forge fmt

This commit is contained in:
derpy-duck 2023-02-13 15:29:45 +00:00 committed by chase-45
parent ae5e23cd67
commit 1401c88038
2 changed files with 12 additions and 10 deletions

View File

@ -47,10 +47,12 @@ contract MockRelayerIntegration is IWormholeReceiver {
sendMessageGeneral(_message, targetChainId, destination, destination, 0, 1);
}
function sendMessageWithRefundAddress(bytes memory _message, uint16 targetChainId, address destination, address refundAddress)
public
payable
{
function sendMessageWithRefundAddress(
bytes memory _message,
uint16 targetChainId,
address destination,
address refundAddress
) public payable {
sendMessageGeneral(_message, targetChainId, destination, refundAddress, 0, 1);
}

View File

@ -343,9 +343,9 @@ contract TestCoreRelayer is Test {
setup.targetChainId, gasParams.targetGasLimit, address(setup.source.relayProvider)
);
setup.source.integration.sendMessageWithRefundAddress{value: maxTransactionFee + uint256(3) * setup.source.wormhole.messageFee()}(
message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress)
);
setup.source.integration.sendMessageWithRefundAddress{
value: maxTransactionFee + uint256(3) * setup.source.wormhole.messageFee()
}(message, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress));
genericRelayer(setup.sourceChainId, 3);
@ -560,9 +560,9 @@ contract TestCoreRelayer is Test {
// We will reutilize the compute budget estimated for the attacker to simplify the code here.
// The victim requests their message to be sent.
setup.source.integration.sendMessageWithRefundAddress{value: computeBudget + uint256(3) * setup.source.wormhole.messageFee()}(
victimMsg, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress)
);
setup.source.integration.sendMessageWithRefundAddress{
value: computeBudget + uint256(3) * setup.source.wormhole.messageFee()
}(victimMsg, setup.targetChainId, address(setup.target.integration), address(setup.target.refundAddress));
// The relayer delivers the victim's message.
// During the delivery process, the forward request injected by the malicious contract is acknowledged.