The home for Hyperlane core contracts, sdk packages, and other infrastructure
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
hyperlane-monorepo/solidity/optics-core/test/Common.test.js

116 lines
3.7 KiB

const { waffle, ethers } = require('hardhat');
const { provider } = waffle;
const { expect } = require('chai');
const { testCases } = require('../../../vectors/domainHashTestCases.json');
const {
testCases: signedUpdateTestCases,
} = require('../../../vectors/signedUpdateTestCases.json');
const originDomain = 1000;
describe('Common', async () => {
let common, signer, fakeSigner, updater, fakeUpdater;
before(async () => {
[signer, fakeSigner] = provider.getWallets();
updater = await optics.Updater.fromSigner(signer, originDomain);
fakeUpdater = await optics.Updater.fromSigner(fakeSigner, originDomain);
});
beforeEach(async () => {
const { contracts } = await optics.deployUpgradeSetupAndProxy(
'TestCommon',
[originDomain],
[updater.signer.address],
);
common = contracts.proxyWithImplementation;
});
it('Accepts updater signature', async () => {
const oldRoot = ethers.utils.formatBytes32String('old root');
const newRoot = ethers.utils.formatBytes32String('new root');
const { signature } = await updater.signUpdate(oldRoot, newRoot);
expect(await common.testCheckSig(oldRoot, newRoot, signature)).to.be.true;
});
it('Rejects non-updater signature', async () => {
const oldRoot = ethers.utils.formatBytes32String('old root');
const newRoot = ethers.utils.formatBytes32String('new root');
const { signature: fakeSignature } = await fakeUpdater.signUpdate(
oldRoot,
newRoot,
);
expect(await common.testCheckSig(oldRoot, newRoot, fakeSignature)).to.be
.false;
});
it('Fails on valid double update proof', async () => {
const oldRoot = ethers.utils.formatBytes32String('old root');
const newRoot = ethers.utils.formatBytes32String('new root 1');
const newRoot2 = ethers.utils.formatBytes32String('new root 2');
const { signature } = await updater.signUpdate(oldRoot, newRoot);
const { signature: signature2 } = await updater.signUpdate(
oldRoot,
newRoot2,
);
await expect(
common.doubleUpdate(oldRoot, [newRoot, newRoot2], signature, signature2),
).to.emit(common, 'DoubleUpdate');
expect(await common.state()).to.equal(optics.State.FAILED);
});
it('Does not fail contract on invalid double update proof', async () => {
const oldRoot = ethers.utils.formatBytes32String('old root');
const newRoot = ethers.utils.formatBytes32String('new root');
const { signature } = await updater.signUpdate(oldRoot, newRoot);
// Double update proof uses same roots and signatures
await common.doubleUpdate(
oldRoot,
[newRoot, newRoot],
signature,
signature,
);
// State should not be failed because double update proof does not
// demonstrate fraud
const state = await common.state();
expect(state).not.to.equal(optics.State.FAILED);
expect(state).to.equal(optics.State.ACTIVE);
});
it('Calculates domain hashes from originDomain', async () => {
// Compare Rust output in json file to solidity output
for (let testCase of testCases) {
const { originDomain, expectedDomainHash } = testCase;
const solidityDomainHash = await common.testDomainHash(originDomain);
expect(solidityDomainHash).to.equal(expectedDomainHash);
}
});
it('Checks Rust-produced SignedUpdate', async () => {
// Compare Rust output in json file to solidity output
for (let testCase of signedUpdateTestCases) {
const { oldRoot, newRoot, signature, signer } = testCase;
const signerAddress = ethers.utils.getAddress(signer);
await common.setUpdater(signerAddress);
expect(
await common.testCheckSig(
oldRoot,
newRoot,
ethers.utils.joinSignature(signature),
),
).to.be.true;
}
});
});