The home for Hyperlane core contracts, sdk packages, and other infrastructure
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
hyperlane-monorepo/solidity/optics-core/contracts/Common.sol

132 lines
4.2 KiB

// SPDX-License-Identifier: MIT OR Apache-2.0
pragma solidity >=0.6.11;
import "./libs/Message.sol";
import "@openzeppelin/contracts/cryptography/ECDSA.sol";
/**
* @title Common
* @author Celo Labs Inc.
* @notice Shared utilities between Home and Replica.
**/
abstract contract Common {
enum States {UNINITIALIZED, ACTIVE, FAILED}
/// @notice Domain of owning contract
uint32 public localDomain;
/// @notice Hash of `localDomain` concatenated with "OPTICS"
bytes32 public domainHash;
/// @notice Address of bonded updater
address public updater;
/// @notice Current state of contract
States public state;
/// @notice Current root
bytes32 public current;
/**
* @notice Event emitted when update is made on Home or unconfirmed update
* root is enqueued on Replica
* @param _localDomain Domain of contract's chain
* @param _oldRoot Old merkle root
* @param _newRoot New merkle root
* @param signature Updater's signature on `_oldRoot` and `_newRoot`
**/
event Update(
uint32 indexed _localDomain,
bytes32 indexed _oldRoot,
bytes32 indexed _newRoot,
bytes signature
);
/**
* @notice Event emitted when valid double update proof is provided to
* contract
* @param _oldRoot Old root shared between two conflicting updates
* @param _newRoot Array containing two conflicting new roots
* @param _signature Signature on `_oldRoot` and `_newRoot`[0]
* @param _signature2 Signature on `_oldRoot` and `_newRoot`[1]
**/
event DoubleUpdate(
bytes32 _oldRoot,
bytes32[2] _newRoot,
bytes _signature,
bytes _signature2
);
/// @notice Called when a double update or fraudulent update is detected
function fail() internal virtual;
/// @notice Sets contract state to FAILED
function _setFailed() internal {
state = States.FAILED;
}
/// @notice Ensures that contract state != FAILED
modifier notFailed() {
require(state != States.FAILED, "failed state");
_;
}
function initialize(uint32 _localDomain, address _updater) public virtual {
require(state == States.UNINITIALIZED, "already initialized");
setLocalDomain(_localDomain);
updater = _updater;
state = States.ACTIVE;
}
function setLocalDomain(uint32 _localDomain) internal {
localDomain = _localDomain;
domainHash = keccak256(abi.encodePacked(_localDomain, "OPTICS"));
}
/**
* @notice Called internally. Checks that signature is valid (belongs to
* updater).
* @param _oldRoot Old merkle root
* @param _newRoot New merkle root
* @param _signature Signature on `_oldRoot` and `_newRoot`
* @return Returns true if signature is valid and false if otherwise
**/
function checkSig(
bytes32 _oldRoot,
bytes32 _newRoot,
bytes memory _signature
) internal view returns (bool) {
bytes32 _digest =
keccak256(abi.encodePacked(domainHash, _oldRoot, _newRoot));
_digest = ECDSA.toEthSignedMessageHash(_digest);
return ECDSA.recover(_digest, _signature) == updater;
}
/**
* @notice Called by external agent. Checks that signatures on two sets of
* roots are valid and that the new roots conflict with each other. If both
* cases hold true, the contract is failed and a `DoubleUpdate` event is
* emitted.
* @dev When `fail()` is called on Home, updater is slashed.
* @param _oldRoot Old root shared between two conflicting updates
* @param _newRoot Array containing two conflicting new roots
* @param _signature Signature on `_oldRoot` and `_newRoot`[0]
* @param _signature2 Signature on `_oldRoot` and `_newRoot`[1]
**/
function doubleUpdate(
bytes32 _oldRoot,
bytes32[2] calldata _newRoot,
bytes calldata _signature,
bytes calldata _signature2
) external notFailed {
if (
Common.checkSig(_oldRoot, _newRoot[0], _signature) &&
Common.checkSig(_oldRoot, _newRoot[1], _signature2) &&
_newRoot[0] != _newRoot[1]
) {
fail();
emit DoubleUpdate(_oldRoot, _newRoot, _signature, _signature2);
}
}
}