• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

safe-global / safe-cli / 11343896716

15 Oct 2024 10:09AM CUT coverage: 88.64%. Remained the same
11343896716

push

github

Uxio0
Bump flake8 from 7.1.0 to 7.1.1

Bumps [flake8](https://github.com/pycqa/flake8) from 7.1.0 to 7.1.1.
- [Commits](https://github.com/pycqa/flake8/compare/7.1.0...7.1.1)

---
updated-dependencies:
- dependency-name: flake8
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

221 of 262 branches covered (84.35%)

Branch coverage included in aggregate %.

2869 of 3224 relevant lines covered (88.99%)

3.56 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

68.38
/src/safe_cli/operators/safe_tx_service_operator.py
1
import json
4✔
2
from itertools import chain
4✔
3
from typing import Any, Dict, Optional, Sequence, Set, Union
4✔
4

5
from colorama import Fore, Style
4✔
6
from eth_account.messages import defunct_hash_message
4✔
7
from eth_account.signers.local import LocalAccount
4✔
8
from eth_typing import ChecksumAddress
4✔
9
from hexbytes import HexBytes
4✔
10
from prompt_toolkit import HTML, print_formatted_text
4✔
11
from tabulate import tabulate
4✔
12

13
from gnosis.eth.contracts import get_erc20_contract
4✔
14
from gnosis.eth.eip712 import eip712_encode_hash
4✔
15
from gnosis.safe import SafeOperationEnum, SafeTx
4✔
16
from gnosis.safe.api import SafeAPIException
4✔
17
from gnosis.safe.api.transaction_service_api.transaction_service_messages import (
4✔
18
    get_remove_transaction_message,
19
)
20
from gnosis.safe.multi_send import MultiSend, MultiSendOperation, MultiSendTx
4✔
21
from gnosis.safe.safe_signature import SafeSignature
4✔
22
from gnosis.safe.signatures import signature_to_bytes
4✔
23

24
from ..utils import get_input, yes_or_no_question
4✔
25
from . import SafeServiceNotAvailable
4✔
26
from .exceptions import AccountNotLoadedException, NonExistingOwnerException
4✔
27
from .hw_wallets.hw_wallet import HwWallet
4✔
28
from .safe_operator import SafeOperator
4✔
29

30

31
class SafeTxServiceOperator(SafeOperator):
4✔
32
    def __init__(self, address: str, node_url: str):
4✔
33
        super().__init__(address, node_url)
4✔
34
        if not self.safe_tx_service:
4✔
35
            raise SafeServiceNotAvailable(
4✔
36
                f"Cannot configure tx service for network {self.network.name}"
37
            )
38
        self.require_all_signatures = (
4✔
39
            False  # It doesn't require all signatures to be present to send a tx
40
        )
41

42
    def approve_hash(self, hash_to_approve: HexBytes, sender: str) -> bool:
4✔
43
        raise NotImplementedError("Not supported when using tx service")
44

45
    def sign_message(
4✔
46
        self,
47
        eip712_message_path: Optional[str] = None,
48
    ) -> bool:
49
        if eip712_message_path:
×
50
            try:
×
51
                message = json.load(open(eip712_message_path, "r"))
×
52
                message_hash = eip712_encode_hash(message)
×
53
            except ValueError:
×
54
                raise ValueError
×
55
        else:
56
            print_formatted_text("EIP191 message to sign:")
×
57
            message = get_input()
×
58
            message_hash = defunct_hash_message(text=message)
×
59

60
        safe_message_hash = self.safe.get_message_hash(message_hash)
×
61
        eoa_signers, hw_wallet_signers = self.get_signers()
×
62
        # Safe transaction service just accept one signer to create a message
63
        signature = b""
×
64
        if eoa_signers:
×
65
            signature_dict = eoa_signers[0].signHash(safe_message_hash)
×
66
            signature = signature_to_bytes(
×
67
                signature_dict["v"], signature_dict["r"], signature_dict["s"]
68
            )
69

70
        elif hw_wallet_signers:
×
71
            signature = SafeSignature.export_signatures(
×
72
                self.hw_wallet_manager.sign_message(
73
                    safe_message_hash, [hw_wallet_signers[0]]
74
                )
75
            )
76
        else:
77
            print_formatted_text(
×
78
                HTML("<ansired>At least one owner must be loaded</ansired>")
79
            )
80

81
        if self.safe_tx_service.post_message(self.address, message, signature):
×
82
            print_formatted_text(
×
83
                HTML(
84
                    f"<ansigreen>Message  with safe-message-hash {safe_message_hash.hex()} was correctly created on Safe Transaction Service</ansigreen>"
85
                )
86
            )
87
            return True
×
88
        else:
89
            print_formatted_text(
×
90
                HTML(
91
                    "<ansired>Something went wrong creating message on Safe Transaction Service</ansired>"
92
                )
93
            )
94
            return False
×
95

96
    def confirm_message(self, safe_message_hash: bytes, sender: ChecksumAddress):
4✔
97
        # GET message
98
        try:
4✔
99
            safe_message = self.safe_tx_service.get_message(safe_message_hash)
4✔
100
        except SafeAPIException:
×
101
            print_formatted_text(
×
102
                HTML(
103
                    f"<ansired>Message with hash {safe_message_hash.hex()} does not exist</ansired>"
104
                )
105
            )
106
        if not yes_or_no_question(
4✔
107
            f"Message: {safe_message['message']} \n Do you want to sign the following message?:"
108
        ):
109
            return False
×
110

111
        signer = self.search_account(sender)
4✔
112
        if not signer:
4✔
113
            print_formatted_text(
×
114
                HTML(f"<ansired>Owner with address {sender} was not loaded</ansired>")
115
            )
116

117
        if isinstance(signer, LocalAccount):
4✔
118
            signature = signer.signHash(safe_message_hash).signature
4✔
119
        else:
120
            signature = SafeSignature.export_signatures(
×
121
                self.hw_wallet_manager.sign_message(safe_message_hash, [signer])
122
            )
123

124
        try:
4✔
125
            self.safe_tx_service.post_message_signature(safe_message_hash, signature)
4✔
126
        except SafeAPIException as e:
4✔
127
            print_formatted_text(
4✔
128
                HTML(f"<ansired>Message wasn't confirmed due an error: {e}</ansired>")
129
            )
130
            return False
4✔
131
        print_formatted_text(
4✔
132
            HTML(
133
                f"<ansigreen>Message with safe-message-hash {safe_message_hash.hex()} was correctly confirmed on Safe Transaction Service</ansigreen>"
134
            )
135
        )
136
        return True
4✔
137

138
    def get_delegates(self):
4✔
139
        delegates = self.safe_tx_service.get_delegates(self.address)
4✔
140
        headers = ["delegate", "delegator", "label"]
4✔
141
        rows = []
4✔
142
        for delegate in delegates:
4✔
143
            row = [delegate["delegate"], delegate["delegator"], delegate["label"]]
4✔
144
            rows.append(row)
4✔
145
        print(tabulate(rows, headers=headers))
4✔
146
        return rows
4✔
147

148
    def add_delegate(self, delegate_address: str, label: str, signer_address: str):
4✔
149
        signer_account = [
4✔
150
            account for account in self.accounts if account.address == signer_address
151
        ]
152
        if not signer_account:
4✔
153
            raise AccountNotLoadedException(signer_address)
×
154
        elif signer_address not in self.safe_cli_info.owners:
4✔
155
            raise NonExistingOwnerException(signer_address)
×
156
        else:
157
            signer_account = signer_account[0]
4✔
158
            try:
4✔
159
                hash_to_sign = self.safe_tx_service.create_delegate_message_hash(
4✔
160
                    delegate_address
161
                )
162
                signature = signer_account.signHash(hash_to_sign)
4✔
163
                self.safe_tx_service.add_delegate(
4✔
164
                    delegate_address,
165
                    signer_account.address,
166
                    label,
167
                    signature.signature,
168
                    safe_address=self.address,
169
                )
170
                return True
4✔
171
            except SafeAPIException:
×
172
                return False
×
173

174
    def remove_delegate(self, delegate_address: str, signer_address: str):
4✔
175
        signer_account = [
4✔
176
            account for account in self.accounts if account.address == signer_address
177
        ]
178
        if not signer_account:
4✔
179
            raise AccountNotLoadedException(signer_address)
×
180
        elif signer_address not in self.safe_cli_info.owners:
4✔
181
            raise NonExistingOwnerException(signer_address)
×
182
        else:
183
            signer_account = signer_account[0]
4✔
184
            try:
4✔
185
                hash_to_sign = self.safe_tx_service.create_delegate_message_hash(
4✔
186
                    delegate_address
187
                )
188
                signature = signer_account.signHash(hash_to_sign)
4✔
189
                self.safe_tx_service.remove_delegate(
4✔
190
                    delegate_address,
191
                    signer_account.address,
192
                    signature.signature,
193
                    safe_address=self.address,
194
                )
195
                return True
4✔
196
            except SafeAPIException:
×
197
                return False
×
198

199
    def submit_signatures(self, safe_tx_hash: bytes) -> bool:
4✔
200
        """
201
        Submit signatures to the tx service
202

203
        :return:
204
        """
205

206
        safe_tx, tx_hash = self.safe_tx_service.get_safe_transaction(safe_tx_hash)
4✔
207
        safe_tx.signatures = b""  # Don't post again existing signatures
4✔
208
        if tx_hash:
4✔
209
            print_formatted_text(
4✔
210
                HTML(
211
                    f"<ansired>Tx with safe-tx-hash {safe_tx_hash.hex()} "
212
                    f"has already been executed on {tx_hash.hex()}</ansired>"
213
                )
214
            )
215
        else:
216
            safe_tx = self.sign_transaction(safe_tx)
4✔
217
            if safe_tx.signers:
4✔
218
                self.safe_tx_service.post_signatures(safe_tx_hash, safe_tx.signatures)
4✔
219
                print_formatted_text(
4✔
220
                    HTML(
221
                        f"<ansigreen>{len(safe_tx.signers)} signatures were submitted to the tx service</ansigreen>"
222
                    )
223
                )
224
                return True
4✔
225
            else:
226
                print_formatted_text(
4✔
227
                    HTML(
228
                        "<ansired>Cannot generate signatures as there were no suitable signers</ansired>"
229
                    )
230
                )
231
        return False
4✔
232

233
    def batch_txs(self, safe_nonce: int, safe_tx_hashes: Sequence[bytes]) -> bool:
4✔
234
        """
235
        Submit signatures to the tx service. It's recommended to be on Safe v1.3.0 to prevent issues
236
        with `safeTxGas` and gas estimation.
237

238
        :return:
239
        """
240

241
        try:
4✔
242
            multisend = MultiSend(ethereum_client=self.ethereum_client)
4✔
243
        except ValueError:
×
244
            print_formatted_text(
×
245
                HTML(
246
                    "<ansired>Multisend contract is not deployed on this network and it's required for "
247
                    "batching txs</ansired>"
248
                )
249
            )
250

251
        multisend_txs = []
4✔
252
        for safe_tx_hash in safe_tx_hashes:
4✔
253
            safe_tx, _ = self.safe_tx_service.get_safe_transaction(safe_tx_hash)
4✔
254
            # Check if call is already a Multisend call
255
            inner_txs = MultiSend.from_transaction_data(safe_tx.data)
4✔
256
            if inner_txs:
4✔
257
                multisend_txs.extend(inner_txs)
×
258
            else:
259
                multisend_txs.append(
4✔
260
                    MultiSendTx(
261
                        MultiSendOperation.CALL, safe_tx.to, safe_tx.value, safe_tx.data
262
                    )
263
                )
264

265
        if len(multisend_txs) > 1:
4✔
266
            safe_tx = SafeTx(
×
267
                self.ethereum_client,
268
                self.address,
269
                multisend.address,
270
                0,
271
                multisend.build_tx_data(multisend_txs),
272
                SafeOperationEnum.DELEGATE_CALL.value,
273
                0,
274
                0,
275
                0,
276
                None,
277
                None,
278
                safe_nonce=safe_nonce,
279
            )
280
        else:
281
            safe_tx.safe_tx_gas = 0
4✔
282
            safe_tx.base_gas = 0
4✔
283
            safe_tx.gas_price = 0
4✔
284
            safe_tx.signatures = b""
4✔
285
            safe_tx.safe_nonce = safe_nonce  # Resend single transaction
4✔
286
        safe_tx = self.sign_transaction(safe_tx)
4✔
287
        if not safe_tx.signatures:
4✔
288
            print_formatted_text(
×
289
                HTML("<ansired>At least one owner must be loaded</ansired>")
290
            )
291
            return False
×
292
        else:
293
            return self.post_transaction_to_tx_service(safe_tx)
4✔
294

295
    def execute_tx(self, safe_tx_hash: Sequence[bytes]) -> bool:
4✔
296
        """
297
        Submit transaction on the tx-service to blockchain
298

299
        :return:
300
        """
301
        safe_tx, tx_hash = self.safe_tx_service.get_safe_transaction(safe_tx_hash)
×
302
        if tx_hash:
×
303
            print_formatted_text(
×
304
                HTML(
305
                    f"<ansired>Tx with safe-tx-hash {safe_tx_hash.hex()} "
306
                    f"has already been executed on {tx_hash.hex()}</ansired>"
307
                )
308
            )
309
        elif len(safe_tx.signers) < self.safe_cli_info.threshold:
×
310
            print_formatted_text(
×
311
                HTML(
312
                    f"<ansired>Number of signatures {len(safe_tx.signers)} "
313
                    f"must reach the threshold {self.safe_cli_info.threshold}</ansired>"
314
                )
315
            )
316
        else:
317
            if executed := self.execute_safe_transaction(safe_tx):
×
318
                self.refresh_safe_cli_info()
×
319
            return executed
×
320

321
    def get_balances(self):
4✔
322
        balances = self.safe_tx_service.get_balances(self.address)
4✔
323
        headers = ["name", "balance", "symbol", "decimals", "tokenAddress"]
4✔
324
        rows = []
4✔
325
        for balance in balances:
4✔
326
            if balance["tokenAddress"]:  # Token
4✔
327
                row = [
4✔
328
                    balance["token"]["name"],
329
                    f"{int(balance['balance']) / 10 ** int(balance['token']['decimals']):.5f}",
330
                    balance["token"]["symbol"],
331
                    balance["token"]["decimals"],
332
                    balance["tokenAddress"],
333
                ]
334
            else:  # Ether
335
                row = [
4✔
336
                    "ETHER",
337
                    f"{int(balance['balance']) / 10 ** 18:.5f}",
338
                    "Ξ",
339
                    18,
340
                    "",
341
                ]
342
            rows.append(row)
4✔
343
        print(tabulate(rows, headers=headers))
4✔
344
        return rows
4✔
345

346
    def get_transaction_history(self):
4✔
347
        transactions = self.safe_tx_service.get_transactions(self.address)
4✔
348
        headers = ["nonce", "to", "value", "transactionHash", "safeTxHash"]
4✔
349
        rows = []
4✔
350
        last_executed_tx = False
4✔
351
        for transaction in transactions:
4✔
352
            row = [transaction[header] for header in headers]
4✔
353
            data_decoded: Dict[str, Any] = transaction.get("dataDecoded")
4✔
354
            if data_decoded:
4✔
355
                row.append(self.safe_tx_service.data_decoded_to_text(data_decoded))
4✔
356
            if transaction["transactionHash"]:
4✔
357
                if not transaction["isSuccessful"]:
4✔
358
                    # Transaction failed
359
                    row[0] = Fore.RED + str(row[0])
×
360
                else:
361
                    row[0] = Fore.GREEN + str(
4✔
362
                        row[0]
363
                    )  # For executed transactions we use green
364
                    if not last_executed_tx:
4✔
365
                        row[0] = Style.BRIGHT + row[0]
4✔
366
                        last_executed_tx = True
4✔
367
            else:
368
                row[0] = Fore.YELLOW + str(
×
369
                    row[0]
370
                )  # For non executed transactions we use yellow
371

372
            row[0] = Style.RESET_ALL + row[0]  # Reset all just in case
4✔
373
            rows.append(row)
4✔
374

375
        headers.append("dataDecoded")
4✔
376
        headers[0] = Style.BRIGHT + headers[0]
4✔
377
        print(tabulate(rows, headers=headers))
4✔
378
        return rows
4✔
379

380
    def prepare_and_execute_safe_transaction(
4✔
381
        self,
382
        to: str,
383
        value: int,
384
        data: bytes,
385
        operation: SafeOperationEnum = SafeOperationEnum.CALL,
386
        safe_nonce: Optional[int] = None,
387
    ) -> bool:
388
        safe_tx = self.prepare_safe_transaction(
×
389
            to, value, data, operation, safe_nonce=safe_nonce
390
        )
391
        return self.post_transaction_to_tx_service(safe_tx)
×
392

393
    def post_transaction_to_tx_service(self, safe_tx: SafeTx) -> bool:
4✔
394
        if not yes_or_no_question(
4✔
395
            f"Do you want to send the tx with safe-tx-hash={safe_tx.safe_tx_hash.hex()} to Safe Transaction Service (it will not be executed) "
396
            + str(safe_tx)
397
        ):
398
            return False
×
399

400
        self.safe_tx_service.post_transaction(safe_tx)
4✔
401
        print_formatted_text(
4✔
402
            HTML(
403
                f"<ansigreen>Tx with safe-tx-hash={safe_tx.safe_tx_hash.hex()} was sent to Safe Transaction service</ansigreen>"
404
            )
405
        )
406
        return True
4✔
407

408
    def get_permitted_signers(self) -> Set[ChecksumAddress]:
4✔
409
        """
410
        :return: Owners and delegates, as they also can sign a transaction for the tx service
411
        """
412
        owners = super().get_permitted_signers()
4✔
413
        owners.update(
4✔
414
            [
415
                row["delegate"]
416
                for row in self.safe_tx_service.get_delegates(self.address)
417
            ]
418
        )
419
        return owners
4✔
420

421
    # Function that sends all assets to an account (to)
422
    def drain(self, to: ChecksumAddress):
4✔
423
        balances = self.safe_tx_service.get_balances(self.address)
×
424
        safe_txs = []
×
425
        safe_tx = None
×
426
        for balance in balances:
×
427
            amount = int(balance["balance"])
×
428
            if balance["tokenAddress"] is None:  # Then is ether
×
429
                if amount != 0:
×
430
                    safe_tx = self.prepare_safe_transaction(
×
431
                        to,
432
                        amount,
433
                        b"",
434
                        SafeOperationEnum.CALL,
435
                        safe_nonce=None,
436
                    )
437
            else:
438
                transaction = (
×
439
                    get_erc20_contract(self.ethereum_client.w3, balance["tokenAddress"])
440
                    .functions.transfer(to, amount)
441
                    .build_transaction({"from": self.address, "gas": 0, "gasPrice": 0})
442
                )
443
                safe_tx = self.prepare_safe_transaction(
×
444
                    balance["tokenAddress"],
445
                    0,
446
                    HexBytes(transaction["data"]),
447
                    SafeOperationEnum.CALL,
448
                    safe_nonce=None,
449
                )
450
            if safe_tx:
×
451
                safe_txs.append(safe_tx)
×
452
        if len(safe_txs) > 0:
×
453
            multisend_tx = self.batch_safe_txs(safe_tx.safe_nonce, safe_txs)
×
454
            if multisend_tx is not None:
×
455
                self.post_transaction_to_tx_service(multisend_tx)
×
456
                print_formatted_text(
×
457
                    HTML(
458
                        "<ansigreen>Transaction to drain account correctly created</ansigreen>"
459
                    )
460
                )
461
        else:
462
            print_formatted_text(
×
463
                HTML("<ansigreen>Safe account is currently empty</ansigreen>")
464
            )
465

466
    def search_account(
4✔
467
        self, address: ChecksumAddress
468
    ) -> Optional[Union[LocalAccount, HwWallet]]:
469
        """
470
        Search the provided address between loaded owners
471

472
        :param address:
473
        :return: LocalAccount or HwWallet of the provided address
474
        """
475
        for account in chain(self.accounts, self.hw_wallet_manager.wallets):
4✔
476
            if account.address == address:
4✔
477
                return account
4✔
478

479
    def remove_proposed_transaction(self, safe_tx_hash: bytes):
4✔
480
        eip712_message = get_remove_transaction_message(
4✔
481
            self.address, safe_tx_hash, self.ethereum_client.get_chain_id()
482
        )
483
        message_hash = eip712_encode_hash(eip712_message)
4✔
484
        try:
4✔
485
            safe_tx, _ = self.safe_tx_service.get_safe_transaction(safe_tx_hash)
4✔
486
            signer = self.search_account(safe_tx.proposer)
4✔
487
            if not signer:
4✔
488
                print_formatted_text(
4✔
489
                    HTML(
490
                        f"<ansired>The proposer with address: {safe_tx.proposer} was not loaded</ansired>"
491
                    )
492
                )
493
                return False
4✔
494

495
            if isinstance(signer, LocalAccount):
4✔
496
                signature = signer.signHash(message_hash).signature
4✔
497
            else:
498
                signature = self.hw_wallet_manager.sign_eip712(
×
499
                    eip712_message, [signer]
500
                )[0].signature
501

502
            if len(safe_tx.signers) >= self.safe.retrieve_threshold():
4✔
503
                print_formatted_text(
×
504
                    HTML(
505
                        "<ansired>The transaction has all the required signatures to be executed!!!\n"
506
                        "This means that the transaction can be executed by a 3rd party monitoring your Safe even after removal!\n"
507
                        f"Make sure you execute a transaction with nonce {safe_tx.safe_nonce} to void the current transaction"
508
                        "</ansired>"
509
                    )
510
                )
511

512
            if not yes_or_no_question(
4✔
513
                f"Do you want to remove the tx with safe-tx-hash={safe_tx.safe_tx_hash.hex()}"
514
            ):
515
                return False
×
516

517
            self.safe_tx_service.delete_transaction(safe_tx_hash.hex(), signature.hex())
4✔
518
            print_formatted_text(
4✔
519
                HTML(
520
                    f"<ansigreen>Transaction {safe_tx_hash.hex()} was removed correctly</ansigreen>"
521
                )
522
            )
523
            return True
4✔
524
        except SafeAPIException as e:
×
525
            print_formatted_text(
×
526
                HTML(f"<ansired>Transaction wasn't removed due an error: {e}</ansired>")
527
            )
528
            return False
×
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc