UNPKG

@safe-global/safe-contracts

Version:
88 lines (71 loc) 4.67 kB
import { expect } from "chai"; import hre, { deployments, waffle } from "hardhat"; import "@nomiclabs/hardhat-ethers"; import { getSafeWithOwners } from "../utils/setup"; import { executeContractCallWithSigners, calculateSafeMessageHash } from "../../src/utils/execution"; import { chainId } from "../utils/encoding"; describe("SignMessageLib", async () => { const [user1, user2] = waffle.provider.getWallets(); const setupTests = deployments.createFixture(async ({ deployments }) => { await deployments.fixture(); const lib = await (await hre.ethers.getContractFactory("SignMessageLib")).deploy(); return { safe: await getSafeWithOwners([user1.address, user2.address]), lib, }; }); describe("signMessage", async () => { it("can only if msg.sender provides domain separator", async () => { const { lib } = await setupTests(); await expect(lib.signMessage("0xbaddad")).to.be.reverted; }); it("should emit event", async () => { const { safe, lib } = await setupTests(); // Required to check that the event was emitted from the right address const libSafe = lib.attach(safe.address); const messageHash = calculateSafeMessageHash(safe, "0xbaddad", await chainId()); expect(await safe.signedMessages(messageHash)).to.be.eq(0); await expect(executeContractCallWithSigners(safe, lib, "signMessage", ["0xbaddad"], [user1, user2], true)) .to.emit(libSafe, "SignMsg") .withArgs(messageHash); expect(await safe.signedMessages(messageHash)).to.be.eq(1); }); it("can be used only via DELEGATECALL opcode", async () => { const { lib } = await setupTests(); expect(lib.signMessage("0xbaddad")).to.revertedWith("function selector was not recognized and there's no fallback function"); }); it("changes the expected storage slot without touching the most important ones", async () => { const { safe, lib } = await setupTests(); const SIGNED_MESSAGES_MAPPING_STORAGE_SLOT = 7; const message = "no rugpull, funds must be safu"; const eip191MessageHash = hre.ethers.utils.hashMessage(message); const safeInternalMsgHash = calculateSafeMessageHash(safe, hre.ethers.utils.hashMessage(message), await chainId()); const expectedStorageSlot = hre.ethers.utils.keccak256( hre.ethers.utils.defaultAbiCoder.encode( ["bytes32", "uint256"], [safeInternalMsgHash, SIGNED_MESSAGES_MAPPING_STORAGE_SLOT], ), ); const masterCopyAddressBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 0); const ownerCountBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 3); const thresholdBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 4); const nonceBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 5); const msgStorageSlotBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, expectedStorageSlot); expect(nonceBeforeSigning).to.be.eq(`0x${"0".padStart(64, "0")}`); expect(await safe.signedMessages(safeInternalMsgHash)).to.be.eq(0); expect(msgStorageSlotBeforeSigning).to.be.eq(`0x${"0".padStart(64, "0")}`); await executeContractCallWithSigners(safe, lib, "signMessage", [eip191MessageHash], [user1, user2], true); const masterCopyAddressAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 0); const ownerCountAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 3); const thresholdAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 4); const nonceAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 5); const msgStorageSlotAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, expectedStorageSlot); expect(await safe.signedMessages(safeInternalMsgHash)).to.be.eq(1); expect(masterCopyAddressBeforeSigning).to.be.eq(masterCopyAddressAfterSigning); expect(thresholdBeforeSigning).to.be.eq(thresholdAfterSigning); expect(ownerCountBeforeSigning).to.be.eq(ownerCountAfterSigning); expect(nonceAfterSigning).to.be.eq(`0x${"1".padStart(64, "0")}`); expect(msgStorageSlotAfterSigning).to.be.eq(`0x${"1".padStart(64, "0")}`); }); }); });