Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: withdrawal credentials #904

Open
wants to merge 23 commits into
base: develop
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 16 commits
Commits
Show all changes
23 commits
Select commit Hold shift + click to select a range
9b454a8
feat: add withdrawal credentials lib
mkurayan Dec 19, 2024
3bfe5ac
feat: split full and partial withdrawals
mkurayan Dec 19, 2024
4420a7c
feat: decouple fee allocation strategy from withdrawal request library
mkurayan Dec 21, 2024
1a394bf
feat: rename triggerable withdrawals lib
mkurayan Dec 23, 2024
5183e89
feat: add unit tests for triggerable withdrawals lib
mkurayan Dec 26, 2024
2fc90ec
feat: add unit tests for triggerable withdrawals in the withdrawal va…
mkurayan Dec 26, 2024
5888fac
feat: use lido locator instead of direct VEB address
mkurayan Jan 10, 2025
c251b90
feat: add access control to WithdrawalVault contract
mkurayan Jan 14, 2025
9cf5ea4
Merge commit '49c97519e932f5084d4faa698f14b261befa055d' into feat/wit…
mkurayan Jan 14, 2025
1b2dd97
refactor: remove unnecessary memory allocation
mkurayan Jan 15, 2025
d26dddc
feat: specify fee per request instead of total fee in TW library
mkurayan Jan 17, 2025
66ccbcf
feat: tightly pack pubkeys
mkurayan Jan 20, 2025
0f37e51
refactor: format code
mkurayan Jan 27, 2025
6f303e5
refactor: move TriggerableWithdrawals lib from 0.8.9 to common
mkurayan Jan 27, 2025
ade67a7
refactor: improve naming for address validation utility
mkurayan Jan 28, 2025
89d583a
test: add unit tests for Withdrawal Vault excess fee refund behavior
mkurayan Jan 28, 2025
cfadfb4
refactor: improve TriggerableWithdrawals lib methods description
mkurayan Jan 28, 2025
9f268cf
refactor: triggerable withdrawals lib rename errors for clarity
mkurayan Jan 28, 2025
811fdf8
refactor: describe full withdrawal method in withdrawal vault
mkurayan Jan 28, 2025
6cdc711
Merge commit '2d11786ebc1f06165c501fa8e9fecef053e12ab9' into feat/wit…
mkurayan Jan 30, 2025
6da1d6f
feat: grant withdrawal request role to ValidatorsExitBusOracle contra…
mkurayan Feb 1, 2025
1af1d3a
feat: validate withdrawal fee response
mkurayan Feb 4, 2025
c27de34
feat: update eip-7002 contract address
mkurayan Feb 4, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
103 changes: 85 additions & 18 deletions contracts/0.8.9/WithdrawalVault.sol
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
// SPDX-FileCopyrightText: 2023 Lido <[email protected]>
// SPDX-FileCopyrightText: 2025 Lido <[email protected]>
// SPDX-License-Identifier: GPL-3.0

/* See contracts/COMPILERS.md */
Expand All @@ -9,6 +9,9 @@
import "@openzeppelin/contracts-v4.4/token/ERC20/utils/SafeERC20.sol";

import {Versioned} from "./utils/Versioned.sol";
import {AccessControlEnumerable} from "./utils/access/AccessControlEnumerable.sol";
import {TriggerableWithdrawals} from "../common/lib/TriggerableWithdrawals.sol";
import {ILidoLocator} from "../common/interfaces/ILidoLocator.sol";

interface ILido {
/**
Expand All @@ -22,12 +25,14 @@
/**
* @title A vault for temporary storage of withdrawals
*/
contract WithdrawalVault is Versioned {
contract WithdrawalVault is AccessControlEnumerable, Versioned {
using SafeERC20 for IERC20;

ILido public immutable LIDO;
address public immutable TREASURY;

bytes32 public constant ADD_FULL_WITHDRAWAL_REQUEST_ROLE = keccak256("ADD_FULL_WITHDRAWAL_REQUEST_ROLE");

// Events
/**
* Emitted when the ERC20 `token` recovered (i.e. transferred)
Expand All @@ -42,34 +47,48 @@
event ERC721Recovered(address indexed requestedBy, address indexed token, uint256 tokenId);

// Errors
error LidoZeroAddress();
error TreasuryZeroAddress();
error ZeroAddress();
error NotLido();
error NotEnoughEther(uint256 requested, uint256 balance);
error ZeroAmount();
error InsufficientTriggerableWithdrawalFee(
uint256 providedTotalFee,
uint256 requiredTotalFee,
uint256 requestCount
);
error TriggerableWithdrawalRefundFailed();

/**
* @param _lido the Lido token (stETH) address
* @param _treasury the Lido treasury address (see ERC20/ERC721-recovery interfaces)
*/
constructor(ILido _lido, address _treasury) {
if (address(_lido) == address(0)) {
revert LidoZeroAddress();
}
if (_treasury == address(0)) {
revert TreasuryZeroAddress();
}
constructor(address _lido, address _treasury) {
_onlyNonZeroAddress(_lido);
_onlyNonZeroAddress(_treasury);

LIDO = _lido;
LIDO = ILido(_lido);
TREASURY = _treasury;
}

/**
* @notice Initialize the contract explicitly.
* Sets the contract version to '1'.
*/
function initialize() external {
_initializeContractVersionTo(1);
/// @notice Initializes the contract. Can be called only once.
/// @param _admin Lido DAO Aragon agent contract address.
/// @dev Proxy initialization method.
function initialize(address _admin) external {
// Initializations for v0 --> v2
_checkContractVersion(0);

_initialize_v2(_admin);
_initializeContractVersionTo(2);
}

/// @notice Finalizes upgrade to v2 (from v1). Can be called only once.
/// @param _admin Lido DAO Aragon agent contract address.
function finalizeUpgrade_v2(address _admin) external {
// Finalization for v1 --> v2
_checkContractVersion(1);

_initialize_v2(_admin);
_updateContractVersion(2);
}

/**
Expand Down Expand Up @@ -122,4 +141,52 @@

_token.transferFrom(address(this), TREASURY, _tokenId);
}

/**
* @dev Adds full withdrawal requests for the provided public keys.
* The validator will fully withdraw and exit its duties as a validator.
* @param pubkeys An array of public keys for the validators requesting full withdrawals.
*/
function addFullWithdrawalRequests(
bytes calldata pubkeys
) external payable onlyRole(ADD_FULL_WITHDRAWAL_REQUEST_ROLE) {
uint256 prevBalance = address(this).balance - msg.value;

uint256 minFeePerRequest = TriggerableWithdrawals.getWithdrawalRequestFee();
uint256 totalFee = (pubkeys.length / TriggerableWithdrawals.PUBLIC_KEY_LENGTH) * minFeePerRequest;

if (totalFee > msg.value) {
revert InsufficientTriggerableWithdrawalFee(
msg.value,
totalFee,
pubkeys.length / TriggerableWithdrawals.PUBLIC_KEY_LENGTH
);
}

TriggerableWithdrawals.addFullWithdrawalRequests(pubkeys, minFeePerRequest);

uint256 refund = msg.value - totalFee;
if (refund > 0) {
(bool success, ) = msg.sender.call{value: refund}("");

if (!success) {
revert TriggerableWithdrawalRefundFailed();
}
}

assert(address(this).balance == prevBalance);
}

function getWithdrawalRequestFee() external view returns (uint256) {
return TriggerableWithdrawals.getWithdrawalRequestFee();
}

function _onlyNonZeroAddress(address _address) internal pure {
if (_address == address(0)) revert ZeroAddress();
}

function _initialize_v2(address _admin) internal {
_onlyNonZeroAddress(_admin);
_setupRole(DEFAULT_ADMIN_ROLE, _admin);
}
}
154 changes: 154 additions & 0 deletions contracts/common/lib/TriggerableWithdrawals.sol
Original file line number Diff line number Diff line change
@@ -0,0 +1,154 @@
// SPDX-FileCopyrightText: 2025 Lido <[email protected]>
// SPDX-License-Identifier: GPL-3.0

/* See contracts/COMPILERS.md */
// solhint-disable-next-line lido/fixed-compiler-version
pragma solidity >=0.8.9 <0.9.0;
library TriggerableWithdrawals {
address constant WITHDRAWAL_REQUEST = 0x0c15F14308530b7CDB8460094BbB9cC28b9AaaAA;
uint256 internal constant WITHDRAWAL_REQUEST_CALLDATA_LENGTH = 56;
uint256 internal constant PUBLIC_KEY_LENGTH = 48;
uint256 internal constant WITHDRAWAL_AMOUNT_LENGTH = 8;

error MismatchedArrayLengths(uint256 keysCount, uint256 amountsCount);
error InsufficientBalance(uint256 balance, uint256 totalWithdrawalFee);
tamtamchik marked this conversation as resolved.
Show resolved Hide resolved
error InsufficientRequestFee(uint256 feePerRequest, uint256 minFeePerRequest);

error WithdrawalRequestFeeReadFailed();
error WithdrawalRequestAdditionFailed(bytes callData);
error NoWithdrawalRequests();
error PartialWithdrawalRequired(uint256 index);
error InvalidPublicKeyLength();

/**
* @dev Adds full withdrawal requests for the provided public keys.
* The validator will fully withdraw and exit its duties as a validator.
* @param pubkeys An array of public keys for the validators requesting full withdrawals.
*/
function addFullWithdrawalRequests(bytes calldata pubkeys, uint256 feePerRequest) internal {
uint256 keysCount = _validateAndCountPubkeys(pubkeys);
feePerRequest = _validateAndAdjustFee(feePerRequest, keysCount);

bytes memory callData = new bytes(56);

for (uint256 i = 0; i < keysCount; i++) {
_copyPubkeyToMemory(pubkeys, callData, i);

(bool success, ) = WITHDRAWAL_REQUEST.call{value: feePerRequest}(callData);

if (!success) {
revert WithdrawalRequestAdditionFailed(callData);
}
}
}

/**
* @dev Adds partial withdrawal requests for the provided public keys with corresponding amounts.
* A partial withdrawal is any withdrawal where the amount is greater than zero.
* A full withdrawal is any withdrawal where the amount is zero.
* This allows withdrawal of any balance exceeding 32 ETH (e.g., if a validator has 35 ETH, up to 3 ETH can be withdrawn).
* However, the protocol enforces a minimum balance of 32 ETH per validator, even if a higher amount is requested.
* @param pubkeys An array of public keys for the validators requesting withdrawals.
* @param amounts An array of corresponding withdrawal amounts for each public key.
*/
function addPartialWithdrawalRequests(
bytes calldata pubkeys,
uint64[] calldata amounts,
uint256 feePerRequest
) internal {
for (uint256 i = 0; i < amounts.length; i++) {
if (amounts[i] == 0) {
revert PartialWithdrawalRequired(i);
}
}

addWithdrawalRequests(pubkeys, amounts, feePerRequest);
}

/**
* @dev Adds partial or full withdrawal requests for the provided public keys with corresponding amounts.
* A partial withdrawal is any withdrawal where the amount is greater than zero.
* This allows withdrawal of any balance exceeding 32 ETH (e.g., if a validator has 35 ETH, up to 3 ETH can be withdrawn).
* However, the protocol enforces a minimum balance of 32 ETH per validator, even if a higher amount is requested.
* @param pubkeys An array of public keys for the validators requesting withdrawals.
* @param amounts An array of corresponding withdrawal amounts for each public key.
*/
function addWithdrawalRequests(bytes calldata pubkeys, uint64[] calldata amounts, uint256 feePerRequest) internal {
uint256 keysCount = _validateAndCountPubkeys(pubkeys);

if (keysCount != amounts.length) {
revert MismatchedArrayLengths(keysCount, amounts.length);
}

feePerRequest = _validateAndAdjustFee(feePerRequest, keysCount);

bytes memory callData = new bytes(56);
for (uint256 i = 0; i < keysCount; i++) {
_copyPubkeyToMemory(pubkeys, callData, i);
_copyAmountToMemory(callData, amounts[i]);

(bool success, ) = WITHDRAWAL_REQUEST.call{value: feePerRequest}(callData);

if (!success) {
revert WithdrawalRequestAdditionFailed(callData);
}
}
}

/**
* @dev Retrieves the current withdrawal request fee.
* @return The minimum fee required per withdrawal request.
*/
function getWithdrawalRequestFee() internal view returns (uint256) {
(bool success, bytes memory feeData) = WITHDRAWAL_REQUEST.staticcall("");

if (!success) {
revert WithdrawalRequestFeeReadFailed();
}

return abi.decode(feeData, (uint256));
}

function _copyPubkeyToMemory(bytes calldata pubkeys, bytes memory target, uint256 keyIndex) private pure {
assembly {
calldatacopy(add(target, 32), add(pubkeys.offset, mul(keyIndex, PUBLIC_KEY_LENGTH)), PUBLIC_KEY_LENGTH)
}
}

function _copyAmountToMemory(bytes memory target, uint64 amount) private pure {
assembly {
mstore(add(target, 80), shl(192, amount))
}
}

function _validateAndCountPubkeys(bytes calldata pubkeys) private pure returns (uint256) {
if (pubkeys.length % PUBLIC_KEY_LENGTH != 0) {
revert InvalidPublicKeyLength();
}

uint256 keysCount = pubkeys.length / PUBLIC_KEY_LENGTH;
if (keysCount == 0) {
revert NoWithdrawalRequests();
}

return keysCount;
}

function _validateAndAdjustFee(uint256 feePerRequest, uint256 keysCount) private view returns (uint256) {
uint256 minFeePerRequest = getWithdrawalRequestFee();

if (feePerRequest == 0) {
feePerRequest = minFeePerRequest;
}

if (feePerRequest < minFeePerRequest) {
revert InsufficientRequestFee(feePerRequest, minFeePerRequest);
}

if (address(this).balance < feePerRequest * keysCount) {
revert InsufficientBalance(address(this).balance, feePerRequest * keysCount);
tamtamchik marked this conversation as resolved.
Show resolved Hide resolved
}

return feePerRequest;
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ export async function main() {
const exitBusOracleAdmin = testnetAdmin;
const stakingRouterAdmin = testnetAdmin;
const withdrawalQueueAdmin = testnetAdmin;
const withdrawalVaultAdmin = testnetAdmin;

// Initialize NodeOperatorsRegistry

Expand Down Expand Up @@ -108,6 +109,10 @@ export async function main() {
{ from: deployer },
);

// Initialize WithdrawalVault
const withdrawalVault = await loadContract("WithdrawalVault", withdrawalVaultAddress);
await makeTx(withdrawalVault, "initialize", [withdrawalVaultAdmin], { from: deployer });

// Initialize WithdrawalQueue
const withdrawalQueue = await loadContract("WithdrawalQueueERC721", withdrawalQueueAddress);
await makeTx(withdrawalQueue, "initialize", [withdrawalQueueAdmin], { from: deployer });
Expand Down
31 changes: 31 additions & 0 deletions test/0.8.9/contracts/RefundFailureTester.sol
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
// SPDX-License-Identifier: UNLICENSED
// for testing purposes only

pragma solidity 0.8.9;

interface IWithdrawalVault {
function addFullWithdrawalRequests(bytes calldata pubkeys) external payable;
function getWithdrawalRequestFee() external view returns (uint256);
}

/**
* @notice This is a contract for testing refund failure in WithdrawalVault contract
*/
contract RefundFailureTester {
IWithdrawalVault private immutable withdrawalVault;

constructor(address _withdrawalVault) {
withdrawalVault = IWithdrawalVault(_withdrawalVault);
}

receive() external payable {
revert("Refund failed intentionally");
}

function addFullWithdrawalRequests(bytes calldata pubkeys) external payable {
require(msg.value > withdrawalVault.getWithdrawalRequestFee(), "Not enough eth for Refund");

// withdrawal vault should fail to refund
withdrawalVault.addFullWithdrawalRequests{value: msg.value}(pubkeys);
}
}
15 changes: 15 additions & 0 deletions test/0.8.9/contracts/WithdrawalVault__Harness.sol
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
// SPDX-License-Identifier: UNLICENSED
// for testing purposes only

pragma solidity 0.8.9;

import {WithdrawalVault} from "contracts/0.8.9/WithdrawalVault.sol";

contract WithdrawalVault__Harness is WithdrawalVault {
constructor(address _lido, address _treasury) WithdrawalVault(_lido, _treasury) {
}

function harness__initializeContractVersionTo(uint256 _version) external {
_initializeContractVersionTo(_version);
}
}
Loading
Loading