Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: integrate HorizonAccountingExtension #37

Open
wants to merge 16 commits into
base: dev
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 7 additions & 3 deletions src/contracts/HorizonAccountingExtension.sol
Original file line number Diff line number Diff line change
Expand Up @@ -250,7 +250,7 @@ contract HorizonAccountingExtension is Validator, IHorizonAccountingExtension {
});
}

// TODO: Remove
// TODO: Remove?
/// @inheritdoc IHorizonAccountingExtension
function releasePledge(
IOracle.Request calldata _request,
Expand All @@ -270,6 +270,8 @@ contract HorizonAccountingExtension is Validator, IHorizonAccountingExtension {
pledges[_disputeId] -= _amount;
}

// TODO: _pledgers[_disputeId].remove(_pledger);

_unbond(_pledger, _amount);

emit PledgeReleased({_requestId: _requestId, _disputeId: _disputeId, _pledger: _pledger, _amount: _amount});
Expand Down Expand Up @@ -416,9 +418,10 @@ contract HorizonAccountingExtension is Validator, IHorizonAccountingExtension {
if (_slashAmount > 0) {
// Slash the user
HORIZON_STAKING.slash(_user, _slashAmount, _slashAmount, address(this));
// TODO: What if `MIN_THAWING_PERIOD` has passed, all provision tokens have been thawed and slashing is skipped or reverts (bricking `claimEscalationReward()`)?
// TODO: What if `MIN_THAWING_PERIOD` has passed, all provision tokens have been thawed
// and slashing is skipped or reverts (bricking `claimEscalationReward()`)?

// TODO: Unbond slashed pledgers
_unbond(_user, _slashAmount);
0xShaito marked this conversation as resolved.
Show resolved Hide resolved

_slashedAmount += _slashAmount;

Expand Down Expand Up @@ -466,6 +469,7 @@ contract HorizonAccountingExtension is Validator, IHorizonAccountingExtension {
if (_provisionData.maxVerifierCut != MAX_VERIFIER_CUT) revert HorizonAccountingExtension_InvalidMaxVerifierCut();
if (_provisionData.thawingPeriod < MIN_THAWING_PERIOD) revert HorizonAccountingExtension_InvalidThawingPeriod();
if (_amount > _provisionData.tokens) revert HorizonAccountingExtension_InsufficientTokens();
// TODO: `thaw()` does not subtract from provision `tokens` but adds to `tokensThawing`

totalBonded[_bonder] += _amount;

Expand Down
4 changes: 2 additions & 2 deletions test/integration/arbitrum/BondEscalation.t.sol
Original file line number Diff line number Diff line change
Expand Up @@ -339,7 +339,7 @@ contract IntegrationBondEscalation is IntegrationBase {
assertTrue(horizonAccountingExtension.pledgerClaimed(_requestId, _pledgerAgainst));
assertEq(horizonAccountingExtension.pledges(_disputeId), 0);
assertEq(horizonAccountingExtension.totalBonded(_pledgerFor), 0);
assertEq(horizonAccountingExtension.totalBonded(_pledgerAgainst), disputeBondSize); // TODO: `disputeBondSize` remains bonded
assertEq(horizonAccountingExtension.totalBonded(_pledgerAgainst), 0);
address[] memory _pledgers = horizonAccountingExtension.getPledgers(_disputeId);
assertEq(_pledgers[0], _pledgerFor); // TODO: `_pledgerFor` remains in the pledgers list
assertEq(_pledgers.length, 1);
Expand Down Expand Up @@ -392,7 +392,7 @@ contract IntegrationBondEscalation is IntegrationBase {
assertTrue(horizonAccountingExtension.pledgerClaimed(_requestId, _pledgerFor));
assertTrue(horizonAccountingExtension.pledgerClaimed(_requestId, _pledgerAgainst));
assertEq(horizonAccountingExtension.pledges(_disputeId), 0);
assertEq(horizonAccountingExtension.totalBonded(_pledgerFor), disputeBondSize); // TODO: `disputeBondSize` remains bonded
assertEq(horizonAccountingExtension.totalBonded(_pledgerFor), 0);
assertEq(horizonAccountingExtension.totalBonded(_pledgerAgainst), 0);
address[] memory _pledgers = horizonAccountingExtension.getPledgers(_disputeId);
assertEq(_pledgers[0], _pledgerAgainst); // TODO: `_pledgerAgainst` remains in the pledgers list
Expand Down
116 changes: 107 additions & 9 deletions test/unit/HorizonAccountingExtension.t.sol
Original file line number Diff line number Diff line change
Expand Up @@ -557,6 +557,36 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
horizonAccountingExtension.claimEscalationReward(_mockDisputeId, _pledger);
}

function test_revertIfInsufficientBondedTokens(
address _pledger,
uint256 _pledgesForDispute,
uint256 _pledgesAgainstDispute,
uint256 _bondSize,
uint256 _amount
) public happyPath(_pledgesForDispute, _pledgesAgainstDispute, _bondSize, _amount) {
// Mock and expect the call to oracle checking the dispute status
_mockAndExpect(
address(oracle),
abi.encodeWithSelector(IOracle.disputeStatus.selector, _mockDisputeId),
abi.encode(IOracle.DisputeStatus.NoResolution)
);

_mockAndExpect(
address(bondEscalationModule),
abi.encodeWithSelector(IBondEscalationModule.pledgesForDispute.selector, _mockRequestId, _pledger),
abi.encode(_pledgesForDispute)
);

_mockAndExpect(
address(bondEscalationModule),
abi.encodeWithSelector(IBondEscalationModule.pledgesAgainstDispute.selector, _mockRequestId, _pledger),
abi.encode(_pledgesAgainstDispute)
);

vm.expectRevert(IHorizonAccountingExtension.HorizonAccountingExtension_InsufficientBondedTokens.selector);
horizonAccountingExtension.claimEscalationReward(_mockDisputeId, _pledger);
}

function test_successfulCallNoResolution(
address _pledger,
uint256 _pledgesForDispute,
Expand Down Expand Up @@ -709,6 +739,9 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
) public happyPath(_pledgesForDispute, _pledgesAgainstDispute, _bondSize, _amount) {
vm.assume(_pledger != _slashedUser);
vm.assume(_slashedUser != _notSlashedUser);

_pledgesAgainstDispute = _pledgesForDispute * _amount / _bondSize + 1;

// Mock and expect the call to oracle checking the dispute status
_mockAndExpect(
address(oracle),
Expand All @@ -731,7 +764,7 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
_mockAndExpect(
address(bondEscalationModule),
abi.encodeWithSelector(IBondEscalationModule.pledgesAgainstDispute.selector, _mockRequestId, _slashedUser),
abi.encode(_pledgesForDispute * _amount / _bondSize + 1)
abi.encode(_pledgesAgainstDispute)
);

_mockAndExpect(
Expand All @@ -752,6 +785,7 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
);

horizonAccountingExtension.setBondedTokensForTest(_pledger, _bondSize * _pledgesForDispute);
horizonAccountingExtension.setBondedTokensForTest(_slashedUser, _bondSize * _pledgesAgainstDispute);

horizonAccountingExtension.setPledgersForTest(_mockDisputeId, _notSlashedUser);
horizonAccountingExtension.setPledgersForTest(_mockDisputeId, _slashedUser);
Expand All @@ -767,6 +801,12 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
);

horizonAccountingExtension.claimEscalationReward(_mockDisputeId, _pledger);

uint256 _pledgerTotalBondedAfter = horizonAccountingExtension.totalBonded(_pledger);
uint256 _slashedUserTotalBondedAfter = horizonAccountingExtension.totalBonded(_slashedUser);

assertEq(_pledgerTotalBondedAfter, 0);
assertEq(_slashedUserTotalBondedAfter, 0);
}

function test_successfulCallLostAgainstDisputeSlashing(
Expand All @@ -780,6 +820,9 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
) public happyPath(_pledgesForDispute, _pledgesAgainstDispute, _bondSize, _amount) {
vm.assume(_pledger != _slashedUser);
vm.assume(_slashedUser != _notSlashedUser);

_pledgesForDispute = _pledgesAgainstDispute * _amount / _bondSize + 1;

// Mock and expect the call to oracle checking the dispute status
_mockAndExpect(
address(oracle),
Expand All @@ -802,7 +845,7 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
_mockAndExpect(
address(bondEscalationModule),
abi.encodeWithSelector(IBondEscalationModule.pledgesForDispute.selector, _mockRequestId, _slashedUser),
abi.encode(_pledgesAgainstDispute * _amount / _bondSize + 1)
abi.encode(_pledgesForDispute)
);

_mockAndExpect(
Expand All @@ -823,6 +866,7 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
);

horizonAccountingExtension.setBondedTokensForTest(_pledger, _bondSize * _pledgesAgainstDispute);
horizonAccountingExtension.setBondedTokensForTest(_slashedUser, _bondSize * _pledgesForDispute);

horizonAccountingExtension.setPledgersForTest(_mockDisputeId, _notSlashedUser);
horizonAccountingExtension.setPledgersForTest(_mockDisputeId, _slashedUser);
Expand All @@ -838,6 +882,12 @@ contract HorizonAccountingExtension_Unit_ClaimEscalationReward is HorizonAccount
);

horizonAccountingExtension.claimEscalationReward(_mockDisputeId, _pledger);

uint256 _pledgerTotalBondedAfter = horizonAccountingExtension.totalBonded(_pledger);
uint256 _slashedUserTotalBondedAfter = horizonAccountingExtension.totalBonded(_slashedUser);

assertEq(_pledgerTotalBondedAfter, 0);
assertEq(_slashedUserTotalBondedAfter, 0);
}
}

Expand Down Expand Up @@ -1446,13 +1496,16 @@ contract HorizonAccountingExtension_Unit_Slash is HorizonAccountingExtension_Uni
vm.assume(_pledgesForDispute > 0 && _pledgesForDispute < type(uint16).max);
vm.assume(_bondSize > 0 && _bondSize < type(uint16).max);

uint256 _slashAmount = _pledgesForDispute * _bondSize;

for (uint256 _i; _i < _users.length; _i++) {
horizonAccountingExtension.setPledgersForTest(_mockDisputeId, _users[_i]);
_cleanPledgers.add(_users[_i]);
}

for (uint256 _i; _i < _cleanPledgers.length(); _i++) {
assertEq(horizonAccountingExtension.getPledgerForTest(_mockDisputeId, _i), _cleanPledgers.at(_i));
horizonAccountingExtension.setBondedTokensForTest(_cleanPledgers.at(_i), _slashAmount);
}

horizonAccountingExtension.setEscalationResultForTest(
Expand All @@ -1466,9 +1519,44 @@ contract HorizonAccountingExtension_Unit_Slash is HorizonAccountingExtension_Uni
vm.assume(_maxUsersToCheck > 0 && _maxUsersToCheck < type(uint16).max);

horizonAccountingExtension.setPledgersForTest(_mockDisputeId, _pledger);
// Check: does it revert if the module is not allowed?

vm.expectRevert(IHorizonAccountingExtension.HorizonAccountingExtension_NoEscalationResult.selector);
horizonAccountingExtension.slash(_mockDisputeId, _usersToSlash, _maxUsersToCheck);
}

function test_revertIfInsufficientBondedTokens(
uint256 _usersToSlash,
uint256 _maxUsersToCheck,
address[] memory _users,
uint256 _pledgesAgainstDispute,
uint256 _bondSize
) public happyPath(_usersToSlash, _maxUsersToCheck, _users, _pledgesAgainstDispute, _bondSize) {
horizonAccountingExtension.setBondedTokensForTest(_cleanPledgers.at(0), 0);

// Mock and expect the call to oracle checking the dispute status
_mockAndExpect(
address(oracle),
abi.encodeWithSelector(IOracle.disputeStatus.selector, _mockDisputeId),
abi.encode(IOracle.DisputeStatus.Won)
);

uint256 _slashAmount = _pledgesAgainstDispute * _bondSize;

_mockAndExpect(
address(bondEscalationModule),
abi.encodeCall(IBondEscalationModule.pledgesAgainstDispute, (_mockRequestId, _cleanPledgers.at(0))),
abi.encode(_pledgesAgainstDispute)
);

_mockAndExpect(
address(horizonStaking),
abi.encodeCall(
IHorizonStaking.slash, (_cleanPledgers.at(0), _slashAmount, _slashAmount, address(horizonAccountingExtension))
),
abi.encode(true)
);

vm.expectRevert(IHorizonAccountingExtension.HorizonAccountingExtension_InsufficientBondedTokens.selector);
horizonAccountingExtension.slash(_mockDisputeId, _usersToSlash, _maxUsersToCheck);
}

Expand All @@ -1487,17 +1575,15 @@ contract HorizonAccountingExtension_Unit_Slash is HorizonAccountingExtension_Uni
);

uint256 _length = _cleanPledgers.length();
uint256 _slashAmount = _pledgesAgainstDispute * _bondSize;

uint256 _slashAmount;
for (uint256 _i; _i < _length; _i++) {
_mockAndExpect(
address(bondEscalationModule),
abi.encodeCall(IBondEscalationModule.pledgesAgainstDispute, (_mockRequestId, _cleanPledgers.at(_i))),
abi.encode(_pledgesAgainstDispute)
);

_slashAmount = _pledgesAgainstDispute * _bondSize;

_mockAndExpect(
address(horizonStaking),
abi.encodeCall(
Expand All @@ -1509,6 +1595,13 @@ contract HorizonAccountingExtension_Unit_Slash is HorizonAccountingExtension_Uni
}

horizonAccountingExtension.slash(_mockDisputeId, _length, _length);

uint256 _totalBondedAfter;
for (uint256 _i; _i < _length; _i++) {
_totalBondedAfter = horizonAccountingExtension.totalBonded(_cleanPledgers.at(_i));

assertEq(_totalBondedAfter, 0);
}
}

function test_successfulCallResultionLost(
Expand All @@ -1526,17 +1619,15 @@ contract HorizonAccountingExtension_Unit_Slash is HorizonAccountingExtension_Uni
);

uint256 _length = _cleanPledgers.length();
uint256 _slashAmount = _pledgesForDispute * _bondSize;

uint256 _slashAmount;
for (uint256 _i; _i < _length; _i++) {
_mockAndExpect(
address(bondEscalationModule),
abi.encodeCall(IBondEscalationModule.pledgesForDispute, (_mockRequestId, _cleanPledgers.at(_i))),
abi.encode(_pledgesForDispute)
);

_slashAmount = _pledgesForDispute * _bondSize;

_mockAndExpect(
address(horizonStaking),
abi.encodeCall(
Expand All @@ -1548,6 +1639,13 @@ contract HorizonAccountingExtension_Unit_Slash is HorizonAccountingExtension_Uni
}

horizonAccountingExtension.slash(_mockDisputeId, _length, _length);

uint256 _totalBondedAfter;
for (uint256 _i; _i < _length; _i++) {
_totalBondedAfter = horizonAccountingExtension.totalBonded(_cleanPledgers.at(_i));

assertEq(_totalBondedAfter, 0);
}
}

function test_successfulCallNoResultion(
Expand Down