Skip to content

feat: slashing patch upgrade script #967

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Dec 18, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
123 changes: 123 additions & 0 deletions script/releases/v1.0.1-slashing/1-eoa.s.sol
Original file line number Diff line number Diff line change
@@ -0,0 +1,123 @@
// SPDX-License-Identifier: BUSL-1.1
pragma solidity ^0.8.12;

import {EOADeployer} from "zeus-templates/templates/EOADeployer.sol";
import "../Env.sol";

import "@openzeppelin/contracts/proxy/transparent/TransparentUpgradeableProxy.sol";
import "@openzeppelin/contracts/proxy/transparent/ProxyAdmin.sol";
import "@openzeppelin/contracts/token/ERC20/IERC20.sol";
import "@openzeppelin/contracts/token/ERC20/extensions/IERC20Metadata.sol";

contract Deploy is EOADeployer {
using Env for *;

function _runAsEOA() internal override {
vm.startBroadcast();
deployImpl({
name: type(AllocationManager).name,
deployedTo: address(new AllocationManager({
_delegation: Env.proxy.delegationManager(),
_pauserRegistry: Env.impl.pauserRegistry(),
_permissionController: Env.proxy.permissionController(),
_DEALLOCATION_DELAY: Env.MIN_WITHDRAWAL_DELAY(),
_ALLOCATION_CONFIGURATION_DELAY: Env.ALLOCATION_CONFIGURATION_DELAY()
}))
});

deployImpl({
name: type(DelegationManager).name,
deployedTo: address(new DelegationManager({
_strategyManager: Env.proxy.strategyManager(),
_eigenPodManager: Env.proxy.eigenPodManager(),
_allocationManager: Env.proxy.allocationManager(),
_pauserRegistry: Env.impl.pauserRegistry(),
_permissionController: Env.proxy.permissionController(),
_MIN_WITHDRAWAL_DELAY: Env.MIN_WITHDRAWAL_DELAY()
}))
});

vm.stopBroadcast();
}

function testDeploy() public virtual {
_runAsEOA();
_validateNewImplAddresses(false);
_validateImplConstructors();
_validateImplsInitialized();
}


/// @dev Validate that the `Env.impl` addresses are updated to be distinct from what the proxy
/// admin reports as the current implementation address.
///
/// Note: The upgrade script can call this with `areMatching == true` to check that these impl
/// addresses _are_ matches.
function _validateNewImplAddresses(bool areMatching) internal view {
function (address, address, string memory) internal pure assertion =
areMatching ? _assertMatch : _assertNotMatch;


assertion(
_getProxyImpl(address(Env.proxy.delegationManager())),
address(Env.impl.delegationManager()),
"delegationManager impl failed"
);

assertion(
_getProxyImpl(address(Env.proxy.allocationManager())),
address(Env.impl.allocationManager()),
"allocationManager impl failed"
);
}

/// @dev Validate the immutables set in the new implementation constructors
function _validateImplConstructors() internal view {
AllocationManager allocationManager = Env.impl.allocationManager();
assertTrue(allocationManager.delegation() == Env.proxy.delegationManager(), "alm.dm invalid");
assertTrue(allocationManager.pauserRegistry() == Env.impl.pauserRegistry(), "alm.pR invalid");
assertTrue(allocationManager.permissionController() == Env.proxy.permissionController(), "alm.pc invalid");
assertTrue(allocationManager.DEALLOCATION_DELAY() == Env.MIN_WITHDRAWAL_DELAY(), "alm.deallocDelay invalid");
assertTrue(allocationManager.ALLOCATION_CONFIGURATION_DELAY() == Env.ALLOCATION_CONFIGURATION_DELAY(), "alm.configDelay invalid");


DelegationManager delegation = Env.impl.delegationManager();
assertTrue(delegation.strategyManager() == Env.proxy.strategyManager(), "dm.sm invalid");
assertTrue(delegation.eigenPodManager() == Env.proxy.eigenPodManager(), "dm.epm invalid");
assertTrue(delegation.allocationManager() == Env.proxy.allocationManager(), "dm.alm invalid");
assertTrue(delegation.pauserRegistry() == Env.impl.pauserRegistry(), "dm.pR invalid");
assertTrue(delegation.permissionController() == Env.proxy.permissionController(), "dm.pc invalid");
assertTrue(delegation.minWithdrawalDelayBlocks() == Env.MIN_WITHDRAWAL_DELAY(), "dm.withdrawalDelay invalid");
}

/// @dev Call initialize on all deployed implementations to ensure initializers are disabled
function _validateImplsInitialized() internal {
bytes memory errInit = "Initializable: contract is already initialized";

AllocationManager allocationManager = Env.impl.allocationManager();
vm.expectRevert(errInit);
allocationManager.initialize(address(0), 0);

DelegationManager delegation = Env.impl.delegationManager();
vm.expectRevert(errInit);
delegation.initialize(address(0), 0);
}

/// @dev Query and return `proxyAdmin.getProxyImplementation(proxy)`
function _getProxyImpl(address proxy) internal view returns (address) {
return ProxyAdmin(Env.proxyAdmin()).getProxyImplementation(ITransparentUpgradeableProxy(proxy));
}

/// @dev Query and return `proxyAdmin.getProxyAdmin(proxy)`
function _getProxyAdmin(address proxy) internal view returns (address) {
return ProxyAdmin(Env.proxyAdmin()).getProxyAdmin(ITransparentUpgradeableProxy(proxy));
}

function _assertMatch(address a, address b, string memory err) private pure {
assertEq(a, b, err);
}

function _assertNotMatch(address a, address b, string memory err) private pure {
assertNotEq(a, b, err);
}
}
78 changes: 78 additions & 0 deletions script/releases/v1.0.1-slashing/2-multisig.s.sol
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
// SPDX-License-Identifier: BUSL-1.1
pragma solidity ^0.8.12;

import {Deploy} from "./1-eoa.s.sol";
import "../Env.sol";

import {MultisigBuilder} from "zeus-templates/templates/MultisigBuilder.sol";
import "zeus-templates/utils/Encode.sol";

import {TimelockController} from "@openzeppelin/contracts/governance/TimelockController.sol";

contract Queue is MultisigBuilder, Deploy {
using Env for *;
using Encode for *;

function _runAsMultisig() prank(Env.opsMultisig()) internal virtual override {
bytes memory calldata_to_executor = _getCalldataToExecutor();

TimelockController timelock = Env.timelockController();
timelock.schedule({
target: Env.executorMultisig(),
value: 0,
data: calldata_to_executor,
predecessor: 0,
salt: 0,
delay: timelock.getMinDelay()
});
}

/// @dev Get the calldata to be sent from the timelock to the executor
function _getCalldataToExecutor() internal returns (bytes memory) {
MultisigCall[] storage executorCalls = Encode.newMultisigCalls()
/// core/
.append({
to: Env.proxyAdmin(),
data: Encode.proxyAdmin.upgrade({
proxy: address(Env.proxy.allocationManager()),
impl: address(Env.impl.allocationManager())
})
})
.append({
to: Env.proxyAdmin(),
data: Encode.proxyAdmin.upgrade({
proxy: address(Env.proxy.delegationManager()),
impl: address(Env.impl.delegationManager())
})
});

return Encode.gnosisSafe.execTransaction({
from: address(Env.timelockController()),
to: address(Env.multiSendCallOnly()),
op: Encode.Operation.DelegateCall,
data: Encode.multiSend(executorCalls)
});
}

function testScript() public virtual {
runAsEOA();

TimelockController timelock = Env.timelockController();
bytes memory calldata_to_executor = _getCalldataToExecutor();
bytes32 txHash = timelock.hashOperation({
target: Env.executorMultisig(),
value: 0,
data: calldata_to_executor,
predecessor: 0,
salt: 0
});

// Check that the upgrade does not exist in the timelock
assertFalse(timelock.isOperationPending(txHash), "Transaction should NOT be queued.");

execute();

// Check that the upgrade has been added to the timelock
assertTrue(timelock.isOperationPending(txHash), "Transaction should be queued.");
}
}
75 changes: 75 additions & 0 deletions script/releases/v1.0.1-slashing/3-execute.s.sol
Original file line number Diff line number Diff line change
@@ -0,0 +1,75 @@
// SPDX-License-Identifier: BUSL-1.1
pragma solidity ^0.8.12;

import "../Env.sol";
import {Queue} from "./2-multisig.s.sol";

import "@openzeppelin/contracts/proxy/transparent/TransparentUpgradeableProxy.sol";
import "@openzeppelin/contracts/proxy/transparent/ProxyAdmin.sol";

contract Execute is Queue {
using Env for *;

function _runAsMultisig() prank(Env.protocolCouncilMultisig()) internal override(Queue) {
bytes memory calldata_to_executor = _getCalldataToExecutor();

TimelockController timelock = Env.timelockController();
timelock.execute({
target: Env.executorMultisig(),
value: 0,
payload: calldata_to_executor,
predecessor: 0,
salt: 0
});
}

function testScript() public virtual override(Queue){
// 0. Deploy Impls
runAsEOA();

TimelockController timelock = Env.timelockController();
bytes memory calldata_to_executor = _getCalldataToExecutor();
bytes32 txHash = timelock.hashOperation({
target: Env.executorMultisig(),
value: 0,
data: calldata_to_executor,
predecessor: 0,
salt: 0
});
assertFalse(timelock.isOperationPending(txHash), "Transaction should NOT be queued.");

// 1. Queue Upgrade
Queue._runAsMultisig();
_unsafeResetHasPranked(); // reset hasPranked so we can use it again

// 2. Warp past delay
vm.warp(block.timestamp + timelock.getMinDelay()); // 1 tick after ETA
assertEq(timelock.isOperationReady(txHash), true, "Transaction should be executable.");

// 3- execute
execute();

assertTrue(timelock.isOperationDone(txHash), "Transaction should be complete.");

// 4. Validate
_validateNewImplAddresses(true);
_validateProxyConstructors();
}

function _validateProxyConstructors() internal view {
AllocationManager allocationManager = Env.proxy.allocationManager();
assertTrue(allocationManager.delegation() == Env.proxy.delegationManager(), "alm.dm invalid");
assertTrue(allocationManager.pauserRegistry() == Env.impl.pauserRegistry(), "alm.pR invalid");
assertTrue(allocationManager.permissionController() == Env.proxy.permissionController(), "alm.pc invalid");
assertTrue(allocationManager.DEALLOCATION_DELAY() == Env.MIN_WITHDRAWAL_DELAY(), "alm.deallocDelay invalid");
assertTrue(allocationManager.ALLOCATION_CONFIGURATION_DELAY() == Env.ALLOCATION_CONFIGURATION_DELAY(), "alm.configDelay invalid");

DelegationManager delegation = Env.proxy.delegationManager();
assertTrue(delegation.strategyManager() == Env.proxy.strategyManager(), "dm.sm invalid");
assertTrue(delegation.eigenPodManager() == Env.proxy.eigenPodManager(), "dm.epm invalid");
assertTrue(delegation.allocationManager() == Env.proxy.allocationManager(), "dm.alm invalid");
assertTrue(delegation.pauserRegistry() == Env.impl.pauserRegistry(), "dm.pR invalid");
assertTrue(delegation.permissionController() == Env.proxy.permissionController(), "dm.pc invalid");
assertTrue(delegation.minWithdrawalDelayBlocks() == Env.MIN_WITHDRAWAL_DELAY(), "dm.withdrawalDelay invalid");
}
}
Loading