-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support EIP-7702 Delegations in Forge #9236
Conversation
…nDelegationCall, attachDelegationCall; modify broadcast to check if sender has a delegation
bytes32 delegation = vm.createDelegation(implementation, nonce); | ||
(uint8 v, bytes32 r, bytes32 s) = vm.signDelegation(delegation, pk); | ||
|
||
vm.attachDelegation(implementation, nonce, v, r, s); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe delegations would be attached to separate transactions vs broadcast blocks, so it would be something like
vm.startBroadcast();
vm.attachDelegation(implementation, nonce, v, r, s);
// this transactions would be broadcasted along with attached 7702 delegation
token.transfer(....);
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for the comment! looking at this closer - since 7702 makes the EOA itself the target of the tx, i think we need to route all calls through the EOA first.
right now we can do this with a raw call:
vm.startBroadcast();
vm.attachDelegation(implementation, nonce, v, r, s);
alice.call(abi.encodeCall(implementation.execute, (calls)));
but for better UX, maybe we could either:
- change attachDelegation to take authority instead of implementation (since we have the implementation in the call itself):
vm.attachDelegation(alice, nonce, v, r, s);
implementation.execute(calls);
- or add a helper like:
vm.delegatedCall(alice, implementation.execute, calls);
what do you think would be more ergonomic for users?
We should attach them to foundry/crates/cheatcodes/src/inspector.rs Lines 1004 to 1016 in 17e0981
I think we need to track them in both. In |
@klkvr thanks for the detailed feedback! Will push an update soon that addresses your comments. |
…o create and sign delegation in a single call; remove delegation logic from broadcast() - no need to track delegations here
…rrently failing bc 7702 implementation.execute not executed as Alice EOA
…quest by searching delegations hash map by active_delegation
@klkvr thanks for the pointer on looking at the anvil tests, it seems revm supports 7702, but i'm not clear on where in foundry we should be handling the delegation setup. any guidance? thanks in advance. |
right, we need to execute something similar to this https://github.com/bluealloy/revm/blob/346aa01398aa9b4e4e36776c21f6fe7169ed5d87/crates/revm/src/handler/mainnet/pre_execution.rs#L102 in we can probably skip some of the steps as we will anyway execute this later during on-chain simulation, but I think nonce check and increase should be kept because those may affect contract deployment addresses also we'll need to respect the authorization list here foundry/crates/script/src/simulate.rs Line 120 in d2ed15d
TxEnv for simulation, this might require small changes to executor
|
…rom signDelegation, as it can be constructed in cheatcode.
…gation cheatcode implementation
…g signature and setting bytecode on EOA; refactor signDelegation cheatcode implementation to get nonce from signer
…g from authority account
…alice account through SimpleDelegateContract
…ation - previous approach kept the delegation in the TxEnv, resulting in higher gas cost for all subsequent calls after the delegation was applied
crates/cheatcodes/src/script.rs
Outdated
impl Cheatcode for attachDelegationCall { | ||
fn apply_stateful(&self, ccx: &mut CheatsCtxt) -> Result { | ||
let Self { implementation, authority, v, r, s } = self; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
let's remove authority argument from here. it's redundant as we are always recovering it from signature
also wdyt on adding signAndAttach
method? I think common flow would be calling both of the cheatcodes
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not seeing how to construct the authorization without the authority's nonce, which we'd need to recover the authority from the signature. Can you clarify the flow you're thinking of?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we can get the nonce from state
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Right, but to get the nonce from state we need the authority's address to load their account - am I missing some other way to get their nonce?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in signDelegation
we can get authority address from private key, then get nonce, construct and sign delegation
and in attachDelegation
we can just recover authority from the signed delegation. right now the passed authority address is anyway expected to be the same as recovered one making it redundant
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ah I see what you mean. didn't notice that attachDelegation
doesn't accept nonce
let's make signDelegation
return a new struct SignedDelegation
which will contain v,r,s,nonce,implementation
. And then attachDelegation
would just accept this object
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've implemented a new cheatcode signAndAttachDelegation
and refactored the existing cheatcodes to use struct SignedDelegation
. Let me know what you think. Thanks!
…achDelegation to accept SignedDelegation
…signDelegation and attachDelegation
…ods for shared logic used in 7702 delegation cheatcodes
…AndAttachDelegation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nice, lgtm!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @evchip! Implementation looks good to me
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can be merged @grandizzy
- add `delegatecall` flag to `prank` cheatcodes (foundry-rs/foundry#8863) - support EIP-7702 Delegations (`create/sign/attachDelegation`) (foundry-rs/foundry#9236) - add `contains` to check if a string contains another string (foundry-rs/foundry#9085)
* add EIP-7702 cheatcodes: createDelegation, signDelegation, attachDelegation * add cheatcode implementations for EIP-7702: createDelegationCall, signDelegationCall, attachDelegationCall; modify broadcast to check if sender has a delegation * add delegations hashmap to Cheatcodes struct * add revm crate * create AttachDelegationTest for EIP-7702 transactions * regen cheatcodes.json * cargo fmt * move broadcast under attachDelegation * combine createDelegationCall logic with signDelegationCall in order to create and sign delegation in a single call; remove delegation logic from broadcast() - no need to track delegations here * remove revm import from workspace * combine createDelegation logic inton signDelegation for simplicity * remove revm from forge script deps * combine createDelegation with signDelegation * WIP - refactor test to use SimpleDelegateContract and ERC20 - test currently failing bc 7702 implementation.execute not executed as Alice EOA * add logic to include authorization_list for EIP 7702 in TransactionRequest by searching delegations hash map by active_delegation * add address authority param to attachDelegation; remove nonce param from signDelegation, as it can be constructed in cheatcode. * remove 7702 tx request construction logic - now handled in attachDelegation cheatcode implementation * refactor attachDelegation cheatcode implementation to handle verifying signature and setting bytecode on EOA; refactor signDelegation cheatcode implementation to get nonce from signer * remove nonce param from attachDelegation cheatcode in favor of loading from authority account * refactor test to check for code on alice account and call execute on alice account through SimpleDelegateContract * revert refactor on TransactionRequest * format * cargo fmt * fix clippy errors * remove faulty logic comparing nonce to itself - nonce still checked by recovered signature * add more tests to cover revert cases on attachDelegation and multiple calls via delegation contract * cargo fmt * restore logic to check if there's an active delegation when building TransactionRequest; add fixed values for gas and max_priority_fee_per_gas to ensure tx success, with TODO comment to explain what's left * remove obsolete comment * add comments explaining delegations and active_delegation * cargo fmt * add logic to increase gas limit by PER_EMPTY_ACCOUNT_COST(25k) if tx includes authorization list for EIP 7702 tx, which is seemingly not accounted for in gas estimation; remove hardcoded gas values from call_with_executor * revert logic to add PER_EMPTY_ACCOUNT_COST for EIP 7702 txs - handled inside of revm now * remove manually setting transaction type to 4 if auth list is present - handled in revm * add method set_delegation to Executor for setting EIP-7702 authorization list in the transaction environment; call set_delegation from simulate_and_fill if auth list is not empty * remove redundancy with TransactionMaybeSigned var tx * cargo fmt * refactor: use authorization_list() helper to return authorization_list and set delegation * refactor: change Cheatcodes::active_delegation to Option<SignedAuthorization> and remove delegations hashmap - tx will only use one active delegation at a time, so no need for mapping * replace verbose logic to set bytecode on EOA with journaled_state.set_code helper * cargo fmt * increment nonce of authority account * add logic to set authorization_list to None if active_delegation is None * add test testSwitchDelegation to assert that attaching an additional delegation switches the implementation on the EOA * remove set_delegation logic in favor of adding call_raw_with_authorization - previous approach kept the delegation in the TxEnv, resulting in higher gas cost for all subsequent calls after the delegation was applied * refactor signDelegation to return struct SignedDelegation and for attachDelegation to accept SignedDelegation * update delegation tests to reflect change in cheatcode interface for signDelegation and attachDelegation * add cheatcode signAndAttachDelegation * add signAndAttachDelegationCall cheatcode logic; refactor helper methods for shared logic used in 7702 delegation cheatcodes * add test testCallSingleSignAndAttachDelegation for new cheatcode signAndAttachDelegation * add comments to SignedDelegation struct and cargo fmt * cargo fmt * fix ci * fix spec --------- Co-authored-by: Arsenii Kulikov <klkvrr@gmail.com> Co-authored-by: grandizzy <38490174+grandizzy@users.noreply.github.com>
- add `delegatecall` flag to `prank` cheatcodes (foundry-rs/foundry#8863) - support EIP-7702 Delegations (`create/sign/attachDelegation`) (foundry-rs/foundry#9236) - add `contains` to check if a string contains another string (foundry-rs/foundry#9085)
Motivation
Adds initial support for EIP-7702 transaction delegation in Forge scripts.
Addresses #7128
Solution
createDelegation
: generates auth hashsignDelegation
: signs auth with pkattachDelegation
: connects signed delegation to senderLimitations:
Questions:
looking for feedback on state handling and current api limitations before expanding functionality.