sui_bridge/server/
governance_verifier.rs

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
// Copyright (c) Mysten Labs, Inc.
// SPDX-License-Identifier: Apache-2.0

use std::collections::HashMap;

use crate::error::{BridgeError, BridgeResult};
use crate::server::handler::ActionVerifier;
use crate::types::{BridgeAction, BridgeActionDigest};

#[derive(Debug)]
pub struct GovernanceVerifier {
    approved_goverance_actions: HashMap<BridgeActionDigest, BridgeAction>,
}

impl GovernanceVerifier {
    pub fn new(approved_actions: Vec<BridgeAction>) -> BridgeResult<Self> {
        // TOOD(audit-blocking): verify chain ids
        let mut approved_goverance_actions = HashMap::new();
        for action in approved_actions {
            if !action.is_governace_action() {
                return Err(BridgeError::ActionIsNotGovernanceAction(action));
            }
            approved_goverance_actions.insert(action.digest(), action);
        }
        Ok(Self {
            approved_goverance_actions,
        })
    }
}

#[async_trait::async_trait]
impl ActionVerifier<BridgeAction> for GovernanceVerifier {
    fn name(&self) -> &'static str {
        "GovernanceVerifier"
    }

    async fn verify(&self, key: BridgeAction) -> BridgeResult<BridgeAction> {
        // TODO: an optimization would be to check the current nonce on chain and err for older ones
        if !key.is_governace_action() {
            return Err(BridgeError::ActionIsNotGovernanceAction(key));
        }
        if let Some(approved_action) = self.approved_goverance_actions.get(&key.digest()) {
            assert_eq!(
                &key, approved_action,
                "Mismatched action found in approved_actions"
            );
            return Ok(key);
        }
        return Err(BridgeError::GovernanceActionIsNotApproved);
    }
}

#[cfg(test)]
mod tests {
    use super::*;
    use crate::{
        test_utils::get_test_sui_to_eth_bridge_action,
        types::{BridgeAction, EmergencyAction, EmergencyActionType, LimitUpdateAction},
    };
    use sui_types::bridge::BridgeChainId;

    #[tokio::test]
    async fn test_governance_verifier() {
        let action_1 = BridgeAction::EmergencyAction(EmergencyAction {
            chain_id: BridgeChainId::EthCustom,
            nonce: 1,
            action_type: EmergencyActionType::Pause,
        });
        let action_2 = BridgeAction::LimitUpdateAction(LimitUpdateAction {
            chain_id: BridgeChainId::EthCustom,
            sending_chain_id: BridgeChainId::SuiCustom,
            nonce: 1,
            new_usd_limit: 10000,
        });

        let verifier = GovernanceVerifier::new(vec![action_1.clone(), action_2.clone()]).unwrap();
        assert_eq!(
            verifier.verify(action_1.clone()).await.unwrap(),
            action_1.clone()
        );
        assert_eq!(
            verifier.verify(action_2.clone()).await.unwrap(),
            action_2.clone()
        );

        let action_3 = BridgeAction::LimitUpdateAction(LimitUpdateAction {
            chain_id: BridgeChainId::EthCustom,
            sending_chain_id: BridgeChainId::SuiCustom,
            nonce: 2,
            new_usd_limit: 10000,
        });
        assert_eq!(
            verifier.verify(action_3).await.unwrap_err(),
            BridgeError::GovernanceActionIsNotApproved
        );

        // Token transfer action is not allowed
        let action_4 = get_test_sui_to_eth_bridge_action(None, None, None, None, None, None, None);
        assert!(matches!(
            GovernanceVerifier::new(vec![action_1, action_2, action_4.clone()]).unwrap_err(),
            BridgeError::ActionIsNotGovernanceAction(..)
        ));

        // Token transfer action will be rejected
        assert!(matches!(
            verifier.verify(action_4).await.unwrap_err(),
            BridgeError::ActionIsNotGovernanceAction(..)
        ));
    }
}