mirror of
https://github.com/Instadapp/aave-protocol-v2.git
synced 2024-07-29 21:47:30 +00:00
379 lines
13 KiB
TypeScript
379 lines
13 KiB
TypeScript
import BigNumber from 'bignumber.js';
|
|
|
|
import { DRE } from '../../helpers/misc-utils';
|
|
import { APPROVAL_AMOUNT_LENDING_POOL, oneEther } from '../../helpers/constants';
|
|
import { convertToCurrencyDecimals } from '../../helpers/contracts-helpers';
|
|
import { makeSuite } from './helpers/make-suite';
|
|
import { ProtocolErrors, RateMode } from '../../helpers/types';
|
|
import { calcExpectedVariableDebtTokenBalance } from './helpers/utils/calculations';
|
|
import { getUserData, getReserveData } from './helpers/utils/helpers';
|
|
|
|
const chai = require('chai');
|
|
const { expect } = chai;
|
|
|
|
makeSuite('LendingPool liquidation - liquidator receiving aToken', (testEnv) => {
|
|
const {
|
|
LPCM_HEALTH_FACTOR_NOT_BELOW_THRESHOLD,
|
|
INVALID_HF,
|
|
LPCM_SPECIFIED_CURRENCY_NOT_BORROWED_BY_USER,
|
|
LPCM_COLLATERAL_CANNOT_BE_LIQUIDATED,
|
|
} = ProtocolErrors;
|
|
|
|
it('Deposits WETH, borrows DAI/Check liquidation fails because health factor is above 1', async () => {
|
|
const { dai, weth, users, pool, oracle } = testEnv;
|
|
const depositor = users[0];
|
|
const borrower = users[1];
|
|
|
|
//mints DAI to depositor
|
|
await dai.connect(depositor.signer).mint(await convertToCurrencyDecimals(dai.address, '1000'));
|
|
|
|
//approve protocol to access depositor wallet
|
|
await dai.connect(depositor.signer).approve(pool.address, APPROVAL_AMOUNT_LENDING_POOL);
|
|
|
|
//user 1 deposits 1000 DAI
|
|
const amountDAItoDeposit = await convertToCurrencyDecimals(dai.address, '1000');
|
|
await pool
|
|
.connect(depositor.signer)
|
|
.deposit(dai.address, amountDAItoDeposit, depositor.address, '0');
|
|
|
|
const amountETHtoDeposit = await convertToCurrencyDecimals(weth.address, '1');
|
|
|
|
//mints WETH to borrower
|
|
await weth.connect(borrower.signer).mint(amountETHtoDeposit);
|
|
|
|
//approve protocol to access borrower wallet
|
|
await weth.connect(borrower.signer).approve(pool.address, APPROVAL_AMOUNT_LENDING_POOL);
|
|
|
|
//user 2 deposits 1 WETH
|
|
await pool
|
|
.connect(borrower.signer)
|
|
.deposit(weth.address, amountETHtoDeposit, borrower.address, '0');
|
|
|
|
//user 2 borrows
|
|
const userGlobalData = await pool.getUserAccountData(borrower.address);
|
|
const daiPrice = await oracle.getAssetPrice(dai.address);
|
|
|
|
const amountDAIToBorrow = await convertToCurrencyDecimals(
|
|
dai.address,
|
|
new BigNumber(userGlobalData.availableBorrowsETH.toString())
|
|
.div(daiPrice.toString())
|
|
.multipliedBy(0.95)
|
|
.toFixed(0)
|
|
);
|
|
|
|
await pool
|
|
.connect(borrower.signer)
|
|
.borrow(dai.address, amountDAIToBorrow, RateMode.Variable, '0', borrower.address);
|
|
|
|
const userGlobalDataAfter = await pool.getUserAccountData(borrower.address);
|
|
|
|
expect(userGlobalDataAfter.currentLiquidationThreshold.toString()).to.be.bignumber.equal(
|
|
'8250',
|
|
'Invalid liquidation threshold'
|
|
);
|
|
|
|
//someone tries to liquidate user 2
|
|
await expect(
|
|
pool.liquidationCall(weth.address, dai.address, borrower.address, 1, true)
|
|
).to.be.revertedWith(LPCM_HEALTH_FACTOR_NOT_BELOW_THRESHOLD);
|
|
});
|
|
|
|
it('Drop the health factor below 1', async () => {
|
|
const { dai, users, pool, oracle } = testEnv;
|
|
const borrower = users[1];
|
|
|
|
const daiPrice = await oracle.getAssetPrice(dai.address);
|
|
|
|
await oracle.setAssetPrice(
|
|
dai.address,
|
|
new BigNumber(daiPrice.toString()).multipliedBy(1.15).toFixed(0)
|
|
);
|
|
|
|
const userGlobalData = await pool.getUserAccountData(borrower.address);
|
|
|
|
expect(userGlobalData.healthFactor.toString()).to.be.bignumber.lt(
|
|
oneEther.toString(),
|
|
INVALID_HF
|
|
);
|
|
});
|
|
|
|
it('Tries to liquidate a different currency than the loan principal', async () => {
|
|
const { pool, users, weth } = testEnv;
|
|
const borrower = users[1];
|
|
//user 2 tries to borrow
|
|
await expect(
|
|
pool.liquidationCall(weth.address, weth.address, borrower.address, oneEther.toString(), true)
|
|
).revertedWith(LPCM_SPECIFIED_CURRENCY_NOT_BORROWED_BY_USER);
|
|
});
|
|
|
|
it('Tries to liquidate a different collateral than the borrower collateral', async () => {
|
|
const { pool, dai, users } = testEnv;
|
|
const borrower = users[1];
|
|
|
|
await expect(
|
|
pool.liquidationCall(dai.address, dai.address, borrower.address, oneEther.toString(), true)
|
|
).revertedWith(LPCM_COLLATERAL_CANNOT_BE_LIQUIDATED);
|
|
});
|
|
|
|
it('Liquidates the borrow', async () => {
|
|
const { pool, dai, weth, aWETH, aDai, users, oracle, helpersContract, deployer } = testEnv;
|
|
const borrower = users[1];
|
|
|
|
//mints dai to the caller
|
|
|
|
await dai.mint(await convertToCurrencyDecimals(dai.address, '1000'));
|
|
|
|
//approve protocol to access depositor wallet
|
|
await dai.approve(pool.address, APPROVAL_AMOUNT_LENDING_POOL);
|
|
|
|
const daiReserveDataBefore = await getReserveData(helpersContract, dai.address);
|
|
const ethReserveDataBefore = await helpersContract.getReserveData(weth.address);
|
|
|
|
const userReserveDataBefore = await getUserData(
|
|
pool,
|
|
helpersContract,
|
|
dai.address,
|
|
borrower.address
|
|
);
|
|
|
|
const amountToLiquidate = new BigNumber(userReserveDataBefore.currentVariableDebt.toString())
|
|
.div(2)
|
|
.toFixed(0);
|
|
|
|
const tx = await pool.liquidationCall(
|
|
weth.address,
|
|
dai.address,
|
|
borrower.address,
|
|
amountToLiquidate,
|
|
true
|
|
);
|
|
|
|
const userReserveDataAfter = await helpersContract.getUserReserveData(
|
|
dai.address,
|
|
borrower.address
|
|
);
|
|
|
|
const userGlobalDataAfter = await pool.getUserAccountData(borrower.address);
|
|
|
|
const daiReserveDataAfter = await helpersContract.getReserveData(dai.address);
|
|
const ethReserveDataAfter = await helpersContract.getReserveData(weth.address);
|
|
|
|
const collateralPrice = (await oracle.getAssetPrice(weth.address)).toString();
|
|
const principalPrice = (await oracle.getAssetPrice(dai.address)).toString();
|
|
|
|
const collateralDecimals = (
|
|
await helpersContract.getReserveConfigurationData(weth.address)
|
|
).decimals.toString();
|
|
const principalDecimals = (
|
|
await helpersContract.getReserveConfigurationData(dai.address)
|
|
).decimals.toString();
|
|
|
|
const expectedCollateralLiquidated = new BigNumber(principalPrice)
|
|
.times(new BigNumber(amountToLiquidate).times(105))
|
|
.times(new BigNumber(10).pow(collateralDecimals))
|
|
.div(new BigNumber(collateralPrice).times(new BigNumber(10).pow(principalDecimals)))
|
|
.decimalPlaces(0, BigNumber.ROUND_DOWN);
|
|
|
|
if (!tx.blockNumber) {
|
|
expect(false, 'Invalid block number');
|
|
return;
|
|
}
|
|
|
|
const txTimestamp = new BigNumber(
|
|
(await DRE.ethers.provider.getBlock(tx.blockNumber)).timestamp
|
|
);
|
|
|
|
const variableDebtBeforeTx = calcExpectedVariableDebtTokenBalance(
|
|
daiReserveDataBefore,
|
|
userReserveDataBefore,
|
|
txTimestamp
|
|
);
|
|
|
|
expect(userGlobalDataAfter.healthFactor.toString()).to.be.bignumber.gt(
|
|
oneEther.toFixed(0),
|
|
'Invalid health factor'
|
|
);
|
|
|
|
expect(userReserveDataAfter.currentVariableDebt.toString()).to.be.bignumber.almostEqual(
|
|
new BigNumber(variableDebtBeforeTx).minus(amountToLiquidate).toFixed(0),
|
|
'Invalid user borrow balance after liquidation'
|
|
);
|
|
|
|
expect(daiReserveDataAfter.availableLiquidity.toString()).to.be.bignumber.almostEqual(
|
|
new BigNumber(daiReserveDataBefore.availableLiquidity.toString())
|
|
.plus(amountToLiquidate)
|
|
.toFixed(0),
|
|
'Invalid principal available liquidity'
|
|
);
|
|
|
|
//the liquidity index of the principal reserve needs to be bigger than the index before
|
|
expect(daiReserveDataAfter.liquidityIndex.toString()).to.be.bignumber.gte(
|
|
daiReserveDataBefore.liquidityIndex.toString(),
|
|
'Invalid liquidity index'
|
|
);
|
|
|
|
//the principal APY after a liquidation needs to be lower than the APY before
|
|
expect(daiReserveDataAfter.liquidityRate.toString()).to.be.bignumber.lt(
|
|
daiReserveDataBefore.liquidityRate.toString(),
|
|
'Invalid liquidity APY'
|
|
);
|
|
|
|
expect(ethReserveDataAfter.availableLiquidity.toString()).to.be.bignumber.almostEqual(
|
|
new BigNumber(ethReserveDataBefore.availableLiquidity.toString()).toFixed(0),
|
|
'Invalid collateral available liquidity'
|
|
);
|
|
|
|
expect(
|
|
(await helpersContract.getUserReserveData(weth.address, deployer.address))
|
|
.usageAsCollateralEnabled
|
|
).to.be.true;
|
|
});
|
|
|
|
it('User 3 deposits 1000 USDC, user 4 1 WETH, user 4 borrows at variable - drops HF, liquidates the borrow', async () => {
|
|
const { users, pool, usdc, oracle, weth, helpersContract } = testEnv;
|
|
const depositor = users[3];
|
|
const borrower = users[4];
|
|
|
|
//mints USDC to depositor
|
|
await usdc
|
|
.connect(depositor.signer)
|
|
.mint(await convertToCurrencyDecimals(usdc.address, '1000'));
|
|
|
|
//approve protocol to access depositor wallet
|
|
await usdc.connect(depositor.signer).approve(pool.address, APPROVAL_AMOUNT_LENDING_POOL);
|
|
|
|
//user 3 deposits 1000 USDC
|
|
const amountUSDCtoDeposit = await convertToCurrencyDecimals(usdc.address, '1000');
|
|
|
|
await pool
|
|
.connect(depositor.signer)
|
|
.deposit(usdc.address, amountUSDCtoDeposit, depositor.address, '0');
|
|
|
|
//user 4 deposits 1 ETH
|
|
const amountETHtoDeposit = await convertToCurrencyDecimals(weth.address, '1');
|
|
|
|
//mints WETH to borrower
|
|
await weth.connect(borrower.signer).mint(amountETHtoDeposit);
|
|
|
|
//approve protocol to access borrower wallet
|
|
await weth.connect(borrower.signer).approve(pool.address, APPROVAL_AMOUNT_LENDING_POOL);
|
|
|
|
await pool
|
|
.connect(borrower.signer)
|
|
.deposit(weth.address, amountETHtoDeposit, borrower.address, '0');
|
|
|
|
//user 4 borrows
|
|
const userGlobalData = await pool.getUserAccountData(borrower.address);
|
|
|
|
const usdcPrice = await oracle.getAssetPrice(usdc.address);
|
|
|
|
const amountUSDCToBorrow = await convertToCurrencyDecimals(
|
|
usdc.address,
|
|
new BigNumber(userGlobalData.availableBorrowsETH.toString())
|
|
.div(usdcPrice.toString())
|
|
.multipliedBy(0.9502)
|
|
.toFixed(0)
|
|
);
|
|
|
|
await pool
|
|
.connect(borrower.signer)
|
|
.borrow(usdc.address, amountUSDCToBorrow, RateMode.Variable, '0', borrower.address);
|
|
|
|
//drops HF below 1
|
|
|
|
await oracle.setAssetPrice(
|
|
usdc.address,
|
|
new BigNumber(usdcPrice.toString()).multipliedBy(1.12).toFixed(0)
|
|
);
|
|
|
|
//mints dai to the liquidator
|
|
|
|
await usdc.mint(await convertToCurrencyDecimals(usdc.address, '1000'));
|
|
|
|
//approve protocol to access depositor wallet
|
|
await usdc.approve(pool.address, APPROVAL_AMOUNT_LENDING_POOL);
|
|
|
|
const userReserveDataBefore = await helpersContract.getUserReserveData(
|
|
usdc.address,
|
|
borrower.address
|
|
);
|
|
|
|
const usdcReserveDataBefore = await helpersContract.getReserveData(usdc.address);
|
|
const ethReserveDataBefore = await helpersContract.getReserveData(weth.address);
|
|
|
|
const amountToLiquidate = new BigNumber(userReserveDataBefore.currentVariableDebt.toString())
|
|
.multipliedBy(0.5)
|
|
.toFixed(0);
|
|
|
|
await pool.liquidationCall(
|
|
weth.address,
|
|
usdc.address,
|
|
borrower.address,
|
|
amountToLiquidate,
|
|
true
|
|
);
|
|
|
|
const userReserveDataAfter = await helpersContract.getUserReserveData(
|
|
usdc.address,
|
|
borrower.address
|
|
);
|
|
|
|
const userGlobalDataAfter = await pool.getUserAccountData(borrower.address);
|
|
|
|
const usdcReserveDataAfter = await helpersContract.getReserveData(usdc.address);
|
|
const ethReserveDataAfter = await helpersContract.getReserveData(weth.address);
|
|
|
|
const collateralPrice = (await oracle.getAssetPrice(weth.address)).toString();
|
|
const principalPrice = (await oracle.getAssetPrice(usdc.address)).toString();
|
|
|
|
const collateralDecimals = (
|
|
await helpersContract.getReserveConfigurationData(weth.address)
|
|
).decimals.toString();
|
|
const principalDecimals = (
|
|
await helpersContract.getReserveConfigurationData(usdc.address)
|
|
).decimals.toString();
|
|
|
|
const expectedCollateralLiquidated = new BigNumber(principalPrice)
|
|
.times(new BigNumber(amountToLiquidate).times(105))
|
|
.times(new BigNumber(10).pow(collateralDecimals))
|
|
.div(new BigNumber(collateralPrice).times(new BigNumber(10).pow(principalDecimals)))
|
|
.decimalPlaces(0, BigNumber.ROUND_DOWN);
|
|
|
|
expect(userGlobalDataAfter.healthFactor.toString()).to.be.bignumber.gt(
|
|
oneEther.toFixed(0),
|
|
'Invalid health factor'
|
|
);
|
|
|
|
expect(userReserveDataAfter.currentVariableDebt.toString()).to.be.bignumber.almostEqual(
|
|
new BigNumber(userReserveDataBefore.currentVariableDebt.toString())
|
|
.minus(amountToLiquidate)
|
|
.toFixed(0),
|
|
'Invalid user borrow balance after liquidation'
|
|
);
|
|
|
|
expect(usdcReserveDataAfter.availableLiquidity.toString()).to.be.bignumber.almostEqual(
|
|
new BigNumber(usdcReserveDataBefore.availableLiquidity.toString())
|
|
.plus(amountToLiquidate)
|
|
.toFixed(0),
|
|
'Invalid principal available liquidity'
|
|
);
|
|
|
|
//the liquidity index of the principal reserve needs to be bigger than the index before
|
|
expect(usdcReserveDataAfter.liquidityIndex.toString()).to.be.bignumber.gte(
|
|
usdcReserveDataBefore.liquidityIndex.toString(),
|
|
'Invalid liquidity index'
|
|
);
|
|
|
|
//the principal APY after a liquidation needs to be lower than the APY before
|
|
expect(usdcReserveDataAfter.liquidityRate.toString()).to.be.bignumber.lt(
|
|
usdcReserveDataBefore.liquidityRate.toString(),
|
|
'Invalid liquidity APY'
|
|
);
|
|
|
|
expect(ethReserveDataAfter.availableLiquidity.toString()).to.be.bignumber.almostEqual(
|
|
new BigNumber(ethReserveDataBefore.availableLiquidity.toString()).toFixed(0),
|
|
'Invalid collateral available liquidity'
|
|
);
|
|
});
|
|
});
|