From be4773f88c608d6a7146399fe716168cdc072040 Mon Sep 17 00:00:00 2001
From: Andrei <16517508+anvacaru@users.noreply.github.com>
Date: Mon, 22 Jul 2024 09:57:12 +0300
Subject: [PATCH 1/3] bring repo up to date
---
.gitmodules | 9 +
lib/forge-std | 1 -
lib/kontrol-cheatcodes | 1 -
README.md => old/README.md | 0
erc20.sh => old/erc20.sh | 0
exclude => old/exclude | 0
foundry.toml => old/foundry.toml | 0
lemmas.k => old/lemmas.k | 0
old/lib/forge-std/.github/workflows/tests.yml | 27 +
old/lib/forge-std/.gitignore | 4 +
old/lib/forge-std/.gitmodules | 3 +
old/lib/forge-std/LICENSE-APACHE | 203 +++
old/lib/forge-std/LICENSE-MIT | 25 +
old/lib/forge-std/README.md | 246 +++
old/lib/forge-std/foundry.toml | 2 +
old/lib/forge-std/lib/ds-test/.gitignore | 3 +
old/lib/forge-std/lib/ds-test/LICENSE | 674 ++++++++
old/lib/forge-std/lib/ds-test/Makefile | 14 +
old/lib/forge-std/lib/ds-test/default.nix | 4 +
old/lib/forge-std/lib/ds-test/demo/demo.sol | 222 +++
old/lib/forge-std/lib/ds-test/src/test.sol | 469 +++++
old/lib/forge-std/src/Script.sol | 44 +
old/lib/forge-std/src/StdJson.sol | 118 ++
old/lib/forge-std/src/Test.sol | 1138 ++++++++++++
old/lib/forge-std/src/Vm.sol | 238 +++
old/lib/forge-std/src/console.sol | 1533 ++++++++++++++++
old/lib/forge-std/src/console2.sol | 1538 +++++++++++++++++
old/lib/forge-std/src/test/Script.t.sol | 20 +
.../forge-std/src/test/StdAssertions.t.sol | 602 +++++++
old/lib/forge-std/src/test/StdCheats.t.sol | 282 +++
old/lib/forge-std/src/test/StdError.t.sol | 124 ++
old/lib/forge-std/src/test/StdMath.t.sol | 200 +++
old/lib/forge-std/src/test/StdStorage.t.sol | 321 ++++
.../src/test/fixtures/broadcast.log.json | 187 ++
old/lib/kontrol-cheatcodes/README.md | 19 +
.../src/IKontrolCheatsBase.sol | 38 +
.../kontrol-cheatcodes/src/KontrolCheats.sol | 275 +++
{media => old/media}/KontrolViewKCFGDemo.png | 0
.../media}/KontrolViewKCFGStaticDemo.png | 0
run-kontrol.sh => old/run-kontrol.sh | 0
{script => old/script}/Counter.s.sol | 0
{src => old/src}/ERC20.sol | 0
{src => old/src}/exclusiveToken.sol | 0
.../src}/extensions/IERC20Metadata.sol | 0
{src => old/src}/token.sol | 0
{src => old/src}/utils/Context.sol | 0
{src => old/src}/utils/IERC20.sol | 0
{test => old/test}/ERC20.t.sol | 0
{test => old/test}/exclusiveToken.t.sol | 0
{test => old/test}/simple.t.sol | 0
{test => old/test}/token.t.sol | 0
oz_erc20/.github/workflows/test.yml | 45 +
oz_erc20/.gitignore | 14 +
oz_erc20/README.md | 66 +
oz_erc20/foundry.toml | 8 +
oz_erc20/kontrol.toml | 34 +
oz_erc20/lemmas.k | 85 +
oz_erc20/lib/forge-std | 1 +
oz_erc20/lib/kontrol-cheatcodes | 1 +
oz_erc20/lib/openzeppelin-contracts | 1 +
oz_erc20/remappings.txt | 1 +
oz_erc20/run-kontrol.sh | 4 +
oz_erc20/script/GLDToken.s.sol | 19 +
oz_erc20/src/GLDToken.sol | 26 +
oz_erc20/test/GLDToken.t.sol | 408 +++++
65 files changed, 9295 insertions(+), 2 deletions(-)
delete mode 160000 lib/forge-std
delete mode 160000 lib/kontrol-cheatcodes
rename README.md => old/README.md (100%)
rename erc20.sh => old/erc20.sh (100%)
rename exclude => old/exclude (100%)
rename foundry.toml => old/foundry.toml (100%)
rename lemmas.k => old/lemmas.k (100%)
create mode 100644 old/lib/forge-std/.github/workflows/tests.yml
create mode 100644 old/lib/forge-std/.gitignore
create mode 100644 old/lib/forge-std/.gitmodules
create mode 100644 old/lib/forge-std/LICENSE-APACHE
create mode 100644 old/lib/forge-std/LICENSE-MIT
create mode 100644 old/lib/forge-std/README.md
create mode 100644 old/lib/forge-std/foundry.toml
create mode 100644 old/lib/forge-std/lib/ds-test/.gitignore
create mode 100644 old/lib/forge-std/lib/ds-test/LICENSE
create mode 100644 old/lib/forge-std/lib/ds-test/Makefile
create mode 100644 old/lib/forge-std/lib/ds-test/default.nix
create mode 100644 old/lib/forge-std/lib/ds-test/demo/demo.sol
create mode 100644 old/lib/forge-std/lib/ds-test/src/test.sol
create mode 100644 old/lib/forge-std/src/Script.sol
create mode 100644 old/lib/forge-std/src/StdJson.sol
create mode 100644 old/lib/forge-std/src/Test.sol
create mode 100644 old/lib/forge-std/src/Vm.sol
create mode 100644 old/lib/forge-std/src/console.sol
create mode 100644 old/lib/forge-std/src/console2.sol
create mode 100644 old/lib/forge-std/src/test/Script.t.sol
create mode 100644 old/lib/forge-std/src/test/StdAssertions.t.sol
create mode 100644 old/lib/forge-std/src/test/StdCheats.t.sol
create mode 100644 old/lib/forge-std/src/test/StdError.t.sol
create mode 100644 old/lib/forge-std/src/test/StdMath.t.sol
create mode 100644 old/lib/forge-std/src/test/StdStorage.t.sol
create mode 100644 old/lib/forge-std/src/test/fixtures/broadcast.log.json
create mode 100644 old/lib/kontrol-cheatcodes/README.md
create mode 100644 old/lib/kontrol-cheatcodes/src/IKontrolCheatsBase.sol
create mode 100644 old/lib/kontrol-cheatcodes/src/KontrolCheats.sol
rename {media => old/media}/KontrolViewKCFGDemo.png (100%)
rename {media => old/media}/KontrolViewKCFGStaticDemo.png (100%)
rename run-kontrol.sh => old/run-kontrol.sh (100%)
rename {script => old/script}/Counter.s.sol (100%)
rename {src => old/src}/ERC20.sol (100%)
rename {src => old/src}/exclusiveToken.sol (100%)
rename {src => old/src}/extensions/IERC20Metadata.sol (100%)
rename {src => old/src}/token.sol (100%)
rename {src => old/src}/utils/Context.sol (100%)
rename {src => old/src}/utils/IERC20.sol (100%)
rename {test => old/test}/ERC20.t.sol (100%)
rename {test => old/test}/exclusiveToken.t.sol (100%)
rename {test => old/test}/simple.t.sol (100%)
rename {test => old/test}/token.t.sol (100%)
create mode 100644 oz_erc20/.github/workflows/test.yml
create mode 100644 oz_erc20/.gitignore
create mode 100644 oz_erc20/README.md
create mode 100644 oz_erc20/foundry.toml
create mode 100644 oz_erc20/kontrol.toml
create mode 100644 oz_erc20/lemmas.k
create mode 160000 oz_erc20/lib/forge-std
create mode 160000 oz_erc20/lib/kontrol-cheatcodes
create mode 160000 oz_erc20/lib/openzeppelin-contracts
create mode 100644 oz_erc20/remappings.txt
create mode 100755 oz_erc20/run-kontrol.sh
create mode 100644 oz_erc20/script/GLDToken.s.sol
create mode 100644 oz_erc20/src/GLDToken.sol
create mode 100644 oz_erc20/test/GLDToken.t.sol
diff --git a/.gitmodules b/.gitmodules
index 9d84bdd..f8e63d4 100644
--- a/.gitmodules
+++ b/.gitmodules
@@ -4,3 +4,12 @@
[submodule "lib/kontrol-cheatcodes"]
path = lib/kontrol-cheatcodes
url = https://github.com/runtimeverification/kontrol-cheatcodes.git
+[submodule "oz_erc20/lib/forge-std"]
+ path = oz_erc20/lib/forge-std
+ url = https://github.com/foundry-rs/forge-std
+[submodule "oz_erc20/lib/kontrol-cheatcodes"]
+ path = oz_erc20/lib/kontrol-cheatcodes
+ url = https://github.com/runtimeverification/kontrol-cheatcodes
+[submodule "oz_erc20/lib/openzeppelin-contracts"]
+ path = oz_erc20/lib/openzeppelin-contracts
+ url = https://github.com/OpenZeppelin/openzeppelin-contracts
diff --git a/lib/forge-std b/lib/forge-std
deleted file mode 160000
index 82e6f53..0000000
--- a/lib/forge-std
+++ /dev/null
@@ -1 +0,0 @@
-Subproject commit 82e6f5376c15341629ca23098e0b32d303f44f02
diff --git a/lib/kontrol-cheatcodes b/lib/kontrol-cheatcodes
deleted file mode 160000
index 0048278..0000000
--- a/lib/kontrol-cheatcodes
+++ /dev/null
@@ -1 +0,0 @@
-Subproject commit 0048278ebdfb04f452a448bf1fe19a06205efae3
diff --git a/README.md b/old/README.md
similarity index 100%
rename from README.md
rename to old/README.md
diff --git a/erc20.sh b/old/erc20.sh
similarity index 100%
rename from erc20.sh
rename to old/erc20.sh
diff --git a/exclude b/old/exclude
similarity index 100%
rename from exclude
rename to old/exclude
diff --git a/foundry.toml b/old/foundry.toml
similarity index 100%
rename from foundry.toml
rename to old/foundry.toml
diff --git a/lemmas.k b/old/lemmas.k
similarity index 100%
rename from lemmas.k
rename to old/lemmas.k
diff --git a/old/lib/forge-std/.github/workflows/tests.yml b/old/lib/forge-std/.github/workflows/tests.yml
new file mode 100644
index 0000000..8e86b25
--- /dev/null
+++ b/old/lib/forge-std/.github/workflows/tests.yml
@@ -0,0 +1,27 @@
+name: Tests
+on: [push, pull_request]
+
+jobs:
+ check:
+ name: Foundry project
+ runs-on: ubuntu-latest
+ steps:
+ - uses: actions/checkout@v2
+ with:
+ submodules: recursive
+
+ - name: Install Foundry
+ uses: onbjerg/foundry-toolchain@v1
+ with:
+ version: nightly
+
+ - name: Install dependencies
+ run: forge install
+ - name: Run tests
+ run: forge test -vvv
+ - name: Build Test with older solc versions
+ run: |
+ forge build --contracts src/Test.sol --use solc:0.8.0
+ forge build --contracts src/Test.sol --use solc:0.7.6
+ forge build --contracts src/Test.sol --use solc:0.7.0
+ forge build --contracts src/Test.sol --use solc:0.6.0
diff --git a/old/lib/forge-std/.gitignore b/old/lib/forge-std/.gitignore
new file mode 100644
index 0000000..999e4a7
--- /dev/null
+++ b/old/lib/forge-std/.gitignore
@@ -0,0 +1,4 @@
+cache/
+out/
+.vscode
+.idea
\ No newline at end of file
diff --git a/old/lib/forge-std/.gitmodules b/old/lib/forge-std/.gitmodules
new file mode 100644
index 0000000..e124719
--- /dev/null
+++ b/old/lib/forge-std/.gitmodules
@@ -0,0 +1,3 @@
+[submodule "lib/ds-test"]
+ path = lib/ds-test
+ url = https://github.com/dapphub/ds-test
diff --git a/old/lib/forge-std/LICENSE-APACHE b/old/lib/forge-std/LICENSE-APACHE
new file mode 100644
index 0000000..6873d54
--- /dev/null
+++ b/old/lib/forge-std/LICENSE-APACHE
@@ -0,0 +1,203 @@
+Copyright (c) 2022 Brock Elmore
+
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by Licensor and
+ subsequently incorporated within the Work.
+
+2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding those notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+END OF TERMS AND CONDITIONS
+
+APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. We also recommend that a
+ file or class name and description of purpose be included on the
+ same "printed page" as the copyright notice for easier
+ identification within third-party archives.
+
+Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
diff --git a/old/lib/forge-std/LICENSE-MIT b/old/lib/forge-std/LICENSE-MIT
new file mode 100644
index 0000000..851cd47
--- /dev/null
+++ b/old/lib/forge-std/LICENSE-MIT
@@ -0,0 +1,25 @@
+Copyright (c) 2022 Brock Elmore
+
+Permission is hereby granted, free of charge, to any
+person obtaining a copy of this software and associated
+documentation files (the "Software"), to deal in the
+Software without restriction, including without
+limitation the rights to use, copy, modify, merge,
+publish, distribute, sublicense, and/or sell copies of
+the Software, and to permit persons to whom the Software
+is furnished to do so, subject to the following
+conditions:
+
+The above copyright notice and this permission notice
+shall be included in all copies or substantial portions
+of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF
+ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
+TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
+PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
+SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
+CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
+OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR
+IN CONNECTION WITH THE SOFTWARE O THE USE OR OTHER
+DEALINGS IN THE SOFTWARE.R
diff --git a/old/lib/forge-std/README.md b/old/lib/forge-std/README.md
new file mode 100644
index 0000000..67dc160
--- /dev/null
+++ b/old/lib/forge-std/README.md
@@ -0,0 +1,246 @@
+# Forge Standard Library • [![tests](https://github.com/brockelmore/forge-std/actions/workflows/tests.yml/badge.svg)](https://github.com/brockelmore/forge-std/actions/workflows/tests.yml)
+
+Forge Standard Library is a collection of helpful contracts for use with [`forge` and `foundry`](https://github.com/foundry-rs/foundry). It leverages `forge`'s cheatcodes to make writing tests easier and faster, while improving the UX of cheatcodes.
+
+**Learn how to use Forge Std with the [📖 Foundry Book (Forge Std Guide)](https://book.getfoundry.sh/forge/forge-std.html).**
+
+## Install
+
+```bash
+forge install foundry-rs/forge-std
+```
+
+## Contracts
+### stdError
+
+This is a helper contract for errors and reverts. In `forge`, this contract is particularly helpful for the `expectRevert` cheatcode, as it provides all compiler builtin errors.
+
+See the contract itself for all error codes.
+
+#### Example usage
+
+```solidity
+
+import "forge-std/Test.sol";
+
+contract TestContract is Test {
+ ErrorsTest test;
+
+ function setUp() public {
+ test = new ErrorsTest();
+ }
+
+ function testExpectArithmetic() public {
+ vm.expectRevert(stdError.arithmeticError);
+ test.arithmeticError(10);
+ }
+}
+
+contract ErrorsTest {
+ function arithmeticError(uint256 a) public {
+ uint256 a = a - 100;
+ }
+}
+```
+
+### stdStorage
+
+This is a rather large contract due to all of the overloading to make the UX decent. Primarily, it is a wrapper around the `record` and `accesses` cheatcodes. It can *always* find and write the storage slot(s) associated with a particular variable without knowing the storage layout. The one _major_ caveat to this is while a slot can be found for packed storage variables, we can't write to that variable safely. If a user tries to write to a packed slot, the execution throws an error, unless it is uninitialized (`bytes32(0)`).
+
+This works by recording all `SLOAD`s and `SSTORE`s during a function call. If there is a single slot read or written to, it immediately returns the slot. Otherwise, behind the scenes, we iterate through and check each one (assuming the user passed in a `depth` parameter). If the variable is a struct, you can pass in a `depth` parameter which is basically the field depth.
+
+I.e.:
+```solidity
+struct T {
+ // depth 0
+ uint256 a;
+ // depth 1
+ uint256 b;
+}
+```
+
+#### Example usage
+
+```solidity
+import "forge-std/Test.sol";
+
+contract TestContract is Test {
+ using stdStorage for StdStorage;
+
+ Storage test;
+
+ function setUp() public {
+ test = new Storage();
+ }
+
+ function testFindExists() public {
+ // Lets say we want to find the slot for the public
+ // variable `exists`. We just pass in the function selector
+ // to the `find` command
+ uint256 slot = stdstore.target(address(test)).sig("exists()").find();
+ assertEq(slot, 0);
+ }
+
+ function testWriteExists() public {
+ // Lets say we want to write to the slot for the public
+ // variable `exists`. We just pass in the function selector
+ // to the `checked_write` command
+ stdstore.target(address(test)).sig("exists()").checked_write(100);
+ assertEq(test.exists(), 100);
+ }
+
+ // It supports arbitrary storage layouts, like assembly based storage locations
+ function testFindHidden() public {
+ // `hidden` is a random hash of a bytes, iteration through slots would
+ // not find it. Our mechanism does
+ // Also, you can use the selector instead of a string
+ uint256 slot = stdstore.target(address(test)).sig(test.hidden.selector).find();
+ assertEq(slot, uint256(keccak256("my.random.var")));
+ }
+
+ // If targeting a mapping, you have to pass in the keys necessary to perform the find
+ // i.e.:
+ function testFindMapping() public {
+ uint256 slot = stdstore
+ .target(address(test))
+ .sig(test.map_addr.selector)
+ .with_key(address(this))
+ .find();
+ // in the `Storage` constructor, we wrote that this address' value was 1 in the map
+ // so when we load the slot, we expect it to be 1
+ assertEq(uint(vm.load(address(test), bytes32(slot))), 1);
+ }
+
+ // If the target is a struct, you can specify the field depth:
+ function testFindStruct() public {
+ // NOTE: see the depth parameter - 0 means 0th field, 1 means 1st field, etc.
+ uint256 slot_for_a_field = stdstore
+ .target(address(test))
+ .sig(test.basicStruct.selector)
+ .depth(0)
+ .find();
+
+ uint256 slot_for_b_field = stdstore
+ .target(address(test))
+ .sig(test.basicStruct.selector)
+ .depth(1)
+ .find();
+
+ assertEq(uint(vm.load(address(test), bytes32(slot_for_a_field))), 1);
+ assertEq(uint(vm.load(address(test), bytes32(slot_for_b_field))), 2);
+ }
+}
+
+// A complex storage contract
+contract Storage {
+ struct UnpackedStruct {
+ uint256 a;
+ uint256 b;
+ }
+
+ constructor() {
+ map_addr[msg.sender] = 1;
+ }
+
+ uint256 public exists = 1;
+ mapping(address => uint256) public map_addr;
+ // mapping(address => Packed) public map_packed;
+ mapping(address => UnpackedStruct) public map_struct;
+ mapping(address => mapping(address => uint256)) public deep_map;
+ mapping(address => mapping(address => UnpackedStruct)) public deep_map_struct;
+ UnpackedStruct public basicStruct = UnpackedStruct({
+ a: 1,
+ b: 2
+ });
+
+ function hidden() public view returns (bytes32 t) {
+ // an extremely hidden storage slot
+ bytes32 slot = keccak256("my.random.var");
+ assembly {
+ t := sload(slot)
+ }
+ }
+}
+```
+
+### stdCheats
+
+This is a wrapper over miscellaneous cheatcodes that need wrappers to be more dev friendly. Currently there are only functions related to `prank`. In general, users may expect ETH to be put into an address on `prank`, but this is not the case for safety reasons. Explicitly this `hoax` function should only be used for address that have expected balances as it will get overwritten. If an address already has ETH, you should just use `prank`. If you want to change that balance explicitly, just use `deal`. If you want to do both, `hoax` is also right for you.
+
+
+#### Example usage:
+```solidity
+
+// SPDX-License-Identifier: MIT
+pragma solidity ^0.8.0;
+
+import "forge-std/Test.sol";
+
+// Inherit the stdCheats
+contract StdCheatsTest is Test {
+ Bar test;
+ function setUp() public {
+ test = new Bar();
+ }
+
+ function testHoax() public {
+ // we call `hoax`, which gives the target address
+ // eth and then calls `prank`
+ hoax(address(1337));
+ test.bar{value: 100}(address(1337));
+
+ // overloaded to allow you to specify how much eth to
+ // initialize the address with
+ hoax(address(1337), 1);
+ test.bar{value: 1}(address(1337));
+ }
+
+ function testStartHoax() public {
+ // we call `startHoax`, which gives the target address
+ // eth and then calls `startPrank`
+ //
+ // it is also overloaded so that you can specify an eth amount
+ startHoax(address(1337));
+ test.bar{value: 100}(address(1337));
+ test.bar{value: 100}(address(1337));
+ vm.stopPrank();
+ test.bar(address(this));
+ }
+}
+
+contract Bar {
+ function bar(address expectedSender) public payable {
+ require(msg.sender == expectedSender, "!prank");
+ }
+}
+```
+
+### Std Assertions
+
+Expand upon the assertion functions from the `DSTest` library.
+
+### `console.log`
+
+Usage follows the same format as [Hardhat](https://hardhat.org/hardhat-network/reference/#console-log).
+It's recommended to use `console2.sol` as shown below, as this will show the decoded logs in Forge traces.
+
+```solidity
+// import it indirectly via Test.sol
+import "forge-std/Test.sol";
+// or directly import it
+import "forge-std/console2.sol";
+...
+console2.log(someValue);
+```
+
+If you need compatibility with Hardhat, you must use the standard `console.sol` instead.
+Due to a bug in `console.sol`, logs that use `uint256` or `int256` types will not be properly decoded in Forge traces.
+
+```solidity
+// import it indirectly via Test.sol
+import "forge-std/Test.sol";
+// or directly import it
+import "forge-std/console.sol";
+...
+console.log(someValue);
+```
diff --git a/old/lib/forge-std/foundry.toml b/old/lib/forge-std/foundry.toml
new file mode 100644
index 0000000..507b8bb
--- /dev/null
+++ b/old/lib/forge-std/foundry.toml
@@ -0,0 +1,2 @@
+[profile.default]
+fs_permissions = [{ access = "read-write", path = "./"}]
diff --git a/old/lib/forge-std/lib/ds-test/.gitignore b/old/lib/forge-std/lib/ds-test/.gitignore
new file mode 100644
index 0000000..63f0b2c
--- /dev/null
+++ b/old/lib/forge-std/lib/ds-test/.gitignore
@@ -0,0 +1,3 @@
+/.dapple
+/build
+/out
diff --git a/old/lib/forge-std/lib/ds-test/LICENSE b/old/lib/forge-std/lib/ds-test/LICENSE
new file mode 100644
index 0000000..94a9ed0
--- /dev/null
+++ b/old/lib/forge-std/lib/ds-test/LICENSE
@@ -0,0 +1,674 @@
+ GNU GENERAL PUBLIC LICENSE
+ Version 3, 29 June 2007
+
+ Copyright (C) 2007 Free Software Foundation, Inc.
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ Preamble
+
+ The GNU General Public License is a free, copyleft license for
+software and other kinds of works.
+
+ The licenses for most software and other practical works are designed
+to take away your freedom to share and change the works. By contrast,
+the GNU General Public License is intended to guarantee your freedom to
+share and change all versions of a program--to make sure it remains free
+software for all its users. We, the Free Software Foundation, use the
+GNU General Public License for most of our software; it applies also to
+any other work released this way by its authors. You can apply it to
+your programs, too.
+
+ When we speak of free software, we are referring to freedom, not
+price. Our General Public Licenses are designed to make sure that you
+have the freedom to distribute copies of free software (and charge for
+them if you wish), that you receive source code or can get it if you
+want it, that you can change the software or use pieces of it in new
+free programs, and that you know you can do these things.
+
+ To protect your rights, we need to prevent others from denying you
+these rights or asking you to surrender the rights. Therefore, you have
+certain responsibilities if you distribute copies of the software, or if
+you modify it: responsibilities to respect the freedom of others.
+
+ For example, if you distribute copies of such a program, whether
+gratis or for a fee, you must pass on to the recipients the same
+freedoms that you received. You must make sure that they, too, receive
+or can get the source code. And you must show them these terms so they
+know their rights.
+
+ Developers that use the GNU GPL protect your rights with two steps:
+(1) assert copyright on the software, and (2) offer you this License
+giving you legal permission to copy, distribute and/or modify it.
+
+ For the developers' and authors' protection, the GPL clearly explains
+that there is no warranty for this free software. For both users' and
+authors' sake, the GPL requires that modified versions be marked as
+changed, so that their problems will not be attributed erroneously to
+authors of previous versions.
+
+ Some devices are designed to deny users access to install or run
+modified versions of the software inside them, although the manufacturer
+can do so. This is fundamentally incompatible with the aim of
+protecting users' freedom to change the software. The systematic
+pattern of such abuse occurs in the area of products for individuals to
+use, which is precisely where it is most unacceptable. Therefore, we
+have designed this version of the GPL to prohibit the practice for those
+products. If such problems arise substantially in other domains, we
+stand ready to extend this provision to those domains in future versions
+of the GPL, as needed to protect the freedom of users.
+
+ Finally, every program is threatened constantly by software patents.
+States should not allow patents to restrict development and use of
+software on general-purpose computers, but in those that do, we wish to
+avoid the special danger that patents applied to a free program could
+make it effectively proprietary. To prevent this, the GPL assures that
+patents cannot be used to render the program non-free.
+
+ The precise terms and conditions for copying, distribution and
+modification follow.
+
+ TERMS AND CONDITIONS
+
+ 0. Definitions.
+
+ "This License" refers to version 3 of the GNU General Public License.
+
+ "Copyright" also means copyright-like laws that apply to other kinds of
+works, such as semiconductor masks.
+
+ "The Program" refers to any copyrightable work licensed under this
+License. Each licensee is addressed as "you". "Licensees" and
+"recipients" may be individuals or organizations.
+
+ To "modify" a work means to copy from or adapt all or part of the work
+in a fashion requiring copyright permission, other than the making of an
+exact copy. The resulting work is called a "modified version" of the
+earlier work or a work "based on" the earlier work.
+
+ A "covered work" means either the unmodified Program or a work based
+on the Program.
+
+ To "propagate" a work means to do anything with it that, without
+permission, would make you directly or secondarily liable for
+infringement under applicable copyright law, except executing it on a
+computer or modifying a private copy. Propagation includes copying,
+distribution (with or without modification), making available to the
+public, and in some countries other activities as well.
+
+ To "convey" a work means any kind of propagation that enables other
+parties to make or receive copies. Mere interaction with a user through
+a computer network, with no transfer of a copy, is not conveying.
+
+ An interactive user interface displays "Appropriate Legal Notices"
+to the extent that it includes a convenient and prominently visible
+feature that (1) displays an appropriate copyright notice, and (2)
+tells the user that there is no warranty for the work (except to the
+extent that warranties are provided), that licensees may convey the
+work under this License, and how to view a copy of this License. If
+the interface presents a list of user commands or options, such as a
+menu, a prominent item in the list meets this criterion.
+
+ 1. Source Code.
+
+ The "source code" for a work means the preferred form of the work
+for making modifications to it. "Object code" means any non-source
+form of a work.
+
+ A "Standard Interface" means an interface that either is an official
+standard defined by a recognized standards body, or, in the case of
+interfaces specified for a particular programming language, one that
+is widely used among developers working in that language.
+
+ The "System Libraries" of an executable work include anything, other
+than the work as a whole, that (a) is included in the normal form of
+packaging a Major Component, but which is not part of that Major
+Component, and (b) serves only to enable use of the work with that
+Major Component, or to implement a Standard Interface for which an
+implementation is available to the public in source code form. A
+"Major Component", in this context, means a major essential component
+(kernel, window system, and so on) of the specific operating system
+(if any) on which the executable work runs, or a compiler used to
+produce the work, or an object code interpreter used to run it.
+
+ The "Corresponding Source" for a work in object code form means all
+the source code needed to generate, install, and (for an executable
+work) run the object code and to modify the work, including scripts to
+control those activities. However, it does not include the work's
+System Libraries, or general-purpose tools or generally available free
+programs which are used unmodified in performing those activities but
+which are not part of the work. For example, Corresponding Source
+includes interface definition files associated with source files for
+the work, and the source code for shared libraries and dynamically
+linked subprograms that the work is specifically designed to require,
+such as by intimate data communication or control flow between those
+subprograms and other parts of the work.
+
+ The Corresponding Source need not include anything that users
+can regenerate automatically from other parts of the Corresponding
+Source.
+
+ The Corresponding Source for a work in source code form is that
+same work.
+
+ 2. Basic Permissions.
+
+ All rights granted under this License are granted for the term of
+copyright on the Program, and are irrevocable provided the stated
+conditions are met. This License explicitly affirms your unlimited
+permission to run the unmodified Program. The output from running a
+covered work is covered by this License only if the output, given its
+content, constitutes a covered work. This License acknowledges your
+rights of fair use or other equivalent, as provided by copyright law.
+
+ You may make, run and propagate covered works that you do not
+convey, without conditions so long as your license otherwise remains
+in force. You may convey covered works to others for the sole purpose
+of having them make modifications exclusively for you, or provide you
+with facilities for running those works, provided that you comply with
+the terms of this License in conveying all material for which you do
+not control copyright. Those thus making or running the covered works
+for you must do so exclusively on your behalf, under your direction
+and control, on terms that prohibit them from making any copies of
+your copyrighted material outside their relationship with you.
+
+ Conveying under any other circumstances is permitted solely under
+the conditions stated below. Sublicensing is not allowed; section 10
+makes it unnecessary.
+
+ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
+
+ No covered work shall be deemed part of an effective technological
+measure under any applicable law fulfilling obligations under article
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
+similar laws prohibiting or restricting circumvention of such
+measures.
+
+ When you convey a covered work, you waive any legal power to forbid
+circumvention of technological measures to the extent such circumvention
+is effected by exercising rights under this License with respect to
+the covered work, and you disclaim any intention to limit operation or
+modification of the work as a means of enforcing, against the work's
+users, your or third parties' legal rights to forbid circumvention of
+technological measures.
+
+ 4. Conveying Verbatim Copies.
+
+ You may convey verbatim copies of the Program's source code as you
+receive it, in any medium, provided that you conspicuously and
+appropriately publish on each copy an appropriate copyright notice;
+keep intact all notices stating that this License and any
+non-permissive terms added in accord with section 7 apply to the code;
+keep intact all notices of the absence of any warranty; and give all
+recipients a copy of this License along with the Program.
+
+ You may charge any price or no price for each copy that you convey,
+and you may offer support or warranty protection for a fee.
+
+ 5. Conveying Modified Source Versions.
+
+ You may convey a work based on the Program, or the modifications to
+produce it from the Program, in the form of source code under the
+terms of section 4, provided that you also meet all of these conditions:
+
+ a) The work must carry prominent notices stating that you modified
+ it, and giving a relevant date.
+
+ b) The work must carry prominent notices stating that it is
+ released under this License and any conditions added under section
+ 7. This requirement modifies the requirement in section 4 to
+ "keep intact all notices".
+
+ c) You must license the entire work, as a whole, under this
+ License to anyone who comes into possession of a copy. This
+ License will therefore apply, along with any applicable section 7
+ additional terms, to the whole of the work, and all its parts,
+ regardless of how they are packaged. This License gives no
+ permission to license the work in any other way, but it does not
+ invalidate such permission if you have separately received it.
+
+ d) If the work has interactive user interfaces, each must display
+ Appropriate Legal Notices; however, if the Program has interactive
+ interfaces that do not display Appropriate Legal Notices, your
+ work need not make them do so.
+
+ A compilation of a covered work with other separate and independent
+works, which are not by their nature extensions of the covered work,
+and which are not combined with it such as to form a larger program,
+in or on a volume of a storage or distribution medium, is called an
+"aggregate" if the compilation and its resulting copyright are not
+used to limit the access or legal rights of the compilation's users
+beyond what the individual works permit. Inclusion of a covered work
+in an aggregate does not cause this License to apply to the other
+parts of the aggregate.
+
+ 6. Conveying Non-Source Forms.
+
+ You may convey a covered work in object code form under the terms
+of sections 4 and 5, provided that you also convey the
+machine-readable Corresponding Source under the terms of this License,
+in one of these ways:
+
+ a) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by the
+ Corresponding Source fixed on a durable physical medium
+ customarily used for software interchange.
+
+ b) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by a
+ written offer, valid for at least three years and valid for as
+ long as you offer spare parts or customer support for that product
+ model, to give anyone who possesses the object code either (1) a
+ copy of the Corresponding Source for all the software in the
+ product that is covered by this License, on a durable physical
+ medium customarily used for software interchange, for a price no
+ more than your reasonable cost of physically performing this
+ conveying of source, or (2) access to copy the
+ Corresponding Source from a network server at no charge.
+
+ c) Convey individual copies of the object code with a copy of the
+ written offer to provide the Corresponding Source. This
+ alternative is allowed only occasionally and noncommercially, and
+ only if you received the object code with such an offer, in accord
+ with subsection 6b.
+
+ d) Convey the object code by offering access from a designated
+ place (gratis or for a charge), and offer equivalent access to the
+ Corresponding Source in the same way through the same place at no
+ further charge. You need not require recipients to copy the
+ Corresponding Source along with the object code. If the place to
+ copy the object code is a network server, the Corresponding Source
+ may be on a different server (operated by you or a third party)
+ that supports equivalent copying facilities, provided you maintain
+ clear directions next to the object code saying where to find the
+ Corresponding Source. Regardless of what server hosts the
+ Corresponding Source, you remain obligated to ensure that it is
+ available for as long as needed to satisfy these requirements.
+
+ e) Convey the object code using peer-to-peer transmission, provided
+ you inform other peers where the object code and Corresponding
+ Source of the work are being offered to the general public at no
+ charge under subsection 6d.
+
+ A separable portion of the object code, whose source code is excluded
+from the Corresponding Source as a System Library, need not be
+included in conveying the object code work.
+
+ A "User Product" is either (1) a "consumer product", which means any
+tangible personal property which is normally used for personal, family,
+or household purposes, or (2) anything designed or sold for incorporation
+into a dwelling. In determining whether a product is a consumer product,
+doubtful cases shall be resolved in favor of coverage. For a particular
+product received by a particular user, "normally used" refers to a
+typical or common use of that class of product, regardless of the status
+of the particular user or of the way in which the particular user
+actually uses, or expects or is expected to use, the product. A product
+is a consumer product regardless of whether the product has substantial
+commercial, industrial or non-consumer uses, unless such uses represent
+the only significant mode of use of the product.
+
+ "Installation Information" for a User Product means any methods,
+procedures, authorization keys, or other information required to install
+and execute modified versions of a covered work in that User Product from
+a modified version of its Corresponding Source. The information must
+suffice to ensure that the continued functioning of the modified object
+code is in no case prevented or interfered with solely because
+modification has been made.
+
+ If you convey an object code work under this section in, or with, or
+specifically for use in, a User Product, and the conveying occurs as
+part of a transaction in which the right of possession and use of the
+User Product is transferred to the recipient in perpetuity or for a
+fixed term (regardless of how the transaction is characterized), the
+Corresponding Source conveyed under this section must be accompanied
+by the Installation Information. But this requirement does not apply
+if neither you nor any third party retains the ability to install
+modified object code on the User Product (for example, the work has
+been installed in ROM).
+
+ The requirement to provide Installation Information does not include a
+requirement to continue to provide support service, warranty, or updates
+for a work that has been modified or installed by the recipient, or for
+the User Product in which it has been modified or installed. Access to a
+network may be denied when the modification itself materially and
+adversely affects the operation of the network or violates the rules and
+protocols for communication across the network.
+
+ Corresponding Source conveyed, and Installation Information provided,
+in accord with this section must be in a format that is publicly
+documented (and with an implementation available to the public in
+source code form), and must require no special password or key for
+unpacking, reading or copying.
+
+ 7. Additional Terms.
+
+ "Additional permissions" are terms that supplement the terms of this
+License by making exceptions from one or more of its conditions.
+Additional permissions that are applicable to the entire Program shall
+be treated as though they were included in this License, to the extent
+that they are valid under applicable law. If additional permissions
+apply only to part of the Program, that part may be used separately
+under those permissions, but the entire Program remains governed by
+this License without regard to the additional permissions.
+
+ When you convey a copy of a covered work, you may at your option
+remove any additional permissions from that copy, or from any part of
+it. (Additional permissions may be written to require their own
+removal in certain cases when you modify the work.) You may place
+additional permissions on material, added by you to a covered work,
+for which you have or can give appropriate copyright permission.
+
+ Notwithstanding any other provision of this License, for material you
+add to a covered work, you may (if authorized by the copyright holders of
+that material) supplement the terms of this License with terms:
+
+ a) Disclaiming warranty or limiting liability differently from the
+ terms of sections 15 and 16 of this License; or
+
+ b) Requiring preservation of specified reasonable legal notices or
+ author attributions in that material or in the Appropriate Legal
+ Notices displayed by works containing it; or
+
+ c) Prohibiting misrepresentation of the origin of that material, or
+ requiring that modified versions of such material be marked in
+ reasonable ways as different from the original version; or
+
+ d) Limiting the use for publicity purposes of names of licensors or
+ authors of the material; or
+
+ e) Declining to grant rights under trademark law for use of some
+ trade names, trademarks, or service marks; or
+
+ f) Requiring indemnification of licensors and authors of that
+ material by anyone who conveys the material (or modified versions of
+ it) with contractual assumptions of liability to the recipient, for
+ any liability that these contractual assumptions directly impose on
+ those licensors and authors.
+
+ All other non-permissive additional terms are considered "further
+restrictions" within the meaning of section 10. If the Program as you
+received it, or any part of it, contains a notice stating that it is
+governed by this License along with a term that is a further
+restriction, you may remove that term. If a license document contains
+a further restriction but permits relicensing or conveying under this
+License, you may add to a covered work material governed by the terms
+of that license document, provided that the further restriction does
+not survive such relicensing or conveying.
+
+ If you add terms to a covered work in accord with this section, you
+must place, in the relevant source files, a statement of the
+additional terms that apply to those files, or a notice indicating
+where to find the applicable terms.
+
+ Additional terms, permissive or non-permissive, may be stated in the
+form of a separately written license, or stated as exceptions;
+the above requirements apply either way.
+
+ 8. Termination.
+
+ You may not propagate or modify a covered work except as expressly
+provided under this License. Any attempt otherwise to propagate or
+modify it is void, and will automatically terminate your rights under
+this License (including any patent licenses granted under the third
+paragraph of section 11).
+
+ However, if you cease all violation of this License, then your
+license from a particular copyright holder is reinstated (a)
+provisionally, unless and until the copyright holder explicitly and
+finally terminates your license, and (b) permanently, if the copyright
+holder fails to notify you of the violation by some reasonable means
+prior to 60 days after the cessation.
+
+ Moreover, your license from a particular copyright holder is
+reinstated permanently if the copyright holder notifies you of the
+violation by some reasonable means, this is the first time you have
+received notice of violation of this License (for any work) from that
+copyright holder, and you cure the violation prior to 30 days after
+your receipt of the notice.
+
+ Termination of your rights under this section does not terminate the
+licenses of parties who have received copies or rights from you under
+this License. If your rights have been terminated and not permanently
+reinstated, you do not qualify to receive new licenses for the same
+material under section 10.
+
+ 9. Acceptance Not Required for Having Copies.
+
+ You are not required to accept this License in order to receive or
+run a copy of the Program. Ancillary propagation of a covered work
+occurring solely as a consequence of using peer-to-peer transmission
+to receive a copy likewise does not require acceptance. However,
+nothing other than this License grants you permission to propagate or
+modify any covered work. These actions infringe copyright if you do
+not accept this License. Therefore, by modifying or propagating a
+covered work, you indicate your acceptance of this License to do so.
+
+ 10. Automatic Licensing of Downstream Recipients.
+
+ Each time you convey a covered work, the recipient automatically
+receives a license from the original licensors, to run, modify and
+propagate that work, subject to this License. You are not responsible
+for enforcing compliance by third parties with this License.
+
+ An "entity transaction" is a transaction transferring control of an
+organization, or substantially all assets of one, or subdividing an
+organization, or merging organizations. If propagation of a covered
+work results from an entity transaction, each party to that
+transaction who receives a copy of the work also receives whatever
+licenses to the work the party's predecessor in interest had or could
+give under the previous paragraph, plus a right to possession of the
+Corresponding Source of the work from the predecessor in interest, if
+the predecessor has it or can get it with reasonable efforts.
+
+ You may not impose any further restrictions on the exercise of the
+rights granted or affirmed under this License. For example, you may
+not impose a license fee, royalty, or other charge for exercise of
+rights granted under this License, and you may not initiate litigation
+(including a cross-claim or counterclaim in a lawsuit) alleging that
+any patent claim is infringed by making, using, selling, offering for
+sale, or importing the Program or any portion of it.
+
+ 11. Patents.
+
+ A "contributor" is a copyright holder who authorizes use under this
+License of the Program or a work on which the Program is based. The
+work thus licensed is called the contributor's "contributor version".
+
+ A contributor's "essential patent claims" are all patent claims
+owned or controlled by the contributor, whether already acquired or
+hereafter acquired, that would be infringed by some manner, permitted
+by this License, of making, using, or selling its contributor version,
+but do not include claims that would be infringed only as a
+consequence of further modification of the contributor version. For
+purposes of this definition, "control" includes the right to grant
+patent sublicenses in a manner consistent with the requirements of
+this License.
+
+ Each contributor grants you a non-exclusive, worldwide, royalty-free
+patent license under the contributor's essential patent claims, to
+make, use, sell, offer for sale, import and otherwise run, modify and
+propagate the contents of its contributor version.
+
+ In the following three paragraphs, a "patent license" is any express
+agreement or commitment, however denominated, not to enforce a patent
+(such as an express permission to practice a patent or covenant not to
+sue for patent infringement). To "grant" such a patent license to a
+party means to make such an agreement or commitment not to enforce a
+patent against the party.
+
+ If you convey a covered work, knowingly relying on a patent license,
+and the Corresponding Source of the work is not available for anyone
+to copy, free of charge and under the terms of this License, through a
+publicly available network server or other readily accessible means,
+then you must either (1) cause the Corresponding Source to be so
+available, or (2) arrange to deprive yourself of the benefit of the
+patent license for this particular work, or (3) arrange, in a manner
+consistent with the requirements of this License, to extend the patent
+license to downstream recipients. "Knowingly relying" means you have
+actual knowledge that, but for the patent license, your conveying the
+covered work in a country, or your recipient's use of the covered work
+in a country, would infringe one or more identifiable patents in that
+country that you have reason to believe are valid.
+
+ If, pursuant to or in connection with a single transaction or
+arrangement, you convey, or propagate by procuring conveyance of, a
+covered work, and grant a patent license to some of the parties
+receiving the covered work authorizing them to use, propagate, modify
+or convey a specific copy of the covered work, then the patent license
+you grant is automatically extended to all recipients of the covered
+work and works based on it.
+
+ A patent license is "discriminatory" if it does not include within
+the scope of its coverage, prohibits the exercise of, or is
+conditioned on the non-exercise of one or more of the rights that are
+specifically granted under this License. You may not convey a covered
+work if you are a party to an arrangement with a third party that is
+in the business of distributing software, under which you make payment
+to the third party based on the extent of your activity of conveying
+the work, and under which the third party grants, to any of the
+parties who would receive the covered work from you, a discriminatory
+patent license (a) in connection with copies of the covered work
+conveyed by you (or copies made from those copies), or (b) primarily
+for and in connection with specific products or compilations that
+contain the covered work, unless you entered into that arrangement,
+or that patent license was granted, prior to 28 March 2007.
+
+ Nothing in this License shall be construed as excluding or limiting
+any implied license or other defenses to infringement that may
+otherwise be available to you under applicable patent law.
+
+ 12. No Surrender of Others' Freedom.
+
+ If conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot convey a
+covered work so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you may
+not convey it at all. For example, if you agree to terms that obligate you
+to collect a royalty for further conveying from those to whom you convey
+the Program, the only way you could satisfy both those terms and this
+License would be to refrain entirely from conveying the Program.
+
+ 13. Use with the GNU Affero General Public License.
+
+ Notwithstanding any other provision of this License, you have
+permission to link or combine any covered work with a work licensed
+under version 3 of the GNU Affero General Public License into a single
+combined work, and to convey the resulting work. The terms of this
+License will continue to apply to the part which is the covered work,
+but the special requirements of the GNU Affero General Public License,
+section 13, concerning interaction through a network will apply to the
+combination as such.
+
+ 14. Revised Versions of this License.
+
+ The Free Software Foundation may publish revised and/or new versions of
+the GNU General Public License from time to time. Such new versions will
+be similar in spirit to the present version, but may differ in detail to
+address new problems or concerns.
+
+ Each version is given a distinguishing version number. If the
+Program specifies that a certain numbered version of the GNU General
+Public License "or any later version" applies to it, you have the
+option of following the terms and conditions either of that numbered
+version or of any later version published by the Free Software
+Foundation. If the Program does not specify a version number of the
+GNU General Public License, you may choose any version ever published
+by the Free Software Foundation.
+
+ If the Program specifies that a proxy can decide which future
+versions of the GNU General Public License can be used, that proxy's
+public statement of acceptance of a version permanently authorizes you
+to choose that version for the Program.
+
+ Later license versions may give you additional or different
+permissions. However, no additional obligations are imposed on any
+author or copyright holder as a result of your choosing to follow a
+later version.
+
+ 15. Disclaimer of Warranty.
+
+ THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
+OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
+IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
+ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+ 16. Limitation of Liability.
+
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
+THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
+GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
+USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
+EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
+SUCH DAMAGES.
+
+ 17. Interpretation of Sections 15 and 16.
+
+ If the disclaimer of warranty and limitation of liability provided
+above cannot be given local legal effect according to their terms,
+reviewing courts shall apply local law that most closely approximates
+an absolute waiver of all civil liability in connection with the
+Program, unless a warranty or assumption of liability accompanies a
+copy of the Program in return for a fee.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of the greatest
+possible use to the public, the best way to achieve this is to make it
+free software which everyone can redistribute and change under these terms.
+
+ To do so, attach the following notices to the program. It is safest
+to attach them to the start of each source file to most effectively
+state the exclusion of warranty; and each file should have at least
+the "copyright" line and a pointer to where the full notice is found.
+
+
+ Copyright (C)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+
+Also add information on how to contact you by electronic and paper mail.
+
+ If the program does terminal interaction, make it output a short
+notice like this when it starts in an interactive mode:
+
+ Copyright (C)
+ This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+ This is free software, and you are welcome to redistribute it
+ under certain conditions; type `show c' for details.
+
+The hypothetical commands `show w' and `show c' should show the appropriate
+parts of the General Public License. Of course, your program's commands
+might be different; for a GUI interface, you would use an "about box".
+
+ You should also get your employer (if you work as a programmer) or school,
+if any, to sign a "copyright disclaimer" for the program, if necessary.
+For more information on this, and how to apply and follow the GNU GPL, see
+.
+
+ The GNU General Public License does not permit incorporating your program
+into proprietary programs. If your program is a subroutine library, you
+may consider it more useful to permit linking proprietary applications with
+the library. If this is what you want to do, use the GNU Lesser General
+Public License instead of this License. But first, please read
+.
diff --git a/old/lib/forge-std/lib/ds-test/Makefile b/old/lib/forge-std/lib/ds-test/Makefile
new file mode 100644
index 0000000..661dac4
--- /dev/null
+++ b/old/lib/forge-std/lib/ds-test/Makefile
@@ -0,0 +1,14 @@
+all:; dapp build
+
+test:
+ -dapp --use solc:0.4.23 build
+ -dapp --use solc:0.4.26 build
+ -dapp --use solc:0.5.17 build
+ -dapp --use solc:0.6.12 build
+ -dapp --use solc:0.7.5 build
+
+demo:
+ DAPP_SRC=demo dapp --use solc:0.7.5 build
+ -hevm dapp-test --verbose 3
+
+.PHONY: test demo
diff --git a/old/lib/forge-std/lib/ds-test/default.nix b/old/lib/forge-std/lib/ds-test/default.nix
new file mode 100644
index 0000000..cf65419
--- /dev/null
+++ b/old/lib/forge-std/lib/ds-test/default.nix
@@ -0,0 +1,4 @@
+{ solidityPackage, dappsys }: solidityPackage {
+ name = "ds-test";
+ src = ./src;
+}
diff --git a/old/lib/forge-std/lib/ds-test/demo/demo.sol b/old/lib/forge-std/lib/ds-test/demo/demo.sol
new file mode 100644
index 0000000..f3bb48e
--- /dev/null
+++ b/old/lib/forge-std/lib/ds-test/demo/demo.sol
@@ -0,0 +1,222 @@
+// SPDX-License-Identifier: GPL-3.0-or-later
+pragma solidity >=0.5.0;
+
+import "../src/test.sol";
+
+contract DemoTest is DSTest {
+ function test_this() public pure {
+ require(true);
+ }
+ function test_logs() public {
+ emit log("-- log(string)");
+ emit log("a string");
+
+ emit log("-- log_named_uint(string, uint)");
+ emit log_named_uint("uint", 512);
+
+ emit log("-- log_named_int(string, int)");
+ emit log_named_int("int", -512);
+
+ emit log("-- log_named_address(string, address)");
+ emit log_named_address("address", address(this));
+
+ emit log("-- log_named_bytes32(string, bytes32)");
+ emit log_named_bytes32("bytes32", "a string");
+
+ emit log("-- log_named_bytes(string, bytes)");
+ emit log_named_bytes("bytes", hex"cafefe");
+
+ emit log("-- log_named_string(string, string)");
+ emit log_named_string("string", "a string");
+
+ emit log("-- log_named_decimal_uint(string, uint, uint)");
+ emit log_named_decimal_uint("decimal uint", 1.0e18, 18);
+
+ emit log("-- log_named_decimal_int(string, int, uint)");
+ emit log_named_decimal_int("decimal int", -1.0e18, 18);
+ }
+ event log_old_named_uint(bytes32,uint);
+ function test_old_logs() public {
+ emit log_old_named_uint("key", 500);
+ emit log_named_bytes32("bkey", "val");
+ }
+ function test_trace() public view {
+ this.echo("string 1", "string 2");
+ }
+ function test_multiline() public {
+ emit log("a multiline\\nstring");
+ emit log("a multiline string");
+ emit log_bytes("a string");
+ emit log_bytes("a multiline\nstring");
+ emit log_bytes("a multiline\\nstring");
+ emit logs(hex"0000");
+ emit log_named_bytes("0x0000", hex"0000");
+ emit logs(hex"ff");
+ }
+ function echo(string memory s1, string memory s2) public pure
+ returns (string memory, string memory)
+ {
+ return (s1, s2);
+ }
+
+ function prove_this(uint x) public {
+ emit log_named_uint("sym x", x);
+ assertGt(x + 1, 0);
+ }
+
+ function test_logn() public {
+ assembly {
+ log0(0x01, 0x02)
+ log1(0x01, 0x02, 0x03)
+ log2(0x01, 0x02, 0x03, 0x04)
+ log3(0x01, 0x02, 0x03, 0x04, 0x05)
+ }
+ }
+
+ event MyEvent(uint, uint indexed, uint, uint indexed);
+ function test_events() public {
+ emit MyEvent(1, 2, 3, 4);
+ }
+
+ function test_asserts() public {
+ string memory err = "this test has failed!";
+ emit log("## assertTrue(bool)\n");
+ assertTrue(false);
+ emit log("\n");
+ assertTrue(false, err);
+
+ emit log("\n## assertEq(address,address)\n");
+ assertEq(address(this), msg.sender);
+ emit log("\n");
+ assertEq(address(this), msg.sender, err);
+
+ emit log("\n## assertEq32(bytes32,bytes32)\n");
+ assertEq32("bytes 1", "bytes 2");
+ emit log("\n");
+ assertEq32("bytes 1", "bytes 2", err);
+
+ emit log("\n## assertEq(bytes32,bytes32)\n");
+ assertEq32("bytes 1", "bytes 2");
+ emit log("\n");
+ assertEq32("bytes 1", "bytes 2", err);
+
+ emit log("\n## assertEq(uint,uint)\n");
+ assertEq(uint(0), 1);
+ emit log("\n");
+ assertEq(uint(0), 1, err);
+
+ emit log("\n## assertEq(int,int)\n");
+ assertEq(-1, -2);
+ emit log("\n");
+ assertEq(-1, -2, err);
+
+ emit log("\n## assertEqDecimal(int,int,uint)\n");
+ assertEqDecimal(-1.0e18, -1.1e18, 18);
+ emit log("\n");
+ assertEqDecimal(-1.0e18, -1.1e18, 18, err);
+
+ emit log("\n## assertEqDecimal(uint,uint,uint)\n");
+ assertEqDecimal(uint(1.0e18), 1.1e18, 18);
+ emit log("\n");
+ assertEqDecimal(uint(1.0e18), 1.1e18, 18, err);
+
+ emit log("\n## assertGt(uint,uint)\n");
+ assertGt(uint(0), 0);
+ emit log("\n");
+ assertGt(uint(0), 0, err);
+
+ emit log("\n## assertGt(int,int)\n");
+ assertGt(-1, -1);
+ emit log("\n");
+ assertGt(-1, -1, err);
+
+ emit log("\n## assertGtDecimal(int,int,uint)\n");
+ assertGtDecimal(-2.0e18, -1.1e18, 18);
+ emit log("\n");
+ assertGtDecimal(-2.0e18, -1.1e18, 18, err);
+
+ emit log("\n## assertGtDecimal(uint,uint,uint)\n");
+ assertGtDecimal(uint(1.0e18), 1.1e18, 18);
+ emit log("\n");
+ assertGtDecimal(uint(1.0e18), 1.1e18, 18, err);
+
+ emit log("\n## assertGe(uint,uint)\n");
+ assertGe(uint(0), 1);
+ emit log("\n");
+ assertGe(uint(0), 1, err);
+
+ emit log("\n## assertGe(int,int)\n");
+ assertGe(-1, 0);
+ emit log("\n");
+ assertGe(-1, 0, err);
+
+ emit log("\n## assertGeDecimal(int,int,uint)\n");
+ assertGeDecimal(-2.0e18, -1.1e18, 18);
+ emit log("\n");
+ assertGeDecimal(-2.0e18, -1.1e18, 18, err);
+
+ emit log("\n## assertGeDecimal(uint,uint,uint)\n");
+ assertGeDecimal(uint(1.0e18), 1.1e18, 18);
+ emit log("\n");
+ assertGeDecimal(uint(1.0e18), 1.1e18, 18, err);
+
+ emit log("\n## assertLt(uint,uint)\n");
+ assertLt(uint(0), 0);
+ emit log("\n");
+ assertLt(uint(0), 0, err);
+
+ emit log("\n## assertLt(int,int)\n");
+ assertLt(-1, -1);
+ emit log("\n");
+ assertLt(-1, -1, err);
+
+ emit log("\n## assertLtDecimal(int,int,uint)\n");
+ assertLtDecimal(-1.0e18, -1.1e18, 18);
+ emit log("\n");
+ assertLtDecimal(-1.0e18, -1.1e18, 18, err);
+
+ emit log("\n## assertLtDecimal(uint,uint,uint)\n");
+ assertLtDecimal(uint(2.0e18), 1.1e18, 18);
+ emit log("\n");
+ assertLtDecimal(uint(2.0e18), 1.1e18, 18, err);
+
+ emit log("\n## assertLe(uint,uint)\n");
+ assertLe(uint(1), 0);
+ emit log("\n");
+ assertLe(uint(1), 0, err);
+
+ emit log("\n## assertLe(int,int)\n");
+ assertLe(0, -1);
+ emit log("\n");
+ assertLe(0, -1, err);
+
+ emit log("\n## assertLeDecimal(int,int,uint)\n");
+ assertLeDecimal(-1.0e18, -1.1e18, 18);
+ emit log("\n");
+ assertLeDecimal(-1.0e18, -1.1e18, 18, err);
+
+ emit log("\n## assertLeDecimal(uint,uint,uint)\n");
+ assertLeDecimal(uint(2.0e18), 1.1e18, 18);
+ emit log("\n");
+ assertLeDecimal(uint(2.0e18), 1.1e18, 18, err);
+
+ emit log("\n## assertEq(string,string)\n");
+ string memory s1 = "string 1";
+ string memory s2 = "string 2";
+ assertEq(s1, s2);
+ emit log("\n");
+ assertEq(s1, s2, err);
+
+ emit log("\n## assertEq0(bytes,bytes)\n");
+ assertEq0(hex"abcdef01", hex"abcdef02");
+ emit log("\n");
+ assertEq0(hex"abcdef01", hex"abcdef02", err);
+ }
+}
+
+contract DemoTestWithSetUp {
+ function setUp() public {
+ }
+ function test_pass() public pure {
+ }
+}
diff --git a/old/lib/forge-std/lib/ds-test/src/test.sol b/old/lib/forge-std/lib/ds-test/src/test.sol
new file mode 100644
index 0000000..515a3bd
--- /dev/null
+++ b/old/lib/forge-std/lib/ds-test/src/test.sol
@@ -0,0 +1,469 @@
+// SPDX-License-Identifier: GPL-3.0-or-later
+
+// This program is free software: you can redistribute it and/or modify
+// it under the terms of the GNU General Public License as published by
+// the Free Software Foundation, either version 3 of the License, or
+// (at your option) any later version.
+
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+// GNU General Public License for more details.
+
+// You should have received a copy of the GNU General Public License
+// along with this program. If not, see .
+
+pragma solidity >=0.5.0;
+
+contract DSTest {
+ event log (string);
+ event logs (bytes);
+
+ event log_address (address);
+ event log_bytes32 (bytes32);
+ event log_int (int);
+ event log_uint (uint);
+ event log_bytes (bytes);
+ event log_string (string);
+
+ event log_named_address (string key, address val);
+ event log_named_bytes32 (string key, bytes32 val);
+ event log_named_decimal_int (string key, int val, uint decimals);
+ event log_named_decimal_uint (string key, uint val, uint decimals);
+ event log_named_int (string key, int val);
+ event log_named_uint (string key, uint val);
+ event log_named_bytes (string key, bytes val);
+ event log_named_string (string key, string val);
+
+ bool public IS_TEST = true;
+ bool private _failed;
+
+ address constant HEVM_ADDRESS =
+ address(bytes20(uint160(uint256(keccak256('hevm cheat code')))));
+
+ modifier mayRevert() { _; }
+ modifier testopts(string memory) { _; }
+
+ function failed() public returns (bool) {
+ if (_failed) {
+ return _failed;
+ } else {
+ bool globalFailed = false;
+ if (hasHEVMContext()) {
+ (, bytes memory retdata) = HEVM_ADDRESS.call(
+ abi.encodePacked(
+ bytes4(keccak256("load(address,bytes32)")),
+ abi.encode(HEVM_ADDRESS, bytes32("failed"))
+ )
+ );
+ globalFailed = abi.decode(retdata, (bool));
+ }
+ return globalFailed;
+ }
+ }
+
+ function fail() internal {
+ if (hasHEVMContext()) {
+ (bool status, ) = HEVM_ADDRESS.call(
+ abi.encodePacked(
+ bytes4(keccak256("store(address,bytes32,bytes32)")),
+ abi.encode(HEVM_ADDRESS, bytes32("failed"), bytes32(uint256(0x01)))
+ )
+ );
+ status; // Silence compiler warnings
+ }
+ _failed = true;
+ }
+
+ function hasHEVMContext() internal view returns (bool) {
+ uint256 hevmCodeSize = 0;
+ assembly {
+ hevmCodeSize := extcodesize(0x7109709ECfa91a80626fF3989D68f67F5b1DD12D)
+ }
+ return hevmCodeSize > 0;
+ }
+
+ modifier logs_gas() {
+ uint startGas = gasleft();
+ _;
+ uint endGas = gasleft();
+ emit log_named_uint("gas", startGas - endGas);
+ }
+
+ function assertTrue(bool condition) internal {
+ if (!condition) {
+ emit log("Error: Assertion Failed");
+ fail();
+ }
+ }
+
+ function assertTrue(bool condition, string memory err) internal {
+ if (!condition) {
+ emit log_named_string("Error", err);
+ assertTrue(condition);
+ }
+ }
+
+ function assertEq(address a, address b) internal {
+ if (a != b) {
+ emit log("Error: a == b not satisfied [address]");
+ emit log_named_address(" Expected", b);
+ emit log_named_address(" Actual", a);
+ fail();
+ }
+ }
+ function assertEq(address a, address b, string memory err) internal {
+ if (a != b) {
+ emit log_named_string ("Error", err);
+ assertEq(a, b);
+ }
+ }
+
+ function assertEq(bytes32 a, bytes32 b) internal {
+ if (a != b) {
+ emit log("Error: a == b not satisfied [bytes32]");
+ emit log_named_bytes32(" Expected", b);
+ emit log_named_bytes32(" Actual", a);
+ fail();
+ }
+ }
+ function assertEq(bytes32 a, bytes32 b, string memory err) internal {
+ if (a != b) {
+ emit log_named_string ("Error", err);
+ assertEq(a, b);
+ }
+ }
+ function assertEq32(bytes32 a, bytes32 b) internal {
+ assertEq(a, b);
+ }
+ function assertEq32(bytes32 a, bytes32 b, string memory err) internal {
+ assertEq(a, b, err);
+ }
+
+ function assertEq(int a, int b) internal {
+ if (a != b) {
+ emit log("Error: a == b not satisfied [int]");
+ emit log_named_int(" Expected", b);
+ emit log_named_int(" Actual", a);
+ fail();
+ }
+ }
+ function assertEq(int a, int b, string memory err) internal {
+ if (a != b) {
+ emit log_named_string("Error", err);
+ assertEq(a, b);
+ }
+ }
+ function assertEq(uint a, uint b) internal {
+ if (a != b) {
+ emit log("Error: a == b not satisfied [uint]");
+ emit log_named_uint(" Expected", b);
+ emit log_named_uint(" Actual", a);
+ fail();
+ }
+ }
+ function assertEq(uint a, uint b, string memory err) internal {
+ if (a != b) {
+ emit log_named_string("Error", err);
+ assertEq(a, b);
+ }
+ }
+ function assertEqDecimal(int a, int b, uint decimals) internal {
+ if (a != b) {
+ emit log("Error: a == b not satisfied [decimal int]");
+ emit log_named_decimal_int(" Expected", b, decimals);
+ emit log_named_decimal_int(" Actual", a, decimals);
+ fail();
+ }
+ }
+ function assertEqDecimal(int a, int b, uint decimals, string memory err) internal {
+ if (a != b) {
+ emit log_named_string("Error", err);
+ assertEqDecimal(a, b, decimals);
+ }
+ }
+ function assertEqDecimal(uint a, uint b, uint decimals) internal {
+ if (a != b) {
+ emit log("Error: a == b not satisfied [decimal uint]");
+ emit log_named_decimal_uint(" Expected", b, decimals);
+ emit log_named_decimal_uint(" Actual", a, decimals);
+ fail();
+ }
+ }
+ function assertEqDecimal(uint a, uint b, uint decimals, string memory err) internal {
+ if (a != b) {
+ emit log_named_string("Error", err);
+ assertEqDecimal(a, b, decimals);
+ }
+ }
+
+ function assertGt(uint a, uint b) internal {
+ if (a <= b) {
+ emit log("Error: a > b not satisfied [uint]");
+ emit log_named_uint(" Value a", a);
+ emit log_named_uint(" Value b", b);
+ fail();
+ }
+ }
+ function assertGt(uint a, uint b, string memory err) internal {
+ if (a <= b) {
+ emit log_named_string("Error", err);
+ assertGt(a, b);
+ }
+ }
+ function assertGt(int a, int b) internal {
+ if (a <= b) {
+ emit log("Error: a > b not satisfied [int]");
+ emit log_named_int(" Value a", a);
+ emit log_named_int(" Value b", b);
+ fail();
+ }
+ }
+ function assertGt(int a, int b, string memory err) internal {
+ if (a <= b) {
+ emit log_named_string("Error", err);
+ assertGt(a, b);
+ }
+ }
+ function assertGtDecimal(int a, int b, uint decimals) internal {
+ if (a <= b) {
+ emit log("Error: a > b not satisfied [decimal int]");
+ emit log_named_decimal_int(" Value a", a, decimals);
+ emit log_named_decimal_int(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertGtDecimal(int a, int b, uint decimals, string memory err) internal {
+ if (a <= b) {
+ emit log_named_string("Error", err);
+ assertGtDecimal(a, b, decimals);
+ }
+ }
+ function assertGtDecimal(uint a, uint b, uint decimals) internal {
+ if (a <= b) {
+ emit log("Error: a > b not satisfied [decimal uint]");
+ emit log_named_decimal_uint(" Value a", a, decimals);
+ emit log_named_decimal_uint(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertGtDecimal(uint a, uint b, uint decimals, string memory err) internal {
+ if (a <= b) {
+ emit log_named_string("Error", err);
+ assertGtDecimal(a, b, decimals);
+ }
+ }
+
+ function assertGe(uint a, uint b) internal {
+ if (a < b) {
+ emit log("Error: a >= b not satisfied [uint]");
+ emit log_named_uint(" Value a", a);
+ emit log_named_uint(" Value b", b);
+ fail();
+ }
+ }
+ function assertGe(uint a, uint b, string memory err) internal {
+ if (a < b) {
+ emit log_named_string("Error", err);
+ assertGe(a, b);
+ }
+ }
+ function assertGe(int a, int b) internal {
+ if (a < b) {
+ emit log("Error: a >= b not satisfied [int]");
+ emit log_named_int(" Value a", a);
+ emit log_named_int(" Value b", b);
+ fail();
+ }
+ }
+ function assertGe(int a, int b, string memory err) internal {
+ if (a < b) {
+ emit log_named_string("Error", err);
+ assertGe(a, b);
+ }
+ }
+ function assertGeDecimal(int a, int b, uint decimals) internal {
+ if (a < b) {
+ emit log("Error: a >= b not satisfied [decimal int]");
+ emit log_named_decimal_int(" Value a", a, decimals);
+ emit log_named_decimal_int(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertGeDecimal(int a, int b, uint decimals, string memory err) internal {
+ if (a < b) {
+ emit log_named_string("Error", err);
+ assertGeDecimal(a, b, decimals);
+ }
+ }
+ function assertGeDecimal(uint a, uint b, uint decimals) internal {
+ if (a < b) {
+ emit log("Error: a >= b not satisfied [decimal uint]");
+ emit log_named_decimal_uint(" Value a", a, decimals);
+ emit log_named_decimal_uint(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertGeDecimal(uint a, uint b, uint decimals, string memory err) internal {
+ if (a < b) {
+ emit log_named_string("Error", err);
+ assertGeDecimal(a, b, decimals);
+ }
+ }
+
+ function assertLt(uint a, uint b) internal {
+ if (a >= b) {
+ emit log("Error: a < b not satisfied [uint]");
+ emit log_named_uint(" Value a", a);
+ emit log_named_uint(" Value b", b);
+ fail();
+ }
+ }
+ function assertLt(uint a, uint b, string memory err) internal {
+ if (a >= b) {
+ emit log_named_string("Error", err);
+ assertLt(a, b);
+ }
+ }
+ function assertLt(int a, int b) internal {
+ if (a >= b) {
+ emit log("Error: a < b not satisfied [int]");
+ emit log_named_int(" Value a", a);
+ emit log_named_int(" Value b", b);
+ fail();
+ }
+ }
+ function assertLt(int a, int b, string memory err) internal {
+ if (a >= b) {
+ emit log_named_string("Error", err);
+ assertLt(a, b);
+ }
+ }
+ function assertLtDecimal(int a, int b, uint decimals) internal {
+ if (a >= b) {
+ emit log("Error: a < b not satisfied [decimal int]");
+ emit log_named_decimal_int(" Value a", a, decimals);
+ emit log_named_decimal_int(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertLtDecimal(int a, int b, uint decimals, string memory err) internal {
+ if (a >= b) {
+ emit log_named_string("Error", err);
+ assertLtDecimal(a, b, decimals);
+ }
+ }
+ function assertLtDecimal(uint a, uint b, uint decimals) internal {
+ if (a >= b) {
+ emit log("Error: a < b not satisfied [decimal uint]");
+ emit log_named_decimal_uint(" Value a", a, decimals);
+ emit log_named_decimal_uint(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertLtDecimal(uint a, uint b, uint decimals, string memory err) internal {
+ if (a >= b) {
+ emit log_named_string("Error", err);
+ assertLtDecimal(a, b, decimals);
+ }
+ }
+
+ function assertLe(uint a, uint b) internal {
+ if (a > b) {
+ emit log("Error: a <= b not satisfied [uint]");
+ emit log_named_uint(" Value a", a);
+ emit log_named_uint(" Value b", b);
+ fail();
+ }
+ }
+ function assertLe(uint a, uint b, string memory err) internal {
+ if (a > b) {
+ emit log_named_string("Error", err);
+ assertLe(a, b);
+ }
+ }
+ function assertLe(int a, int b) internal {
+ if (a > b) {
+ emit log("Error: a <= b not satisfied [int]");
+ emit log_named_int(" Value a", a);
+ emit log_named_int(" Value b", b);
+ fail();
+ }
+ }
+ function assertLe(int a, int b, string memory err) internal {
+ if (a > b) {
+ emit log_named_string("Error", err);
+ assertLe(a, b);
+ }
+ }
+ function assertLeDecimal(int a, int b, uint decimals) internal {
+ if (a > b) {
+ emit log("Error: a <= b not satisfied [decimal int]");
+ emit log_named_decimal_int(" Value a", a, decimals);
+ emit log_named_decimal_int(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertLeDecimal(int a, int b, uint decimals, string memory err) internal {
+ if (a > b) {
+ emit log_named_string("Error", err);
+ assertLeDecimal(a, b, decimals);
+ }
+ }
+ function assertLeDecimal(uint a, uint b, uint decimals) internal {
+ if (a > b) {
+ emit log("Error: a <= b not satisfied [decimal uint]");
+ emit log_named_decimal_uint(" Value a", a, decimals);
+ emit log_named_decimal_uint(" Value b", b, decimals);
+ fail();
+ }
+ }
+ function assertLeDecimal(uint a, uint b, uint decimals, string memory err) internal {
+ if (a > b) {
+ emit log_named_string("Error", err);
+ assertGeDecimal(a, b, decimals);
+ }
+ }
+
+ function assertEq(string memory a, string memory b) internal {
+ if (keccak256(abi.encodePacked(a)) != keccak256(abi.encodePacked(b))) {
+ emit log("Error: a == b not satisfied [string]");
+ emit log_named_string(" Expected", b);
+ emit log_named_string(" Actual", a);
+ fail();
+ }
+ }
+ function assertEq(string memory a, string memory b, string memory err) internal {
+ if (keccak256(abi.encodePacked(a)) != keccak256(abi.encodePacked(b))) {
+ emit log_named_string("Error", err);
+ assertEq(a, b);
+ }
+ }
+
+ function checkEq0(bytes memory a, bytes memory b) internal pure returns (bool ok) {
+ ok = true;
+ if (a.length == b.length) {
+ for (uint i = 0; i < a.length; i++) {
+ if (a[i] != b[i]) {
+ ok = false;
+ }
+ }
+ } else {
+ ok = false;
+ }
+ }
+ function assertEq0(bytes memory a, bytes memory b) internal {
+ if (!checkEq0(a, b)) {
+ emit log("Error: a == b not satisfied [bytes]");
+ emit log_named_bytes(" Expected", b);
+ emit log_named_bytes(" Actual", a);
+ fail();
+ }
+ }
+ function assertEq0(bytes memory a, bytes memory b, string memory err) internal {
+ if (!checkEq0(a, b)) {
+ emit log_named_string("Error", err);
+ assertEq0(a, b);
+ }
+ }
+}
diff --git a/old/lib/forge-std/src/Script.sol b/old/lib/forge-std/src/Script.sol
new file mode 100644
index 0000000..e1e3a51
--- /dev/null
+++ b/old/lib/forge-std/src/Script.sol
@@ -0,0 +1,44 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.6.0 <0.9.0;
+
+import "./console.sol";
+import "./console2.sol";
+import "./StdJson.sol";
+
+abstract contract Script {
+ bool public IS_SCRIPT = true;
+ address constant private VM_ADDRESS =
+ address(bytes20(uint160(uint256(keccak256('hevm cheat code')))));
+
+ Vm public constant vm = Vm(VM_ADDRESS);
+
+ /// @dev Compute the address a contract will be deployed at for a given deployer address and nonce
+ /// @notice adapated from Solmate implementation (https://github.com/transmissions11/solmate/blob/main/src/utils/LibRLP.sol)
+ function computeCreateAddress(address deployer, uint256 nonce) internal pure returns (address) {
+ // The integer zero is treated as an empty byte string, and as a result it only has a length prefix, 0x80, computed via 0x80 + 0.
+ // A one byte integer uses its own value as its length prefix, there is no additional "0x80 + length" prefix that comes before it.
+ if (nonce == 0x00) return addressFromLast20Bytes(keccak256(abi.encodePacked(bytes1(0xd6), bytes1(0x94), deployer, bytes1(0x80))));
+ if (nonce <= 0x7f) return addressFromLast20Bytes(keccak256(abi.encodePacked(bytes1(0xd6), bytes1(0x94), deployer, uint8(nonce))));
+
+ // Nonces greater than 1 byte all follow a consistent encoding scheme, where each value is preceded by a prefix of 0x80 + length.
+ if (nonce <= 2**8 - 1) return addressFromLast20Bytes(keccak256(abi.encodePacked(bytes1(0xd7), bytes1(0x94), deployer, bytes1(0x81), uint8(nonce))));
+ if (nonce <= 2**16 - 1) return addressFromLast20Bytes(keccak256(abi.encodePacked(bytes1(0xd8), bytes1(0x94), deployer, bytes1(0x82), uint16(nonce))));
+ if (nonce <= 2**24 - 1) return addressFromLast20Bytes(keccak256(abi.encodePacked(bytes1(0xd9), bytes1(0x94), deployer, bytes1(0x83), uint24(nonce))));
+
+ // More details about RLP encoding can be found here: https://eth.wiki/fundamentals/rlp
+ // 0xda = 0xc0 (short RLP prefix) + 0x16 (length of: 0x94 ++ proxy ++ 0x84 ++ nonce)
+ // 0x94 = 0x80 + 0x14 (0x14 = the length of an address, 20 bytes, in hex)
+ // 0x84 = 0x80 + 0x04 (0x04 = the bytes length of the nonce, 4 bytes, in hex)
+ // We assume nobody can have a nonce large enough to require more than 32 bytes.
+ return addressFromLast20Bytes(keccak256(abi.encodePacked(bytes1(0xda), bytes1(0x94), deployer, bytes1(0x84), uint32(nonce))));
+ }
+
+ function addressFromLast20Bytes(bytes32 bytesValue) internal pure returns (address) {
+ return address(uint160(uint256(bytesValue)));
+ }
+
+ function deriveRememberKey(string memory mnemonic, uint32 index) internal returns (address who, uint256 privateKey) {
+ privateKey = vm.deriveKey(mnemonic, index);
+ who = vm.rememberKey(privateKey);
+ }
+}
diff --git a/old/lib/forge-std/src/StdJson.sol b/old/lib/forge-std/src/StdJson.sol
new file mode 100644
index 0000000..c4ad825
--- /dev/null
+++ b/old/lib/forge-std/src/StdJson.sol
@@ -0,0 +1,118 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.6.0 <0.9.0;
+pragma experimental ABIEncoderV2;
+
+import "./Vm.sol";
+
+// Helpers for parsing keys into types.
+library stdJson {
+
+ Vm private constant vm = Vm(address(uint160(uint256(keccak256("hevm cheat code")))));
+
+ function parseRaw(string memory json, string memory key)
+ internal
+ returns (bytes memory)
+ {
+ return vm.parseJson(json, key);
+ }
+
+ function readUint(string memory json, string memory key)
+ internal
+ returns (uint256)
+ {
+ return abi.decode(vm.parseJson(json, key), (uint256));
+ }
+
+ function readUintArray(string memory json, string memory key)
+ internal
+ returns (uint256[] memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (uint256[]));
+ }
+
+ function readInt(string memory json, string memory key)
+ internal
+ returns (int256)
+ {
+ return abi.decode(vm.parseJson(json, key), (int256));
+ }
+
+ function readIntArray(string memory json, string memory key)
+ internal
+ returns (int256[] memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (int256[]));
+ }
+
+ function readBytes32(string memory json, string memory key)
+ internal
+ returns (bytes32)
+ {
+ return abi.decode(vm.parseJson(json, key), (bytes32));
+ }
+
+ function readBytes32Array(string memory json, string memory key)
+ internal
+ returns (bytes32[] memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (bytes32[]));
+ }
+
+ function readString(string memory json, string memory key)
+ internal
+ returns (string memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (string));
+ }
+
+ function readStringArray(string memory json, string memory key)
+ internal
+ returns (string[] memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (string[]));
+ }
+
+ function readAddress(string memory json, string memory key)
+ internal
+ returns (address)
+ {
+ return abi.decode(vm.parseJson(json, key), (address));
+ }
+
+ function readAddressArray(string memory json, string memory key)
+ internal
+ returns (address[] memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (address[]));
+ }
+
+ function readBool(string memory json, string memory key)
+ internal
+ returns (bool)
+ {
+ return abi.decode(vm.parseJson(json, key), (bool));
+ }
+
+ function readBoolArray(string memory json, string memory key)
+ internal
+ returns (bool[] memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (bool[]));
+ }
+
+ function readBytes(string memory json, string memory key)
+ internal
+ returns (bytes memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (bytes));
+ }
+
+ function readBytesArray(string memory json, string memory key)
+ internal
+ returns (bytes[] memory)
+ {
+ return abi.decode(vm.parseJson(json, key), (bytes[]));
+ }
+
+
+}
diff --git a/old/lib/forge-std/src/Test.sol b/old/lib/forge-std/src/Test.sol
new file mode 100644
index 0000000..ef18bb6
--- /dev/null
+++ b/old/lib/forge-std/src/Test.sol
@@ -0,0 +1,1138 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.6.0 <0.9.0;
+pragma experimental ABIEncoderV2;
+
+import "./Script.sol";
+import "ds-test/test.sol";
+
+// Wrappers around Cheatcodes to avoid footguns
+abstract contract Test is DSTest, Script {
+ using stdStorage for StdStorage;
+
+ uint256 internal constant UINT256_MAX =
+ 115792089237316195423570985008687907853269984665640564039457584007913129639935;
+
+ StdStorage internal stdstore;
+
+ /*//////////////////////////////////////////////////////////////////////////
+ STD-LOGS
+ //////////////////////////////////////////////////////////////////////////*/
+
+ event log_array(uint256[] val);
+ event log_array(int256[] val);
+ event log_array(address[] val);
+ event log_named_array(string key, uint256[] val);
+ event log_named_array(string key, int256[] val);
+ event log_named_array(string key, address[] val);
+
+ /*//////////////////////////////////////////////////////////////////////////
+ STD-CHEATS
+ //////////////////////////////////////////////////////////////////////////*/
+
+ // Skip forward or rewind time by the specified number of seconds
+ function skip(uint256 time) internal {
+ vm.warp(block.timestamp + time);
+ }
+
+ function rewind(uint256 time) internal {
+ vm.warp(block.timestamp - time);
+ }
+
+ // Setup a prank from an address that has some ether
+ function hoax(address who) internal {
+ vm.deal(who, 1 << 128);
+ vm.prank(who);
+ }
+
+ function hoax(address who, uint256 give) internal {
+ vm.deal(who, give);
+ vm.prank(who);
+ }
+
+ function hoax(address who, address origin) internal {
+ vm.deal(who, 1 << 128);
+ vm.prank(who, origin);
+ }
+
+ function hoax(address who, address origin, uint256 give) internal {
+ vm.deal(who, give);
+ vm.prank(who, origin);
+ }
+
+ // Start perpetual prank from an address that has some ether
+ function startHoax(address who) internal {
+ vm.deal(who, 1 << 128);
+ vm.startPrank(who);
+ }
+
+ function startHoax(address who, uint256 give) internal {
+ vm.deal(who, give);
+ vm.startPrank(who);
+ }
+
+ // Start perpetual prank from an address that has some ether
+ // tx.origin is set to the origin parameter
+ function startHoax(address who, address origin) internal {
+ vm.deal(who, 1 << 128);
+ vm.startPrank(who, origin);
+ }
+
+ function startHoax(address who, address origin, uint256 give) internal {
+ vm.deal(who, give);
+ vm.startPrank(who, origin);
+ }
+
+ function changePrank(address who) internal {
+ vm.stopPrank();
+ vm.startPrank(who);
+ }
+
+ // creates a labeled address and the corresponding private key
+ function makeAddrAndKey(string memory name) internal returns(address addr, uint256 privateKey) {
+ privateKey = uint256(keccak256(abi.encodePacked(name)));
+ addr = vm.addr(privateKey);
+ vm.label(addr, name);
+ }
+
+ // creates a labeled address
+ function makeAddr(string memory name) internal returns(address addr) {
+ (addr,) = makeAddrAndKey(name);
+ }
+
+ // DEPRECATED: Use `deal` instead
+ function tip(address token, address to, uint256 give) internal {
+ emit log_named_string("WARNING", "Test tip(address,address,uint256): The `tip` stdcheat has been deprecated. Use `deal` instead.");
+ stdstore
+ .target(token)
+ .sig(0x70a08231)
+ .with_key(to)
+ .checked_write(give);
+ }
+
+ // The same as Vm's `deal`
+ // Use the alternative signature for ERC20 tokens
+ function deal(address to, uint256 give) internal {
+ vm.deal(to, give);
+ }
+
+ // Set the balance of an account for any ERC20 token
+ // Use the alternative signature to update `totalSupply`
+ function deal(address token, address to, uint256 give) internal {
+ deal(token, to, give, false);
+ }
+
+ function deal(address token, address to, uint256 give, bool adjust) internal {
+ // get current balance
+ (, bytes memory balData) = token.call(abi.encodeWithSelector(0x70a08231, to));
+ uint256 prevBal = abi.decode(balData, (uint256));
+
+ // update balance
+ stdstore
+ .target(token)
+ .sig(0x70a08231)
+ .with_key(to)
+ .checked_write(give);
+
+ // update total supply
+ if(adjust){
+ (, bytes memory totSupData) = token.call(abi.encodeWithSelector(0x18160ddd));
+ uint256 totSup = abi.decode(totSupData, (uint256));
+ if(give < prevBal) {
+ totSup -= (prevBal - give);
+ } else {
+ totSup += (give - prevBal);
+ }
+ stdstore
+ .target(token)
+ .sig(0x18160ddd)
+ .checked_write(totSup);
+ }
+ }
+
+ function bound(uint256 x, uint256 min, uint256 max) internal virtual returns (uint256 result) {
+ require(min <= max, "Test bound(uint256,uint256,uint256): Max is less than min.");
+
+ uint256 size = max - min;
+
+ if (size == 0)
+ {
+ result = min;
+ }
+ else if (size == UINT256_MAX)
+ {
+ result = x;
+ }
+ else
+ {
+ ++size; // make `max` inclusive
+ uint256 mod = x % size;
+ result = min + mod;
+ }
+
+ emit log_named_uint("Bound Result", result);
+ }
+
+ // Deploy a contract by fetching the contract bytecode from
+ // the artifacts directory
+ // e.g. `deployCode(code, abi.encode(arg1,arg2,arg3))`
+ function deployCode(string memory what, bytes memory args)
+ internal
+ returns (address addr)
+ {
+ bytes memory bytecode = abi.encodePacked(vm.getCode(what), args);
+ /// @solidity memory-safe-assembly
+ assembly {
+ addr := create(0, add(bytecode, 0x20), mload(bytecode))
+ }
+
+ require(
+ addr != address(0),
+ "Test deployCode(string,bytes): Deployment failed."
+ );
+ }
+
+ function deployCode(string memory what)
+ internal
+ returns (address addr)
+ {
+ bytes memory bytecode = vm.getCode(what);
+ /// @solidity memory-safe-assembly
+ assembly {
+ addr := create(0, add(bytecode, 0x20), mload(bytecode))
+ }
+
+ require(
+ addr != address(0),
+ "Test deployCode(string): Deployment failed."
+ );
+ }
+
+ /// deploy contract with value on construction
+ function deployCode(string memory what, bytes memory args, uint256 val)
+ internal
+ returns (address addr)
+ {
+ bytes memory bytecode = abi.encodePacked(vm.getCode(what), args);
+ /// @solidity memory-safe-assembly
+ assembly {
+ addr := create(val, add(bytecode, 0x20), mload(bytecode))
+ }
+
+ require(
+ addr != address(0),
+ "Test deployCode(string,bytes,uint256): Deployment failed."
+ );
+ }
+
+ function deployCode(string memory what, uint256 val)
+ internal
+ returns (address addr)
+ {
+ bytes memory bytecode = vm.getCode(what);
+ /// @solidity memory-safe-assembly
+ assembly {
+ addr := create(val, add(bytecode, 0x20), mload(bytecode))
+ }
+
+ require(
+ addr != address(0),
+ "Test deployCode(string,uint256): Deployment failed."
+ );
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ STD-ASSERTIONS
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function fail(string memory err) internal virtual {
+ emit log_named_string("Error", err);
+ fail();
+ }
+
+ function assertFalse(bool data) internal virtual {
+ assertTrue(!data);
+ }
+
+ function assertFalse(bool data, string memory err) internal virtual {
+ assertTrue(!data, err);
+ }
+
+ function assertEq(bool a, bool b) internal {
+ if (a != b) {
+ emit log ("Error: a == b not satisfied [bool]");
+ emit log_named_string (" Expected", b ? "true" : "false");
+ emit log_named_string (" Actual", a ? "true" : "false");
+ fail();
+ }
+ }
+
+ function assertEq(bool a, bool b, string memory err) internal {
+ if (a != b) {
+ emit log_named_string("Error", err);
+ assertEq(a, b);
+ }
+ }
+
+ function assertEq(bytes memory a, bytes memory b) internal {
+ assertEq0(a, b);
+ }
+
+ function assertEq(bytes memory a, bytes memory b, string memory err) internal {
+ assertEq0(a, b, err);
+ }
+
+ function assertEq(uint256[] memory a, uint256[] memory b) internal {
+ if (keccak256(abi.encode(a)) != keccak256(abi.encode(b))) {
+ emit log("Error: a == b not satisfied [uint[]]");
+ emit log_named_array(" Expected", b);
+ emit log_named_array(" Actual", a);
+ fail();
+ }
+ }
+
+ function assertEq(int256[] memory a, int256[] memory b) internal {
+ if (keccak256(abi.encode(a)) != keccak256(abi.encode(b))) {
+ emit log("Error: a == b not satisfied [int[]]");
+ emit log_named_array(" Expected", b);
+ emit log_named_array(" Actual", a);
+ fail();
+ }
+ }
+
+ function assertEq(address[] memory a, address[] memory b) internal {
+ if (keccak256(abi.encode(a)) != keccak256(abi.encode(b))) {
+ emit log("Error: a == b not satisfied [address[]]");
+ emit log_named_array(" Expected", b);
+ emit log_named_array(" Actual", a);
+ fail();
+ }
+ }
+
+ function assertEq(uint256[] memory a, uint256[] memory b, string memory err) internal {
+ if (keccak256(abi.encode(a)) != keccak256(abi.encode(b))) {
+ emit log_named_string("Error", err);
+ assertEq(a, b);
+ }
+ }
+
+ function assertEq(int256[] memory a, int256[] memory b, string memory err) internal {
+ if (keccak256(abi.encode(a)) != keccak256(abi.encode(b))) {
+ emit log_named_string("Error", err);
+ assertEq(a, b);
+ }
+ }
+
+
+ function assertEq(address[] memory a, address[] memory b, string memory err) internal {
+ if (keccak256(abi.encode(a)) != keccak256(abi.encode(b))) {
+ emit log_named_string("Error", err);
+ assertEq(a, b);
+ }
+ }
+
+ function assertEqUint(uint256 a, uint256 b) internal {
+ assertEq(uint256(a), uint256(b));
+ }
+
+ function assertApproxEqAbs(
+ uint256 a,
+ uint256 b,
+ uint256 maxDelta
+ ) internal virtual {
+ uint256 delta = stdMath.delta(a, b);
+
+ if (delta > maxDelta) {
+ emit log ("Error: a ~= b not satisfied [uint]");
+ emit log_named_uint (" Expected", b);
+ emit log_named_uint (" Actual", a);
+ emit log_named_uint (" Max Delta", maxDelta);
+ emit log_named_uint (" Delta", delta);
+ fail();
+ }
+ }
+
+ function assertApproxEqAbs(
+ uint256 a,
+ uint256 b,
+ uint256 maxDelta,
+ string memory err
+ ) internal virtual {
+ uint256 delta = stdMath.delta(a, b);
+
+ if (delta > maxDelta) {
+ emit log_named_string ("Error", err);
+ assertApproxEqAbs(a, b, maxDelta);
+ }
+ }
+
+ function assertApproxEqAbs(
+ int256 a,
+ int256 b,
+ uint256 maxDelta
+ ) internal virtual {
+ uint256 delta = stdMath.delta(a, b);
+
+ if (delta > maxDelta) {
+ emit log ("Error: a ~= b not satisfied [int]");
+ emit log_named_int (" Expected", b);
+ emit log_named_int (" Actual", a);
+ emit log_named_uint (" Max Delta", maxDelta);
+ emit log_named_uint (" Delta", delta);
+ fail();
+ }
+ }
+
+ function assertApproxEqAbs(
+ int256 a,
+ int256 b,
+ uint256 maxDelta,
+ string memory err
+ ) internal virtual {
+ uint256 delta = stdMath.delta(a, b);
+
+ if (delta > maxDelta) {
+ emit log_named_string ("Error", err);
+ assertApproxEqAbs(a, b, maxDelta);
+ }
+ }
+
+ function assertApproxEqRel(
+ uint256 a,
+ uint256 b,
+ uint256 maxPercentDelta // An 18 decimal fixed point number, where 1e18 == 100%
+ ) internal virtual {
+ if (b == 0) return assertEq(a, b); // If the expected is 0, actual must be too.
+
+ uint256 percentDelta = stdMath.percentDelta(a, b);
+
+ if (percentDelta > maxPercentDelta) {
+ emit log ("Error: a ~= b not satisfied [uint]");
+ emit log_named_uint (" Expected", b);
+ emit log_named_uint (" Actual", a);
+ emit log_named_decimal_uint (" Max % Delta", maxPercentDelta, 18);
+ emit log_named_decimal_uint (" % Delta", percentDelta, 18);
+ fail();
+ }
+ }
+
+ function assertApproxEqRel(
+ uint256 a,
+ uint256 b,
+ uint256 maxPercentDelta, // An 18 decimal fixed point number, where 1e18 == 100%
+ string memory err
+ ) internal virtual {
+ if (b == 0) return assertEq(a, b, err); // If the expected is 0, actual must be too.
+
+ uint256 percentDelta = stdMath.percentDelta(a, b);
+
+ if (percentDelta > maxPercentDelta) {
+ emit log_named_string ("Error", err);
+ assertApproxEqRel(a, b, maxPercentDelta);
+ }
+ }
+
+ function assertApproxEqRel(
+ int256 a,
+ int256 b,
+ uint256 maxPercentDelta
+ ) internal virtual {
+ if (b == 0) return assertEq(a, b); // If the expected is 0, actual must be too.
+
+ uint256 percentDelta = stdMath.percentDelta(a, b);
+
+ if (percentDelta > maxPercentDelta) {
+ emit log ("Error: a ~= b not satisfied [int]");
+ emit log_named_int (" Expected", b);
+ emit log_named_int (" Actual", a);
+ emit log_named_decimal_uint(" Max % Delta", maxPercentDelta, 18);
+ emit log_named_decimal_uint(" % Delta", percentDelta, 18);
+ fail();
+ }
+ }
+
+ function assertApproxEqRel(
+ int256 a,
+ int256 b,
+ uint256 maxPercentDelta,
+ string memory err
+ ) internal virtual {
+ if (b == 0) return assertEq(a, b); // If the expected is 0, actual must be too.
+
+ uint256 percentDelta = stdMath.percentDelta(a, b);
+
+ if (percentDelta > maxPercentDelta) {
+ emit log_named_string ("Error", err);
+ assertApproxEqRel(a, b, maxPercentDelta);
+ }
+ }
+
+ /*//////////////////////////////////////////////////////////////
+ JSON PARSING
+ //////////////////////////////////////////////////////////////*/
+
+ // Data structures to parse Transaction objects from the broadcast artifact
+ // that conform to EIP1559. The Raw structs is what is parsed from the JSON
+ // and then converted to the one that is used by the user for better UX.
+
+ struct RawTx1559 {
+ string[] arguments;
+ address contractAddress;
+ string contractName;
+ // json value name = function
+ string functionSig;
+ bytes32 hash;
+ // json value name = tx
+ RawTx1559Detail txDetail;
+ // json value name = type
+ string opcode;
+ }
+
+ struct RawTx1559Detail {
+ AccessList[] accessList;
+ bytes data;
+ address from;
+ bytes gas;
+ bytes nonce;
+ address to;
+ bytes txType;
+ bytes value;
+ }
+
+ struct Tx1559 {
+ string[] arguments;
+ address contractAddress;
+ string contractName;
+ string functionSig;
+ bytes32 hash;
+ Tx1559Detail txDetail;
+ string opcode;
+ }
+
+ struct Tx1559Detail {
+ AccessList[] accessList;
+ bytes data;
+ address from;
+ uint256 gas;
+ uint256 nonce;
+ address to;
+ uint256 txType;
+ uint256 value;
+ }
+
+ // Data structures to parse Transaction objects from the broadcast artifact
+ // that DO NOT conform to EIP1559. The Raw structs is what is parsed from the JSON
+ // and then converted to the one that is used by the user for better UX.
+
+ struct TxLegacy{
+ string[] arguments;
+ address contractAddress;
+ string contractName;
+ string functionSig;
+ string hash;
+ string opcode;
+ TxDetailLegacy transaction;
+ }
+
+ struct TxDetailLegacy{
+ AccessList[] accessList;
+ uint256 chainId;
+ bytes data;
+ address from;
+ uint256 gas;
+ uint256 gasPrice;
+ bytes32 hash;
+ uint256 nonce;
+ bytes1 opcode;
+ bytes32 r;
+ bytes32 s;
+ uint256 txType;
+ address to;
+ uint8 v;
+ uint256 value;
+ }
+
+ struct AccessList{
+ address accessAddress;
+ bytes32[] storageKeys;
+ }
+
+ // Data structures to parse Receipt objects from the broadcast artifact.
+ // The Raw structs is what is parsed from the JSON
+ // and then converted to the one that is used by the user for better UX.
+
+ struct RawReceipt {
+ bytes32 blockHash;
+ bytes blockNumber;
+ address contractAddress;
+ bytes cumulativeGasUsed;
+ bytes effectiveGasPrice;
+ address from;
+ bytes gasUsed;
+ RawReceiptLog[] logs;
+ bytes logsBloom;
+ bytes status;
+ address to;
+ bytes32 transactionHash;
+ bytes transactionIndex;
+ }
+
+ struct Receipt {
+ bytes32 blockHash;
+ uint256 blockNumber;
+ address contractAddress;
+ uint256 cumulativeGasUsed;
+ uint256 effectiveGasPrice;
+ address from;
+ uint256 gasUsed;
+ ReceiptLog[] logs;
+ bytes logsBloom;
+ uint256 status;
+ address to;
+ bytes32 transactionHash;
+ uint256 transactionIndex;
+ }
+
+ // Data structures to parse the entire broadcast artifact, assuming the
+ // transactions conform to EIP1559.
+
+ struct EIP1559ScriptArtifact {
+ string[] libraries;
+ string path;
+ string[] pending;
+ Receipt[] receipts;
+ uint256 timestamp;
+ Tx1559[] transactions;
+ TxReturn[] txReturns;
+ }
+
+ struct RawEIP1559ScriptArtifact {
+ string[] libraries;
+ string path;
+ string[] pending;
+ RawReceipt[] receipts;
+ TxReturn[] txReturns;
+ uint256 timestamp;
+ RawTx1559[] transactions;
+ }
+
+ struct RawReceiptLog {
+ // json value = address
+ address logAddress;
+ bytes32 blockHash;
+ bytes blockNumber;
+ bytes data;
+ bytes logIndex;
+ bool removed;
+ bytes32[] topics;
+ bytes32 transactionHash;
+ bytes transactionIndex;
+ bytes transactionLogIndex;
+ }
+
+ struct ReceiptLog {
+ // json value = address
+ address logAddress;
+ bytes32 blockHash;
+ uint256 blockNumber;
+ bytes data;
+ uint256 logIndex;
+ bytes32[] topics;
+ uint256 transactionIndex;
+ uint256 transactionLogIndex;
+ bool removed;
+ }
+
+ struct TxReturn {
+ string internalType;
+ string value;
+ }
+
+
+ function readEIP1559ScriptArtifact(string memory path)
+ internal
+ returns(EIP1559ScriptArtifact memory)
+ {
+ string memory data = vm.readFile(path);
+ bytes memory parsedData = vm.parseJson(data);
+ RawEIP1559ScriptArtifact memory rawArtifact = abi.decode(parsedData, (RawEIP1559ScriptArtifact));
+ EIP1559ScriptArtifact memory artifact;
+ artifact.libraries = rawArtifact.libraries;
+ artifact.path = rawArtifact.path;
+ artifact.timestamp = rawArtifact.timestamp;
+ artifact.pending = rawArtifact.pending;
+ artifact.txReturns = rawArtifact.txReturns;
+ artifact.receipts = rawToConvertedReceipts(rawArtifact.receipts);
+ artifact.transactions = rawToConvertedEIPTx1559s(rawArtifact.transactions);
+ return artifact;
+ }
+
+ function rawToConvertedEIPTx1559s(RawTx1559[] memory rawTxs)
+ internal pure
+ returns (Tx1559[] memory)
+ {
+ Tx1559[] memory txs = new Tx1559[](rawTxs.length);
+ for (uint i; i < rawTxs.length; i++) {
+ txs[i] = rawToConvertedEIPTx1559(rawTxs[i]);
+ }
+ return txs;
+ }
+
+ function rawToConvertedEIPTx1559(RawTx1559 memory rawTx)
+ internal pure
+ returns (Tx1559 memory)
+ {
+ Tx1559 memory transaction;
+ transaction.arguments = rawTx.arguments;
+ transaction.contractName = rawTx.contractName;
+ transaction.functionSig = rawTx.functionSig;
+ transaction.hash= rawTx.hash;
+ transaction.txDetail = rawToConvertedEIP1559Detail(rawTx.txDetail);
+ transaction.opcode= rawTx.opcode;
+ return transaction;
+ }
+
+ function rawToConvertedEIP1559Detail(RawTx1559Detail memory rawDetail)
+ internal pure
+ returns (Tx1559Detail memory)
+ {
+ Tx1559Detail memory txDetail;
+ txDetail.data = rawDetail.data;
+ txDetail.from = rawDetail.from;
+ txDetail.to = rawDetail.to;
+ txDetail.nonce = bytesToUint(rawDetail.nonce);
+ txDetail.txType = bytesToUint(rawDetail.txType);
+ txDetail.value = bytesToUint(rawDetail.value);
+ txDetail.gas = bytesToUint(rawDetail.gas);
+ txDetail.accessList = rawDetail.accessList;
+ return txDetail;
+
+ }
+
+ function readTx1559s(string memory path)
+ internal
+ returns (Tx1559[] memory)
+ {
+ string memory deployData = vm.readFile(path);
+ bytes memory parsedDeployData =
+ vm.parseJson(deployData, ".transactions");
+ RawTx1559[] memory rawTxs = abi.decode(parsedDeployData, (RawTx1559[]));
+ return rawToConvertedEIPTx1559s(rawTxs);
+ }
+
+
+ function readTx1559(string memory path, uint256 index)
+ internal
+ returns (Tx1559 memory)
+ {
+ string memory deployData = vm.readFile(path);
+ string memory key = string(abi.encodePacked(".transactions[",vm.toString(index), "]"));
+ bytes memory parsedDeployData =
+ vm.parseJson(deployData, key);
+ RawTx1559 memory rawTx = abi.decode(parsedDeployData, (RawTx1559));
+ return rawToConvertedEIPTx1559(rawTx);
+ }
+
+
+ // Analogous to readTransactions, but for receipts.
+ function readReceipts(string memory path)
+ internal
+ returns (Receipt[] memory)
+ {
+ string memory deployData = vm.readFile(path);
+ bytes memory parsedDeployData = vm.parseJson(deployData, ".receipts");
+ RawReceipt[] memory rawReceipts = abi.decode(parsedDeployData, (RawReceipt[]));
+ return rawToConvertedReceipts(rawReceipts);
+ }
+
+ function readReceipt(string memory path, uint index)
+ internal
+ returns (Receipt memory)
+ {
+ string memory deployData = vm.readFile(path);
+ string memory key = string(abi.encodePacked(".receipts[",vm.toString(index), "]"));
+ bytes memory parsedDeployData = vm.parseJson(deployData, key);
+ RawReceipt memory rawReceipt = abi.decode(parsedDeployData, (RawReceipt));
+ return rawToConvertedReceipt(rawReceipt);
+ }
+
+ function rawToConvertedReceipts(RawReceipt[] memory rawReceipts)
+ internal pure
+ returns(Receipt[] memory)
+ {
+ Receipt[] memory receipts = new Receipt[](rawReceipts.length);
+ for (uint i; i < rawReceipts.length; i++) {
+ receipts[i] = rawToConvertedReceipt(rawReceipts[i]);
+ }
+ return receipts;
+ }
+
+ function rawToConvertedReceipt(RawReceipt memory rawReceipt)
+ internal pure
+ returns(Receipt memory)
+ {
+ Receipt memory receipt;
+ receipt.blockHash = rawReceipt.blockHash;
+ receipt.to = rawReceipt.to;
+ receipt.from = rawReceipt.from;
+ receipt.contractAddress = rawReceipt.contractAddress;
+ receipt.effectiveGasPrice = bytesToUint(rawReceipt.effectiveGasPrice);
+ receipt.cumulativeGasUsed= bytesToUint(rawReceipt.cumulativeGasUsed);
+ receipt.gasUsed = bytesToUint(rawReceipt.gasUsed);
+ receipt.status = bytesToUint(rawReceipt.status);
+ receipt.transactionIndex = bytesToUint(rawReceipt.transactionIndex);
+ receipt.blockNumber = bytesToUint(rawReceipt.blockNumber);
+ receipt.logs = rawToConvertedReceiptLogs(rawReceipt.logs);
+ receipt.logsBloom = rawReceipt.logsBloom;
+ receipt.transactionHash = rawReceipt.transactionHash;
+ return receipt;
+ }
+
+ function rawToConvertedReceiptLogs(RawReceiptLog[] memory rawLogs)
+ internal pure
+ returns (ReceiptLog[] memory)
+ {
+ ReceiptLog[] memory logs = new ReceiptLog[](rawLogs.length);
+ for (uint i; i < rawLogs.length; i++) {
+ logs[i].logAddress = rawLogs[i].logAddress;
+ logs[i].blockHash = rawLogs[i].blockHash;
+ logs[i].blockNumber = bytesToUint(rawLogs[i].blockNumber);
+ logs[i].data = rawLogs[i].data;
+ logs[i].logIndex = bytesToUint(rawLogs[i].logIndex);
+ logs[i].topics = rawLogs[i].topics;
+ logs[i].transactionIndex = bytesToUint(rawLogs[i].transactionIndex);
+ logs[i].transactionLogIndex = bytesToUint(rawLogs[i].transactionLogIndex);
+ logs[i].removed = rawLogs[i].removed;
+ }
+ return logs;
+
+ }
+
+ function bytesToUint(bytes memory b) internal pure returns (uint256){
+ uint256 number;
+ for (uint i=0; i < b.length; i++) {
+ number = number + uint(uint8(b[i]))*(2**(8*(b.length-(i+1))));
+ }
+ return number;
+ }
+
+}
+
+/*//////////////////////////////////////////////////////////////////////////
+ STD-ERRORS
+//////////////////////////////////////////////////////////////////////////*/
+
+library stdError {
+ bytes public constant assertionError = abi.encodeWithSignature("Panic(uint256)", 0x01);
+ bytes public constant arithmeticError = abi.encodeWithSignature("Panic(uint256)", 0x11);
+ bytes public constant divisionError = abi.encodeWithSignature("Panic(uint256)", 0x12);
+ bytes public constant enumConversionError = abi.encodeWithSignature("Panic(uint256)", 0x21);
+ bytes public constant encodeStorageError = abi.encodeWithSignature("Panic(uint256)", 0x22);
+ bytes public constant popError = abi.encodeWithSignature("Panic(uint256)", 0x31);
+ bytes public constant indexOOBError = abi.encodeWithSignature("Panic(uint256)", 0x32);
+ bytes public constant memOverflowError = abi.encodeWithSignature("Panic(uint256)", 0x41);
+ bytes public constant zeroVarError = abi.encodeWithSignature("Panic(uint256)", 0x51);
+ // DEPRECATED: Use Vm's `expectRevert` without any arguments instead
+ bytes public constant lowLevelError = bytes(""); // `0x`
+}
+
+/*//////////////////////////////////////////////////////////////////////////
+ STD-STORAGE
+//////////////////////////////////////////////////////////////////////////*/
+
+struct StdStorage {
+ mapping (address => mapping(bytes4 => mapping(bytes32 => uint256))) slots;
+ mapping (address => mapping(bytes4 => mapping(bytes32 => bool))) finds;
+
+ bytes32[] _keys;
+ bytes4 _sig;
+ uint256 _depth;
+ address _target;
+ bytes32 _set;
+}
+
+library stdStorage {
+ event SlotFound(address who, bytes4 fsig, bytes32 keysHash, uint slot);
+ event WARNING_UninitedSlot(address who, uint slot);
+
+ uint256 private constant UINT256_MAX = 115792089237316195423570985008687907853269984665640564039457584007913129639935;
+ int256 private constant INT256_MAX = 57896044618658097711785492504343953926634992332820282019728792003956564819967;
+
+ Vm private constant vm_std_store = Vm(address(uint160(uint256(keccak256('hevm cheat code')))));
+
+ function sigs(
+ string memory sigStr
+ )
+ internal
+ pure
+ returns (bytes4)
+ {
+ return bytes4(keccak256(bytes(sigStr)));
+ }
+
+ /// @notice find an arbitrary storage slot given a function sig, input data, address of the contract and a value to check against
+ // slot complexity:
+ // if flat, will be bytes32(uint256(uint));
+ // if map, will be keccak256(abi.encode(key, uint(slot)));
+ // if deep map, will be keccak256(abi.encode(key1, keccak256(abi.encode(key0, uint(slot)))));
+ // if map struct, will be bytes32(uint256(keccak256(abi.encode(key1, keccak256(abi.encode(key0, uint(slot)))))) + structFieldDepth);
+ function find(
+ StdStorage storage self
+ )
+ internal
+ returns (uint256)
+ {
+ address who = self._target;
+ bytes4 fsig = self._sig;
+ uint256 field_depth = self._depth;
+ bytes32[] memory ins = self._keys;
+
+ // calldata to test against
+ if (self.finds[who][fsig][keccak256(abi.encodePacked(ins, field_depth))]) {
+ return self.slots[who][fsig][keccak256(abi.encodePacked(ins, field_depth))];
+ }
+ bytes memory cald = abi.encodePacked(fsig, flatten(ins));
+ vm_std_store.record();
+ bytes32 fdat;
+ {
+ (, bytes memory rdat) = who.staticcall(cald);
+ fdat = bytesToBytes32(rdat, 32*field_depth);
+ }
+
+ (bytes32[] memory reads, ) = vm_std_store.accesses(address(who));
+ if (reads.length == 1) {
+ bytes32 curr = vm_std_store.load(who, reads[0]);
+ if (curr == bytes32(0)) {
+ emit WARNING_UninitedSlot(who, uint256(reads[0]));
+ }
+ if (fdat != curr) {
+ require(false, "stdStorage find(StdStorage): Packed slot. This would cause dangerous overwriting and currently isn't supported.");
+ }
+ emit SlotFound(who, fsig, keccak256(abi.encodePacked(ins, field_depth)), uint256(reads[0]));
+ self.slots[who][fsig][keccak256(abi.encodePacked(ins, field_depth))] = uint256(reads[0]);
+ self.finds[who][fsig][keccak256(abi.encodePacked(ins, field_depth))] = true;
+ } else if (reads.length > 1) {
+ for (uint256 i = 0; i < reads.length; i++) {
+ bytes32 prev = vm_std_store.load(who, reads[i]);
+ if (prev == bytes32(0)) {
+ emit WARNING_UninitedSlot(who, uint256(reads[i]));
+ }
+ // store
+ vm_std_store.store(who, reads[i], bytes32(hex"1337"));
+ bool success;
+ bytes memory rdat;
+ {
+ (success, rdat) = who.staticcall(cald);
+ fdat = bytesToBytes32(rdat, 32*field_depth);
+ }
+
+ if (success && fdat == bytes32(hex"1337")) {
+ // we found which of the slots is the actual one
+ emit SlotFound(who, fsig, keccak256(abi.encodePacked(ins, field_depth)), uint256(reads[i]));
+ self.slots[who][fsig][keccak256(abi.encodePacked(ins, field_depth))] = uint256(reads[i]);
+ self.finds[who][fsig][keccak256(abi.encodePacked(ins, field_depth))] = true;
+ vm_std_store.store(who, reads[i], prev);
+ break;
+ }
+ vm_std_store.store(who, reads[i], prev);
+ }
+ } else {
+ require(false, "stdStorage find(StdStorage): No storage use detected for target.");
+ }
+
+ require(self.finds[who][fsig][keccak256(abi.encodePacked(ins, field_depth))], "stdStorage find(StdStorage): Slot(s) not found.");
+
+ delete self._target;
+ delete self._sig;
+ delete self._keys;
+ delete self._depth;
+
+ return self.slots[who][fsig][keccak256(abi.encodePacked(ins, field_depth))];
+ }
+
+ function target(StdStorage storage self, address _target) internal returns (StdStorage storage) {
+ self._target = _target;
+ return self;
+ }
+
+ function sig(StdStorage storage self, bytes4 _sig) internal returns (StdStorage storage) {
+ self._sig = _sig;
+ return self;
+ }
+
+ function sig(StdStorage storage self, string memory _sig) internal returns (StdStorage storage) {
+ self._sig = sigs(_sig);
+ return self;
+ }
+
+ function with_key(StdStorage storage self, address who) internal returns (StdStorage storage) {
+ self._keys.push(bytes32(uint256(uint160(who))));
+ return self;
+ }
+
+ function with_key(StdStorage storage self, uint256 amt) internal returns (StdStorage storage) {
+ self._keys.push(bytes32(amt));
+ return self;
+ }
+ function with_key(StdStorage storage self, bytes32 key) internal returns (StdStorage storage) {
+ self._keys.push(key);
+ return self;
+ }
+
+ function depth(StdStorage storage self, uint256 _depth) internal returns (StdStorage storage) {
+ self._depth = _depth;
+ return self;
+ }
+
+ function checked_write(StdStorage storage self, address who) internal {
+ checked_write(self, bytes32(uint256(uint160(who))));
+ }
+
+ function checked_write(StdStorage storage self, uint256 amt) internal {
+ checked_write(self, bytes32(amt));
+ }
+
+ function checked_write(StdStorage storage self, bool write) internal {
+ bytes32 t;
+ /// @solidity memory-safe-assembly
+ assembly {
+ t := write
+ }
+ checked_write(self, t);
+ }
+
+ function checked_write(
+ StdStorage storage self,
+ bytes32 set
+ ) internal {
+ address who = self._target;
+ bytes4 fsig = self._sig;
+ uint256 field_depth = self._depth;
+ bytes32[] memory ins = self._keys;
+
+ bytes memory cald = abi.encodePacked(fsig, flatten(ins));
+ if (!self.finds[who][fsig][keccak256(abi.encodePacked(ins, field_depth))]) {
+ find(self);
+ }
+ bytes32 slot = bytes32(self.slots[who][fsig][keccak256(abi.encodePacked(ins, field_depth))]);
+
+ bytes32 fdat;
+ {
+ (, bytes memory rdat) = who.staticcall(cald);
+ fdat = bytesToBytes32(rdat, 32*field_depth);
+ }
+ bytes32 curr = vm_std_store.load(who, slot);
+
+ if (fdat != curr) {
+ require(false, "stdStorage find(StdStorage): Packed slot. This would cause dangerous overwriting and currently isn't supported.");
+ }
+ vm_std_store.store(who, slot, set);
+ delete self._target;
+ delete self._sig;
+ delete self._keys;
+ delete self._depth;
+ }
+
+ function read(StdStorage storage self) private returns (bytes memory) {
+ address t = self._target;
+ uint256 s = find(self);
+ return abi.encode(vm_std_store.load(t, bytes32(s)));
+ }
+
+ function read_bytes32(StdStorage storage self) internal returns (bytes32) {
+ return abi.decode(read(self), (bytes32));
+ }
+
+
+ function read_bool(StdStorage storage self) internal returns (bool) {
+ int256 v = read_int(self);
+ if (v == 0) return false;
+ if (v == 1) return true;
+ revert("stdStorage read_bool(StdStorage): Cannot decode. Make sure you are reading a bool.");
+ }
+
+ function read_address(StdStorage storage self) internal returns (address) {
+ return abi.decode(read(self), (address));
+ }
+
+ function read_uint(StdStorage storage self) internal returns (uint256) {
+ return abi.decode(read(self), (uint256));
+ }
+
+ function read_int(StdStorage storage self) internal returns (int256) {
+ return abi.decode(read(self), (int256));
+ }
+
+ function bytesToBytes32(bytes memory b, uint offset) public pure returns (bytes32) {
+ bytes32 out;
+
+ uint256 max = b.length > 32 ? 32 : b.length;
+ for (uint i = 0; i < max; i++) {
+ out |= bytes32(b[offset + i] & 0xFF) >> (i * 8);
+ }
+ return out;
+ }
+
+ function flatten(bytes32[] memory b) private pure returns (bytes memory)
+ {
+ bytes memory result = new bytes(b.length * 32);
+ for (uint256 i = 0; i < b.length; i++) {
+ bytes32 k = b[i];
+ /// @solidity memory-safe-assembly
+ assembly {
+ mstore(add(result, add(32, mul(32, i))), k)
+ }
+ }
+
+ return result;
+ }
+
+
+
+}
+
+
+/*//////////////////////////////////////////////////////////////////////////
+ STD-MATH
+//////////////////////////////////////////////////////////////////////////*/
+
+library stdMath {
+ int256 private constant INT256_MIN = -57896044618658097711785492504343953926634992332820282019728792003956564819968;
+
+ function abs(int256 a) internal pure returns (uint256) {
+ // Required or it will fail when `a = type(int256).min`
+ if (a == INT256_MIN)
+ return 57896044618658097711785492504343953926634992332820282019728792003956564819968;
+
+ return uint256(a > 0 ? a : -a);
+ }
+
+ function delta(uint256 a, uint256 b) internal pure returns (uint256) {
+ return a > b
+ ? a - b
+ : b - a;
+ }
+
+ function delta(int256 a, int256 b) internal pure returns (uint256) {
+ // a and b are of the same sign
+ // this works thanks to two's complement, the left-most bit is the sign bit
+ if ((a ^ b) > -1) {
+ return delta(abs(a), abs(b));
+ }
+
+ // a and b are of opposite signs
+ return abs(a) + abs(b);
+ }
+
+ function percentDelta(uint256 a, uint256 b) internal pure returns (uint256) {
+ uint256 absDelta = delta(a, b);
+
+ return absDelta * 1e18 / b;
+ }
+
+ function percentDelta(int256 a, int256 b) internal pure returns (uint256) {
+ uint256 absDelta = delta(a, b);
+ uint256 absB = abs(b);
+
+ return absDelta * 1e18 / absB;
+ }
+}
diff --git a/old/lib/forge-std/src/Vm.sol b/old/lib/forge-std/src/Vm.sol
new file mode 100644
index 0000000..4aeb676
--- /dev/null
+++ b/old/lib/forge-std/src/Vm.sol
@@ -0,0 +1,238 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.6.0 <0.9.0;
+pragma experimental ABIEncoderV2;
+
+interface Vm {
+ struct Log {
+ bytes32[] topics;
+ bytes data;
+ }
+
+ // Sets block.timestamp (newTimestamp)
+ function warp(uint256) external;
+ // Sets block.height (newHeight)
+ function roll(uint256) external;
+ // Sets block.basefee (newBasefee)
+ function fee(uint256) external;
+ // Sets block.difficulty (newDifficulty)
+ function difficulty(uint256) external;
+ // Sets block.chainid
+ function chainId(uint256) external;
+ // Loads a storage slot from an address (who, slot)
+ function load(address,bytes32) external returns (bytes32);
+ // Stores a value to an address' storage slot, (who, slot, value)
+ function store(address,bytes32,bytes32) external;
+ // Signs data, (privateKey, digest) => (v, r, s)
+ function sign(uint256,bytes32) external returns (uint8,bytes32,bytes32);
+ // Gets the address for a given private key, (privateKey) => (address)
+ function addr(uint256) external returns (address);
+ // Gets the nonce of an account
+ function getNonce(address) external returns (uint64);
+ // Sets the nonce of an account; must be higher than the current nonce of the account
+ function setNonce(address, uint64) external;
+ // Performs a foreign function call via the terminal, (stringInputs) => (result)
+ function ffi(string[] calldata) external returns (bytes memory);
+ // Sets environment variables, (name, value)
+ function setEnv(string calldata, string calldata) external;
+ // Reads environment variables, (name) => (value)
+ function envBool(string calldata) external returns (bool);
+ function envUint(string calldata) external returns (uint256);
+ function envInt(string calldata) external returns (int256);
+ function envAddress(string calldata) external returns (address);
+ function envBytes32(string calldata) external returns (bytes32);
+ function envString(string calldata) external returns (string memory);
+ function envBytes(string calldata) external returns (bytes memory);
+ // Reads environment variables as arrays, (name, delim) => (value[])
+ function envBool(string calldata, string calldata) external returns (bool[] memory);
+ function envUint(string calldata, string calldata) external returns (uint256[] memory);
+ function envInt(string calldata, string calldata) external returns (int256[] memory);
+ function envAddress(string calldata, string calldata) external returns (address[] memory);
+ function envBytes32(string calldata, string calldata) external returns (bytes32[] memory);
+ function envString(string calldata, string calldata) external returns (string[] memory);
+ function envBytes(string calldata, string calldata) external returns (bytes[] memory);
+ // Sets the *next* call's msg.sender to be the input address
+ function prank(address) external;
+ // Sets all subsequent calls' msg.sender to be the input address until `stopPrank` is called
+ function startPrank(address) external;
+ // Sets the *next* call's msg.sender to be the input address, and the tx.origin to be the second input
+ function prank(address,address) external;
+ // Sets all subsequent calls' msg.sender to be the input address until `stopPrank` is called, and the tx.origin to be the second input
+ function startPrank(address,address) external;
+ // Resets subsequent calls' msg.sender to be `address(this)`
+ function stopPrank() external;
+ // Sets an address' balance, (who, newBalance)
+ function deal(address, uint256) external;
+ // Sets an address' code, (who, newCode)
+ function etch(address, bytes calldata) external;
+ // Expects an error on next call
+ function expectRevert(bytes calldata) external;
+ function expectRevert(bytes4) external;
+ function expectRevert() external;
+ // Records all storage reads and writes
+ function record() external;
+ // Gets all accessed reads and write slot from a recording session, for a given address
+ function accesses(address) external returns (bytes32[] memory reads, bytes32[] memory writes);
+ // Prepare an expected log with (bool checkTopic1, bool checkTopic2, bool checkTopic3, bool checkData).
+ // Call this function, then emit an event, then call a function. Internally after the call, we check if
+ // logs were emitted in the expected order with the expected topics and data (as specified by the booleans)
+ function expectEmit(bool,bool,bool,bool) external;
+ function expectEmit(bool,bool,bool,bool,address) external;
+ // Mocks a call to an address, returning specified data.
+ // Calldata can either be strict or a partial match, e.g. if you only
+ // pass a Solidity selector to the expected calldata, then the entire Solidity
+ // function will be mocked.
+ function mockCall(address,bytes calldata,bytes calldata) external;
+ // Mocks a call to an address with a specific msg.value, returning specified data.
+ // Calldata match takes precedence over msg.value in case of ambiguity.
+ function mockCall(address,uint256,bytes calldata,bytes calldata) external;
+ // Clears all mocked calls
+ function clearMockedCalls() external;
+ // Expects a call to an address with the specified calldata.
+ // Calldata can either be a strict or a partial match
+ function expectCall(address,bytes calldata) external;
+ // Expects a call to an address with the specified msg.value and calldata
+ function expectCall(address,uint256,bytes calldata) external;
+ // Gets the code from an artifact file. Takes in the relative path to the json file
+ function getCode(string calldata) external returns (bytes memory);
+ // Labels an address in call traces
+ function label(address, string calldata) external;
+ // If the condition is false, discard this run's fuzz inputs and generate new ones
+ function assume(bool) external;
+ // Sets block.coinbase (who)
+ function coinbase(address) external;
+ // Using the address that calls the test contract, has the next call (at this call depth only) create a transaction that can later be signed and sent onchain
+ function broadcast() external;
+ // Has the next call (at this call depth only) create a transaction with the address provided as the sender that can later be signed and sent onchain
+ function broadcast(address) external;
+ // Has the next call (at this call depth only) create a transaction with the private key provided as the sender that can later be signed and sent onchain
+ function broadcast(uint256) external;
+ // Using the address that calls the test contract, has all subsequent calls (at this call depth only) create transactions that can later be signed and sent onchain
+ function startBroadcast() external;
+ // Has all subsequent calls (at this call depth only) create transactions with the address provided that can later be signed and sent onchain
+ function startBroadcast(address) external;
+ // Has all subsequent calls (at this call depth only) create transactions with the private key provided that can later be signed and sent onchain
+ function startBroadcast(uint256) external;
+ // Stops collecting onchain transactions
+ function stopBroadcast() external;
+
+ // Reads the entire content of file to string, (path) => (data)
+ function readFile(string calldata) external returns (string memory);
+ // Get the path of the current project root
+ function projectRoot() external returns (string memory);
+ // Reads next line of file to string, (path) => (line)
+ function readLine(string calldata) external returns (string memory);
+ // Writes data to file, creating a file if it does not exist, and entirely replacing its contents if it does.
+ // (path, data) => ()
+ function writeFile(string calldata, string calldata) external;
+ // Writes line to file, creating a file if it does not exist.
+ // (path, data) => ()
+ function writeLine(string calldata, string calldata) external;
+ // Closes file for reading, resetting the offset and allowing to read it from beginning with readLine.
+ // (path) => ()
+ function closeFile(string calldata) external;
+ // Removes file. This cheatcode will revert in the following situations, but is not limited to just these cases:
+ // - Path points to a directory.
+ // - The file doesn't exist.
+ // - The user lacks permissions to remove the file.
+ // (path) => ()
+ function removeFile(string calldata) external;
+
+ // Convert values to a string, (value) => (stringified value)
+ function toString(address) external returns(string memory);
+ function toString(bytes calldata) external returns(string memory);
+ function toString(bytes32) external returns(string memory);
+ function toString(bool) external returns(string memory);
+ function toString(uint256) external returns(string memory);
+ function toString(int256) external returns(string memory);
+
+ // Convert values from a string, (string) => (parsed value)
+ function parseBytes(string calldata) external returns (bytes memory);
+ function parseAddress(string calldata) external returns (address);
+ function parseUint(string calldata) external returns (uint256);
+ function parseInt(string calldata) external returns (int256);
+ function parseBytes32(string calldata) external returns (bytes32);
+ function parseBool(string calldata) external returns (bool);
+
+ // Record all the transaction logs
+ function recordLogs() external;
+ // Gets all the recorded logs, () => (logs)
+ function getRecordedLogs() external returns (Log[] memory);
+ // Snapshot the current state of the evm.
+ // Returns the id of the snapshot that was created.
+ // To revert a snapshot use `revertTo`
+ function snapshot() external returns(uint256);
+ // Revert the state of the evm to a previous snapshot
+ // Takes the snapshot id to revert to.
+ // This deletes the snapshot and all snapshots taken after the given snapshot id.
+ function revertTo(uint256) external returns(bool);
+
+ // Creates a new fork with the given endpoint and block and returns the identifier of the fork
+ function createFork(string calldata,uint256) external returns(uint256);
+ // Creates a new fork with the given endpoint and the _latest_ block and returns the identifier of the fork
+ function createFork(string calldata) external returns(uint256);
+ // Creates _and_ also selects a new fork with the given endpoint and block and returns the identifier of the fork
+ function createSelectFork(string calldata,uint256) external returns(uint256);
+ // Creates _and_ also selects a new fork with the given endpoint and the latest block and returns the identifier of the fork
+ function createSelectFork(string calldata) external returns(uint256);
+ // Takes a fork identifier created by `createFork` and sets the corresponding forked state as active.
+ function selectFork(uint256) external;
+ /// Returns the currently active fork
+ /// Reverts if no fork is currently active
+ function activeFork() external returns(uint256);
+ // Updates the currently active fork to given block number
+ // This is similar to `roll` but for the currently active fork
+ function rollFork(uint256) external;
+ // Updates the given fork to given block number
+ function rollFork(uint256 forkId, uint256 blockNumber) external;
+
+ // Marks that the account(s) should use persistent storage across fork swaps in a multifork setup
+ // Meaning, changes made to the state of this account will be kept when switching forks
+ function makePersistent(address) external;
+ function makePersistent(address, address) external;
+ function makePersistent(address, address, address) external;
+ function makePersistent(address[] calldata) external;
+ // Revokes persistent status from the address, previously added via `makePersistent`
+ function revokePersistent(address) external;
+ function revokePersistent(address[] calldata) external;
+ // Returns true if the account is marked as persistent
+ function isPersistent(address) external returns (bool);
+
+ // Returns the RPC url for the given alias
+ function rpcUrl(string calldata) external returns(string memory);
+ // Returns all rpc urls and their aliases `[alias, url][]`
+ function rpcUrls() external returns(string[2][] memory);
+
+ // Derive a private key from a provided mnenomic string (or mnenomic file path) at the derivation path m/44'/60'/0'/0/{index}
+ function deriveKey(string calldata, uint32) external returns (uint256);
+ // Derive a private key from a provided mnenomic string (or mnenomic file path) at the derivation path {path}{index}
+ function deriveKey(string calldata, string calldata, uint32) external returns (uint256);
+ // Adds a private key to the local forge wallet and returns the address
+ function rememberKey(uint256) external returns (address);
+
+ // parseJson
+
+ // Given a string of JSON, return the ABI-encoded value of provided key
+ // (stringified json, key) => (ABI-encoded data)
+ // Read the note below!
+ function parseJson(string calldata, string calldata) external returns(bytes memory);
+
+ // Given a string of JSON, return it as ABI-encoded, (stringified json, key) => (ABI-encoded data)
+ // Read the note below!
+ function parseJson(string calldata) external returns(bytes memory);
+
+ // Note:
+ // ----
+ // In case the returned value is a JSON object, it's encoded as a ABI-encoded tuple. As JSON objects
+ // don't have the notion of ordered, but tuples do, they JSON object is encoded with it's fields ordered in
+ // ALPHABETICAL ordser. That means that in order to succesfully decode the tuple, we need to define a tuple that
+ // encodes the fields in the same order, which is alphabetical. In the case of Solidity structs, they are encoded
+ // as tuples, with the attributes in the order in which they are defined.
+ // For example: json = { 'a': 1, 'b': 0xa4tb......3xs}
+ // a: uint256
+ // b: address
+ // To decode that json, we need to define a struct or a tuple as follows:
+ // struct json = { uint256 a; address b; }
+ // If we defined a json struct with the opposite order, meaning placing the address b first, it would try to
+ // decode the tuple in that order, and thus fail.
+
+}
diff --git a/old/lib/forge-std/src/console.sol b/old/lib/forge-std/src/console.sol
new file mode 100644
index 0000000..ad57e53
--- /dev/null
+++ b/old/lib/forge-std/src/console.sol
@@ -0,0 +1,1533 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.4.22 <0.9.0;
+
+library console {
+ address constant CONSOLE_ADDRESS = address(0x000000000000000000636F6e736F6c652e6c6f67);
+
+ function _sendLogPayload(bytes memory payload) private view {
+ uint256 payloadLength = payload.length;
+ address consoleAddress = CONSOLE_ADDRESS;
+ /// @solidity memory-safe-assembly
+ assembly {
+ let payloadStart := add(payload, 32)
+ let r := staticcall(gas(), consoleAddress, payloadStart, payloadLength, 0, 0)
+ }
+ }
+
+ function log() internal view {
+ _sendLogPayload(abi.encodeWithSignature("log()"));
+ }
+
+ function logInt(int p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(int)", p0));
+ }
+
+ function logUint(uint p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint)", p0));
+ }
+
+ function logString(string memory p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string)", p0));
+ }
+
+ function logBool(bool p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool)", p0));
+ }
+
+ function logAddress(address p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address)", p0));
+ }
+
+ function logBytes(bytes memory p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes)", p0));
+ }
+
+ function logBytes1(bytes1 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes1)", p0));
+ }
+
+ function logBytes2(bytes2 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes2)", p0));
+ }
+
+ function logBytes3(bytes3 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes3)", p0));
+ }
+
+ function logBytes4(bytes4 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes4)", p0));
+ }
+
+ function logBytes5(bytes5 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes5)", p0));
+ }
+
+ function logBytes6(bytes6 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes6)", p0));
+ }
+
+ function logBytes7(bytes7 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes7)", p0));
+ }
+
+ function logBytes8(bytes8 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes8)", p0));
+ }
+
+ function logBytes9(bytes9 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes9)", p0));
+ }
+
+ function logBytes10(bytes10 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes10)", p0));
+ }
+
+ function logBytes11(bytes11 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes11)", p0));
+ }
+
+ function logBytes12(bytes12 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes12)", p0));
+ }
+
+ function logBytes13(bytes13 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes13)", p0));
+ }
+
+ function logBytes14(bytes14 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes14)", p0));
+ }
+
+ function logBytes15(bytes15 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes15)", p0));
+ }
+
+ function logBytes16(bytes16 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes16)", p0));
+ }
+
+ function logBytes17(bytes17 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes17)", p0));
+ }
+
+ function logBytes18(bytes18 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes18)", p0));
+ }
+
+ function logBytes19(bytes19 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes19)", p0));
+ }
+
+ function logBytes20(bytes20 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes20)", p0));
+ }
+
+ function logBytes21(bytes21 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes21)", p0));
+ }
+
+ function logBytes22(bytes22 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes22)", p0));
+ }
+
+ function logBytes23(bytes23 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes23)", p0));
+ }
+
+ function logBytes24(bytes24 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes24)", p0));
+ }
+
+ function logBytes25(bytes25 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes25)", p0));
+ }
+
+ function logBytes26(bytes26 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes26)", p0));
+ }
+
+ function logBytes27(bytes27 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes27)", p0));
+ }
+
+ function logBytes28(bytes28 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes28)", p0));
+ }
+
+ function logBytes29(bytes29 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes29)", p0));
+ }
+
+ function logBytes30(bytes30 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes30)", p0));
+ }
+
+ function logBytes31(bytes31 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes31)", p0));
+ }
+
+ function logBytes32(bytes32 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes32)", p0));
+ }
+
+ function log(uint p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint)", p0));
+ }
+
+ function log(string memory p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string)", p0));
+ }
+
+ function log(bool p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool)", p0));
+ }
+
+ function log(address p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address)", p0));
+ }
+
+ function log(uint p0, uint p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint)", p0, p1));
+ }
+
+ function log(uint p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string)", p0, p1));
+ }
+
+ function log(uint p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool)", p0, p1));
+ }
+
+ function log(uint p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address)", p0, p1));
+ }
+
+ function log(string memory p0, uint p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint)", p0, p1));
+ }
+
+ function log(string memory p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string)", p0, p1));
+ }
+
+ function log(string memory p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool)", p0, p1));
+ }
+
+ function log(string memory p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address)", p0, p1));
+ }
+
+ function log(bool p0, uint p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint)", p0, p1));
+ }
+
+ function log(bool p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string)", p0, p1));
+ }
+
+ function log(bool p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool)", p0, p1));
+ }
+
+ function log(bool p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address)", p0, p1));
+ }
+
+ function log(address p0, uint p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint)", p0, p1));
+ }
+
+ function log(address p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string)", p0, p1));
+ }
+
+ function log(address p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool)", p0, p1));
+ }
+
+ function log(address p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address)", p0, p1));
+ }
+
+ function log(uint p0, uint p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,uint)", p0, p1, p2));
+ }
+
+ function log(uint p0, uint p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,string)", p0, p1, p2));
+ }
+
+ function log(uint p0, uint p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,bool)", p0, p1, p2));
+ }
+
+ function log(uint p0, uint p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,address)", p0, p1, p2));
+ }
+
+ function log(uint p0, string memory p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,uint)", p0, p1, p2));
+ }
+
+ function log(uint p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,string)", p0, p1, p2));
+ }
+
+ function log(uint p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,bool)", p0, p1, p2));
+ }
+
+ function log(uint p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,address)", p0, p1, p2));
+ }
+
+ function log(uint p0, bool p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,uint)", p0, p1, p2));
+ }
+
+ function log(uint p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,string)", p0, p1, p2));
+ }
+
+ function log(uint p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,bool)", p0, p1, p2));
+ }
+
+ function log(uint p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,address)", p0, p1, p2));
+ }
+
+ function log(uint p0, address p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,uint)", p0, p1, p2));
+ }
+
+ function log(uint p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,string)", p0, p1, p2));
+ }
+
+ function log(uint p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,bool)", p0, p1, p2));
+ }
+
+ function log(uint p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,uint)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,uint)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address)", p0, p1, p2));
+ }
+
+ function log(address p0, uint p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,uint)", p0, p1, p2));
+ }
+
+ function log(address p0, uint p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,string)", p0, p1, p2));
+ }
+
+ function log(address p0, uint p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, uint p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,address)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, uint p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address)", p0, p1, p2));
+ }
+
+ function log(uint p0, uint p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, uint p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,uint,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint,address,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, uint p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,uint)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,address)", p0, p1, p2, p3));
+ }
+
+}
\ No newline at end of file
diff --git a/old/lib/forge-std/src/console2.sol b/old/lib/forge-std/src/console2.sol
new file mode 100644
index 0000000..2edfda5
--- /dev/null
+++ b/old/lib/forge-std/src/console2.sol
@@ -0,0 +1,1538 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.4.22 <0.9.0;
+
+// The orignal console.sol uses `int` and `uint` for computing function selectors, but it should
+// use `int256` and `uint256`. This modified version fixes that. This version is recommended
+// over `console.sol` if you don't need compatibility with Hardhat as the logs will show up in
+// forge stack traces. If you do need compatibility with Hardhat, you must use `console.sol`.
+// Reference: https://github.com/NomicFoundation/hardhat/issues/2178
+
+library console2 {
+ address constant CONSOLE_ADDRESS = address(0x000000000000000000636F6e736F6c652e6c6f67);
+
+ function _sendLogPayload(bytes memory payload) private view {
+ uint256 payloadLength = payload.length;
+ address consoleAddress = CONSOLE_ADDRESS;
+ assembly {
+ let payloadStart := add(payload, 32)
+ let r := staticcall(gas(), consoleAddress, payloadStart, payloadLength, 0, 0)
+ }
+ }
+
+ function log() internal view {
+ _sendLogPayload(abi.encodeWithSignature("log()"));
+ }
+
+ function logInt(int256 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(int256)", p0));
+ }
+
+ function logUint(uint256 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256)", p0));
+ }
+
+ function logString(string memory p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string)", p0));
+ }
+
+ function logBool(bool p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool)", p0));
+ }
+
+ function logAddress(address p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address)", p0));
+ }
+
+ function logBytes(bytes memory p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes)", p0));
+ }
+
+ function logBytes1(bytes1 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes1)", p0));
+ }
+
+ function logBytes2(bytes2 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes2)", p0));
+ }
+
+ function logBytes3(bytes3 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes3)", p0));
+ }
+
+ function logBytes4(bytes4 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes4)", p0));
+ }
+
+ function logBytes5(bytes5 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes5)", p0));
+ }
+
+ function logBytes6(bytes6 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes6)", p0));
+ }
+
+ function logBytes7(bytes7 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes7)", p0));
+ }
+
+ function logBytes8(bytes8 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes8)", p0));
+ }
+
+ function logBytes9(bytes9 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes9)", p0));
+ }
+
+ function logBytes10(bytes10 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes10)", p0));
+ }
+
+ function logBytes11(bytes11 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes11)", p0));
+ }
+
+ function logBytes12(bytes12 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes12)", p0));
+ }
+
+ function logBytes13(bytes13 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes13)", p0));
+ }
+
+ function logBytes14(bytes14 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes14)", p0));
+ }
+
+ function logBytes15(bytes15 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes15)", p0));
+ }
+
+ function logBytes16(bytes16 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes16)", p0));
+ }
+
+ function logBytes17(bytes17 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes17)", p0));
+ }
+
+ function logBytes18(bytes18 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes18)", p0));
+ }
+
+ function logBytes19(bytes19 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes19)", p0));
+ }
+
+ function logBytes20(bytes20 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes20)", p0));
+ }
+
+ function logBytes21(bytes21 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes21)", p0));
+ }
+
+ function logBytes22(bytes22 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes22)", p0));
+ }
+
+ function logBytes23(bytes23 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes23)", p0));
+ }
+
+ function logBytes24(bytes24 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes24)", p0));
+ }
+
+ function logBytes25(bytes25 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes25)", p0));
+ }
+
+ function logBytes26(bytes26 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes26)", p0));
+ }
+
+ function logBytes27(bytes27 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes27)", p0));
+ }
+
+ function logBytes28(bytes28 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes28)", p0));
+ }
+
+ function logBytes29(bytes29 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes29)", p0));
+ }
+
+ function logBytes30(bytes30 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes30)", p0));
+ }
+
+ function logBytes31(bytes31 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes31)", p0));
+ }
+
+ function logBytes32(bytes32 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bytes32)", p0));
+ }
+
+ function log(uint256 p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256)", p0));
+ }
+
+ function log(string memory p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string)", p0));
+ }
+
+ function log(bool p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool)", p0));
+ }
+
+ function log(address p0) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address)", p0));
+ }
+
+ function log(uint256 p0, uint256 p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256)", p0, p1));
+ }
+
+ function log(uint256 p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string)", p0, p1));
+ }
+
+ function log(uint256 p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool)", p0, p1));
+ }
+
+ function log(uint256 p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address)", p0, p1));
+ }
+
+ function log(string memory p0, uint256 p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256)", p0, p1));
+ }
+
+ function log(string memory p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string)", p0, p1));
+ }
+
+ function log(string memory p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool)", p0, p1));
+ }
+
+ function log(string memory p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address)", p0, p1));
+ }
+
+ function log(bool p0, uint256 p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256)", p0, p1));
+ }
+
+ function log(bool p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string)", p0, p1));
+ }
+
+ function log(bool p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool)", p0, p1));
+ }
+
+ function log(bool p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address)", p0, p1));
+ }
+
+ function log(address p0, uint256 p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256)", p0, p1));
+ }
+
+ function log(address p0, string memory p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string)", p0, p1));
+ }
+
+ function log(address p0, bool p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool)", p0, p1));
+ }
+
+ function log(address p0, address p1) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address)", p0, p1));
+ }
+
+ function log(uint256 p0, uint256 p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,uint256)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, uint256 p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,string)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, uint256 p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,bool)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, uint256 p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,address)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, string memory p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,uint256)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,string)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,bool)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,address)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, bool p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,uint256)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,string)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,bool)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,address)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, address p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,uint256)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,string)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,bool)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint256 p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,uint256)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint256 p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint256 p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, uint256 p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint256)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint256)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint256)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool)", p0, p1, p2));
+ }
+
+ function log(string memory p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint256 p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,uint256)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint256 p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint256 p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, uint256 p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint256)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint256)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint256)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool)", p0, p1, p2));
+ }
+
+ function log(bool p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address)", p0, p1, p2));
+ }
+
+ function log(address p0, uint256 p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,uint256)", p0, p1, p2));
+ }
+
+ function log(address p0, uint256 p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,string)", p0, p1, p2));
+ }
+
+ function log(address p0, uint256 p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, uint256 p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,address)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint256)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, string memory p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint256)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, bool p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, uint256 p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint256)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, string memory p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, bool p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool)", p0, p1, p2));
+ }
+
+ function log(address p0, address p1, address p2) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address)", p0, p1, p2));
+ }
+
+ function log(uint256 p0, uint256 p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, uint256 p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,uint256,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(uint256 p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(uint256,address,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, uint256 p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,uint256,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(string memory p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(string,address,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, uint256 p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,uint256,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(bool p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(bool,address,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, uint256 p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,uint256,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, string memory p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,string,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, bool p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,bool,address,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint256 p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint256,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint256 p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint256,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint256 p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint256,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, uint256 p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,uint256,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, string memory p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,string,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, bool p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,bool,address)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, uint256 p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,uint256)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, string memory p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,string)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, bool p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,bool)", p0, p1, p2, p3));
+ }
+
+ function log(address p0, address p1, address p2, address p3) internal view {
+ _sendLogPayload(abi.encodeWithSignature("log(address,address,address,address)", p0, p1, p2, p3));
+ }
+
+}
\ No newline at end of file
diff --git a/old/lib/forge-std/src/test/Script.t.sol b/old/lib/forge-std/src/test/Script.t.sol
new file mode 100644
index 0000000..b26db7f
--- /dev/null
+++ b/old/lib/forge-std/src/test/Script.t.sol
@@ -0,0 +1,20 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.7.0 <0.9.0;
+
+import "../Test.sol";
+
+contract ScriptTest is Test
+{
+ function testGenerateCorrectAddress() external {
+ address creation = computeCreateAddress(0x6C9FC64A53c1b71FB3f9Af64d1ae3A4931A5f4E9, 14);
+ assertEq(creation, 0x68b3465833fb72A70ecDF485E0e4C7bD8665Fc45);
+ }
+
+ function testDeriveRememberKey() external {
+ string memory mnemonic = "test test test test test test test test test test test junk";
+
+ (address deployer, uint256 privateKey) = deriveRememberKey(mnemonic, 0);
+ assertEq(deployer, 0xf39Fd6e51aad88F6F4ce6aB8827279cffFb92266);
+ assertEq(privateKey, 0xac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80);
+ }
+}
\ No newline at end of file
diff --git a/old/lib/forge-std/src/test/StdAssertions.t.sol b/old/lib/forge-std/src/test/StdAssertions.t.sol
new file mode 100644
index 0000000..3f26f76
--- /dev/null
+++ b/old/lib/forge-std/src/test/StdAssertions.t.sol
@@ -0,0 +1,602 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.7.0 <0.9.0;
+
+import "../Test.sol";
+
+contract StdAssertionsTest is Test
+{
+ string constant CUSTOM_ERROR = "guh!";
+
+ bool constant EXPECT_PASS = false;
+ bool constant EXPECT_FAIL = true;
+
+ TestTest t = new TestTest();
+
+ /*//////////////////////////////////////////////////////////////////////////
+ ASSERT_EQ(UINT)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertions() public {
+ assertEqUint(uint32(1), uint32(1));
+ assertEqUint(uint64(1), uint64(1));
+ assertEqUint(uint96(1), uint96(1));
+ assertEqUint(uint128(1), uint128(1));
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ FAIL(STRING)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testShouldFail() external {
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._fail(CUSTOM_ERROR);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ ASSERT_FALSE
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertFalse_Pass() external {
+ t._assertFalse(false, EXPECT_PASS);
+ }
+
+ function testAssertFalse_Fail() external {
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: Assertion Failed");
+ t._assertFalse(true, EXPECT_FAIL);
+ }
+
+ function testAssertFalse_Err_Pass() external {
+ t._assertFalse(false, CUSTOM_ERROR, EXPECT_PASS);
+ }
+
+ function testAssertFalse_Err_Fail() external {
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._assertFalse(true, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ ASSERT_EQ(BOOL)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertEq_Bool_Pass(bool a) external {
+ t._assertEq(a, a, EXPECT_PASS);
+ }
+
+ function testAssertEq_Bool_Fail(bool a, bool b) external {
+ vm.assume(a != b);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [bool]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+ function testAssertEq_BoolErr_Pass(bool a) external {
+ t._assertEq(a, a, CUSTOM_ERROR, EXPECT_PASS);
+ }
+
+ function testAssertEq_BoolErr_Fail(bool a, bool b) external {
+ vm.assume(a != b);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ ASSERT_EQ(BYTES)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertEq_Bytes_Pass(bytes calldata a) external {
+ t._assertEq(a, a, EXPECT_PASS);
+ }
+
+ function testAssertEq_Bytes_Fail(bytes calldata a, bytes calldata b) external {
+ vm.assume(keccak256(a) != keccak256(b));
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [bytes]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+ function testAssertEq_BytesErr_Pass(bytes calldata a) external {
+ t._assertEq(a, a, CUSTOM_ERROR, EXPECT_PASS);
+ }
+
+ function testAssertEq_BytesErr_Fail(bytes calldata a, bytes calldata b) external {
+ vm.assume(keccak256(a) != keccak256(b));
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ ASSERT_EQ(ARRAY)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertEq_UintArr_Pass(uint256 e0, uint256 e1, uint256 e2) public {
+ uint256[] memory a = new uint256[](3);
+ a[0] = e0;
+ a[1] = e1;
+ a[2] = e2;
+ uint256[] memory b = new uint256[](3);
+ b[0] = e0;
+ b[1] = e1;
+ b[2] = e2;
+
+ t._assertEq(a, b, EXPECT_PASS);
+ }
+
+ function testAssertEq_IntArr_Pass(int256 e0, int256 e1, int256 e2) public {
+ int256[] memory a = new int256[](3);
+ a[0] = e0;
+ a[1] = e1;
+ a[2] = e2;
+ int256[] memory b = new int256[](3);
+ b[0] = e0;
+ b[1] = e1;
+ b[2] = e2;
+
+ t._assertEq(a, b, EXPECT_PASS);
+ }
+
+ function testAssertEq_AddressArr_Pass(address e0, address e1, address e2) public {
+ address[] memory a = new address[](3);
+ a[0] = e0;
+ a[1] = e1;
+ a[2] = e2;
+ address[] memory b = new address[](3);
+ b[0] = e0;
+ b[1] = e1;
+ b[2] = e2;
+
+ t._assertEq(a, b, EXPECT_PASS);
+ }
+
+ function testAssertEq_UintArr_FailEl(uint256 e1) public {
+ vm.assume(e1 != 0);
+ uint256[] memory a = new uint256[](3);
+ uint256[] memory b = new uint256[](3);
+ b[1] = e1;
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [uint[]]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+ function testAssertEq_IntArr_FailEl(int256 e1) public {
+ vm.assume(e1 != 0);
+ int256[] memory a = new int256[](3);
+ int256[] memory b = new int256[](3);
+ b[1] = e1;
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [int[]]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+
+ function testAssertEq_AddressArr_FailEl(address e1) public {
+ vm.assume(e1 != address(0));
+ address[] memory a = new address[](3);
+ address[] memory b = new address[](3);
+ b[1] = e1;
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [address[]]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+ function testAssertEq_UintArrErr_FailEl(uint256 e1) public {
+ vm.assume(e1 != 0);
+ uint256[] memory a = new uint256[](3);
+ uint256[] memory b = new uint256[](3);
+ b[1] = e1;
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [uint[]]");
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ function testAssertEq_IntArrErr_FailEl(int256 e1) public {
+ vm.assume(e1 != 0);
+ int256[] memory a = new int256[](3);
+ int256[] memory b = new int256[](3);
+ b[1] = e1;
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [int[]]");
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+
+ function testAssertEq_AddressArrErr_FailEl(address e1) public {
+ vm.assume(e1 != address(0));
+ address[] memory a = new address[](3);
+ address[] memory b = new address[](3);
+ b[1] = e1;
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [address[]]");
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ function testAssertEq_UintArr_FailLen(uint256 lenA, uint256 lenB) public {
+ vm.assume(lenA != lenB);
+ vm.assume(lenA <= 10000);
+ vm.assume(lenB <= 10000);
+ uint256[] memory a = new uint256[](lenA);
+ uint256[] memory b = new uint256[](lenB);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [uint[]]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+ function testAssertEq_IntArr_FailLen(uint256 lenA, uint256 lenB) public {
+ vm.assume(lenA != lenB);
+ vm.assume(lenA <= 10000);
+ vm.assume(lenB <= 10000);
+ int256[] memory a = new int256[](lenA);
+ int256[] memory b = new int256[](lenB);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [int[]]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+ function testAssertEq_AddressArr_FailLen(uint256 lenA, uint256 lenB) public {
+ vm.assume(lenA != lenB);
+ vm.assume(lenA <= 10000);
+ vm.assume(lenB <= 10000);
+ address[] memory a = new address[](lenA);
+ address[] memory b = new address[](lenB);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [address[]]");
+ t._assertEq(a, b, EXPECT_FAIL);
+ }
+
+ function testAssertEq_UintArrErr_FailLen(uint256 lenA, uint256 lenB) public {
+ vm.assume(lenA != lenB);
+ vm.assume(lenA <= 10000);
+ vm.assume(lenB <= 10000);
+ uint256[] memory a = new uint256[](lenA);
+ uint256[] memory b = new uint256[](lenB);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [uint[]]");
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ function testAssertEq_IntArrErr_FailLen(uint256 lenA, uint256 lenB) public {
+ vm.assume(lenA != lenB);
+ vm.assume(lenA <= 10000);
+ vm.assume(lenB <= 10000);
+ int256[] memory a = new int256[](lenA);
+ int256[] memory b = new int256[](lenB);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [int[]]");
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ function testAssertEq_AddressArrErr_FailLen(uint256 lenA, uint256 lenB) public {
+ vm.assume(lenA != lenB);
+ vm.assume(lenA <= 10000);
+ vm.assume(lenB <= 10000);
+ address[] memory a = new address[](lenA);
+ address[] memory b = new address[](lenB);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a == b not satisfied [address[]]");
+ t._assertEq(a, b, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ APPROX_EQ_ABS(UINT)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertApproxEqAbs_Uint_Pass(uint256 a, uint256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) <= maxDelta);
+
+ t._assertApproxEqAbs(a, b, maxDelta, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqAbs_Uint_Fail(uint256 a, uint256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) > maxDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a ~= b not satisfied [uint]");
+ t._assertApproxEqAbs(a, b, maxDelta, EXPECT_FAIL);
+ }
+
+ function testAssertApproxEqAbs_UintErr_Pass(uint256 a, uint256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) <= maxDelta);
+
+ t._assertApproxEqAbs(a, b, maxDelta, CUSTOM_ERROR, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqAbs_UintErr_Fail(uint256 a, uint256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) > maxDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._assertApproxEqAbs(a, b, maxDelta, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ APPROX_EQ_ABS(INT)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertApproxEqAbs_Int_Pass(int256 a, int256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) <= maxDelta);
+
+ t._assertApproxEqAbs(a, b, maxDelta, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqAbs_Int_Fail(int256 a, int256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) > maxDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a ~= b not satisfied [int]");
+ t._assertApproxEqAbs(a, b, maxDelta, EXPECT_FAIL);
+ }
+
+ function testAssertApproxEqAbs_IntErr_Pass(int256 a, int256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) <= maxDelta);
+
+ t._assertApproxEqAbs(a, b, maxDelta, CUSTOM_ERROR, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqAbs_IntErr_Fail(int256 a, int256 b, uint256 maxDelta) external {
+ vm.assume(stdMath.delta(a, b) > maxDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._assertApproxEqAbs(a, b, maxDelta, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ APPROX_EQ_REL(UINT)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertApproxEqRel_Uint_Pass(uint256 a, uint256 b, uint256 maxPercentDelta) external {
+ vm.assume(a < type(uint128).max && b < type(uint128).max && b != 0);
+ vm.assume(stdMath.percentDelta(a, b) <= maxPercentDelta);
+
+ t._assertApproxEqRel(a, b, maxPercentDelta, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqRel_Uint_Fail(uint256 a, uint256 b, uint256 maxPercentDelta) external {
+ vm.assume(a < type(uint128).max && b < type(uint128).max && b != 0);
+ vm.assume(stdMath.percentDelta(a, b) > maxPercentDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a ~= b not satisfied [uint]");
+ t._assertApproxEqRel(a, b, maxPercentDelta, EXPECT_FAIL);
+ }
+
+ function testAssertApproxEqRel_UintErr_Pass(uint256 a, uint256 b, uint256 maxPercentDelta) external {
+ vm.assume(a < type(uint128).max && b < type(uint128).max && b != 0);
+ vm.assume(stdMath.percentDelta(a, b) <= maxPercentDelta);
+
+ t._assertApproxEqRel(a, b, maxPercentDelta, CUSTOM_ERROR, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqRel_UintErr_Fail(uint256 a, uint256 b, uint256 maxPercentDelta) external {
+ vm.assume(a < type(uint128).max && b < type(uint128).max && b != 0);
+ vm.assume(stdMath.percentDelta(a, b) > maxPercentDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._assertApproxEqRel(a, b, maxPercentDelta, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ APPROX_EQ_REL(INT)
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function testAssertApproxEqRel_Int_Pass(int128 a, int128 b, uint128 maxPercentDelta) external {
+ vm.assume(b != 0);
+ vm.assume(stdMath.percentDelta(a, b) <= maxPercentDelta);
+
+ t._assertApproxEqRel(a, b, maxPercentDelta, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqRel_Int_Fail(int128 a, int128 b, uint128 maxPercentDelta) external {
+ vm.assume(b != 0);
+ vm.assume(stdMath.percentDelta(a, b) > maxPercentDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log("Error: a ~= b not satisfied [int]");
+ t._assertApproxEqRel(a, b, maxPercentDelta, EXPECT_FAIL);
+ }
+
+ function testAssertApproxEqRel_IntErr_Pass(int128 a, int128 b, uint128 maxPercentDelta) external {
+ vm.assume(b != 0);
+ vm.assume(stdMath.percentDelta(a, b) <= maxPercentDelta);
+
+ t._assertApproxEqRel(a, b, maxPercentDelta, CUSTOM_ERROR, EXPECT_PASS);
+ }
+
+ function testAssertApproxEqRel_IntErr_Fail(int128 a, int128 b, uint128 maxPercentDelta) external {
+ vm.assume(b != 0);
+ vm.assume(stdMath.percentDelta(a, b) > maxPercentDelta);
+
+ vm.expectEmit(false, false, false, true);
+ emit log_named_string("Error", CUSTOM_ERROR);
+ t._assertApproxEqRel(a, b, maxPercentDelta, CUSTOM_ERROR, EXPECT_FAIL);
+ }
+}
+
+
+contract TestTest is Test
+{
+ modifier expectFailure(bool expectFail) {
+ bool preState = vm.load(HEVM_ADDRESS, bytes32("failed")) != bytes32(0x00);
+ _;
+ bool postState = vm.load(HEVM_ADDRESS, bytes32("failed")) != bytes32(0x00);
+
+ if (preState == true) {
+ return;
+ }
+
+ if (expectFail) {
+ require(postState == true, "expected failure not triggered");
+
+ // unwind the expected failure
+ vm.store(HEVM_ADDRESS, bytes32("failed"), bytes32(uint256(0x00)));
+ } else {
+ require(postState == false, "unexpected failure was triggered");
+ }
+ }
+
+ function _fail(string memory err) external expectFailure(true) {
+ fail(err);
+ }
+
+ function _assertFalse(bool data, bool expectFail) external expectFailure(expectFail) {
+ assertFalse(data);
+ }
+
+ function _assertFalse(bool data, string memory err, bool expectFail) external expectFailure(expectFail) {
+ assertFalse(data, err);
+ }
+
+ function _assertEq(bool a, bool b, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b);
+ }
+
+ function _assertEq(bool a, bool b, string memory err, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b, err);
+ }
+
+ function _assertEq(bytes memory a, bytes memory b, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b);
+ }
+
+ function _assertEq(bytes memory a,
+ bytes memory b,
+ string memory err,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertEq(a, b, err);
+ }
+
+ function _assertEq(uint256[] memory a, uint256[] memory b, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b);
+ }
+
+ function _assertEq(int256[] memory a, int256[] memory b, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b);
+ }
+
+ function _assertEq(address[] memory a, address[] memory b, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b);
+ }
+
+ function _assertEq(uint256[] memory a, uint256[] memory b, string memory err, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b, err);
+ }
+
+ function _assertEq(int256[] memory a, int256[] memory b, string memory err, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b, err);
+ }
+
+ function _assertEq(address[] memory a, address[] memory b, string memory err, bool expectFail) external expectFailure(expectFail) {
+ assertEq(a, b, err);
+ }
+
+
+ function _assertApproxEqAbs(
+ uint256 a,
+ uint256 b,
+ uint256 maxDelta,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqAbs(a, b, maxDelta);
+ }
+
+ function _assertApproxEqAbs(
+ uint256 a,
+ uint256 b,
+ uint256 maxDelta,
+ string memory err,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqAbs(a, b, maxDelta, err);
+ }
+
+ function _assertApproxEqAbs(
+ int256 a,
+ int256 b,
+ uint256 maxDelta,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqAbs(a, b, maxDelta);
+ }
+
+ function _assertApproxEqAbs(
+ int256 a,
+ int256 b,
+ uint256 maxDelta,
+ string memory err,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqAbs(a, b, maxDelta, err);
+ }
+
+ function _assertApproxEqRel(
+ uint256 a,
+ uint256 b,
+ uint256 maxPercentDelta,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqRel(a, b, maxPercentDelta);
+ }
+
+ function _assertApproxEqRel(
+ uint256 a,
+ uint256 b,
+ uint256 maxPercentDelta,
+ string memory err,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqRel(a, b, maxPercentDelta, err);
+ }
+
+ function _assertApproxEqRel(
+ int256 a,
+ int256 b,
+ uint256 maxPercentDelta,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqRel(a, b, maxPercentDelta);
+ }
+
+ function _assertApproxEqRel(
+ int256 a,
+ int256 b,
+ uint256 maxPercentDelta,
+ string memory err,
+ bool expectFail
+ ) external expectFailure(expectFail) {
+ assertApproxEqRel(a, b, maxPercentDelta, err);
+ }
+}
diff --git a/old/lib/forge-std/src/test/StdCheats.t.sol b/old/lib/forge-std/src/test/StdCheats.t.sol
new file mode 100644
index 0000000..05e240a
--- /dev/null
+++ b/old/lib/forge-std/src/test/StdCheats.t.sol
@@ -0,0 +1,282 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.7.0 <0.9.0;
+
+import "../Test.sol";
+import "../StdJson.sol";
+
+contract StdCheatsTest is Test {
+ Bar test;
+
+ using stdJson for string;
+
+ function setUp() public {
+ test = new Bar();
+ }
+
+ function testSkip() public {
+ vm.warp(100);
+ skip(25);
+ assertEq(block.timestamp, 125);
+ }
+
+ function testRewind() public {
+ vm.warp(100);
+ rewind(25);
+ assertEq(block.timestamp, 75);
+ }
+
+ function testHoax() public {
+ hoax(address(1337));
+ test.bar{value: 100}(address(1337));
+ }
+
+ function testHoaxOrigin() public {
+ hoax(address(1337), address(1337));
+ test.origin{value: 100}(address(1337));
+ }
+
+ function testHoaxDifferentAddresses() public {
+ hoax(address(1337), address(7331));
+ test.origin{value: 100}(address(1337), address(7331));
+ }
+
+ function testStartHoax() public {
+ startHoax(address(1337));
+ test.bar{value: 100}(address(1337));
+ test.bar{value: 100}(address(1337));
+ vm.stopPrank();
+ test.bar(address(this));
+ }
+
+ function testStartHoaxOrigin() public {
+ startHoax(address(1337), address(1337));
+ test.origin{value: 100}(address(1337));
+ test.origin{value: 100}(address(1337));
+ vm.stopPrank();
+ test.bar(address(this));
+ }
+
+ function testChangePrank() public {
+ vm.startPrank(address(1337));
+ test.bar(address(1337));
+ changePrank(address(0xdead));
+ test.bar(address(0xdead));
+ changePrank(address(1337));
+ test.bar(address(1337));
+ vm.stopPrank();
+ }
+
+ function testMakeAddrEquivalence() public {
+ (address addr, ) = makeAddrAndKey("1337");
+ assertEq(makeAddr("1337"), addr);
+ }
+
+ function testMakeAddrSigning() public {
+ (address addr, uint256 key) = makeAddrAndKey("1337");
+ bytes32 hash = keccak256("some_message");
+
+ (uint8 v, bytes32 r, bytes32 s) = vm.sign(key, hash);
+ assertEq(ecrecover(hash, v, r, s), addr);
+ }
+
+ function testDeal() public {
+ deal(address(this), 1 ether);
+ assertEq(address(this).balance, 1 ether);
+ }
+
+ function testDealToken() public {
+ Bar barToken = new Bar();
+ address bar = address(barToken);
+ deal(bar, address(this), 10000e18);
+ assertEq(barToken.balanceOf(address(this)), 10000e18);
+ }
+
+ function testDealTokenAdjustTS() public {
+ Bar barToken = new Bar();
+ address bar = address(barToken);
+ deal(bar, address(this), 10000e18, true);
+ assertEq(barToken.balanceOf(address(this)), 10000e18);
+ assertEq(barToken.totalSupply(), 20000e18);
+ deal(bar, address(this), 0, true);
+ assertEq(barToken.balanceOf(address(this)), 0);
+ assertEq(barToken.totalSupply(), 10000e18);
+ }
+
+ function testBound() public {
+ assertEq(bound(5, 0, 4), 0);
+ assertEq(bound(0, 69, 69), 69);
+ assertEq(bound(0, 68, 69), 68);
+ assertEq(bound(10, 150, 190), 160);
+ assertEq(bound(300, 2800, 3200), 3100);
+ assertEq(bound(9999, 1337, 6666), 6006);
+ }
+
+ function testCannotBoundMaxLessThanMin() public {
+ vm.expectRevert(bytes("Test bound(uint256,uint256,uint256): Max is less than min."));
+ bound(5, 100, 10);
+ }
+
+ function testBound(
+ uint256 num,
+ uint256 min,
+ uint256 max
+ ) public {
+ if (min > max) (min, max) = (max, min);
+
+ uint256 bounded = bound(num, min, max);
+
+ assertGe(bounded, min);
+ assertLe(bounded, max);
+ }
+
+ function testBoundUint256Max() public {
+ assertEq(bound(0, type(uint256).max - 1, type(uint256).max), type(uint256).max - 1);
+ assertEq(bound(1, type(uint256).max - 1, type(uint256).max), type(uint256).max);
+ }
+
+ function testCannotBoundMaxLessThanMin(
+ uint256 num,
+ uint256 min,
+ uint256 max
+ ) public {
+ vm.assume(min > max);
+ vm.expectRevert(bytes("Test bound(uint256,uint256,uint256): Max is less than min."));
+ bound(num, min, max);
+ }
+
+ function testDeployCode() public {
+ address deployed = deployCode("StdCheats.t.sol:StdCheatsTest", bytes(""));
+ assertEq(string(getCode(deployed)), string(getCode(address(this))));
+ }
+
+ function testDeployCodeNoArgs() public {
+ address deployed = deployCode("StdCheats.t.sol:StdCheatsTest");
+ assertEq(string(getCode(deployed)), string(getCode(address(this))));
+ }
+
+ // We need that payable constructor in order to send ETH on construction
+ constructor() payable {}
+
+ function testDeployCodeVal() public {
+ address deployed = deployCode("StdCheats.t.sol:StdCheatsTest", bytes(""), 1 ether);
+ assertEq(string(getCode(deployed)), string(getCode(address(this))));
+ assertEq(deployed.balance, 1 ether);
+ }
+
+ function testDeployCodeValNoArgs() public {
+ address deployed = deployCode("StdCheats.t.sol:StdCheatsTest", 1 ether);
+ assertEq(string(getCode(deployed)), string(getCode(address(this))));
+ assertEq(deployed.balance, 1 ether);
+ }
+
+ // We need this so we can call "this.deployCode" rather than "deployCode" directly
+ function deployCodeHelper(string memory what) external {
+ deployCode(what);
+ }
+
+ function testDeployCodeFail() public {
+ vm.expectRevert(bytes("Test deployCode(string): Deployment failed."));
+ this.deployCodeHelper("StdCheats.t.sol:RevertingContract");
+ }
+
+ function getCode(address who) internal view returns (bytes memory o_code) {
+ /// @solidity memory-safe-assembly
+ assembly {
+ // retrieve the size of the code, this needs assembly
+ let size := extcodesize(who)
+ // allocate output byte array - this could also be done without assembly
+ // by using o_code = new bytes(size)
+ o_code := mload(0x40)
+ // new "memory end" including padding
+ mstore(0x40, add(o_code, and(add(add(size, 0x20), 0x1f), not(0x1f))))
+ // store length in memory
+ mstore(o_code, size)
+ // actually retrieve the code, this needs assembly
+ extcodecopy(who, add(o_code, 0x20), 0, size)
+ }
+ }
+
+ function testBytesToUint() public {
+ assertEq(3, bytesToUint(hex'03'));
+ assertEq(2, bytesToUint(hex'02'));
+ assertEq(255, bytesToUint(hex'ff'));
+ assertEq(29625, bytesToUint(hex'73b9'));
+ }
+
+ function testParseJsonTxDetail() public {
+ string memory root = vm.projectRoot();
+ string memory path = string.concat(root, "/src/test/fixtures/broadcast.log.json");
+ string memory json = vm.readFile(path);
+ bytes memory transactionDetails = json.parseRaw(".transactions[0].tx");
+ RawTx1559Detail memory rawTxDetail = abi.decode(transactionDetails, (RawTx1559Detail));
+ Tx1559Detail memory txDetail = rawToConvertedEIP1559Detail(rawTxDetail);
+ assertEq(txDetail.from, 0xf39Fd6e51aad88F6F4ce6aB8827279cffFb92266);
+ assertEq(txDetail.to, 0xe7f1725E7734CE288F8367e1Bb143E90bb3F0512);
+ assertEq(txDetail.data, hex'23e99187000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000013370000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000004');
+ assertEq(txDetail.nonce, 3);
+ assertEq(txDetail.txType, 2);
+ assertEq(txDetail.gas, 29625);
+ assertEq(txDetail.value, 0);
+ }
+
+ function testReadEIP1559Transaction() public {
+ string memory root = vm.projectRoot();
+ string memory path = string.concat(root, "/src/test/fixtures/broadcast.log.json");
+ uint256 index = 0;
+ Tx1559 memory transaction = readTx1559(path, index);
+ }
+
+ function testReadEIP1559Transactions() public {
+ string memory root = vm.projectRoot();
+ string memory path = string.concat(root, "/src/test/fixtures/broadcast.log.json");
+ Tx1559[] memory transactions = readTx1559s(path);
+ }
+
+ function testReadReceipt() public {
+ string memory root = vm.projectRoot();
+ string memory path = string.concat(root, "/src/test/fixtures/broadcast.log.json");
+ uint index = 5;
+ Receipt memory receipt = readReceipt(path, index);
+ assertEq(receipt.logsBloom,
+ hex"00000000000800000000000000000010000000000000000000000000000180000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100");
+ }
+
+ function testReadReceipts() public {
+ string memory root = vm.projectRoot();
+ string memory path = string.concat(root, "/src/test/fixtures/broadcast.log.json");
+ Receipt[] memory receipts = readReceipts(path);
+ }
+
+}
+
+contract Bar {
+ constructor() {
+ /// `DEAL` STDCHEAT
+ totalSupply = 10000e18;
+ balanceOf[address(this)] = totalSupply;
+ }
+
+ /// `HOAX` STDCHEATS
+ function bar(address expectedSender) public payable {
+ require(msg.sender == expectedSender, "!prank");
+ }
+ function origin(address expectedSender) public payable {
+ require(msg.sender == expectedSender, "!prank");
+ require(tx.origin == expectedSender, "!prank");
+ }
+ function origin(address expectedSender, address expectedOrigin) public payable {
+ require(msg.sender == expectedSender, "!prank");
+ require(tx.origin == expectedOrigin, "!prank");
+ }
+
+ /// `DEAL` STDCHEAT
+ mapping (address => uint256) public balanceOf;
+ uint256 public totalSupply;
+}
+
+contract RevertingContract {
+ constructor() {
+ revert();
+ }
+}
+
diff --git a/old/lib/forge-std/src/test/StdError.t.sol b/old/lib/forge-std/src/test/StdError.t.sol
new file mode 100644
index 0000000..0d6601e
--- /dev/null
+++ b/old/lib/forge-std/src/test/StdError.t.sol
@@ -0,0 +1,124 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.8.10 <0.9.0;
+
+import "../Test.sol";
+
+contract StdErrorsTest is Test {
+ ErrorsTest test;
+
+ function setUp() public {
+ test = new ErrorsTest();
+ }
+
+ function testExpectAssertion() public {
+ vm.expectRevert(stdError.assertionError);
+ test.assertionError();
+ }
+
+ function testExpectArithmetic() public {
+ vm.expectRevert(stdError.arithmeticError);
+ test.arithmeticError(10);
+ }
+
+ function testExpectDiv() public {
+ vm.expectRevert(stdError.divisionError);
+ test.divError(0);
+ }
+
+ function testExpectMod() public {
+ vm.expectRevert(stdError.divisionError);
+ test.modError(0);
+ }
+
+ function testExpectEnum() public {
+ vm.expectRevert(stdError.enumConversionError);
+ test.enumConversion(1);
+ }
+
+ function testExpectEncodeStg() public {
+ vm.expectRevert(stdError.encodeStorageError);
+ test.encodeStgError();
+ }
+
+ function testExpectPop() public {
+ vm.expectRevert(stdError.popError);
+ test.pop();
+ }
+
+ function testExpectOOB() public {
+ vm.expectRevert(stdError.indexOOBError);
+ test.indexOOBError(1);
+ }
+
+ function testExpectMem() public {
+ vm.expectRevert(stdError.memOverflowError);
+ test.mem();
+ }
+
+ function testExpectIntern() public {
+ vm.expectRevert(stdError.zeroVarError);
+ test.intern();
+ }
+
+ function testExpectLowLvl() public {
+ vm.expectRevert(stdError.lowLevelError);
+ test.someArr(0);
+ }
+}
+
+contract ErrorsTest {
+ enum T {
+ T1
+ }
+
+ uint256[] public someArr;
+ bytes someBytes;
+
+ function assertionError() public pure {
+ assert(false);
+ }
+
+ function arithmeticError(uint256 a) public pure {
+ a -= 100;
+ }
+
+ function divError(uint256 a) public pure {
+ 100 / a;
+ }
+
+ function modError(uint256 a) public pure {
+ 100 % a;
+ }
+
+ function enumConversion(uint256 a) public pure {
+ T(a);
+ }
+
+ function encodeStgError() public {
+ /// @solidity memory-safe-assembly
+ assembly {
+ sstore(someBytes.slot, 1)
+ }
+ keccak256(someBytes);
+ }
+
+ function pop() public {
+ someArr.pop();
+ }
+
+ function indexOOBError(uint256 a) public pure {
+ uint256[] memory t = new uint256[](0);
+ t[a];
+ }
+
+ function mem() public pure {
+ uint256 l = 2**256 / 32;
+ new uint256[](l);
+ }
+
+ function intern() public returns (uint256) {
+ function(uint256) internal returns (uint256) x;
+ x(2);
+ return 7;
+ }
+}
diff --git a/old/lib/forge-std/src/test/StdMath.t.sol b/old/lib/forge-std/src/test/StdMath.t.sol
new file mode 100644
index 0000000..9d09b81
--- /dev/null
+++ b/old/lib/forge-std/src/test/StdMath.t.sol
@@ -0,0 +1,200 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.8.0 <0.9.0;
+
+import "../Test.sol";
+
+contract StdMathTest is Test
+{
+ function testGetAbs() external {
+ assertEq(stdMath.abs(-50), 50);
+ assertEq(stdMath.abs(50), 50);
+ assertEq(stdMath.abs(-1337), 1337);
+ assertEq(stdMath.abs(0), 0);
+
+ assertEq(stdMath.abs(type(int256).min), (type(uint256).max >> 1) + 1);
+ assertEq(stdMath.abs(type(int256).max), (type(uint256).max >> 1));
+ }
+
+ function testGetAbs_Fuzz(int256 a) external {
+ uint256 manualAbs = getAbs(a);
+
+ uint256 abs = stdMath.abs(a);
+
+ assertEq(abs, manualAbs);
+ }
+
+ function testGetDelta_Uint() external {
+ assertEq(stdMath.delta(uint256(0), uint256(0)), 0);
+ assertEq(stdMath.delta(uint256(0), uint256(1337)), 1337);
+ assertEq(stdMath.delta(uint256(0), type(uint64).max), type(uint64).max);
+ assertEq(stdMath.delta(uint256(0), type(uint128).max), type(uint128).max);
+ assertEq(stdMath.delta(uint256(0), type(uint256).max), type(uint256).max);
+
+ assertEq(stdMath.delta(0, uint256(0)), 0);
+ assertEq(stdMath.delta(1337, uint256(0)), 1337);
+ assertEq(stdMath.delta(type(uint64).max, uint256(0)), type(uint64).max);
+ assertEq(stdMath.delta(type(uint128).max, uint256(0)), type(uint128).max);
+ assertEq(stdMath.delta(type(uint256).max, uint256(0)), type(uint256).max);
+
+ assertEq(stdMath.delta(1337, uint256(1337)), 0);
+ assertEq(stdMath.delta(type(uint256).max, type(uint256).max), 0);
+ assertEq(stdMath.delta(5000, uint256(1250)), 3750);
+ }
+
+ function testGetDelta_Uint_Fuzz(uint256 a, uint256 b) external {
+ uint256 manualDelta;
+ if (a > b) {
+ manualDelta = a - b;
+ } else {
+ manualDelta = b - a;
+ }
+
+ uint256 delta = stdMath.delta(a, b);
+
+ assertEq(delta, manualDelta);
+ }
+
+ function testGetDelta_Int() external {
+ assertEq(stdMath.delta(int256(0), int256(0)), 0);
+ assertEq(stdMath.delta(int256(0), int256(1337)), 1337);
+ assertEq(stdMath.delta(int256(0), type(int64).max), type(uint64).max >> 1);
+ assertEq(stdMath.delta(int256(0), type(int128).max), type(uint128).max >> 1);
+ assertEq(stdMath.delta(int256(0), type(int256).max), type(uint256).max >> 1);
+
+ assertEq(stdMath.delta(0, int256(0)), 0);
+ assertEq(stdMath.delta(1337, int256(0)), 1337);
+ assertEq(stdMath.delta(type(int64).max, int256(0)), type(uint64).max >> 1);
+ assertEq(stdMath.delta(type(int128).max, int256(0)), type(uint128).max >> 1);
+ assertEq(stdMath.delta(type(int256).max, int256(0)), type(uint256).max >> 1);
+
+ assertEq(stdMath.delta(-0, int256(0)), 0);
+ assertEq(stdMath.delta(-1337, int256(0)), 1337);
+ assertEq(stdMath.delta(type(int64).min, int256(0)), (type(uint64).max >> 1) + 1);
+ assertEq(stdMath.delta(type(int128).min, int256(0)), (type(uint128).max >> 1) + 1);
+ assertEq(stdMath.delta(type(int256).min, int256(0)), (type(uint256).max >> 1) + 1);
+
+ assertEq(stdMath.delta(int256(0), -0), 0);
+ assertEq(stdMath.delta(int256(0), -1337), 1337);
+ assertEq(stdMath.delta(int256(0), type(int64).min), (type(uint64).max >> 1) + 1);
+ assertEq(stdMath.delta(int256(0), type(int128).min), (type(uint128).max >> 1) + 1);
+ assertEq(stdMath.delta(int256(0), type(int256).min), (type(uint256).max >> 1) + 1);
+
+ assertEq(stdMath.delta(1337, int256(1337)), 0);
+ assertEq(stdMath.delta(type(int256).max, type(int256).max), 0);
+ assertEq(stdMath.delta(type(int256).min, type(int256).min), 0);
+ assertEq(stdMath.delta(type(int256).min, type(int256).max), type(uint256).max);
+ assertEq(stdMath.delta(5000, int256(1250)), 3750);
+ }
+
+ function testGetDelta_Int_Fuzz(int256 a, int256 b) external {
+ uint256 absA = getAbs(a);
+ uint256 absB = getAbs(b);
+ uint256 absDelta = absA > absB
+ ? absA - absB
+ : absB - absA;
+
+ uint256 manualDelta;
+ if ((a >= 0 && b >= 0) || (a < 0 && b < 0)) {
+ manualDelta = absDelta;
+ }
+ // (a < 0 && b >= 0) || (a >= 0 && b < 0)
+ else {
+ manualDelta = absA + absB;
+ }
+
+ uint256 delta = stdMath.delta(a, b);
+
+ assertEq(delta, manualDelta);
+ }
+
+ function testGetPercentDelta_Uint() external {
+ assertEq(stdMath.percentDelta(uint256(0), uint256(1337)), 1e18);
+ assertEq(stdMath.percentDelta(uint256(0), type(uint64).max), 1e18);
+ assertEq(stdMath.percentDelta(uint256(0), type(uint128).max), 1e18);
+ assertEq(stdMath.percentDelta(uint256(0), type(uint192).max), 1e18);
+
+ assertEq(stdMath.percentDelta(1337, uint256(1337)), 0);
+ assertEq(stdMath.percentDelta(type(uint192).max, type(uint192).max), 0);
+ assertEq(stdMath.percentDelta(0, uint256(2500)), 1e18);
+ assertEq(stdMath.percentDelta(2500, uint256(2500)), 0);
+ assertEq(stdMath.percentDelta(5000, uint256(2500)), 1e18);
+ assertEq(stdMath.percentDelta(7500, uint256(2500)), 2e18);
+
+ vm.expectRevert(stdError.divisionError);
+ stdMath.percentDelta(uint256(1), 0);
+ }
+
+ function testGetPercentDelta_Uint_Fuzz(uint192 a, uint192 b) external {
+ vm.assume(b != 0);
+ uint256 manualDelta;
+ if (a > b) {
+ manualDelta = a - b;
+ } else {
+ manualDelta = b - a;
+ }
+
+ uint256 manualPercentDelta = manualDelta * 1e18 / b;
+ uint256 percentDelta = stdMath.percentDelta(a, b);
+
+ assertEq(percentDelta, manualPercentDelta);
+ }
+
+ function testGetPercentDelta_Int() external {
+ assertEq(stdMath.percentDelta(int256(0), int256(1337)), 1e18);
+ assertEq(stdMath.percentDelta(int256(0), -1337), 1e18);
+ assertEq(stdMath.percentDelta(int256(0), type(int64).min), 1e18);
+ assertEq(stdMath.percentDelta(int256(0), type(int128).min), 1e18);
+ assertEq(stdMath.percentDelta(int256(0), type(int192).min), 1e18);
+ assertEq(stdMath.percentDelta(int256(0), type(int64).max), 1e18);
+ assertEq(stdMath.percentDelta(int256(0), type(int128).max), 1e18);
+ assertEq(stdMath.percentDelta(int256(0), type(int192).max), 1e18);
+
+ assertEq(stdMath.percentDelta(1337, int256(1337)), 0);
+ assertEq(stdMath.percentDelta(type(int192).max, type(int192).max), 0);
+ assertEq(stdMath.percentDelta(type(int192).min, type(int192).min), 0);
+
+ assertEq(stdMath.percentDelta(type(int192).min, type(int192).max), 2e18); // rounds the 1 wei diff down
+ assertEq(stdMath.percentDelta(type(int192).max, type(int192).min), 2e18 - 1); // rounds the 1 wei diff down
+ assertEq(stdMath.percentDelta(0, int256(2500)), 1e18);
+ assertEq(stdMath.percentDelta(2500, int256(2500)), 0);
+ assertEq(stdMath.percentDelta(5000, int256(2500)), 1e18);
+ assertEq(stdMath.percentDelta(7500, int256(2500)), 2e18);
+
+ vm.expectRevert(stdError.divisionError);
+ stdMath.percentDelta(int256(1), 0);
+ }
+
+ function testGetPercentDelta_Int_Fuzz(int192 a, int192 b) external {
+ vm.assume(b != 0);
+ uint256 absA = getAbs(a);
+ uint256 absB = getAbs(b);
+ uint256 absDelta = absA > absB
+ ? absA - absB
+ : absB - absA;
+
+ uint256 manualDelta;
+ if ((a >= 0 && b >= 0) || (a < 0 && b < 0)) {
+ manualDelta = absDelta;
+ }
+ // (a < 0 && b >= 0) || (a >= 0 && b < 0)
+ else {
+ manualDelta = absA + absB;
+ }
+
+ uint256 manualPercentDelta = manualDelta * 1e18 / absB;
+ uint256 percentDelta = stdMath.percentDelta(a, b);
+
+ assertEq(percentDelta, manualPercentDelta);
+ }
+
+ /*//////////////////////////////////////////////////////////////////////////
+ HELPERS
+ //////////////////////////////////////////////////////////////////////////*/
+
+ function getAbs(int256 a) private pure returns (uint256) {
+ if (a < 0)
+ return a == type(int256).min ? uint256(type(int256).max) + 1 : uint256(-a);
+
+ return uint256(a);
+ }
+}
diff --git a/old/lib/forge-std/src/test/StdStorage.t.sol b/old/lib/forge-std/src/test/StdStorage.t.sol
new file mode 100644
index 0000000..6e238d0
--- /dev/null
+++ b/old/lib/forge-std/src/test/StdStorage.t.sol
@@ -0,0 +1,321 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.7.0 <0.9.0;
+
+import "../Test.sol";
+
+contract StdStorageTest is Test {
+ using stdStorage for StdStorage;
+
+ StorageTest test;
+
+ function setUp() public {
+ test = new StorageTest();
+ }
+
+ function testStorageHidden() public {
+ assertEq(uint256(keccak256("my.random.var")), stdstore.target(address(test)).sig("hidden()").find());
+ }
+
+ function testStorageObvious() public {
+ assertEq(uint256(0), stdstore.target(address(test)).sig("exists()").find());
+ }
+
+ function testStorageCheckedWriteHidden() public {
+ stdstore.target(address(test)).sig(test.hidden.selector).checked_write(100);
+ assertEq(uint256(test.hidden()), 100);
+ }
+
+ function testStorageCheckedWriteObvious() public {
+ stdstore.target(address(test)).sig(test.exists.selector).checked_write(100);
+ assertEq(test.exists(), 100);
+ }
+
+ function testStorageMapStructA() public {
+ uint256 slot = stdstore
+ .target(address(test))
+ .sig(test.map_struct.selector)
+ .with_key(address(this))
+ .depth(0)
+ .find();
+ assertEq(uint256(keccak256(abi.encode(address(this), 4))), slot);
+ }
+
+ function testStorageMapStructB() public {
+ uint256 slot = stdstore
+ .target(address(test))
+ .sig(test.map_struct.selector)
+ .with_key(address(this))
+ .depth(1)
+ .find();
+ assertEq(uint256(keccak256(abi.encode(address(this), 4))) + 1, slot);
+ }
+
+ function testStorageDeepMap() public {
+ uint256 slot = stdstore
+ .target(address(test))
+ .sig(test.deep_map.selector)
+ .with_key(address(this))
+ .with_key(address(this))
+ .find();
+ assertEq(uint256(keccak256(abi.encode(address(this), keccak256(abi.encode(address(this), uint(5)))))), slot);
+ }
+
+ function testStorageCheckedWriteDeepMap() public {
+ stdstore
+ .target(address(test))
+ .sig(test.deep_map.selector)
+ .with_key(address(this))
+ .with_key(address(this))
+ .checked_write(100);
+ assertEq(100, test.deep_map(address(this), address(this)));
+ }
+
+ function testStorageDeepMapStructA() public {
+ uint256 slot = stdstore
+ .target(address(test))
+ .sig(test.deep_map_struct.selector)
+ .with_key(address(this))
+ .with_key(address(this))
+ .depth(0)
+ .find();
+ assertEq(bytes32(uint256(keccak256(abi.encode(address(this), keccak256(abi.encode(address(this), uint(6)))))) + 0), bytes32(slot));
+ }
+
+ function testStorageDeepMapStructB() public {
+ uint256 slot = stdstore
+ .target(address(test))
+ .sig(test.deep_map_struct.selector)
+ .with_key(address(this))
+ .with_key(address(this))
+ .depth(1)
+ .find();
+ assertEq(bytes32(uint256(keccak256(abi.encode(address(this), keccak256(abi.encode(address(this), uint(6)))))) + 1), bytes32(slot));
+ }
+
+ function testStorageCheckedWriteDeepMapStructA() public {
+ stdstore
+ .target(address(test))
+ .sig(test.deep_map_struct.selector)
+ .with_key(address(this))
+ .with_key(address(this))
+ .depth(0)
+ .checked_write(100);
+ (uint256 a, uint256 b) = test.deep_map_struct(address(this), address(this));
+ assertEq(100, a);
+ assertEq(0, b);
+ }
+
+ function testStorageCheckedWriteDeepMapStructB() public {
+ stdstore
+ .target(address(test))
+ .sig(test.deep_map_struct.selector)
+ .with_key(address(this))
+ .with_key(address(this))
+ .depth(1)
+ .checked_write(100);
+ (uint256 a, uint256 b) = test.deep_map_struct(address(this), address(this));
+ assertEq(0, a);
+ assertEq(100, b);
+ }
+
+ function testStorageCheckedWriteMapStructA() public {
+ stdstore
+ .target(address(test))
+ .sig(test.map_struct.selector)
+ .with_key(address(this))
+ .depth(0)
+ .checked_write(100);
+ (uint256 a, uint256 b) = test.map_struct(address(this));
+ assertEq(a, 100);
+ assertEq(b, 0);
+ }
+
+ function testStorageCheckedWriteMapStructB() public {
+ stdstore
+ .target(address(test))
+ .sig(test.map_struct.selector)
+ .with_key(address(this))
+ .depth(1)
+ .checked_write(100);
+ (uint256 a, uint256 b) = test.map_struct(address(this));
+ assertEq(a, 0);
+ assertEq(b, 100);
+ }
+
+ function testStorageStructA() public {
+ uint256 slot = stdstore.target(address(test)).sig(test.basic.selector).depth(0).find();
+ assertEq(uint256(7), slot);
+ }
+
+ function testStorageStructB() public {
+ uint256 slot = stdstore.target(address(test)).sig(test.basic.selector).depth(1).find();
+ assertEq(uint256(7) + 1, slot);
+ }
+
+ function testStorageCheckedWriteStructA() public {
+ stdstore.target(address(test)).sig(test.basic.selector).depth(0).checked_write(100);
+ (uint256 a, uint256 b) = test.basic();
+ assertEq(a, 100);
+ assertEq(b, 1337);
+ }
+
+ function testStorageCheckedWriteStructB() public {
+ stdstore.target(address(test)).sig(test.basic.selector).depth(1).checked_write(100);
+ (uint256 a, uint256 b) = test.basic();
+ assertEq(a, 1337);
+ assertEq(b, 100);
+ }
+
+ function testStorageMapAddrFound() public {
+ uint256 slot = stdstore.target(address(test)).sig(test.map_addr.selector).with_key(address(this)).find();
+ assertEq(uint256(keccak256(abi.encode(address(this), uint(1)))), slot);
+ }
+
+ function testStorageMapUintFound() public {
+ uint256 slot = stdstore.target(address(test)).sig(test.map_uint.selector).with_key(100).find();
+ assertEq(uint256(keccak256(abi.encode(100, uint(2)))), slot);
+ }
+
+ function testStorageCheckedWriteMapUint() public {
+ stdstore.target(address(test)).sig(test.map_uint.selector).with_key(100).checked_write(100);
+ assertEq(100, test.map_uint(100));
+ }
+
+ function testStorageCheckedWriteMapAddr() public {
+ stdstore.target(address(test)).sig(test.map_addr.selector).with_key(address(this)).checked_write(100);
+ assertEq(100, test.map_addr(address(this)));
+ }
+
+ function testStorageCheckedWriteMapBool() public {
+ stdstore.target(address(test)).sig(test.map_bool.selector).with_key(address(this)).checked_write(true);
+ assertTrue(test.map_bool(address(this)));
+ }
+
+ function testFailStorageCheckedWriteMapPacked() public {
+ // expect PackedSlot error but not external call so cant expectRevert
+ stdstore.target(address(test)).sig(test.read_struct_lower.selector).with_key(address(uint160(1337))).checked_write(100);
+ }
+
+ function testStorageCheckedWriteMapPackedSuccess() public {
+ uint256 full = test.map_packed(address(1337));
+ // keep upper 128, set lower 128 to 1337
+ full = (full & (uint256((1 << 128) - 1) << 128)) | 1337;
+ stdstore.target(address(test)).sig(test.map_packed.selector).with_key(address(uint160(1337))).checked_write(full);
+ assertEq(1337, test.read_struct_lower(address(1337)));
+ }
+
+ function testFailStorageConst() public {
+ // vm.expectRevert(abi.encodeWithSignature("NotStorage(bytes4)", bytes4(keccak256("const()"))));
+ stdstore.target(address(test)).sig("const()").find();
+ }
+
+ function testFailStorageNativePack() public {
+ stdstore.target(address(test)).sig(test.tA.selector).find();
+ stdstore.target(address(test)).sig(test.tB.selector).find();
+
+ // these both would fail
+ stdstore.target(address(test)).sig(test.tC.selector).find();
+ stdstore.target(address(test)).sig(test.tD.selector).find();
+ }
+
+ function testStorageReadBytes32() public {
+ bytes32 val = stdstore.target(address(test)).sig(test.tE.selector).read_bytes32();
+ assertEq(val, hex"1337");
+ }
+
+ function testStorageReadBool_False() public {
+ bool val = stdstore.target(address(test)).sig(test.tB.selector).read_bool();
+ assertEq(val, false);
+ }
+
+ function testStorageReadBool_True() public {
+ bool val = stdstore.target(address(test)).sig(test.tH.selector).read_bool();
+ assertEq(val, true);
+ }
+
+ function testStorageReadBool_Revert() public {
+ vm.expectRevert("stdStorage read_bool(StdStorage): Cannot decode. Make sure you are reading a bool.");
+ this.readNonBoolValue();
+ }
+
+ function readNonBoolValue() public {
+ stdstore.target(address(test)).sig(test.tE.selector).read_bool();
+ }
+
+ function testStorageReadAddress() public {
+ address val = stdstore.target(address(test)).sig(test.tF.selector).read_address();
+ assertEq(val, address(1337));
+ }
+
+ function testStorageReadUint() public {
+ uint256 val = stdstore.target(address(test)).sig(test.exists.selector).read_uint();
+ assertEq(val, 1);
+ }
+
+ function testStorageReadInt() public {
+ int256 val = stdstore.target(address(test)).sig(test.tG.selector).read_int();
+ assertEq(val, type(int256).min);
+ }
+}
+
+contract StorageTest {
+ uint256 public exists = 1;
+ mapping(address => uint256) public map_addr;
+ mapping(uint256 => uint256) public map_uint;
+ mapping(address => uint256) public map_packed;
+ mapping(address => UnpackedStruct) public map_struct;
+ mapping(address => mapping(address => uint256)) public deep_map;
+ mapping(address => mapping(address => UnpackedStruct)) public deep_map_struct;
+ UnpackedStruct public basic;
+
+ uint248 public tA;
+ bool public tB;
+
+
+ bool public tC = false;
+ uint248 public tD = 1;
+
+
+ struct UnpackedStruct {
+ uint256 a;
+ uint256 b;
+ }
+
+ mapping(address => bool) public map_bool;
+
+ bytes32 public tE = hex"1337";
+ address public tF = address(1337);
+ int256 public tG = type(int256).min;
+ bool public tH = true;
+
+ constructor() {
+ basic = UnpackedStruct({
+ a: 1337,
+ b: 1337
+ });
+
+ uint256 two = (1<<128) | 1;
+ map_packed[msg.sender] = two;
+ map_packed[address(bytes20(uint160(1337)))] = 1<<128;
+ }
+
+ function read_struct_upper(address who) public view returns (uint256) {
+ return map_packed[who] >> 128;
+ }
+
+ function read_struct_lower(address who) public view returns (uint256) {
+ return map_packed[who] & ((1 << 128) - 1);
+ }
+
+ function hidden() public view returns (bytes32 t) {
+ bytes32 slot = keccak256("my.random.var");
+ /// @solidity memory-safe-assembly
+ assembly {
+ t := sload(slot)
+ }
+ }
+
+ function const() public pure returns (bytes32 t) {
+ t = bytes32(hex"1337");
+ }
+}
diff --git a/old/lib/forge-std/src/test/fixtures/broadcast.log.json b/old/lib/forge-std/src/test/fixtures/broadcast.log.json
new file mode 100644
index 0000000..0a0200b
--- /dev/null
+++ b/old/lib/forge-std/src/test/fixtures/broadcast.log.json
@@ -0,0 +1,187 @@
+{
+ "transactions": [
+ {
+ "hash": "0xc6006863c267735a11476b7f15b15bc718e117e2da114a2be815dd651e1a509f",
+ "type": "CALL",
+ "contractName": "Test",
+ "contractAddress": "0xe7f1725e7734ce288f8367e1bb143e90bb3f0512",
+ "function": "multiple_arguments(uint256,address,uint256[]):(uint256)",
+ "arguments": ["1", "0000000000000000000000000000000000001337", "[3,4]"],
+ "tx": {
+ "type": "0x02",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0xe7f1725e7734ce288f8367e1bb143e90bb3f0512",
+ "gas": "0x73b9",
+ "value": "0x0",
+ "data": "0x23e99187000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000013370000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000004",
+ "nonce": "0x3",
+ "accessList": []
+ }
+ },
+ {
+ "hash": "0xedf2b38d8d896519a947a1acf720f859bb35c0c5ecb8dd7511995b67b9853298",
+ "type": "CALL",
+ "contractName": "Test",
+ "contractAddress": "0xe7f1725e7734ce288f8367e1bb143e90bb3f0512",
+ "function": "inc():(uint256)",
+ "arguments": [],
+ "tx": {
+ "type": "0x02",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0xe7f1725e7734ce288f8367e1bb143e90bb3f0512",
+ "gas": "0xdcb2",
+ "value": "0x0",
+ "data": "0x371303c0",
+ "nonce": "0x4",
+ "accessList": []
+ }
+ },
+ {
+ "hash": "0xa57e8e3981a6c861442e46c9471bd19cb3e21f9a8a6c63a72e7b5c47c6675a7c",
+ "type": "CALL",
+ "contractName": "Test",
+ "contractAddress": "0x7c6b4bbe207d642d98d5c537142d85209e585087",
+ "function": "t(uint256):(uint256)",
+ "arguments": ["1"],
+ "tx": {
+ "type": "0x02",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0x7c6b4bbe207d642d98d5c537142d85209e585087",
+ "gas": "0x8599",
+ "value": "0x0",
+ "data": "0xafe29f710000000000000000000000000000000000000000000000000000000000000001",
+ "nonce": "0x5",
+ "accessList": []
+ }
+ }
+ ],
+ "receipts": [
+ {
+ "transactionHash": "0x481dc86e40bba90403c76f8e144aa9ff04c1da2164299d0298573835f0991181",
+ "transactionIndex": "0x0",
+ "blockHash": "0xef0730448490304e5403be0fa8f8ce64f118e9adcca60c07a2ae1ab921d748af",
+ "blockNumber": "0x1",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": null,
+ "cumulativeGasUsed": "0x13f3a",
+ "gasUsed": "0x13f3a",
+ "contractAddress": "0x5fbdb2315678afecb367f032d93f642f64180aa3",
+ "logs": [],
+ "status": "0x1",
+ "logsBloom": "0x00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
+ "effectiveGasPrice": "0xee6b2800"
+ },
+ {
+ "transactionHash": "0x6a187183545b8a9e7f1790e847139379bf5622baff2cb43acf3f5c79470af782",
+ "transactionIndex": "0x0",
+ "blockHash": "0xf3acb96a90071640c2a8c067ae4e16aad87e634ea8d8bbbb5b352fba86ba0148",
+ "blockNumber": "0x2",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": null,
+ "cumulativeGasUsed": "0x45d80",
+ "gasUsed": "0x45d80",
+ "contractAddress": "0xe7f1725e7734ce288f8367e1bb143e90bb3f0512",
+ "logs": [],
+ "status": "0x1",
+ "logsBloom": "0x00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
+ "effectiveGasPrice": "0xee6b2800"
+ },
+ {
+ "transactionHash": "0x064ad173b4867bdef2fb60060bbdaf01735fbf10414541ea857772974e74ea9d",
+ "transactionIndex": "0x0",
+ "blockHash": "0x8373d02109d3ee06a0225f23da4c161c656ccc48fe0fcee931d325508ae73e58",
+ "blockNumber": "0x3",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0x4e59b44847b379578588920ca78fbf26c0b4956c",
+ "cumulativeGasUsed": "0x45feb",
+ "gasUsed": "0x45feb",
+ "contractAddress": null,
+ "logs": [],
+ "status": "0x1",
+ "logsBloom": "0x00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
+ "effectiveGasPrice": "0xee6b2800"
+ },
+ {
+ "transactionHash": "0xc6006863c267735a11476b7f15b15bc718e117e2da114a2be815dd651e1a509f",
+ "transactionIndex": "0x0",
+ "blockHash": "0x16712fae5c0e18f75045f84363fb6b4d9a9fe25e660c4ce286833a533c97f629",
+ "blockNumber": "0x4",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0xe7f1725e7734ce288f8367e1bb143e90bb3f0512",
+ "cumulativeGasUsed": "0x5905",
+ "gasUsed": "0x5905",
+ "contractAddress": null,
+ "logs": [],
+ "status": "0x1",
+ "logsBloom": "0x00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
+ "effectiveGasPrice": "0xee6b2800"
+ },
+ {
+ "transactionHash": "0xedf2b38d8d896519a947a1acf720f859bb35c0c5ecb8dd7511995b67b9853298",
+ "transactionIndex": "0x0",
+ "blockHash": "0x156b88c3eb9a1244ba00a1834f3f70de735b39e3e59006dd03af4fe7d5480c11",
+ "blockNumber": "0x5",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0xe7f1725e7734ce288f8367e1bb143e90bb3f0512",
+ "cumulativeGasUsed": "0xa9c4",
+ "gasUsed": "0xa9c4",
+ "contractAddress": null,
+ "logs": [],
+ "status": "0x1",
+ "logsBloom": "0x00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
+ "effectiveGasPrice": "0xee6b2800"
+ },
+ {
+ "transactionHash": "0xa57e8e3981a6c861442e46c9471bd19cb3e21f9a8a6c63a72e7b5c47c6675a7c",
+ "transactionIndex": "0x0",
+ "blockHash": "0xcf61faca67dbb2c28952b0b8a379e53b1505ae0821e84779679390cb8571cadb",
+ "blockNumber": "0x6",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0x7c6b4bbe207d642d98d5c537142d85209e585087",
+ "cumulativeGasUsed": "0x66c5",
+ "gasUsed": "0x66c5",
+ "contractAddress": null,
+ "logs": [
+ {
+ "address": "0x7c6b4bbe207d642d98d5c537142d85209e585087",
+ "topics": [
+ "0x0b2e13ff20ac7b474198655583edf70dedd2c1dc980e329c4fbb2fc0748b796b"
+ ],
+ "data": "0x000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000046865726500000000000000000000000000000000000000000000000000000000",
+ "blockHash": "0xcf61faca67dbb2c28952b0b8a379e53b1505ae0821e84779679390cb8571cadb",
+ "blockNumber": "0x6",
+ "transactionHash": "0xa57e8e3981a6c861442e46c9471bd19cb3e21f9a8a6c63a72e7b5c47c6675a7c",
+ "transactionIndex": "0x1",
+ "logIndex": "0x0",
+ "transactionLogIndex": "0x0",
+ "removed": false
+ }
+ ],
+ "status": "0x1",
+ "logsBloom": "0x00000000000800000000000000000010000000000000000000000000000180000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100",
+ "effectiveGasPrice": "0xee6b2800"
+ },
+ {
+ "transactionHash": "0x11fbb10230c168ca1e36a7e5c69a6dbcd04fd9e64ede39d10a83e36ee8065c16",
+ "transactionIndex": "0x0",
+ "blockHash": "0xf1e0ed2eda4e923626ec74621006ed50b3fc27580dc7b4cf68a07ca77420e29c",
+ "blockNumber": "0x7",
+ "from": "0xf39fd6e51aad88f6f4ce6ab8827279cfffb92266",
+ "to": "0x0000000000000000000000000000000000001337",
+ "cumulativeGasUsed": "0x5208",
+ "gasUsed": "0x5208",
+ "contractAddress": null,
+ "logs": [],
+ "status": "0x1",
+ "logsBloom": "0x00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
+ "effectiveGasPrice": "0xee6b2800"
+ }
+ ],
+ "libraries": [
+ "src/Broadcast.t.sol:F:0x5fbdb2315678afecb367f032d93f642f64180aa3"
+ ],
+ "pending": [],
+ "path": "broadcast/Broadcast.t.sol/31337/run-latest.json",
+ "returns": {},
+ "timestamp": 1655140035
+}
diff --git a/old/lib/kontrol-cheatcodes/README.md b/old/lib/kontrol-cheatcodes/README.md
new file mode 100644
index 0000000..be180d3
--- /dev/null
+++ b/old/lib/kontrol-cheatcodes/README.md
@@ -0,0 +1,19 @@
+# Kontrol Cheatcodes
+
+Kontrol cheatcodes complement [Foundry's cheatcodes](https://book.getfoundry.sh/cheatcodes/) to enhance the expressivity of your symbolic specifications even further. With these cheatcodes, you can, for instance, make the storage of a given address symbolic, create new symbolic values, or expect that no further calls are made.
+
+Check out our [Kontrol documentation](https://docs.runtimeverification.com/kontrol/overview/readme) to start writing and executing symbolic tests for your project!
+
+Join our [Discord](https://discord.gg/9nFGwVRfMD) to ask any questions you may have.
+
+## Installation
+
+You can install this repository either via `forge` or as a `git` submodule:
+
+```
+forge install runtimeverification/kontrol-cheatcodes
+```
+
+```
+git submodule add https://github.com/runtimeverification/kontrol-cheatcodes
+```
diff --git a/old/lib/kontrol-cheatcodes/src/IKontrolCheatsBase.sol b/old/lib/kontrol-cheatcodes/src/IKontrolCheatsBase.sol
new file mode 100644
index 0000000..6fb3f17
--- /dev/null
+++ b/old/lib/kontrol-cheatcodes/src/IKontrolCheatsBase.sol
@@ -0,0 +1,38 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.6.2 <0.9.0;
+pragma experimental ABIEncoderV2;
+
+interface KontrolCheatsBase {
+ // Expects a call using the CALL opcode to an address with the specified calldata.
+ function expectRegularCall(address,bytes calldata) external;
+ // Expects a call using the CALL opcode to an address with the specified msg.value and calldata.
+ function expectRegularCall(address,uint256,bytes calldata) external;
+ // Expects a static call to an address with the specified calldata.
+ function expectStaticCall(address,bytes calldata) external;
+ // Expects a delegate call to an address with the specified calldata.
+ function expectDelegateCall(address,bytes calldata) external;
+ // Expects that no contract calls are made after invoking the cheatcode.
+ function expectNoCall() external;
+ // Expects the given address to deploy a new contract, using the CREATE opcode, with the specified value and bytecode.
+ function expectCreate(address,uint256,bytes calldata) external;
+ // Expects the given address to deploy a new contract, using the CREATE2 opcode, with the specified value and bytecode (appended with a bytes32 salt).
+ function expectCreate2(address,uint256,bytes calldata) external;
+ // Makes the storage of the given address completely symbolic.
+ function symbolicStorage(address) external;
+ // Adds an address to the whitelist.
+ function allowCallsToAddress(address) external;
+ // Adds an address and a storage slot to the whitelist.
+ function allowChangesToStorage(address,uint256) external;
+ // Sets the remaining gas to an infinite value.
+ function infiniteGas() external;
+ // Sets the current cell to the supplied amount.
+ function setGas(uint256) external;
+ // Returns a symbolic unsigned integer
+ function freshUInt(uint8) external returns (uint256);
+ // Returns a symbolic boolean value
+ function freshBool() external returns (uint256);
+ // Returns a symbolic byte array
+ function freshBytes(uint256) external returns (bytes memory);
+ // Returns a symbolic address
+ function freshAddress() external returns (address);
+}
\ No newline at end of file
diff --git a/old/lib/kontrol-cheatcodes/src/KontrolCheats.sol b/old/lib/kontrol-cheatcodes/src/KontrolCheats.sol
new file mode 100644
index 0000000..c41feb3
--- /dev/null
+++ b/old/lib/kontrol-cheatcodes/src/KontrolCheats.sol
@@ -0,0 +1,275 @@
+// SPDX-License-Identifier: MIT
+pragma solidity >=0.6.2 <0.9.0;
+pragma experimental ABIEncoderV2;
+
+import "./IKontrolCheatsBase.sol";
+
+abstract contract KontrolCheats {
+ KontrolCheatsBase public constant kevm = KontrolCheatsBase(address(uint160(uint256(keccak256("hevm cheat code")))));
+
+ // Checks if an address matches one of the built-in addresses.
+ function notBuiltinAddress(address addr) internal pure returns (bool) {
+ return (addr != address(645326474426547203313410069153905908525362434349) &&
+ addr != address(728815563385977040452943777879061427756277306518));
+ }
+
+ function freshUInt256() internal returns (uint256) {
+ return kevm.freshUInt(32);
+ }
+
+ function freshUInt248() internal returns (uint248) {
+ return uint248(kevm.freshUInt(31));
+ }
+
+ function freshUInt240() internal returns (uint240) {
+ return uint240(kevm.freshUInt(30));
+ }
+
+ function freshUInt232() internal returns (uint232) {
+ return uint232(kevm.freshUInt(29));
+ }
+
+ function freshUInt224() internal returns (uint224) {
+ return uint224(kevm.freshUInt(28));
+ }
+
+ function freshUInt216() internal returns (uint216) {
+ return uint216(kevm.freshUInt(27));
+ }
+
+ function freshUInt208() internal returns (uint208) {
+ return uint208(kevm.freshUInt(26));
+ }
+
+ function freshUInt200() internal returns (uint200) {
+ return uint200(kevm.freshUInt(25));
+ }
+
+ function freshUInt192() internal returns (uint192) {
+ return uint192(kevm.freshUInt(24));
+ }
+
+ function freshUInt184() internal returns (uint184) {
+ return uint184(kevm.freshUInt(23));
+ }
+
+ function freshUInt176() internal returns (uint176) {
+ return uint176(kevm.freshUInt(22));
+ }
+
+ function freshUInt168() internal returns (uint168) {
+ return uint168(kevm.freshUInt(21));
+ }
+
+ function freshUInt160() internal returns (uint160) {
+ return uint160(kevm.freshUInt(20));
+ }
+
+ function freshUInt152() internal returns (uint152) {
+ return uint152(kevm.freshUInt(19));
+ }
+
+ function freshUInt144() internal returns (uint144) {
+ return uint144(kevm.freshUInt(18));
+ }
+
+ function freshUInt136() internal returns (uint136) {
+ return uint136(kevm.freshUInt(17));
+ }
+
+ function freshUInt128() internal returns (uint128) {
+ return uint128(kevm.freshUInt(16));
+ }
+
+ function freshUInt120() internal returns (uint120) {
+ return uint120(kevm.freshUInt(15));
+ }
+
+ function freshUInt112() internal returns (uint112) {
+ return uint112(kevm.freshUInt(14));
+ }
+
+ function freshUInt104() internal returns (uint104) {
+ return uint104(kevm.freshUInt(13));
+ }
+
+ function freshUInt96() internal returns (uint96) {
+ return uint96(kevm.freshUInt(12));
+ }
+
+ function freshUInt88() internal returns (uint88) {
+ return uint88(kevm.freshUInt(11));
+ }
+
+ function freshUInt80() internal returns (uint80) {
+ return uint80(kevm.freshUInt(10));
+ }
+
+ function freshUInt72() internal returns (uint72) {
+ return uint72(kevm.freshUInt(9));
+ }
+
+ function freshUInt64() internal returns (uint64) {
+ return uint64(kevm.freshUInt(8));
+ }
+
+ function freshUInt56() internal returns (uint56) {
+ return uint56(kevm.freshUInt(7));
+ }
+
+ function freshUInt48() internal returns (uint48) {
+ return uint48(kevm.freshUInt(6));
+ }
+
+ function freshUInt40() internal returns (uint40) {
+ return uint40(kevm.freshUInt(5));
+ }
+
+ function freshUInt32() internal returns (uint32) {
+ return uint32(kevm.freshUInt(4));
+ }
+
+ function freshUInt24() internal returns (uint24) {
+ return uint24(kevm.freshUInt(3));
+ }
+
+ function freshUInt16() internal returns (uint16) {
+ return uint16(kevm.freshUInt(2));
+ }
+
+ function freshUInt8() internal returns (uint8) {
+ return uint8(kevm.freshUInt(1));
+ }
+
+ function freshAddress() internal returns (address) {
+ return address(uint160(kevm.freshUInt(20)));
+ }
+
+ function freshSInt256() internal returns (int256) {
+ return int256(kevm.freshUInt(32));
+ }
+
+ function freshSInt248() internal returns (int248) {
+ return int248(uint248(kevm.freshUInt(31)));
+ }
+
+ function freshSInt240() internal returns (int240) {
+ return int240(uint240(kevm.freshUInt(30)));
+ }
+
+ function freshSInt232() internal returns (int232) {
+ return int232(uint232(kevm.freshUInt(29)));
+ }
+
+ function freshSInt224() internal returns (int224) {
+ return int224(uint224(kevm.freshUInt(28)));
+ }
+
+ function freshSInt216() internal returns (int216) {
+ return int216(uint216(kevm.freshUInt(27)));
+ }
+
+ function freshSInt208() internal returns (int208) {
+ return int208(uint208(kevm.freshUInt(26)));
+ }
+
+ function freshSInt200() internal returns (int200) {
+ return int200(uint200(kevm.freshUInt(25)));
+ }
+
+ function freshSInt192() internal returns (int192) {
+ return int192(uint192(kevm.freshUInt(24)));
+ }
+
+ function freshSInt184() internal returns (int184) {
+ return int184(uint184(kevm.freshUInt(23)));
+ }
+
+ function freshSInt176() internal returns (int176) {
+ return int176(uint176(kevm.freshUInt(22)));
+ }
+
+ function freshSInt168() internal returns (int168) {
+ return int168(uint168(kevm.freshUInt(21)));
+ }
+
+ function freshSInt160() internal returns (int160) {
+ return int160(uint160(kevm.freshUInt(20)));
+ }
+
+ function freshSInt152() internal returns (int152) {
+ return int152(uint152(kevm.freshUInt(19)));
+ }
+
+ function freshSInt144() internal returns (int144) {
+ return int144(uint144(kevm.freshUInt(18)));
+ }
+
+ function freshSInt136() internal returns (int136) {
+ return int136(uint136(kevm.freshUInt(17)));
+ }
+
+ function freshSInt128() internal returns (int128) {
+ return int128(uint128(kevm.freshUInt(16)));
+ }
+
+ function freshSInt120() internal returns (int120) {
+ return int120(uint120(kevm.freshUInt(15)));
+ }
+
+ function freshSInt112() internal returns (int112) {
+ return int112(uint112(kevm.freshUInt(14)));
+ }
+
+ function freshSInt104() internal returns (int104) {
+ return int104(uint104(kevm.freshUInt(13)));
+ }
+
+ function freshSInt96() internal returns (int96) {
+ return int96(uint96(kevm.freshUInt(12)));
+ }
+
+ function freshSInt88() internal returns (int88) {
+ return int88(uint88(kevm.freshUInt(11)));
+ }
+
+ function freshSInt80() internal returns (int80) {
+ return int80(uint80(kevm.freshUInt(10)));
+ }
+
+ function freshSInt72() internal returns (int72) {
+ return int72(uint72(kevm.freshUInt(9)));
+ }
+
+ function freshSInt64() internal returns (int64) {
+ return int64(uint64(kevm.freshUInt(8)));
+ }
+
+ function freshSInt56() internal returns (int56) {
+ return int56(uint56(kevm.freshUInt(7)));
+ }
+
+ function freshSInt48() internal returns (int48) {
+ return int48(uint48(kevm.freshUInt(6)));
+ }
+
+ function freshSInt40() internal returns (int40) {
+ return int40(uint40(kevm.freshUInt(5)));
+ }
+
+ function freshSInt32() internal returns (int32) {
+ return int32(uint32(kevm.freshUInt(4)));
+ }
+
+ function freshSInt24() internal returns (int24) {
+ return int24(uint24(kevm.freshUInt(3)));
+ }
+
+ function freshSInt16() internal returns (int16) {
+ return int16(uint16(kevm.freshUInt(2)));
+ }
+
+ function freshSInt8() internal returns (int8) {
+ return int8(uint8((kevm.freshUInt(1))));
+ }
+}
diff --git a/media/KontrolViewKCFGDemo.png b/old/media/KontrolViewKCFGDemo.png
similarity index 100%
rename from media/KontrolViewKCFGDemo.png
rename to old/media/KontrolViewKCFGDemo.png
diff --git a/media/KontrolViewKCFGStaticDemo.png b/old/media/KontrolViewKCFGStaticDemo.png
similarity index 100%
rename from media/KontrolViewKCFGStaticDemo.png
rename to old/media/KontrolViewKCFGStaticDemo.png
diff --git a/run-kontrol.sh b/old/run-kontrol.sh
similarity index 100%
rename from run-kontrol.sh
rename to old/run-kontrol.sh
diff --git a/script/Counter.s.sol b/old/script/Counter.s.sol
similarity index 100%
rename from script/Counter.s.sol
rename to old/script/Counter.s.sol
diff --git a/src/ERC20.sol b/old/src/ERC20.sol
similarity index 100%
rename from src/ERC20.sol
rename to old/src/ERC20.sol
diff --git a/src/exclusiveToken.sol b/old/src/exclusiveToken.sol
similarity index 100%
rename from src/exclusiveToken.sol
rename to old/src/exclusiveToken.sol
diff --git a/src/extensions/IERC20Metadata.sol b/old/src/extensions/IERC20Metadata.sol
similarity index 100%
rename from src/extensions/IERC20Metadata.sol
rename to old/src/extensions/IERC20Metadata.sol
diff --git a/src/token.sol b/old/src/token.sol
similarity index 100%
rename from src/token.sol
rename to old/src/token.sol
diff --git a/src/utils/Context.sol b/old/src/utils/Context.sol
similarity index 100%
rename from src/utils/Context.sol
rename to old/src/utils/Context.sol
diff --git a/src/utils/IERC20.sol b/old/src/utils/IERC20.sol
similarity index 100%
rename from src/utils/IERC20.sol
rename to old/src/utils/IERC20.sol
diff --git a/test/ERC20.t.sol b/old/test/ERC20.t.sol
similarity index 100%
rename from test/ERC20.t.sol
rename to old/test/ERC20.t.sol
diff --git a/test/exclusiveToken.t.sol b/old/test/exclusiveToken.t.sol
similarity index 100%
rename from test/exclusiveToken.t.sol
rename to old/test/exclusiveToken.t.sol
diff --git a/test/simple.t.sol b/old/test/simple.t.sol
similarity index 100%
rename from test/simple.t.sol
rename to old/test/simple.t.sol
diff --git a/test/token.t.sol b/old/test/token.t.sol
similarity index 100%
rename from test/token.t.sol
rename to old/test/token.t.sol
diff --git a/oz_erc20/.github/workflows/test.yml b/oz_erc20/.github/workflows/test.yml
new file mode 100644
index 0000000..762a296
--- /dev/null
+++ b/oz_erc20/.github/workflows/test.yml
@@ -0,0 +1,45 @@
+name: CI
+
+on:
+ push:
+ pull_request:
+ workflow_dispatch:
+
+env:
+ FOUNDRY_PROFILE: ci
+
+jobs:
+ check:
+ strategy:
+ fail-fast: true
+
+ name: Foundry project
+ runs-on: ubuntu-latest
+ steps:
+ - uses: actions/checkout@v4
+ with:
+ submodules: recursive
+
+ - name: Install Foundry
+ uses: foundry-rs/foundry-toolchain@v1
+ with:
+ version: nightly
+
+ - name: Show Forge version
+ run: |
+ forge --version
+
+ - name: Run Forge fmt
+ run: |
+ forge fmt --check
+ id: fmt
+
+ - name: Run Forge build
+ run: |
+ forge build --sizes
+ id: build
+
+ - name: Run Forge tests
+ run: |
+ forge test -vvv
+ id: test
diff --git a/oz_erc20/.gitignore b/oz_erc20/.gitignore
new file mode 100644
index 0000000..85198aa
--- /dev/null
+++ b/oz_erc20/.gitignore
@@ -0,0 +1,14 @@
+# Compiler files
+cache/
+out/
+
+# Ignores development broadcast logs
+!/broadcast
+/broadcast/*/31337/
+/broadcast/**/dry-run/
+
+# Docs
+docs/
+
+# Dotenv file
+.env
diff --git a/oz_erc20/README.md b/oz_erc20/README.md
new file mode 100644
index 0000000..9265b45
--- /dev/null
+++ b/oz_erc20/README.md
@@ -0,0 +1,66 @@
+## Foundry
+
+**Foundry is a blazing fast, portable and modular toolkit for Ethereum application development written in Rust.**
+
+Foundry consists of:
+
+- **Forge**: Ethereum testing framework (like Truffle, Hardhat and DappTools).
+- **Cast**: Swiss army knife for interacting with EVM smart contracts, sending transactions and getting chain data.
+- **Anvil**: Local Ethereum node, akin to Ganache, Hardhat Network.
+- **Chisel**: Fast, utilitarian, and verbose solidity REPL.
+
+## Documentation
+
+https://book.getfoundry.sh/
+
+## Usage
+
+### Build
+
+```shell
+$ forge build
+```
+
+### Test
+
+```shell
+$ forge test
+```
+
+### Format
+
+```shell
+$ forge fmt
+```
+
+### Gas Snapshots
+
+```shell
+$ forge snapshot
+```
+
+### Anvil
+
+```shell
+$ anvil
+```
+
+### Deploy
+
+```shell
+$ forge script script/Counter.s.sol:CounterScript --rpc-url --private-key
+```
+
+### Cast
+
+```shell
+$ cast
+```
+
+### Help
+
+```shell
+$ forge --help
+$ anvil --help
+$ cast --help
+```
diff --git a/oz_erc20/foundry.toml b/oz_erc20/foundry.toml
new file mode 100644
index 0000000..146433c
--- /dev/null
+++ b/oz_erc20/foundry.toml
@@ -0,0 +1,8 @@
+[profile.default]
+src = "src"
+out = "out"
+libs = ["lib"]
+ast = true
+extra_output = ["storageLayout", "abi", "evm.methodIdentifiers", "evm.deployedBytecode.object", "devdoc"]
+
+# See more config options https://github.com/foundry-rs/foundry/blob/master/crates/config/README.md#all-options
diff --git a/oz_erc20/kontrol.toml b/oz_erc20/kontrol.toml
new file mode 100644
index 0000000..380d47b
--- /dev/null
+++ b/oz_erc20/kontrol.toml
@@ -0,0 +1,34 @@
+[build.default]
+foundry-project-root = '.'
+regen = false
+rekompile = false
+verbose = true
+debug = false
+require = 'lemmas.k'
+module-import = 'TestBase:KONTROL-LEMMAS'
+
+[prove.default]
+foundry-project-root = '.'
+verbose = true
+debug = false
+max-depth = 25000
+reinit = false
+cse = false
+workers = 4
+failure-information = true
+counterexample-information = true
+minimize-proofs = false
+fail-fast = true
+smt-timeout = 1000
+break-every-step = false
+break-on-jumpi = false
+break-on-calls = false
+break-on-storage = false
+break-on-basic-blocks = false
+break-on-cheatcodes = false
+run-constructor = false
+
+[show.default]
+foundry-project-root = '.'
+verbose = true
+debug = false
\ No newline at end of file
diff --git a/oz_erc20/lemmas.k b/oz_erc20/lemmas.k
new file mode 100644
index 0000000..800140f
--- /dev/null
+++ b/oz_erc20/lemmas.k
@@ -0,0 +1,85 @@
+requires "foundry.md"
+
+module KONTROL-LEMMAS
+ imports FOUNDRY
+ imports INT-SYMBOLIC
+ imports MAP-SYMBOLIC
+ imports SET-SYMBOLIC
+
+ //
+ // Equality of +Bytes
+ //
+
+ rule { B:Bytes #Equals B1:Bytes +Bytes B2:Bytes } =>
+ { #range ( B, 0, lengthBytes(B1) ) #Equals B1 } #And
+ { #range ( B, lengthBytes(B1), lengthBytes(B) -Int lengthBytes(B1) ) #Equals B2 }
+ requires lengthBytes(B1) <=Int lengthBytes(B)
+ [simplification(60), concrete(B, B1)]
+
+ rule { B1:Bytes +Bytes B2:Bytes #Equals B } =>
+ { #range ( B, 0, lengthBytes(B1) ) #Equals B1 } #And
+ { #range ( B, lengthBytes(B1), lengthBytes(B) -Int lengthBytes(B1) ) #Equals B2 }
+ requires lengthBytes(B1) <=Int lengthBytes(B)
+ [simplification(60), concrete(B, B1)]
+
+ rule { B:Bytes #Equals #buf( N, X:Int ) +Bytes B2:Bytes } =>
+ { X #Equals #asWord ( #range ( B, 0, N ) ) } #And
+ { #range ( B, N, lengthBytes(B) -Int N ) #Equals B2 }
+ requires N <=Int lengthBytes(B)
+ [simplification(60), concrete(B, N)]
+
+ rule { #buf( N, X:Int ) +Bytes B2:Bytes #Equals B } =>
+ { X #Equals #asWord ( #range ( B, 0, N ) ) } #And
+ { #range ( B, N, lengthBytes(B) -Int N ) #Equals B2 }
+ requires N <=Int lengthBytes(B)
+ [simplification(60), concrete(B, N)]
+
+
+ //
+ // keccak assumptions: these assumptions are not sound in principle, but are
+ // required for verification - they should ideally be collected at the end of execution
+ //
+
+ rule 0 <=Int keccak( _ ) => true [simplification, smt-lemma]
+ rule keccak( _ ) true [simplification, smt-lemma]
+
+ // keccak does not equal a concrete value
+ rule [keccak-eq-conc-false]: keccak(_A) ==Int _B => false [symbolic(_A), concrete(_B), simplification(30), comm]
+ rule [keccak-neq-conc-true]: keccak(_A) =/=Int _B => true [symbolic(_A), concrete(_B), simplification(30), comm]
+ rule [keccak-eq-conc-false-ml-lr]: { keccak(A) #Equals B } => { true #Equals keccak(A) ==Int B } [symbolic(A), concrete(B), simplification]
+ rule [keccak-eq-conc-false-ml-rl]: { B #Equals keccak(A) } => { true #Equals keccak(A) ==Int B } [symbolic(A), concrete(B), simplification]
+
+ // keccak is injective
+ rule [keccak-inj]: keccak(A) ==Int keccak(B) => A ==K B [simplification]
+ rule [keccak-inj-ml]: { keccak(A) #Equals keccak(B) } => { true #Equals A ==K B } [simplification]
+
+ // chop of negative keccak
+ rule chop (0 -Int keccak(BA)) => pow256 -Int keccak(BA)
+ [simplification]
+
+ // keccak cannot equal a number outside of its range
+ rule { X #Equals keccak (_) } => #Bottom
+ requires X =Int pow256
+ [concrete(X), simplification]
+
+
+ // Lookup simplifications
+ rule #lookup (M:Map [ K1 <- #lookup(M, K1)], K2) => #lookup (M, K2) [simplification]
+
+ rule #lookup (M:Map [ K1 <- #lookup (M, K1)] [ K2 <- #lookup (M, K2)], K3) => #lookup (M, K3) [simplification]
+
+ // Map simplifications
+ rule M:Map [K1 <- _V1] [K2 <- V2] [K1 <-V3] => M:Map [K2 <- V2] [K1 <- V3] [simplification]
+
+
+ rule X |Int #asWord ( Y ) =>
+ #asWord ( #buf ( 32 -Int lengthBytes(Y), X >>Int ( 8 *Int lengthBytes(Y) ) ) +Bytes #buf ( lengthBytes(Y), #asWord (Y) ) )
+ requires #rangeUInt(256, X) andBool lengthBytes(Y) <=Int 32
+ andBool X modInt ( 2 ^Int ( 8 *Int ( 32 -Int lengthBytes(Y) ) ) ) ==Int 0
+ [simplification(60), concrete(X), preserves-definedness]
+
+ // List simplifications
+ rule E1 in ListItem(E2) L => E1 ==K E2 orBool E1 in L [simplification]
+ rule X in .List => false [simplification]
+
+endmodule
\ No newline at end of file
diff --git a/oz_erc20/lib/forge-std b/oz_erc20/lib/forge-std
new file mode 160000
index 0000000..07263d1
--- /dev/null
+++ b/oz_erc20/lib/forge-std
@@ -0,0 +1 @@
+Subproject commit 07263d193d621c4b2b0ce8b4d54af58f6957d97d
diff --git a/oz_erc20/lib/kontrol-cheatcodes b/oz_erc20/lib/kontrol-cheatcodes
new file mode 160000
index 0000000..7baaf34
--- /dev/null
+++ b/oz_erc20/lib/kontrol-cheatcodes
@@ -0,0 +1 @@
+Subproject commit 7baaf34ae72a11a6ba4e54021b1b3b7eb637e4ff
diff --git a/oz_erc20/lib/openzeppelin-contracts b/oz_erc20/lib/openzeppelin-contracts
new file mode 160000
index 0000000..dbb6104
--- /dev/null
+++ b/oz_erc20/lib/openzeppelin-contracts
@@ -0,0 +1 @@
+Subproject commit dbb6104ce834628e473d2173bbc9d47f81a9eec3
diff --git a/oz_erc20/remappings.txt b/oz_erc20/remappings.txt
new file mode 100644
index 0000000..6fdbafd
--- /dev/null
+++ b/oz_erc20/remappings.txt
@@ -0,0 +1 @@
+@openzeppelin/contracts/=lib/openzeppelin-contracts/contracts/
diff --git a/oz_erc20/run-kontrol.sh b/oz_erc20/run-kontrol.sh
new file mode 100755
index 0000000..bbad6f0
--- /dev/null
+++ b/oz_erc20/run-kontrol.sh
@@ -0,0 +1,4 @@
+#!/bin/bash
+
+kontrol build
+kontrol prove
\ No newline at end of file
diff --git a/oz_erc20/script/GLDToken.s.sol b/oz_erc20/script/GLDToken.s.sol
new file mode 100644
index 0000000..e57b1bb
--- /dev/null
+++ b/oz_erc20/script/GLDToken.s.sol
@@ -0,0 +1,19 @@
+// SPDX-License-Identifier: UNLICENSED
+pragma solidity ^0.8.13;
+
+import {Script, console} from "forge-std/Script.sol";
+import {GLDToken} from "../src/GLDToken.sol";
+
+contract CounterScript is Script {
+ GLDToken public gld;
+
+ function setUp() public {}
+
+ function run() public {
+ vm.startBroadcast();
+
+ gld = new GLDToken();
+
+ vm.stopBroadcast();
+ }
+}
diff --git a/oz_erc20/src/GLDToken.sol b/oz_erc20/src/GLDToken.sol
new file mode 100644
index 0000000..9ca14c1
--- /dev/null
+++ b/oz_erc20/src/GLDToken.sol
@@ -0,0 +1,26 @@
+// SPDX-License-Identifier: UNLICENSED
+pragma solidity ^0.8.13;
+
+import {ERC20} from "@openzeppelin/contracts/token/ERC20/ERC20.sol";
+
+contract GLDToken is ERC20 {
+ uint256 public sumOfAllBalances;
+
+ constructor() ERC20("Gold", "GLD") {}
+
+ /**
+ * @dev Publicly exposed mint function of the contract for example purposes.
+ */
+ function mint(address account, uint256 value) public {
+ _mint(account, value);
+ sumOfAllBalances += value;
+ }
+
+ /**
+ * @dev Publicly exposed burn function of the contract for example purposes
+ */
+ function burn(address account, uint256 value) public {
+ _burn(account, value);
+ sumOfAllBalances -= value;
+ }
+}
diff --git a/oz_erc20/test/GLDToken.t.sol b/oz_erc20/test/GLDToken.t.sol
new file mode 100644
index 0000000..1b249fe
--- /dev/null
+++ b/oz_erc20/test/GLDToken.t.sol
@@ -0,0 +1,408 @@
+// SPDX-License-Identifier: UNLICENSED
+pragma solidity ^0.8.13;
+
+import {Test, console} from "forge-std/Test.sol";
+import {GLDToken} from "../../../src/GLDToken.sol";
+import {KontrolCheats} from "kontrol-cheatcodes/KontrolCheats.sol";
+import {IERC20} from "@openzeppelin/contracts/token/ERC20/IERC20.sol";
+import {IERC20Errors} from "@openzeppelin/contracts/interfaces/draft-IERC6093.sol";
+
+contract GLDTokenTest is Test, KontrolCheats {
+ GLDToken public gld;
+
+ address constant DEPLOYED_ERC20 = address(491460923342184218035706888008750043977755113263);
+ address constant FOUNDRY_TEST_CONTRACT = address(728815563385977040452943777879061427756277306518);
+ address constant FOUNDRY_CHEAT_CODE = address(645326474426547203313410069153905908525362434349);
+
+ uint256 constant BALANCES_STORAGE_INDEX = uint256(0);
+ uint256 constant ALLOWANCES_STORAGE_INDEX = uint256(1);
+ uint256 constant TOTAL_SUPPLY_STORAGE_INDEX = uint256(2);
+ uint256 constant SUMOFALLBALANCES_STORAGE_INDEX = uint256(5);
+
+ uint256 constant MAX_INT = 2 ** 256 - 1;
+
+ /*
+ Besides deploying the ERC20 contract, the setUp() function uses `kevm.symbolicStorage` cheat code to make
+ storage of the contract abstract. This way, we assume that the contract could be in any possible state.
+ Finally, with `vm.assume(gld.sumOfAllBalances() == gld.totalSupply)` we start with the precondition that
+ the total supply is equal to the sum of all balances.
+ */
+ function setUp() public {
+ gld = new GLDToken();
+ kevm.symbolicStorage(address(gld));
+ vm.assume(gld.sumOfAllBalances() == gld.totalSupply());
+ }
+
+ /*
+ The _notBuiltinAddress is an optional function that is used only to trim redundant branches of symbolic
+ execution.
+ */
+ function _notBuiltinAddress(address addr) internal pure {
+ vm.assume(addr != FOUNDRY_CHEAT_CODE);
+ vm.assume(addr != FOUNDRY_TEST_CONTRACT);
+ vm.assume(addr != DEPLOYED_ERC20);
+ }
+
+ /*
+ hashedLocation(account, storageSlot) is used to compute the storage location at which a mapping element
+ is in the storage (i.e. _balances[0x000000000000000000000000000000000000001F])
+ */
+ function hashedLocation(address key, uint256 storageSlot) public pure returns (bytes32) {
+ return keccak256(abi.encode(key, bytes32(storageSlot)));
+ }
+
+ /*
+ This modifier asserts that for any given storage location storageSlot, the function that is executed
+ does not modify the value at location storageSlot.
+ */
+ modifier unchangedStorage(bytes32 storageSlot) {
+ bytes32 initialStorage = vm.load(address(gld), storageSlot);
+ _;
+ bytes32 finalStorage = vm.load(address(gld), storageSlot);
+ assertEq(initialStorage, finalStorage);
+ }
+
+ /*
+ Modifier used to check that the invariant holds through the execution of functions.
+ It is not applied to functions that already have the `unchangedStorage` modifier.
+ */
+ modifier totalSupplyIsSumOfAllBalances() {
+ _;
+ assertEq(gld.totalSupply(), gld.sumOfAllBalances());
+ }
+
+ /*
+ ∀ value, 0 <= value < pow256, the `gld.mint(address(0), value)` function shall revert.
+ ∀ storageSlot, the storage does not change.
+ */
+ function testMintFailure(uint256 value, bytes32 storageSlot) public unchangedStorage(storageSlot) {
+ vm.expectRevert(abi.encodeWithSelector(IERC20Errors.ERC20InvalidReceiver.selector, address(0)));
+ gld.mint(address(0), value);
+ }
+
+ /*
+ `kevm.symbolicStorage(account, storageSlot)` is enabling the whitelist storage feature.
+ Only storage writes on that specific storageSlot in the specified accounts are enabled.
+ The proof will revert if storage slots outside the whitelist are modified.
+ ∀ value, ∀ account, account != 0, we expect the mint function to modify the following storage slots:
+ - totalSupply - slot 2,
+ - sumOfAllBalances - slot 5,
+ - _balances[account] - slot keccak256(abi.encode(account, bytes32(0)))
+ The execution then splits on two branches, on the condition that totalSupply + value <= pow256 - 1.
+ On one branch, we expect the function to go through, and update the fields accordingly.
+ On the other branch, we expect the function to revert.
+ */
+ function testMintSuccess(address account, uint256 value) public totalSupplyIsSumOfAllBalances {
+ vm.assume(account != address(0));
+ kevm.allowChangesToStorage(address(gld), TOTAL_SUPPLY_STORAGE_INDEX);
+ kevm.allowChangesToStorage(address(gld), SUMOFALLBALANCES_STORAGE_INDEX);
+ bytes32 storageLocation = hashedLocation(account, BALANCES_STORAGE_INDEX);
+ kevm.allowChangesToStorage(address(gld), uint256(storageLocation));
+ uint256 balance = gld.balanceOf(account);
+ uint256 totalSupply = gld.totalSupply();
+ if (totalSupply <= MAX_INT - value) {
+ // The ERC20._update internal function only has an overflow check for totalSupply
+ // Assuming that balance does not overflow such that the proof can pass
+ vm.assume(balance <= MAX_INT - value);
+ vm.expectEmit(true, true, false, true);
+ emit IERC20.Transfer(address(0), account, value);
+ gld.mint(account, value);
+ assertEq(gld.balanceOf(account), balance + value);
+ assertEq(gld.totalSupply(), totalSupply + value);
+ } else {
+ vm.expectRevert();
+ gld.mint(account, value);
+ assertEq(gld.balanceOf(account), balance);
+ assertEq(gld.totalSupply(), totalSupply);
+ }
+ }
+
+ /* The testBurn proof is similar to the previous one. One difference is in the structure of the proof.
+ The cases in which the account is/ is not equal to address(0) are put together in the same proof.
+ The symbolic execution will branch on the if statements, exploring both cases.
+ */
+ function testBurn(address account, uint256 value) public totalSupplyIsSumOfAllBalances {
+ kevm.allowChangesToStorage(address(gld), TOTAL_SUPPLY_STORAGE_INDEX);
+ kevm.allowChangesToStorage(address(gld), SUMOFALLBALANCES_STORAGE_INDEX);
+ bytes32 storageLocation = hashedLocation(account, BALANCES_STORAGE_INDEX);
+ kevm.allowChangesToStorage(address(gld), uint256(storageLocation));
+ uint256 initialBalance = gld.balanceOf(account);
+ uint256 initialTotalSupply = gld.totalSupply();
+ if (account == address(0)) {
+ vm.expectRevert(abi.encodeWithSelector(IERC20Errors.ERC20InvalidSender.selector, address(0)));
+ gld.burn(address(0), value);
+ assertEq(gld.balanceOf(account), initialBalance);
+ assertEq(gld.totalSupply(), initialTotalSupply);
+ } else {
+ if (value <= initialTotalSupply) {
+ vm.assume(value <= initialBalance);
+ vm.expectEmit(true, true, false, true);
+ emit IERC20.Transfer(account, address(0), value);
+ gld.burn(account, value);
+ assertEq(gld.balanceOf(account), initialBalance - value);
+ assertEq(gld.totalSupply(), initialTotalSupply - value);
+ } else {
+ vm.expectRevert();
+ gld.burn(account, value);
+ assertEq(gld.balanceOf(account), initialBalance);
+ assertEq(gld.totalSupply(), initialTotalSupply);
+ }
+ }
+ }
+
+ /* transfer proofs */
+
+ /* ∀ to, ∀ value, the transfer(to, value) will revert if the sender is address(0).
+ The storage remains unchaged.
+ */
+ function testTransferFailure_0(address to, uint256 value, bytes32 storageSlot)
+ public
+ unchangedStorage(storageSlot)
+ {
+ vm.startPrank(address(0));
+ vm.expectRevert(abi.encodeWithSelector(IERC20Errors.ERC20InvalidSender.selector, address(0)));
+ gld.transfer(to, value);
+ }
+
+ /* ∀ from, ∀ value, the transfer(address(0), value) will revert for any msg.sender `from`.
+ The storage remains unchanged.
+ */
+ function testTransferFailure_1(address from, uint256 value, bytes32 storageSlot)
+ public
+ unchangedStorage(storageSlot)
+ {
+ _notBuiltinAddress(from);
+ vm.assume(from != address(0));
+ vm.startPrank(address(from));
+ vm.expectRevert(abi.encodeWithSelector(IERC20Errors.ERC20InvalidReceiver.selector, address(0)));
+ gld.transfer(address(0), value);
+ }
+
+ /* ∀ alice, ∀ bob, ∀ amount, where alice != 0, bob != 0 and _balances[alice] < amount, the
+ transfer(bob, value) call will revert for any msg.sender `alice`.
+ The storage remains unchanged.
+ */
+ function testTransferFailure_2(address alice, address bob, uint256 amount, bytes32 storageSlot)
+ public
+ unchangedStorage(storageSlot)
+ {
+ _notBuiltinAddress(alice);
+ _notBuiltinAddress(bob);
+ vm.assume(alice != address(0));
+ vm.assume(bob != address(0));
+ uint256 balanceAlice = gld.balanceOf(alice);
+ vm.assume(balanceAlice < amount);
+ vm.startPrank(alice);
+ vm.expectRevert(
+ abi.encodeWithSelector(IERC20Errors.ERC20InsufficientBalance.selector, alice, gld.balanceOf(alice), amount)
+ );
+ gld.transfer(bob, amount);
+ }
+
+ /* ∀ alice, ∀ amount, where alice != 0, and _balances[alice] >= amount, the
+ transfer(alice, value) call will succeed for any msg.sender `alice`.
+ The storage remains unchanged.
+ */
+ function testTransferSuccess_0(address alice, uint256 amount, bytes32 storageSlot)
+ public
+ unchangedStorage(storageSlot)
+ {
+ _notBuiltinAddress(alice);
+ vm.assume(alice != address(0));
+ uint256 balanceAlice = gld.balanceOf(alice);
+ vm.assume(balanceAlice >= amount);
+ vm.expectEmit(true, true, false, true);
+ emit IERC20.Transfer(alice, alice, amount);
+ vm.prank(alice);
+ bool status = gld.transfer(alice, amount);
+ assertTrue(status);
+ }
+
+ /* ∀ alice, ∀ amount, where alice != 0, and _balances[alice] >= amount, the
+ transfer(bob, value) call will succeed for any msg.sender `alice`.
+ The function will modify the following storage slots:
+ - _balances[alice] - slot keccak256(abi.encode(alice, bytes32(0))),
+ - _balances[bob] - slot keccak256(abi.encode(bob, bytes32(0)))
+ The function explores both cases in which the receiver balance could or could not overflow.
+ Finally, the totalSupplyIsSumOfAllBalances modifier is checked.
+ */
+ function testTransferSuccess_1(address alice, address bob, uint256 amount) public totalSupplyIsSumOfAllBalances {
+ _notBuiltinAddress(alice);
+ _notBuiltinAddress(bob);
+ vm.assume(alice != bob);
+ vm.assume(alice != address(0));
+ vm.assume(bob != address(0));
+ bytes32 balanceOfAliceStorageLocation = hashedLocation(alice, BALANCES_STORAGE_INDEX);
+ bytes32 balanceOfBobStorageLocation = hashedLocation(bob, BALANCES_STORAGE_INDEX);
+ kevm.allowChangesToStorage(address(gld), uint256(balanceOfAliceStorageLocation));
+ kevm.allowChangesToStorage(address(gld), uint256(balanceOfBobStorageLocation));
+ uint256 balanceAlice = gld.balanceOf(alice);
+ uint256 balanceBob = gld.balanceOf(bob);
+ vm.assume(balanceAlice >= amount);
+ vm.assume(balanceBob <= MAX_INT - amount);
+ if (balanceBob <= MAX_INT - amount) {
+ vm.expectEmit(true, true, false, true);
+ emit IERC20.Transfer(alice, bob, amount);
+ vm.prank(alice);
+ bool status = gld.transfer(bob, amount);
+ assertTrue(status);
+ assertEq(gld.balanceOf(alice), balanceAlice - amount);
+ assertEq(gld.balanceOf(bob), balanceBob + amount);
+ } else {
+ vm.expectRevert();
+ vm.prank(alice);
+ gld.transfer(bob, amount);
+ }
+ }
+
+ /* ∀ spender, ∀ value, the approve(spender, value) call will revert when the msg.sender is address(0).
+ The storage remains unchanged.
+ */
+ function testApproveFailure_0(address spender, uint256 value, bytes32 storageSlot)
+ public
+ unchangedStorage(storageSlot)
+ {
+ vm.startPrank(address(0));
+ vm.expectRevert(abi.encodeWithSelector(IERC20Errors.ERC20InvalidApprover.selector, address(0)));
+ gld.approve(spender, value);
+ }
+
+ /* ∀ owner, ∀ value, the approve(address(0), value) call will revert for any msg.sender `owner`.
+ The storage remains unchanged.
+ */
+ function testApproveFailure_1(address owner, uint256 value, bytes32 storageSlot)
+ public
+ unchangedStorage(storageSlot)
+ {
+ _notBuiltinAddress(owner);
+ vm.assume(owner != address(0));
+ vm.startPrank(owner);
+ vm.expectRevert(abi.encodeWithSelector(IERC20Errors.ERC20InvalidSpender.selector, address(0)));
+ gld.approve(address(0), value);
+ }
+
+ /* ∀ owner, ∀ spender, ∀ amount, where owner != 0 and spender != 0, the approve(spender, value) call
+ succeed for any msg.sender `owner`.
+ The function will modify the following storage slots:
+ - _allowances[owner][spender] = slot keccak256(abi.encode(spender, keccak256(abi.encode(owner, bytes32(1)))))
+ The function explores both cases in which the receiver balance could or could not overflow.
+ Finally, the totalSupplyIsSumOfAllBalances modifier is checked, but this is not requires as the whitelist storage
+ guarantees that both the totalSupply and the _balances fields remain unchanged.
+ */
+ function testApproveSuccess(address owner, address spender, uint256 value) public totalSupplyIsSumOfAllBalances {
+ _notBuiltinAddress(owner);
+ _notBuiltinAddress(spender);
+ vm.assume(owner != address(0));
+ vm.assume(spender != address(0));
+ bytes32 storageLocation = hashedLocation(spender, uint256(hashedLocation(owner, ALLOWANCES_STORAGE_INDEX)));
+ kevm.allowChangesToStorage(address(gld), uint256(storageLocation));
+ vm.startPrank(owner);
+ vm.expectEmit(true, true, false, true);
+ emit IERC20.Approval(owner, spender, value);
+ bool status = gld.approve(spender, value);
+ assertTrue(status);
+ assertEq(gld.allowance(owner, spender), value);
+ }
+
+ /* transferFrom proofs.
+ The transfer logic has already been detailed above. The following proofs only reason about the
+ allowance.
+ */
+
+ /* ∀ spender, ∀ owner, ∀ alice, ∀ amount, where alice, owner and spender != address(0),
+ the transferFrom(spender, alice, amount) call will revert for any msg.sender `owner` when
+ the currentAllowance = _allowances[owner][spender] is less than the amount to be sent.
+ The storage remains unchanged.
+ */
+ function testTransferFromFailure(address spender, address owner, address alice, uint256 amount, bytes32 storageSlot)
+ public
+ unchangedStorage(storageSlot)
+ {
+ _notBuiltinAddress(spender);
+ _notBuiltinAddress(owner);
+ _notBuiltinAddress(alice);
+ vm.assume(spender != address(0));
+ vm.assume(owner != address(0));
+ vm.assume(alice != address(0));
+ uint256 currentAllowance = gld.allowance(owner, spender);
+ vm.assume(currentAllowance < amount);
+ vm.startPrank(spender);
+ vm.expectRevert(
+ abi.encodeWithSelector(IERC20Errors.ERC20InsufficientAllowance.selector, spender, currentAllowance, amount)
+ );
+ gld.transferFrom(owner, alice, amount);
+ }
+
+ /* ∀ spender, ∀ owner, ∀ alice, ∀ amount, where alice, owner and spender != address(0),
+ the transferFrom(spender, alice, amount) call will succeed for any msg.sender `owner` when
+ the currentAllowance = _allowances[owner][spender] is higher than the amount to be sent and
+ when the initial balance of the owner _balances[owner] is higher than the amount to be sent.
+ The function will only modify the following storage locations:
+ - _balances[owner] - slot keccak256(abi.encode(owner, bytes32(0)))
+ - _balances[alice] - slot keccak256(abi.encode(owner, bytes32(0)))
+ - _allowances[owner][spender] - slot keccak256(abi.encode(spender, keccak256(abi.encode(owner, bytes32(1)))))
+ The function explores both cases in which the allowance is infinite and in which it isn't.
+ Finally, the totalSupplyIsSumOfAllBalances asserts that the invariant still holds.
+ */
+ function testTransferFromSuccess(address spender, address owner, address alice, uint256 amount)
+ public
+ totalSupplyIsSumOfAllBalances
+ {
+ _notBuiltinAddress(spender);
+ _notBuiltinAddress(owner);
+ _notBuiltinAddress(alice);
+ vm.assume(spender != address(0));
+ vm.assume(owner != address(0));
+ vm.assume(alice != address(0));
+ bytes32 storageLocationOwner = hashedLocation(owner, BALANCES_STORAGE_INDEX);
+ bytes32 storageLocationAlice = hashedLocation(alice, BALANCES_STORAGE_INDEX);
+ bytes32 storageLocationInitialAllowance =
+ hashedLocation(spender, uint256(hashedLocation(owner, ALLOWANCES_STORAGE_INDEX)));
+ kevm.allowChangesToStorage(address(gld), uint256(storageLocationOwner));
+ kevm.allowChangesToStorage(address(gld), uint256(storageLocationAlice));
+ kevm.allowChangesToStorage(address(gld), uint256(storageLocationInitialAllowance));
+ vm.assume(gld.balanceOf(owner) >= amount);
+ uint256 initialAllowance = gld.allowance(owner, spender);
+ vm.assume(initialAllowance >= amount);
+ vm.startPrank(spender);
+ bool status = gld.transferFrom(owner, alice, amount);
+ assertTrue(status);
+ if (initialAllowance == MAX_INT) {
+ assertEq(gld.allowance(owner, spender), initialAllowance);
+ } else {
+ assertEq(gld.allowance(owner, spender), initialAllowance - amount);
+ }
+ }
+
+ /* ∀ functionSelector a bytes4 value, the execution shall revert if functionSelector is not
+ any of the known selectors:
+ - "allowance(address,address)": 0xdd62ed3e
+ - "approve(address,uint256)": 0x095ea7b3
+ - "balanceOf(address)": 0x70a08231
+ - "burn(address,uint256)": 0x9dc29fac
+ - "decimals()": 0x313ce567
+ - "mint(address,uint256)": 0x40c10f19
+ - "name()": 0x06fdde03
+ - "sumOfAllBalances()": 0xa9cf70b7
+ - "symbol()": 0x95d89b41
+ - "totalSupply()": 0x18160ddd
+ - "transfer(address,uint256)": 0xa9059cbb
+ - "transferFrom(address,address,uint256)": 0x23b872dd
+ */
+ function testCallback(bytes4 functionSelector) public {
+ vm.assume(functionSelector != 0xdd62ed3e);
+ vm.assume(functionSelector != 0x095ea7b3);
+ vm.assume(functionSelector != 0x70a08231);
+ vm.assume(functionSelector != 0x9dc29fac);
+ vm.assume(functionSelector != 0x313ce567);
+ vm.assume(functionSelector != 0x40c10f19);
+ vm.assume(functionSelector != 0x06fdde03);
+ vm.assume(functionSelector != 0xa9cf70b7);
+ vm.assume(functionSelector != 0x95d89b41);
+ vm.assume(functionSelector != 0x18160ddd);
+ vm.assume(functionSelector != 0xa9059cbb);
+ vm.assume(functionSelector != 0x23b872dd);
+ vm.expectRevert();
+ address(gld).call(abi.encodeWithSelector(functionSelector));
+ }
+}
From 3f84d273c0d543c73e0c1e43b6885760e1555eec Mon Sep 17 00:00:00 2001
From: Andrei <16517508+anvacaru@users.noreply.github.com>
Date: Mon, 22 Jul 2024 12:39:07 +0300
Subject: [PATCH 2/3] add main run-kontrol.sh
---
oz_erc20/kontrol.toml | 6 +-
oz_erc20/lemmas.k | 85 ---------------------
oz_erc20/lemmas.md | 160 ++++++++++++++++++++++++++++++++++++++++
oz_erc20/run-kontrol.sh | 3 +-
run-kontrol.sh | 70 ++++++++++++++++++
5 files changed, 235 insertions(+), 89 deletions(-)
delete mode 100644 oz_erc20/lemmas.k
create mode 100644 oz_erc20/lemmas.md
create mode 100644 run-kontrol.sh
diff --git a/oz_erc20/kontrol.toml b/oz_erc20/kontrol.toml
index 380d47b..5495a53 100644
--- a/oz_erc20/kontrol.toml
+++ b/oz_erc20/kontrol.toml
@@ -2,9 +2,9 @@
foundry-project-root = '.'
regen = false
rekompile = false
-verbose = true
+verbose = false
debug = false
-require = 'lemmas.k'
+require = 'lemmas.md'
module-import = 'TestBase:KONTROL-LEMMAS'
[prove.default]
@@ -30,5 +30,5 @@ run-constructor = false
[show.default]
foundry-project-root = '.'
-verbose = true
+verbose = false
debug = false
\ No newline at end of file
diff --git a/oz_erc20/lemmas.k b/oz_erc20/lemmas.k
deleted file mode 100644
index 800140f..0000000
--- a/oz_erc20/lemmas.k
+++ /dev/null
@@ -1,85 +0,0 @@
-requires "foundry.md"
-
-module KONTROL-LEMMAS
- imports FOUNDRY
- imports INT-SYMBOLIC
- imports MAP-SYMBOLIC
- imports SET-SYMBOLIC
-
- //
- // Equality of +Bytes
- //
-
- rule { B:Bytes #Equals B1:Bytes +Bytes B2:Bytes } =>
- { #range ( B, 0, lengthBytes(B1) ) #Equals B1 } #And
- { #range ( B, lengthBytes(B1), lengthBytes(B) -Int lengthBytes(B1) ) #Equals B2 }
- requires lengthBytes(B1) <=Int lengthBytes(B)
- [simplification(60), concrete(B, B1)]
-
- rule { B1:Bytes +Bytes B2:Bytes #Equals B } =>
- { #range ( B, 0, lengthBytes(B1) ) #Equals B1 } #And
- { #range ( B, lengthBytes(B1), lengthBytes(B) -Int lengthBytes(B1) ) #Equals B2 }
- requires lengthBytes(B1) <=Int lengthBytes(B)
- [simplification(60), concrete(B, B1)]
-
- rule { B:Bytes #Equals #buf( N, X:Int ) +Bytes B2:Bytes } =>
- { X #Equals #asWord ( #range ( B, 0, N ) ) } #And
- { #range ( B, N, lengthBytes(B) -Int N ) #Equals B2 }
- requires N <=Int lengthBytes(B)
- [simplification(60), concrete(B, N)]
-
- rule { #buf( N, X:Int ) +Bytes B2:Bytes #Equals B } =>
- { X #Equals #asWord ( #range ( B, 0, N ) ) } #And
- { #range ( B, N, lengthBytes(B) -Int N ) #Equals B2 }
- requires N <=Int lengthBytes(B)
- [simplification(60), concrete(B, N)]
-
-
- //
- // keccak assumptions: these assumptions are not sound in principle, but are
- // required for verification - they should ideally be collected at the end of execution
- //
-
- rule 0 <=Int keccak( _ ) => true [simplification, smt-lemma]
- rule keccak( _ ) true [simplification, smt-lemma]
-
- // keccak does not equal a concrete value
- rule [keccak-eq-conc-false]: keccak(_A) ==Int _B => false [symbolic(_A), concrete(_B), simplification(30), comm]
- rule [keccak-neq-conc-true]: keccak(_A) =/=Int _B => true [symbolic(_A), concrete(_B), simplification(30), comm]
- rule [keccak-eq-conc-false-ml-lr]: { keccak(A) #Equals B } => { true #Equals keccak(A) ==Int B } [symbolic(A), concrete(B), simplification]
- rule [keccak-eq-conc-false-ml-rl]: { B #Equals keccak(A) } => { true #Equals keccak(A) ==Int B } [symbolic(A), concrete(B), simplification]
-
- // keccak is injective
- rule [keccak-inj]: keccak(A) ==Int keccak(B) => A ==K B [simplification]
- rule [keccak-inj-ml]: { keccak(A) #Equals keccak(B) } => { true #Equals A ==K B } [simplification]
-
- // chop of negative keccak
- rule chop (0 -Int keccak(BA)) => pow256 -Int keccak(BA)
- [simplification]
-
- // keccak cannot equal a number outside of its range
- rule { X #Equals keccak (_) } => #Bottom
- requires X =Int pow256
- [concrete(X), simplification]
-
-
- // Lookup simplifications
- rule #lookup (M:Map [ K1 <- #lookup(M, K1)], K2) => #lookup (M, K2) [simplification]
-
- rule #lookup (M:Map [ K1 <- #lookup (M, K1)] [ K2 <- #lookup (M, K2)], K3) => #lookup (M, K3) [simplification]
-
- // Map simplifications
- rule M:Map [K1 <- _V1] [K2 <- V2] [K1 <-V3] => M:Map [K2 <- V2] [K1 <- V3] [simplification]
-
-
- rule X |Int #asWord ( Y ) =>
- #asWord ( #buf ( 32 -Int lengthBytes(Y), X >>Int ( 8 *Int lengthBytes(Y) ) ) +Bytes #buf ( lengthBytes(Y), #asWord (Y) ) )
- requires #rangeUInt(256, X) andBool lengthBytes(Y) <=Int 32
- andBool X modInt ( 2 ^Int ( 8 *Int ( 32 -Int lengthBytes(Y) ) ) ) ==Int 0
- [simplification(60), concrete(X), preserves-definedness]
-
- // List simplifications
- rule E1 in ListItem(E2) L => E1 ==K E2 orBool E1 in L [simplification]
- rule X in .List => false [simplification]
-
-endmodule
\ No newline at end of file
diff --git a/oz_erc20/lemmas.md b/oz_erc20/lemmas.md
new file mode 100644
index 0000000..e56c8e2
--- /dev/null
+++ b/oz_erc20/lemmas.md
@@ -0,0 +1,160 @@
+Kontrol Lemmas
+==============
+
+Lemmas are K rewrite rules that enhance the reasoning power of Kontrol. For more information on lemmas, please consult [this section](https://docs.runtimeverification.com/kontrol/guides/advancing-proofs) of the Kontrol documentation.
+
+This file contains the lemmas required to run the proofs included in the [GLDToken.t.sol](./test/kontrol/proofs/GLDToken.t.sol) file. Some of these lemmas are general enough to likely be incorporated into future versions of Kontrol, while others are specific to the challenges presented by the proofs.
+
+Similarly to other files such as [`cheatcodes.md`](https://github.com/runtimeverification/kontrol/blob/master/src/kontrol/kdist/cheatcodes.md), we use the idiomatic way of programming in Kontrol, which is [literate programming](https://en.wikipedia.org/wiki/Literate_programming), allowing for better documentation of the code.
+
+## Imports
+
+For writing the lemmas, we use the [`foundry.md`](https://github.com/runtimeverification/kontrol/blob/master/src/kontrol/kdist/foundry.md) file. This file contains and imports all of the definitions from KEVM and Kontrol on top of which we write the lemmas.
+
+```k
+requires "foundry.md"
+
+module KONTROL-LEMMAS
+ imports FOUNDRY
+ imports INT-SYMBOLIC
+ imports MAP-SYMBOLIC
+ imports SET-SYMBOLIC
+```
+
+## Bytes Equality
+
+These lemmas ensure that concatenations and buffer operations within the [Bytes](https://github.com/runtimeverification/k/blob/master/k-distribution/include/kframework/builtin/domains.md#byte-arrays) sort follow consistent equality principles.
+
+```k
+ //
+ // Equality of +Bytes
+ //
+
+ // Equality of Concatenated Bytes (Direct)
+ rule { B:Bytes #Equals B1:Bytes +Bytes B2:Bytes } =>
+ { #range ( B, 0, lengthBytes(B1) ) #Equals B1 } #And
+ { #range ( B, lengthBytes(B1), lengthBytes(B) -Int lengthBytes(B1) ) #Equals B2 }
+ requires lengthBytes(B1) <=Int lengthBytes(B)
+ [simplification(60), concrete(B, B1)]
+
+ // Equality of Concatenated Bytes (Reverse)
+ rule { B1:Bytes +Bytes B2:Bytes #Equals B } =>
+ { #range ( B, 0, lengthBytes(B1) ) #Equals B1 } #And
+ { #range ( B, lengthBytes(B1), lengthBytes(B) -Int lengthBytes(B1) ) #Equals B2 }
+ requires lengthBytes(B1) <=Int lengthBytes(B)
+ [simplification(60), concrete(B, B1)]
+
+ // Equality with a Padded Integer (Direct)
+ rule { B:Bytes #Equals #buf( N, X:Int ) +Bytes B2:Bytes } =>
+ { X #Equals #asWord ( #range ( B, 0, N ) ) } #And
+ { #range ( B, N, lengthBytes(B) -Int N ) #Equals B2 }
+ requires N <=Int lengthBytes(B)
+ [simplification(60), concrete(B, N)]
+
+ // Equality with a Padded Integer (Reverse)
+ rule { #buf( N, X:Int ) +Bytes B2:Bytes #Equals B } =>
+ { X #Equals #asWord ( #range ( B, 0, N ) ) } #And
+ { #range ( B, N, lengthBytes(B) -Int N ) #Equals B2 }
+ requires N <=Int lengthBytes(B)
+ [simplification(60), concrete(B, N)]
+```
+
+## Keccak assumptions
+
+The provided K Lemmas define assumptions and properties related to the keccak hash function used in the verification of smart contracts within the symbolic execution context.
+
+1. The result of the `keccak` function is always a non-negative integer, and it is always less than 2^256.
+
+```k
+ rule 0 <=Int keccak( _ ) => true [simplification, smt-lemma]
+ rule keccak( _ ) true [simplification, smt-lemma]
+```
+
+2. The result of the `keccak` function applied on a symbolic input does not equal any concrete value.
+
+```k
+ // keccak does not equal a concrete value
+ rule [keccak-eq-conc-false]: keccak(_A) ==Int _B => false [symbolic(_A), concrete(_B), simplification(30), comm]
+ rule [keccak-neq-conc-true]: keccak(_A) =/=Int _B => true [symbolic(_A), concrete(_B), simplification(30), comm]
+```
+
+In addition, equality involving keccak of a symbolic variable is reduced to a comparison that always results in `false` for concrete values.
+
+```k
+ rule [keccak-eq-conc-false-ml-lr]: { keccak(A) #Equals B } => { true #Equals keccak(A) ==Int B } [symbolic(A), concrete(B), simplification]
+ rule [keccak-eq-conc-false-ml-rl]: { B #Equals keccak(A) } => { true #Equals keccak(A) ==Int B } [symbolic(A), concrete(B), simplification]
+```
+
+3. Injectivity of Keccak. If `keccak(A)` equals `keccak(B)`, then `A` must equal `B`.
+
+In reality, cryptographic hash functions like `keccak` are not injective. They are designed to be collision-resistant, meaning it is computationally infeasible to find two different inputs that produce the same hash output, but not impossible.
+The assumption of injectivity simplifies reasoning about the keccak function in formal verification, but it is not fundamentally true. It is used to aid in the verification process.
+
+```k
+ // keccak is injective
+ rule [keccak-inj]: keccak(A) ==Int keccak(B) => A ==K B [simplification]
+ rule [keccak-inj-ml]: { keccak(A) #Equals keccak(B) } => { true #Equals A ==K B } [simplification]
+```
+
+4. Negating keccak. Instead of allowing a negative value, the rule adjusts it within the valid range, ensuring the value remains non-negative.
+
+```k
+ // chop of negative keccak
+ rule chop (0 -Int keccak(BA)) => pow256 -Int keccak(BA)
+ [simplification]
+```
+
+5. Ensure that any value resulting from a `keccak` is within the valid range of 0 and 2^256 - 1.
+
+```k
+ // keccak cannot equal a number outside of its range
+ rule { X #Equals keccak (_) } => #Bottom
+ requires X =Int pow256
+ [concrete(X), simplification]
+```
+
+
+## Lookup simplifications
+
+These lemmas are used to simplify [#lookups](https://github.com/runtimeverification/evm-semantics/blob/85b99bea64fa3d77a826ca51ca07a605d92d3dc4/kevm-pyk/src/kevm_pyk/kproj/evm-semantics/evm-types.md?plain=1#L404-L422) and [map updates](https://github.com/runtimeverification/k/blob/master/k-distribution/include/kframework/builtin/domains.md#map-update).
+
+When you `lookup` a value for a key `K1` in a map `M` and then update the map `M` with the result, looking up another key `K2` can directly use the original map `M`. The intermediate update with the same key does not affect the lookup for other keys.
+
+```k
+ // Single Key Lookup Simplification
+ rule #lookup (M:Map [ K1 <- #lookup (M, K1)], K2) => #lookup (M, K2) [simplification]
+ // Multiple Key Lookup Simplification
+ rule #lookup (M:Map [ K1 <- #lookup (M, K1)] [ K2 <- #lookup (M, K2)], K3) => #lookup (M, K3) [simplification]
+```
+
+## Map update simplifications.
+
+When a map `M` is updated multiple times with values for the same key `K1`, we can directly apply the final update for key `K1`.
+
+```k
+ // Map simplifications
+ rule M:Map [K1 <- _V1] [K2 <- V2] [K1 <-V3] => M:Map [K2 <- V2] [K1 <- V3] [simplification]
+
+```
+
+## Bitwise Or simplification.
+
+This one is used to simplify operations that involve the function selector of a solidity Error type and the arguments provided for a `vm.expectRevert` cheatcode. Because some arguments are symbolic, the bitwise operations cannot be applied directly, requiring a simplification lemma like the one below.
+
+```k
+ rule X |Int #asWord ( Y ) =>
+ #asWord ( #buf ( 32 -Int lengthBytes(Y), X >>Int ( 8 *Int lengthBytes(Y) ) ) +Bytes #buf ( lengthBytes(Y), #asWord (Y) ) )
+ requires #rangeUInt(256, X) andBool lengthBytes(Y) <=Int 32
+ andBool X modInt ( 2 ^Int ( 8 *Int ( 32 -Int lengthBytes(Y) ) ) ) ==Int 0
+ [simplification(60), concrete(X), preserves-definedness]
+```
+
+## List containment simplifications.
+
+```k
+ // List simplifications
+ rule E1 in ListItem(E2) L => E1 ==K E2 orBool E1 in L [simplification]
+ rule X in .List => false [simplification]
+
+endmodule
+```
diff --git a/oz_erc20/run-kontrol.sh b/oz_erc20/run-kontrol.sh
index bbad6f0..9b2996f 100755
--- a/oz_erc20/run-kontrol.sh
+++ b/oz_erc20/run-kontrol.sh
@@ -1,4 +1,5 @@
-#!/bin/bash
+#!/usr/bin/env bash
+set -uxo pipefail
kontrol build
kontrol prove
\ No newline at end of file
diff --git a/run-kontrol.sh b/run-kontrol.sh
new file mode 100644
index 0000000..0e6df49
--- /dev/null
+++ b/run-kontrol.sh
@@ -0,0 +1,70 @@
+#!/usr/bin/env bash
+set -uxo pipefail
+
+run_folder() {
+ local folder=$1
+ if [ -d "$folder" ]; then
+ folder=$(basename "$folder")
+ cd "$folder" || exit
+ if [ -x "./run-kontrol.sh" ]; then
+ echo "Running Kontrol in $folder."
+ ./run-kontrol.sh || true
+ else
+ echo "No executable run-kontrol.sh found in $folder."
+ fi
+ cd ..
+ fi
+}
+
+clean_folder() {
+ local folder=$1
+ if [ -d "$folder" ]; then
+ folder=$(basename "$folder")
+ cd "$folder" || exit
+ if [ -n "${FOUNDRY_PROFILE+x}" ]; then
+ echo "Found Foundry profile $FOUNDRY_PROFILE"
+ kontrol clean
+ unset FOUNDRY_PROFILE
+ fi
+ if [ "$folder" = "3-proof-debugging" ]; then
+ FOUNDRY_PROFILE=lemmas kontrol clean
+ unset FOUNDRY_PROFILE
+ fi
+ kontrol clean
+ echo "Cleaned $folder"
+ cd ..
+ fi
+}
+
+error_message() {
+ echo "Provide no arguments to execute all folders."
+ echo "Provide one folder name to execute it individually."
+ echo "Provide 'clean' to clean all folders"
+ echo "Provide 'clean \$folder' to clean \$folder"
+ exit 1
+}
+
+if [ "$#" -eq 0 ]; then
+ for folder in ./*; do
+ run_folder "$folder"
+ done
+elif [ "$#" -eq 1 ]; then
+ if [ -d "$1" ]; then
+ run_folder "$1"
+ elif [ "$1" = "clean" ]; then
+ for folder in ./*; do
+ clean_folder "$folder"
+ done
+ else
+ echo "$1 is not a folder nor 'clean'!"
+ exit 1
+ fi
+elif [ "$#" -eq 2 ]; then
+ if [ "$1" = "clean" ] && [ -d "$2" ]; then
+ clean_folder "$2"
+ else
+ error_message
+ fi
+else
+ error_message
+fi
\ No newline at end of file
From ad9bf4bc97b43b5dd1d166553065fd92139a2f95 Mon Sep 17 00:00:00 2001
From: Andrei <16517508+anvacaru@users.noreply.github.com>
Date: Mon, 22 Jul 2024 13:03:09 +0300
Subject: [PATCH 3/3] permissions
---
run-kontrol.sh | 0
1 file changed, 0 insertions(+), 0 deletions(-)
mode change 100644 => 100755 run-kontrol.sh
diff --git a/run-kontrol.sh b/run-kontrol.sh
old mode 100644
new mode 100755