
|
function invalidateVM(bytes memory message, WormholeSimulator simulator) internal {
|
|
change(message, message.length - 1);
|
|
simulator.invalidateVM(message);
|
|
}
|
|
|
|
function change(bytes memory message, uint256 index) internal pure {
|
|
if (message[index] == 0x02) {
|
|
message[index] = 0x04;
|
|
} else {
|
|
message[index] = 0x02;
|
|
}
|
|
}
|
|
|
|
event Delivery(
|
|
address indexed recipientContract,
|
|
uint16 indexed sourceChain,
|
|
uint64 indexed sequence,
|
|
bytes32 deliveryVaaHash,
|
|
DeliveryStatus status
|
|
);
|
|
|
|
enum DeliveryStatus {
|
|
SUCCESS,
|
|
RECEIVER_FAILURE,
|
|
FORWARD_REQUEST_FAILURE,
|
|
FORWARD_REQUEST_SUCCESS
|
|
}
|
|
|
|
struct DeliveryStack {
|
|
bytes32 deliveryVaaHash;
|
|
uint256 payment;
|
|
uint256 paymentNotEnough;
|
|
Vm.Log[] entries;
|
|
bytes actualVM1;
|
|
bytes actualVM2;
|
|
bytes deliveryVM;
|
|
bytes[] encodedVMs;
|
|
IWormhole.VM parsed;
|
|
uint256 budget;
|
|
IDelivery.TargetDeliveryParameters package;
|
|
IWormholeRelayerInternalStructs.DeliveryInstruction instruction;
|
|
}
|
|
|
|
function prepareDeliveryStack(DeliveryStack memory stack, StandardSetupTwoChains memory setup) internal {
|
|
stack.entries = vm.getRecordedLogs();
|
|
|
|
stack.actualVM1 = relayerWormholeSimulator.fetchSignedMessageFromLogs(
|
|
stack.entries[0], setup.sourceChainId, address(setup.source.integration)
|
|
);
|
|
|
|
stack.actualVM2 = relayerWormholeSimulator.fetchSignedMessageFromLogs(
|
|
stack.entries[1], setup.sourceChainId, address(setup.source.integration)
|
|
);
|
|
|
|
stack.deliveryVM = relayerWormholeSimulator.fetchSignedMessageFromLogs(
|
|
stack.entries[2], setup.sourceChainId, address(setup.source.coreRelayer)
|
|
);
|
|
|
|
stack.encodedVMs = new bytes[](2);
|
|
stack.encodedVMs[0] = stack.actualVM1;
|
|
stack.encodedVMs[1] = stack.actualVM2;
|
|
|
|
stack.package = IDelivery.TargetDeliveryParameters({
|
|
encodedVMs: stack.encodedVMs,
|
|
encodedDeliveryVAA: stack.deliveryVM,
|
|
multisendIndex: 0,
|
|
relayerRefundAddress: payable(setup.target.relayer)
|
|
});
|
|
|
|
stack.parsed = relayerWormhole.parseVM(stack.deliveryVM);
|
|
stack.instruction =
|
|
setup.target.coreRelayerFull.decodeDeliveryInstructionsContainer(stack.parsed.payload).instructions[0];
|
|
|
|
stack.budget = stack.instruction.maximumRefundTarget + stack.instruction.receiverValueTarget;
|
|
}
|
|
|
|
function testRevertDeliveryInvalidDeliveryVAA(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
DeliveryStack memory stack;
|
|
|
|
stack.payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + 3 * setup.source.wormhole.messageFee();
|
|
|
|
setup.source.integration.sendMessageWithRefundAddress{value: stack.payment}(
|
|
message, setup.targetChainId, address(setup.target.integration), setup.target.refundAddress
|
|
);
|
|
|
|
prepareDeliveryStack(stack, setup);
|
|
|
|
bytes memory fakeVM = abi.encodePacked(stack.deliveryVM);
|
|
|
|
invalidateVM(fakeVM, setup.target.wormholeSimulator);
|
|
|
|
stack.deliveryVM = fakeVM;
|
|
|
|
stack.package = IDelivery.TargetDeliveryParameters({
|
|
encodedVMs: stack.encodedVMs,
|
|
encodedDeliveryVAA: stack.deliveryVM,
|
|
multisendIndex: 0,
|
|
relayerRefundAddress: payable(setup.target.relayer)
|
|
});
|
|
|
|
vm.prank(setup.target.relayer);
|
|
vm.expectRevert(abi.encodeWithSignature("InvalidDeliveryVaa(string)", ""));
|
|
setup.target.coreRelayerFull.deliver{value: stack.budget}(stack.package);
|
|
}
|
|
|
|
function testRevertDeliveryInvalidEmitter(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
DeliveryStack memory stack;
|
|
|
|
stack.payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + 3 * setup.source.wormhole.messageFee();
|
|
|
|
setup.source.integration.sendMessageWithRefundAddress{value: stack.payment}(
|
|
message, setup.targetChainId, address(setup.target.integration), setup.target.refundAddress
|
|
);
|
|
|
|
prepareDeliveryStack(stack, setup);
|
|
|
|
stack.deliveryVM = stack.encodedVMs[0];
|
|
|
|
stack.package = IDelivery.TargetDeliveryParameters({
|
|
encodedVMs: stack.encodedVMs,
|
|
encodedDeliveryVAA: stack.deliveryVM,
|
|
multisendIndex: 0,
|
|
relayerRefundAddress: payable(setup.target.relayer)
|
|
});
|
|
|
|
vm.prank(setup.target.relayer);
|
|
vm.expectRevert(abi.encodeWithSignature("InvalidEmitter()"));
|
|
setup.target.coreRelayerFull.deliver{value: stack.budget}(stack.package);
|
|
}
|
|
|
|
function testRevertDeliveryInsufficientRelayerFunds(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
DeliveryStack memory stack;
|
|
|
|
stack.payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + 3 * setup.source.wormhole.messageFee();
|
|
|
|
setup.source.integration.sendMessageWithRefundAddress{value: stack.payment}(
|
|
message, setup.targetChainId, address(setup.target.integration), setup.target.refundAddress
|
|
);
|
|
|
|
prepareDeliveryStack(stack, setup);
|
|
|
|
vm.prank(setup.target.relayer);
|
|
vm.expectRevert(abi.encodeWithSignature("InsufficientRelayerFunds()"));
|
|
setup.target.coreRelayerFull.deliver{value: stack.budget - 1}(stack.package);
|
|
}
|
|
|
|
function testRevertDeliveryTargetChainIsNotThisChain(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
DeliveryStack memory stack;
|
|
|
|
stack.payment = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
) + 3 * setup.source.wormhole.messageFee();
|
|
|
|
setup.source.integration.sendMessageWithRefundAddress{value: stack.payment}(
|
|
message, setup.targetChainId, address(setup.target.integration), setup.target.refundAddress
|
|
);
|
|
|
|
prepareDeliveryStack(stack, setup);
|
|
|
|
vm.prank(setup.target.relayer);
|
|
vm.expectRevert(abi.encodeWithSignature("TargetChainIsNotThisChain(uint16)", 2));
|
|
map[setup.differentChainId].coreRelayerFull.deliver{value: stack.budget}(stack.package);
|
|
}
|
|
|
|
struct SendStackTooDeep {
|
|
uint256 payment;
|
|
IWormholeRelayer.Send deliveryRequest;
|
|
uint256 deliveryOverhead;
|
|
IWormholeRelayer.Send badSend;
|
|
}
|
|
|
|
function testRevertSendMsgValueTooLow(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
uint256 maxTransactionFee = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
);
|
|
|
|
uint64 sequence =
|
|
setup.source.wormhole.publishMessage{value: setup.source.wormhole.messageFee()}(1, message, 200);
|
|
|
|
IWormholeRelayer.Send memory deliveryRequest = IWormholeRelayer.Send({
|
|
targetChain: setup.targetChainId,
|
|
targetAddress: setup.source.coreRelayer.toWormholeFormat(address(setup.target.integration)),
|
|
refundChain: setup.targetChainId,
|
|
refundAddress: setup.source.coreRelayer.toWormholeFormat(address(setup.target.refundAddress)),
|
|
maxTransactionFee: maxTransactionFee,
|
|
receiverValue: 0,
|
|
relayParameters: setup.source.coreRelayer.getDefaultRelayParams()
|
|
});
|
|
|
|
uint256 wormholeFee = setup.source.wormhole.messageFee();
|
|
|
|
IWormholeRelayer.MessageInfo[] memory msgInfoArray = messageInfoArray(sequence, address(this));
|
|
vm.expectRevert(abi.encodeWithSignature("MsgValueTooLow()"));
|
|
setup.source.coreRelayer.send{value: maxTransactionFee + wormholeFee - 1}(
|
|
deliveryRequest, msgInfoArray, address(setup.source.relayProvider)
|
|
);
|
|
}
|
|
|
|
function testRevertSendMaxTransactionFeeNotEnough(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
setup.source.relayProvider.updateDeliverGasOverhead(setup.targetChainId, gasParams.evmGasOverhead);
|
|
|
|
uint256 maxTransactionFee = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, 1, setup.source.coreRelayer.getDefaultRelayProvider()
|
|
) - 1;
|
|
|
|
uint256 wormholeFee = setup.source.wormhole.messageFee();
|
|
|
|
vm.expectRevert(abi.encodeWithSignature("MaxTransactionFeeNotEnough(uint8)", 0));
|
|
setup.source.integration.sendMessageWithRefundAddress{value: maxTransactionFee + 3 * wormholeFee}(
|
|
message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress)
|
|
);
|
|
}
|
|
|
|
function testRevertSendFundsTooMuch(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
uint256 maxTransactionFee = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
);
|
|
|
|
setup.source.relayProvider.updateMaximumBudget(
|
|
setup.targetChainId, uint256(gasParams.targetGasLimit - 1) * gasParams.targetGasPrice
|
|
);
|
|
|
|
uint256 wormholeFee = setup.source.wormhole.messageFee();
|
|
|
|
vm.expectRevert(abi.encodeWithSignature("FundsTooMuch(uint8)", 0));
|
|
setup.source.integration.sendMessageWithRefundAddress{
|
|
value: maxTransactionFee * 105 / 100 + 1 + 3 * wormholeFee
|
|
}(message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress));
|
|
}
|
|
|
|
function testRevertMultichainSendEmpty(GasParameters memory gasParams, FeeParameters memory feeParams) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
uint256 wormholeFee = setup.source.wormhole.messageFee();
|
|
|
|
vm.expectRevert(abi.encodeWithSignature("MultichainSendEmpty()"));
|
|
|
|
setup.source.coreRelayer.multichainSend{value: wormholeFee}(
|
|
IWormholeRelayer.MultichainSend(
|
|
address(0x1), new IWormholeRelayer.MessageInfo[](0), new IWormholeRelayer.Send[](0)
|
|
)
|
|
);
|
|
}
|
|
|
|
ForwardTester forwardTester;
|
|
|
|
struct ForwardStack {
|
|
bytes32 targetAddress;
|
|
uint256 payment;
|
|
uint256 wormholeFee;
|
|
}
|
|
|
|
function executeForwardTest(
|
|
ForwardTester.Action test,
|
|
DeliveryStatus desiredOutcome,
|
|
StandardSetupTwoChains memory setup,
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams
|
|
) internal {
|
|
ForwardStack memory stack;
|
|
vm.recordLogs();
|
|
forwardTester =
|
|
new ForwardTester(address(setup.target.wormhole), address(setup.target.coreRelayer), address(setup.target.wormholeSimulator));
|
|
vm.deal(address(forwardTester), type(uint256).max / 2);
|
|
stack.targetAddress = setup.source.coreRelayer.toWormholeFormat(address(forwardTester));
|
|
stack.payment = assumeAndGetForwardPayment(gasParams.targetGasLimit, 700000, setup, gasParams, feeParams);
|
|
stack.wormholeFee = setup.source.wormhole.messageFee();
|
|
uint64 sequence =
|
|
setup.source.wormhole.publishMessage{value: stack.wormholeFee}(1, abi.encodePacked(uint8(test)), 200);
|
|
setup.source.coreRelayer.send{value: stack.payment}(
|
|
setup.targetChainId,
|
|
stack.targetAddress,
|
|
stack.targetAddress,
|
|
stack.payment - stack.wormholeFee,
|
|
0,
|
|
messageInfoArray(sequence, address(this))
|
|
);
|
|
genericRelayer.relay(setup.sourceChainId);
|
|
DeliveryStatus status = getDeliveryStatus();
|
|
assertTrue(status == desiredOutcome);
|
|
}
|
|
|
|
function testForwardTester(GasParameters memory gasParams, FeeParameters memory feeParams) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
executeForwardTest(
|
|
ForwardTester.Action.WorksCorrectly, DeliveryStatus.FORWARD_REQUEST_SUCCESS, setup, gasParams, feeParams
|
|
);
|
|
}
|
|
|
|
function testRevertForwardNoDeliveryInProgress(GasParameters memory gasParams, FeeParameters memory feeParams)
|
|
public
|
|
{
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
bytes32 targetAddress = setup.source.coreRelayer.toWormholeFormat(address(forwardTester));
|
|
|
|
IWormholeRelayer.MessageInfo[] memory msgInfoArray = messageInfoArray(0, address(this));
|
|
vm.expectRevert(abi.encodeWithSignature("NoDeliveryInProgress()"));
|
|
setup.source.coreRelayer.forward(setup.targetChainId, targetAddress, targetAddress, 0, 0, msgInfoArray);
|
|
}
|
|
|
|
function testRevertForwardMultipleForwardsRequested(GasParameters memory gasParams, FeeParameters memory feeParams)
|
|
public
|
|
{
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
executeForwardTest(
|
|
ForwardTester.Action.MultipleForwardsRequested, DeliveryStatus.RECEIVER_FAILURE, setup, gasParams, feeParams
|
|
);
|
|
}
|
|
|
|
function testRevertForwardMultichainSendEmpty(GasParameters memory gasParams, FeeParameters memory feeParams)
|
|
public
|
|
{
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
executeForwardTest(
|
|
ForwardTester.Action.MultichainSendEmpty, DeliveryStatus.RECEIVER_FAILURE, setup, gasParams, feeParams
|
|
);
|
|
}
|
|
|
|
function testRevertForwardForwardRequestFromWrongAddress(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
executeForwardTest(
|
|
ForwardTester.Action.ForwardRequestFromWrongAddress,
|
|
DeliveryStatus.RECEIVER_FAILURE,
|
|
setup,
|
|
gasParams,
|
|
feeParams
|
|
);
|
|
}
|
|
|
|
function testRevertDeliveryReentrantCall(GasParameters memory gasParams, FeeParameters memory feeParams) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
executeForwardTest(
|
|
ForwardTester.Action.ReentrantCall, DeliveryStatus.RECEIVER_FAILURE, setup, gasParams, feeParams
|
|
);
|
|
}
|
|
|
|
function testRevertForwardMaxTransactionFeeNotEnough(GasParameters memory gasParams, FeeParameters memory feeParams)
|
|
public
|
|
{
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
executeForwardTest(
|
|
ForwardTester.Action.MaxTransactionFeeNotEnough,
|
|
DeliveryStatus.RECEIVER_FAILURE,
|
|
setup,
|
|
gasParams,
|
|
feeParams
|
|
);
|
|
}
|
|
|
|
function testRevertForwardFundsTooMuch(GasParameters memory gasParams, FeeParameters memory feeParams) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
setup.target.relayProvider.updateMaximumBudget(
|
|
setup.sourceChainId, uint256(10000 - 1) * gasParams.sourceGasPrice
|
|
);
|
|
|
|
executeForwardTest(
|
|
ForwardTester.Action.FundsTooMuch, DeliveryStatus.RECEIVER_FAILURE, setup, gasParams, feeParams
|
|
);
|
|
}
|
|
|
|
function testRevertTargetNotSupported(
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams,
|
|
bytes memory message
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
vm.recordLogs();
|
|
|
|
// estimate the cost based on the intialized values
|
|
uint256 maxTransactionFee = setup.source.coreRelayer.quoteGas(
|
|
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
|
|
);
|
|
|
|
uint256 wormholeFee = setup.source.wormhole.messageFee();
|
|
|
|
vm.expectRevert(abi.encodeWithSignature("RelayProviderDoesNotSupportTargetChain()"));
|
|
setup.source.integration.sendMessageWithRefundAddress{value: maxTransactionFee + uint256(3) * wormholeFee}(
|
|
message, 32, address(setup.target.integration), address(setup.target.refundAddress)
|
|
);
|
|
}
|
|
|
|
function testToAndFromWormholeFormat(bytes32 msg2, address msg1) public {
|
|
assertTrue(map[1].coreRelayer.fromWormholeFormat(msg2) == address(uint160(uint256(msg2))));
|
|
assertTrue(map[1].coreRelayer.toWormholeFormat(msg1) == bytes32(uint256(uint160(msg1))));
|
|
assertTrue(map[1].coreRelayer.fromWormholeFormat(map[1].coreRelayer.toWormholeFormat(msg1)) == msg1);
|
|
}
|
|
|
|
function testEncodeAndDecodeDeliveryInstructions(
|
|
IWormholeRelayerInternalStructs.DeliveryInstruction memory instruction,
|
|
IWormholeRelayerInternalStructs.DeliveryInstruction memory instruction2,
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
IWormholeRelayer.MessageInfo[] memory messageInfos = new IWormholeRelayer.MessageInfo[](1);
|
|
messageInfos[0] = IWormholeRelayer.MessageInfo({
|
|
infoType: IWormholeRelayer.MessageInfoType.EMITTER_SEQUENCE,
|
|
emitterAddress: bytes32(""),
|
|
sequence: 25,
|
|
vaaHash: bytes32("")
|
|
});
|
|
|
|
IWormholeRelayerInternalStructs.DeliveryInstruction[] memory instructions =
|
|
new IWormholeRelayerInternalStructs.DeliveryInstruction[](2);
|
|
instructions[0] = instruction;
|
|
instructions[1] = instruction2;
|
|
|
|
IWormholeRelayerInternalStructs.DeliveryInstructionsContainer memory container = IWormholeRelayerInternalStructs
|
|
.DeliveryInstructionsContainer({
|
|
payloadId: 1,
|
|
senderAddress: bytes32("234"),
|
|
relayProviderAddress: bytes32("456"),
|
|
messageInfos: messageInfos,
|
|
instructions: instructions
|
|
});
|
|
|
|
IWormholeRelayerInternalStructs.DeliveryInstructionsContainer memory newContainer = setup
|
|
.source
|
|
.coreRelayerFull
|
|
.decodeDeliveryInstructionsContainer(
|
|
setup.source.coreRelayerFull.encodeDeliveryInstructionsContainer(container)
|
|
);
|
|
for (uint256 i = 0; i < newContainer.instructions.length; i++) {
|
|
assertTrue(
|
|
newContainer.instructions[i].maximumRefundTarget == container.instructions[i].maximumRefundTarget
|
|
);
|
|
assertTrue(
|
|
newContainer.instructions[i].receiverValueTarget == container.instructions[i].receiverValueTarget
|
|
);
|
|
}
|
|
}
|
|
|
|
function testEncodeAndDecodeDeliveryInstruction(
|
|
IWormholeRelayerInternalStructs.DeliveryInstruction memory instruction,
|
|
GasParameters memory gasParams,
|
|
FeeParameters memory feeParams
|
|
) public {
|
|
StandardSetupTwoChains memory setup = standardAssumeAndSetupTwoChains(gasParams, feeParams, 1000000);
|
|
|
|
(IWormholeRelayerInternalStructs.DeliveryInstruction memory newInstruction, uint256 index) = setup
|
|
.source
|
|
.coreRelayerFull
|
|
.decodeDeliveryInstruction(setup.source.coreRelayerFull.encodeDeliveryInstruction(instruction), 0);
|
|
|
|
assertTrue(newInstruction.maximumRefundTarget == instruction.maximumRefundTarget);
|
|
assertTrue(newInstruction.receiverValueTarget == instruction.receiverValueTarget);
|
|
}
|
|
}
|