diff --git a/.gitmodules b/.gitmodules new file mode 100644 index 00000000..ca439845 --- /dev/null +++ b/.gitmodules @@ -0,0 +1,12 @@ +[submodule "evm/lib/forge-std"] + path = evm/lib/forge-std + url = https://github.com/foundry-rs/forge-std + branch = v1.8.0 +[submodule "evm/lib/openzeppelin-contracts"] + path = evm/lib/openzeppelin-contracts + url = https://github.com/openzeppelin/openzeppelin-contracts + branch = v4.9.6 +[submodule "evm/lib/wormhole-solidity-sdk"] + path = evm/lib/wormhole-solidity-sdk + url = https://github.com/wormhole-foundation/wormhole-solidity-sdk + branch = 2b7db51f99b49eda99b44f4a044e751cb0b2e8ea diff --git a/evm/.gitignore b/evm/.gitignore index 563d95e1..10ee8775 100644 --- a/evm/.gitignore +++ b/evm/.gitignore @@ -2,7 +2,6 @@ .env .vscode cache -/lib /bin node_modules out diff --git a/evm/Makefile b/evm/Makefile index c429bd10..1540f398 100644 --- a/evm/Makefile +++ b/evm/Makefile @@ -14,28 +14,31 @@ integration-test: node_modules ts/tests/.env bash ts/tests/run_integration_test.sh .PHONY: test -test: node_modules ts/tests/.env - forge test --fork-url ${AVAX_RPC} -vv +test: forge-test ts/tests/.env bash ts/tests/run_integration_test.sh +.PHONY: forge-test +forge-test: dependencies + forge test --fork-url ${AVAX_RPC} -vv + .PHONY: build build: dependencies - forge build + forge build --skip test npm run build-types .PHONY: dependencies -dependencies: node_modules lib/forge-std lib/openzeppelin-contracts +dependencies: node_modules .PHONY: clean clean: forge clean - rm -rf node_modules anvil.log lib forge-scripts ts/src/types + rm -rf node_modules anvil.log ts/src/types node_modules: npm ci -lib/forge-std: - forge install foundry-rs/forge-std@v1.6.1 --no-git --no-commit +# lib/forge-std: +# forge install foundry-rs/forge-std@v1.6.1 --no-git --no-commit -lib/openzeppelin-contracts: - forge install openzeppelin/openzeppelin-contracts@v4.8.1 --no-git --no-commit \ No newline at end of file +# lib/openzeppelin-contracts: +# forge install openzeppelin/openzeppelin-contracts@v4.8.1 --no-git --no-commit \ No newline at end of file diff --git a/evm/modules/circle/CircleSimulator.sol b/evm/forge/modules/circle/CircleSimulator.sol similarity index 97% rename from evm/modules/circle/CircleSimulator.sol rename to evm/forge/modules/circle/CircleSimulator.sol index 087e9da4..d079d0e4 100644 --- a/evm/modules/circle/CircleSimulator.sol +++ b/evm/forge/modules/circle/CircleSimulator.sol @@ -1,12 +1,12 @@ // SPDX-License-Identifier: Apache 2 pragma solidity ^0.8.13; -import "../wormhole/BytesLib.sol"; +import "local-modules/wormhole/BytesLib.sol"; import "@openzeppelin/contracts/token/ERC20/IERC20.sol"; import "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; -import {IMessageTransmitter} from "./IMessageTransmitter.sol"; +import {IMessageTransmitter} from "src/interfaces/external/IMessageTransmitter.sol"; import "forge-std/Vm.sol"; import "forge-std/console.sol"; diff --git a/evm/modules/circle/IUSDC.sol b/evm/forge/modules/circle/IUSDC.sol similarity index 100% rename from evm/modules/circle/IUSDC.sol rename to evm/forge/modules/circle/IUSDC.sol diff --git a/evm/modules/wormhole/BytesLib.sol b/evm/forge/modules/wormhole/BytesLib.sol similarity index 100% rename from evm/modules/wormhole/BytesLib.sol rename to evm/forge/modules/wormhole/BytesLib.sol diff --git a/evm/modules/wormhole/ICircleIntegration.sol b/evm/forge/modules/wormhole/ICircleIntegration.sol similarity index 89% rename from evm/modules/wormhole/ICircleIntegration.sol rename to evm/forge/modules/wormhole/ICircleIntegration.sol index 15de5c42..dbb190b2 100644 --- a/evm/modules/wormhole/ICircleIntegration.sol +++ b/evm/forge/modules/wormhole/ICircleIntegration.sol @@ -2,10 +2,10 @@ pragma solidity ^0.8.19; -import {IWormhole} from "./IWormhole.sol"; -import {ICircleBridge} from "cctp-solidity/ICircleBridge.sol"; -import {IMessageTransmitter} from "cctp-solidity/IMessageTransmitter.sol"; -import {ITokenMinter} from "cctp-solidity/ITokenMinter.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {ICircleBridge} from "src/interfaces/external/ICircleBridge.sol"; +import {IMessageTransmitter} from "src/interfaces/external/IMessageTransmitter.sol"; +import {ITokenMinter} from "src/interfaces/external/ITokenMinter.sol"; interface ICircleIntegration { struct TransferParameters { diff --git a/evm/modules/wormhole/IWETH.sol b/evm/forge/modules/wormhole/IWETH.sol similarity index 100% rename from evm/modules/wormhole/IWETH.sol rename to evm/forge/modules/wormhole/IWETH.sol diff --git a/evm/modules/wormhole/MockWormhole.sol b/evm/forge/modules/wormhole/MockWormhole.sol similarity index 99% rename from evm/modules/wormhole/MockWormhole.sol rename to evm/forge/modules/wormhole/MockWormhole.sol index c10e008f..d0c443dc 100644 --- a/evm/modules/wormhole/MockWormhole.sol +++ b/evm/forge/modules/wormhole/MockWormhole.sol @@ -2,7 +2,7 @@ pragma solidity ^0.8.17; -import "./IWormhole.sol"; +import "wormhole-solidity-sdk/interfaces/IWormhole.sol"; import "./BytesLib.sol"; contract MockWormhole is IWormhole { diff --git a/evm/modules/wormhole/WormholeSimulator.sol b/evm/forge/modules/wormhole/WormholeSimulator.sol similarity index 99% rename from evm/modules/wormhole/WormholeSimulator.sol rename to evm/forge/modules/wormhole/WormholeSimulator.sol index 240ab0a9..9b8488c0 100644 --- a/evm/modules/wormhole/WormholeSimulator.sol +++ b/evm/forge/modules/wormhole/WormholeSimulator.sol @@ -1,7 +1,7 @@ // SPDX-License-Identifier: Apache 2 pragma solidity ^0.8.0; -import {IWormhole} from "./IWormhole.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; import {MockWormhole} from "./MockWormhole.sol"; import "./BytesLib.sol"; diff --git a/evm/forge/scripts/DeployMatchingEngineContract.s.sol b/evm/forge/scripts/DeployMatchingEngineContract.s.sol index 9bc3da84..b35bf2c0 100644 --- a/evm/forge/scripts/DeployMatchingEngineContract.s.sol +++ b/evm/forge/scripts/DeployMatchingEngineContract.s.sol @@ -6,12 +6,10 @@ import "forge-std/Script.sol"; import "forge-std/console2.sol"; import {ERC1967Proxy} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {ITokenBridge} from "wormhole-solidity/ITokenBridge.sol"; -import {MatchingEngineSetup} from "../../src/MatchingEngine/MatchingEngineSetup.sol"; +import {MatchingEngineSetup} from "src/MatchingEngine/MatchingEngineSetup.sol"; import {MatchingEngineImplementation} from - "../../src/MatchingEngine/MatchingEngineImplementation.sol"; + "src/MatchingEngine/MatchingEngineImplementation.sol"; import {CheckWormholeContracts} from "./helpers/CheckWormholeContracts.sol"; diff --git a/evm/forge/scripts/DeployTokenRouterContracts.s.sol b/evm/forge/scripts/DeployTokenRouterContracts.s.sol index f22cf30b..ac4969ec 100644 --- a/evm/forge/scripts/DeployTokenRouterContracts.s.sol +++ b/evm/forge/scripts/DeployTokenRouterContracts.s.sol @@ -6,15 +6,13 @@ import "forge-std/Script.sol"; import "forge-std/console2.sol"; import {ERC1967Proxy} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {ITokenBridge} from "wormhole-solidity/ITokenBridge.sol"; -import {TokenRouterSetup} from "../../src/TokenRouter/TokenRouterSetup.sol"; -import {TokenRouterImplementation} from "../../src/TokenRouter/TokenRouterImplementation.sol"; +import {TokenRouterSetup} from "src/TokenRouter/TokenRouterSetup.sol"; +import {TokenRouterImplementation} from "src/TokenRouter/TokenRouterImplementation.sol"; import {CheckWormholeContracts} from "./helpers/CheckWormholeContracts.sol"; -import {Utils} from "../../src/shared/Utils.sol"; +import {Utils} from "src/shared/Utils.sol"; contract DeployTokenRouterContracts is CheckWormholeContracts, Script { using Utils for address; diff --git a/evm/forge/scripts/TestTransfer.s.sol b/evm/forge/scripts/TestTransfer.s.sol index e346fb9b..232468f7 100644 --- a/evm/forge/scripts/TestTransfer.s.sol +++ b/evm/forge/scripts/TestTransfer.s.sol @@ -8,7 +8,7 @@ import "forge-std/console2.sol"; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; -import "../../src/interfaces/ITokenRouter.sol"; +import "src/interfaces/ITokenRouter.sol"; contract TestTransfer is Script { uint16 immutable _chainId = uint16(vm.envUint("RELEASE_CHAIN_ID")); diff --git a/evm/forge/scripts/UpgradeMatchingEngine.s.sol b/evm/forge/scripts/UpgradeMatchingEngine.s.sol index 7efdb64f..701bb078 100644 --- a/evm/forge/scripts/UpgradeMatchingEngine.s.sol +++ b/evm/forge/scripts/UpgradeMatchingEngine.s.sol @@ -6,17 +6,15 @@ import "forge-std/Script.sol"; import "forge-std/console2.sol"; import {ERC1967Proxy} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {ITokenBridge} from "wormhole-solidity/ITokenBridge.sol"; -import {IMatchingEngine} from "../../src/interfaces/IMatchingEngine.sol"; +import {IMatchingEngine} from "src/interfaces/IMatchingEngine.sol"; -import {MatchingEngineSetup} from "../../src/MatchingEngine/MatchingEngineSetup.sol"; +import {MatchingEngineSetup} from "src/MatchingEngine/MatchingEngineSetup.sol"; import {MatchingEngineImplementation} from - "../../src/MatchingEngine/MatchingEngineImplementation.sol"; + "src/MatchingEngine/MatchingEngineImplementation.sol"; import {CheckWormholeContracts} from "./helpers/CheckWormholeContracts.sol"; -import {Utils} from "../../src/shared/Utils.sol"; +import {Utils} from "src/shared/Utils.sol"; contract UpgradeMatchingEngine is CheckWormholeContracts, Script { using Utils for bytes32; diff --git a/evm/forge/scripts/UpgradeTokenRouter.s.sol b/evm/forge/scripts/UpgradeTokenRouter.s.sol index 2ee7b2a0..555b0cc5 100644 --- a/evm/forge/scripts/UpgradeTokenRouter.s.sol +++ b/evm/forge/scripts/UpgradeTokenRouter.s.sol @@ -5,15 +5,12 @@ pragma solidity ^0.8.19; import "forge-std/Script.sol"; import "forge-std/console2.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {ITokenBridge} from "wormhole-solidity/ITokenBridge.sol"; - -import {TokenRouterImplementation} from "../../src/TokenRouter/TokenRouterImplementation.sol"; -import {ITokenRouter} from "../../src/interfaces/ITokenRouter.sol"; +import {TokenRouterImplementation} from "src/TokenRouter/TokenRouterImplementation.sol"; +import {ITokenRouter} from "src/interfaces/ITokenRouter.sol"; import {CheckWormholeContracts} from "./helpers/CheckWormholeContracts.sol"; -import {Utils} from "../../src/shared/Utils.sol"; +import {Utils} from "src/shared/Utils.sol"; contract UpgradeTokenRouter is CheckWormholeContracts, Script { using Utils for address; diff --git a/evm/forge/scripts/helpers/CheckWormholeContracts.sol b/evm/forge/scripts/helpers/CheckWormholeContracts.sol index 3c99b00b..86c25d4b 100644 --- a/evm/forge/scripts/helpers/CheckWormholeContracts.sol +++ b/evm/forge/scripts/helpers/CheckWormholeContracts.sol @@ -6,7 +6,7 @@ import "forge-std/Script.sol"; import "forge-std/console2.sol"; import { ERC1967Proxy } from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.sol"; -import { IWormhole } from "wormhole-solidity/IWormhole.sol"; +import { IWormhole } from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; contract CheckWormholeContracts { function requireValidChain(uint16 chain, address wormhole) internal view { diff --git a/evm/forge/tests/MatchingEngine.t.sol b/evm/forge/tests/MatchingEngine.t.sol index 50ebb5c6..53edcebc 100644 --- a/evm/forge/tests/MatchingEngine.t.sol +++ b/evm/forge/tests/MatchingEngine.t.sol @@ -7,10 +7,10 @@ import "forge-std/StdUtils.sol"; import "forge-std/console.sol"; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {CircleSimulator} from "cctp-solidity/CircleSimulator.sol"; -import {IUSDC} from "cctp-solidity/IUSDC.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {SigningWormholeSimulator} from "wormhole-solidity/WormholeSimulator.sol"; +import {CircleSimulator} from "local-modules/circle/CircleSimulator.sol"; +import {IUSDC} from "local-modules/circle/IUSDC.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {SigningWormholeSimulator} from "local-modules/wormhole/WormholeSimulator.sol"; import {ERC1967Proxy} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.sol"; import { @@ -18,30 +18,29 @@ import { MockMatchingEngineImplementation } from "./helpers/mock/MockMatchingEngineImplementation.sol"; -import "../../src/MatchingEngine/assets/Errors.sol"; -import {MatchingEngineImplementation} from - "../../src/MatchingEngine/MatchingEngineImplementation.sol"; -import {MatchingEngineSetup} from "../../src/MatchingEngine/MatchingEngineSetup.sol"; +import "src/MatchingEngine/assets/Errors.sol"; +import {MatchingEngineImplementation} from "src/MatchingEngine/MatchingEngineImplementation.sol"; +import {MatchingEngineSetup} from "src/MatchingEngine/MatchingEngineSetup.sol"; -import "../../src/interfaces/ITokenRouterTypes.sol"; -import {Messages} from "../../src/shared/Messages.sol"; -import {Utils} from "../../src/shared/Utils.sol"; +import "src/interfaces/ITokenRouterTypes.sol"; +import {Messages} from "src/shared/Messages.sol"; +import {Utils} from "src/shared/Utils.sol"; -import {IMatchingEngine} from "../../src/interfaces/IMatchingEngine.sol"; +import {IMatchingEngine} from "src/interfaces/IMatchingEngine.sol"; import { LiveAuctionData, AuctionStatus, CctpMessage, RouterEndpoint -} from "../../src/interfaces/IMatchingEngineTypes.sol"; +} from "src/interfaces/IMatchingEngineTypes.sol"; -import {FastTransferParameters} from "../../src/interfaces/ITokenRouterTypes.sol"; -import {ITokenRouter} from "../../src/interfaces/ITokenRouter.sol"; -import {TokenRouterImplementation} from "../../src/TokenRouter/TokenRouterImplementation.sol"; -import {TokenRouterSetup} from "../../src/TokenRouter/TokenRouterSetup.sol"; -import {RedeemedFill} from "../../src/interfaces/IRedeemFill.sol"; +import {FastTransferParameters} from "src/interfaces/ITokenRouterTypes.sol"; +import {ITokenRouter} from "src/interfaces/ITokenRouter.sol"; +import {TokenRouterImplementation} from "src/TokenRouter/TokenRouterImplementation.sol"; +import {TokenRouterSetup} from "src/TokenRouter/TokenRouterSetup.sol"; +import {RedeemedFill} from "src/interfaces/IRedeemFill.sol"; -import {WormholeCctpMessages} from "../../src/shared/WormholeCctpMessages.sol"; +import {WormholeCctpMessages} from "src/shared/WormholeCctpMessages.sol"; contract MatchingEngineTest is Test { using Messages for *; @@ -157,7 +156,6 @@ contract MatchingEngineTest is Test { /** * ADMIN TESTS */ - function testUpgradeContract() public { // Deploy new implementation. MockMatchingEngineImplementation newImplementation = new MockMatchingEngineImplementation( @@ -280,7 +278,7 @@ contract MatchingEngineTest is Test { engine.upgradeContract(address(makeAddr("newImplementation"))); } - function testAddRouterEndpoint() public { + function testAddRouterEndpointAsOwner() public { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); @@ -300,6 +298,26 @@ contract MatchingEngineTest is Test { assertEq(engine.getDomain(chain), domain); } + function testAddRouterEndpointAsOwnerAssistant() public { + uint16 chain = 1; + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + uint32 domain = 1; + + assertEq(engine.getRouter(chain), bytes32(0)); + assertEq(engine.getMintRecipient(chain), bytes32(0)); + assertEq(engine.getDomain(chain), 0); + + vm.prank(makeAddr("ownerAssistant")); + engine.addRouterEndpoint( + chain, RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); + + assertEq(engine.getRouter(chain), routerEndpoint); + assertEq(engine.getMintRecipient(chain), mintRecipient); + assertEq(engine.getDomain(chain), domain); + } + function testCannotAddRouterEndpointChainIdZero() public { uint16 chain = 0; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); @@ -352,6 +370,100 @@ contract MatchingEngineTest is Test { ); } + function testCannotUpdateRouterEndpointWithoutOwner() public { + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + + vm.prank(makeAddr("ownerAssistant")); + vm.expectRevert(abi.encodeWithSignature("NotTheOwner()")); + engine.updateRouterEndpoint( + ETH_CHAIN, + RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), + ETH_DOMAIN + ); + } + + function testUpdateRouterEndpointAsOwner() public { + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + uint32 domain = 69; + + assertEq(engine.getRouter(ETH_CHAIN), ETH_ROUTER); + assertEq(engine.getMintRecipient(ETH_CHAIN), ETH_ROUTER); + assertEq(engine.getDomain(ETH_CHAIN), ETH_DOMAIN); + + vm.prank(makeAddr("owner")); + engine.updateRouterEndpoint( + ETH_CHAIN, + RouterEndpoint({router: routerEndpoint, mintRecipient: mintRecipient}), + domain + ); + + assertEq(engine.getRouter(ETH_CHAIN), routerEndpoint); + assertEq(engine.getMintRecipient(ETH_CHAIN), mintRecipient); + assertEq(engine.getDomain(ETH_CHAIN), domain); + } + + function testCannotDisableRouterEndpointWithoutOwner() public { + vm.prank(makeAddr("ownerAssistant")); + vm.expectRevert(abi.encodeWithSignature("NotTheOwner()")); + engine.disableRouterEndpoint(ETH_CHAIN); + } + + function testDisableRouterEndpointAsOwner() public { + assertEq(engine.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getDomain(ARB_CHAIN), ARB_DOMAIN); + + vm.prank(makeAddr("owner")); + engine.disableRouterEndpoint(ARB_CHAIN); + + assertEq(engine.getRouter(ARB_CHAIN), bytes32(0)); + assertEq(engine.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getDomain(ARB_CHAIN), 0); + } + + function testCannotAddRouterEndpointAfterDisableRouterEndpoint() public { + assertEq(engine.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getDomain(ARB_CHAIN), ARB_DOMAIN); + + vm.prank(makeAddr("owner")); + engine.disableRouterEndpoint(ARB_CHAIN); + + assertEq(engine.getRouter(ARB_CHAIN), bytes32(0)); + assertEq(engine.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getDomain(ARB_CHAIN), 0); + + vm.prank(makeAddr("ownerAssistant")); + vm.expectRevert(abi.encodeWithSignature("ErrEndpointAlreadyExists(uint16)", ARB_CHAIN)); + engine.addRouterEndpoint( + ARB_CHAIN, RouterEndpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}), ARB_DOMAIN + ); + } + + function testUpdateRouterEndpointAfterDisableRouterEndpoint() public { + assertEq(engine.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getDomain(ARB_CHAIN), ARB_DOMAIN); + + vm.prank(makeAddr("owner")); + engine.disableRouterEndpoint(ARB_CHAIN); + + assertEq(engine.getRouter(ARB_CHAIN), bytes32(0)); + assertEq(engine.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getDomain(ARB_CHAIN), 0); + + vm.prank(makeAddr("owner")); + engine.updateRouterEndpoint( + ARB_CHAIN, RouterEndpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}), ARB_DOMAIN + ); + + assertEq(engine.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(engine.getDomain(ARB_CHAIN), ARB_DOMAIN); + } + function testUpdateFeeRecipient() public { assertEq(engine.feeRecipient(), FEE_RECIPIENT); @@ -399,7 +511,6 @@ contract MatchingEngineTest is Test { /** * AUCTION TESTS */ - function testCalculateDynamicPenalty() public { // Still in grace period. { @@ -519,7 +630,6 @@ contract MatchingEngineTest is Test { /** * PLACE INITIAL BID TESTS */ - function testPlaceInitialBid(uint64 amountIn, uint64 feeBid) public { amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); @@ -737,7 +847,6 @@ contract MatchingEngineTest is Test { /** * IMPROVE BID TESTS */ - function testImproveBid(uint64 amountIn, uint64 newBid) public { amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); @@ -846,7 +955,6 @@ contract MatchingEngineTest is Test { /** * EXECUTE FAST ORDER TESTS */ - function testExecuteFastOrder(uint64 amountIn, uint64 newBid) public { amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); @@ -986,7 +1094,6 @@ contract MatchingEngineTest is Test { /** * SLOW ORDER TESTS */ - function testExecuteSlowOrderAndRedeem(uint64 amountIn, uint64 newBid) public { amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); @@ -1193,7 +1300,7 @@ contract MatchingEngineTest is Test { // Change the address for the arb router. vm.prank(makeAddr("owner")); - engine.addRouterEndpoint( + engine.updateRouterEndpoint( ARB_CHAIN, RouterEndpoint({router: bytes32("deadbeef"), mintRecipient: bytes32("beefdead")}), ARB_DOMAIN @@ -1344,7 +1451,6 @@ contract MatchingEngineTest is Test { /** * FAST FILL TESTS */ - function testRedeemFastFill(uint64 amountIn, uint64 newBid) public { amountIn = uint64(bound(amountIn, _getMinTransferAmount(), _getMaxTransferAmount())); @@ -1551,7 +1657,6 @@ contract MatchingEngineTest is Test { /** * TEST HELPERS */ - function _deployAndRegisterAvaxRouter() internal returns (ITokenRouter) { // Deploy Implementation. TokenRouterImplementation implementation = new TokenRouterImplementation( @@ -1705,7 +1810,7 @@ contract MatchingEngineTest is Test { address currentBidder, address initialBidder, bytes32 vmHash - ) internal { + ) internal view { LiveAuctionData memory auction = engine.liveAuctionInfo(vmHash); assertEq(uint8(auction.status), uint8(AuctionStatus.Active)); assertEq(auction.startBlock, uint88(block.number)); @@ -1721,7 +1826,7 @@ contract MatchingEngineTest is Test { uint64 transferAmount, IWormhole.VM memory cctpMessage, address caller - ) internal { + ) internal view { // Verify that the correct amount was sent in the CCTP order. ( bytes32 token, diff --git a/evm/forge/tests/TokenRouter.t.sol b/evm/forge/tests/TokenRouter.t.sol index 114b7dab..aab7c8d4 100644 --- a/evm/forge/tests/TokenRouter.t.sol +++ b/evm/forge/tests/TokenRouter.t.sol @@ -7,31 +7,31 @@ import "forge-std/StdUtils.sol"; import "forge-std/console.sol"; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {CircleSimulator} from "cctp-solidity/CircleSimulator.sol"; -import {IUSDC} from "cctp-solidity/IUSDC.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {ITokenMessenger} from "cctp-solidity/ITokenMessenger.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {SigningWormholeSimulator} from "wormhole-solidity/WormholeSimulator.sol"; +import {CircleSimulator} from "local-modules/circle/CircleSimulator.sol"; +import {IUSDC} from "local-modules/circle/IUSDC.sol"; +import {ICircleIntegration} from "local-modules/wormhole/ICircleIntegration.sol"; +import {ITokenMessenger} from "src/interfaces/external/ITokenMessenger.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {SigningWormholeSimulator} from "local-modules/wormhole/WormholeSimulator.sol"; import {ERC1967Proxy} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.sol"; -import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; +import {BytesParsing} from "wormhole-solidity-sdk/libraries/BytesParsing.sol"; import { IMockTokenRouter, MockTokenRouterImplementation } from "./helpers/mock/MockTokenRouterImplementation.sol"; -import "../../src/TokenRouter/assets/Errors.sol"; -import {TokenRouterImplementation} from "../../src/TokenRouter/TokenRouterImplementation.sol"; -import {TokenRouterSetup} from "../../src/TokenRouter/TokenRouterSetup.sol"; +import "src/TokenRouter/assets/Errors.sol"; +import {TokenRouterImplementation} from "src/TokenRouter/TokenRouterImplementation.sol"; +import {TokenRouterSetup} from "src/TokenRouter/TokenRouterSetup.sol"; -import {Messages} from "../../src/shared/Messages.sol"; -import {Utils} from "../../src/shared/Utils.sol"; +import {Messages} from "src/shared/Messages.sol"; +import {Utils} from "src/shared/Utils.sol"; -import "../../src/interfaces/ITokenRouter.sol"; -import {FastTransferParameters, Endpoint} from "../../src/interfaces/ITokenRouterTypes.sol"; +import "src/interfaces/ITokenRouter.sol"; +import {FastTransferParameters, Endpoint} from "src/interfaces/ITokenRouterTypes.sol"; -import {WormholeCctpMessages} from "../../src/shared/WormholeCctpMessages.sol"; +import {WormholeCctpMessages} from "src/shared/WormholeCctpMessages.sol"; contract TokenRouterTest is Test { using BytesParsing for bytes; @@ -134,7 +134,6 @@ contract TokenRouterTest is Test { /** * ADMIN TESTS */ - function testUpgradeContract() public { // Deploy new implementation. MockTokenRouterImplementation newImplementation = new MockTokenRouterImplementation( @@ -351,7 +350,7 @@ contract TokenRouterTest is Test { router.updateOwnerAssistant(newAssistant); } - function testAddRouterEndpoint() public { + function testAddRouterEndpointAsOwner() public { uint16 chain = 1; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); bytes32 mintRecipient = routerEndpoint; @@ -371,6 +370,26 @@ contract TokenRouterTest is Test { assertEq(router.getDomain(chain), domain); } + function testAddRouterEndpointAsOwnerAssistant() public { + uint16 chain = 1; + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = routerEndpoint; + uint32 domain = 1; + + assertEq(router.getRouter(chain), bytes32(0)); + assertEq(router.getMintRecipient(chain), bytes32(0)); + assertEq(router.getDomain(chain), 0); + + vm.prank(makeAddr("ownerAssistant")); + router.addRouterEndpoint( + chain, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); + + assertEq(router.getRouter(chain), routerEndpoint); + assertEq(router.getMintRecipient(chain), mintRecipient); + assertEq(router.getDomain(chain), domain); + } + function testCannotAddRouterEndpointChainIdZero() public { uint16 chain = 0; bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); @@ -436,6 +455,96 @@ contract TokenRouterTest is Test { ); } + function testCannotUpdateRouterEndpointWithoutOwner() public { + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + + vm.prank(makeAddr("ownerAssistant")); + vm.expectRevert(abi.encodeWithSignature("NotTheOwner()")); + router.updateRouterEndpoint( + ARB_CHAIN, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), ARB_DOMAIN + ); + } + + function testUpdateRouterEndpointAsOwner() public { + bytes32 routerEndpoint = makeAddr("newRouter").toUniversalAddress(); + bytes32 mintRecipient = makeAddr("newRouter").toUniversalAddress(); + uint32 domain = 69; + + assertEq(router.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), ARB_DOMAIN); + + vm.prank(makeAddr("owner")); + router.updateRouterEndpoint( + ARB_CHAIN, Endpoint({router: routerEndpoint, mintRecipient: mintRecipient}), domain + ); + + assertEq(router.getRouter(ARB_CHAIN), routerEndpoint); + assertEq(router.getMintRecipient(ARB_CHAIN), mintRecipient); + assertEq(router.getDomain(ARB_CHAIN), domain); + } + + function testCannotDisableRouterEndpointWithoutOwner() public { + vm.prank(makeAddr("ownerAssistant")); + vm.expectRevert(abi.encodeWithSignature("NotTheOwner()")); + router.disableRouterEndpoint(ARB_CHAIN); + } + + function testDisableRouterEndpointAsOwner() public { + assertEq(router.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), ARB_DOMAIN); + + vm.prank(makeAddr("owner")); + router.disableRouterEndpoint(ARB_CHAIN); + + assertEq(router.getRouter(ARB_CHAIN), bytes32(0)); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), 0); + } + + function testCannotAddRouterEndpointAfterDisableRouterEndpoint() public { + assertEq(router.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), ARB_DOMAIN); + + vm.prank(makeAddr("owner")); + router.disableRouterEndpoint(ARB_CHAIN); + + assertEq(router.getRouter(ARB_CHAIN), bytes32(0)); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), 0); + + vm.prank(makeAddr("ownerAssistant")); + vm.expectRevert(abi.encodeWithSignature("ErrEndpointAlreadyExists(uint16)", ARB_CHAIN)); + router.addRouterEndpoint( + ARB_CHAIN, Endpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}), ARB_DOMAIN + ); + } + + function testUpdateRouterEndpointAfterDisableRouterEndpoint() public { + assertEq(router.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), ARB_DOMAIN); + + vm.prank(makeAddr("owner")); + router.disableRouterEndpoint(ARB_CHAIN); + + assertEq(router.getRouter(ARB_CHAIN), bytes32(0)); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), 0); + + vm.prank(makeAddr("owner")); + router.updateRouterEndpoint( + ARB_CHAIN, Endpoint({router: ARB_ROUTER, mintRecipient: ARB_ROUTER}), ARB_DOMAIN + ); + + assertEq(router.getRouter(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getMintRecipient(ARB_CHAIN), ARB_ROUTER); + assertEq(router.getDomain(ARB_CHAIN), ARB_DOMAIN); + } + function testUpdateFastTransferParameters() public { FastTransferParameters memory newParams = FastTransferParameters({ enabled: true, @@ -550,13 +659,12 @@ contract TokenRouterTest is Test { /** * MESSAGES TESTS */ - function testEncodeAndDecodeFill( uint16 sourceChain, bytes32 orderSender, bytes32 redeemer, bytes memory redeemerMessage - ) public { + ) public pure { Messages.Fill memory fill = Messages.Fill({ sourceChain: sourceChain, orderSender: orderSender, @@ -586,7 +694,7 @@ contract TokenRouterTest is Test { uint64 initAuctionFee, uint32 deadline, bytes memory redeemerMessage - ) public { + ) public pure { Messages.FastMarketOrder memory order = Messages.FastMarketOrder({ amountIn: amountIn, minAmountOut: minAmountOut, @@ -619,7 +727,6 @@ contract TokenRouterTest is Test { /** * SLOW TRANSFER TESTS */ - function testCannotPlaceMarketOrderErrInsufficientAmount() public { vm.expectRevert(abi.encodeWithSignature("ErrInsufficientAmount(uint64,uint64)", 0, 0)); router.placeMarketOrder( @@ -755,7 +862,7 @@ contract TokenRouterTest is Test { { vm.prank(makeAddr("owner")); - router.addRouterEndpoint( + router.updateRouterEndpoint( ARB_CHAIN, Endpoint({router: ARB_ROUTER, mintRecipient: bytes32("c0ffee")}), ARB_DOMAIN @@ -1122,7 +1229,6 @@ contract TokenRouterTest is Test { /** * FILL REDEMPTION TESTS */ - function testCannotRedeemFillInvalidSourceRouter() public { bytes32 invalidRouter = makeAddr("notArbRouter").toUniversalAddress(); @@ -1205,7 +1311,6 @@ contract TokenRouterTest is Test { /** * TEST HELPERS */ - function _dealAndApproveUsdc(ITokenRouter _router, uint64 amount) internal { mintUSDC(amount, address(this)); IERC20(USDC_ADDRESS).approve(address(_router), amount); @@ -1219,7 +1324,7 @@ contract TokenRouterTest is Test { usdc.mint(receiver, amount); } - function _cctpBurnLimit() internal returns (uint256 limit) { + function _cctpBurnLimit() internal view returns (uint256 limit) { limit = ITokenMessenger(CIRCLE_BRIDGE).localMinter().burnLimitsPerMessage(USDC_ADDRESS); // Having this check prevents us forking a network where Circle has not set a burn limit. @@ -1475,7 +1580,7 @@ contract TokenRouterTest is Test { assertEq(_router.orderToken().balanceOf(address(this)), balanceBefore + redeemed.amount); } - function _cctpMintLimit() internal returns (uint256 limit) { + function _cctpMintLimit() internal view returns (uint256 limit) { // This is a hack, assuming the burn limit == mint limit. return _cctpBurnLimit(); } diff --git a/evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol b/evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol index a74b0b39..4c1b97bd 100644 --- a/evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol +++ b/evm/forge/tests/helpers/mock/MockMatchingEngineImplementation.sol @@ -3,9 +3,8 @@ pragma solidity ^0.8.19; import {ERC1967Upgrade} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Upgrade.sol"; -import {MatchingEngineImplementation} from - "../../../../src/MatchingEngine/MatchingEngineImplementation.sol"; -import {IMatchingEngine} from "../../../../src/interfaces/IMatchingEngine.sol"; +import {MatchingEngineImplementation} from "src/MatchingEngine/MatchingEngineImplementation.sol"; +import {IMatchingEngine} from "src/interfaces/IMatchingEngine.sol"; interface IMockMatchingEngine is IMatchingEngine { function isUpgraded() external pure returns (bool); diff --git a/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol b/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol index b3aaf8e3..876dd134 100644 --- a/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol +++ b/evm/forge/tests/helpers/mock/MockTokenRouterImplementation.sol @@ -3,8 +3,8 @@ pragma solidity ^0.8.19; import {ERC1967Upgrade} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Upgrade.sol"; -import {TokenRouterImplementation} from "../../../../src/TokenRouter/TokenRouterImplementation.sol"; -import {ITokenRouter} from "../../../../src/interfaces/ITokenRouter.sol"; +import {TokenRouterImplementation} from "src/TokenRouter/TokenRouterImplementation.sol"; +import {ITokenRouter} from "src/interfaces/ITokenRouter.sol"; interface IMockTokenRouter is ITokenRouter { function isUpgraded() external pure returns (bool); diff --git a/evm/foundry.toml b/evm/foundry.toml index 18954a88..7c82640f 100644 --- a/evm/foundry.toml +++ b/evm/foundry.toml @@ -1,12 +1,17 @@ [fmt] -line_length=100 +line_length = 100 [profile.default] solc_version = "0.8.19" optimizer = true optimizer_runs = 200 via_ir = true -extra_output = ["metadata", "storageLayout", "evm.deployedBytecode.immutableReferences"] +extra_output = [ + "metadata", + "storageLayout", + "evm.deployedBytecode.immutableReferences", + "evm.bytecode.opcodes" +] test = "forge/tests" @@ -18,11 +23,10 @@ libs = [ remappings = [ "@openzeppelin/contracts/=lib/openzeppelin-contracts/contracts/", "forge-std/=lib/forge-std/src/", - "wormhole-solidity/=modules/wormhole", - "cctp-solidity/=modules/circle", - "curve-solidity/=modules/curve" + "src/=src/", + "local-modules/=forge/modules/" ] gas_limit = "18446744073709551615" -# See more config options https://github.com/foundry-rs/foundry/blob/master/crates/config \ No newline at end of file +# See more config options https://github.com/foundry-rs/foundry/blob/master/crates/config/README.md#all-options \ No newline at end of file diff --git a/evm/lib/forge-std b/evm/lib/forge-std new file mode 160000 index 00000000..b6a506db --- /dev/null +++ b/evm/lib/forge-std @@ -0,0 +1 @@ +Subproject commit b6a506db2262cad5ff982a87789ee6d1558ec861 diff --git a/evm/lib/openzeppelin-contracts b/evm/lib/openzeppelin-contracts new file mode 160000 index 00000000..dc44c9f1 --- /dev/null +++ b/evm/lib/openzeppelin-contracts @@ -0,0 +1 @@ +Subproject commit dc44c9f1a4c3b10af99492eed84f83ed244203f6 diff --git a/evm/lib/wormhole-solidity-sdk b/evm/lib/wormhole-solidity-sdk new file mode 160000 index 00000000..2b7db51f --- /dev/null +++ b/evm/lib/wormhole-solidity-sdk @@ -0,0 +1 @@ +Subproject commit 2b7db51f99b49eda99b44f4a044e751cb0b2e8ea diff --git a/evm/modules/circle/ICircleBridge.sol b/evm/modules/circle/ICircleBridge.sol deleted file mode 100644 index 20455b1c..00000000 --- a/evm/modules/circle/ICircleBridge.sol +++ /dev/null @@ -1,80 +0,0 @@ -// SPDX-License-Identifier: Apache 2 -pragma solidity ^0.8.19; - -import {IMessageTransmitter} from "./IMessageTransmitter.sol"; -import {ITokenMinter} from "./ITokenMinter.sol"; - -interface ICircleBridge { - /** - * @notice Deposits and burns tokens from sender to be minted on destination domain. - * Emits a `DepositForBurn` event. - * @dev reverts if: - * - given burnToken is not supported - * - given destinationDomain has no CircleBridge registered - * - transferFrom() reverts. For example, if sender's burnToken balance or approved allowance - * to this contract is less than `amount`. - * - burn() reverts. For example, if `amount` is 0. - * - MessageTransmitter returns false or reverts. - * @param _amount amount of tokens to burn - * @param _destinationDomain destination domain (ETH = 0, AVAX = 1) - * @param _mintRecipient address of mint recipient on destination domain - * @param _burnToken address of contract to burn deposited tokens, on local domain - * @return _nonce unique nonce reserved by message - */ - function depositForBurn( - uint256 _amount, - uint32 _destinationDomain, - bytes32 _mintRecipient, - address _burnToken - ) external returns (uint64 _nonce); - - /** - * @notice Deposits and burns tokens from sender to be minted on destination domain. The mint - * on the destination domain must be called by `_destinationCaller`. - * WARNING: if the `_destinationCaller` does not represent a valid address as bytes32, then it will not be possible - * to broadcast the message on the destination domain. This is an advanced feature, and the standard - * depositForBurn() should be preferred for use cases where a specific destination caller is not required. - * Emits a `DepositForBurn` event. - * @dev reverts if: - * - given destinationCaller is zero address - * - given burnToken is not supported - * - given destinationDomain has no CircleBridge registered - * - transferFrom() reverts. For example, if sender's burnToken balance or approved allowance - * to this contract is less than `amount`. - * - burn() reverts. For example, if `amount` is 0. - * - MessageTransmitter returns false or reverts. - * @param _amount amount of tokens to burn - * @param _destinationDomain destination domain - * @param _mintRecipient address of mint recipient on destination domain - * @param _burnToken address of contract to burn deposited tokens, on local domain - * @param _destinationCaller caller on the destination domain, as bytes32 - * @return _nonce unique nonce reserved by message - */ - function depositForBurnWithCaller( - uint256 _amount, - uint32 _destinationDomain, - bytes32 _mintRecipient, - address _burnToken, - bytes32 _destinationCaller - ) external returns (uint64 _nonce); - - function owner() external view returns (address); - - function handleReceiveMessage( - uint32 _remoteDomain, - bytes32 _sender, - bytes memory messageBody - ) external view returns (bool); - - function localMessageTransmitter() - external - view - returns (IMessageTransmitter); - - function localMinter() external view returns (ITokenMinter); - - function remoteCircleBridges(uint32 domain) external view returns (bytes32); - - // owner only methods - function transferOwnership(address newOwner) external; -} diff --git a/evm/modules/circle/IMessageTransmitter.sol b/evm/modules/circle/IMessageTransmitter.sol deleted file mode 100644 index c9204d28..00000000 --- a/evm/modules/circle/IMessageTransmitter.sol +++ /dev/null @@ -1,87 +0,0 @@ -// SPDX-License-Identifier: Apache 2 -pragma solidity ^0.8.19; - -interface IMessageTransmitter { - event MessageSent(bytes message); - - /** - * @notice Emitted when tokens are minted - * @param _mintRecipient recipient address of minted tokens - * @param _amount amount of minted tokens - * @param _mintToken contract address of minted token - */ - event MintAndWithdraw( - address _mintRecipient, - uint256 _amount, - address _mintToken - ); - - /** - * @notice Receive a message. Messages with a given nonce - * can only be broadcast once for a (sourceDomain, destinationDomain) - * pair. The message body of a valid message is passed to the - * specified recipient for further processing. - * - * @dev Attestation format: - * A valid attestation is the concatenated 65-byte signature(s) of exactly - * `thresholdSignature` signatures, in increasing order of attester address. - * ***If the attester addresses recovered from signatures are not in - * increasing order, signature verification will fail.*** - * If incorrect number of signatures or duplicate signatures are supplied, - * signature verification will fail. - * - * Message format: - * Field Bytes Type Index - * version 4 uint32 0 - * sourceDomain 4 uint32 4 - * destinationDomain 4 uint32 8 - * nonce 8 uint64 12 - * sender 32 bytes32 20 - * recipient 32 bytes32 52 - * messageBody dynamic bytes 84 - * @param _message Message bytes - * @param _attestation Concatenated 65-byte signature(s) of `_message`, in increasing order - * of the attester address recovered from signatures. - * @return success bool, true if successful - */ - function receiveMessage( - bytes memory _message, - bytes calldata _attestation - ) external returns (bool success); - - function attesterManager() external view returns (address); - - function availableNonces(uint32 domain) external view returns (uint64); - - function getNumEnabledAttesters() external view returns (uint256); - - function isEnabledAttester(address _attester) external view returns (bool); - - function localDomain() external view returns (uint32); - - function maxMessageBodySize() external view returns (uint256); - - function owner() external view returns (address); - - function paused() external view returns (bool); - - function pauser() external view returns (address); - - function rescuer() external view returns (address); - - function version() external view returns (uint32); - - // owner only methods - function transferOwnership(address newOwner) external; - - function updateAttesterManager(address _newAttesterManager) external; - - // attester manager only methods - function getEnabledAttester(uint256 _index) external view returns (address); - - function disableAttester(address _attester) external; - - function enableAttester(address _attester) external; - - function setSignatureThreshold(uint256 newSignatureThreshold) external; -} diff --git a/evm/modules/wormhole/ITokenBridge.sol b/evm/modules/wormhole/ITokenBridge.sol deleted file mode 100644 index 2ae28b54..00000000 --- a/evm/modules/wormhole/ITokenBridge.sol +++ /dev/null @@ -1,177 +0,0 @@ -// SPDX-License-Identifier: Apache 2 - -pragma solidity ^0.8.0; - -import "./IWETH.sol"; -import "./IWormhole.sol"; - -interface ITokenBridge { - struct Transfer { - uint8 payloadID; - uint256 amount; - bytes32 tokenAddress; - uint16 tokenChain; - bytes32 to; - uint16 toChain; - uint256 fee; - } - - struct TransferWithPayload { - uint8 payloadID; - uint256 amount; - bytes32 tokenAddress; - uint16 tokenChain; - bytes32 to; - uint16 toChain; - bytes32 fromAddress; - bytes payload; - } - - struct AssetMeta { - uint8 payloadID; - bytes32 tokenAddress; - uint16 tokenChain; - uint8 decimals; - bytes32 symbol; - bytes32 name; - } - - struct RegisterChain { - bytes32 module; - uint8 action; - uint16 chainId; - uint16 emitterChainID; - bytes32 emitterAddress; - } - - struct UpgradeContract { - bytes32 module; - uint8 action; - uint16 chainId; - bytes32 newContract; - } - - struct RecoverChainId { - bytes32 module; - uint8 action; - uint256 evmChainId; - uint16 newChainId; - } - - event ContractUpgraded(address indexed oldContract, address indexed newContract); - - function _parseTransferCommon(bytes memory encoded) external pure returns (Transfer memory transfer); - - function attestToken(address tokenAddress, uint32 nonce) external payable returns (uint64 sequence); - - function wrapAndTransferETH(uint16 recipientChain, bytes32 recipient, uint256 arbiterFee, uint32 nonce) - external - payable - returns (uint64 sequence); - - function wrapAndTransferETHWithPayload(uint16 recipientChain, bytes32 recipient, uint32 nonce, bytes memory payload) - external - payable - returns (uint64 sequence); - - function transferTokens( - address token, - uint256 amount, - uint16 recipientChain, - bytes32 recipient, - uint256 arbiterFee, - uint32 nonce - ) external payable returns (uint64 sequence); - - function transferTokensWithPayload( - address token, - uint256 amount, - uint16 recipientChain, - bytes32 recipient, - uint32 nonce, - bytes memory payload - ) external payable returns (uint64 sequence); - - function updateWrapped(bytes memory encodedVm) external returns (address token); - - function createWrapped(bytes memory encodedVm) external returns (address token); - - function completeTransferWithPayload(bytes memory encodedVm) external returns (bytes memory); - - function completeTransferAndUnwrapETHWithPayload(bytes memory encodedVm) external returns (bytes memory); - - function completeTransfer(bytes memory encodedVm) external; - - function completeTransferAndUnwrapETH(bytes memory encodedVm) external; - - function encodeAssetMeta(AssetMeta memory meta) external pure returns (bytes memory encoded); - - function encodeTransfer(Transfer memory transfer) external pure returns (bytes memory encoded); - - function encodeTransferWithPayload(TransferWithPayload memory transfer) - external - pure - returns (bytes memory encoded); - - function parsePayloadID(bytes memory encoded) external pure returns (uint8 payloadID); - - function parseAssetMeta(bytes memory encoded) external pure returns (AssetMeta memory meta); - - function parseTransfer(bytes memory encoded) external pure returns (Transfer memory transfer); - - function parseTransferWithPayload(bytes memory encoded) - external - pure - returns (TransferWithPayload memory transfer); - - function governanceActionIsConsumed(bytes32 hash) external view returns (bool); - - function isInitialized(address impl) external view returns (bool); - - function isTransferCompleted(bytes32 hash) external view returns (bool); - - function wormhole() external view returns (IWormhole); - - function chainId() external view returns (uint16); - - function evmChainId() external view returns (uint256); - - function isFork() external view returns (bool); - - function governanceChainId() external view returns (uint16); - - function governanceContract() external view returns (bytes32); - - function wrappedAsset(uint16 tokenChainId, bytes32 tokenAddress) external view returns (address); - - function bridgeContracts(uint16 chainId_) external view returns (bytes32); - - function tokenImplementation() external view returns (address); - - function WETH() external view returns (IWETH); - - function outstandingBridged(address token) external view returns (uint256); - - function isWrappedAsset(address token) external view returns (bool); - - function finality() external view returns (uint8); - - function implementation() external view returns (address); - - function initialize() external; - - function registerChain(bytes memory encodedVM) external; - - function upgrade(bytes memory encodedVM) external; - - function submitRecoverChainId(bytes memory encodedVM) external; - - function parseRegisterChain(bytes memory encoded) external pure returns (RegisterChain memory chain); - - function parseUpgrade(bytes memory encoded) external pure returns (UpgradeContract memory chain); - - function parseRecoverChainId(bytes memory encodedRecoverChainId) - external - pure - returns (RecoverChainId memory rci); -} diff --git a/evm/modules/wormhole/IWormhole.sol b/evm/modules/wormhole/IWormhole.sol deleted file mode 100644 index b8a50f4b..00000000 --- a/evm/modules/wormhole/IWormhole.sol +++ /dev/null @@ -1,148 +0,0 @@ -// contracts/Messages.sol -// SPDX-License-Identifier: Apache 2 - -pragma solidity ^0.8.0; - -interface IWormhole { - struct GuardianSet { - address[] keys; - uint32 expirationTime; - } - - struct Signature { - bytes32 r; - bytes32 s; - uint8 v; - uint8 guardianIndex; - } - - struct VM { - uint8 version; - uint32 timestamp; - uint32 nonce; - uint16 emitterChainId; - bytes32 emitterAddress; - uint64 sequence; - uint8 consistencyLevel; - bytes payload; - uint32 guardianSetIndex; - Signature[] signatures; - bytes32 hash; - } - - struct ContractUpgrade { - bytes32 module; - uint8 action; - uint16 chain; - address newContract; - } - - struct GuardianSetUpgrade { - bytes32 module; - uint8 action; - uint16 chain; - GuardianSet newGuardianSet; - uint32 newGuardianSetIndex; - } - - struct SetMessageFee { - bytes32 module; - uint8 action; - uint16 chain; - uint256 messageFee; - } - - struct TransferFees { - bytes32 module; - uint8 action; - uint16 chain; - uint256 amount; - bytes32 recipient; - } - - struct RecoverChainId { - bytes32 module; - uint8 action; - uint256 evmChainId; - uint16 newChainId; - } - - event LogMessagePublished( - address indexed sender, uint64 sequence, uint32 nonce, bytes payload, uint8 consistencyLevel - ); - event ContractUpgraded(address indexed oldContract, address indexed newContract); - event GuardianSetAdded(uint32 indexed index); - - function publishMessage(uint32 nonce, bytes memory payload, uint8 consistencyLevel) - external - payable - returns (uint64 sequence); - - function initialize() external; - - function parseAndVerifyVM(bytes calldata encodedVM) - external - view - returns (VM memory vm, bool valid, string memory reason); - - function verifyVM(VM memory vm) external view returns (bool valid, string memory reason); - - function verifySignatures(bytes32 hash, Signature[] memory signatures, GuardianSet memory guardianSet) - external - pure - returns (bool valid, string memory reason); - - function parseVM(bytes memory encodedVM) external pure returns (VM memory vm); - - function quorum(uint256 numGuardians) external pure returns (uint256 numSignaturesRequiredForQuorum); - - function getGuardianSet(uint32 index) external view returns (GuardianSet memory); - - function getCurrentGuardianSetIndex() external view returns (uint32); - - function getGuardianSetExpiry() external view returns (uint32); - - function governanceActionIsConsumed(bytes32 hash) external view returns (bool); - - function isInitialized(address impl) external view returns (bool); - - function chainId() external view returns (uint16); - - function isFork() external view returns (bool); - - function governanceChainId() external view returns (uint16); - - function governanceContract() external view returns (bytes32); - - function messageFee() external view returns (uint256); - - function evmChainId() external view returns (uint256); - - function nextSequence(address emitter) external view returns (uint64); - - function parseContractUpgrade(bytes memory encodedUpgrade) external pure returns (ContractUpgrade memory cu); - - function parseGuardianSetUpgrade(bytes memory encodedUpgrade) - external - pure - returns (GuardianSetUpgrade memory gsu); - - function parseSetMessageFee(bytes memory encodedSetMessageFee) external pure returns (SetMessageFee memory smf); - - function parseTransferFees(bytes memory encodedTransferFees) external pure returns (TransferFees memory tf); - - function parseRecoverChainId(bytes memory encodedRecoverChainId) - external - pure - returns (RecoverChainId memory rci); - - function submitContractUpgrade(bytes memory _vm) external; - - function submitSetMessageFee(bytes memory _vm) external; - - function submitNewGuardianSet(bytes memory _vm) external; - - function submitTransferFees(bytes memory _vm) external; - - function submitRecoverChainId(bytes memory _vm) external; -} diff --git a/evm/modules/wormhole/WormholeBytesParsing.sol b/evm/modules/wormhole/WormholeBytesParsing.sol deleted file mode 100644 index 3dc72bbc..00000000 --- a/evm/modules/wormhole/WormholeBytesParsing.sol +++ /dev/null @@ -1,1268 +0,0 @@ -// SPDX-License-Identifier: Apache 2 -pragma solidity ^0.8.19; - -library BytesParsing { - uint256 private constant freeMemoryPtr = 0x40; - uint256 private constant wordSize = 32; - - error OutOfBounds(uint256 offset, uint256 length); - - function checkBound(uint offset, uint length) internal pure { - if (offset > length) - revert OutOfBounds(offset, length); - } - - function sliceUnchecked( - bytes memory encoded, - uint offset, - uint length - ) internal pure returns (bytes memory ret, uint nextOffset) { - //bail early for degenerate case - if (length == 0) - return (new bytes(0), offset); - - assembly ("memory-safe") { - nextOffset := add(offset, length) - ret := mload(freeMemoryPtr) - - //Explanation on how we copy data here: - // The bytes type has the following layout in memory: - // [length: 32 bytes, data: length bytes] - // So if we allocate `bytes memory foo = new bytes(1);` then `foo` will be a pointer to 33 - // bytes where the first 32 bytes contain the length and the last byte is the actual data. - // Since mload always loads 32 bytes of memory at once, we use our shift variable to align - // our reads so that our last read lines up exactly with the last 32 bytes of `encoded`. - // However this also means that if the length of `encoded` is not a multiple of 32 bytes, our - // first read will necessarily partly contain bytes from `encoded`'s 32 length bytes that - // will be written into the length part of our `ret` slice. - // We remedy this issue by writing the length of our `ret` slice at the end, thus - // overwritting those garbage bytes. - let shift := and(length, 31) //equivalent to `mod(length, 32)` but 2 gas cheaper - if iszero(shift) { - shift := wordSize - } - - let dest := add(ret, shift) - let end := add(dest, length) - for { - let src := add(add(encoded, shift), offset) - } lt(dest, end) { - src := add(src, wordSize) - dest := add(dest, wordSize) - } { - mstore(dest, mload(src)) - } - - mstore(ret, length) - //When compiling with --via-ir then normally allocated memory (i.e. via new) will have 32 byte - // memory alignment and so we enforce the same memory alignment here. - mstore(freeMemoryPtr, and(add(dest, 31), not(31))) - } - } - - function slice( - bytes memory encoded, - uint offset, - uint length - ) internal pure returns (bytes memory ret, uint nextOffset) { - (ret, nextOffset) = sliceUnchecked(encoded, offset, length); - checkBound(nextOffset, encoded.length); - } - - function asAddressUnchecked( - bytes memory encoded, - uint offset - ) internal pure returns (address, uint) { - (uint160 ret, uint nextOffset) = asUint160(encoded, offset); - return (address(ret), nextOffset); - } - - function asAddress( - bytes memory encoded, - uint offset - ) internal pure returns (address ret, uint nextOffset) { - (ret, nextOffset) = asAddressUnchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBoolUnckecked( - bytes memory encoded, - uint offset - ) internal pure returns (bool, uint) { - (uint8 ret, uint nextOffset) = asUint8(encoded, offset); - return (ret != 0, nextOffset); - } - - function asBool( - bytes memory encoded, - uint offset - ) internal pure returns (bool ret, uint nextOffset) { - (ret, nextOffset) = asBoolUnckecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - -/* ------------------------------------------------------------------------------------------------- -Remaining library code below was auto-generated by via the following js/node code: - -for (let bytes = 1; bytes <= 32; ++bytes) { - const bits = bytes*8; - console.log( -`function asUint${bits}Unchecked( - bytes memory encoded, - uint offset -) internal pure returns (uint${bits} ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, ${bytes}) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); -} - -function asUint${bits}( - bytes memory encoded, - uint offset -) internal pure returns (uint${bits} ret, uint nextOffset) { - (ret, nextOffset) = asUint${bits}Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); -} - -function asBytes${bytes}Unchecked( - bytes memory encoded, - uint offset -) internal pure returns (bytes${bytes}, uint) { - (uint${bits} ret, uint nextOffset) = asUint${bits}Unchecked(encoded, offset); - return (bytes${bytes}(ret), nextOffset); -} - -function asBytes${bytes}( - bytes memory encoded, - uint offset -) internal pure returns (bytes${bytes}, uint) { - (uint${bits} ret, uint nextOffset) = asUint${bits}(encoded, offset); - return (bytes${bytes}(ret), nextOffset); -} -` - ); -} -------------------------------------------------------------------------------------------------- */ - - function asUint8Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint8 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 1) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint8( - bytes memory encoded, - uint offset - ) internal pure returns (uint8 ret, uint nextOffset) { - (ret, nextOffset) = asUint8Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes1Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes1, uint) { - (uint8 ret, uint nextOffset) = asUint8Unchecked(encoded, offset); - return (bytes1(ret), nextOffset); - } - - function asBytes1( - bytes memory encoded, - uint offset - ) internal pure returns (bytes1, uint) { - (uint8 ret, uint nextOffset) = asUint8(encoded, offset); - return (bytes1(ret), nextOffset); - } - - function asUint16Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint16 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 2) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint16( - bytes memory encoded, - uint offset - ) internal pure returns (uint16 ret, uint nextOffset) { - (ret, nextOffset) = asUint16Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes2Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes2, uint) { - (uint16 ret, uint nextOffset) = asUint16Unchecked(encoded, offset); - return (bytes2(ret), nextOffset); - } - - function asBytes2( - bytes memory encoded, - uint offset - ) internal pure returns (bytes2, uint) { - (uint16 ret, uint nextOffset) = asUint16(encoded, offset); - return (bytes2(ret), nextOffset); - } - - function asUint24Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint24 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 3) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint24( - bytes memory encoded, - uint offset - ) internal pure returns (uint24 ret, uint nextOffset) { - (ret, nextOffset) = asUint24Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes3Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes3, uint) { - (uint24 ret, uint nextOffset) = asUint24Unchecked(encoded, offset); - return (bytes3(ret), nextOffset); - } - - function asBytes3( - bytes memory encoded, - uint offset - ) internal pure returns (bytes3, uint) { - (uint24 ret, uint nextOffset) = asUint24(encoded, offset); - return (bytes3(ret), nextOffset); - } - - function asUint32Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint32 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 4) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint32( - bytes memory encoded, - uint offset - ) internal pure returns (uint32 ret, uint nextOffset) { - (ret, nextOffset) = asUint32Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes4Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes4, uint) { - (uint32 ret, uint nextOffset) = asUint32Unchecked(encoded, offset); - return (bytes4(ret), nextOffset); - } - - function asBytes4( - bytes memory encoded, - uint offset - ) internal pure returns (bytes4, uint) { - (uint32 ret, uint nextOffset) = asUint32(encoded, offset); - return (bytes4(ret), nextOffset); - } - - function asUint40Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint40 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 5) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint40( - bytes memory encoded, - uint offset - ) internal pure returns (uint40 ret, uint nextOffset) { - (ret, nextOffset) = asUint40Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes5Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes5, uint) { - (uint40 ret, uint nextOffset) = asUint40Unchecked(encoded, offset); - return (bytes5(ret), nextOffset); - } - - function asBytes5( - bytes memory encoded, - uint offset - ) internal pure returns (bytes5, uint) { - (uint40 ret, uint nextOffset) = asUint40(encoded, offset); - return (bytes5(ret), nextOffset); - } - - function asUint48Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint48 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 6) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint48( - bytes memory encoded, - uint offset - ) internal pure returns (uint48 ret, uint nextOffset) { - (ret, nextOffset) = asUint48Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes6Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes6, uint) { - (uint48 ret, uint nextOffset) = asUint48Unchecked(encoded, offset); - return (bytes6(ret), nextOffset); - } - - function asBytes6( - bytes memory encoded, - uint offset - ) internal pure returns (bytes6, uint) { - (uint48 ret, uint nextOffset) = asUint48(encoded, offset); - return (bytes6(ret), nextOffset); - } - - function asUint56Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint56 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 7) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint56( - bytes memory encoded, - uint offset - ) internal pure returns (uint56 ret, uint nextOffset) { - (ret, nextOffset) = asUint56Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes7Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes7, uint) { - (uint56 ret, uint nextOffset) = asUint56Unchecked(encoded, offset); - return (bytes7(ret), nextOffset); - } - - function asBytes7( - bytes memory encoded, - uint offset - ) internal pure returns (bytes7, uint) { - (uint56 ret, uint nextOffset) = asUint56(encoded, offset); - return (bytes7(ret), nextOffset); - } - - function asUint64Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint64 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 8) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint64( - bytes memory encoded, - uint offset - ) internal pure returns (uint64 ret, uint nextOffset) { - (ret, nextOffset) = asUint64Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes8Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes8, uint) { - (uint64 ret, uint nextOffset) = asUint64Unchecked(encoded, offset); - return (bytes8(ret), nextOffset); - } - - function asBytes8( - bytes memory encoded, - uint offset - ) internal pure returns (bytes8, uint) { - (uint64 ret, uint nextOffset) = asUint64(encoded, offset); - return (bytes8(ret), nextOffset); - } - - function asUint72Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint72 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 9) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint72( - bytes memory encoded, - uint offset - ) internal pure returns (uint72 ret, uint nextOffset) { - (ret, nextOffset) = asUint72Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes9Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes9, uint) { - (uint72 ret, uint nextOffset) = asUint72Unchecked(encoded, offset); - return (bytes9(ret), nextOffset); - } - - function asBytes9( - bytes memory encoded, - uint offset - ) internal pure returns (bytes9, uint) { - (uint72 ret, uint nextOffset) = asUint72(encoded, offset); - return (bytes9(ret), nextOffset); - } - - function asUint80Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint80 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 10) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint80( - bytes memory encoded, - uint offset - ) internal pure returns (uint80 ret, uint nextOffset) { - (ret, nextOffset) = asUint80Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes10Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes10, uint) { - (uint80 ret, uint nextOffset) = asUint80Unchecked(encoded, offset); - return (bytes10(ret), nextOffset); - } - - function asBytes10( - bytes memory encoded, - uint offset - ) internal pure returns (bytes10, uint) { - (uint80 ret, uint nextOffset) = asUint80(encoded, offset); - return (bytes10(ret), nextOffset); - } - - function asUint88Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint88 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 11) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint88( - bytes memory encoded, - uint offset - ) internal pure returns (uint88 ret, uint nextOffset) { - (ret, nextOffset) = asUint88Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes11Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes11, uint) { - (uint88 ret, uint nextOffset) = asUint88Unchecked(encoded, offset); - return (bytes11(ret), nextOffset); - } - - function asBytes11( - bytes memory encoded, - uint offset - ) internal pure returns (bytes11, uint) { - (uint88 ret, uint nextOffset) = asUint88(encoded, offset); - return (bytes11(ret), nextOffset); - } - - function asUint96Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint96 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 12) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint96( - bytes memory encoded, - uint offset - ) internal pure returns (uint96 ret, uint nextOffset) { - (ret, nextOffset) = asUint96Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes12Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes12, uint) { - (uint96 ret, uint nextOffset) = asUint96Unchecked(encoded, offset); - return (bytes12(ret), nextOffset); - } - - function asBytes12( - bytes memory encoded, - uint offset - ) internal pure returns (bytes12, uint) { - (uint96 ret, uint nextOffset) = asUint96(encoded, offset); - return (bytes12(ret), nextOffset); - } - - function asUint104Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint104 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 13) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint104( - bytes memory encoded, - uint offset - ) internal pure returns (uint104 ret, uint nextOffset) { - (ret, nextOffset) = asUint104Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes13Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes13, uint) { - (uint104 ret, uint nextOffset) = asUint104Unchecked(encoded, offset); - return (bytes13(ret), nextOffset); - } - - function asBytes13( - bytes memory encoded, - uint offset - ) internal pure returns (bytes13, uint) { - (uint104 ret, uint nextOffset) = asUint104(encoded, offset); - return (bytes13(ret), nextOffset); - } - - function asUint112Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint112 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 14) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint112( - bytes memory encoded, - uint offset - ) internal pure returns (uint112 ret, uint nextOffset) { - (ret, nextOffset) = asUint112Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes14Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes14, uint) { - (uint112 ret, uint nextOffset) = asUint112Unchecked(encoded, offset); - return (bytes14(ret), nextOffset); - } - - function asBytes14( - bytes memory encoded, - uint offset - ) internal pure returns (bytes14, uint) { - (uint112 ret, uint nextOffset) = asUint112(encoded, offset); - return (bytes14(ret), nextOffset); - } - - function asUint120Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint120 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 15) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint120( - bytes memory encoded, - uint offset - ) internal pure returns (uint120 ret, uint nextOffset) { - (ret, nextOffset) = asUint120Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes15Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes15, uint) { - (uint120 ret, uint nextOffset) = asUint120Unchecked(encoded, offset); - return (bytes15(ret), nextOffset); - } - - function asBytes15( - bytes memory encoded, - uint offset - ) internal pure returns (bytes15, uint) { - (uint120 ret, uint nextOffset) = asUint120(encoded, offset); - return (bytes15(ret), nextOffset); - } - - function asUint128Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint128 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 16) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint128( - bytes memory encoded, - uint offset - ) internal pure returns (uint128 ret, uint nextOffset) { - (ret, nextOffset) = asUint128Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes16Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes16, uint) { - (uint128 ret, uint nextOffset) = asUint128Unchecked(encoded, offset); - return (bytes16(ret), nextOffset); - } - - function asBytes16( - bytes memory encoded, - uint offset - ) internal pure returns (bytes16, uint) { - (uint128 ret, uint nextOffset) = asUint128(encoded, offset); - return (bytes16(ret), nextOffset); - } - - function asUint136Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint136 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 17) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint136( - bytes memory encoded, - uint offset - ) internal pure returns (uint136 ret, uint nextOffset) { - (ret, nextOffset) = asUint136Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes17Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes17, uint) { - (uint136 ret, uint nextOffset) = asUint136Unchecked(encoded, offset); - return (bytes17(ret), nextOffset); - } - - function asBytes17( - bytes memory encoded, - uint offset - ) internal pure returns (bytes17, uint) { - (uint136 ret, uint nextOffset) = asUint136(encoded, offset); - return (bytes17(ret), nextOffset); - } - - function asUint144Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint144 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 18) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint144( - bytes memory encoded, - uint offset - ) internal pure returns (uint144 ret, uint nextOffset) { - (ret, nextOffset) = asUint144Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes18Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes18, uint) { - (uint144 ret, uint nextOffset) = asUint144Unchecked(encoded, offset); - return (bytes18(ret), nextOffset); - } - - function asBytes18( - bytes memory encoded, - uint offset - ) internal pure returns (bytes18, uint) { - (uint144 ret, uint nextOffset) = asUint144(encoded, offset); - return (bytes18(ret), nextOffset); - } - - function asUint152Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint152 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 19) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint152( - bytes memory encoded, - uint offset - ) internal pure returns (uint152 ret, uint nextOffset) { - (ret, nextOffset) = asUint152Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes19Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes19, uint) { - (uint152 ret, uint nextOffset) = asUint152Unchecked(encoded, offset); - return (bytes19(ret), nextOffset); - } - - function asBytes19( - bytes memory encoded, - uint offset - ) internal pure returns (bytes19, uint) { - (uint152 ret, uint nextOffset) = asUint152(encoded, offset); - return (bytes19(ret), nextOffset); - } - - function asUint160Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint160 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 20) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint160( - bytes memory encoded, - uint offset - ) internal pure returns (uint160 ret, uint nextOffset) { - (ret, nextOffset) = asUint160Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes20Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes20, uint) { - (uint160 ret, uint nextOffset) = asUint160Unchecked(encoded, offset); - return (bytes20(ret), nextOffset); - } - - function asBytes20( - bytes memory encoded, - uint offset - ) internal pure returns (bytes20, uint) { - (uint160 ret, uint nextOffset) = asUint160(encoded, offset); - return (bytes20(ret), nextOffset); - } - - function asUint168Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint168 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 21) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint168( - bytes memory encoded, - uint offset - ) internal pure returns (uint168 ret, uint nextOffset) { - (ret, nextOffset) = asUint168Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes21Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes21, uint) { - (uint168 ret, uint nextOffset) = asUint168Unchecked(encoded, offset); - return (bytes21(ret), nextOffset); - } - - function asBytes21( - bytes memory encoded, - uint offset - ) internal pure returns (bytes21, uint) { - (uint168 ret, uint nextOffset) = asUint168(encoded, offset); - return (bytes21(ret), nextOffset); - } - - function asUint176Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint176 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 22) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint176( - bytes memory encoded, - uint offset - ) internal pure returns (uint176 ret, uint nextOffset) { - (ret, nextOffset) = asUint176Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes22Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes22, uint) { - (uint176 ret, uint nextOffset) = asUint176Unchecked(encoded, offset); - return (bytes22(ret), nextOffset); - } - - function asBytes22( - bytes memory encoded, - uint offset - ) internal pure returns (bytes22, uint) { - (uint176 ret, uint nextOffset) = asUint176(encoded, offset); - return (bytes22(ret), nextOffset); - } - - function asUint184Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint184 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 23) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint184( - bytes memory encoded, - uint offset - ) internal pure returns (uint184 ret, uint nextOffset) { - (ret, nextOffset) = asUint184Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes23Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes23, uint) { - (uint184 ret, uint nextOffset) = asUint184Unchecked(encoded, offset); - return (bytes23(ret), nextOffset); - } - - function asBytes23( - bytes memory encoded, - uint offset - ) internal pure returns (bytes23, uint) { - (uint184 ret, uint nextOffset) = asUint184(encoded, offset); - return (bytes23(ret), nextOffset); - } - - function asUint192Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint192 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 24) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint192( - bytes memory encoded, - uint offset - ) internal pure returns (uint192 ret, uint nextOffset) { - (ret, nextOffset) = asUint192Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes24Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes24, uint) { - (uint192 ret, uint nextOffset) = asUint192Unchecked(encoded, offset); - return (bytes24(ret), nextOffset); - } - - function asBytes24( - bytes memory encoded, - uint offset - ) internal pure returns (bytes24, uint) { - (uint192 ret, uint nextOffset) = asUint192(encoded, offset); - return (bytes24(ret), nextOffset); - } - - function asUint200Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint200 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 25) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint200( - bytes memory encoded, - uint offset - ) internal pure returns (uint200 ret, uint nextOffset) { - (ret, nextOffset) = asUint200Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes25Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes25, uint) { - (uint200 ret, uint nextOffset) = asUint200Unchecked(encoded, offset); - return (bytes25(ret), nextOffset); - } - - function asBytes25( - bytes memory encoded, - uint offset - ) internal pure returns (bytes25, uint) { - (uint200 ret, uint nextOffset) = asUint200(encoded, offset); - return (bytes25(ret), nextOffset); - } - - function asUint208Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint208 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 26) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint208( - bytes memory encoded, - uint offset - ) internal pure returns (uint208 ret, uint nextOffset) { - (ret, nextOffset) = asUint208Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes26Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes26, uint) { - (uint208 ret, uint nextOffset) = asUint208Unchecked(encoded, offset); - return (bytes26(ret), nextOffset); - } - - function asBytes26( - bytes memory encoded, - uint offset - ) internal pure returns (bytes26, uint) { - (uint208 ret, uint nextOffset) = asUint208(encoded, offset); - return (bytes26(ret), nextOffset); - } - - function asUint216Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint216 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 27) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint216( - bytes memory encoded, - uint offset - ) internal pure returns (uint216 ret, uint nextOffset) { - (ret, nextOffset) = asUint216Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes27Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes27, uint) { - (uint216 ret, uint nextOffset) = asUint216Unchecked(encoded, offset); - return (bytes27(ret), nextOffset); - } - - function asBytes27( - bytes memory encoded, - uint offset - ) internal pure returns (bytes27, uint) { - (uint216 ret, uint nextOffset) = asUint216(encoded, offset); - return (bytes27(ret), nextOffset); - } - - function asUint224Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint224 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 28) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint224( - bytes memory encoded, - uint offset - ) internal pure returns (uint224 ret, uint nextOffset) { - (ret, nextOffset) = asUint224Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes28Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes28, uint) { - (uint224 ret, uint nextOffset) = asUint224Unchecked(encoded, offset); - return (bytes28(ret), nextOffset); - } - - function asBytes28( - bytes memory encoded, - uint offset - ) internal pure returns (bytes28, uint) { - (uint224 ret, uint nextOffset) = asUint224(encoded, offset); - return (bytes28(ret), nextOffset); - } - - function asUint232Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint232 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 29) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint232( - bytes memory encoded, - uint offset - ) internal pure returns (uint232 ret, uint nextOffset) { - (ret, nextOffset) = asUint232Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes29Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes29, uint) { - (uint232 ret, uint nextOffset) = asUint232Unchecked(encoded, offset); - return (bytes29(ret), nextOffset); - } - - function asBytes29( - bytes memory encoded, - uint offset - ) internal pure returns (bytes29, uint) { - (uint232 ret, uint nextOffset) = asUint232(encoded, offset); - return (bytes29(ret), nextOffset); - } - - function asUint240Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint240 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 30) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint240( - bytes memory encoded, - uint offset - ) internal pure returns (uint240 ret, uint nextOffset) { - (ret, nextOffset) = asUint240Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes30Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes30, uint) { - (uint240 ret, uint nextOffset) = asUint240Unchecked(encoded, offset); - return (bytes30(ret), nextOffset); - } - - function asBytes30( - bytes memory encoded, - uint offset - ) internal pure returns (bytes30, uint) { - (uint240 ret, uint nextOffset) = asUint240(encoded, offset); - return (bytes30(ret), nextOffset); - } - - function asUint248Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint248 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 31) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint248( - bytes memory encoded, - uint offset - ) internal pure returns (uint248 ret, uint nextOffset) { - (ret, nextOffset) = asUint248Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes31Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes31, uint) { - (uint248 ret, uint nextOffset) = asUint248Unchecked(encoded, offset); - return (bytes31(ret), nextOffset); - } - - function asBytes31( - bytes memory encoded, - uint offset - ) internal pure returns (bytes31, uint) { - (uint248 ret, uint nextOffset) = asUint248(encoded, offset); - return (bytes31(ret), nextOffset); - } - - function asUint256Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (uint256 ret, uint nextOffset) { - assembly ("memory-safe") { - nextOffset := add(offset, 32) - ret := mload(add(encoded, nextOffset)) - } - return (ret, nextOffset); - } - - function asUint256( - bytes memory encoded, - uint offset - ) internal pure returns (uint256 ret, uint nextOffset) { - (ret, nextOffset) = asUint256Unchecked(encoded, offset); - checkBound(nextOffset, encoded.length); - } - - function asBytes32Unchecked( - bytes memory encoded, - uint offset - ) internal pure returns (bytes32, uint) { - (uint256 ret, uint nextOffset) = asUint256Unchecked(encoded, offset); - return (bytes32(ret), nextOffset); - } - - function asBytes32( - bytes memory encoded, - uint offset - ) internal pure returns (bytes32, uint) { - (uint256 ret, uint nextOffset) = asUint256(encoded, offset); - return (bytes32(ret), nextOffset); - } -} diff --git a/evm/src/MatchingEngine/MatchingEngineImplementation.sol b/evm/src/MatchingEngine/MatchingEngineImplementation.sol index 39b92497..e827b680 100644 --- a/evm/src/MatchingEngine/MatchingEngineImplementation.sol +++ b/evm/src/MatchingEngine/MatchingEngineImplementation.sol @@ -3,11 +3,11 @@ pragma solidity ^0.8.19; import {ERC1967Upgrade} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Upgrade.sol"; -import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; -import {Admin} from "../shared/Admin.sol"; -import {Messages} from "../shared/Messages.sol"; -import {getImplementationState, Implementation} from "../shared/Admin.sol"; +import {BytesParsing} from "wormhole-solidity-sdk/libraries/BytesParsing.sol"; +import {Admin} from "src/shared/Admin.sol"; +import {Messages} from "src/shared/Messages.sol"; +import {getImplementationState, Implementation} from "src/shared/Admin.sol"; import {MatchingEngineAdmin} from "./assets/MatchingEngineAdmin.sol"; import {MatchingEngineFastOrders} from "./assets/MatchingEngineFastOrders.sol"; diff --git a/evm/src/MatchingEngine/MatchingEngineSetup.sol b/evm/src/MatchingEngine/MatchingEngineSetup.sol index 7d4db8a5..26aeb871 100644 --- a/evm/src/MatchingEngine/MatchingEngineSetup.sol +++ b/evm/src/MatchingEngine/MatchingEngineSetup.sol @@ -6,14 +6,12 @@ import {ERC1967Proxy} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.s import {ERC1967Upgrade} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Upgrade.sol"; import {Context} from "@openzeppelin/contracts/utils/Context.sol"; -import {getOwnerState, getOwnerAssistantState} from "../shared/Admin.sol"; +import {getOwnerState, getOwnerAssistantState} from "src/shared/Admin.sol"; import {getFeeRecipientState} from "./assets/Storage.sol"; -import {IMatchingEngine} from "../interfaces/IMatchingEngine.sol"; +import {IMatchingEngine} from "src/interfaces/IMatchingEngine.sol"; -import {MatchingEngineImplementation} from "../MatchingEngine/MatchingEngineImplementation.sol"; - -import "forge-std/console.sol"; +import {MatchingEngineImplementation} from "src/MatchingEngine/MatchingEngineImplementation.sol"; contract MatchingEngineSetup is ERC1967Upgrade, Context { error AlreadyDeployed(); @@ -31,10 +29,7 @@ contract MatchingEngineSetup is ERC1967Upgrade, Context { ERC1967Proxy proxy = new ERC1967Proxy( address(this), - abi.encodeCall( - this.setup, - (_getAdmin(), implementation, ownerAssistant, feeRecipient) - ) + abi.encodeCall(this.setup, (_getAdmin(), implementation, ownerAssistant, feeRecipient)) ); return address(proxy); diff --git a/evm/src/MatchingEngine/assets/Errors.sol b/evm/src/MatchingEngine/assets/Errors.sol index 426745e8..e9f7a944 100644 --- a/evm/src/MatchingEngine/assets/Errors.sol +++ b/evm/src/MatchingEngine/assets/Errors.sol @@ -8,6 +8,8 @@ error ErrChainNotAllowed(uint16 chain); error ErrInvalidEndpoint(bytes32 endpoint); +error ErrEndpointAlreadyExists(uint16 chain); + error ErrInvalidTargetRouter(uint16 chain); error ErrInvalidSourceRouter(bytes32 sender, bytes32 expected); diff --git a/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol b/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol index 769b0bb2..9e3280b6 100644 --- a/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol +++ b/evm/src/MatchingEngine/assets/MatchingEngineAdmin.sol @@ -2,14 +2,14 @@ pragma solidity ^0.8.19; -import {Admin} from "../../shared/Admin.sol"; +import {Admin} from "src/shared/Admin.sol"; import "./Errors.sol"; import {State} from "./State.sol"; import {getRouterEndpointState, getFeeRecipientState, getCircleDomainsState} from "./Storage.sol"; -import {RouterEndpoint} from "../../interfaces/IMatchingEngineTypes.sol"; -import {IMatchingEngineAdmin} from "../../interfaces/IMatchingEngineAdmin.sol"; +import {RouterEndpoint} from "src/interfaces/IMatchingEngineTypes.sol"; +import {IMatchingEngineAdmin} from "src/interfaces/IMatchingEngineAdmin.sol"; abstract contract MatchingEngineAdmin is IMatchingEngineAdmin, Admin, State { /// @inheritdoc IMatchingEngineAdmin @@ -25,10 +25,46 @@ abstract contract MatchingEngineAdmin is IMatchingEngineAdmin, Admin, State { revert ErrInvalidEndpoint(bytes32(0)); } + mapping(uint16 chain => RouterEndpoint) storage endpoints = + getRouterEndpointState().endpoints; + + // When a router is disabled, we set the router universal address to zero, but we will leave + // the mint recipient alone. So if the mint recipient is non-zero, this indicates that an + // endpoint was added for this chain ID already. + // + // This is also safe because we require that the mint recipient be non-zero when adding and + // updating endpoints. + if (endpoints[chain].mintRecipient != bytes32(0)) { + revert ErrEndpointAlreadyExists(chain); + } + + endpoints[chain] = endpoint; + getCircleDomainsState().domains[chain] = circleDomain; + } + + /// @inheritdoc IMatchingEngineAdmin + function updateRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint, uint32 circleDomain) + external + onlyOwner + { + if (chain == 0) { + revert ErrChainNotAllowed(chain); + } + + if (endpoint.router == bytes32(0) || endpoint.mintRecipient == bytes32(0)) { + revert ErrInvalidEndpoint(bytes32(0)); + } + getRouterEndpointState().endpoints[chain] = endpoint; getCircleDomainsState().domains[chain] = circleDomain; } + /// @inheritdoc IMatchingEngineAdmin + function disableRouterEndpoint(uint16 chain) external onlyOwner { + getRouterEndpointState().endpoints[chain].router = 0; + getCircleDomainsState().domains[chain] = 0; + } + /// @inheritdoc IMatchingEngineAdmin function updateFeeRecipient(address newFeeRecipient) external onlyOwnerOrAssistant { if (newFeeRecipient == address(0)) { diff --git a/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol index 538e541f..d5405bbd 100644 --- a/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol +++ b/evm/src/MatchingEngine/assets/MatchingEngineFastOrders.sol @@ -5,16 +5,15 @@ pragma solidity ^0.8.19; import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; -import {Messages} from "../../shared/Messages.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {IMatchingEngineFastOrders} from "../../interfaces/IMatchingEngineFastOrders.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {CctpMessage, RouterEndpoint} from "src/interfaces/IMatchingEngineTypes.sol"; +import {IMatchingEngineFastOrders} from "src/interfaces/IMatchingEngineFastOrders.sol"; +import {BytesParsing} from "wormhole-solidity-sdk/libraries/BytesParsing.sol"; +import {Messages} from "src/shared/Messages.sol"; +import {Utils} from "src/shared/Utils.sol"; import "./Errors.sol"; import {State} from "./State.sol"; -import {Utils} from "../../shared/Utils.sol"; -import {CctpMessage, RouterEndpoint} from "../../interfaces/IMatchingEngineTypes.sol"; import { getRouterEndpointState, LiveAuctionData, diff --git a/evm/src/MatchingEngine/assets/State.sol b/evm/src/MatchingEngine/assets/State.sol index 7edb6406..e79fc379 100644 --- a/evm/src/MatchingEngine/assets/State.sol +++ b/evm/src/MatchingEngine/assets/State.sol @@ -2,12 +2,11 @@ pragma solidity ^0.8.19; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {IMatchingEngineState} from "../../interfaces/IMatchingEngineState.sol"; -import {RouterEndpoint} from "../../interfaces/IMatchingEngineTypes.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {IMatchingEngineState} from "src/interfaces/IMatchingEngineState.sol"; +import {RouterEndpoint} from "src/interfaces/IMatchingEngineTypes.sol"; import "./Errors.sol"; - import { getRouterEndpointState, getLiveAuctionInfo, @@ -18,7 +17,7 @@ import { getCircleDomainsState } from "./Storage.sol"; -import {WormholeCctpTokenMessenger} from "../../shared/WormholeCctpTokenMessenger.sol"; +import {WormholeCctpTokenMessenger} from "src/shared/WormholeCctpTokenMessenger.sol"; abstract contract State is IMatchingEngineState, WormholeCctpTokenMessenger { // ------------------------------ Constants ------------------------------------------- diff --git a/evm/src/MatchingEngine/assets/Storage.sol b/evm/src/MatchingEngine/assets/Storage.sol index 8194d26d..a86537ac 100644 --- a/evm/src/MatchingEngine/assets/Storage.sol +++ b/evm/src/MatchingEngine/assets/Storage.sol @@ -2,7 +2,7 @@ pragma solidity ^0.8.19; -import "../../interfaces/IMatchingEngineTypes.sol"; +import "src/interfaces/IMatchingEngineTypes.sol"; // keccak256("FeeRecipient") - 1 bytes32 constant FEE_RECIPIENT_STORAGE_SLOT = diff --git a/evm/src/TokenRouter/TokenRouterImplementation.sol b/evm/src/TokenRouter/TokenRouterImplementation.sol index d3767df0..7c65975a 100644 --- a/evm/src/TokenRouter/TokenRouterImplementation.sol +++ b/evm/src/TokenRouter/TokenRouterImplementation.sol @@ -3,11 +3,11 @@ pragma solidity ^0.8.19; import {ERC1967Upgrade} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Upgrade.sol"; -import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; +import {BytesParsing} from "wormhole-solidity-sdk/libraries/BytesParsing.sol"; -import {Admin} from "../shared/Admin.sol"; -import {Messages} from "../shared/Messages.sol"; -import {getImplementationState, Implementation} from "../shared/Admin.sol"; +import {Admin} from "src/shared/Admin.sol"; +import {Messages} from "src/shared/Messages.sol"; +import {getImplementationState, Implementation} from "src/shared/Admin.sol"; import {TokenRouterAdmin} from "./assets/TokenRouterAdmin.sol"; import {PlaceMarketOrder} from "./assets/PlaceMarketOrder.sol"; diff --git a/evm/src/TokenRouter/TokenRouterSetup.sol b/evm/src/TokenRouter/TokenRouterSetup.sol index 5e7188d3..ce06a821 100644 --- a/evm/src/TokenRouter/TokenRouterSetup.sol +++ b/evm/src/TokenRouter/TokenRouterSetup.sol @@ -6,11 +6,11 @@ import {ERC1967Proxy} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Proxy.s import {ERC1967Upgrade} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Upgrade.sol"; import {Context} from "@openzeppelin/contracts/utils/Context.sol"; -import {getOwnerState, getOwnerAssistantState} from "../shared/Admin.sol"; +import {getOwnerState, getOwnerAssistantState} from "src/shared/Admin.sol"; -import {ITokenRouter} from "../interfaces/ITokenRouter.sol"; +import {ITokenRouter} from "src/interfaces/ITokenRouter.sol"; -import {TokenRouterImplementation} from "../TokenRouter/TokenRouterImplementation.sol"; +import {TokenRouterImplementation} from "src/TokenRouter/TokenRouterImplementation.sol"; contract TokenRouterSetup is ERC1967Upgrade, Context { error AlreadyDeployed(); @@ -27,11 +27,7 @@ contract TokenRouterSetup is ERC1967Upgrade, Context { _changeAdmin(_msgSender()); ERC1967Proxy proxy = new ERC1967Proxy( - address(this), - abi.encodeCall( - this.setup, - (_getAdmin(), implementation, ownerAssistant) - ) + address(this), abi.encodeCall(this.setup, (_getAdmin(), implementation, ownerAssistant)) ); return address(proxy); diff --git a/evm/src/TokenRouter/assets/Errors.sol b/evm/src/TokenRouter/assets/Errors.sol index 55a2a728..9d286091 100644 --- a/evm/src/TokenRouter/assets/Errors.sol +++ b/evm/src/TokenRouter/assets/Errors.sol @@ -10,6 +10,8 @@ error ErrInvalidRedeemerAddress(); error ErrInvalidEndpoint(bytes32 endpoint); +error ErrEndpointAlreadyExists(uint16 chain); + error ErrUnsupportedChain(uint16 chain); error ErrChainNotAllowed(uint16 chain); diff --git a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol index b12e6de9..50d379ac 100644 --- a/evm/src/TokenRouter/assets/PlaceMarketOrder.sol +++ b/evm/src/TokenRouter/assets/PlaceMarketOrder.sol @@ -3,23 +3,22 @@ pragma solidity ^0.8.19; import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; +import {BytesParsing} from "wormhole-solidity-sdk/libraries/BytesParsing.sol"; -import {Admin} from "../../shared/Admin.sol"; -import {Messages} from "../../shared/Messages.sol"; -import {Utils} from "../../shared/Utils.sol"; +import {Admin} from "src/shared/Admin.sol"; +import {Messages} from "src/shared/Messages.sol"; +import {Utils} from "src/shared/Utils.sol"; import "./Errors.sol"; import {State} from "./State.sol"; -import {FastTransferParameters, Endpoint} from "../../interfaces/ITokenRouterTypes.sol"; +import {FastTransferParameters, Endpoint} from "src/interfaces/ITokenRouterTypes.sol"; import { getFastTransferParametersState, getCircleDomainsState, getRouterEndpointState } from "./Storage.sol"; -import "../../interfaces/IPlaceMarketOrder.sol"; +import "src/interfaces/IPlaceMarketOrder.sol"; abstract contract PlaceMarketOrder is IPlaceMarketOrder, Admin, State { using BytesParsing for bytes; diff --git a/evm/src/TokenRouter/assets/RedeemFill.sol b/evm/src/TokenRouter/assets/RedeemFill.sol index 3e958a38..6378dc12 100644 --- a/evm/src/TokenRouter/assets/RedeemFill.sol +++ b/evm/src/TokenRouter/assets/RedeemFill.sol @@ -4,21 +4,18 @@ pragma solidity ^0.8.19; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; -import {IMatchingEngine} from "../../interfaces/IMatchingEngine.sol"; +import {IMatchingEngine} from "src/interfaces/IMatchingEngine.sol"; -import {Admin} from "../../shared/Admin.sol"; -import {Messages} from "../../shared/Messages.sol"; -import {Utils} from "../../shared/Utils.sol"; +import {Admin} from "src/shared/Admin.sol"; +import {Messages} from "src/shared/Messages.sol"; +import {Utils} from "src/shared/Utils.sol"; import "./Errors.sol"; import {State} from "./State.sol"; -import "../../interfaces/IRedeemFill.sol"; - -import "forge-std/console.sol"; +import "src/interfaces/IRedeemFill.sol"; abstract contract RedeemFill is IRedeemFill, Admin, State { using Messages for *; diff --git a/evm/src/TokenRouter/assets/State.sol b/evm/src/TokenRouter/assets/State.sol index 9d924e3c..35df58ec 100644 --- a/evm/src/TokenRouter/assets/State.sol +++ b/evm/src/TokenRouter/assets/State.sol @@ -3,18 +3,18 @@ pragma solidity ^0.8.19; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {ITokenRouterState} from "../../interfaces/ITokenRouterState.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {ITokenRouterState} from "src/interfaces/ITokenRouterState.sol"; +import {FastTransferParameters, Endpoint} from "src/interfaces/ITokenRouterTypes.sol"; import "./Errors.sol"; -import {FastTransferParameters, Endpoint} from "../../interfaces/ITokenRouterTypes.sol"; import { getRouterEndpointState, getFastTransferParametersState, getCircleDomainsState } from "./Storage.sol"; -import {WormholeCctpTokenMessenger} from "../../shared/WormholeCctpTokenMessenger.sol"; +import {WormholeCctpTokenMessenger} from "src/shared/WormholeCctpTokenMessenger.sol"; abstract contract State is ITokenRouterState, WormholeCctpTokenMessenger { // Immutable state. diff --git a/evm/src/TokenRouter/assets/Storage.sol b/evm/src/TokenRouter/assets/Storage.sol index f4040256..5c23cab2 100644 --- a/evm/src/TokenRouter/assets/Storage.sol +++ b/evm/src/TokenRouter/assets/Storage.sol @@ -2,7 +2,7 @@ pragma solidity ^0.8.19; -import "../../interfaces/ITokenRouterTypes.sol"; +import "src/interfaces/ITokenRouterTypes.sol"; // keccak256("RouterEndpoints") - 1 bytes32 constant ROUTER_ENDPOINT_STORAGE_SLOT = diff --git a/evm/src/TokenRouter/assets/TokenRouterAdmin.sol b/evm/src/TokenRouter/assets/TokenRouterAdmin.sol index ea651d4b..95d85951 100644 --- a/evm/src/TokenRouter/assets/TokenRouterAdmin.sol +++ b/evm/src/TokenRouter/assets/TokenRouterAdmin.sol @@ -2,7 +2,7 @@ pragma solidity ^0.8.19; -import {Admin} from "../../shared/Admin.sol"; +import {Admin} from "src/shared/Admin.sol"; import "./Errors.sol"; import {State} from "./State.sol"; @@ -13,8 +13,8 @@ import { FastTransferParameters } from "./Storage.sol"; -import {Endpoint} from "../../interfaces/ITokenRouterTypes.sol"; -import {ITokenRouterAdmin} from "../../interfaces/ITokenRouterAdmin.sol"; +import {Endpoint} from "src/interfaces/ITokenRouterTypes.sol"; +import {ITokenRouterAdmin} from "src/interfaces/ITokenRouterAdmin.sol"; abstract contract TokenRouterAdmin is ITokenRouterAdmin, Admin, State { /// @inheritdoc ITokenRouterAdmin @@ -30,10 +30,45 @@ abstract contract TokenRouterAdmin is ITokenRouterAdmin, Admin, State { revert ErrInvalidEndpoint(bytes32(0)); } + mapping(uint16 chain => Endpoint) storage endpoints = getRouterEndpointState().endpoints; + + // When a router is disabled, we set the router universal address to zero, but we will leave + // the mint recipient alone. So if the mint recipient is non-zero, this indicates that an + // endpoint was added for this chain ID already. + // + // This is also safe because we require that the mint recipient be non-zero when adding and + // updating endpoints. + if (endpoints[chain].mintRecipient != bytes32(0)) { + revert ErrEndpointAlreadyExists(chain); + } + + endpoints[chain] = endpoint; + getCircleDomainsState().domains[chain] = circleDomain; + } + + /// @inheritdoc ITokenRouterAdmin + function updateRouterEndpoint(uint16 chain, Endpoint memory endpoint, uint32 circleDomain) + external + onlyOwner + { + if (chain == 0) { + revert ErrChainNotAllowed(chain); + } + + if (endpoint.router == bytes32(0) || endpoint.mintRecipient == bytes32(0)) { + revert ErrInvalidEndpoint(bytes32(0)); + } + getRouterEndpointState().endpoints[chain] = endpoint; getCircleDomainsState().domains[chain] = circleDomain; } + /// @inheritdoc ITokenRouterAdmin + function disableRouterEndpoint(uint16 chain) external onlyOwner { + getRouterEndpointState().endpoints[chain].router = 0; + getCircleDomainsState().domains[chain] = 0; + } + /// @inheritdoc ITokenRouterAdmin function updateFastTransferParameters(FastTransferParameters memory newParams) external diff --git a/evm/src/interfaces/IMatchingEngine.sol b/evm/src/interfaces/IMatchingEngine.sol index bd5fc86f..cec75a04 100644 --- a/evm/src/interfaces/IMatchingEngine.sol +++ b/evm/src/interfaces/IMatchingEngine.sol @@ -6,10 +6,9 @@ import "./IMatchingEngineState.sol"; import "./IMatchingEngineAdmin.sol"; import "./IMatchingEngineFastOrders.sol"; import "./IAdmin.sol"; -import "../shared/Messages.sol"; +import "src/shared/Messages.sol"; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; interface IMatchingEngine is IMatchingEngineFastOrders, diff --git a/evm/src/interfaces/IMatchingEngineAdmin.sol b/evm/src/interfaces/IMatchingEngineAdmin.sol index 7c0a6381..60574044 100644 --- a/evm/src/interfaces/IMatchingEngineAdmin.sol +++ b/evm/src/interfaces/IMatchingEngineAdmin.sol @@ -15,6 +15,23 @@ interface IMatchingEngineAdmin { function addRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint, uint32 circleDomain) external; + /** + * @notice Update a `router` endpoint for the specified Wormhole `chain`. + * @param chain The Wormhole chain ID. + * @param endpoint The `Endpoint` for the specified `chain`. + * @param circleDomain The Circle domain for the specified `chain`. + * @dev This function is only callable by the contract owner. + */ + function updateRouterEndpoint(uint16 chain, RouterEndpoint memory endpoint, uint32 circleDomain) + external; + + /** + * @notice Disable a `router` endpoint for the specified Wormhole `chain`. + * @param chain The Wormhole chain ID. + * @dev This function is only callable by the contract owner. + */ + function disableRouterEndpoint(uint16 chain) external; + /** * @notice Updates the `feeRecipient` state variable. This method can * only be executed by the owner. diff --git a/evm/src/interfaces/IMatchingEngineFastOrders.sol b/evm/src/interfaces/IMatchingEngineFastOrders.sol index 1b0e7e82..194f4c33 100644 --- a/evm/src/interfaces/IMatchingEngineFastOrders.sol +++ b/evm/src/interfaces/IMatchingEngineFastOrders.sol @@ -2,9 +2,8 @@ pragma solidity ^0.8.0; -import "../shared/Messages.sol"; +import "src/shared/Messages.sol"; import {CctpMessage} from "./IMatchingEngineTypes.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; interface IMatchingEngineFastOrders { /** diff --git a/evm/src/interfaces/IMatchingEngineState.sol b/evm/src/interfaces/IMatchingEngineState.sol index 8c1cb0a0..e32c7111 100644 --- a/evm/src/interfaces/IMatchingEngineState.sol +++ b/evm/src/interfaces/IMatchingEngineState.sol @@ -3,8 +3,8 @@ pragma solidity ^0.8.0; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {ICircleIntegration} from "local-modules/wormhole/ICircleIntegration.sol"; import "./IMatchingEngineTypes.sol"; interface IMatchingEngineState { diff --git a/evm/src/interfaces/IRedeemFill.sol b/evm/src/interfaces/IRedeemFill.sol index 8f411c55..3ab5a94c 100644 --- a/evm/src/interfaces/IRedeemFill.sol +++ b/evm/src/interfaces/IRedeemFill.sol @@ -2,7 +2,6 @@ pragma solidity ^0.8.0; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; import {OrderResponse} from "./ITokenRouterTypes.sol"; struct RedeemedFill { diff --git a/evm/src/interfaces/ITokenRouter.sol b/evm/src/interfaces/ITokenRouter.sol index fbd419fa..7257d071 100644 --- a/evm/src/interfaces/ITokenRouter.sol +++ b/evm/src/interfaces/ITokenRouter.sol @@ -10,7 +10,6 @@ import "./ITokenRouterAdmin.sol"; import "./IAdmin.sol"; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {ICircleIntegration} from "wormhole-solidity/ICircleIntegration.sol"; interface ITokenRouter is IPlaceMarketOrder, diff --git a/evm/src/interfaces/ITokenRouterAdmin.sol b/evm/src/interfaces/ITokenRouterAdmin.sol index e4bbcce2..eb3cf92e 100644 --- a/evm/src/interfaces/ITokenRouterAdmin.sol +++ b/evm/src/interfaces/ITokenRouterAdmin.sol @@ -14,6 +14,22 @@ interface ITokenRouterAdmin { */ function addRouterEndpoint(uint16 chain, Endpoint memory endpoint, uint32 domain) external; + /** + * @notice Update a `router` endpoint for the specified Wormhole `chain`. + * @param chain The Wormhole chain ID. + * @param endpoint The `Endpoint` for the specified `chain`. + * @param domain The Circle domain for the specified `chain`. + * @dev This function is only callable by the contract owner. + */ + function updateRouterEndpoint(uint16 chain, Endpoint memory endpoint, uint32 domain) external; + + /** + * @notice Disable a `router` endpoint for the specified Wormhole `chain`. + * @param chain The Wormhole chain ID. + * @dev This function is only callable by the contract owner. + */ + function disableRouterEndpoint(uint16 chain) external; + /** * @notice Update the fast transfer parameters. * @param newParams The new fast transfer parameters. diff --git a/evm/src/interfaces/ITokenRouterState.sol b/evm/src/interfaces/ITokenRouterState.sol index 669c85a4..8076621a 100644 --- a/evm/src/interfaces/ITokenRouterState.sol +++ b/evm/src/interfaces/ITokenRouterState.sol @@ -3,7 +3,7 @@ pragma solidity ^0.8.0; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; import "./ITokenRouterTypes.sol"; interface ITokenRouterState { diff --git a/evm/src/interfaces/external/ICircleBridge.sol b/evm/src/interfaces/external/ICircleBridge.sol new file mode 100644 index 00000000..68a8a4c6 --- /dev/null +++ b/evm/src/interfaces/external/ICircleBridge.sol @@ -0,0 +1,76 @@ +// SPDX-License-Identifier: Apache 2 +pragma solidity ^0.8.19; + +import {IMessageTransmitter} from "./IMessageTransmitter.sol"; +import {ITokenMinter} from "./ITokenMinter.sol"; + +interface ICircleBridge { + /** + * @notice Deposits and burns tokens from sender to be minted on destination domain. + * Emits a `DepositForBurn` event. + * @dev reverts if: + * - given burnToken is not supported + * - given destinationDomain has no CircleBridge registered + * - transferFrom() reverts. For example, if sender's burnToken balance or approved allowance + * to this contract is less than `amount`. + * - burn() reverts. For example, if `amount` is 0. + * - MessageTransmitter returns false or reverts. + * @param _amount amount of tokens to burn + * @param _destinationDomain destination domain (ETH = 0, AVAX = 1) + * @param _mintRecipient address of mint recipient on destination domain + * @param _burnToken address of contract to burn deposited tokens, on local domain + * @return _nonce unique nonce reserved by message + */ + function depositForBurn( + uint256 _amount, + uint32 _destinationDomain, + bytes32 _mintRecipient, + address _burnToken + ) external returns (uint64 _nonce); + + /** + * @notice Deposits and burns tokens from sender to be minted on destination domain. The mint + * on the destination domain must be called by `_destinationCaller`. + * WARNING: if the `_destinationCaller` does not represent a valid address as bytes32, then it will not be possible + * to broadcast the message on the destination domain. This is an advanced feature, and the standard + * depositForBurn() should be preferred for use cases where a specific destination caller is not required. + * Emits a `DepositForBurn` event. + * @dev reverts if: + * - given destinationCaller is zero address + * - given burnToken is not supported + * - given destinationDomain has no CircleBridge registered + * - transferFrom() reverts. For example, if sender's burnToken balance or approved allowance + * to this contract is less than `amount`. + * - burn() reverts. For example, if `amount` is 0. + * - MessageTransmitter returns false or reverts. + * @param _amount amount of tokens to burn + * @param _destinationDomain destination domain + * @param _mintRecipient address of mint recipient on destination domain + * @param _burnToken address of contract to burn deposited tokens, on local domain + * @param _destinationCaller caller on the destination domain, as bytes32 + * @return _nonce unique nonce reserved by message + */ + function depositForBurnWithCaller( + uint256 _amount, + uint32 _destinationDomain, + bytes32 _mintRecipient, + address _burnToken, + bytes32 _destinationCaller + ) external returns (uint64 _nonce); + + function owner() external view returns (address); + + function handleReceiveMessage(uint32 _remoteDomain, bytes32 _sender, bytes memory messageBody) + external + view + returns (bool); + + function localMessageTransmitter() external view returns (IMessageTransmitter); + + function localMinter() external view returns (ITokenMinter); + + function remoteCircleBridges(uint32 domain) external view returns (bytes32); + + // owner only methods + function transferOwnership(address newOwner) external; +} diff --git a/evm/src/interfaces/external/IMessageTransmitter.sol b/evm/src/interfaces/external/IMessageTransmitter.sol new file mode 100644 index 00000000..ce00bbf4 --- /dev/null +++ b/evm/src/interfaces/external/IMessageTransmitter.sol @@ -0,0 +1,82 @@ +// SPDX-License-Identifier: Apache 2 +pragma solidity ^0.8.19; + +interface IMessageTransmitter { + event MessageSent(bytes message); + + /** + * @notice Emitted when tokens are minted + * @param _mintRecipient recipient address of minted tokens + * @param _amount amount of minted tokens + * @param _mintToken contract address of minted token + */ + event MintAndWithdraw(address _mintRecipient, uint256 _amount, address _mintToken); + + /** + * @notice Receive a message. Messages with a given nonce + * can only be broadcast once for a (sourceDomain, destinationDomain) + * pair. The message body of a valid message is passed to the + * specified recipient for further processing. + * + * @dev Attestation format: + * A valid attestation is the concatenated 65-byte signature(s) of exactly + * `thresholdSignature` signatures, in increasing order of attester address. + * ***If the attester addresses recovered from signatures are not in + * increasing order, signature verification will fail.*** + * If incorrect number of signatures or duplicate signatures are supplied, + * signature verification will fail. + * + * Message format: + * Field Bytes Type Index + * version 4 uint32 0 + * sourceDomain 4 uint32 4 + * destinationDomain 4 uint32 8 + * nonce 8 uint64 12 + * sender 32 bytes32 20 + * recipient 32 bytes32 52 + * messageBody dynamic bytes 84 + * @param _message Message bytes + * @param _attestation Concatenated 65-byte signature(s) of `_message`, in increasing order + * of the attester address recovered from signatures. + * @return success bool, true if successful + */ + function receiveMessage(bytes memory _message, bytes calldata _attestation) + external + returns (bool success); + + function attesterManager() external view returns (address); + + function availableNonces(uint32 domain) external view returns (uint64); + + function getNumEnabledAttesters() external view returns (uint256); + + function isEnabledAttester(address _attester) external view returns (bool); + + function localDomain() external view returns (uint32); + + function maxMessageBodySize() external view returns (uint256); + + function owner() external view returns (address); + + function paused() external view returns (bool); + + function pauser() external view returns (address); + + function rescuer() external view returns (address); + + function version() external view returns (uint32); + + // owner only methods + function transferOwnership(address newOwner) external; + + function updateAttesterManager(address _newAttesterManager) external; + + // attester manager only methods + function getEnabledAttester(uint256 _index) external view returns (address); + + function disableAttester(address _attester) external; + + function enableAttester(address _attester) external; + + function setSignatureThreshold(uint256 newSignatureThreshold) external; +} diff --git a/evm/modules/circle/ITokenMessenger.sol b/evm/src/interfaces/external/ITokenMessenger.sol similarity index 99% rename from evm/modules/circle/ITokenMessenger.sol rename to evm/src/interfaces/external/ITokenMessenger.sol index ed699f69..bb028e87 100644 --- a/evm/modules/circle/ITokenMessenger.sol +++ b/evm/src/interfaces/external/ITokenMessenger.sol @@ -79,4 +79,4 @@ interface ITokenMessenger { // owner only methods function transferOwnership(address newOwner) external; -} \ No newline at end of file +} diff --git a/evm/modules/circle/ITokenMinter.sol b/evm/src/interfaces/external/ITokenMinter.sol similarity index 56% rename from evm/modules/circle/ITokenMinter.sol rename to evm/src/interfaces/external/ITokenMinter.sol index af82d2df..5dff82fe 100644 --- a/evm/modules/circle/ITokenMinter.sol +++ b/evm/src/interfaces/external/ITokenMinter.sol @@ -7,11 +7,7 @@ pragma solidity ^0.8.19; * across domains. */ interface ITokenMinter { - function burnLimitsPerMessage( - address token - ) external view returns (uint256); + function burnLimitsPerMessage(address token) external view returns (uint256); - function remoteTokensToLocalTokens( - bytes32 sourceIdHash - ) external view returns (address); + function remoteTokensToLocalTokens(bytes32 sourceIdHash) external view returns (address); } diff --git a/evm/src/shared/Admin.sol b/evm/src/shared/Admin.sol index 0e1adb60..996bfffc 100644 --- a/evm/src/shared/Admin.sol +++ b/evm/src/shared/Admin.sol @@ -2,7 +2,7 @@ pragma solidity ^0.8.19; -import {IAdmin} from "../interfaces/IAdmin.sol"; +import {IAdmin} from "src/interfaces/IAdmin.sol"; import {ERC1967Upgrade} from "@openzeppelin/contracts/proxy/ERC1967/ERC1967Upgrade.sol"; diff --git a/evm/src/shared/Messages.sol b/evm/src/shared/Messages.sol index 3489f9b7..47fed8fe 100644 --- a/evm/src/shared/Messages.sol +++ b/evm/src/shared/Messages.sol @@ -2,7 +2,7 @@ pragma solidity ^0.8.19; -import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; +import {BytesParsing} from "wormhole-solidity-sdk/libraries/BytesParsing.sol"; library Messages { using BytesParsing for bytes; diff --git a/evm/src/shared/WormholeCctpMessages.sol b/evm/src/shared/WormholeCctpMessages.sol index 1c249df0..a1d1a6b9 100644 --- a/evm/src/shared/WormholeCctpMessages.sol +++ b/evm/src/shared/WormholeCctpMessages.sol @@ -1,9 +1,9 @@ // SPDX-License-Identifier: Apache 2 pragma solidity ^0.8.19; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; -import {BytesParsing} from "wormhole-solidity/WormholeBytesParsing.sol"; +import {BytesParsing} from "wormhole-solidity-sdk/libraries/BytesParsing.sol"; import {Utils} from "./Utils.sol"; library WormholeCctpMessages { diff --git a/evm/src/shared/WormholeCctpTokenMessenger.sol b/evm/src/shared/WormholeCctpTokenMessenger.sol index 481e0b88..61bc4cb0 100644 --- a/evm/src/shared/WormholeCctpTokenMessenger.sol +++ b/evm/src/shared/WormholeCctpTokenMessenger.sol @@ -4,10 +4,10 @@ pragma solidity ^0.8.19; import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol"; import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/utils/SafeERC20.sol"; -import {IWormhole} from "wormhole-solidity/IWormhole.sol"; -import {IMessageTransmitter} from "cctp-solidity/IMessageTransmitter.sol"; -import {ITokenMessenger} from "cctp-solidity/ITokenMessenger.sol"; -import {ITokenMinter} from "cctp-solidity/ITokenMinter.sol"; +import {IWormhole} from "wormhole-solidity-sdk/interfaces/IWormhole.sol"; +import {IMessageTransmitter} from "src/interfaces/external/IMessageTransmitter.sol"; +import {ITokenMessenger} from "src/interfaces/external/ITokenMessenger.sol"; +import {ITokenMinter} from "src/interfaces/external/ITokenMinter.sol"; import {Utils} from "./Utils.sol"; import {WormholeCctpMessages} from "./WormholeCctpMessages.sol"; diff --git a/solana/programs/matching-engine/src/error.rs b/solana/programs/matching-engine/src/error.rs index c6f6b862..7897b55f 100644 --- a/solana/programs/matching-engine/src/error.rs +++ b/solana/programs/matching-engine/src/error.rs @@ -20,6 +20,12 @@ pub enum MatchingEngineError { #[msg("UpgradeManagerRequired")] UpgradeManagerRequired = 0x10, + #[msg("SameEndpoint")] + SameEndpoint = 0x20, + + #[msg("InvalidEndpoint")] + InvalidEndpoint = 0x22, + #[msg("AssistantZeroPubkey")] AssistantZeroPubkey = 0x100, @@ -59,9 +65,6 @@ pub enum MatchingEngineError { #[msg("ChainNotAllowed")] ChainNotAllowed, - #[msg("InvalidEndpoint")] - InvalidEndpoint, - #[msg("InvalidMintRecipient")] InvalidMintRecipient, @@ -158,6 +161,9 @@ pub enum MatchingEngineError { #[msg("AuctionConfigMismatch")] AuctionConfigMismatch, + #[msg("EndpointDisabled")] + EndpointDisabled, + #[msg("InvalidCctpEndpoint")] InvalidCctpEndpoint, diff --git a/solana/programs/matching-engine/src/lib.rs b/solana/programs/matching-engine/src/lib.rs index 655809cc..1b145c98 100644 --- a/solana/programs/matching-engine/src/lib.rs +++ b/solana/programs/matching-engine/src/lib.rs @@ -11,6 +11,7 @@ pub(crate) use processor::*; pub mod state; pub mod utils; +pub use utils::admin::AddCctpRouterEndpointArgs; use anchor_lang::prelude::*; @@ -77,8 +78,19 @@ pub mod matching_engine { processor::add_local_router_endpoint(ctx) } - pub fn remove_router_endpoint(ctx: Context) -> Result<()> { - processor::remove_router_endpoint(ctx) + pub fn disable_router_endpoint(ctx: Context) -> Result<()> { + processor::disable_router_endpoint(ctx) + } + + pub fn update_cctp_router_endpoint( + ctx: Context, + args: AddCctpRouterEndpointArgs, + ) -> Result<()> { + processor::update_cctp_router_endpoint(ctx, args) + } + + pub fn update_local_router_endpoint(ctx: Context) -> Result<()> { + processor::update_local_router_endpoint(ctx) } pub fn submit_ownership_transfer_request( diff --git a/solana/programs/matching-engine/src/processor/admin/close_proposal.rs b/solana/programs/matching-engine/src/processor/admin/close_proposal.rs index 337881ba..6c514661 100644 --- a/solana/programs/matching-engine/src/processor/admin/close_proposal.rs +++ b/solana/programs/matching-engine/src/processor/admin/close_proposal.rs @@ -1,21 +1,9 @@ -use crate::{ - error::MatchingEngineError, - state::{Custodian, Proposal}, -}; +use crate::state::{custodian::*, Proposal}; use anchor_lang::prelude::*; #[derive(Accounts)] pub struct CloseProposal<'info> { - #[account(mut)] - owner: Signer<'info>, - - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - has_one = owner @ MatchingEngineError::OwnerOnly, - )] - custodian: Account<'info, Custodian>, + admin: OwnerCustodian<'info>, /// CHECK: This account must equal proposal.by pubkey. #[account( diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs index 67bea622..d4d2fc0a 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/cancel.rs @@ -1,25 +1,17 @@ -use crate::{error::MatchingEngineError, state::Custodian}; +use crate::state::custodian::*; use anchor_lang::prelude::*; -use common::admin::utils::ownable::only_owner; #[derive(Accounts)] pub struct CancelOwnershipTransferRequest<'info> { - owner: Signer<'info>, - - /// Custodian, which can only be modified by the configured owner. - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, - )] - custodian: Account<'info, Custodian>, + admin: OwnerMutCustodian<'info>, } pub fn cancel_ownership_transfer_request( ctx: Context, ) -> Result<()> { - common::admin::utils::pending_owner::cancel_transfer_ownership(&mut ctx.accounts.custodian); + common::admin::utils::pending_owner::cancel_transfer_ownership( + &mut ctx.accounts.admin.custodian, + ); // Done. Ok(()) diff --git a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs index 332c779f..cb33003d 100644 --- a/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs +++ b/solana/programs/matching-engine/src/processor/admin/ownership_transfer_request/submit.rs @@ -1,26 +1,16 @@ -use crate::{error::MatchingEngineError, state::Custodian}; +use crate::{error::MatchingEngineError, state::custodian::*}; use anchor_lang::prelude::*; -use common::admin::utils::ownable::only_owner; #[derive(Accounts)] pub struct SubmitOwnershipTransferRequest<'info> { - owner: Signer<'info>, - - /// Custodian, which can only be modified by the configured owner. - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - constraint = only_owner(&custodian, &owner.key()) @ MatchingEngineError::OwnerOnly, - )] - custodian: Account<'info, Custodian>, + admin: OwnerMutCustodian<'info>, /// New Owner. /// /// CHECK: Must be neither zero pubkey nor current owner. #[account( constraint = new_owner.key() != Pubkey::default() @ MatchingEngineError::InvalidNewOwner, - constraint = new_owner.key() != owner.key() @ MatchingEngineError::AlreadyOwner + constraint = new_owner.key() != admin.owner.key() @ MatchingEngineError::AlreadyOwner )] new_owner: AccountInfo<'info>, } @@ -29,7 +19,7 @@ pub fn submit_ownership_transfer_request( ctx: Context, ) -> Result<()> { common::admin::utils::pending_owner::transfer_ownership( - &mut ctx.accounts.custodian, + &mut ctx.accounts.admin.custodian, &ctx.accounts.new_owner.key(), ); diff --git a/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs index a34f3916..6869e733 100644 --- a/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs +++ b/solana/programs/matching-engine/src/processor/admin/propose/auction_parameters.rs @@ -1,34 +1,20 @@ -use crate::{ - error::MatchingEngineError, - state::{AuctionParameters, Custodian, Proposal, ProposalAction}, -}; +use crate::state::{custodian::*, AuctionParameters, Proposal, ProposalAction}; use anchor_lang::prelude::*; -use common::admin::utils::assistant::only_authorized; #[derive(Accounts)] pub struct ProposeAuctionParameters<'info> { - #[account( - mut, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ MatchingEngineError::OwnerOrAssistantOnly, - )] - owner_or_assistant: Signer<'info>, + #[account(mut)] + payer: Signer<'info>, - #[account( - mut, - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - )] - custodian: Account<'info, Custodian>, + admin: AdminMutCustodian<'info>, #[account( init, - payer = owner_or_assistant, + payer = payer, space = 8 + Proposal::INIT_SPACE, seeds = [ Proposal::SEED_PREFIX, - custodian.next_proposal_id.to_be_bytes().as_ref() + admin.custodian.next_proposal_id.to_be_bytes().as_ref() ], bump, )] @@ -45,12 +31,12 @@ pub fn propose_auction_parameters( ) -> Result<()> { crate::utils::auction::require_valid_parameters(¶meters)?; - let id = ctx.accounts.custodian.auction_config_id + 1; + let id = ctx.accounts.admin.custodian.auction_config_id + 1; super::propose( super::Propose { - custodian: &mut ctx.accounts.custodian, + custodian: &mut ctx.accounts.admin.custodian, proposal: &mut ctx.accounts.proposal, - by: &ctx.accounts.owner_or_assistant, + by: &ctx.accounts.admin.owner_or_assistant, epoch_schedule: &ctx.accounts.epoch_schedule, }, ProposalAction::UpdateAuctionParameters { id, parameters }, diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs index e60714e7..0def9b78 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/cctp.rs @@ -1,39 +1,28 @@ use crate::{ - error::MatchingEngineError, - state::{Custodian, MessageProtocol, RouterEndpoint}, + state::{custodian::*, router_endpoint::*}, + utils::{self, admin::AddCctpRouterEndpointArgs}, }; use anchor_lang::prelude::*; -use common::{ - admin::utils::assistant::only_authorized, - wormhole_cctp_solana::{ - cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, - utils::ExternalAccount, - wormhole::SOLANA_CHAIN, - }, +use common::wormhole_cctp_solana::{ + cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, + utils::ExternalAccount, }; #[derive(Accounts)] -#[instruction(chain: u16, cctp_domain: u32)] +#[instruction(args: AddCctpRouterEndpointArgs)] pub struct AddCctpRouterEndpoint<'info> { #[account(mut)] - owner_or_assistant: Signer<'info>, + payer: Signer<'info>, - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ MatchingEngineError::OwnerOrAssistantOnly, - )] - custodian: Account<'info, Custodian>, + admin: AdminCustodian<'info>, #[account( - init_if_needed, - payer = owner_or_assistant, + init, + payer = payer, space = 8 + RouterEndpoint::INIT_SPACE, seeds = [ RouterEndpoint::SEED_PREFIX, - &chain.to_be_bytes() + &args.chain.to_be_bytes() ], bump, )] @@ -44,7 +33,7 @@ pub struct AddCctpRouterEndpoint<'info> { #[account( seeds = [ RemoteTokenMessenger::SEED_PREFIX, - cctp_domain.to_string().as_ref() + args.cctp_domain.to_string().as_ref() ], bump, seeds::program = token_messenger_minter_program::id(), @@ -54,51 +43,13 @@ pub struct AddCctpRouterEndpoint<'info> { system_program: Program<'info, System>, } -#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] -pub struct AddCctpRouterEndpointArgs { - pub chain: u16, - pub cctp_domain: u32, - pub address: [u8; 32], - pub mint_recipient: Option<[u8; 32]>, -} - pub fn add_cctp_router_endpoint( ctx: Context, args: AddCctpRouterEndpointArgs, ) -> Result<()> { - let AddCctpRouterEndpointArgs { - chain, - cctp_domain: domain, - address, - mint_recipient, - } = args; - - require!( - chain != 0 && chain != SOLANA_CHAIN, - MatchingEngineError::ChainNotAllowed - ); - - require!(address != [0; 32], MatchingEngineError::InvalidEndpoint); - - let mint_recipient = match mint_recipient { - Some(mint_recipient) => { - require!( - mint_recipient != [0; 32], - MatchingEngineError::InvalidMintRecipient - ); - mint_recipient - } - None => address, - }; - - ctx.accounts.router_endpoint.set_inner(RouterEndpoint { - bump: ctx.bumps.router_endpoint, - chain, - address, - mint_recipient, - protocol: MessageProtocol::Cctp { domain }, - }); - - // Done. - Ok(()) + utils::admin::handle_add_cctp_router_endpoint( + &mut ctx.accounts.router_endpoint, + args, + Some(ctx.bumps.router_endpoint), + ) } diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs index 63eb9f4e..5e484cf9 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/add/local.rs @@ -1,32 +1,21 @@ use crate::{ - error::MatchingEngineError, - state::{Custodian, RouterEndpoint}, + processor::admin::router_endpoint::local_token_router::*, + state::{custodian::*, RouterEndpoint}, + utils, }; use anchor_lang::prelude::*; -use anchor_spl::token; -use common::{ - admin::utils::assistant::only_authorized, wormhole_cctp_solana::wormhole::SOLANA_CHAIN, -}; +use common::wormhole_cctp_solana::wormhole::SOLANA_CHAIN; #[derive(Accounts)] pub struct AddLocalRouterEndpoint<'info> { - #[account( - mut, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ MatchingEngineError::OwnerOrAssistantOnly, - )] - owner_or_assistant: Signer<'info>, + #[account(mut)] + payer: Signer<'info>, - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - )] - custodian: Account<'info, Custodian>, + admin: AdminCustodian<'info>, #[account( - init_if_needed, - payer = owner_or_assistant, + init, + payer = payer, space = 8 + RouterEndpoint::INIT_SPACE, seeds = [ RouterEndpoint::SEED_PREFIX, @@ -36,41 +25,17 @@ pub struct AddLocalRouterEndpoint<'info> { )] router_endpoint: Account<'info, RouterEndpoint>, - /// CHECK: Must be an executable (the Token Router program), whose ID will be used to derive the - /// emitter (router endpoint) address. - #[account(executable)] - token_router_program: AccountInfo<'info>, - - /// CHECK: The Token Router program's emitter PDA (a.k.a. its custodian) will have account data. - #[account( - seeds = [b"emitter"], - bump, - seeds::program = token_router_program, - owner = token_router_program.key() @ MatchingEngineError::InvalidEndpoint, - constraint = !token_router_emitter.data_is_empty() @ MatchingEngineError::InvalidEndpoint, - )] - token_router_emitter: AccountInfo<'info>, - - #[account( - associated_token::mint = common::constants::USDC_MINT, - associated_token::authority = token_router_emitter, - )] - token_router_custody_token: Account<'info, token::TokenAccount>, + local: LocalTokenRouter<'info>, system_program: Program<'info, System>, } pub fn add_local_router_endpoint(ctx: Context) -> Result<()> { - ctx.accounts.router_endpoint.set_inner(RouterEndpoint { - bump: ctx.bumps.router_endpoint, - chain: SOLANA_CHAIN, - address: ctx.accounts.token_router_emitter.key().to_bytes(), - mint_recipient: ctx.accounts.token_router_custody_token.key().to_bytes(), - protocol: crate::state::MessageProtocol::Local { - program_id: ctx.accounts.token_router_program.key(), - }, - }); - - // Done. - Ok(()) + utils::admin::handle_add_local_router_endpoint( + &mut ctx.accounts.router_endpoint, + &ctx.accounts.local.token_router_program, + &ctx.accounts.local.token_router_emitter, + &ctx.accounts.local.token_router_mint_recipient, + Some(ctx.bumps.router_endpoint), + ) } diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/disable.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/disable.rs new file mode 100644 index 00000000..249c2874 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/disable.rs @@ -0,0 +1,19 @@ +use crate::state::{custodian::*, router_endpoint::*, MessageProtocol}; +use anchor_lang::prelude::*; + +#[derive(Accounts)] +pub struct DisableRouterEndpoint<'info> { + admin: OwnerCustodian<'info>, + + router_endpoint: ExistingMutRouterEndpoint<'info>, +} + +pub fn disable_router_endpoint(ctx: Context) -> Result<()> { + let endpoint = &mut ctx.accounts.router_endpoint.inner; + endpoint.protocol = MessageProtocol::None; + endpoint.address = Default::default(); + endpoint.mint_recipient = Default::default(); + + // Done. + Ok(()) +} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs index b9ad610f..7eb6dba7 100644 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/mod.rs @@ -1,5 +1,37 @@ mod add; pub use add::*; -mod remove; -pub use remove::*; +mod disable; +pub use disable::*; + +mod update; +pub use update::*; + +pub mod local_token_router { + use crate::error::MatchingEngineError; + use anchor_lang::prelude::*; + + #[derive(Accounts)] + pub struct LocalTokenRouter<'info> { + /// CHECK: Must be an executable (the Token Router program), whose ID will be used to derive the + /// emitter (router endpoint) address. + #[account(executable)] + pub token_router_program: AccountInfo<'info>, + + /// CHECK: The Token Router program's emitter PDA (a.k.a. its custodian) will have account data. + #[account( + seeds = [b"emitter"], + bump, + seeds::program = token_router_program, + owner = token_router_program.key() @ MatchingEngineError::InvalidEndpoint, + constraint = !token_router_emitter.data_is_empty() @ MatchingEngineError::InvalidEndpoint, + )] + pub token_router_emitter: AccountInfo<'info>, + + #[account( + associated_token::mint = common::constants::USDC_MINT, + associated_token::authority = token_router_emitter, + )] + pub token_router_mint_recipient: Account<'info, anchor_spl::token::TokenAccount>, + } +} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs deleted file mode 100644 index d36b1b30..00000000 --- a/solana/programs/matching-engine/src/processor/admin/router_endpoint/remove.rs +++ /dev/null @@ -1,39 +0,0 @@ -use crate::{ - error::MatchingEngineError, - state::{Custodian, RouterEndpoint}, -}; -use anchor_lang::prelude::*; -use common::admin::utils::assistant::only_authorized; - -#[derive(Accounts)] -pub struct RemoveRouterEndpoint<'info> { - #[account( - mut, - constraint = { - only_authorized(&custodian, &owner_or_assistant.key()) - } @ MatchingEngineError::OwnerOrAssistantOnly, - )] - owner_or_assistant: Signer<'info>, - - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - )] - custodian: Account<'info, Custodian>, - - #[account( - mut, - close = owner_or_assistant, - seeds = [ - RouterEndpoint::SEED_PREFIX, - &router_endpoint.chain.to_be_bytes() - ], - bump, - )] - router_endpoint: Account<'info, RouterEndpoint>, -} - -pub fn remove_router_endpoint(_ctx: Context) -> Result<()> { - // Done. - Ok(()) -} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/cctp.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/cctp.rs new file mode 100644 index 00000000..4b9450b5 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/cctp.rs @@ -0,0 +1,40 @@ +use crate::{ + state::{custodian::*, router_endpoint::*}, + utils::{self, admin::AddCctpRouterEndpointArgs}, +}; +use anchor_lang::prelude::*; +use common::wormhole_cctp_solana::{ + cctp::token_messenger_minter_program::{self, RemoteTokenMessenger}, + utils::ExternalAccount, +}; + +#[derive(Accounts)] +#[instruction(args: AddCctpRouterEndpointArgs)] +pub struct UpdateCctpRouterEndpoint<'info> { + admin: OwnerCustodian<'info>, + + router_endpoint: ExistingMutRouterEndpoint<'info>, + + /// CHECK: Seeds must be \["remote_token_messenger"\, remote_domain.to_string()] (CCTP Token + /// Messenger Minter program). + #[account( + seeds = [ + RemoteTokenMessenger::SEED_PREFIX, + args.cctp_domain.to_string().as_ref() + ], + bump, + seeds::program = token_messenger_minter_program::id(), + )] + remote_token_messenger: Account<'info, ExternalAccount>, +} + +pub fn update_cctp_router_endpoint( + ctx: Context, + args: AddCctpRouterEndpointArgs, +) -> Result<()> { + utils::admin::handle_add_cctp_router_endpoint( + &mut ctx.accounts.router_endpoint.inner, + args, + None, + ) +} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/local.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/local.rs new file mode 100644 index 00000000..e7fda5c4 --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/local.rs @@ -0,0 +1,37 @@ +use crate::{ + error::MatchingEngineError, + processor::admin::router_endpoint::local_token_router::*, + state::{custodian::*, router_endpoint::*}, + utils, +}; +use anchor_lang::prelude::*; +use common::wormhole_cctp_solana::wormhole::SOLANA_CHAIN; + +#[derive(Accounts)] +pub struct UpdateLocalRouterEndpoint<'info> { + admin: OwnerCustodian<'info>, + + #[account( + constraint = { + require_eq!( + router_endpoint.inner.chain, + SOLANA_CHAIN, + MatchingEngineError::InvalidChain + ); + true + } + )] + router_endpoint: ExistingMutRouterEndpoint<'info>, + + local: LocalTokenRouter<'info>, +} + +pub fn update_local_router_endpoint(ctx: Context) -> Result<()> { + utils::admin::handle_add_local_router_endpoint( + &mut ctx.accounts.router_endpoint.inner, + &ctx.accounts.local.token_router_program, + &ctx.accounts.local.token_router_emitter, + &ctx.accounts.local.token_router_mint_recipient, + None, + ) +} diff --git a/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/mod.rs b/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/mod.rs new file mode 100644 index 00000000..c5e1534f --- /dev/null +++ b/solana/programs/matching-engine/src/processor/admin/router_endpoint/update/mod.rs @@ -0,0 +1,5 @@ +mod cctp; +pub use cctp::*; + +mod local; +pub use local::*; diff --git a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs index f39ce9bb..0deeafa5 100644 --- a/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/execute_fast_order/local.rs @@ -1,6 +1,6 @@ use crate::{ error::MatchingEngineError, - state::{Auction, AuctionConfig, Custodian, PayerSequence, RouterEndpoint}, + state::{Auction, AuctionConfig, Custodian, MessageProtocol, PayerSequence, RouterEndpoint}, utils, }; use anchor_lang::prelude::*; @@ -65,6 +65,7 @@ pub struct ExecuteFastOrderLocal<'info> { SOLANA_CHAIN.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = to_router_endpoint.protocol != MessageProtocol::None @ MatchingEngineError::EndpointDisabled, )] to_router_endpoint: Account<'info, RouterEndpoint>, diff --git a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs index 0a60e33f..5d02b2b3 100644 --- a/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs +++ b/solana/programs/matching-engine/src/processor/auction/offer/place_initial.rs @@ -7,7 +7,10 @@ use common::{ use crate::{ error::MatchingEngineError, - state::{Auction, AuctionConfig, AuctionInfo, AuctionStatus, Custodian, RouterEndpoint}, + state::{ + Auction, AuctionConfig, AuctionInfo, AuctionStatus, Custodian, MessageProtocol, + RouterEndpoint, + }, }; #[derive(Accounts)] @@ -63,6 +66,7 @@ pub struct PlaceInitialOffer<'info> { from_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = from_router_endpoint.bump, + constraint = from_router_endpoint.protocol != MessageProtocol::None @ MatchingEngineError::EndpointDisabled, )] from_router_endpoint: Account<'info, RouterEndpoint>, @@ -72,6 +76,7 @@ pub struct PlaceInitialOffer<'info> { to_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = to_router_endpoint.protocol != MessageProtocol::None @ MatchingEngineError::EndpointDisabled, )] to_router_endpoint: Account<'info, RouterEndpoint>, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs index 6488493a..70fac603 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/active/local.rs @@ -1,7 +1,8 @@ use crate::{ error::MatchingEngineError, state::{ - Auction, AuctionConfig, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint, + Auction, AuctionConfig, Custodian, MessageProtocol, PayerSequence, PreparedOrderResponse, + RouterEndpoint, }, utils, }; @@ -85,6 +86,7 @@ pub struct SettleAuctionActiveLocal<'info> { SOLANA_CHAIN.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = to_router_endpoint.protocol != MessageProtocol::None @ MatchingEngineError::EndpointDisabled, )] to_router_endpoint: Box>, diff --git a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs index bc9cc712..8dd77f7b 100644 --- a/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs +++ b/solana/programs/matching-engine/src/processor/auction/settle/none/local.rs @@ -1,6 +1,8 @@ use crate::{ error::MatchingEngineError, - state::{Auction, Custodian, PayerSequence, PreparedOrderResponse, RouterEndpoint}, + state::{ + Auction, Custodian, MessageProtocol, PayerSequence, PreparedOrderResponse, RouterEndpoint, + }, }; use anchor_lang::prelude::*; use anchor_spl::token; @@ -98,6 +100,7 @@ pub struct SettleAuctionNoneLocal<'info> { from_router_endpoint.chain.to_be_bytes().as_ref(), ], bump = from_router_endpoint.bump, + constraint = from_router_endpoint.protocol != MessageProtocol::None @ MatchingEngineError::EndpointDisabled, constraint = { from_router_endpoint.chain != SOLANA_CHAIN } @ MatchingEngineError::InvalidChain @@ -111,6 +114,7 @@ pub struct SettleAuctionNoneLocal<'info> { SOLANA_CHAIN.to_be_bytes().as_ref(), ], bump = to_router_endpoint.bump, + constraint = to_router_endpoint.protocol != MessageProtocol::None @ MatchingEngineError::EndpointDisabled, )] to_router_endpoint: Box>, diff --git a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs index 4b67cd03..1c281ddf 100644 --- a/solana/programs/matching-engine/src/processor/complete_fast_fill.rs +++ b/solana/programs/matching-engine/src/processor/complete_fast_fill.rs @@ -7,7 +7,7 @@ use common::{ use crate::{ error::MatchingEngineError, - state::{Custodian, RedeemedFastFill, RouterEndpoint}, + state::{router_endpoint::*, Custodian, LiveRouterEndpoint, RedeemedFastFill}, }; /// Accounts required for [complete_fast_fill]. @@ -16,13 +16,6 @@ pub struct CompleteFastFill<'info> { #[account(mut)] payer: Signer<'info>, - /// This program's Wormhole (Core Bridge) emitter authority. - /// - /// CHECK: Seeds must be \["emitter"\]. - #[account( - seeds = [Custodian::SEED_PREFIX], - bump = Custodian::BUMP, - )] custodian: Account<'info, Custodian>, /// CHECK: Must be owned by the Wormhole Core Bridge program. This account will be read via @@ -53,13 +46,16 @@ pub struct CompleteFastFill<'info> { token_router_custody_token: Account<'info, token::TokenAccount>, #[account( - seeds = [ - RouterEndpoint::SEED_PREFIX, - SOLANA_CHAIN.to_be_bytes().as_ref() - ], - bump = router_endpoint.bump, + constraint = { + require_eq!( + router_endpoint.chain, + SOLANA_CHAIN, + MatchingEngineError::InvalidEndpoint + ); + true + } )] - router_endpoint: Account<'info, RouterEndpoint>, + router_endpoint: LiveRouterEndpoint<'info>, /// Mint recipient token account, which is encoded as the mint recipient in the CCTP message. /// The CCTP Token Messenger Minter program will transfer the amount encoded in the CCTP message diff --git a/solana/programs/matching-engine/src/state/custodian.rs b/solana/programs/matching-engine/src/state/custodian.rs index fc0743e4..323b8fb1 100644 --- a/solana/programs/matching-engine/src/state/custodian.rs +++ b/solana/programs/matching-engine/src/state/custodian.rs @@ -1,5 +1,8 @@ use anchor_lang::prelude::*; +use crate::error::MatchingEngineError; +use common::admin; + #[account] #[derive(Debug, InitSpace)] pub struct Custodian { @@ -24,7 +27,7 @@ impl Custodian { pub const SIGNER_SEEDS: &'static [&'static [u8]] = &[Self::SEED_PREFIX, &[Self::BUMP]]; } -impl common::admin::Ownable for Custodian { +impl admin::Ownable for Custodian { fn owner(&self) -> &Pubkey { &self.owner } @@ -34,7 +37,7 @@ impl common::admin::Ownable for Custodian { } } -impl common::admin::PendingOwner for Custodian { +impl admin::PendingOwner for Custodian { fn pending_owner(&self) -> &Option { &self.pending_owner } @@ -44,7 +47,7 @@ impl common::admin::PendingOwner for Custodian { } } -impl common::admin::OwnerAssistant for Custodian { +impl admin::OwnerAssistant for Custodian { fn owner_assistant(&self) -> &Pubkey { &self.owner_assistant } @@ -54,6 +57,50 @@ impl common::admin::OwnerAssistant for Custodian { } } +#[derive(Accounts)] +pub struct OwnerCustodian<'info> { + pub owner: Signer<'info>, + + #[account(has_one = owner @ MatchingEngineError::OwnerOnly)] + pub custodian: Account<'info, Custodian>, +} + +#[derive(Accounts)] +pub struct OwnerMutCustodian<'info> { + pub owner: Signer<'info>, + + #[account( + mut, + has_one = owner @ MatchingEngineError::OwnerOnly, + )] + pub custodian: Account<'info, Custodian>, +} + +#[derive(Accounts)] +pub struct AdminCustodian<'info> { + #[account( + constraint = { + admin::utils::assistant::only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, + )] + pub owner_or_assistant: Signer<'info>, + + pub custodian: Account<'info, Custodian>, +} + +#[derive(Accounts)] +pub struct AdminMutCustodian<'info> { + #[account( + constraint = { + admin::utils::assistant::only_authorized(&custodian, &owner_or_assistant.key()) + } @ MatchingEngineError::OwnerOrAssistantOnly, + )] + pub owner_or_assistant: Signer<'info>, + + #[account(mut)] + pub custodian: Account<'info, Custodian>, +} + #[cfg(test)] mod test { use solana_program::pubkey::Pubkey; diff --git a/solana/programs/matching-engine/src/state/mod.rs b/solana/programs/matching-engine/src/state/mod.rs index f5bd65d8..4027e94d 100644 --- a/solana/programs/matching-engine/src/state/mod.rs +++ b/solana/programs/matching-engine/src/state/mod.rs @@ -4,7 +4,7 @@ pub use auction_config::*; mod auction; pub use auction::*; -mod custodian; +pub(crate) mod custodian; pub use custodian::*; mod payer_sequence; @@ -19,5 +19,5 @@ pub use proposal::*; mod redeemed_fast_fill; pub use redeemed_fast_fill::*; -mod router_endpoint; +pub(crate) mod router_endpoint; pub use router_endpoint::*; diff --git a/solana/programs/matching-engine/src/state/router_endpoint.rs b/solana/programs/matching-engine/src/state/router_endpoint.rs index c31bfef3..96ef3e37 100644 --- a/solana/programs/matching-engine/src/state/router_endpoint.rs +++ b/solana/programs/matching-engine/src/state/router_endpoint.rs @@ -1,7 +1,11 @@ +use std::ops::Deref; + +use crate::error::MatchingEngineError; use anchor_lang::prelude::*; #[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone, PartialEq, Eq, InitSpace)] pub enum MessageProtocol { + None, Local { program_id: Pubkey, }, @@ -9,7 +13,6 @@ pub enum MessageProtocol { /// CCTP domain, which is how CCTP registers identifies foreign networks. domain: u32, }, - Canonical, } #[account] @@ -35,3 +38,47 @@ pub struct RouterEndpoint { impl RouterEndpoint { pub const SEED_PREFIX: &'static [u8] = b"endpoint"; } + +#[derive(Accounts)] +pub(crate) struct ExistingMutRouterEndpoint<'info> { + #[account( + mut, + seeds = [ + RouterEndpoint::SEED_PREFIX, + &inner.chain.to_be_bytes() + ], + bump = inner.bump, + )] + pub inner: Account<'info, RouterEndpoint>, +} + +#[derive(Accounts)] +pub struct LiveRouterEndpoint<'info> { + #[account( + seeds = [ + RouterEndpoint::SEED_PREFIX, + &inner.chain.to_be_bytes() + ], + bump = inner.bump, + constraint = { + inner.protocol != MessageProtocol::None + } @ MatchingEngineError::EndpointDisabled, + )] + pub inner: Account<'info, RouterEndpoint>, +} + +impl<'info> Deref for LiveRouterEndpoint<'info> { + type Target = RouterEndpoint; + + fn deref(&self) -> &Self::Target { + &self.inner + } +} + +#[derive(Accounts)] +pub struct LiveRouterEndpointPair<'info> { + pub from: LiveRouterEndpoint<'info>, + + #[account(constraint = from.chain != to.chain @ MatchingEngineError::SameEndpoint)] + pub to: LiveRouterEndpoint<'info>, +} diff --git a/solana/programs/matching-engine/src/utils/admin.rs b/solana/programs/matching-engine/src/utils/admin.rs new file mode 100644 index 00000000..5eb7893a --- /dev/null +++ b/solana/programs/matching-engine/src/utils/admin.rs @@ -0,0 +1,81 @@ +use crate::{ + error::MatchingEngineError, + state::{router_endpoint::*, MessageProtocol}, +}; +use anchor_lang::prelude::*; +use anchor_spl::token; +use common::wormhole_cctp_solana::wormhole::SOLANA_CHAIN; + +#[derive(Debug, AnchorSerialize, AnchorDeserialize, Clone)] +pub struct AddCctpRouterEndpointArgs { + pub chain: u16, + pub cctp_domain: u32, + pub address: [u8; 32], + pub mint_recipient: Option<[u8; 32]>, +} + +pub(crate) fn handle_add_cctp_router_endpoint( + router_endpoint: &mut Account, + args: AddCctpRouterEndpointArgs, + router_endpoint_bump: Option, +) -> Result<()> { + let bump = router_endpoint_bump.unwrap_or(router_endpoint.bump); + + let AddCctpRouterEndpointArgs { + chain, + cctp_domain: domain, + address, + mint_recipient, + } = args; + + require!( + chain != 0 && chain != SOLANA_CHAIN, + MatchingEngineError::ChainNotAllowed + ); + + require!(address != [0; 32], MatchingEngineError::InvalidEndpoint); + + let mint_recipient = match mint_recipient { + Some(mint_recipient) => { + require!( + mint_recipient != [0; 32], + MatchingEngineError::InvalidMintRecipient + ); + mint_recipient + } + None => address, + }; + + router_endpoint.set_inner(RouterEndpoint { + bump, + chain, + address, + mint_recipient, + protocol: MessageProtocol::Cctp { domain }, + }); + + // Done. + Ok(()) +} + +pub(crate) fn handle_add_local_router_endpoint( + router_endpoint: &mut Account, + token_router_program: &AccountInfo, + token_router_emitter: &AccountInfo, + token_router_custody_token: &Account, + router_endpoint_bump: Option, +) -> Result<()> { + let bump = router_endpoint_bump.unwrap_or(router_endpoint.bump); + + router_endpoint.set_inner(RouterEndpoint { + bump, + chain: SOLANA_CHAIN, + address: token_router_emitter.key().to_bytes(), + mint_recipient: token_router_custody_token.key().to_bytes(), + protocol: crate::state::MessageProtocol::Local { + program_id: token_router_program.key(), + }, + }); + + Ok(()) +} diff --git a/solana/programs/matching-engine/src/utils/mod.rs b/solana/programs/matching-engine/src/utils/mod.rs index 8fee597c..7ea00409 100644 --- a/solana/programs/matching-engine/src/utils/mod.rs +++ b/solana/programs/matching-engine/src/utils/mod.rs @@ -1,3 +1,5 @@ +pub mod admin; + pub mod auction; use crate::{ diff --git a/solana/programs/token-router/src/error.rs b/solana/programs/token-router/src/error.rs index a031ee2f..04b38ca7 100644 --- a/solana/programs/token-router/src/error.rs +++ b/solana/programs/token-router/src/error.rs @@ -46,6 +46,9 @@ pub enum TokenRouterError { #[msg("NotPendingOwner")] NotPendingOwner = 0x2a, + #[msg("EndpointDisabled")] + EndpointDisabled = 0x30, + #[msg("ChainNotAllowed")] ChainNotAllowed = 0x40, diff --git a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs index ce1a3046..efdc1569 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/cctp.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/cctp.rs @@ -14,6 +14,7 @@ use common::{ wormhole::VaaAccount, }, }; +use matching_engine::state::MessageProtocol; /// Accounts required for [redeem_cctp_fill]. #[derive(Accounts)] @@ -87,6 +88,7 @@ pub struct RedeemCctpFill<'info> { ], bump = router_endpoint.bump, seeds::program = matching_engine::id(), + constraint = router_endpoint.protocol != MessageProtocol::None @ TokenRouterError::EndpointDisabled, )] router_endpoint: Box>, diff --git a/solana/programs/token-router/src/processor/redeem_fill/fast.rs b/solana/programs/token-router/src/processor/redeem_fill/fast.rs index 512c5627..3a340153 100644 --- a/solana/programs/token-router/src/processor/redeem_fill/fast.rs +++ b/solana/programs/token-router/src/processor/redeem_fill/fast.rs @@ -8,6 +8,7 @@ use common::{ messages::raw::{LiquidityLayerMessage, MessageToVec}, wormhole_cctp_solana::wormhole::{core_bridge_program, VaaAccount}, }; +use matching_engine::cpi::accounts::LiveRouterEndpoint; /// Accounts required for [redeem_fast_fill]. #[derive(Accounts)] @@ -107,10 +108,12 @@ fn handle_redeem_fast_fill(ctx: Context) -> Result<()> { .to_account_info(), token_router_emitter: ctx.accounts.custodian.to_account_info(), token_router_custody_token: ctx.accounts.prepared_custody_token.to_account_info(), - router_endpoint: ctx - .accounts - .matching_engine_router_endpoint - .to_account_info(), + router_endpoint: LiveRouterEndpoint { + inner: ctx + .accounts + .matching_engine_router_endpoint + .to_account_info(), + }, cctp_mint_recipient: ctx .accounts .matching_engine_cctp_mint_recipient diff --git a/solana/target/idl/matching_engine.json b/solana/target/idl/matching_engine.json index 2db23774..e023db0b 100644 --- a/solana/target/idl/matching_engine.json +++ b/solana/target/idl/matching_engine.json @@ -13,11 +13,7 @@ { "name": "custodian", "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] + "isSigner": false }, { "name": "vaa", @@ -44,8 +40,13 @@ }, { "name": "routerEndpoint", - "isMut": false, - "isSigner": false + "accounts": [ + { + "name": "inner", + "isMut": false, + "isSigner": false + } + ] }, { "name": "cctpMintRecipient", @@ -1049,14 +1050,24 @@ "name": "addCctpRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", @@ -1090,14 +1101,24 @@ "name": "addLocalRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", @@ -1105,48 +1126,163 @@ "isSigner": false }, { - "name": "tokenRouterProgram", - "isMut": false, - "isSigner": false, - "docs": [ - "emitter (router endpoint) address." + "name": "local", + "accounts": [ + { + "name": "tokenRouterProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "emitter (router endpoint) address." + ] + }, + { + "name": "tokenRouterEmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenRouterMintRecipient", + "isMut": false, + "isSigner": false + } ] }, { - "name": "tokenRouterEmitter", + "name": "systemProgram", "isMut": false, "isSigner": false - }, + } + ], + "args": [] + }, + { + "name": "disableRouterEndpoint", + "accounts": [ { - "name": "tokenRouterCustodyToken", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { - "name": "systemProgram", - "isMut": false, - "isSigner": false + "name": "routerEndpoint", + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] } ], "args": [] }, { - "name": "removeRouterEndpoint", + "name": "updateCctpRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", - "isMut": true, - "isSigner": true + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { - "name": "custodian", + "name": "routerEndpoint", + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] + }, + { + "name": "remoteTokenMessenger", "isMut": false, - "isSigner": false + "isSigner": false, + "docs": [ + "Messenger Minter program)." + ] + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "AddCctpRouterEndpointArgs" + } + } + ] + }, + { + "name": "updateLocalRouterEndpoint", + "accounts": [ + { + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", - "isMut": true, - "isSigner": false + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] + }, + { + "name": "local", + "accounts": [ + { + "name": "tokenRouterProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "emitter (router endpoint) address." + ] + }, + { + "name": "tokenRouterEmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenRouterMintRecipient", + "isMut": false, + "isSigner": false + } + ] } ], "args": [] @@ -1155,16 +1291,18 @@ "name": "submitOwnershipTransferRequest", "accounts": [ { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false, - "docs": [ - "Custodian, which can only be modified by the configured owner." + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } ] }, { @@ -1203,16 +1341,18 @@ "name": "cancelOwnershipTransferRequest", "accounts": [ { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false, - "docs": [ - "Custodian, which can only be modified by the configured owner." + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } ] } ], @@ -1222,14 +1362,24 @@ "name": "proposeAuctionParameters", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": true, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } + ] }, { "name": "proposal", @@ -1774,14 +1924,19 @@ "name": "closeProposal", "accounts": [ { - "name": "owner", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "proposedBy", @@ -2069,42 +2224,6 @@ } ], "types": [ - { - "name": "AddCctpRouterEndpointArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "chain", - "type": "u16" - }, - { - "name": "cctpDomain", - "type": "u32" - }, - { - "name": "address", - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "mintRecipient", - "type": { - "option": { - "array": [ - "u8", - 32 - ] - } - } - } - ] - } - }, { "name": "CctpMessageArgs", "type": { @@ -2233,6 +2352,42 @@ ] } }, + { + "name": "AddCctpRouterEndpointArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "chain", + "type": "u16" + }, + { + "name": "cctpDomain", + "type": "u32" + }, + { + "name": "address", + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "mintRecipient", + "type": { + "option": { + "array": [ + "u8", + 32 + ] + } + } + } + ] + } + }, { "name": "AuctionStatus", "type": { @@ -2302,6 +2457,9 @@ "type": { "kind": "enum", "variants": [ + { + "name": "None" + }, { "name": "Local", "fields": [ @@ -2322,73 +2480,11 @@ "type": "u32" } ] - }, - { - "name": "Canonical" } ] } } ], - "events": [ - { - "name": "AuctionUpdate", - "fields": [ - { - "name": "auction", - "type": "publicKey", - "index": false - }, - { - "name": "vaa", - "type": { - "option": "publicKey" - }, - "index": false - }, - { - "name": "endSlot", - "type": "u64", - "index": false - }, - { - "name": "offerToken", - "type": "publicKey", - "index": false - }, - { - "name": "amountIn", - "type": "u64", - "index": false - }, - { - "name": "totalDeposit", - "type": "u64", - "index": false - }, - { - "name": "maxOfferPriceAllowed", - "type": "u64", - "index": false - } - ] - }, - { - "name": "OrderExecuted", - "fields": [ - { - "name": "auction", - "type": "publicKey", - "index": false - }, - { - "name": "vaa", - "type": "publicKey", - "index": false - } - ] - } - ], "errors": [ { "code": 6002, @@ -2415,6 +2511,16 @@ "name": "UpgradeManagerRequired", "msg": "UpgradeManagerRequired" }, + { + "code": 6032, + "name": "SameEndpoint", + "msg": "SameEndpoint" + }, + { + "code": 6034, + "name": "InvalidEndpoint", + "msg": "InvalidEndpoint" + }, { "code": 6256, "name": "AssistantZeroPubkey", @@ -2482,169 +2588,169 @@ }, { "code": 6529, - "name": "InvalidEndpoint", - "msg": "InvalidEndpoint" - }, - { - "code": 6530, "name": "InvalidMintRecipient", "msg": "InvalidMintRecipient" }, { - "code": 6531, + "code": 6530, "name": "ErrInvalidSourceRouter", "msg": "ErrInvalidSourceRouter" }, { - "code": 6532, + "code": 6531, "name": "ErrInvalidTargetRouter", "msg": "ErrInvalidTargetRouter" }, { - "code": 6533, + "code": 6532, "name": "TokenRouterProgramIdRequired", "msg": "TokenRouterProgramIdRequired" }, { - "code": 6534, + "code": 6533, "name": "InvalidAuctionDuration", "msg": "InvalidAuctionDuration" }, { - "code": 6535, + "code": 6534, "name": "InvalidAuctionGracePeriod", "msg": "InvalidAuctionGracePeriod" }, { - "code": 6536, + "code": 6535, "name": "UserPenaltyTooLarge", "msg": "UserPenaltyTooLarge" }, { - "code": 6537, + "code": 6536, "name": "InitialPenaltyTooLarge", "msg": "InitialPenaltyTooLarge" }, { - "code": 6538, + "code": 6537, "name": "MinOfferDeltaTooLarge", "msg": "MinOfferDeltaTooLarge" }, { - "code": 6539, + "code": 6538, "name": "InvalidVaa", "msg": "InvalidVaa" }, { - "code": 6540, + "code": 6539, "name": "NotFastMarketOrder", "msg": "NotFastMarketOrder" }, { - "code": 6541, + "code": 6540, "name": "FastMarketOrderExpired", "msg": "FastMarketOrderExpired" }, { - "code": 6542, + "code": 6541, "name": "OfferPriceTooHigh", "msg": "OfferPriceTooHigh" }, { - "code": 6543, + "code": 6542, "name": "AuctionAlreadyStarted", "msg": "AuctionAlreadyStarted" }, { - "code": 6544, + "code": 6543, "name": "InvalidEmitterForFastFill", "msg": "InvalidEmitterForFastFill" }, { - "code": 6545, + "code": 6544, "name": "InvalidDeposit", "msg": "InvalidDeposit" }, { - "code": 6546, + "code": 6545, "name": "InvalidDepositMessage", "msg": "InvalidDepositMessage" }, { - "code": 6547, + "code": 6546, "name": "InvalidPayloadId", "msg": "InvalidPayloadId" }, { - "code": 6548, + "code": 6547, "name": "InvalidDepositPayloadId", "msg": "InvalidDepositPayloadId" }, { - "code": 6549, + "code": 6548, "name": "AuctionNotActive", "msg": "AuctionNotActive" }, { - "code": 6550, + "code": 6549, "name": "AuctionPeriodExpired", "msg": "AuctionPeriodExpired" }, { - "code": 6551, + "code": 6550, "name": "AuctionPeriodNotExpired", "msg": "AuctionPeriodNotExpired" }, { - "code": 6552, + "code": 6551, "name": "OfferPriceNotImproved", "msg": "OfferPriceNotImproved" }, { - "code": 6553, + "code": 6552, "name": "BestOfferTokenNotPassedIn", "msg": "BestOfferTokenNotPassedIn" }, { - "code": 6554, + "code": 6553, "name": "PenaltyCalculationFailed", "msg": "PenaltyCalculationFailed" }, { - "code": 6555, + "code": 6554, "name": "VaaMismatch", "msg": "VaaMismatch" }, { - "code": 6556, + "code": 6555, "name": "MismatchedVaaHash", "msg": "MismatchedVaaHash" }, { - "code": 6557, + "code": 6556, "name": "BestOfferTokenMismatch", "msg": "BestOfferTokenMismatch" }, { - "code": 6558, + "code": 6557, "name": "InitialOfferTokenMismatch", "msg": "InitialOfferTokenMismatch" }, { - "code": 6559, + "code": 6558, "name": "FeeRecipientTokenMismatch", "msg": "FeeRecipientTokenMismatch" }, { - "code": 6560, + "code": 6559, "name": "AuctionNotCompleted", "msg": "AuctionNotCompleted" }, { - "code": 6561, + "code": 6560, "name": "AuctionConfigMismatch", "msg": "AuctionConfigMismatch" }, + { + "code": 6561, + "name": "EndpointDisabled", + "msg": "EndpointDisabled" + }, { "code": 6562, "name": "InvalidCctpEndpoint", diff --git a/solana/target/idl/token_router.json b/solana/target/idl/token_router.json index 02161e77..1e35b545 100644 --- a/solana/target/idl/token_router.json +++ b/solana/target/idl/token_router.json @@ -1270,6 +1270,11 @@ "name": "NotPendingOwner", "msg": "NotPendingOwner" }, + { + "code": 6048, + "name": "EndpointDisabled", + "msg": "EndpointDisabled" + }, { "code": 6064, "name": "ChainNotAllowed", diff --git a/solana/target/types/matching_engine.ts b/solana/target/types/matching_engine.ts index 5e31ec93..30eb49fc 100644 --- a/solana/target/types/matching_engine.ts +++ b/solana/target/types/matching_engine.ts @@ -13,11 +13,7 @@ export type MatchingEngine = { { "name": "custodian", "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] + "isSigner": false }, { "name": "vaa", @@ -44,8 +40,13 @@ export type MatchingEngine = { }, { "name": "routerEndpoint", - "isMut": false, - "isSigner": false + "accounts": [ + { + "name": "inner", + "isMut": false, + "isSigner": false + } + ] }, { "name": "cctpMintRecipient", @@ -1049,14 +1050,24 @@ export type MatchingEngine = { "name": "addCctpRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", @@ -1090,14 +1101,24 @@ export type MatchingEngine = { "name": "addLocalRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", @@ -1105,48 +1126,163 @@ export type MatchingEngine = { "isSigner": false }, { - "name": "tokenRouterProgram", - "isMut": false, - "isSigner": false, - "docs": [ - "emitter (router endpoint) address." + "name": "local", + "accounts": [ + { + "name": "tokenRouterProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "emitter (router endpoint) address." + ] + }, + { + "name": "tokenRouterEmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenRouterMintRecipient", + "isMut": false, + "isSigner": false + } ] }, { - "name": "tokenRouterEmitter", + "name": "systemProgram", "isMut": false, "isSigner": false - }, + } + ], + "args": [] + }, + { + "name": "disableRouterEndpoint", + "accounts": [ { - "name": "tokenRouterCustodyToken", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { - "name": "systemProgram", - "isMut": false, - "isSigner": false + "name": "routerEndpoint", + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] } ], "args": [] }, { - "name": "removeRouterEndpoint", + "name": "updateCctpRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", - "isMut": true, - "isSigner": true + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { - "name": "custodian", + "name": "routerEndpoint", + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] + }, + { + "name": "remoteTokenMessenger", "isMut": false, - "isSigner": false + "isSigner": false, + "docs": [ + "Messenger Minter program)." + ] + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "AddCctpRouterEndpointArgs" + } + } + ] + }, + { + "name": "updateLocalRouterEndpoint", + "accounts": [ + { + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", - "isMut": true, - "isSigner": false + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] + }, + { + "name": "local", + "accounts": [ + { + "name": "tokenRouterProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "emitter (router endpoint) address." + ] + }, + { + "name": "tokenRouterEmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenRouterMintRecipient", + "isMut": false, + "isSigner": false + } + ] } ], "args": [] @@ -1155,16 +1291,18 @@ export type MatchingEngine = { "name": "submitOwnershipTransferRequest", "accounts": [ { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false, - "docs": [ - "Custodian, which can only be modified by the configured owner." + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } ] }, { @@ -1203,16 +1341,18 @@ export type MatchingEngine = { "name": "cancelOwnershipTransferRequest", "accounts": [ { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false, - "docs": [ - "Custodian, which can only be modified by the configured owner." + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } ] } ], @@ -1222,14 +1362,24 @@ export type MatchingEngine = { "name": "proposeAuctionParameters", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": true, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } + ] }, { "name": "proposal", @@ -1774,14 +1924,19 @@ export type MatchingEngine = { "name": "closeProposal", "accounts": [ { - "name": "owner", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "proposedBy", @@ -2069,42 +2224,6 @@ export type MatchingEngine = { } ], "types": [ - { - "name": "AddCctpRouterEndpointArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "chain", - "type": "u16" - }, - { - "name": "cctpDomain", - "type": "u32" - }, - { - "name": "address", - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "mintRecipient", - "type": { - "option": { - "array": [ - "u8", - 32 - ] - } - } - } - ] - } - }, { "name": "CctpMessageArgs", "type": { @@ -2233,6 +2352,42 @@ export type MatchingEngine = { ] } }, + { + "name": "AddCctpRouterEndpointArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "chain", + "type": "u16" + }, + { + "name": "cctpDomain", + "type": "u32" + }, + { + "name": "address", + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "mintRecipient", + "type": { + "option": { + "array": [ + "u8", + 32 + ] + } + } + } + ] + } + }, { "name": "AuctionStatus", "type": { @@ -2302,6 +2457,9 @@ export type MatchingEngine = { "type": { "kind": "enum", "variants": [ + { + "name": "None" + }, { "name": "Local", "fields": [ @@ -2322,73 +2480,11 @@ export type MatchingEngine = { "type": "u32" } ] - }, - { - "name": "Canonical" } ] } } ], - "events": [ - { - "name": "AuctionUpdate", - "fields": [ - { - "name": "auction", - "type": "publicKey", - "index": false - }, - { - "name": "vaa", - "type": { - "option": "publicKey" - }, - "index": false - }, - { - "name": "endSlot", - "type": "u64", - "index": false - }, - { - "name": "offerToken", - "type": "publicKey", - "index": false - }, - { - "name": "amountIn", - "type": "u64", - "index": false - }, - { - "name": "totalDeposit", - "type": "u64", - "index": false - }, - { - "name": "maxOfferPriceAllowed", - "type": "u64", - "index": false - } - ] - }, - { - "name": "OrderExecuted", - "fields": [ - { - "name": "auction", - "type": "publicKey", - "index": false - }, - { - "name": "vaa", - "type": "publicKey", - "index": false - } - ] - } - ], "errors": [ { "code": 6002, @@ -2415,6 +2511,16 @@ export type MatchingEngine = { "name": "UpgradeManagerRequired", "msg": "UpgradeManagerRequired" }, + { + "code": 6032, + "name": "SameEndpoint", + "msg": "SameEndpoint" + }, + { + "code": 6034, + "name": "InvalidEndpoint", + "msg": "InvalidEndpoint" + }, { "code": 6256, "name": "AssistantZeroPubkey", @@ -2482,169 +2588,169 @@ export type MatchingEngine = { }, { "code": 6529, - "name": "InvalidEndpoint", - "msg": "InvalidEndpoint" - }, - { - "code": 6530, "name": "InvalidMintRecipient", "msg": "InvalidMintRecipient" }, { - "code": 6531, + "code": 6530, "name": "ErrInvalidSourceRouter", "msg": "ErrInvalidSourceRouter" }, { - "code": 6532, + "code": 6531, "name": "ErrInvalidTargetRouter", "msg": "ErrInvalidTargetRouter" }, { - "code": 6533, + "code": 6532, "name": "TokenRouterProgramIdRequired", "msg": "TokenRouterProgramIdRequired" }, { - "code": 6534, + "code": 6533, "name": "InvalidAuctionDuration", "msg": "InvalidAuctionDuration" }, { - "code": 6535, + "code": 6534, "name": "InvalidAuctionGracePeriod", "msg": "InvalidAuctionGracePeriod" }, { - "code": 6536, + "code": 6535, "name": "UserPenaltyTooLarge", "msg": "UserPenaltyTooLarge" }, { - "code": 6537, + "code": 6536, "name": "InitialPenaltyTooLarge", "msg": "InitialPenaltyTooLarge" }, { - "code": 6538, + "code": 6537, "name": "MinOfferDeltaTooLarge", "msg": "MinOfferDeltaTooLarge" }, { - "code": 6539, + "code": 6538, "name": "InvalidVaa", "msg": "InvalidVaa" }, { - "code": 6540, + "code": 6539, "name": "NotFastMarketOrder", "msg": "NotFastMarketOrder" }, { - "code": 6541, + "code": 6540, "name": "FastMarketOrderExpired", "msg": "FastMarketOrderExpired" }, { - "code": 6542, + "code": 6541, "name": "OfferPriceTooHigh", "msg": "OfferPriceTooHigh" }, { - "code": 6543, + "code": 6542, "name": "AuctionAlreadyStarted", "msg": "AuctionAlreadyStarted" }, { - "code": 6544, + "code": 6543, "name": "InvalidEmitterForFastFill", "msg": "InvalidEmitterForFastFill" }, { - "code": 6545, + "code": 6544, "name": "InvalidDeposit", "msg": "InvalidDeposit" }, { - "code": 6546, + "code": 6545, "name": "InvalidDepositMessage", "msg": "InvalidDepositMessage" }, { - "code": 6547, + "code": 6546, "name": "InvalidPayloadId", "msg": "InvalidPayloadId" }, { - "code": 6548, + "code": 6547, "name": "InvalidDepositPayloadId", "msg": "InvalidDepositPayloadId" }, { - "code": 6549, + "code": 6548, "name": "AuctionNotActive", "msg": "AuctionNotActive" }, { - "code": 6550, + "code": 6549, "name": "AuctionPeriodExpired", "msg": "AuctionPeriodExpired" }, { - "code": 6551, + "code": 6550, "name": "AuctionPeriodNotExpired", "msg": "AuctionPeriodNotExpired" }, { - "code": 6552, + "code": 6551, "name": "OfferPriceNotImproved", "msg": "OfferPriceNotImproved" }, { - "code": 6553, + "code": 6552, "name": "BestOfferTokenNotPassedIn", "msg": "BestOfferTokenNotPassedIn" }, { - "code": 6554, + "code": 6553, "name": "PenaltyCalculationFailed", "msg": "PenaltyCalculationFailed" }, { - "code": 6555, + "code": 6554, "name": "VaaMismatch", "msg": "VaaMismatch" }, { - "code": 6556, + "code": 6555, "name": "MismatchedVaaHash", "msg": "MismatchedVaaHash" }, { - "code": 6557, + "code": 6556, "name": "BestOfferTokenMismatch", "msg": "BestOfferTokenMismatch" }, { - "code": 6558, + "code": 6557, "name": "InitialOfferTokenMismatch", "msg": "InitialOfferTokenMismatch" }, { - "code": 6559, + "code": 6558, "name": "FeeRecipientTokenMismatch", "msg": "FeeRecipientTokenMismatch" }, { - "code": 6560, + "code": 6559, "name": "AuctionNotCompleted", "msg": "AuctionNotCompleted" }, { - "code": 6561, + "code": 6560, "name": "AuctionConfigMismatch", "msg": "AuctionConfigMismatch" }, + { + "code": 6561, + "name": "EndpointDisabled", + "msg": "EndpointDisabled" + }, { "code": 6562, "name": "InvalidCctpEndpoint", @@ -2688,11 +2794,7 @@ export const IDL: MatchingEngine = { { "name": "custodian", "isMut": false, - "isSigner": false, - "docs": [ - "This program's Wormhole (Core Bridge) emitter authority.", - "" - ] + "isSigner": false }, { "name": "vaa", @@ -2719,8 +2821,13 @@ export const IDL: MatchingEngine = { }, { "name": "routerEndpoint", - "isMut": false, - "isSigner": false + "accounts": [ + { + "name": "inner", + "isMut": false, + "isSigner": false + } + ] }, { "name": "cctpMintRecipient", @@ -3724,14 +3831,24 @@ export const IDL: MatchingEngine = { "name": "addCctpRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", @@ -3765,14 +3882,24 @@ export const IDL: MatchingEngine = { "name": "addLocalRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", @@ -3780,48 +3907,163 @@ export const IDL: MatchingEngine = { "isSigner": false }, { - "name": "tokenRouterProgram", - "isMut": false, - "isSigner": false, - "docs": [ - "emitter (router endpoint) address." + "name": "local", + "accounts": [ + { + "name": "tokenRouterProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "emitter (router endpoint) address." + ] + }, + { + "name": "tokenRouterEmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenRouterMintRecipient", + "isMut": false, + "isSigner": false + } ] }, { - "name": "tokenRouterEmitter", + "name": "systemProgram", "isMut": false, "isSigner": false - }, + } + ], + "args": [] + }, + { + "name": "disableRouterEndpoint", + "accounts": [ { - "name": "tokenRouterCustodyToken", - "isMut": false, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { - "name": "systemProgram", - "isMut": false, - "isSigner": false + "name": "routerEndpoint", + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] } ], "args": [] }, { - "name": "removeRouterEndpoint", + "name": "updateCctpRouterEndpoint", "accounts": [ { - "name": "ownerOrAssistant", - "isMut": true, - "isSigner": true + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { - "name": "custodian", + "name": "routerEndpoint", + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] + }, + { + "name": "remoteTokenMessenger", "isMut": false, - "isSigner": false + "isSigner": false, + "docs": [ + "Messenger Minter program)." + ] + } + ], + "args": [ + { + "name": "args", + "type": { + "defined": "AddCctpRouterEndpointArgs" + } + } + ] + }, + { + "name": "updateLocalRouterEndpoint", + "accounts": [ + { + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "routerEndpoint", - "isMut": true, - "isSigner": false + "accounts": [ + { + "name": "inner", + "isMut": true, + "isSigner": false + } + ] + }, + { + "name": "local", + "accounts": [ + { + "name": "tokenRouterProgram", + "isMut": false, + "isSigner": false, + "docs": [ + "emitter (router endpoint) address." + ] + }, + { + "name": "tokenRouterEmitter", + "isMut": false, + "isSigner": false + }, + { + "name": "tokenRouterMintRecipient", + "isMut": false, + "isSigner": false + } + ] } ], "args": [] @@ -3830,16 +4072,18 @@ export const IDL: MatchingEngine = { "name": "submitOwnershipTransferRequest", "accounts": [ { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false, - "docs": [ - "Custodian, which can only be modified by the configured owner." + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } ] }, { @@ -3878,16 +4122,18 @@ export const IDL: MatchingEngine = { "name": "cancelOwnershipTransferRequest", "accounts": [ { - "name": "owner", - "isMut": false, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false, - "docs": [ - "Custodian, which can only be modified by the configured owner." + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } ] } ], @@ -3897,14 +4143,24 @@ export const IDL: MatchingEngine = { "name": "proposeAuctionParameters", "accounts": [ { - "name": "ownerOrAssistant", + "name": "payer", "isMut": true, "isSigner": true }, { - "name": "custodian", - "isMut": true, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "ownerOrAssistant", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": true, + "isSigner": false + } + ] }, { "name": "proposal", @@ -4449,14 +4705,19 @@ export const IDL: MatchingEngine = { "name": "closeProposal", "accounts": [ { - "name": "owner", - "isMut": true, - "isSigner": true - }, - { - "name": "custodian", - "isMut": true, - "isSigner": false + "name": "admin", + "accounts": [ + { + "name": "owner", + "isMut": false, + "isSigner": true + }, + { + "name": "custodian", + "isMut": false, + "isSigner": false + } + ] }, { "name": "proposedBy", @@ -4744,42 +5005,6 @@ export const IDL: MatchingEngine = { } ], "types": [ - { - "name": "AddCctpRouterEndpointArgs", - "type": { - "kind": "struct", - "fields": [ - { - "name": "chain", - "type": "u16" - }, - { - "name": "cctpDomain", - "type": "u32" - }, - { - "name": "address", - "type": { - "array": [ - "u8", - 32 - ] - } - }, - { - "name": "mintRecipient", - "type": { - "option": { - "array": [ - "u8", - 32 - ] - } - } - } - ] - } - }, { "name": "CctpMessageArgs", "type": { @@ -4908,6 +5133,42 @@ export const IDL: MatchingEngine = { ] } }, + { + "name": "AddCctpRouterEndpointArgs", + "type": { + "kind": "struct", + "fields": [ + { + "name": "chain", + "type": "u16" + }, + { + "name": "cctpDomain", + "type": "u32" + }, + { + "name": "address", + "type": { + "array": [ + "u8", + 32 + ] + } + }, + { + "name": "mintRecipient", + "type": { + "option": { + "array": [ + "u8", + 32 + ] + } + } + } + ] + } + }, { "name": "AuctionStatus", "type": { @@ -4977,6 +5238,9 @@ export const IDL: MatchingEngine = { "type": { "kind": "enum", "variants": [ + { + "name": "None" + }, { "name": "Local", "fields": [ @@ -4997,73 +5261,11 @@ export const IDL: MatchingEngine = { "type": "u32" } ] - }, - { - "name": "Canonical" } ] } } ], - "events": [ - { - "name": "AuctionUpdate", - "fields": [ - { - "name": "auction", - "type": "publicKey", - "index": false - }, - { - "name": "vaa", - "type": { - "option": "publicKey" - }, - "index": false - }, - { - "name": "endSlot", - "type": "u64", - "index": false - }, - { - "name": "offerToken", - "type": "publicKey", - "index": false - }, - { - "name": "amountIn", - "type": "u64", - "index": false - }, - { - "name": "totalDeposit", - "type": "u64", - "index": false - }, - { - "name": "maxOfferPriceAllowed", - "type": "u64", - "index": false - } - ] - }, - { - "name": "OrderExecuted", - "fields": [ - { - "name": "auction", - "type": "publicKey", - "index": false - }, - { - "name": "vaa", - "type": "publicKey", - "index": false - } - ] - } - ], "errors": [ { "code": 6002, @@ -5090,6 +5292,16 @@ export const IDL: MatchingEngine = { "name": "UpgradeManagerRequired", "msg": "UpgradeManagerRequired" }, + { + "code": 6032, + "name": "SameEndpoint", + "msg": "SameEndpoint" + }, + { + "code": 6034, + "name": "InvalidEndpoint", + "msg": "InvalidEndpoint" + }, { "code": 6256, "name": "AssistantZeroPubkey", @@ -5157,169 +5369,169 @@ export const IDL: MatchingEngine = { }, { "code": 6529, - "name": "InvalidEndpoint", - "msg": "InvalidEndpoint" - }, - { - "code": 6530, "name": "InvalidMintRecipient", "msg": "InvalidMintRecipient" }, { - "code": 6531, + "code": 6530, "name": "ErrInvalidSourceRouter", "msg": "ErrInvalidSourceRouter" }, { - "code": 6532, + "code": 6531, "name": "ErrInvalidTargetRouter", "msg": "ErrInvalidTargetRouter" }, { - "code": 6533, + "code": 6532, "name": "TokenRouterProgramIdRequired", "msg": "TokenRouterProgramIdRequired" }, { - "code": 6534, + "code": 6533, "name": "InvalidAuctionDuration", "msg": "InvalidAuctionDuration" }, { - "code": 6535, + "code": 6534, "name": "InvalidAuctionGracePeriod", "msg": "InvalidAuctionGracePeriod" }, { - "code": 6536, + "code": 6535, "name": "UserPenaltyTooLarge", "msg": "UserPenaltyTooLarge" }, { - "code": 6537, + "code": 6536, "name": "InitialPenaltyTooLarge", "msg": "InitialPenaltyTooLarge" }, { - "code": 6538, + "code": 6537, "name": "MinOfferDeltaTooLarge", "msg": "MinOfferDeltaTooLarge" }, { - "code": 6539, + "code": 6538, "name": "InvalidVaa", "msg": "InvalidVaa" }, { - "code": 6540, + "code": 6539, "name": "NotFastMarketOrder", "msg": "NotFastMarketOrder" }, { - "code": 6541, + "code": 6540, "name": "FastMarketOrderExpired", "msg": "FastMarketOrderExpired" }, { - "code": 6542, + "code": 6541, "name": "OfferPriceTooHigh", "msg": "OfferPriceTooHigh" }, { - "code": 6543, + "code": 6542, "name": "AuctionAlreadyStarted", "msg": "AuctionAlreadyStarted" }, { - "code": 6544, + "code": 6543, "name": "InvalidEmitterForFastFill", "msg": "InvalidEmitterForFastFill" }, { - "code": 6545, + "code": 6544, "name": "InvalidDeposit", "msg": "InvalidDeposit" }, { - "code": 6546, + "code": 6545, "name": "InvalidDepositMessage", "msg": "InvalidDepositMessage" }, { - "code": 6547, + "code": 6546, "name": "InvalidPayloadId", "msg": "InvalidPayloadId" }, { - "code": 6548, + "code": 6547, "name": "InvalidDepositPayloadId", "msg": "InvalidDepositPayloadId" }, { - "code": 6549, + "code": 6548, "name": "AuctionNotActive", "msg": "AuctionNotActive" }, { - "code": 6550, + "code": 6549, "name": "AuctionPeriodExpired", "msg": "AuctionPeriodExpired" }, { - "code": 6551, + "code": 6550, "name": "AuctionPeriodNotExpired", "msg": "AuctionPeriodNotExpired" }, { - "code": 6552, + "code": 6551, "name": "OfferPriceNotImproved", "msg": "OfferPriceNotImproved" }, { - "code": 6553, + "code": 6552, "name": "BestOfferTokenNotPassedIn", "msg": "BestOfferTokenNotPassedIn" }, { - "code": 6554, + "code": 6553, "name": "PenaltyCalculationFailed", "msg": "PenaltyCalculationFailed" }, { - "code": 6555, + "code": 6554, "name": "VaaMismatch", "msg": "VaaMismatch" }, { - "code": 6556, + "code": 6555, "name": "MismatchedVaaHash", "msg": "MismatchedVaaHash" }, { - "code": 6557, + "code": 6556, "name": "BestOfferTokenMismatch", "msg": "BestOfferTokenMismatch" }, { - "code": 6558, + "code": 6557, "name": "InitialOfferTokenMismatch", "msg": "InitialOfferTokenMismatch" }, { - "code": 6559, + "code": 6558, "name": "FeeRecipientTokenMismatch", "msg": "FeeRecipientTokenMismatch" }, { - "code": 6560, + "code": 6559, "name": "AuctionNotCompleted", "msg": "AuctionNotCompleted" }, { - "code": 6561, + "code": 6560, "name": "AuctionConfigMismatch", "msg": "AuctionConfigMismatch" }, + { + "code": 6561, + "name": "EndpointDisabled", + "msg": "EndpointDisabled" + }, { "code": 6562, "name": "InvalidCctpEndpoint", diff --git a/solana/target/types/token_router.ts b/solana/target/types/token_router.ts index 93e5894e..bee01f9d 100644 --- a/solana/target/types/token_router.ts +++ b/solana/target/types/token_router.ts @@ -1270,6 +1270,11 @@ export type TokenRouter = { "name": "NotPendingOwner", "msg": "NotPendingOwner" }, + { + "code": 6048, + "name": "EndpointDisabled", + "msg": "EndpointDisabled" + }, { "code": 6064, "name": "ChainNotAllowed", @@ -2635,6 +2640,11 @@ export const IDL: TokenRouter = { "name": "NotPendingOwner", "msg": "NotPendingOwner" }, + { + "code": 6048, + "name": "EndpointDisabled", + "msg": "EndpointDisabled" + }, { "code": 6064, "name": "ChainNotAllowed", diff --git a/solana/ts/src/matchingEngine/index.ts b/solana/ts/src/matchingEngine/index.ts index e9362c11..0b8889d7 100644 --- a/solana/ts/src/matchingEngine/index.ts +++ b/solana/ts/src/matchingEngine/index.ts @@ -212,6 +212,7 @@ export class MatchingEngineProgram { async fetchProposal(input?: { address: PublicKey }): Promise { const addr = input === undefined ? await this.proposalAddress() : input.address; + // @ts-ignore This is BS. This is correct. return this.program.account.proposal.fetch(addr); } @@ -345,8 +346,10 @@ export class MatchingEngineProgram { return this.program.methods .submitOwnershipTransferRequest() .accounts({ - owner, - custodian: inputCustodian ?? this.custodianAddress(), + admin: { + owner, + custodian: inputCustodian ?? this.custodianAddress(), + }, newOwner, }) .instruction(); @@ -374,8 +377,10 @@ export class MatchingEngineProgram { return this.program.methods .cancelOwnershipTransferRequest() .accounts({ - owner, - custodian: inputCustodian ?? this.custodianAddress(), + admin: { + owner, + custodian: inputCustodian ?? this.custodianAddress(), + }, }) .instruction(); } @@ -399,6 +404,7 @@ export class MatchingEngineProgram { async addCctpRouterEndpointIx( accounts: { ownerOrAssistant: PublicKey; + payer?: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; remoteTokenMessenger?: PublicKey; @@ -407,6 +413,7 @@ export class MatchingEngineProgram { ): Promise { const { ownerOrAssistant, + payer: inputPayer, custodian: inputCustodian, routerEndpoint: inputRouterEndpoint, remoteTokenMessenger: inputRemoteTokenMessenger, @@ -418,29 +425,75 @@ export class MatchingEngineProgram { return this.program.methods .addCctpRouterEndpoint(args) .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), + payer: inputPayer ?? ownerOrAssistant, + admin: { + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + }, routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), remoteTokenMessenger: inputRemoteTokenMessenger ?? derivedRemoteTokenMessenger, }) .instruction(); } + async updateCctpRouterEndpointIx( + accounts: { + owner: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + remoteTokenMessenger?: PublicKey; + }, + args: AddCctpRouterEndpointArgs, + ): Promise { + const { + owner, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + remoteTokenMessenger: inputRemoteTokenMessenger, + } = accounts; + const { chain, cctpDomain } = args; + const derivedRemoteTokenMessenger = + this.tokenMessengerMinterProgram().remoteTokenMessengerAddress(cctpDomain); + + return this.program.methods + .updateCctpRouterEndpoint(args) + .accounts({ + admin: { + owner, + custodian: inputCustodian ?? this.custodianAddress(), + }, + routerEndpoint: { + inner: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + }, + remoteTokenMessenger: inputRemoteTokenMessenger ?? derivedRemoteTokenMessenger, + }) + .instruction(); + } + async proposeAuctionParametersIx( accounts: { ownerOrAssistant: PublicKey; + payer?: PublicKey; custodian?: PublicKey; proposal?: PublicKey; }, parameters: AuctionParameters, ): Promise { - const { ownerOrAssistant, custodian: inputCustodian, proposal: inputProposal } = accounts; + const { + ownerOrAssistant, + payer: inputPayer, + custodian: inputCustodian, + proposal: inputProposal, + } = accounts; return this.program.methods .proposeAuctionParameters(parameters) .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), + payer: inputPayer ?? ownerOrAssistant, + admin: { + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + }, proposal: inputProposal ?? (await this.proposalAddress()), epochSchedule: SYSVAR_EPOCH_SCHEDULE_PUBKEY, }) @@ -484,12 +537,14 @@ export class MatchingEngineProgram { async addLocalRouterEndpointIx(accounts: { ownerOrAssistant: PublicKey; tokenRouterProgram: PublicKey; + payer?: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; }): Promise { const { ownerOrAssistant, tokenRouterProgram, + payer: inputPayer, custodian: inputCustodian, routerEndpoint: inputRouterEndpoint, } = accounts; @@ -500,40 +555,86 @@ export class MatchingEngineProgram { return this.program.methods .addLocalRouterEndpoint() .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), + payer: inputPayer ?? ownerOrAssistant, + admin: { + ownerOrAssistant, + custodian: inputCustodian ?? this.custodianAddress(), + }, routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), - tokenRouterProgram, - tokenRouterEmitter, - tokenRouterCustodyToken: splToken.getAssociatedTokenAddressSync( - this.mint, + local: { + tokenRouterProgram, tokenRouterEmitter, - true, - ), + tokenRouterMintRecipient: splToken.getAssociatedTokenAddressSync( + this.mint, + tokenRouterEmitter, + true, + ), + }, + }) + .instruction(); + } + + async updateLocalRouterEndpointIx(accounts: { + owner: PublicKey; + tokenRouterProgram: PublicKey; + custodian?: PublicKey; + routerEndpoint?: PublicKey; + }): Promise { + const { + owner, + tokenRouterProgram, + custodian: inputCustodian, + routerEndpoint: inputRouterEndpoint, + } = accounts; + const [tokenRouterEmitter] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + tokenRouterProgram, + ); + return this.program.methods + .updateLocalRouterEndpoint() + .accounts({ + admin: { + owner, + custodian: inputCustodian ?? this.custodianAddress(), + }, + routerEndpoint: { + inner: + inputRouterEndpoint ?? + this.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + }, + local: { + tokenRouterProgram, + tokenRouterEmitter, + tokenRouterMintRecipient: splToken.getAssociatedTokenAddressSync( + this.mint, + tokenRouterEmitter, + true, + ), + }, }) .instruction(); } - async removeRouterEndpointIx( + async disableRouterEndpointIx( accounts: { - ownerOrAssistant: PublicKey; + owner: PublicKey; custodian?: PublicKey; routerEndpoint?: PublicKey; }, chain: wormholeSdk.ChainId, ): Promise { - const { - ownerOrAssistant, - custodian: inputCustodian, - routerEndpoint: inputRouterEndpoint, - } = accounts; + const { owner, custodian: inputCustodian, routerEndpoint: inputRouterEndpoint } = accounts; return this.program.methods - .removeRouterEndpoint() + .disableRouterEndpoint() .accounts({ - ownerOrAssistant, - custodian: inputCustodian ?? this.custodianAddress(), - routerEndpoint: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + admin: { + owner, + custodian: inputCustodian ?? this.custodianAddress(), + }, + routerEndpoint: { + inner: inputRouterEndpoint ?? this.routerEndpointAddress(chain), + }, }) .instruction(); } diff --git a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts index 281f9ebf..8f928180 100644 --- a/solana/ts/src/matchingEngine/state/RouterEndpoint.ts +++ b/solana/ts/src/matchingEngine/state/RouterEndpoint.ts @@ -3,7 +3,7 @@ import { PublicKey } from "@solana/web3.js"; export type MessageProtocol = { local?: { programId: PublicKey }; cctp?: { domain: number }; - canonical?: {}; + none?: {}; }; export class RouterEndpoint { @@ -18,7 +18,7 @@ export class RouterEndpoint { chain: number, address: Array, mintRecipient: Array, - protocol: MessageProtocol + protocol: MessageProtocol, ) { this.bump = bump; this.chain = chain; @@ -32,7 +32,7 @@ export class RouterEndpoint { encodedChain.writeUInt16BE(chain); return PublicKey.findProgramAddressSync( [Buffer.from("endpoint"), encodedChain], - programId + programId, )[0]; } } diff --git a/solana/ts/tests/01__matchingEngine.ts b/solana/ts/tests/01__matchingEngine.ts index 07c6f441..d8b5a1e4 100644 --- a/solana/ts/tests/01__matchingEngine.ts +++ b/solana/ts/tests/01__matchingEngine.ts @@ -617,7 +617,9 @@ describe("Matching Engine", function () { }); }); - describe("Add Router Endpoint (CCTP)", function () { + describe("Router Endpoint (CCTP)", function () { + const localVariables = new Map(); + it("Cannot Add Router Endpoint as Non-Owner and Non-Assistant", async function () { const ix = await engine.addCctpRouterEndpointIx( { ownerOrAssistant: payer.publicKey }, @@ -678,11 +680,71 @@ describe("Matching Engine", function () { cctp: { domain: ethDomain }, }), ); + + // Save for later. + localVariables.set("ix", ix); + }); + + it("Cannot Add Router Endpoint Again", async function () { + const ix = localVariables.get("ix") as TransactionInstruction; + expect(localVariables.delete("ix")).is.true; + + const routerEndpoint = engine.routerEndpointAddress(ethChain); + await expectIxErr( + connection, + [ix], + [ownerAssistant], + `Allocate: account Address { address: ${routerEndpoint.toString()}, base: None } already in use`, + ); + }); + + it("Cannot Disable Router Endpoint as Owner Assistant", async function () { + const ix = await engine.disableRouterEndpointIx( + { owner: ownerAssistant.publicKey }, + ethChain, + ); + + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); + }); + + it("Disable Router Endpoint as Owner", async function () { + const ix = await engine.disableRouterEndpointIx( + { owner: owner.publicKey }, + ethChain, + ); + + await expectIxOk(connection, [ix], [owner]); + + const routerEndpointData = await engine.fetchRouterEndpoint(ethChain); + const { bump } = routerEndpointData; + expect(routerEndpointData).to.eql( + new RouterEndpoint( + bump, + ethChain, + new Array(32).fill(0), + new Array(32).fill(0), + { none: {} }, + ), + ); + }); + + it("Cannot Update Router Endpoint as Owner Assistant", async function () { + const ix = await engine.updateCctpRouterEndpointIx( + { owner: ownerAssistant.publicKey }, + { + chain: ethChain, + cctpDomain: ethDomain, + address: ethRouter, + mintRecipient: null, + }, + ); + + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); }); it("Update Router Endpoint as Owner", async function () { - const ix = await engine.addCctpRouterEndpointIx( - { ownerOrAssistant: owner.publicKey }, + const ix = await engine.updateCctpRouterEndpointIx( + { owner: owner.publicKey }, { chain: ethChain, cctpDomain: ethDomain, @@ -702,60 +764,6 @@ describe("Matching Engine", function () { }); }); - describe("Add Local Router Endpoint", function () { - it("Cannot Add Local Router Endpoint without Executable", async function () { - const ix = await engine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: SYSVAR_RENT_PUBKEY, - }); - - const [bogusEmitter] = PublicKey.findProgramAddressSync( - [Buffer.from("emitter")], - SYSVAR_RENT_PUBKEY, - ); - await splToken.getOrCreateAssociatedTokenAccount( - connection, - payer, - USDC_MINT_ADDRESS, - bogusEmitter, - true, - ); - - await expectIxErr( - connection, - [ix], - [ownerAssistant], - "Error Code: ConstraintExecutable", - ); - }); - - it("Cannot Add Local Router Endpoint using System Program", async function () { - const ix = await engine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, - tokenRouterProgram: SystemProgram.programId, - }); - - const [bogusEmitter] = PublicKey.findProgramAddressSync( - [Buffer.from("emitter")], - SystemProgram.programId, - ); - await splToken.getOrCreateAssociatedTokenAccount( - connection, - payer, - USDC_MINT_ADDRESS, - bogusEmitter, - true, - ); - - await expectIxErr( - connection, - [ix], - [ownerAssistant], - "Error Code: InvalidEndpoint", - ); - }); - }); - describe("Update Fee Recipient", async function () { const localVariables = new Map(); diff --git a/solana/ts/tests/02__tokenRouter.ts b/solana/ts/tests/02__tokenRouter.ts index c1092c1a..3fbe7771 100644 --- a/solana/ts/tests/02__tokenRouter.ts +++ b/solana/ts/tests/02__tokenRouter.ts @@ -796,8 +796,9 @@ describe("Token Router", function () { routerEndpoint: unregisteredEndpoint, }); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxErr( connection, [ix], @@ -857,8 +858,9 @@ describe("Token Router", function () { preparedOrder, }); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxOk(connection, [ix], [payer, orderSender], { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -925,8 +927,9 @@ describe("Token Router", function () { preparedOrder, }); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxOk(connection, [ix], [payer, orderSender], { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -951,8 +954,9 @@ describe("Token Router", function () { const { amount: balanceBefore } = await splToken.getAccount(connection, payerToken); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxOk( connection, [approveIx, prepareIx, ix], @@ -1145,8 +1149,9 @@ describe("Token Router", function () { units: 300_000, }); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxErr( connection, [computeIx, ix], @@ -1217,8 +1222,9 @@ describe("Token Router", function () { units: 300_000, }); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxErr( connection, [computeIx, ix], @@ -1290,8 +1296,9 @@ describe("Token Router", function () { units: 300_000, }); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxErr( connection, [computeIx, ix], @@ -1355,22 +1362,23 @@ describe("Token Router", function () { }, ); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxErr(connection, [ix], [payer], "Error Code: InvalidPayloadId", { addressLookupTableAccounts: [lookupTableAccount!], }); }); - it("Remove Router Endpoint on Matching Engine", async function () { - const ix = await tokenRouter.matchingEngineProgram().removeRouterEndpointIx( + it("Disable Router Endpoint on Matching Engine", async function () { + const ix = await tokenRouter.matchingEngineProgram().disableRouterEndpointIx( { - ownerOrAssistant: ownerAssistant.publicKey, + owner: owner.publicKey, }, foreignChain, ); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); }); it("Cannot Redeem Fill without Router Endpoint", async function () { @@ -1428,21 +1436,32 @@ describe("Token Router", function () { }, ); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); - await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized", { - addressLookupTableAccounts: [lookupTableAccount!], + const computeIx = ComputeBudgetProgram.setComputeUnitLimit({ + units: 300_000, }); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); + await expectIxErr( + connection, + [computeIx, ix], + [payer], + "Error Code: EndpointDisabled", + { + addressLookupTableAccounts: [lookupTableAccount!], + }, + ); + // Save for later. localVariables.set("args", { encodedCctpMessage, cctpAttestation }); localVariables.set("vaa", vaa); }); - it("Add Router Endpoint", async function () { - const ix = await tokenRouter.matchingEngineProgram().addCctpRouterEndpointIx( + it("Update Router Endpoint", async function () { + const ix = await tokenRouter.matchingEngineProgram().updateCctpRouterEndpointIx( { - ownerOrAssistant: ownerAssistant.publicKey, + owner: owner.publicKey, }, { chain: foreignChain, @@ -1452,7 +1471,7 @@ describe("Token Router", function () { }, ); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); }); it("Redeem Fill", async function () { @@ -1480,8 +1499,9 @@ describe("Token Router", function () { cctpMintRecipient, ); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxOk(connection, [computeIx, ix], [payer], { addressLookupTableAccounts: [lookupTableAccount!], }); @@ -1514,8 +1534,9 @@ describe("Token Router", function () { args, ); - const { value: lookupTableAccount } = - await connection.getAddressLookupTable(lookupTableAddress); + const { value: lookupTableAccount } = await connection.getAddressLookupTable( + lookupTableAddress, + ); await expectIxOk(connection, [ix], [payer], { addressLookupTableAccounts: [lookupTableAccount!], }); diff --git a/solana/ts/tests/04__interaction.ts b/solana/ts/tests/04__interaction.ts index 5e116c72..03ad7dd9 100644 --- a/solana/ts/tests/04__interaction.ts +++ b/solana/ts/tests/04__interaction.ts @@ -8,6 +8,8 @@ import { PublicKey, ComputeBudgetProgram, SystemProgram, + SYSVAR_RENT_PUBKEY, + TransactionInstruction, } from "@solana/web3.js"; import { use as chaiUse, expect } from "chai"; import chaiAsPromised from "chai-as-promised"; @@ -26,6 +28,7 @@ import { LOCALHOST, MOCK_GUARDIANS, OWNER_ASSISTANT_KEYPAIR, + OWNER_KEYPAIR, PAYER_KEYPAIR, USDC_MINT_ADDRESS, bigintToU64BN, @@ -41,6 +44,7 @@ describe("Matching Engine <> Token Router", function () { const connection = new Connection(LOCALHOST, "processed"); const payer = PAYER_KEYPAIR; + const owner = OWNER_KEYPAIR; const ownerAssistant = OWNER_ASSISTANT_KEYPAIR; const offerAuthorityOne = Keypair.generate(); @@ -62,6 +66,60 @@ describe("Matching Engine <> Token Router", function () { describe("Admin", function () { describe("Local Router Endpoint", function () { + const localVariables = new Map(); + + it("Matching Engine .. Cannot Add Local Router Endpoint without Executable", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: SYSVAR_RENT_PUBKEY, + }); + + const [bogusEmitter] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + SYSVAR_RENT_PUBKEY, + ); + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + bogusEmitter, + true, + ); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: ConstraintExecutable", + ); + }); + + it("Matching Engine .. Cannot Add Local Router Endpoint using System Program", async function () { + const ix = await matchingEngine.addLocalRouterEndpointIx({ + ownerOrAssistant: ownerAssistant.publicKey, + tokenRouterProgram: SystemProgram.programId, + }); + + const [bogusEmitter] = PublicKey.findProgramAddressSync( + [Buffer.from("emitter")], + SystemProgram.programId, + ); + await splToken.getOrCreateAssociatedTokenAccount( + connection, + payer, + USDC_MINT_ADDRESS, + bogusEmitter, + true, + ); + + await expectIxErr( + connection, + [ix], + [ownerAssistant], + "Error Code: InvalidEndpoint", + ); + }); + it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { const ix = await matchingEngine.addLocalRouterEndpointIx({ ownerOrAssistant: ownerAssistant.publicKey, @@ -82,21 +140,91 @@ describe("Matching Engine <> Token Router", function () { { local: { programId: tokenRouter.ID } }, ), ); + + // Save for later. + localVariables.set("ix", ix); + }); + + it("Matching Engine .. Cannot Add Local Router Endpoint Again", async function () { + const ix = localVariables.get("ix") as TransactionInstruction; + expect(localVariables.delete("ix")).is.true; + + const routerEndpoint = matchingEngine.routerEndpointAddress( + wormholeSdk.CHAIN_ID_SOLANA, + ); + await expectIxErr( + connection, + [ix], + [ownerAssistant], + `Allocate: account Address { address: ${routerEndpoint.toString()}, base: None } already in use`, + ); + }); + + it("Matching Engine .. Cannot Update Router Endpoint as Owner Assistant", async function () { + const ix = await matchingEngine.updateLocalRouterEndpointIx({ + owner: ownerAssistant.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); + + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); + }); + + // TODO: This is a no-op. Consider using testnet token router program as the first one + // registered before registering the localnet one. + it("Matching Engine .. Update Router Endpoint as Owner", async function () { + const ix = await matchingEngine.updateLocalRouterEndpointIx({ + owner: owner.publicKey, + tokenRouterProgram: tokenRouter.ID, + }); + + await expectIxOk(connection, [ix], [owner]); + + const routerEndpointData = await matchingEngine.fetchRouterEndpoint( + wormholeSdk.CHAIN_ID_SOLANA, + ); + const { bump } = routerEndpointData; + expect(routerEndpointData).to.eql( + new matchingEngineSdk.RouterEndpoint( + bump, + wormholeSdk.CHAIN_ID_SOLANA, + Array.from(tokenRouter.custodianAddress().toBuffer()), + Array.from(tokenRouter.cctpMintRecipientAddress().toBuffer()), + { local: { programId: tokenRouter.ID } }, + ), + ); + }); + + it("Matching Engine .. Cannot Disable Router Endpoint as Owner Assistant", async function () { + const ix = await matchingEngine.disableRouterEndpointIx( + { owner: ownerAssistant.publicKey }, + wormholeSdk.CHAIN_ID_SOLANA, + ); + + await expectIxErr(connection, [ix], [ownerAssistant], "Error Code: OwnerOnly"); }); - it("Matching Engine .. Remove Local Router Endpoint", async function () { - const ix = await matchingEngine.removeRouterEndpointIx( + it("Matching Engine .. Disable Local Router Endpoint as Owner", async function () { + const ix = await matchingEngine.disableRouterEndpointIx( { - ownerOrAssistant: ownerAssistant.publicKey, + owner: owner.publicKey, }, wormholeSdk.CHAIN_ID_SOLANA, ); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); - const accInfo = await connection.getAccountInfo( - matchingEngine.routerEndpointAddress(wormholeSdk.CHAIN_ID_SOLANA), + const routerEndpointData = await matchingEngine.fetchRouterEndpoint( + wormholeSdk.CHAIN_ID_SOLANA, + ); + const { bump } = routerEndpointData; + expect(routerEndpointData).to.eql( + new matchingEngineSdk.RouterEndpoint( + bump, + wormholeSdk.CHAIN_ID_SOLANA, + new Array(32).fill(0), + new Array(32).fill(0), + { none: {} }, + ), ); - expect(accInfo).to.eql(null); }); after("Set Up Lookup Table", async function () { @@ -223,22 +351,22 @@ describe("Matching Engine <> Token Router", function () { }); }); - before("Add Local Router Endpoint", async function () { - const ix = await matchingEngine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, + before("Update Local Router Endpoint", async function () { + const ix = await matchingEngine.updateLocalRouterEndpointIx({ + owner: owner.publicKey, tokenRouterProgram: tokenRouter.ID, }); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); }); - after("Remove Local Router Endpoint", async function () { - const ix = await matchingEngine.removeRouterEndpointIx( + after("Disable Local Router Endpoint", async function () { + const ix = await matchingEngine.disableRouterEndpointIx( { - ownerOrAssistant: ownerAssistant.publicKey, + owner: owner.publicKey, }, wormholeSdk.CHAIN_ID_SOLANA, ); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); }); }); @@ -320,22 +448,22 @@ describe("Matching Engine <> Token Router", function () { }); }); - before("Add Local Router Endpoint", async function () { - const ix = await matchingEngine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, + before("Update Local Router Endpoint", async function () { + const ix = await matchingEngine.updateLocalRouterEndpointIx({ + owner: owner.publicKey, tokenRouterProgram: tokenRouter.ID, }); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); }); - after("Remove Local Router Endpoint", async function () { - const ix = await matchingEngine.removeRouterEndpointIx( + after("Disable Local Router Endpoint", async function () { + const ix = await matchingEngine.disableRouterEndpointIx( { - ownerOrAssistant: ownerAssistant.publicKey, + owner: owner.publicKey, }, wormholeSdk.CHAIN_ID_SOLANA, ); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); }); }); @@ -380,7 +508,7 @@ describe("Matching Engine <> Token Router", function () { vaa, }); - await expectIxErr(connection, [ix], [payer], "Error Code: AccountNotInitialized"); + await expectIxErr(connection, [ix], [payer], "Error Code: EndpointDisabled"); // Save for later. localVariables.set("vaa", vaa); @@ -388,12 +516,12 @@ describe("Matching Engine <> Token Router", function () { localVariables.set("redeemerMessage", redeemerMessage); }); - it("Matching Engine .. Add Local Router Endpoint using Token Router Program", async function () { - const ix = await matchingEngine.addLocalRouterEndpointIx({ - ownerOrAssistant: ownerAssistant.publicKey, + it("Matching Engine .. Update Local Router Endpoint using Token Router Program", async function () { + const ix = await matchingEngine.updateLocalRouterEndpointIx({ + owner: owner.publicKey, tokenRouterProgram: tokenRouter.ID, }); - await expectIxOk(connection, [ix], [ownerAssistant]); + await expectIxOk(connection, [ix], [owner]); const routerEndpointData = await matchingEngine.fetchRouterEndpoint( wormholeSdk.CHAIN_ID_SOLANA, diff --git a/solana/ts/tests/helpers/before.ts b/solana/ts/tests/helpers/before.ts new file mode 100644 index 00000000..e69de29b