- Run
git submodule update --init --recursive
to update/download all libraries. - Run
yarn install
to install any additional dependencies.
- Install solidity extension https://marketplace.visualstudio.com/items?itemName=juanblanco.solidity
- Navigate to a .sol file
- Right-click, select
Solidity: Change global compiler version (Remote)
- Select 0.7.6
- Install solhint extension https://marketplace.visualstudio.com/items?itemName=idrabenia.solidity-solhint
Install Foundry CLI (forge 0.2.0) from official website.
- To install a specific verison, see here.
Run forge test
to run test using installed forge cli or make test
to run tests in docker container.
Log level is controlled by the -v flag. For example, forge test -vv
displays console.log() statements from within contracts. Highest verbosity is -vvvvv. More info: https://book.getfoundry.sh/forge/tests.html#logs-and-traces. Contracts that use console.log() must import lib/forge-std/src/console.sol.
Run make anvil-test
to setup anvil
test node in docker container and run integration tests. There is an example in anvil/
folder
Run yarn lint
to lint all .sol
files in the src
and test
directories.
Run make analyze
to set up Python dependencies from requirements.txt
and run Slither on all source files, requiring the foundry cli to be installed locally. If all dependencies have been installed, alternatively run slither .
to run static analysis on all .sol
files in the src
directory.
We use Github actions to run linter and all the tests. The workflow configuration can be found in .github/workflows/ci.yml
Use Docker to run Foundry commands. Run make build
to build Foundry docker image. Then run docker run --rm foundry "<COMMAND>"
to run any forge, anvil or cast commands. There are some pre defined commands available in Makefile
for testing and deploying contract on anvil
. More info on Docker and Foundry here.
ℹ️ Note
- Some machines (including those with M1 chips) may be unable to build the docker image locally. This is a known issue.
The contracts are deployed using Forge Scripts. The script is located in scripts/1_deploy.s.sol. Follow the below steps to deploy the contracts:
-
Add the below environment variables to your env file
MESSAGE_TRANSMITTER_DEPLOYER_KEY
TOKEN_MESSENGER_DEPLOYER_KEY
TOKEN_MINTER_DEPLOYER_KEY
TOKEN_CONTROLLER_DEPLOYER_KEY
ATTESTER_ADDRESS
USDC_CONTRACT_ADDRESS
REMOTE_USDC_CONTRACT_ADDRESS
MESSAGE_TRANSMITTER_PAUSER_ADDRESS
TOKEN_MINTER_PAUSER_ADDRESS
MESSAGE_TRANSMITTER_RESCUER_ADDRESS
TOKEN_MESSENGER_RESCUER_ADDRESS
TOKEN_MINTER_RESCUER_ADDRESS
TOKEN_CONTROLLER_ADDRESS
DOMAIN
REMOTE_DOMAIN
BURN_LIMIT_PER_MESSAGE
In addition, to link the remote bridge, one of two steps needs to be followed:
- Add the
REMOTE_TOKEN_MESSENGER_DEPLOYER
address to your env file and run scripts/precomputeRemoteMessengerAddress.py with argument--REMOTE_RPC_URL
for the remote chain, which will automatically add theREMOTE_TOKEN_MESSENGER_ADDRESS
to the .env file - Manually add the
REMOTE_TOKEN_MESSENGER_ADDRESS
to your .env file.
-
Run
make simulate-deploy RPC_URL=<RPC_URL> SENDER=<SENDER>
to perform a dry run. Note: Use address from one of the private keys (used for deploying) above assender
. It is used to deploy the shared libraries that contracts use -
Run
make deploy RPC_URL=<RPC_URL> SENDER=<SENDER>
to deploy the contracts -
Replace the environment variables in your env file with:
MESSAGE_TRANSMITTER_CONTRACT_ADDRESS
MESSAGE_TRANSMITTER_DEPLOYER_KEY
NEW_ATTESTER_MANAGER_ADDRESS
SECOND_ATTESTER_ADDRESS
-
Run
make simulate-setup-second-attester RPC_URL=<RPC_URL> SENDER=<SENDER>
to perform a dry run of setting up the second attester. -
Run
make setup-second-attester RPC_URL=<RPC_URL> SENDER=<SENDER>
to setup the second attester. -
Replace the environment variables in your env file with the following. We'll just add one remote resource (e.g. adding remote token messenger and remote usdc contract addresses) at a time, so just pick any and then repeat these steps. This will need to be repeated for each remote chain:
TOKEN_MESSENGER_DEPLOYER_KEY
TOKEN_CONTROLLER_KEY
REMOTE_TOKEN_MESSENGER_ADDRESS
TOKEN_MINTER_CONTRACT_ADDRESS
TOKEN_MESSENGER_CONTRACT_ADDRESS
REMOTE_USDC_CONTRACT_ADDRESS
USDC_CONTRACT_ADDRESS
REMOTE_DOMAIN
-
Run
make simulate-setup-remote-resources RPC_URL=<RPC_URL> SENDER=<SENDER>
to perform a dry run of adding remote resources. -
Run
make setup-remote-resources RPC_URL=<RPC_URL> SENDER=<SENDER>
to setup the remote resources. -
Repeat steps 7-9 for all remote resources. This needs to be done for all existing remote chains at contract setup except for the initial remote chain used in
1_deploy.s.sol
.
[Only execute the following if replacing remote resources for an existing chain]
-
Replace the environment variables in your env file with the following. We'll replace one set of remote resources for a given chain (e.g. changing the remote token messenger and remote usdc contract addresses) at a time so it will need to be repeated for each applicable chain.
TOKEN_MESSENGER_DEPLOYER_KEY
TOKEN_CONTROLLER_KEY
REMOTE_TOKEN_MESSENGER_ADDRESS
REMOTE_TOKEN_MESSENGER_ADDRESS_DEPRECATED
TOKEN_MINTER_CONTRACT_ADDRESS
TOKEN_MESSENGER_CONTRACT_ADDRESS
REMOTE_USDC_CONTRACT_ADDRESS
REMOTE_USDC_CONTRACT_ADDRESS_DEPRECATED
USDC_CONTRACT_ADDRESS
REMOTE_DOMAIN
-
Run
make simulate-replace-remote-resources RPC_URL=<RPC_URL> SENDER=<SENDER>
to perform a dry run of replacing remote resources. -
Run
make replace-remote-resources RPC_URL=<RPC_URL> SENDER=<SENDER>
to replace the remote resources.
[Remaining steps are only for mainnet]
-
Replace the environment variables in your env file with:
MESSAGE_TRANSMITTER_CONTRACT_ADDRESS
TOKEN_MESSENGER_CONTRACT_ADDRESS
TOKEN_MINTER_CONTRACT_ADDRESS
MESSAGE_TRANSMITTER_DEPLOYER_KEY
TOKEN_MESSENGER_DEPLOYER_KEY
TOKEN_MINTER_DEPLOYER_KEY
MESSAGE_TRANSMITTER_NEW_OWNER_ADDRESS
TOKEN_MESSENGER_NEW_OWNER_ADDRESS
TOKEN_MINTER_NEW_OWNER_ADDRESS
NEW_TOKEN_CONTROLLER_ADDRESS
-
Run
make simulate-rotate-keys RPC_URL=<RPC_URL> SENDER=<SENDER>
to perform a dry run of rotating the keys. -
Run
make rotate-keys RPC_URL=<RPC_URL> SENDER=<SENDER>
to rotate keys.
A Noble token denom is represented as an alphanumeric string, for example, uusdc
. We need to convert this to the Solidity bytes32 type so we
can reference it from EVM contracts. To compute this value from the scripts/noble directory, run:
python3 ./computeHash.py --DENOM <denom>
.
The script will output the bytes32 value as hex.
A Solidity implementation is also provided for optional additional verification. This can be run by creating an .env file in the scripts/noble directory with a DENOM env var, e.g. DENOM=uusdc
, and then running:
forge script ./computeHash.s.sol