This repo contains execution code and artifacts related to Base contract deployments, upgrades, and calls. For actual contract implementations, see base-org/contracts.
This repo is structured with each network having a high-level directory which contains subdirectories of any "tasks" (contract deployments/calls) that have happened for that network.
First, install forge if you don't have it already:
- Run
make install-foundry
to installFoundry
.
To execute a new task, run one of the following commands (depending on the type of change you're making):
- For incident response commands:
make setup-incident network=<network> incident=<incident-name>
- For full new deployment (of L1 contracts related to Base):
make setup-deploy network=<network>
- For contract calls, upgrades, or one-off contract deployments:
make setup-task network=<network> task=<task-name>
Next, cd
into the directory that was created for you and follow the steps listed below for the relevant template.
Each task will have a directory structure similar to the following:
- inputs/ any input JSON files
- records/ Foundry will autogenerate files here from running commands
- script/ place to store any one-off Foundry scripts
- src/ place to store any one-off smart contracts (long-lived contracts should go in base-org/contracts)
- .env place to store environment variables specific to this task
This template contains scripts that will help us respond to incidents efficiently.
To use the template during an incident:
- Fill in the
.env
file with dependency commit numbers and any variables that need to be defined for the script you're running. - Delete the other scripts that are not being used so that you don't run into build issues.
- Make sure the code compiles and check in the code.
- Have each signer pull the branch, and run the relevant signing command from the Makefile.
To add new incident response scripts:
- Any incident response-related scripts should be included in this template (should be generic, not specific to network), with specific TODOs wherever addresses or other details need to be filled in.
- Add the relevant make commands that would need to be run for the script to the template Makefile
- Add relevant mainnet addresses in comments to increase efficiency responding to an incident.
This template is used for deploying the L1 contracts in the OP stack to set up a new network.
- Ensure you have followed the instructions above in
setup
- Rename the folder to something more descriptive
- Specify the commit of Optimism code and Base contracts code you intend to use in the
.env
file - Run
make deps
- Fill in the
inputs/deploy-config.json
andinputs/misc-config.json
files with the input variables for the deployment. - See the example
make deploy
command. Modifications may need to be made if you're using a key for deployment that you do not have the private key for (e.g. a hardware wallet) - Run
make deploy
command - Check in files to GitHub. The files to ignore should already have been specified in the
.gitignore
, so you should be able to check in everything.
This template can be used to do contract calls, upgrades, or one-off deployments.
- Specify the commit of Optimism code and Base contracts code you intend to use in the
.env
file - Run
make deps
- Put scripts in the
scripts
directory (see examples that are part of the template, for example, there is a fileTransferOwner.s.sol
, which can be used to set up the ownership transfer task). See note below if running a task that requires a multisig to sign. - Call scripts from the Makefile (see examples in the template Makefile that's copied over).
Note: If using a multisig as a signer, you can leverage the MultisigBuilder
for standard multisigs or the NestedMultisigBuilder
scripts in the base contracts repo for multisigs that contain other multisigs as signers. For these scripts, you need to implement the virtual functions that are provided, which will allow you to configure the task you'd like to run, the address of the multisig you're running it from, and any post-execution checks. See the files themselves for more details. It is recommended to add any configured addresses as constants at the top of the file and provide links to Etherscan, etc., as needed for reviewers to more accurately review the PR.