@safe-global/safe-contracts
Version:
Ethereum multisig contract
88 lines (71 loc) • 4.67 kB
text/typescript
import { expect } from "chai";
import hre, { deployments, waffle } from "hardhat";
import "@nomiclabs/hardhat-ethers";
import { getSafeWithOwners } from "../utils/setup";
import { executeContractCallWithSigners, calculateSafeMessageHash } from "../../src/utils/execution";
import { chainId } from "../utils/encoding";
describe("SignMessageLib", async () => {
const [user1, user2] = waffle.provider.getWallets();
const setupTests = deployments.createFixture(async ({ deployments }) => {
await deployments.fixture();
const lib = await (await hre.ethers.getContractFactory("SignMessageLib")).deploy();
return {
safe: await getSafeWithOwners([user1.address, user2.address]),
lib,
};
});
describe("signMessage", async () => {
it("can only if msg.sender provides domain separator", async () => {
const { lib } = await setupTests();
await expect(lib.signMessage("0xbaddad")).to.be.reverted;
});
it("should emit event", async () => {
const { safe, lib } = await setupTests();
// Required to check that the event was emitted from the right address
const libSafe = lib.attach(safe.address);
const messageHash = calculateSafeMessageHash(safe, "0xbaddad", await chainId());
expect(await safe.signedMessages(messageHash)).to.be.eq(0);
await expect(executeContractCallWithSigners(safe, lib, "signMessage", ["0xbaddad"], [user1, user2], true))
.to.emit(libSafe, "SignMsg")
.withArgs(messageHash);
expect(await safe.signedMessages(messageHash)).to.be.eq(1);
});
it("can be used only via DELEGATECALL opcode", async () => {
const { lib } = await setupTests();
expect(lib.signMessage("0xbaddad")).to.revertedWith("function selector was not recognized and there's no fallback function");
});
it("changes the expected storage slot without touching the most important ones", async () => {
const { safe, lib } = await setupTests();
const SIGNED_MESSAGES_MAPPING_STORAGE_SLOT = 7;
const message = "no rugpull, funds must be safu";
const eip191MessageHash = hre.ethers.utils.hashMessage(message);
const safeInternalMsgHash = calculateSafeMessageHash(safe, hre.ethers.utils.hashMessage(message), await chainId());
const expectedStorageSlot = hre.ethers.utils.keccak256(
hre.ethers.utils.defaultAbiCoder.encode(
["bytes32", "uint256"],
[safeInternalMsgHash, SIGNED_MESSAGES_MAPPING_STORAGE_SLOT],
),
);
const masterCopyAddressBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 0);
const ownerCountBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 3);
const thresholdBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 4);
const nonceBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, 5);
const msgStorageSlotBeforeSigning = await hre.ethers.provider.getStorageAt(safe.address, expectedStorageSlot);
expect(nonceBeforeSigning).to.be.eq(`0x${"0".padStart(64, "0")}`);
expect(await safe.signedMessages(safeInternalMsgHash)).to.be.eq(0);
expect(msgStorageSlotBeforeSigning).to.be.eq(`0x${"0".padStart(64, "0")}`);
await executeContractCallWithSigners(safe, lib, "signMessage", [eip191MessageHash], [user1, user2], true);
const masterCopyAddressAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 0);
const ownerCountAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 3);
const thresholdAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 4);
const nonceAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, 5);
const msgStorageSlotAfterSigning = await hre.ethers.provider.getStorageAt(safe.address, expectedStorageSlot);
expect(await safe.signedMessages(safeInternalMsgHash)).to.be.eq(1);
expect(masterCopyAddressBeforeSigning).to.be.eq(masterCopyAddressAfterSigning);
expect(thresholdBeforeSigning).to.be.eq(thresholdAfterSigning);
expect(ownerCountBeforeSigning).to.be.eq(ownerCountAfterSigning);
expect(nonceAfterSigning).to.be.eq(`0x${"1".padStart(64, "0")}`);
expect(msgStorageSlotAfterSigning).to.be.eq(`0x${"1".padStart(64, "0")}`);
});
});
});