wormhole/clients/token_bridge/main.ts

455 lines
16 KiB
TypeScript

import yargs from "yargs";
const {hideBin} = require('yargs/helpers')
import * as elliptic from "elliptic";
import * as ethers from "ethers";
import * as web3s from '@solana/web3.js';
import {fromUint8Array} from "js-base64";
import {LCDClient, MnemonicKey} from '@terra-money/terra.js';
import {MsgExecuteContract} from "@terra-money/terra.js";
import {PublicKey, TransactionInstruction, AccountMeta, Keypair, Connection} from "@solana/web3.js";
import {base58, solidityKeccak256} from "ethers/lib/utils";
import {setDefaultWasm, importCoreWasm, importTokenWasm, ixFromRust, BridgeImplementation__factory} from '@certusone/wormhole-sdk'
setDefaultWasm("node")
const signAndEncodeVM = function (
timestamp,
nonce,
emitterChainId,
emitterAddress,
sequence,
data,
signers,
guardianSetIndex,
consistencyLevel
) {
const body = [
ethers.utils.defaultAbiCoder.encode(["uint32"], [timestamp]).substring(2 + (64 - 8)),
ethers.utils.defaultAbiCoder.encode(["uint32"], [nonce]).substring(2 + (64 - 8)),
ethers.utils.defaultAbiCoder.encode(["uint16"], [emitterChainId]).substring(2 + (64 - 4)),
ethers.utils.defaultAbiCoder.encode(["bytes32"], [emitterAddress]).substring(2),
ethers.utils.defaultAbiCoder.encode(["uint64"], [sequence]).substring(2 + (64 - 16)),
ethers.utils.defaultAbiCoder.encode(["uint8"], [consistencyLevel]).substring(2 + (64 - 2)),
data.substr(2)
]
const hash = solidityKeccak256(["bytes"], [solidityKeccak256(["bytes"], ["0x" + body.join("")])])
let signatures = "";
for (let i in signers) {
const ec = new elliptic.ec("secp256k1");
const key = ec.keyFromPrivate(signers[i]);
const signature = key.sign(Buffer.from(hash.substr(2), "hex"), {canonical: true});
const packSig = [
ethers.utils.defaultAbiCoder.encode(["uint8"], [i]).substring(2 + (64 - 2)),
zeroPadBytes(signature.r.toString(16), 32),
zeroPadBytes(signature.s.toString(16), 32),
ethers.utils.defaultAbiCoder.encode(["uint8"], [signature.recoveryParam]).substr(2 + (64 - 2)),
]
signatures += packSig.join("")
}
const vm = [
ethers.utils.defaultAbiCoder.encode(["uint8"], [1]).substring(2 + (64 - 2)),
ethers.utils.defaultAbiCoder.encode(["uint32"], [guardianSetIndex]).substring(2 + (64 - 8)),
ethers.utils.defaultAbiCoder.encode(["uint8"], [signers.length]).substring(2 + (64 - 2)),
signatures,
body.join("")
].join("");
return vm
}
function zeroPadBytes(value, length) {
while (value.length < 2 * length) {
value = "0" + value;
}
return value;
}
yargs(hideBin(process.argv))
.command('generate_register_chain_vaa [chain_id] [contract_address]', 'create a VAA to register a chain (debug-only)', (yargs) => {
return yargs
.positional('chain_id', {
describe: 'chain id to register',
type: "number",
required: true
})
.positional('contract_address', {
describe: 'contract to register',
type: "string",
required: true
})
.option('guardian_secret', {
describe: 'Guardian\'s secret key',
type: "string",
default: "cfb12303a19cde580bb4dd771639b0d26bc68353645571a8cff516ab2ee113a0"
})
}, async (argv: any) => {
let data = [
"0x",
"000000000000000000000000000000000000000000546f6b656e427269646765", // Token Bridge header
"01",
"0000",
ethers.utils.defaultAbiCoder.encode(["uint16"], [argv.chain_id]).substring(2 + (64 - 4)),
ethers.utils.defaultAbiCoder.encode(["bytes32"], [fmtAddress(argv.contract_address)]).substring(2),
].join('')
const vm = signAndEncodeVM(
1,
1,
1,
"0x0000000000000000000000000000000000000000000000000000000000000004",
Math.floor(Math.random() * 100000000),
data,
[
argv.guardian_secret
],
0,
0
);
console.log(vm)
})
.command('generate_upgrade_chain_vaa [chain_id] [contract_address]', 'create a VAA to upgrade a chain (debug-only)', (yargs) => {
return yargs
.positional('chain_id', {
describe: 'chain id to upgrade',
type: "number",
required: true
})
.positional('contract_address', {
describe: 'contract to upgrade to',
type: "string",
required: true
})
.option('guardian_secret', {
describe: 'Guardian\'s secret key',
type: "string",
default: "cfb12303a19cde580bb4dd771639b0d26bc68353645571a8cff516ab2ee113a0"
})
}, async (argv: any) => {
let data = [
"0x",
"000000000000000000000000000000000000000000546f6b656e427269646765", // Token Bridge header
"02",
ethers.utils.defaultAbiCoder.encode(["uint16"], [argv.chain_id]).substring(2 + (64 - 4)),
ethers.utils.defaultAbiCoder.encode(["bytes32"], [fmtAddress(argv.contract_address)]).substring(2),
].join('')
const vm = signAndEncodeVM(
1,
1,
1,
"0x0000000000000000000000000000000000000000000000000000000000000004",
Math.floor(Math.random() * 100000000),
data,
[
argv.guardian_secret
],
0,
0
);
console.log(vm)
})
.command('terra execute_governance_vaa [vaa]', 'execute a governance VAA on Terra', (yargs) => {
return yargs
.positional('vaa', {
describe: 'vaa to post',
type: "string",
required: true
})
.option('rpc', {
alias: 'u',
type: 'string',
description: 'URL of the Terra RPC',
default: "http://localhost:1317"
})
.option('token_bridge', {
alias: 't',
type: 'string',
description: 'Token Bridge address',
default: "terra10pyejy66429refv3g35g2t7am0was7ya7kz2a4"
})
.option('chain_id', {
alias: 'c',
type: 'string',
description: 'Chain ID',
// Should be localterra in theory, however Terra Station will
// assume columbus-4 when localterra is set, while our current
// dev environment is based on columbus-4. Should change when
// change ID within terra/devnet/config/genesis.json is also
// changed.
default: 'columbus-4'
})
.option('mnemonic', {
alias: 'm',
type: 'string',
description: 'Wallet Mnemonic',
default: 'notice oak worry limit wrap speak medal online prefer cluster roof addict wrist behave treat actual wasp year salad speed social layer crew genius',
})
}, async (argv: any) => {
const terra = new LCDClient({
URL: argv.rpc,
chainID: argv.chain_id,
});
const wallet = terra.wallet(new MnemonicKey({
mnemonic: argv.mnemonic
}));
// create a simple message that moves coin balances
const vaa = Buffer.from(argv.vaa, "hex");
const transaction = new MsgExecuteContract(
wallet.key.accAddress,
argv.token_bridge,
{
submit_vaa: {
data: fromUint8Array(vaa)
},
},
{uluna: 1000}
);
wallet
.createAndSignTx({
msgs: [transaction],
memo: '',
})
.then(tx => terra.tx.broadcast(tx))
.then(result => {
console.log(result);
console.log(`TX hash: ${result.txhash}`);
});
})
.command('solana execute_governance_vaa [vaa]', 'execute a governance VAA on Solana', (yargs) => {
return yargs
.positional('vaa', {
describe: 'vaa to post',
type: "string",
required: true
})
.option('rpc', {
alias: 'u',
type: 'string',
description: 'URL of the Solana RPC',
default: "http://localhost:8899"
})
.option('bridge', {
alias: 'b',
type: 'string',
description: 'Bridge address',
default: "Bridge1p5gheXUvJ6jGWGeCsgPKgnE3YgdGKRVCMY9o"
})
.option('token_bridge', {
alias: 't',
type: 'string',
description: 'Token Bridge address',
default: "B6RHG3mfcckmrYN1UhmJzyS1XX3fZKbkeUcpJe9Sy3FE"
})
.option('key', {
alias: 'k',
type: 'string',
description: 'Private key of the wallet',
required: false
})
}, async (argv: any) => {
const bridge = await importCoreWasm()
const token_bridge = await importTokenWasm()
let connection = setupConnection(argv);
let bridge_id = new PublicKey(argv.bridge);
let token_bridge_id = new PublicKey(argv.token_bridge);
var from: web3s.Keypair;
if (argv.key) {
from = web3s.Keypair.fromSecretKey(base58.decode(argv.key));
} else {
from = web3s.Keypair.generate();
let airdropSignature = await connection.requestAirdrop(
from.publicKey,
web3s.LAMPORTS_PER_SOL,
);
await connection.confirmTransaction(airdropSignature);
}
let vaa = Buffer.from(argv.vaa, "hex");
await post_vaa(connection, bridge_id, from, vaa);
let parsed_vaa = await bridge.parse_vaa(vaa);
let ix: TransactionInstruction;
switch (parsed_vaa.payload[32]) {
case 1:
console.log("Registering chain")
ix = token_bridge.register_chain_ix(token_bridge_id.toString(), bridge_id.toString(), from.publicKey.toString(), vaa);
break
case 2:
console.log("Upgrading contract")
ix = token_bridge.upgrade_contract_ix(token_bridge_id.toString(), bridge_id.toString(), from.publicKey.toString(), from.publicKey.toString(), vaa);
break
default:
throw new Error("unknown governance action")
}
let transaction = new web3s.Transaction().add(ixFromRust(ix));
// Sign transaction, broadcast, and confirm
let signature = await web3s.sendAndConfirmTransaction(
connection,
transaction,
[from],
{
skipPreflight: true
}
);
console.log('SIGNATURE', signature);
})
.command('eth execute_governance_vaa [vaa]', 'execute a governance VAA on evm', (yargs) => {
return yargs
.positional('vaa', {
describe: 'vaa to post',
type: "string",
required: true
})
.option('rpc', {
alias: 'u',
type: 'string',
description: 'URL of the ETH RPC',
default: "http://localhost:8545"
})
.option('token_bridge', {
alias: 't',
type: 'string',
description: 'Token Bridge address',
default: "0x0290FB167208Af455bB137780163b7B7a9a10C16"
})
.option('key', {
alias: 'k',
type: 'string',
description: 'Private key of the wallet',
default: "0x4f3edf983ac636a65a842ce7c78d9aa706d3b113bce9c46f30d7d21715b23b1d"
})
}, async (argv: any) => {
const bridge = await importCoreWasm()
let provider = new ethers.providers.JsonRpcProvider(argv.rpc)
let signer = new ethers.Wallet(argv.key, provider)
let t = new BridgeImplementation__factory(signer);
let tb = t.attach(argv.token_bridge);
let vaa = Buffer.from(argv.vaa, "hex");
let parsed_vaa = await bridge.parse_vaa(vaa);
switch (parsed_vaa.payload[32]) {
case 1:
console.log("Registering chain")
console.log("Hash: " + (await tb.registerChain(vaa)).hash)
break
case 2:
console.log("Upgrading contract")
console.log("Hash: " + (await tb.upgrade(vaa)).hash)
console.log("Don't forget to verify the new implementation! See ethereum/VERIFY.md for instructions")
break
default:
throw new Error("unknown governance action")
}
})
.argv;
async function post_vaa(connection: Connection, bridge_id: PublicKey, payer: Keypair, vaa: Buffer) {
const bridge = await importCoreWasm()
let bridge_state = await get_bridge_state(connection, bridge_id);
let guardian_addr = new PublicKey(bridge.guardian_set_address(bridge_id.toString(), bridge_state.guardian_set_index));
let acc = await connection.getAccountInfo(guardian_addr);
if (acc?.data === undefined) {
return
}
let guardian_data = bridge.parse_guardian_set(new Uint8Array(acc?.data));
let signature_set = Keypair.generate();
let txs = bridge.verify_signatures_ix(bridge_id.toString(), payer.publicKey.toString(), bridge_state.guardian_set_index, guardian_data, signature_set.publicKey.toString(), vaa)
// Add transfer instruction to transaction
for (let tx of txs) {
let ixs: Array<TransactionInstruction> = tx.map((v: any) => {
return ixFromRust(v)
})
let transaction = new web3s.Transaction().add(ixs[0], ixs[1]);
// Sign transaction, broadcast, and confirm
await web3s.sendAndConfirmTransaction(
connection,
transaction,
[payer, signature_set],
{
skipPreflight: true
}
);
}
let ix = ixFromRust(bridge.post_vaa_ix(bridge_id.toString(), payer.publicKey.toString(), signature_set.publicKey.toString(), vaa));
let transaction = new web3s.Transaction().add(ix);
// Sign transaction, broadcast, and confirm
let signature = await web3s.sendAndConfirmTransaction(
connection,
transaction,
[payer],
{
skipPreflight: true
}
);
console.log('SIGNATURE', signature);
}
async function get_bridge_state(connection: Connection, bridge_id: PublicKey): Promise<BridgeState> {
const bridge = await importCoreWasm()
let bridge_state = new PublicKey(bridge.state_address(bridge_id.toString()));
let acc = await connection.getAccountInfo(bridge_state);
if (acc?.data === undefined) {
throw new Error("bridge state not found")
}
return bridge.parse_state(new Uint8Array(acc?.data));
}
function setupConnection(argv: yargs.Arguments): web3s.Connection {
return new web3s.Connection(
argv.rpc as string,
'confirmed',
);
}
function fmtAddress(addr: string) : string {
let address = (addr.search("0x") == 0) ? addr.substring(2) : addr;
return "0x" + zeroPadBytes(address, 32);
}
interface BridgeState {
// The current guardian set index, used to decide which signature sets to accept.
guardian_set_index: number,
// Lamports in the collection account
last_lamports: number,
// Bridge configuration, which is set once upon initialization.
config: BridgeConfig,
}
interface BridgeConfig {
// Period for how long a guardian set is valid after it has been replaced by a new one. This
// guarantees that VAAs issued by that set can still be submitted for a certain period. In
// this period we still trust the old guardian set.
guardian_set_expiration_time: number,
// Amount of lamports that needs to be paid to the protocol to post a message
fee: number,
}