-
Notifications
You must be signed in to change notification settings - Fork 17
/
Copy pathMockWormhole.sol
281 lines (222 loc) · 8.8 KB
/
MockWormhole.sol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
// SPDX-License-Identifier: Apache 2
pragma solidity ^0.8.17;
import "wormhole-solidity-sdk/interfaces/IWormhole.sol";
import "./BytesLib.sol";
contract MockWormhole is IWormhole {
using BytesLib for bytes;
uint256 private constant VM_VERSION_SIZE = 1;
uint256 private constant VM_GUARDIAN_SET_SIZE = 4;
uint256 private constant VM_SIGNATURE_COUNT_SIZE = 1;
uint256 private constant VM_TIMESTAMP_SIZE = 4;
uint256 private constant VM_NONCE_SIZE = 4;
uint256 private constant VM_EMITTER_CHAIN_ID_SIZE = 2;
uint256 private constant VM_EMITTER_ADDRESS_SIZE = 32;
uint256 private constant VM_SEQUENCE_SIZE = 8;
uint256 private constant VM_CONSISTENCY_LEVEL_SIZE = 1;
uint256 private constant VM_SIZE_MINIMUM = VM_VERSION_SIZE + VM_GUARDIAN_SET_SIZE + VM_SIGNATURE_COUNT_SIZE
+ VM_TIMESTAMP_SIZE + VM_NONCE_SIZE + VM_EMITTER_CHAIN_ID_SIZE + VM_EMITTER_ADDRESS_SIZE + VM_SEQUENCE_SIZE
+ VM_CONSISTENCY_LEVEL_SIZE;
uint256 private constant SIGNATURE_GUARDIAN_INDEX_SIZE = 1;
uint256 private constant SIGNATURE_R_SIZE = 32;
uint256 private constant SIGNATURE_S_SIZE = 32;
uint256 private constant SIGNATURE_V_SIZE = 1;
uint256 private constant SIGNATURE_SIZE_TOTAL =
SIGNATURE_GUARDIAN_INDEX_SIZE + SIGNATURE_R_SIZE + SIGNATURE_S_SIZE + SIGNATURE_V_SIZE;
mapping(address => uint64) public sequences;
// Dictionary of VMs that must be mocked as invalid.
mapping(bytes32 => bool) public invalidVMs;
uint256 currentMsgFee;
uint16 immutable wormholeChainId;
uint256 immutable boundEvmChainId;
constructor(uint16 initChainId, uint256 initEvmChainId) {
wormholeChainId = initChainId;
boundEvmChainId = initEvmChainId;
}
function invalidateVM(bytes calldata encodedVm) external {
VM memory vm = _parseVM(encodedVm);
invalidVMs[vm.hash] = true;
}
function publishMessage(uint32 nonce, bytes memory payload, uint8 consistencyLevel)
external
payable
returns (uint64 sequence)
{
require(msg.value == currentMsgFee, "invalid fee");
sequence = sequences[msg.sender]++;
emit LogMessagePublished(msg.sender, sequence, nonce, payload, consistencyLevel);
}
function parseVM(bytes calldata encodedVm) external pure returns (VM memory vm) {
vm = _parseVM(encodedVm);
}
function parseAndVerifyVM(bytes calldata encodedVm)
external
view
returns (VM memory vm, bool valid, string memory reason)
{
vm = _parseVM(encodedVm);
//behold the rigorous checking!
valid = !invalidVMs[vm.hash];
reason = "";
}
function _parseVM(bytes calldata encodedVm) internal pure returns (VM memory vm) {
require(encodedVm.length >= VM_SIZE_MINIMUM, "vm too small");
bytes memory body;
uint256 offset = 0;
vm.version = encodedVm.toUint8(offset);
offset += 1;
vm.guardianSetIndex = encodedVm.toUint32(offset);
offset += 4;
(vm.signatures, offset) = parseSignatures(encodedVm, offset);
body = encodedVm[offset:];
vm.timestamp = encodedVm.toUint32(offset);
offset += 4;
vm.nonce = encodedVm.toUint32(offset);
offset += 4;
vm.emitterChainId = encodedVm.toUint16(offset);
offset += 2;
vm.emitterAddress = encodedVm.toBytes32(offset);
offset += 32;
vm.sequence = encodedVm.toUint64(offset);
offset += 8;
vm.consistencyLevel = encodedVm.toUint8(offset);
offset += 1;
vm.payload = encodedVm[offset:];
vm.hash = keccak256(abi.encodePacked(keccak256(body)));
}
function parseSignatures(bytes calldata encodedVm, uint256 offset)
internal
pure
returns (Signature[] memory signatures, uint256 offsetAfterParse)
{
uint256 sigCount = uint256(encodedVm.toUint8(offset));
offset += 1;
require(encodedVm.length >= (VM_SIZE_MINIMUM + sigCount * SIGNATURE_SIZE_TOTAL), "vm too small");
signatures = new Signature[](sigCount);
for (uint256 i = 0; i < sigCount; ++i) {
uint8 guardianIndex = encodedVm.toUint8(offset);
offset += 1;
bytes32 r = encodedVm.toBytes32(offset);
offset += 32;
bytes32 s = encodedVm.toBytes32(offset);
offset += 32;
uint8 v = encodedVm.toUint8(offset);
offset += 1;
signatures[i] = Signature({
r: r,
s: s,
// The hardcoded 27 comes from the base offset for public key recovery ids, public key type and network
// used in ECDSA signatures for bitcoin and ethereum.
// See https://bitcoin.stackexchange.com/a/5089
v: v + 27,
guardianIndex: guardianIndex
});
}
return (signatures, offset);
}
function initialize() external {}
function quorum(uint256 /*numGuardians*/ ) external pure returns (uint256 /*numSignaturesRequiredForQuorum*/ ) {
return 1;
}
/**
* General state and chain observers
*/
function chainId() external view returns (uint16) {
return wormholeChainId;
}
function evmChainId() external view returns (uint256) {
return boundEvmChainId;
}
function getCurrentGuardianSetIndex() external pure returns (uint32) {
return 0;
}
function getGuardianSet(uint32 /*index*/ ) external pure returns (GuardianSet memory) {
revert("unsupported getGuardianSet in wormhole mock");
}
function getGuardianSetExpiry() external pure returns (uint32) {
return 0;
}
function governanceActionIsConsumed(bytes32 /*hash*/ ) external pure returns (bool) {
return false;
}
function isInitialized(address /*impl*/ ) external pure returns (bool) {
return true;
}
function isFork() external pure returns (bool) {
return false;
}
function governanceChainId() external pure returns (uint16) {
return 1;
}
function governanceContract() external pure returns (bytes32) {
return bytes32(0x0000000000000000000000000000000000000000000000000000000000000004);
}
function messageFee() external view returns (uint256) {
return currentMsgFee;
}
function nextSequence(address emitter) external view returns (uint64) {
return sequences[emitter];
}
function verifyVM(VM memory /*vm*/ ) external pure returns (bool, /*valid*/ string memory /*reason*/ ) {
revert("unsupported verifyVM in wormhole mock");
}
function verifySignatures(bytes32, /*hash*/ Signature[] memory, /*signatures*/ GuardianSet memory /*guardianSet*/ )
external
pure
returns (bool, /*valid*/ string memory /*reason*/ )
{
revert("unsupported verifySignatures in wormhole mock");
}
function parseContractUpgrade(bytes memory /*encodedUpgrade*/ )
external
pure
returns (ContractUpgrade memory /*cu*/ )
{
revert("unsupported parseContractUpgrade in wormhole mock");
}
function parseGuardianSetUpgrade(bytes memory /*encodedUpgrade*/ )
external
pure
returns (GuardianSetUpgrade memory /*gsu*/ )
{
revert("unsupported parseGuardianSetUpgrade in wormhole mock");
}
function parseSetMessageFee(bytes memory /*encodedSetMessageFee*/ )
external
pure
returns (SetMessageFee memory /*smf*/ )
{
revert("unsupported parseSetMessageFee in wormhole mock");
}
function parseTransferFees(bytes memory /*encodedTransferFees*/ )
external
pure
returns (TransferFees memory /*tf*/ )
{
revert("unsupported parseTransferFees in wormhole mock");
}
function parseRecoverChainId(bytes memory /*encodedRecoverChainId*/ )
external
pure
returns (RecoverChainId memory /*rci*/ )
{
revert("unsupported parseRecoverChainId in wormhole mock");
}
function submitContractUpgrade(bytes memory /*_vm*/ ) external pure {
revert("unsupported submitContractUpgrade in wormhole mock");
}
function submitSetMessageFee(bytes memory /*_vm*/ ) external pure {
revert("unsupported submitSetMessageFee in wormhole mock");
}
function setMessageFee(uint256 newFee) external {
currentMsgFee = newFee;
}
function submitNewGuardianSet(bytes memory /*_vm*/ ) external pure {
revert("unsupported submitNewGuardianSet in wormhole mock");
}
function submitTransferFees(bytes memory /*_vm*/ ) external pure {
revert("unsupported submitTransferFees in wormhole mock");
}
function submitRecoverChainId(bytes memory /*_vm*/ ) external pure {
revert("unsupported submitRecoverChainId in wormhole mock");
}
}