156 lines
5.2 KiB
Solidity
156 lines
5.2 KiB
Solidity
|
|
// SPDX-License-Identifier: UNLICENSED
|
|
pragma solidity ^0.8.13;
|
|
|
|
import {IWormhole} from "../../src/interfaces/IWormhole.sol";
|
|
import "../../src/libraries/external/BytesLib.sol";
|
|
|
|
import "forge-std/Vm.sol";
|
|
import "forge-std/console.sol";
|
|
|
|
contract WormholeSimulator {
|
|
using BytesLib for bytes;
|
|
|
|
// Taken from forge-std/Script.sol
|
|
address private constant VM_ADDRESS = address(bytes20(uint160(uint256(keccak256("hevm cheat code")))));
|
|
Vm public constant vm = Vm(VM_ADDRESS);
|
|
|
|
// Allow access to Wormhole
|
|
IWormhole public wormhole;
|
|
|
|
// Save the guardian PK to sign messages with
|
|
uint256 private devnetGuardianPK;
|
|
|
|
constructor(address wormhole_, uint256 devnetGuardian) {
|
|
wormhole = IWormhole(wormhole_);
|
|
devnetGuardianPK = devnetGuardian;
|
|
overrideToDevnetGuardian(vm.addr(devnetGuardian));
|
|
}
|
|
|
|
function overrideToDevnetGuardian(address devnetGuardian) internal {
|
|
{
|
|
bytes32 data = vm.load(address(this), bytes32(uint256(2)));
|
|
require(data == bytes32(0), "incorrect slot");
|
|
|
|
// Get slot for Guardian Set at the current index
|
|
uint32 guardianSetIndex = wormhole.getCurrentGuardianSetIndex();
|
|
bytes32 guardianSetSlot = keccak256(abi.encode(guardianSetIndex, 2));
|
|
|
|
// Overwrite all but first guardian set to zero address. This isn't
|
|
// necessary, but just in case we inadvertently access these slots
|
|
// for any reason.
|
|
uint256 numGuardians = uint256(vm.load(address(wormhole), guardianSetSlot));
|
|
for (uint256 i = 1; i < numGuardians;) {
|
|
vm.store(
|
|
address(wormhole), bytes32(uint256(keccak256(abi.encodePacked(guardianSetSlot))) + i), bytes32(0)
|
|
);
|
|
unchecked {
|
|
i += 1;
|
|
}
|
|
}
|
|
|
|
// Now overwrite the first guardian key with the devnet key specified
|
|
// in the function argument.
|
|
vm.store(
|
|
address(wormhole),
|
|
bytes32(uint256(keccak256(abi.encodePacked(guardianSetSlot))) + 0), // just explicit w/ index 0
|
|
bytes32(uint256(uint160(devnetGuardian)))
|
|
);
|
|
|
|
// Change the length to 1 guardian
|
|
vm.store(
|
|
address(wormhole),
|
|
guardianSetSlot,
|
|
bytes32(uint256(1)) // length == 1
|
|
);
|
|
|
|
// Confirm guardian set override
|
|
address[] memory guardians = wormhole.getGuardianSet(guardianSetIndex).keys;
|
|
require(guardians.length == 1, "guardians.length != 1");
|
|
require(guardians[0] == devnetGuardian, "incorrect guardian set override");
|
|
}
|
|
}
|
|
|
|
function doubleKeccak256(bytes memory body) internal pure returns (bytes32) {
|
|
return keccak256(abi.encodePacked(keccak256(body)));
|
|
}
|
|
|
|
function parseVMFromLogs(Vm.Log memory log) internal pure returns (IWormhole.VM memory vm_) {
|
|
uint256 index = 0;
|
|
|
|
// emitterAddress
|
|
vm_.emitterAddress = bytes32(log.topics[1]);
|
|
|
|
// sequence
|
|
vm_.sequence = log.data.toUint64(index + 32 - 8);
|
|
index += 32;
|
|
|
|
// nonce
|
|
vm_.nonce = log.data.toUint32(index + 32 - 4);
|
|
index += 32;
|
|
|
|
// skip random bytes
|
|
index += 32;
|
|
|
|
// consistency level
|
|
vm_.consistencyLevel = log.data.toUint8(index + 32 - 1);
|
|
index += 32;
|
|
|
|
// length of payload
|
|
uint256 payloadLen = log.data.toUint256(index);
|
|
index += 32;
|
|
|
|
vm_.payload = log.data.slice(index, payloadLen);
|
|
index += payloadLen;
|
|
|
|
// trailing bytes (due to 32 byte slot overlap)
|
|
index += log.data.length - index;
|
|
|
|
require(index == log.data.length, "failed to parse wormhole message");
|
|
}
|
|
|
|
function encodeObservation(IWormhole.VM memory vm_) public pure returns (bytes memory) {
|
|
return abi.encodePacked(
|
|
vm_.timestamp,
|
|
vm_.nonce,
|
|
vm_.emitterChainId,
|
|
vm_.emitterAddress,
|
|
vm_.sequence,
|
|
vm_.consistencyLevel,
|
|
vm_.payload
|
|
);
|
|
}
|
|
|
|
function fetchSignedMessageFromLogs(Vm.Log memory log) public returns (bytes memory) {
|
|
// Create message instance
|
|
IWormhole.VM memory vm_;
|
|
|
|
// Parse wormhole message from ethereum logs
|
|
vm_ = parseVMFromLogs(log);
|
|
|
|
// Set empty body values before computing the hash
|
|
vm_.version = uint8(1);
|
|
vm_.timestamp = uint32(block.timestamp);
|
|
vm_.emitterChainId = wormhole.chainId();
|
|
|
|
// Compute the hash of the body
|
|
bytes memory body = encodeObservation(vm_);
|
|
vm_.hash = doubleKeccak256(body);
|
|
|
|
// Sign the hash with the devnet guardian private key
|
|
IWormhole.Signature[] memory sigs = new IWormhole.Signature[](1);
|
|
(sigs[0].v, sigs[0].r, sigs[0].s) = vm.sign(devnetGuardianPK, vm_.hash);
|
|
sigs[0].guardianIndex = 0;
|
|
|
|
return abi.encodePacked(
|
|
vm_.version,
|
|
wormhole.getCurrentGuardianSetIndex(),
|
|
uint8(sigs.length),
|
|
sigs[0].guardianIndex,
|
|
sigs[0].r,
|
|
sigs[0].s,
|
|
sigs[0].v - 27,
|
|
body
|
|
);
|
|
}
|
|
} |