add route test framework
This commit is contained in:
34
contracts/lib/ExternalCall.sol
Normal file
34
contracts/lib/ExternalCall.sol
Normal file
@@ -0,0 +1,34 @@
|
||||
/*
|
||||
|
||||
Copyright 2020 DODO ZOO.
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
*/
|
||||
|
||||
pragma solidity 0.6.9;
|
||||
pragma experimental ABIEncoderV2;
|
||||
|
||||
library ExternalCall {
|
||||
// Source: https://github.com/gnosis/MultiSigWallet/blob/master/contracts/MultiSigWallet.sol
|
||||
// call has been separated into its own function in order to take advantage
|
||||
// of the Solidity's code generator to produce a loop that copies tx.data into memory.
|
||||
function externalCall(address destination, uint value, bytes memory data, uint dataOffset, uint dataLength, uint gasLimit) internal returns(bool result) {
|
||||
// solium-disable-next-line security/no-inline-assembly
|
||||
if (gasLimit == 0) {
|
||||
gasLimit = gasleft() - 40000;
|
||||
}
|
||||
assembly {
|
||||
let x := mload(0x40) // "Allocate" memory for output (0x40 is where "free memory" pointer is stored by convention)
|
||||
let d := add(data, 32) // First 32 bytes are the padded length of data, so exclude that
|
||||
result := call(
|
||||
gasLimit,
|
||||
destination,
|
||||
value,
|
||||
add(d, dataOffset),
|
||||
dataLength, // Size of the input (in bytes) - this is what fixes the padding problem
|
||||
x,
|
||||
0 // Output is ignored, therefore the output size is zero
|
||||
)
|
||||
}
|
||||
}
|
||||
}
|
||||
75
contracts/lib/UniversalERC20.sol
Normal file
75
contracts/lib/UniversalERC20.sol
Normal file
@@ -0,0 +1,75 @@
|
||||
/*
|
||||
|
||||
Copyright 2020 DODO ZOO.
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
*/
|
||||
|
||||
pragma solidity 0.6.9;
|
||||
|
||||
import {SafeMath} from "./SafeMath.sol";
|
||||
import {IERC20} from "../intf/IERC20.sol";
|
||||
import {SafeERC20} from "./SafeERC20.sol";
|
||||
|
||||
library UniversalERC20 {
|
||||
|
||||
using SafeMath for uint256;
|
||||
using SafeERC20 for IERC20;
|
||||
|
||||
IERC20 private constant ZERO_ADDRESS = IERC20(0x0000000000000000000000000000000000000000);
|
||||
IERC20 private constant ETH_ADDRESS = IERC20(0xEeeeeEeeeEeEeeEeEeEeeEEEeeeeEeeeeeeeEEeE);
|
||||
|
||||
function universalTransfer(IERC20 token, address to, uint256 amount) internal {
|
||||
universalTransfer(token, to, amount, false);
|
||||
}
|
||||
|
||||
function universalTransfer(IERC20 token, address to, uint256 amount, bool mayFail) internal returns(bool) {
|
||||
if (amount == 0) {
|
||||
return true;
|
||||
}
|
||||
|
||||
if (token == ZERO_ADDRESS || token == ETH_ADDRESS) {
|
||||
if (mayFail) {
|
||||
return address(uint160(to)).send(amount);
|
||||
} else {
|
||||
address(uint160(to)).transfer(amount);
|
||||
return true;
|
||||
}
|
||||
} else {
|
||||
token.safeTransfer(to, amount);
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
function universalApprove(IERC20 token, address to, uint256 amount) internal {
|
||||
if (token != ZERO_ADDRESS && token != ETH_ADDRESS) {
|
||||
token.safeApprove(to, amount);
|
||||
}
|
||||
}
|
||||
|
||||
function universalTransferFrom(IERC20 token, address from, address to, uint256 amount) internal {
|
||||
if (amount == 0) {
|
||||
return;
|
||||
}
|
||||
|
||||
if (token == ZERO_ADDRESS || token == ETH_ADDRESS) {
|
||||
require(from == msg.sender && msg.value >= amount, "msg.value is zero");
|
||||
if (to != address(this)) {
|
||||
address(uint160(to)).transfer(amount);
|
||||
}
|
||||
if (msg.value > amount) {
|
||||
msg.sender.transfer(msg.value.sub(amount));
|
||||
}
|
||||
} else {
|
||||
token.safeTransferFrom(from, to, amount);
|
||||
}
|
||||
}
|
||||
|
||||
function universalBalanceOf(IERC20 token, address who) internal view returns (uint256) {
|
||||
if (token == ZERO_ADDRESS || token == ETH_ADDRESS) {
|
||||
return who.balance;
|
||||
} else {
|
||||
return token.balanceOf(who);
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user