mirror of
https://github.com/Instadapp/Gelato-automations.git
synced 2024-07-29 22:28:07 +00:00
fix: hardhat-gas-reporter and codechecks accuracy
This commit is contained in:
parent
05b2d62a15
commit
5e81d8ce75
|
@ -20,7 +20,7 @@ jobs: # a collection of steps
|
||||||
- ./node_modules
|
- ./node_modules
|
||||||
- restore_cache: # restore hardhat compile cache
|
- restore_cache: # restore hardhat compile cache
|
||||||
name: Restore Hardhat Compilation Cache
|
name: Restore Hardhat Compilation Cache
|
||||||
key: solidity-files-cache-
|
key: solidity-files-cache-{{ checksum "./cache/solidity-files-cache.json" }}
|
||||||
- run: # Compile
|
- run: # Compile
|
||||||
name: Compile
|
name: Compile
|
||||||
command: yarn compile
|
command: yarn compile
|
||||||
|
@ -37,13 +37,13 @@ jobs: # a collection of steps
|
||||||
command: yarn lint
|
command: yarn lint
|
||||||
- restore_cache: # restore the Hardhat Network Fork Cache
|
- restore_cache: # restore the Hardhat Network Fork Cache
|
||||||
name: Restore Hardhat Network Fork Cache
|
name: Restore Hardhat Network Fork Cache
|
||||||
key: v4-hardhat-network-fork-cache
|
key: v5-hardhat-network-fork-cache
|
||||||
- run: # Tests
|
- run: # Tests
|
||||||
name: Tests using hardhat mainnet fork and gas reporter
|
name: Tests using hardhat mainnet fork and gas reporter
|
||||||
command: yarn test:gas
|
command: yarn test:gas
|
||||||
- save_cache: # special step to save the Hardhat Network Fork cache
|
- save_cache: # special step to save the Hardhat Network Fork cache
|
||||||
name: Save Hardhat Network Fork Cache
|
name: Save Hardhat Network Fork Cache
|
||||||
key: v4-hardhat-network-fork-cache
|
key: v5-hardhat-network-fork-cache
|
||||||
paths:
|
paths:
|
||||||
- ./cache/hardhat-network-fork
|
- ./cache/hardhat-network-fork
|
||||||
- run: # Codechecks
|
- run: # Codechecks
|
||||||
|
|
2
.vscode/settings.json
vendored
2
.vscode/settings.json
vendored
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
"editor.defaultFormatter": "esbenp.prettier-vscode",
|
"editor.defaultFormatter": "esbenp.prettier-vscode",
|
||||||
// Solidity
|
// Solidity
|
||||||
"solidity.compileUsingRemoteVersion": "0.7.4",
|
"solidity.compileUsingRemoteVersion": "v0.7.4+commit.3f05b770",
|
||||||
"solidity.enableLocalNodeCompiler": false,
|
"solidity.enableLocalNodeCompiler": false,
|
||||||
"solidity.formatter": "prettier",
|
"solidity.formatter": "prettier",
|
||||||
"solidity.linter": "solhint",
|
"solidity.linter": "solhint",
|
||||||
|
|
|
@ -19,7 +19,8 @@ import {
|
||||||
} from "../../constants/CInstaDapp.sol";
|
} from "../../constants/CInstaDapp.sol";
|
||||||
import {
|
import {
|
||||||
_getMakerVaultDebt,
|
_getMakerVaultDebt,
|
||||||
_getMakerVaultCollateralBalance
|
_getMakerVaultCollateralBalance,
|
||||||
|
_isVaultOwner
|
||||||
} from "../../functions/dapps/FMaker.sol";
|
} from "../../functions/dapps/FMaker.sol";
|
||||||
import {
|
import {
|
||||||
_encodeFlashPayback
|
_encodeFlashPayback
|
||||||
|
@ -40,17 +41,23 @@ import {
|
||||||
} from "../../functions/InstaDapp/connectors/FConnectCompound.sol";
|
} from "../../functions/InstaDapp/connectors/FConnectCompound.sol";
|
||||||
import {_getGelatoExecutorFees} from "../../functions/gelato/FGelato.sol";
|
import {_getGelatoExecutorFees} from "../../functions/gelato/FGelato.sol";
|
||||||
import {
|
import {
|
||||||
|
_getFlashLoanRoute,
|
||||||
_getGasCostMakerToMaker,
|
_getGasCostMakerToMaker,
|
||||||
_getGasCostMakerToCompound,
|
_getGasCostMakerToCompound,
|
||||||
_getRealisedDebt
|
_getRealisedDebt
|
||||||
} from "../../functions/gelato/FGelatoDebtBridge.sol";
|
} from "../../functions/gelato/FGelatoDebtBridge.sol";
|
||||||
|
import {
|
||||||
|
DataFlow
|
||||||
|
} from "@gelatonetwork/core/contracts/gelato_core/interfaces/IGelatoCore.sol";
|
||||||
|
|
||||||
contract MockConnectGelatoDataFullRefinanceMaker is ConnectorInterface {
|
contract MockConnectGelatoDataFullMakerToMaker is ConnectorInterface {
|
||||||
using GelatoBytes for bytes;
|
using GelatoBytes for bytes;
|
||||||
|
|
||||||
|
string public constant OK = "OK";
|
||||||
|
|
||||||
// solhint-disable const-name-snakecase
|
// solhint-disable const-name-snakecase
|
||||||
string public constant override name =
|
string public constant override name =
|
||||||
"MockConnectGelatoDataFullRefinanceMaker-v1.0";
|
"MockConnectGelatoDataFullMakerToMaker-v1.0";
|
||||||
uint256 internal immutable _id;
|
uint256 internal immutable _id;
|
||||||
address internal immutable _connectGelatoExecutorPayment;
|
address internal immutable _connectGelatoExecutorPayment;
|
||||||
|
|
||||||
|
@ -69,15 +76,39 @@ contract MockConnectGelatoDataFullRefinanceMaker is ConnectorInterface {
|
||||||
(_type, id) = (1, _id); // Should put specific value.
|
(_type, id) = (1, _id); // Should put specific value.
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ====== ACTION TERMS CHECK ==========
|
||||||
|
// Overriding IGelatoAction's function (optional)
|
||||||
|
function termsOk(
|
||||||
|
uint256, // taskReceipId
|
||||||
|
address _dsa,
|
||||||
|
bytes calldata _actionData,
|
||||||
|
DataFlow,
|
||||||
|
uint256, // value
|
||||||
|
uint256 // cycleId
|
||||||
|
) public view returns (string memory) {
|
||||||
|
(, uint256 vaultAId, , , ) =
|
||||||
|
abi.decode(
|
||||||
|
_actionData[4:],
|
||||||
|
(uint256, uint256, uint256, address, string)
|
||||||
|
);
|
||||||
|
|
||||||
|
if (vaultAId == 0)
|
||||||
|
return "ConnectGelatoDataFullMakerToMaker: Vault A Id is not valid";
|
||||||
|
if (!_isVaultOwner(vaultAId, _dsa))
|
||||||
|
return
|
||||||
|
"ConnectGelatoDataFullMakerToMaker: Vault A not owned by dsa";
|
||||||
|
return OK;
|
||||||
|
}
|
||||||
|
|
||||||
/// @notice Entry Point for DSA.cast DebtBridge from e.g ETH-A to ETH-B
|
/// @notice Entry Point for DSA.cast DebtBridge from e.g ETH-A to ETH-B
|
||||||
/// @dev payable to be compatible in conjunction with DSA.cast payable target
|
/// @dev payable to be compatible in conjunction with DSA.cast payable target
|
||||||
/// @param _route we mock this behavior for gas-reporter testing
|
/// @param _mockRoute we mock this behavior for gas-reporter testing
|
||||||
/// @param _vaultAId Id of the unsafe vault of the client of Vault A Collateral.
|
/// @param _vaultAId Id of the unsafe vault of the client of Vault A Collateral.
|
||||||
/// @param _vaultBId Id of the vault B Collateral of the client.
|
/// @param _vaultBId Id of the vault B Collateral of the client.
|
||||||
/// @param _colToken vault's col token address .
|
/// @param _colToken vault's col token address .
|
||||||
/// @param _colType colType of the new vault. example : ETH-B, ETH-A.
|
/// @param _colType colType of the new vault. example : ETH-B, ETH-A.
|
||||||
function getDataAndCastMakerToMaker(
|
function getDataAndCastMakerToMaker(
|
||||||
uint256 _route,
|
uint256 _mockRoute,
|
||||||
uint256 _vaultAId,
|
uint256 _vaultAId,
|
||||||
uint256 _vaultBId,
|
uint256 _vaultBId,
|
||||||
address _colToken,
|
address _colToken,
|
||||||
|
@ -85,7 +116,7 @@ contract MockConnectGelatoDataFullRefinanceMaker is ConnectorInterface {
|
||||||
) external payable {
|
) external payable {
|
||||||
(address[] memory targets, bytes[] memory datas) =
|
(address[] memory targets, bytes[] memory datas) =
|
||||||
_dataMakerToMaker(
|
_dataMakerToMaker(
|
||||||
_route,
|
_mockRoute,
|
||||||
_vaultAId,
|
_vaultAId,
|
||||||
_vaultBId,
|
_vaultBId,
|
||||||
_colToken,
|
_colToken,
|
||||||
|
@ -95,22 +126,6 @@ contract MockConnectGelatoDataFullRefinanceMaker is ConnectorInterface {
|
||||||
_cast(targets, datas);
|
_cast(targets, datas);
|
||||||
}
|
}
|
||||||
|
|
||||||
/// @notice Entry Point for DSA.cast DebtBridge from Maker to Compound
|
|
||||||
/// @dev payable to be compatible in conjunction with DSA.cast payable target
|
|
||||||
/// @param _route we mock this behavior for gas-reporter testing
|
|
||||||
/// @param _vaultId Id of the unsafe vault of the client.
|
|
||||||
/// @param _colToken vault's col token address .
|
|
||||||
function getDataAndCastMakerToCompound(
|
|
||||||
uint256 _route,
|
|
||||||
uint256 _vaultId,
|
|
||||||
address _colToken
|
|
||||||
) external payable {
|
|
||||||
(address[] memory targets, bytes[] memory datas) =
|
|
||||||
_dataMakerToCompound(_route, _vaultId, _colToken);
|
|
||||||
|
|
||||||
_cast(targets, datas);
|
|
||||||
}
|
|
||||||
|
|
||||||
function _cast(address[] memory targets, bytes[] memory datas) internal {
|
function _cast(address[] memory targets, bytes[] memory datas) internal {
|
||||||
// Instapool V2 / FlashLoan call
|
// Instapool V2 / FlashLoan call
|
||||||
bytes memory castData =
|
bytes memory castData =
|
||||||
|
@ -120,20 +135,20 @@ contract MockConnectGelatoDataFullRefinanceMaker is ConnectorInterface {
|
||||||
datas,
|
datas,
|
||||||
msg.sender // msg.sender == GelatoCore
|
msg.sender // msg.sender == GelatoCore
|
||||||
);
|
);
|
||||||
|
|
||||||
(bool success, bytes memory returndata) =
|
(bool success, bytes memory returndata) =
|
||||||
address(this).delegatecall(castData);
|
address(this).delegatecall(castData);
|
||||||
if (!success) {
|
if (!success) {
|
||||||
returndata.revertWithError(
|
returndata.revertWithError(
|
||||||
"ConnectGelatoDataFullRefinanceMaker._cast:"
|
"ConnectGelatoDataFullMakerToMaker._cast:"
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* solhint-disable function-max-lines */
|
/* solhint-disable function-max-lines */
|
||||||
|
|
||||||
// @param _route we mock this behavior for gas-reporter testing
|
|
||||||
function _dataMakerToMaker(
|
function _dataMakerToMaker(
|
||||||
uint256 _route,
|
uint256 _mockRoute,
|
||||||
uint256 _vaultAId,
|
uint256 _vaultAId,
|
||||||
uint256 _vaultBId,
|
uint256 _vaultBId,
|
||||||
address _colToken,
|
address _colToken,
|
||||||
|
@ -142,10 +157,16 @@ contract MockConnectGelatoDataFullRefinanceMaker is ConnectorInterface {
|
||||||
targets = new address[](1);
|
targets = new address[](1);
|
||||||
targets[0] = INSTA_POOL_V2;
|
targets[0] = INSTA_POOL_V2;
|
||||||
|
|
||||||
|
_vaultBId = _isVaultOwner(_vaultBId, address(this)) ? _vaultBId : 0;
|
||||||
|
|
||||||
uint256 wDaiToBorrow = _getRealisedDebt(_getMakerVaultDebt(_vaultAId));
|
uint256 wDaiToBorrow = _getRealisedDebt(_getMakerVaultDebt(_vaultAId));
|
||||||
uint256 wColToWithdrawFromMaker =
|
uint256 wColToWithdrawFromMaker =
|
||||||
_getMakerVaultCollateralBalance(_vaultAId);
|
_getMakerVaultCollateralBalance(_vaultAId);
|
||||||
uint256 route = _route;
|
uint256 route = _getFlashLoanRoute(DAI, wDaiToBorrow);
|
||||||
|
|
||||||
|
// Mock Route
|
||||||
|
route = _mockRoute;
|
||||||
|
|
||||||
uint256 gasCost = _getGasCostMakerToMaker(_vaultBId == 0, route);
|
uint256 gasCost = _getGasCostMakerToMaker(_vaultBId == 0, route);
|
||||||
uint256 gasFeesPaidFromCol = _getGelatoExecutorFees(gasCost);
|
uint256 gasFeesPaidFromCol = _getGelatoExecutorFees(gasCost);
|
||||||
|
|
||||||
|
@ -240,52 +261,5 @@ contract MockConnectGelatoDataFullRefinanceMaker is ConnectorInterface {
|
||||||
datas[5] = _encodeFlashPayback(DAI, _wDaiToBorrow, 0, 0);
|
datas[5] = _encodeFlashPayback(DAI, _wDaiToBorrow, 0, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
// @param _route we mock this behavior for gas-reporter testing
|
|
||||||
function _dataMakerToCompound(
|
|
||||||
uint256 _route,
|
|
||||||
uint256 _vaultId,
|
|
||||||
address _colToken
|
|
||||||
) internal view returns (address[] memory targets, bytes[] memory datas) {
|
|
||||||
targets = new address[](1);
|
|
||||||
targets[0] = INSTA_POOL_V2;
|
|
||||||
|
|
||||||
uint256 wDaiToBorrow = _getRealisedDebt(_getMakerVaultDebt(_vaultId));
|
|
||||||
uint256 wColToWithdrawFromMaker =
|
|
||||||
_getMakerVaultCollateralBalance(_vaultId);
|
|
||||||
uint256 route = _route;
|
|
||||||
uint256 gasCost = _getGasCostMakerToCompound(route);
|
|
||||||
uint256 gasFeesPaidFromCol = _getGelatoExecutorFees(gasCost);
|
|
||||||
|
|
||||||
address[] memory _targets = new address[](6);
|
|
||||||
_targets[0] = CONNECT_MAKER; // payback
|
|
||||||
_targets[1] = CONNECT_MAKER; // withdraw
|
|
||||||
_targets[2] = CONNECT_COMPOUND; // deposit
|
|
||||||
_targets[3] = CONNECT_COMPOUND; // borrow
|
|
||||||
_targets[4] = _connectGelatoExecutorPayment; // payExecutor
|
|
||||||
_targets[5] = INSTA_POOL_V2; // flashPayback
|
|
||||||
|
|
||||||
bytes[] memory _datas = new bytes[](6);
|
|
||||||
_datas[0] = _encodePaybackMakerVault(_vaultId, uint256(-1), 0, 600);
|
|
||||||
_datas[1] = _encodedWithdrawMakerVault(_vaultId, uint256(-1), 0, 0);
|
|
||||||
_datas[2] = _encodeDepositCompound(
|
|
||||||
_colToken,
|
|
||||||
sub(wColToWithdrawFromMaker, gasFeesPaidFromCol),
|
|
||||||
0,
|
|
||||||
0
|
|
||||||
);
|
|
||||||
_datas[3] = _encodeBorrowCompound(DAI, 0, 600, 0);
|
|
||||||
_datas[4] = _encodePayExecutor(_colToken, gasFeesPaidFromCol, 0, 0);
|
|
||||||
_datas[5] = _encodeFlashPayback(DAI, wDaiToBorrow, 0, 0);
|
|
||||||
|
|
||||||
datas = new bytes[](1);
|
|
||||||
datas[0] = abi.encodeWithSelector(
|
|
||||||
IConnectInstaPoolV2.flashBorrowAndCast.selector,
|
|
||||||
DAI,
|
|
||||||
wDaiToBorrow,
|
|
||||||
route,
|
|
||||||
abi.encode(_targets, _datas)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* solhint-enable function-max-lines */
|
/* solhint-enable function-max-lines */
|
||||||
}
|
}
|
|
@ -4,9 +4,9 @@ pragma solidity 0.7.4;
|
||||||
import {
|
import {
|
||||||
IConnectGelatoExecutorPayment
|
IConnectGelatoExecutorPayment
|
||||||
} from "../../interfaces/InstaDapp/connectors/IConnectGelatoExecutorPayment.sol";
|
} from "../../interfaces/InstaDapp/connectors/IConnectGelatoExecutorPayment.sol";
|
||||||
import {Address} from "../../vendor/Address.sol";
|
import {Address} from "@openzeppelin/contracts/utils/Address.sol";
|
||||||
import {IERC20} from "../../vendor/IERC20.sol";
|
import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol";
|
||||||
import {SafeERC20} from "../../vendor/SafeERC20.sol";
|
import {SafeERC20} from "@openzeppelin/contracts/token/ERC20/SafeERC20.sol";
|
||||||
import {_getUint, _setUint} from "../../functions/InstaDapp/FInstaDapp.sol";
|
import {_getUint, _setUint} from "../../functions/InstaDapp/FInstaDapp.sol";
|
||||||
import {ETH} from "../../constants/CInstaDapp.sol";
|
import {ETH} from "../../constants/CInstaDapp.sol";
|
||||||
|
|
||||||
|
|
|
@ -4,7 +4,7 @@ pragma solidity 0.7.4;
|
||||||
import {
|
import {
|
||||||
GelatoConditionsStandard
|
GelatoConditionsStandard
|
||||||
} from "@gelatonetwork/core/contracts/conditions/GelatoConditionsStandard.sol";
|
} from "@gelatonetwork/core/contracts/conditions/GelatoConditionsStandard.sol";
|
||||||
import {SafeMath} from "../../../vendor/SafeMath.sol";
|
import {SafeMath} from "@openzeppelin/contracts/math/SafeMath.sol";
|
||||||
import {
|
import {
|
||||||
IGelatoCore
|
IGelatoCore
|
||||||
} from "@gelatonetwork/core/contracts/gelato_core/interfaces/IGelatoCore.sol";
|
} from "@gelatonetwork/core/contracts/gelato_core/interfaces/IGelatoCore.sol";
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
pragma solidity 0.7.4;
|
pragma solidity 0.7.4;
|
||||||
pragma experimental ABIEncoderV2;
|
pragma experimental ABIEncoderV2;
|
||||||
|
|
||||||
import {Ownable} from "../../vendor/Ownable.sol";
|
import {Ownable} from "@openzeppelin/contracts/access/Ownable.sol";
|
||||||
import {GelatoBytes} from "../../lib/GelatoBytes.sol";
|
import {GelatoBytes} from "../../lib/GelatoBytes.sol";
|
||||||
|
|
||||||
/// @title PriceOracleResolver
|
/// @title PriceOracleResolver
|
||||||
|
|
175
contracts/vendor/Address.sol
vendored
175
contracts/vendor/Address.sol
vendored
|
@ -1,175 +0,0 @@
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
pragma solidity 0.7.4;
|
|
||||||
|
|
||||||
library Address {
|
|
||||||
/**
|
|
||||||
* @dev Returns true if `account` is a contract.
|
|
||||||
*
|
|
||||||
* [IMPORTANT]
|
|
||||||
* ====
|
|
||||||
* It is unsafe to assume that an address for which this function returns
|
|
||||||
* false is an externally-owned account (EOA) and not a contract.
|
|
||||||
*
|
|
||||||
* Among others, `isContract` will return false for the following
|
|
||||||
* types of addresses:
|
|
||||||
*
|
|
||||||
* - an externally-owned account
|
|
||||||
* - a contract in construction
|
|
||||||
* - an address where a contract will be created
|
|
||||||
* - an address where a contract lived, but was destroyed
|
|
||||||
* ====
|
|
||||||
*/
|
|
||||||
function isContract(address account) internal view returns (bool) {
|
|
||||||
// This method relies on extcodesize, which returns 0 for contracts in
|
|
||||||
// construction, since the code is only stored at the end of the
|
|
||||||
// constructor execution.
|
|
||||||
|
|
||||||
uint256 size;
|
|
||||||
// solhint-disable-next-line no-inline-assembly
|
|
||||||
assembly {
|
|
||||||
size := extcodesize(account)
|
|
||||||
}
|
|
||||||
return size > 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Replacement for Solidity's `transfer`: sends `amount` wei to
|
|
||||||
* `recipient`, forwarding all available gas and reverting on errors.
|
|
||||||
*
|
|
||||||
* https://eips.ethereum.org/EIPS/eip-1884[EIP1884] increases the gas cost
|
|
||||||
* of certain opcodes, possibly making contracts go over the 2300 gas limit
|
|
||||||
* imposed by `transfer`, making them unable to receive funds via
|
|
||||||
* `transfer`. {sendValue} removes this limitation.
|
|
||||||
*
|
|
||||||
* https://diligence.consensys.net/posts/2019/09/stop-using-soliditys-transfer-now/[Learn more].
|
|
||||||
*
|
|
||||||
* IMPORTANT: because control is transferred to `recipient`, care must be
|
|
||||||
* taken to not create reentrancy vulnerabilities. Consider using
|
|
||||||
* {ReentrancyGuard} or the
|
|
||||||
* https://solidity.readthedocs.io/en/v0.5.11/security-considerations.html#use-the-checks-effects-interactions-pattern[checks-effects-interactions pattern].
|
|
||||||
*/
|
|
||||||
function sendValue(address payable recipient, uint256 amount) internal {
|
|
||||||
require(
|
|
||||||
address(this).balance >= amount,
|
|
||||||
"Address: insufficient balance"
|
|
||||||
);
|
|
||||||
|
|
||||||
// solhint-disable-next-line avoid-low-level-calls, avoid-call-value
|
|
||||||
(bool success, ) = recipient.call{value: amount}("");
|
|
||||||
require(
|
|
||||||
success,
|
|
||||||
"Address: unable to send value, recipient may have reverted"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Performs a Solidity function call using a low level `call`. A
|
|
||||||
* plain`call` is an unsafe replacement for a function call: use this
|
|
||||||
* function instead.
|
|
||||||
*
|
|
||||||
* If `target` reverts with a revert reason, it is bubbled up by this
|
|
||||||
* function (like regular Solidity function calls).
|
|
||||||
*
|
|
||||||
* Returns the raw returned data. To convert to the expected return value,
|
|
||||||
* use https://solidity.readthedocs.io/en/latest/units-and-global-variables.html?highlight=abi.decode#abi-encoding-and-decoding-functions[`abi.decode`].
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - `target` must be a contract.
|
|
||||||
* - calling `target` with `data` must not revert.
|
|
||||||
*
|
|
||||||
* _Available since v3.1._
|
|
||||||
*/
|
|
||||||
function functionCall(address target, bytes memory data)
|
|
||||||
internal
|
|
||||||
returns (bytes memory)
|
|
||||||
{
|
|
||||||
return functionCall(target, data, "Address: low-level call failed");
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Same as {xref-Address-functionCall-address-bytes-}[`functionCall`], but with
|
|
||||||
* `errorMessage` as a fallback revert reason when `target` reverts.
|
|
||||||
*
|
|
||||||
* _Available since v3.1._
|
|
||||||
*/
|
|
||||||
function functionCall(
|
|
||||||
address target,
|
|
||||||
bytes memory data,
|
|
||||||
string memory errorMessage
|
|
||||||
) internal returns (bytes memory) {
|
|
||||||
return functionCallWithValue(target, data, 0, errorMessage);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Same as {xref-Address-functionCall-address-bytes-}[`functionCall`],
|
|
||||||
* but also transferring `value` wei to `target`.
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - the calling contract must have an ETH balance of at least `value`.
|
|
||||||
* - the called Solidity function must be `payable`.
|
|
||||||
*
|
|
||||||
* _Available since v3.1._
|
|
||||||
*/
|
|
||||||
function functionCallWithValue(
|
|
||||||
address target,
|
|
||||||
bytes memory data,
|
|
||||||
uint256 value
|
|
||||||
) internal returns (bytes memory) {
|
|
||||||
return
|
|
||||||
functionCallWithValue(
|
|
||||||
target,
|
|
||||||
data,
|
|
||||||
value,
|
|
||||||
"Address: low-level call with value failed"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Same as {xref-Address-functionCallWithValue-address-bytes-uint256-}[`functionCallWithValue`], but
|
|
||||||
* with `errorMessage` as a fallback revert reason when `target` reverts.
|
|
||||||
*
|
|
||||||
* _Available since v3.1._
|
|
||||||
*/
|
|
||||||
function functionCallWithValue(
|
|
||||||
address target,
|
|
||||||
bytes memory data,
|
|
||||||
uint256 value,
|
|
||||||
string memory errorMessage
|
|
||||||
) internal returns (bytes memory) {
|
|
||||||
require(
|
|
||||||
address(this).balance >= value,
|
|
||||||
"Address: insufficient balance for call"
|
|
||||||
);
|
|
||||||
require(isContract(target), "Address: call to non-contract");
|
|
||||||
|
|
||||||
// solhint-disable-next-line avoid-low-level-calls
|
|
||||||
(bool success, bytes memory returndata) =
|
|
||||||
target.call{value: value}(data);
|
|
||||||
return _verifyCallResult(success, returndata, errorMessage);
|
|
||||||
}
|
|
||||||
|
|
||||||
function _verifyCallResult(
|
|
||||||
bool success,
|
|
||||||
bytes memory returndata,
|
|
||||||
string memory errorMessage
|
|
||||||
) private pure returns (bytes memory) {
|
|
||||||
if (success) {
|
|
||||||
return returndata;
|
|
||||||
} else {
|
|
||||||
// Look for revert reason and bubble it up if present
|
|
||||||
if (returndata.length > 0) {
|
|
||||||
// The easiest way to bubble the revert reason is using memory via assembly
|
|
||||||
|
|
||||||
// solhint-disable-next-line no-inline-assembly
|
|
||||||
assembly {
|
|
||||||
let returndata_size := mload(returndata)
|
|
||||||
revert(add(32, returndata), returndata_size)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
revert(errorMessage);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
89
contracts/vendor/IERC20.sol
vendored
89
contracts/vendor/IERC20.sol
vendored
|
@ -1,89 +0,0 @@
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
pragma solidity 0.7.4;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Interface of the ERC20 standard as defined in the EIP.
|
|
||||||
*/
|
|
||||||
interface IERC20 {
|
|
||||||
/**
|
|
||||||
* @dev Returns the amount of tokens in existence.
|
|
||||||
*/
|
|
||||||
function totalSupply() external view returns (uint256);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the amount of tokens owned by `account`.
|
|
||||||
*/
|
|
||||||
function balanceOf(address account) external view returns (uint256);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Moves `amount` tokens from the caller's account to `recipient`.
|
|
||||||
*
|
|
||||||
* Returns a boolean value indicating whether the operation succeeded.
|
|
||||||
*
|
|
||||||
* Emits a {Transfer} event.
|
|
||||||
*/
|
|
||||||
function transfer(address recipient, uint256 amount)
|
|
||||||
external
|
|
||||||
returns (bool);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the remaining number of tokens that `spender` will be
|
|
||||||
* allowed to spend on behalf of `owner` through {transferFrom}. This is
|
|
||||||
* zero by default.
|
|
||||||
*
|
|
||||||
* This value changes when {approve} or {transferFrom} are called.
|
|
||||||
*/
|
|
||||||
function allowance(address owner, address spender)
|
|
||||||
external
|
|
||||||
view
|
|
||||||
returns (uint256);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Sets `amount` as the allowance of `spender` over the caller's tokens.
|
|
||||||
*
|
|
||||||
* Returns a boolean value indicating whether the operation succeeded.
|
|
||||||
*
|
|
||||||
* IMPORTANT: Beware that changing an allowance with this method brings the risk
|
|
||||||
* that someone may use both the old and the new allowance by unfortunate
|
|
||||||
* transaction ordering. One possible solution to mitigate this race
|
|
||||||
* condition is to first reduce the spender's allowance to 0 and set the
|
|
||||||
* desired value afterwards:
|
|
||||||
* https://github.com/ethereum/EIPs/issues/20#issuecomment-263524729
|
|
||||||
*
|
|
||||||
* Emits an {Approval} event.
|
|
||||||
*/
|
|
||||||
function approve(address spender, uint256 amount) external returns (bool);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Moves `amount` tokens from `sender` to `recipient` using the
|
|
||||||
* allowance mechanism. `amount` is then deducted from the caller's
|
|
||||||
* allowance.
|
|
||||||
*
|
|
||||||
* Returns a boolean value indicating whether the operation succeeded.
|
|
||||||
*
|
|
||||||
* Emits a {Transfer} event.
|
|
||||||
*/
|
|
||||||
function transferFrom(
|
|
||||||
address sender,
|
|
||||||
address recipient,
|
|
||||||
uint256 amount
|
|
||||||
) external returns (bool);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Emitted when `value` tokens are moved from one account (`from`) to
|
|
||||||
* another (`to`).
|
|
||||||
*
|
|
||||||
* Note that `value` may be zero.
|
|
||||||
*/
|
|
||||||
event Transfer(address indexed from, address indexed to, uint256 value);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Emitted when the allowance of a `spender` for an `owner` is set by
|
|
||||||
* a call to {approve}. `value` is the new allowance.
|
|
||||||
*/
|
|
||||||
event Approval(
|
|
||||||
address indexed owner,
|
|
||||||
address indexed spender,
|
|
||||||
uint256 value
|
|
||||||
);
|
|
||||||
}
|
|
82
contracts/vendor/Ownable.sol
vendored
82
contracts/vendor/Ownable.sol
vendored
|
@ -1,82 +0,0 @@
|
||||||
// "SPDX-License-Identifier: MIT"
|
|
||||||
pragma solidity 0.7.4;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Contract module which provides a basic access control mechanism, where
|
|
||||||
* there is an account (an owner) that can be granted exclusive access to
|
|
||||||
* specific functions.
|
|
||||||
*
|
|
||||||
* This module is used through inheritance. It will make available the modifier
|
|
||||||
* `onlyOwner`, which can be applied to your functions to restrict their use to
|
|
||||||
* the owner.
|
|
||||||
*/
|
|
||||||
abstract contract Ownable {
|
|
||||||
address private _owner;
|
|
||||||
|
|
||||||
event OwnershipTransferred(
|
|
||||||
address indexed previousOwner,
|
|
||||||
address indexed newOwner
|
|
||||||
);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Initializes the contract setting the deployer as the initial owner.
|
|
||||||
*/
|
|
||||||
constructor() {
|
|
||||||
_owner = msg.sender;
|
|
||||||
emit OwnershipTransferred(address(0), _owner);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the address of the current owner.
|
|
||||||
*/
|
|
||||||
function owner() public view returns (address) {
|
|
||||||
return _owner;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Throws if called by any account other than the owner.
|
|
||||||
*/
|
|
||||||
modifier onlyOwner() {
|
|
||||||
require(isOwner(), "Ownable: caller is not the owner");
|
|
||||||
_;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns true if the caller is the current owner.
|
|
||||||
*/
|
|
||||||
function isOwner() public view returns (bool) {
|
|
||||||
return msg.sender == _owner;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Leaves the contract without owner. It will not be possible to call
|
|
||||||
* `onlyOwner` functions anymore. Can only be called by the current owner.
|
|
||||||
*
|
|
||||||
* NOTE: Renouncing ownership will leave the contract without an owner,
|
|
||||||
* thereby removing any functionality that is only available to the owner.
|
|
||||||
*/
|
|
||||||
function renounceOwnership() public virtual onlyOwner {
|
|
||||||
emit OwnershipTransferred(_owner, address(0));
|
|
||||||
_owner = address(0);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Transfers ownership of the contract to a new account (`newOwner`).
|
|
||||||
* Can only be called by the current owner.
|
|
||||||
*/
|
|
||||||
function transferOwnership(address newOwner) public virtual onlyOwner {
|
|
||||||
_transferOwnership(newOwner);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Transfers ownership of the contract to a new account (`newOwner`).
|
|
||||||
*/
|
|
||||||
function _transferOwnership(address newOwner) internal virtual {
|
|
||||||
require(
|
|
||||||
newOwner != address(0),
|
|
||||||
"Ownable: new owner is the zero address"
|
|
||||||
);
|
|
||||||
emit OwnershipTransferred(_owner, newOwner);
|
|
||||||
_owner = newOwner;
|
|
||||||
}
|
|
||||||
}
|
|
132
contracts/vendor/SafeERC20.sol
vendored
132
contracts/vendor/SafeERC20.sol
vendored
|
@ -1,132 +0,0 @@
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
pragma solidity 0.7.4;
|
|
||||||
|
|
||||||
import {IERC20} from "./IERC20.sol";
|
|
||||||
import {SafeMath} from "./SafeMath.sol";
|
|
||||||
import {Address} from "./Address.sol";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @title SafeERC20
|
|
||||||
* @dev Wrappers around ERC20 operations that throw on failure (when the token
|
|
||||||
* contract returns false). Tokens that return no value (and instead revert or
|
|
||||||
* throw on failure) are also supported, non-reverting calls are assumed to be
|
|
||||||
* successful.
|
|
||||||
* To use this library you can add a `using SafeERC20 for IERC20;` statement to your contract,
|
|
||||||
* which allows you to call the safe operations as `token.safeTransfer(...)`, etc.
|
|
||||||
*/
|
|
||||||
library SafeERC20 {
|
|
||||||
using SafeMath for uint256;
|
|
||||||
using Address for address;
|
|
||||||
|
|
||||||
function safeTransfer(
|
|
||||||
IERC20 token,
|
|
||||||
address to,
|
|
||||||
uint256 value
|
|
||||||
) internal {
|
|
||||||
_callOptionalReturn(
|
|
||||||
token,
|
|
||||||
abi.encodeWithSelector(token.transfer.selector, to, value)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
function safeTransferFrom(
|
|
||||||
IERC20 token,
|
|
||||||
address from,
|
|
||||||
address to,
|
|
||||||
uint256 value
|
|
||||||
) internal {
|
|
||||||
_callOptionalReturn(
|
|
||||||
token,
|
|
||||||
abi.encodeWithSelector(token.transferFrom.selector, from, to, value)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Deprecated. This function has issues similar to the ones found in
|
|
||||||
* {IERC20-approve}, and its usage is discouraged.
|
|
||||||
*
|
|
||||||
* Whenever possible, use {safeIncreaseAllowance} and
|
|
||||||
* {safeDecreaseAllowance} instead.
|
|
||||||
*/
|
|
||||||
function safeApprove(
|
|
||||||
IERC20 token,
|
|
||||||
address spender,
|
|
||||||
uint256 value
|
|
||||||
) internal {
|
|
||||||
// safeApprove should only be called when setting an initial allowance,
|
|
||||||
// or when resetting it to zero. To increase and decrease it, use
|
|
||||||
// 'safeIncreaseAllowance' and 'safeDecreaseAllowance'
|
|
||||||
// solhint-disable-next-line max-line-length
|
|
||||||
require(
|
|
||||||
(value == 0) || (token.allowance(address(this), spender) == 0),
|
|
||||||
"SafeERC20: approve from non-zero to non-zero allowance"
|
|
||||||
);
|
|
||||||
_callOptionalReturn(
|
|
||||||
token,
|
|
||||||
abi.encodeWithSelector(token.approve.selector, spender, value)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
function safeIncreaseAllowance(
|
|
||||||
IERC20 token,
|
|
||||||
address spender,
|
|
||||||
uint256 value
|
|
||||||
) internal {
|
|
||||||
uint256 newAllowance =
|
|
||||||
token.allowance(address(this), spender).add(value);
|
|
||||||
_callOptionalReturn(
|
|
||||||
token,
|
|
||||||
abi.encodeWithSelector(
|
|
||||||
token.approve.selector,
|
|
||||||
spender,
|
|
||||||
newAllowance
|
|
||||||
)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
function safeDecreaseAllowance(
|
|
||||||
IERC20 token,
|
|
||||||
address spender,
|
|
||||||
uint256 value
|
|
||||||
) internal {
|
|
||||||
uint256 newAllowance =
|
|
||||||
token.allowance(address(this), spender).sub(
|
|
||||||
value,
|
|
||||||
"SafeERC20: decreased allowance below zero"
|
|
||||||
);
|
|
||||||
_callOptionalReturn(
|
|
||||||
token,
|
|
||||||
abi.encodeWithSelector(
|
|
||||||
token.approve.selector,
|
|
||||||
spender,
|
|
||||||
newAllowance
|
|
||||||
)
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Imitates a Solidity high-level call (i.e. a regular function call to a contract), relaxing the requirement
|
|
||||||
* on the return value: the return value is optional (but if data is returned, it must not be false).
|
|
||||||
* @param token The token targeted by the call.
|
|
||||||
* @param data The call data (encoded using abi.encode or one of its variants).
|
|
||||||
*/
|
|
||||||
function _callOptionalReturn(IERC20 token, bytes memory data) private {
|
|
||||||
// We need to perform a low level call here, to bypass Solidity's return data size checking mechanism, since
|
|
||||||
// we're implementing it ourselves. We use {Address.functionCall} to perform this call, which verifies that
|
|
||||||
// the target address contains contract code and also asserts for success in the low-level call.
|
|
||||||
|
|
||||||
bytes memory returndata =
|
|
||||||
address(token).functionCall(
|
|
||||||
data,
|
|
||||||
"SafeERC20: low-level call failed"
|
|
||||||
);
|
|
||||||
if (returndata.length > 0) {
|
|
||||||
// Return data is optional
|
|
||||||
// solhint-disable-next-line max-line-length
|
|
||||||
require(
|
|
||||||
abi.decode(returndata, (bool)),
|
|
||||||
"SafeERC20: ERC20 operation did not succeed"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
170
contracts/vendor/SafeMath.sol
vendored
170
contracts/vendor/SafeMath.sol
vendored
|
@ -1,170 +0,0 @@
|
||||||
// SPDX-License-Identifier: MIT
|
|
||||||
pragma solidity 0.7.4;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Wrappers over Solidity's arithmetic operations with added overflow
|
|
||||||
* checks.
|
|
||||||
*
|
|
||||||
* Arithmetic operations in Solidity wrap on overflow. This can easily result
|
|
||||||
* in bugs, because programmers usually assume that an overflow raises an
|
|
||||||
* error, which is the standard behavior in high level programming languages.
|
|
||||||
* `SafeMath` restores this intuition by reverting the transaction when an
|
|
||||||
* operation overflows.
|
|
||||||
*
|
|
||||||
* Using this library instead of the unchecked operations eliminates an entire
|
|
||||||
* class of bugs, so it's recommended to use it always.
|
|
||||||
*/
|
|
||||||
library SafeMath {
|
|
||||||
/**
|
|
||||||
* @dev Returns the addition of two unsigned integers, reverting on
|
|
||||||
* overflow.
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `+` operator.
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - Addition cannot overflow.
|
|
||||||
*/
|
|
||||||
function add(uint256 a, uint256 b) internal pure returns (uint256) {
|
|
||||||
uint256 c = a + b;
|
|
||||||
require(c >= a, "SafeMath: addition overflow");
|
|
||||||
|
|
||||||
return c;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the subtraction of two unsigned integers, reverting on
|
|
||||||
* overflow (when the result is negative).
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `-` operator.
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - Subtraction cannot overflow.
|
|
||||||
*/
|
|
||||||
function sub(uint256 a, uint256 b) internal pure returns (uint256) {
|
|
||||||
return sub(a, b, "SafeMath: subtraction overflow");
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the subtraction of two unsigned integers, reverting with custom message on
|
|
||||||
* overflow (when the result is negative).
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `-` operator.
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - Subtraction cannot overflow.
|
|
||||||
*/
|
|
||||||
function sub(
|
|
||||||
uint256 a,
|
|
||||||
uint256 b,
|
|
||||||
string memory errorMessage
|
|
||||||
) internal pure returns (uint256) {
|
|
||||||
require(b <= a, errorMessage);
|
|
||||||
uint256 c = a - b;
|
|
||||||
|
|
||||||
return c;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the multiplication of two unsigned integers, reverting on
|
|
||||||
* overflow.
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `*` operator.
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - Multiplication cannot overflow.
|
|
||||||
*/
|
|
||||||
function mul(uint256 a, uint256 b) internal pure returns (uint256) {
|
|
||||||
// Gas optimization: this is cheaper than requiring 'a' not being zero, but the
|
|
||||||
// benefit is lost if 'b' is also tested.
|
|
||||||
// See: https://github.com/OpenZeppelin/openzeppelin-contracts/pull/522
|
|
||||||
if (a == 0) {
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
uint256 c = a * b;
|
|
||||||
require(c / a == b, "SafeMath: multiplication overflow");
|
|
||||||
|
|
||||||
return c;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the integer division of two unsigned integers. Reverts on
|
|
||||||
* division by zero. The result is rounded towards zero.
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `/` operator. Note: this function uses a
|
|
||||||
* `revert` opcode (which leaves remaining gas untouched) while Solidity
|
|
||||||
* uses an invalid opcode to revert (consuming all remaining gas).
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - The divisor cannot be zero.
|
|
||||||
*/
|
|
||||||
function div(uint256 a, uint256 b) internal pure returns (uint256) {
|
|
||||||
return div(a, b, "SafeMath: division by zero");
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the integer division of two unsigned integers. Reverts with custom message on
|
|
||||||
* division by zero. The result is rounded towards zero.
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `/` operator. Note: this function uses a
|
|
||||||
* `revert` opcode (which leaves remaining gas untouched) while Solidity
|
|
||||||
* uses an invalid opcode to revert (consuming all remaining gas).
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - The divisor cannot be zero.
|
|
||||||
*/
|
|
||||||
function div(
|
|
||||||
uint256 a,
|
|
||||||
uint256 b,
|
|
||||||
string memory errorMessage
|
|
||||||
) internal pure returns (uint256) {
|
|
||||||
require(b > 0, errorMessage);
|
|
||||||
uint256 c = a / b;
|
|
||||||
// assert(a == b * c + a % b); // There is no case in which this doesn't hold
|
|
||||||
|
|
||||||
return c;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the remainder of dividing two unsigned integers. (unsigned integer modulo),
|
|
||||||
* Reverts when dividing by zero.
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `%` operator. This function uses a `revert`
|
|
||||||
* opcode (which leaves remaining gas untouched) while Solidity uses an
|
|
||||||
* invalid opcode to revert (consuming all remaining gas).
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - The divisor cannot be zero.
|
|
||||||
*/
|
|
||||||
function mod(uint256 a, uint256 b) internal pure returns (uint256) {
|
|
||||||
return mod(a, b, "SafeMath: modulo by zero");
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @dev Returns the remainder of dividing two unsigned integers. (unsigned integer modulo),
|
|
||||||
* Reverts with custom message when dividing by zero.
|
|
||||||
*
|
|
||||||
* Counterpart to Solidity's `%` operator. This function uses a `revert`
|
|
||||||
* opcode (which leaves remaining gas untouched) while Solidity uses an
|
|
||||||
* invalid opcode to revert (consuming all remaining gas).
|
|
||||||
*
|
|
||||||
* Requirements:
|
|
||||||
*
|
|
||||||
* - The divisor cannot be zero.
|
|
||||||
*/
|
|
||||||
function mod(
|
|
||||||
uint256 a,
|
|
||||||
uint256 b,
|
|
||||||
string memory errorMessage
|
|
||||||
) internal pure returns (uint256) {
|
|
||||||
require(b != 0, errorMessage);
|
|
||||||
return a % b;
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -6,7 +6,7 @@ const InstaConnector = require("../../../pre-compiles/InstaConnectors.json");
|
||||||
module.exports = async (hre) => {
|
module.exports = async (hre) => {
|
||||||
if (hre.network.name === "mainnet") {
|
if (hre.network.name === "mainnet") {
|
||||||
console.log(
|
console.log(
|
||||||
"Deploying MockConnectGelatoDataFullRefinanceMaker to mainnet. Hit ctrl + c to abort"
|
"Deploying MockConnectGelatoDataFullMakerToMaker to mainnet. Hit ctrl + c to abort"
|
||||||
);
|
);
|
||||||
console.log("❗ CONNECTOR DEPLOYMENT: VERIFY & HARDCODE CONNECTOR ID");
|
console.log("❗ CONNECTOR DEPLOYMENT: VERIFY & HARDCODE CONNECTOR ID");
|
||||||
await sleep(6000);
|
await sleep(6000);
|
||||||
|
@ -39,7 +39,7 @@ module.exports = async (hre) => {
|
||||||
const connectorLength = await instaConnectors.connectorLength();
|
const connectorLength = await instaConnectors.connectorLength();
|
||||||
const connectorId = connectorLength.add(1);
|
const connectorId = connectorLength.add(1);
|
||||||
|
|
||||||
await deploy("MockConnectGelatoDataFullRefinanceMaker", {
|
await deploy("MockConnectGelatoDataFullMakerToMaker", {
|
||||||
from: deployer,
|
from: deployer,
|
||||||
args: [
|
args: [
|
||||||
connectorId,
|
connectorId,
|
||||||
|
@ -50,7 +50,7 @@ module.exports = async (hre) => {
|
||||||
await instaConnectors
|
await instaConnectors
|
||||||
.connect(instaMaster)
|
.connect(instaMaster)
|
||||||
.enable(
|
.enable(
|
||||||
(await ethers.getContract("MockConnectGelatoDataFullRefinanceMaker"))
|
(await ethers.getContract("MockConnectGelatoDataFullMakerToMaker"))
|
||||||
.address
|
.address
|
||||||
);
|
);
|
||||||
|
|
||||||
|
@ -59,9 +59,9 @@ module.exports = async (hre) => {
|
||||||
params: [await instaMaster.getAddress()],
|
params: [await instaMaster.getAddress()],
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
// the following will only deploy "MockConnectGelatoDataFullRefinanceMaker"
|
// the following will only deploy "MockConnectGelatoDataFullMakerToMaker"
|
||||||
// if the contract was never deployed or if the code changed since last deployment
|
// if the contract was never deployed or if the code changed since last deployment
|
||||||
await deploy("MockConnectGelatoDataFullRefinanceMaker", {
|
await deploy("MockConnectGelatoDataFullMakerToMaker", {
|
||||||
from: deployer,
|
from: deployer,
|
||||||
args: [
|
args: [
|
||||||
parseInt(process.env.ConnectGelatoDataFullRefinanceMakerId),
|
parseInt(process.env.ConnectGelatoDataFullRefinanceMakerId),
|
||||||
|
@ -80,4 +80,4 @@ module.exports.skip = async (hre) => {
|
||||||
return false;
|
return false;
|
||||||
};
|
};
|
||||||
module.exports.dependencies = ["ConnectGelatoExecutorPayment"];
|
module.exports.dependencies = ["ConnectGelatoExecutorPayment"];
|
||||||
module.exports.tags = ["MockConnectGelatoDataFullRefinanceMaker"];
|
module.exports.tags = ["MockConnectGelatoDataFullMakerToMaker"];
|
10
package.json
10
package.json
|
@ -20,22 +20,22 @@
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@codechecks/client": "0.1.10",
|
"@codechecks/client": "0.1.10",
|
||||||
"@gelatonetwork/core": "1.4.1",
|
"@gelatonetwork/core": "1.4.1",
|
||||||
"@nomiclabs/hardhat-ethers": "2.0.0",
|
"@nomiclabs/hardhat-ethers": "2.0.1",
|
||||||
"@nomiclabs/hardhat-waffle": "2.0.0",
|
"@nomiclabs/hardhat-waffle": "2.0.0",
|
||||||
"@openzeppelin/contracts": "3.2.0",
|
"@openzeppelin/contracts": "3.3.0",
|
||||||
"chai": "4.2.0",
|
"chai": "4.2.0",
|
||||||
"dotenv": "8.2.0",
|
"dotenv": "8.2.0",
|
||||||
"eslint": "7.14.0",
|
"eslint": "7.14.0",
|
||||||
"eslint-config-prettier": "6.15.0",
|
"eslint-config-prettier": "6.15.0",
|
||||||
"ethereum-waffle": "3.2.1",
|
"ethereum-waffle": "3.2.1",
|
||||||
"ethers": "5.0.23",
|
"ethers": "5.0.23",
|
||||||
"hardhat": "2.0.3",
|
"hardhat": "2.0.4",
|
||||||
"hardhat-deploy": "0.7.0-beta.30",
|
"hardhat-deploy": "0.7.0-beta.32",
|
||||||
"hardhat-deploy-ethers": "0.3.0-beta.6",
|
"hardhat-deploy-ethers": "0.3.0-beta.6",
|
||||||
"hardhat-gas-reporter": "1.0.1",
|
"hardhat-gas-reporter": "1.0.1",
|
||||||
"husky": ">=4",
|
"husky": ">=4",
|
||||||
"lint-staged": "10.5.2",
|
"lint-staged": "10.5.2",
|
||||||
"prettier": "2.2.0",
|
"prettier": "2.2.1",
|
||||||
"prettier-plugin-solidity": "1.0.0-beta.1",
|
"prettier-plugin-solidity": "1.0.0-beta.1",
|
||||||
"solhint": "3.3.2",
|
"solhint": "3.3.2",
|
||||||
"solhint-plugin-prettier": "0.0.5"
|
"solhint-plugin-prettier": "0.0.5"
|
||||||
|
|
316
test/gas/debt_bridge/full/from_maker/0_ETHA-ETHB.mock.test.js
Normal file
316
test/gas/debt_bridge/full/from_maker/0_ETHA-ETHB.mock.test.js
Normal file
|
@ -0,0 +1,316 @@
|
||||||
|
const { expect } = require("chai");
|
||||||
|
const hre = require("hardhat");
|
||||||
|
const { deployments } = hre;
|
||||||
|
const GelatoCoreLib = require("@gelatonetwork/core");
|
||||||
|
|
||||||
|
const mockSetupETHAETHB = require("./helpers/setupETHA-ETHB.mock");
|
||||||
|
const mockExecETHAETHB = require("./helpers/services/exec-ETHA-ETHB.mock");
|
||||||
|
|
||||||
|
describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", function () {
|
||||||
|
this.timeout(0);
|
||||||
|
if (hre.network.name !== "hardhat") {
|
||||||
|
console.error("Test Suite is meant to be run on hardhat only");
|
||||||
|
process.exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
let contracts;
|
||||||
|
let wallets;
|
||||||
|
let constants;
|
||||||
|
let ABI;
|
||||||
|
|
||||||
|
// Payload Params for ConnectGelatoFullDebtBridgeFromMaker and ConditionMakerVaultUnsafe
|
||||||
|
let vaultAId;
|
||||||
|
let vaultBId;
|
||||||
|
|
||||||
|
let conditionMakerVaultUnsafeObj;
|
||||||
|
let conditionDebtBridgeIsAffordableObj;
|
||||||
|
let conditionDestVaultWillBeSafe;
|
||||||
|
|
||||||
|
// For TaskSpec and for Task
|
||||||
|
let gelatoDebtBridgeSpells = [];
|
||||||
|
let refinanceFromEthAToBIfVaultUnsafe;
|
||||||
|
let gelatoExternalProvider;
|
||||||
|
const expiryDate = 0;
|
||||||
|
|
||||||
|
// Cross test var
|
||||||
|
let taskReceipt;
|
||||||
|
|
||||||
|
let mockRoute = 0;
|
||||||
|
|
||||||
|
let gelatoGasPrice;
|
||||||
|
|
||||||
|
before(async function () {
|
||||||
|
gelatoGasPrice = await hre.run("fetchGelatoGasPrice");
|
||||||
|
});
|
||||||
|
|
||||||
|
beforeEach(async function () {
|
||||||
|
// Reset back to a fresh forked state during runtime
|
||||||
|
await deployments.fixture();
|
||||||
|
|
||||||
|
const result = await mockSetupETHAETHB(mockRoute);
|
||||||
|
|
||||||
|
wallets = result.wallets;
|
||||||
|
contracts = result.contracts;
|
||||||
|
vaultAId = result.vaultAId;
|
||||||
|
vaultBId = result.vaultBId;
|
||||||
|
gelatoDebtBridgeSpells = result.spells;
|
||||||
|
|
||||||
|
ABI = result.ABI;
|
||||||
|
constants = result.constants;
|
||||||
|
|
||||||
|
expect(gelatoGasPrice).to.be.lte(constants.GAS_PRICE_CEIL);
|
||||||
|
|
||||||
|
conditionMakerVaultUnsafeObj = new GelatoCoreLib.Condition({
|
||||||
|
inst: contracts.conditionMakerVaultUnsafe.address,
|
||||||
|
data: await contracts.conditionMakerVaultUnsafe.getConditionData(
|
||||||
|
vaultAId,
|
||||||
|
contracts.priceOracleResolver.address,
|
||||||
|
await hre.run("abi-encode-withselector", {
|
||||||
|
abi: (await deployments.getArtifact("PriceOracleResolver")).abi,
|
||||||
|
functionname: "getMockPrice",
|
||||||
|
inputs: [wallets.userAddress],
|
||||||
|
}),
|
||||||
|
constants.MIN_COL_RATIO_MAKER
|
||||||
|
),
|
||||||
|
});
|
||||||
|
|
||||||
|
conditionDebtBridgeIsAffordableObj = new GelatoCoreLib.Condition({
|
||||||
|
inst: contracts.conditionDebtBridgeIsAffordable.address,
|
||||||
|
data: await contracts.conditionDebtBridgeIsAffordable.getConditionData(
|
||||||
|
vaultAId,
|
||||||
|
constants.MAX_FEES_IN_PERCENT
|
||||||
|
),
|
||||||
|
});
|
||||||
|
|
||||||
|
conditionDestVaultWillBeSafe = new GelatoCoreLib.Condition({
|
||||||
|
inst: contracts.conditionDestVaultWillBeSafe.address,
|
||||||
|
data: await contracts.conditionDestVaultWillBeSafe.getConditionData(
|
||||||
|
contracts.dsa.address,
|
||||||
|
vaultAId,
|
||||||
|
vaultBId,
|
||||||
|
"ETH-B"
|
||||||
|
),
|
||||||
|
});
|
||||||
|
|
||||||
|
refinanceFromEthAToBIfVaultUnsafe = new GelatoCoreLib.Task({
|
||||||
|
conditions: [
|
||||||
|
conditionMakerVaultUnsafeObj,
|
||||||
|
conditionDebtBridgeIsAffordableObj,
|
||||||
|
conditionDestVaultWillBeSafe,
|
||||||
|
],
|
||||||
|
actions: gelatoDebtBridgeSpells,
|
||||||
|
});
|
||||||
|
|
||||||
|
gelatoExternalProvider = new GelatoCoreLib.GelatoProvider({
|
||||||
|
addr: wallets.gelatoProviderAddress, // Gelato Provider Address
|
||||||
|
module: contracts.dsaProviderModule.address, // Gelato DSA module
|
||||||
|
});
|
||||||
|
|
||||||
|
await contracts.dsa.cast(
|
||||||
|
[hre.network.config.ConnectAuth],
|
||||||
|
[
|
||||||
|
await hre.run("abi-encode-withselector", {
|
||||||
|
abi: ABI.ConnectAuthABI,
|
||||||
|
functionname: "add",
|
||||||
|
inputs: [contracts.gelatoCore.address],
|
||||||
|
}),
|
||||||
|
],
|
||||||
|
wallets.userAddress
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(await contracts.dsa.isAuth(contracts.gelatoCore.address)).to.be.true;
|
||||||
|
});
|
||||||
|
|
||||||
|
// Increment mockRoute in between tests
|
||||||
|
afterEach(function () {
|
||||||
|
mockRoute = mockRoute === 4 ? 0 : mockRoute + 1;
|
||||||
|
});
|
||||||
|
|
||||||
|
it("#1: execViaRoute0", async function () {
|
||||||
|
//#region User submit a Debt Refinancing task if market move against him
|
||||||
|
|
||||||
|
expect(mockRoute, "mockRoute mismatch").to.be.equal(0);
|
||||||
|
|
||||||
|
// ======= GELATO TASK SETUP ======
|
||||||
|
await expect(
|
||||||
|
contracts.dsa.cast(
|
||||||
|
[contracts.connectGelato.address], // targets
|
||||||
|
[
|
||||||
|
await hre.run("abi-encode-withselector", {
|
||||||
|
abi: ABI.ConnectGelatoABI,
|
||||||
|
functionname: "submitTask",
|
||||||
|
inputs: [
|
||||||
|
gelatoExternalProvider,
|
||||||
|
refinanceFromEthAToBIfVaultUnsafe,
|
||||||
|
expiryDate,
|
||||||
|
],
|
||||||
|
}),
|
||||||
|
], // datas
|
||||||
|
wallets.userAddress, // origin
|
||||||
|
{
|
||||||
|
gasLimit: 5000000,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
).to.emit(contracts.gelatoCore, "LogTaskSubmitted");
|
||||||
|
|
||||||
|
taskReceipt = new GelatoCoreLib.TaskReceipt({
|
||||||
|
id: await contracts.gelatoCore.currentTaskReceiptId(),
|
||||||
|
userProxy: contracts.dsa.address,
|
||||||
|
provider: gelatoExternalProvider,
|
||||||
|
tasks: [refinanceFromEthAToBIfVaultUnsafe],
|
||||||
|
expiryDate,
|
||||||
|
});
|
||||||
|
|
||||||
|
await mockExecETHAETHB(
|
||||||
|
constants,
|
||||||
|
contracts,
|
||||||
|
wallets,
|
||||||
|
mockRoute,
|
||||||
|
taskReceipt,
|
||||||
|
gelatoGasPrice
|
||||||
|
);
|
||||||
|
|
||||||
|
//#endregion
|
||||||
|
});
|
||||||
|
|
||||||
|
it("#2: execViaRoute1", async function () {
|
||||||
|
//#region User submit a Debt Refinancing task if market move against him
|
||||||
|
|
||||||
|
expect(mockRoute, "mockRoute mismatch").to.be.equal(1);
|
||||||
|
|
||||||
|
// ======= GELATO TASK SETUP ======
|
||||||
|
await expect(
|
||||||
|
contracts.dsa.cast(
|
||||||
|
[contracts.connectGelato.address], // targets
|
||||||
|
[
|
||||||
|
await hre.run("abi-encode-withselector", {
|
||||||
|
abi: ABI.ConnectGelatoABI,
|
||||||
|
functionname: "submitTask",
|
||||||
|
inputs: [
|
||||||
|
gelatoExternalProvider,
|
||||||
|
refinanceFromEthAToBIfVaultUnsafe,
|
||||||
|
expiryDate,
|
||||||
|
],
|
||||||
|
}),
|
||||||
|
], // datas
|
||||||
|
wallets.userAddress, // origin
|
||||||
|
{
|
||||||
|
gasLimit: 5000000,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
).to.emit(contracts.gelatoCore, "LogTaskSubmitted");
|
||||||
|
|
||||||
|
taskReceipt = new GelatoCoreLib.TaskReceipt({
|
||||||
|
id: await contracts.gelatoCore.currentTaskReceiptId(),
|
||||||
|
userProxy: contracts.dsa.address,
|
||||||
|
provider: gelatoExternalProvider,
|
||||||
|
tasks: [refinanceFromEthAToBIfVaultUnsafe],
|
||||||
|
expiryDate,
|
||||||
|
});
|
||||||
|
|
||||||
|
await mockExecETHAETHB(
|
||||||
|
constants,
|
||||||
|
contracts,
|
||||||
|
wallets,
|
||||||
|
mockRoute,
|
||||||
|
taskReceipt,
|
||||||
|
gelatoGasPrice
|
||||||
|
);
|
||||||
|
|
||||||
|
//#endregion
|
||||||
|
});
|
||||||
|
|
||||||
|
it("#3: execViaRoute2", async function () {
|
||||||
|
//#region User submit a Debt Refinancing task if market move against him
|
||||||
|
|
||||||
|
expect(mockRoute, "mockRoute mismatch").to.be.equal(2);
|
||||||
|
|
||||||
|
// ======= GELATO TASK SETUP ======
|
||||||
|
await expect(
|
||||||
|
contracts.dsa.cast(
|
||||||
|
[contracts.connectGelato.address], // targets
|
||||||
|
[
|
||||||
|
await hre.run("abi-encode-withselector", {
|
||||||
|
abi: ABI.ConnectGelatoABI,
|
||||||
|
functionname: "submitTask",
|
||||||
|
inputs: [
|
||||||
|
gelatoExternalProvider,
|
||||||
|
refinanceFromEthAToBIfVaultUnsafe,
|
||||||
|
expiryDate,
|
||||||
|
],
|
||||||
|
}),
|
||||||
|
], // datas
|
||||||
|
wallets.userAddress, // origin
|
||||||
|
{
|
||||||
|
gasLimit: 5000000,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
).to.emit(contracts.gelatoCore, "LogTaskSubmitted");
|
||||||
|
|
||||||
|
taskReceipt = new GelatoCoreLib.TaskReceipt({
|
||||||
|
id: await contracts.gelatoCore.currentTaskReceiptId(),
|
||||||
|
userProxy: contracts.dsa.address,
|
||||||
|
provider: gelatoExternalProvider,
|
||||||
|
tasks: [refinanceFromEthAToBIfVaultUnsafe],
|
||||||
|
expiryDate,
|
||||||
|
});
|
||||||
|
|
||||||
|
await mockExecETHAETHB(
|
||||||
|
constants,
|
||||||
|
contracts,
|
||||||
|
wallets,
|
||||||
|
mockRoute,
|
||||||
|
taskReceipt,
|
||||||
|
gelatoGasPrice
|
||||||
|
);
|
||||||
|
|
||||||
|
//#endregion
|
||||||
|
});
|
||||||
|
|
||||||
|
it("#4: execViaRoute3", async function () {
|
||||||
|
//#region User submit a Debt Refinancing task if market move against him
|
||||||
|
|
||||||
|
expect(mockRoute, "mockRoute mismatch").to.be.equal(3);
|
||||||
|
|
||||||
|
// ======= GELATO TASK SETUP ======
|
||||||
|
await expect(
|
||||||
|
contracts.dsa.cast(
|
||||||
|
[contracts.connectGelato.address], // targets
|
||||||
|
[
|
||||||
|
await hre.run("abi-encode-withselector", {
|
||||||
|
abi: ABI.ConnectGelatoABI,
|
||||||
|
functionname: "submitTask",
|
||||||
|
inputs: [
|
||||||
|
gelatoExternalProvider,
|
||||||
|
refinanceFromEthAToBIfVaultUnsafe,
|
||||||
|
expiryDate,
|
||||||
|
],
|
||||||
|
}),
|
||||||
|
], // datas
|
||||||
|
wallets.userAddress, // origin
|
||||||
|
{
|
||||||
|
gasLimit: 5000000,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
).to.emit(contracts.gelatoCore, "LogTaskSubmitted");
|
||||||
|
|
||||||
|
taskReceipt = new GelatoCoreLib.TaskReceipt({
|
||||||
|
id: await contracts.gelatoCore.currentTaskReceiptId(),
|
||||||
|
userProxy: contracts.dsa.address,
|
||||||
|
provider: gelatoExternalProvider,
|
||||||
|
tasks: [refinanceFromEthAToBIfVaultUnsafe],
|
||||||
|
expiryDate,
|
||||||
|
});
|
||||||
|
|
||||||
|
await mockExecETHAETHB(
|
||||||
|
constants,
|
||||||
|
contracts,
|
||||||
|
wallets,
|
||||||
|
mockRoute,
|
||||||
|
taskReceipt,
|
||||||
|
gelatoGasPrice
|
||||||
|
);
|
||||||
|
|
||||||
|
//#endregion
|
||||||
|
});
|
||||||
|
});
|
|
@ -3,10 +3,10 @@ const hre = require("hardhat");
|
||||||
const { deployments } = hre;
|
const { deployments } = hre;
|
||||||
const GelatoCoreLib = require("@gelatonetwork/core");
|
const GelatoCoreLib = require("@gelatonetwork/core");
|
||||||
|
|
||||||
const mockSetupFullRefinanceMakerToNewMaker = require("./helpers/setupFullRefinanceMakerToNewMaker.mock");
|
const setupETHAToNewETHB = require("./helpers/setupETHA-newETHB.mock");
|
||||||
const mockExec_ETHA_newETHB = require("./helpers/services/exec-ETHA-newETHB.mock");
|
const mockExecETHAnewETHB = require("./helpers/services/exec-ETHA-newETHB.mock");
|
||||||
|
|
||||||
describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", function () {
|
describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to NEW ETH-B", function () {
|
||||||
this.timeout(0);
|
this.timeout(0);
|
||||||
if (hre.network.name !== "hardhat") {
|
if (hre.network.name !== "hardhat") {
|
||||||
console.error("Test Suite is meant to be run on hardhat only");
|
console.error("Test Suite is meant to be run on hardhat only");
|
||||||
|
@ -20,7 +20,6 @@ describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", functio
|
||||||
|
|
||||||
// Payload Params for ConnectGelatoFullDebtBridgeFromMaker and ConditionMakerVaultUnsafe
|
// Payload Params for ConnectGelatoFullDebtBridgeFromMaker and ConditionMakerVaultUnsafe
|
||||||
let vaultAId;
|
let vaultAId;
|
||||||
let vaultBId;
|
|
||||||
|
|
||||||
let conditionMakerVaultUnsafeObj;
|
let conditionMakerVaultUnsafeObj;
|
||||||
let conditionDebtBridgeIsAffordableObj;
|
let conditionDebtBridgeIsAffordableObj;
|
||||||
|
@ -47,12 +46,11 @@ describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", functio
|
||||||
// Reset back to a fresh forked state during runtime
|
// Reset back to a fresh forked state during runtime
|
||||||
await deployments.fixture();
|
await deployments.fixture();
|
||||||
|
|
||||||
const result = await mockSetupFullRefinanceMakerToNewMaker(mockRoute);
|
const result = await setupETHAToNewETHB(mockRoute);
|
||||||
|
|
||||||
wallets = result.wallets;
|
wallets = result.wallets;
|
||||||
contracts = result.contracts;
|
contracts = result.contracts;
|
||||||
vaultAId = result.vaultAId;
|
vaultAId = result.vaultAId;
|
||||||
vaultBId = result.vaultBId;
|
|
||||||
gelatoDebtBridgeSpells = result.spells;
|
gelatoDebtBridgeSpells = result.spells;
|
||||||
|
|
||||||
ABI = result.ABI;
|
ABI = result.ABI;
|
||||||
|
@ -87,11 +85,12 @@ describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", functio
|
||||||
data: await contracts.conditionDestVaultWillBeSafe.getConditionData(
|
data: await contracts.conditionDestVaultWillBeSafe.getConditionData(
|
||||||
contracts.dsa.address,
|
contracts.dsa.address,
|
||||||
vaultAId,
|
vaultAId,
|
||||||
vaultBId,
|
0,
|
||||||
"ETH-B"
|
"ETH-B"
|
||||||
),
|
),
|
||||||
});
|
});
|
||||||
|
|
||||||
|
// ======= GELATO TASK SETUP ======
|
||||||
refinanceFromEthAToBIfVaultUnsafe = new GelatoCoreLib.Task({
|
refinanceFromEthAToBIfVaultUnsafe = new GelatoCoreLib.Task({
|
||||||
conditions: [
|
conditions: [
|
||||||
conditionMakerVaultUnsafeObj,
|
conditionMakerVaultUnsafeObj,
|
||||||
|
@ -161,7 +160,7 @@ describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", functio
|
||||||
expiryDate,
|
expiryDate,
|
||||||
});
|
});
|
||||||
|
|
||||||
await mockExec_ETHA_newETHB(
|
await mockExecETHAnewETHB(
|
||||||
constants,
|
constants,
|
||||||
contracts,
|
contracts,
|
||||||
wallets,
|
wallets,
|
||||||
|
@ -208,7 +207,7 @@ describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", functio
|
||||||
expiryDate,
|
expiryDate,
|
||||||
});
|
});
|
||||||
|
|
||||||
await mockExec_ETHA_newETHB(
|
await mockExecETHAnewETHB(
|
||||||
constants,
|
constants,
|
||||||
contracts,
|
contracts,
|
||||||
wallets,
|
wallets,
|
||||||
|
@ -255,7 +254,7 @@ describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", functio
|
||||||
expiryDate,
|
expiryDate,
|
||||||
});
|
});
|
||||||
|
|
||||||
await mockExec_ETHA_newETHB(
|
await mockExecETHAnewETHB(
|
||||||
constants,
|
constants,
|
||||||
contracts,
|
contracts,
|
||||||
wallets,
|
wallets,
|
||||||
|
@ -302,7 +301,7 @@ describe("Gas Measurements: Full Debt Bridge From Maker ETH-A to ETH-B", functio
|
||||||
expiryDate,
|
expiryDate,
|
||||||
});
|
});
|
||||||
|
|
||||||
await mockExec_ETHA_newETHB(
|
await mockExecETHAnewETHB(
|
||||||
constants,
|
constants,
|
||||||
contracts,
|
contracts,
|
||||||
wallets,
|
wallets,
|
||||||
|
|
|
@ -0,0 +1,106 @@
|
||||||
|
// This test showcases the part which is automatically done by the Gelato Executor Network on mainnet
|
||||||
|
// Bots constatly check whether the submitted task is executable (by calling canExec)
|
||||||
|
// If the task becomes executable (returns "OK"), the "exec" function will be called
|
||||||
|
// which will execute the debt refinancing on behalf of the user
|
||||||
|
|
||||||
|
const hre = require("hardhat");
|
||||||
|
const { ethers } = hre;
|
||||||
|
const { expect } = require("chai");
|
||||||
|
|
||||||
|
module.exports = async function (
|
||||||
|
constants,
|
||||||
|
contracts,
|
||||||
|
wallets,
|
||||||
|
mockRoute,
|
||||||
|
taskReceipt,
|
||||||
|
gelatoGasPrice
|
||||||
|
) {
|
||||||
|
// Steps
|
||||||
|
// Step 1: Market Move against the user (Mock)
|
||||||
|
// Step 2: Executor execute the user's task
|
||||||
|
|
||||||
|
//#region Step 1 Market Move against the user (Mock)
|
||||||
|
|
||||||
|
// Ether market price went from the current price to 250$
|
||||||
|
|
||||||
|
// TO DO: base mock price off of real price data
|
||||||
|
await contracts.priceOracleResolver.setMockPrice(
|
||||||
|
ethers.utils.parseUnits("400", 18)
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(
|
||||||
|
await contracts.mockDebtBridgeETHBExecutor
|
||||||
|
.connect(wallets.executor)
|
||||||
|
.canExec(taskReceipt, constants.GAS_LIMIT, gelatoGasPrice)
|
||||||
|
).to.be.equal("ConditionNotOk:MakerVaultNotUnsafe");
|
||||||
|
|
||||||
|
// TO DO: base mock price off of real price data
|
||||||
|
await contracts.priceOracleResolver.setMockPrice(
|
||||||
|
ethers.utils.parseUnits("250", 18)
|
||||||
|
);
|
||||||
|
|
||||||
|
expect(
|
||||||
|
await contracts.mockDebtBridgeETHBExecutor
|
||||||
|
.connect(wallets.executor)
|
||||||
|
.canExec(taskReceipt, constants.GAS_LIMIT, gelatoGasPrice)
|
||||||
|
).to.be.equal("OK");
|
||||||
|
|
||||||
|
//#endregion
|
||||||
|
|
||||||
|
//#region Step 2 Executor execute the user's task
|
||||||
|
|
||||||
|
if (mockRoute === 0) {
|
||||||
|
await expect(
|
||||||
|
contracts.mockDebtBridgeETHBExecutor
|
||||||
|
.connect(wallets.executor)
|
||||||
|
.execViaRoute0(taskReceipt, {
|
||||||
|
gasPrice: gelatoGasPrice, // Exectutor must use gelatoGasPrice (Chainlink fast gwei)
|
||||||
|
gasLimit: constants.GAS_LIMIT,
|
||||||
|
})
|
||||||
|
).to.emit(contracts.gelatoCore, "LogExecSuccess");
|
||||||
|
} else if (mockRoute === 1) {
|
||||||
|
await expect(
|
||||||
|
contracts.mockDebtBridgeETHBExecutor
|
||||||
|
.connect(wallets.executor)
|
||||||
|
.execViaRoute1(taskReceipt, {
|
||||||
|
gasPrice: gelatoGasPrice, // Exectutor must use gelatoGasPrice (Chainlink fast gwei)
|
||||||
|
gasLimit: constants.GAS_LIMIT,
|
||||||
|
})
|
||||||
|
).to.emit(contracts.gelatoCore, "LogExecSuccess");
|
||||||
|
} else if (mockRoute === 2) {
|
||||||
|
await expect(
|
||||||
|
contracts.mockDebtBridgeETHBExecutor
|
||||||
|
.connect(wallets.executor)
|
||||||
|
.execViaRoute2(taskReceipt, {
|
||||||
|
gasPrice: gelatoGasPrice, // Exectutor must use gelatoGasPrice (Chainlink fast gwei)
|
||||||
|
gasLimit: constants.GAS_LIMIT,
|
||||||
|
})
|
||||||
|
).to.emit(contracts.gelatoCore, "LogExecSuccess");
|
||||||
|
} else if (mockRoute === 3) {
|
||||||
|
await expect(
|
||||||
|
contracts.mockDebtBridgeETHBExecutor
|
||||||
|
.connect(wallets.executor)
|
||||||
|
.execViaRoute3(taskReceipt, {
|
||||||
|
gasPrice: gelatoGasPrice, // Exectutor must use gelatoGasPrice (Chainlink fast gwei)
|
||||||
|
gasLimit: constants.GAS_LIMIT,
|
||||||
|
})
|
||||||
|
).to.emit(contracts.gelatoCore, "LogExecSuccess");
|
||||||
|
} else {
|
||||||
|
throw new Error("Invalid mockRoute");
|
||||||
|
}
|
||||||
|
|
||||||
|
// 🚧 For Debugging:
|
||||||
|
// const txResponse2 = await contracts.gelatoCore
|
||||||
|
// .connect(wallets.executor)
|
||||||
|
// .exec(taskReceipt, {
|
||||||
|
// gasPrice: gelatoGasPrice,
|
||||||
|
// gasLimit: constants.GAS_LIMIT,
|
||||||
|
// });
|
||||||
|
// const {blockHash} = await txResponse2.wait();
|
||||||
|
// const logs = await ethers.provider.getLogs({blockHash});
|
||||||
|
// const iFace = new ethers.utils.Interface(GelatoCoreLib.GelatoCore.abi);
|
||||||
|
// for (const log of logs) {
|
||||||
|
// console.log(iFace.parseLog(log).args.reason);
|
||||||
|
// }
|
||||||
|
// await GelatoCoreLib.sleep(10000);
|
||||||
|
};
|
|
@ -0,0 +1,82 @@
|
||||||
|
const { expect } = require("chai");
|
||||||
|
const hre = require("hardhat");
|
||||||
|
const { deployments, ethers } = hre;
|
||||||
|
const GelatoCoreLib = require("@gelatonetwork/core");
|
||||||
|
|
||||||
|
// Instadapp UI should do the same implementation for submitting debt bridge task
|
||||||
|
module.exports = async function (
|
||||||
|
wallets,
|
||||||
|
contracts,
|
||||||
|
constants,
|
||||||
|
mockRoute,
|
||||||
|
vaultAId,
|
||||||
|
vaultBId
|
||||||
|
) {
|
||||||
|
//#region Step 9 Provider should whitelist task
|
||||||
|
|
||||||
|
// By WhiteList task, the provider can constrain the type
|
||||||
|
// of task the user can submitting.
|
||||||
|
|
||||||
|
//#region Actions
|
||||||
|
|
||||||
|
const spells = [];
|
||||||
|
|
||||||
|
const debtBridgeCalculationForFullRefinance = new GelatoCoreLib.Action({
|
||||||
|
addr: contracts.mockConnectGelatoDataFullMakerToMaker.address,
|
||||||
|
data: await hre.run("abi-encode-withselector", {
|
||||||
|
abi: (
|
||||||
|
await deployments.getArtifact("MockConnectGelatoDataFullMakerToMaker")
|
||||||
|
).abi,
|
||||||
|
functionname: "getDataAndCastMakerToMaker",
|
||||||
|
inputs: [mockRoute, vaultAId, vaultBId, constants.ETH, "ETH-B"],
|
||||||
|
}),
|
||||||
|
operation: GelatoCoreLib.Operation.Delegatecall,
|
||||||
|
termsOkCheck: true,
|
||||||
|
});
|
||||||
|
|
||||||
|
spells.push(debtBridgeCalculationForFullRefinance);
|
||||||
|
|
||||||
|
const gasPriceCeil = ethers.constants.MaxUint256;
|
||||||
|
|
||||||
|
const mockConnectGelatoDataFullMakerToMakerTaskSpec = new GelatoCoreLib.TaskSpec(
|
||||||
|
{
|
||||||
|
conditions: [
|
||||||
|
contracts.conditionMakerVaultUnsafe.address,
|
||||||
|
contracts.conditionDebtBridgeIsAffordable.address,
|
||||||
|
contracts.conditionDestVaultWillBeSafe.address,
|
||||||
|
],
|
||||||
|
actions: spells,
|
||||||
|
gasPriceCeil,
|
||||||
|
}
|
||||||
|
);
|
||||||
|
|
||||||
|
await expect(
|
||||||
|
contracts.gelatoCore
|
||||||
|
.connect(wallets.gelatoProvider)
|
||||||
|
.provideTaskSpecs([mockConnectGelatoDataFullMakerToMakerTaskSpec])
|
||||||
|
).to.emit(contracts.gelatoCore, "LogTaskSpecProvided");
|
||||||
|
|
||||||
|
expect(
|
||||||
|
await contracts.gelatoCore
|
||||||
|
.connect(wallets.gelatoProvider)
|
||||||
|
.isTaskSpecProvided(
|
||||||
|
wallets.gelatoProviderAddress,
|
||||||
|
mockConnectGelatoDataFullMakerToMakerTaskSpec
|
||||||
|
)
|
||||||
|
).to.be.equal("OK");
|
||||||
|
|
||||||
|
expect(
|
||||||
|
await contracts.gelatoCore
|
||||||
|
.connect(wallets.gelatoProvider)
|
||||||
|
.taskSpecGasPriceCeil(
|
||||||
|
wallets.gelatoProviderAddress,
|
||||||
|
await contracts.gelatoCore
|
||||||
|
.connect(wallets.gelatoProvider)
|
||||||
|
.hashTaskSpec(mockConnectGelatoDataFullMakerToMakerTaskSpec)
|
||||||
|
)
|
||||||
|
).to.be.equal(gasPriceCeil);
|
||||||
|
|
||||||
|
//#endregion
|
||||||
|
|
||||||
|
return spells;
|
||||||
|
};
|
|
@ -9,7 +9,7 @@ module.exports = async function (
|
||||||
contracts,
|
contracts,
|
||||||
constants,
|
constants,
|
||||||
mockRoute,
|
mockRoute,
|
||||||
vaultId
|
vaultAId
|
||||||
) {
|
) {
|
||||||
//#region Step 9 Provider should whitelist task
|
//#region Step 9 Provider should whitelist task
|
||||||
|
|
||||||
|
@ -21,22 +21,23 @@ module.exports = async function (
|
||||||
const spells = [];
|
const spells = [];
|
||||||
|
|
||||||
const debtBridgeCalculationForFullRefinance = new GelatoCoreLib.Action({
|
const debtBridgeCalculationForFullRefinance = new GelatoCoreLib.Action({
|
||||||
addr: contracts.mockConnectGelatoDataFullRefinanceMaker.address,
|
addr: contracts.mockConnectGelatoDataFullMakerToMaker.address,
|
||||||
data: await hre.run("abi-encode-withselector", {
|
data: await hre.run("abi-encode-withselector", {
|
||||||
abi: (
|
abi: (
|
||||||
await deployments.getArtifact("MockConnectGelatoDataFullRefinanceMaker")
|
await deployments.getArtifact("MockConnectGelatoDataFullMakerToMaker")
|
||||||
).abi,
|
).abi,
|
||||||
functionname: "getDataAndCastMakerToMaker",
|
functionname: "getDataAndCastMakerToMaker",
|
||||||
inputs: [mockRoute, vaultId, 0, constants.ETH, "ETH-B"],
|
inputs: [mockRoute, vaultAId, 0, constants.ETH, "ETH-B"],
|
||||||
}),
|
}),
|
||||||
operation: GelatoCoreLib.Operation.Delegatecall,
|
operation: GelatoCoreLib.Operation.Delegatecall,
|
||||||
|
termsOkCheck: true,
|
||||||
});
|
});
|
||||||
|
|
||||||
spells.push(debtBridgeCalculationForFullRefinance);
|
spells.push(debtBridgeCalculationForFullRefinance);
|
||||||
|
|
||||||
const gasPriceCeil = ethers.constants.MaxUint256;
|
const gasPriceCeil = ethers.constants.MaxUint256;
|
||||||
|
|
||||||
const connectGelatoFullDebtBridgeFromMakerTaskSpec = new GelatoCoreLib.TaskSpec(
|
const mockConnectGelatoDataFullMakerToMakerTaskSpec = new GelatoCoreLib.TaskSpec(
|
||||||
{
|
{
|
||||||
conditions: [
|
conditions: [
|
||||||
contracts.conditionMakerVaultUnsafe.address,
|
contracts.conditionMakerVaultUnsafe.address,
|
||||||
|
@ -51,7 +52,7 @@ module.exports = async function (
|
||||||
await expect(
|
await expect(
|
||||||
contracts.gelatoCore
|
contracts.gelatoCore
|
||||||
.connect(wallets.gelatoProvider)
|
.connect(wallets.gelatoProvider)
|
||||||
.provideTaskSpecs([connectGelatoFullDebtBridgeFromMakerTaskSpec])
|
.provideTaskSpecs([mockConnectGelatoDataFullMakerToMakerTaskSpec])
|
||||||
).to.emit(contracts.gelatoCore, "LogTaskSpecProvided");
|
).to.emit(contracts.gelatoCore, "LogTaskSpecProvided");
|
||||||
|
|
||||||
expect(
|
expect(
|
||||||
|
@ -59,7 +60,7 @@ module.exports = async function (
|
||||||
.connect(wallets.gelatoProvider)
|
.connect(wallets.gelatoProvider)
|
||||||
.isTaskSpecProvided(
|
.isTaskSpecProvided(
|
||||||
wallets.gelatoProviderAddress,
|
wallets.gelatoProviderAddress,
|
||||||
connectGelatoFullDebtBridgeFromMakerTaskSpec
|
mockConnectGelatoDataFullMakerToMakerTaskSpec
|
||||||
)
|
)
|
||||||
).to.be.equal("OK");
|
).to.be.equal("OK");
|
||||||
|
|
||||||
|
@ -70,7 +71,7 @@ module.exports = async function (
|
||||||
wallets.gelatoProviderAddress,
|
wallets.gelatoProviderAddress,
|
||||||
await contracts.gelatoCore
|
await contracts.gelatoCore
|
||||||
.connect(wallets.gelatoProvider)
|
.connect(wallets.gelatoProvider)
|
||||||
.hashTaskSpec(connectGelatoFullDebtBridgeFromMakerTaskSpec)
|
.hashTaskSpec(mockConnectGelatoDataFullMakerToMakerTaskSpec)
|
||||||
)
|
)
|
||||||
).to.be.equal(gasPriceCeil);
|
).to.be.equal(gasPriceCeil);
|
||||||
|
|
||||||
|
|
|
@ -7,7 +7,7 @@ const addProviderModuleDSA = require("../../../../../helpers/services/gelato/add
|
||||||
const createDSA = require("../../../../../helpers/services/InstaDapp/createDSA");
|
const createDSA = require("../../../../../helpers/services/InstaDapp/createDSA");
|
||||||
const initializeMakerCdp = require("../../../../../helpers/services/maker/initializeMakerCdp");
|
const initializeMakerCdp = require("../../../../../helpers/services/maker/initializeMakerCdp");
|
||||||
const createVaultForETHB = require("../../../../../helpers/services/maker/createVaultForETHB");
|
const createVaultForETHB = require("../../../../../helpers/services/maker/createVaultForETHB");
|
||||||
const getMockSpellsETHAnewETHB = require("./services/getSpells-ETHA-newETHB.mock");
|
const getMockSpellsETHAETHB = require("./services/getSpells-ETHA-ETHB.mock");
|
||||||
const getABI = require("../../../../../helpers/services/getABI");
|
const getABI = require("../../../../../helpers/services/getABI");
|
||||||
|
|
||||||
module.exports = async function (mockRoute) {
|
module.exports = async function (mockRoute) {
|
||||||
|
@ -55,7 +55,7 @@ module.exports = async function (mockRoute) {
|
||||||
contracts.getCdps,
|
contracts.getCdps,
|
||||||
contracts.dssCdpManager
|
contracts.dssCdpManager
|
||||||
);
|
);
|
||||||
const spells = await getMockSpellsETHAnewETHB(
|
const spells = await getMockSpellsETHAETHB(
|
||||||
wallets,
|
wallets,
|
||||||
contracts,
|
contracts,
|
||||||
constants,
|
constants,
|
|
@ -0,0 +1,66 @@
|
||||||
|
const getWallets = require("../../../../../helpers/services/getWallets");
|
||||||
|
const getContracts = require("../../../../../helpers/services/getContracts");
|
||||||
|
const getDebtBridgeFromMakerConstants = require("../../../../../integration/debt_bridge/from_maker/services/getDebtBridgeFromMakerConstants");
|
||||||
|
const provideFunds = require("../../../../../helpers/services/gelato/provideFunds");
|
||||||
|
const providerAssignsExecutor = require("../../../../../helpers/services/gelato/providerAssignsExecutor");
|
||||||
|
const addProviderModuleDSA = require("../../../../../helpers/services/gelato/addProviderModuleDSA");
|
||||||
|
const createDSA = require("../../../../../helpers/services/InstaDapp/createDSA");
|
||||||
|
const initializeMakerCdp = require("../../../../../helpers/services/maker/initializeMakerCdp");
|
||||||
|
const getMockSpellsETHAnewETHB = require("./services/getSpells-ETHA-newETHB.mock");
|
||||||
|
const getABI = require("../../../../../helpers/services/getABI");
|
||||||
|
|
||||||
|
module.exports = async function (mockRoute) {
|
||||||
|
const wallets = await getWallets();
|
||||||
|
const contracts = await getContracts();
|
||||||
|
const constants = await getDebtBridgeFromMakerConstants();
|
||||||
|
const ABI = getABI();
|
||||||
|
|
||||||
|
// Gelato Testing environment setup.
|
||||||
|
await provideFunds(
|
||||||
|
wallets.gelatoProvider,
|
||||||
|
contracts.gelatoCore,
|
||||||
|
constants.GAS_LIMIT,
|
||||||
|
constants.GAS_PRICE_CEIL
|
||||||
|
);
|
||||||
|
await providerAssignsExecutor(
|
||||||
|
wallets.gelatoProvider,
|
||||||
|
contracts.mockDebtBridgeETHBExecutor.address,
|
||||||
|
contracts.gelatoCore
|
||||||
|
);
|
||||||
|
await addProviderModuleDSA(
|
||||||
|
wallets.gelatoProvider,
|
||||||
|
contracts.gelatoCore,
|
||||||
|
contracts.dsaProviderModule.address
|
||||||
|
);
|
||||||
|
contracts.dsa = await createDSA(
|
||||||
|
wallets.userAddress,
|
||||||
|
contracts.instaIndex,
|
||||||
|
contracts.instaList
|
||||||
|
);
|
||||||
|
const vaultAId = await initializeMakerCdp(
|
||||||
|
wallets.userAddress,
|
||||||
|
contracts.DAI,
|
||||||
|
contracts.dsa,
|
||||||
|
contracts.getCdps,
|
||||||
|
contracts.dssCdpManager,
|
||||||
|
constants.MAKER_INITIAL_ETH,
|
||||||
|
constants.MAKER_INITIAL_DEBT,
|
||||||
|
ABI.ConnectMakerABI
|
||||||
|
);
|
||||||
|
const spells = await getMockSpellsETHAnewETHB(
|
||||||
|
wallets,
|
||||||
|
contracts,
|
||||||
|
constants,
|
||||||
|
mockRoute,
|
||||||
|
vaultAId
|
||||||
|
);
|
||||||
|
|
||||||
|
return {
|
||||||
|
wallets,
|
||||||
|
contracts,
|
||||||
|
constants,
|
||||||
|
vaultAId,
|
||||||
|
spells,
|
||||||
|
ABI,
|
||||||
|
};
|
||||||
|
};
|
|
@ -112,8 +112,8 @@ module.exports = async function () {
|
||||||
const mockDebtBridgeETHBExecutor = await ethers.getContract(
|
const mockDebtBridgeETHBExecutor = await ethers.getContract(
|
||||||
"MockDebtBridgeETHBExecutor"
|
"MockDebtBridgeETHBExecutor"
|
||||||
);
|
);
|
||||||
const mockConnectGelatoDataFullRefinanceMaker = await ethers.getContract(
|
const mockConnectGelatoDataFullMakerToMaker = await ethers.getContract(
|
||||||
"MockConnectGelatoDataFullRefinanceMaker"
|
"MockConnectGelatoDataFullMakerToMaker"
|
||||||
);
|
);
|
||||||
|
|
||||||
const conditionDestVaultWillBeSafe = await ethers.getContract(
|
const conditionDestVaultWillBeSafe = await ethers.getContract(
|
||||||
|
@ -148,7 +148,7 @@ module.exports = async function () {
|
||||||
dsaProviderModule,
|
dsaProviderModule,
|
||||||
conditionDebtBridgeIsAffordable,
|
conditionDebtBridgeIsAffordable,
|
||||||
mockDebtBridgeETHBExecutor,
|
mockDebtBridgeETHBExecutor,
|
||||||
mockConnectGelatoDataFullRefinanceMaker,
|
mockConnectGelatoDataFullMakerToMaker,
|
||||||
conditionDestVaultWillBeSafe,
|
conditionDestVaultWillBeSafe,
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
40
yarn.lock
40
yarn.lock
|
@ -907,10 +907,10 @@
|
||||||
safe-buffer "^5.1.1"
|
safe-buffer "^5.1.1"
|
||||||
util.promisify "^1.0.0"
|
util.promisify "^1.0.0"
|
||||||
|
|
||||||
"@nomiclabs/hardhat-ethers@2.0.0":
|
"@nomiclabs/hardhat-ethers@2.0.1":
|
||||||
version "2.0.0"
|
version "2.0.1"
|
||||||
resolved "https://registry.yarnpkg.com/@nomiclabs/hardhat-ethers/-/hardhat-ethers-2.0.0.tgz#ebab032b3aed03945ea560f56bb67aec56a30cbc"
|
resolved "https://registry.yarnpkg.com/@nomiclabs/hardhat-ethers/-/hardhat-ethers-2.0.1.tgz#f86a6fa210dbe6270adffccc75e93ed60a856904"
|
||||||
integrity sha512-fIi6XP9PgKqwSNVcLDr6S5hvGlc21PendaLD5eGdXEXc9aYQ0OJX8Mk3evs+p78x7W9n9U3ZcKtTiGc1+YScDw==
|
integrity sha512-uTFHDhhvJ+UjfvvMeQxD3ZALuzuI3FXzTYT1Z5N3ebyZL5z4Ogwt55GB0R9tdKY0p5HhDhBjU/gsCjUEwIVoaw==
|
||||||
|
|
||||||
"@nomiclabs/hardhat-waffle@2.0.0":
|
"@nomiclabs/hardhat-waffle@2.0.0":
|
||||||
version "2.0.0"
|
version "2.0.0"
|
||||||
|
@ -920,10 +920,10 @@
|
||||||
"@types/sinon-chai" "^3.2.3"
|
"@types/sinon-chai" "^3.2.3"
|
||||||
"@types/web3" "1.0.19"
|
"@types/web3" "1.0.19"
|
||||||
|
|
||||||
"@openzeppelin/contracts@3.2.0":
|
"@openzeppelin/contracts@3.3.0":
|
||||||
version "3.2.0"
|
version "3.3.0"
|
||||||
resolved "https://registry.yarnpkg.com/@openzeppelin/contracts/-/contracts-3.2.0.tgz#3e6b3a7662d8ed64271ade96ef42655db983fd9d"
|
resolved "https://registry.yarnpkg.com/@openzeppelin/contracts/-/contracts-3.3.0.tgz#ffdb693c5c349fc33bba420248dd3ac0a2d7c408"
|
||||||
integrity sha512-bUOmkSoPkjnUyMiKo6RYnb0VHBk5D9KKDAgNLzF41aqAM3TeE0yGdFF5dVRcV60pZdJLlyFT/jjXIZCWyyEzAQ==
|
integrity sha512-AemZEsQYtUp1WRkcmZm1div5ORfTpLquLaziCIrSagjxyKdmObxuaY1yjQ5SHFMctR8rLwp706NXTbiIRJg7pw==
|
||||||
|
|
||||||
"@resolver-engine/core@^0.3.3":
|
"@resolver-engine/core@^0.3.3":
|
||||||
version "0.3.3"
|
version "0.3.3"
|
||||||
|
@ -4781,10 +4781,10 @@ hardhat-deploy-ethers@0.3.0-beta.6:
|
||||||
resolved "https://registry.yarnpkg.com/hardhat-deploy-ethers/-/hardhat-deploy-ethers-0.3.0-beta.6.tgz#a6b70d0849fa5dd0f00698385c6bbb9c4b70fc96"
|
resolved "https://registry.yarnpkg.com/hardhat-deploy-ethers/-/hardhat-deploy-ethers-0.3.0-beta.6.tgz#a6b70d0849fa5dd0f00698385c6bbb9c4b70fc96"
|
||||||
integrity sha512-dwatT8Cw2FWSgvnUJom8lnPuJ2ULz8Ir844GHFDterfDMWvCcJCqnATX+nMznYoSJa7NEzoSPAm+RiWvvkh/2A==
|
integrity sha512-dwatT8Cw2FWSgvnUJom8lnPuJ2ULz8Ir844GHFDterfDMWvCcJCqnATX+nMznYoSJa7NEzoSPAm+RiWvvkh/2A==
|
||||||
|
|
||||||
hardhat-deploy@0.7.0-beta.30:
|
hardhat-deploy@0.7.0-beta.32:
|
||||||
version "0.7.0-beta.30"
|
version "0.7.0-beta.32"
|
||||||
resolved "https://registry.yarnpkg.com/hardhat-deploy/-/hardhat-deploy-0.7.0-beta.30.tgz#51179ee9cf4b93bd9a84841fe408a326bb3d719e"
|
resolved "https://registry.yarnpkg.com/hardhat-deploy/-/hardhat-deploy-0.7.0-beta.32.tgz#24fc91d7cda12be3ee97f929db8bc6a629030f80"
|
||||||
integrity sha512-MColmxi+Ni3Savh9zDhfGD8EI4dUpaF6yUiysXZkv8z7HgMlL6Ho/2c+Z1NEycf1GTJ6p07YpZDD2sLfY3qwDA==
|
integrity sha512-po+vW+gtmqls/Od1kc9btDeza6sR+DHbVi1KaiS5tgYLyCbDnf4Ih+2UjGQMDsaJbYxK/19jOOf5rfRsOaTAzA==
|
||||||
dependencies:
|
dependencies:
|
||||||
"@ethersproject/abi" "^5.0.2"
|
"@ethersproject/abi" "^5.0.2"
|
||||||
"@ethersproject/abstract-signer" "^5.0.2"
|
"@ethersproject/abstract-signer" "^5.0.2"
|
||||||
|
@ -4813,10 +4813,10 @@ hardhat-gas-reporter@1.0.1:
|
||||||
dependencies:
|
dependencies:
|
||||||
eth-gas-reporter "^0.2.19"
|
eth-gas-reporter "^0.2.19"
|
||||||
|
|
||||||
hardhat@2.0.3:
|
hardhat@2.0.4:
|
||||||
version "2.0.3"
|
version "2.0.4"
|
||||||
resolved "https://registry.yarnpkg.com/hardhat/-/hardhat-2.0.3.tgz#35e07060d9854d4182f201aeaa1c05316bd7e4d3"
|
resolved "https://registry.yarnpkg.com/hardhat/-/hardhat-2.0.4.tgz#f312c79d57d81861d9a837fbb8cb64302735b58f"
|
||||||
integrity sha512-mDygAl+1qd5KBdXQBfc3R5XmC/rVdYYbEuOTSQY3rlncVu9gfockZVDsHtAMPw/FiBIRMApLcOceK7D1XQmHRw==
|
integrity sha512-TPDthnVJ6JNT38l769rRAJk3tkbGUZEaVSGW6TFXN7OuB08VZMH0dVyvUhnRas9BByFozTfIjr6AgnZ7S8o5PQ==
|
||||||
dependencies:
|
dependencies:
|
||||||
"@nomiclabs/ethereumjs-vm" "^4.1.1"
|
"@nomiclabs/ethereumjs-vm" "^4.1.1"
|
||||||
"@sentry/node" "^5.18.1"
|
"@sentry/node" "^5.18.1"
|
||||||
|
@ -7102,10 +7102,10 @@ prettier-plugin-solidity@1.0.0-beta.1:
|
||||||
solidity-comments-extractor "^0.0.4"
|
solidity-comments-extractor "^0.0.4"
|
||||||
string-width "^4.2.0"
|
string-width "^4.2.0"
|
||||||
|
|
||||||
prettier@2.2.0:
|
prettier@2.2.1:
|
||||||
version "2.2.0"
|
version "2.2.1"
|
||||||
resolved "https://registry.yarnpkg.com/prettier/-/prettier-2.2.0.tgz#8a03c7777883b29b37fb2c4348c66a78e980418b"
|
resolved "https://registry.yarnpkg.com/prettier/-/prettier-2.2.1.tgz#795a1a78dd52f073da0cd42b21f9c91381923ff5"
|
||||||
integrity sha512-yYerpkvseM4iKD/BXLYUkQV5aKt4tQPqaGW6EsZjzyu0r7sVZZNPJW4Y8MyKmicp6t42XUPcBVA+H6sB3gqndw==
|
integrity sha512-PqyhM2yCjg/oKkFPtTGUojv7gnZAoG80ttl45O6x2Ug/rMJw4wcc9k6aaf2hibP7BGVCCM33gZoGjyvt9mm16Q==
|
||||||
|
|
||||||
prettier@^1.14.3:
|
prettier@^1.14.3:
|
||||||
version "1.19.1"
|
version "1.19.1"
|
||||||
|
|
Loading…
Reference in New Issue
Block a user