@etherisc/gif-next 0.0.2-9d3eab3-323 → 0.0.2-9dd1984-016
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/artifacts/contracts/components/Component.sol/Component.dbg.json +4 -0
- package/artifacts/contracts/components/{BaseComponent.sol/BaseComponent.json → Component.sol/Component.json} +51 -6
- package/artifacts/contracts/components/Distribution.sol/Distribution.dbg.json +1 -1
- package/artifacts/contracts/components/Distribution.sol/Distribution.json +51 -104
- package/artifacts/contracts/components/IComponent.sol/IComponent.dbg.json +4 -0
- package/artifacts/contracts/components/{IBaseComponent.sol/IBaseComponent.json → IComponent.sol/IComponent.json} +51 -6
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.json +5 -5
- package/artifacts/contracts/components/Pool.sol/Pool.dbg.json +1 -1
- package/artifacts/contracts/components/Pool.sol/Pool.json +51 -132
- package/artifacts/contracts/components/Product.sol/Product.dbg.json +1 -1
- package/artifacts/contracts/components/Product.sol/Product.json +56 -120
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.dbg.json +1 -1
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.dbg.json +1 -1
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.dbg.json +1 -1
- package/artifacts/contracts/experiment/errors/Require.sol/Require.dbg.json +1 -1
- package/artifacts/contracts/experiment/errors/Revert.sol/Revert.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/A.sol/A.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/A.sol/AShared.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/B.sol/B.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/C.sol/C.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IA.sol/IA.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IB.sol/IB.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IC.sol/IC.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/SM.sol/SM.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.dbg.json +1 -1
- package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.dbg.json +1 -1
- package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.dbg.json +1 -1
- package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.dbg.json +1 -1
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +1 -1
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +2 -2
- package/artifacts/contracts/instance/Cloneable.sol/Cloneable.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.json +90 -13
- package/artifacts/contracts/instance/IInstanceBase.sol/IInstanceBase.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +75 -1
- package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
- package/artifacts/contracts/instance/Instance.sol/Instance.json +56 -616
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.json +221 -114
- package/artifacts/contracts/instance/InstanceBase.sol/InstanceBase.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceBase.sol/InstanceBase.json +2 -2
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +2 -2
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +126 -229
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +26 -126
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.dbg.json +1 -1
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.json +2 -2
- package/artifacts/contracts/instance/base/ComponentService.sol/ComponentService.dbg.json +4 -0
- package/artifacts/contracts/instance/base/{ComponentServiceBase.sol/ComponentServiceBase.json → ComponentService.sol/ComponentService.json} +98 -24
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.dbg.json +1 -1
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.json +0 -13
- package/artifacts/contracts/instance/base/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/ILifecycle.sol/ILifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.json +59 -16
- package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ISetup.sol/ISetup.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ITreasury.sol/ITreasury.dbg.json +1 -1
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.json +219 -48
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.json +20 -24
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.json +131 -38
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.json +17 -21
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.json +51 -0
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.json +107 -0
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.json +308 -60
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.json +48 -20
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.json +131 -38
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.json +17 -21
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.json +131 -38
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.json +13 -9
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +72 -1
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +3 -3
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.json +85 -59
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.json +33 -23
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +17 -17
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +13 -13
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +1 -1
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +84 -101
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +2 -2
- package/artifacts/contracts/shared/ContractDeployerLib.sol/ContractDeployerLib.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
- package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +2 -2
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +1 -1
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +2 -2
- package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
- package/artifacts/contracts/shared/Registerable.sol/Registerable.json +2 -2
- package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +1 -1
- package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +1 -1
- package/artifacts/contracts/test/TestFee.sol/TestFee.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.json +2 -2
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.dbg.json +1 -1
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.json +2 -2
- package/artifacts/contracts/test/TestService.sol/TestService.dbg.json +1 -1
- package/artifacts/contracts/test/TestService.sol/TestService.json +2 -2
- package/artifacts/contracts/test/TestToken.sol/TestUsdc.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersion.sol/TestVersion.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.dbg.json +1 -1
- package/artifacts/contracts/test/Usdc.sol/USDC.dbg.json +1 -1
- package/artifacts/contracts/types/AddressSet.sol/LibAddressSet.dbg.json +1 -1
- package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
- package/artifacts/contracts/types/ChainId.sol/ChainIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Fee.sol/FeeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Key32.sol/Key32Lib.dbg.json +1 -1
- package/artifacts/contracts/types/NftId.sol/NftIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
- package/artifacts/contracts/types/NumberId.sol/NumberIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Referral.sol/ReferralLib.dbg.json +1 -1
- package/artifacts/contracts/types/RiskId.sol/RiskIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.json +2 -2
- package/artifacts/contracts/types/StateId.sol/StateIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/Timestamp.sol/TimestampLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/MathLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/UFixedLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionPartLib.dbg.json +1 -1
- package/contracts/components/Component.sol +177 -0
- package/contracts/components/Distribution.sol +5 -14
- package/contracts/components/{IBaseComponent.sol → IComponent.sol} +12 -6
- package/contracts/components/IProductComponent.sol +2 -2
- package/contracts/components/Pool.sol +7 -20
- package/contracts/components/Product.sol +21 -18
- package/contracts/instance/IInstance.sol +3 -3
- package/contracts/instance/IInstanceBase.sol +0 -1
- package/contracts/instance/IInstanceService.sol +10 -4
- package/contracts/instance/Instance.sol +6 -208
- package/contracts/instance/InstanceAccessManager.sol +92 -77
- package/contracts/instance/InstanceBase.sol +0 -2
- package/contracts/instance/InstanceService.sol +117 -71
- package/contracts/instance/InstanceServiceManager.sol +5 -9
- package/contracts/instance/base/ComponentService.sol +133 -0
- package/contracts/instance/base/IInstanceBase.sol +0 -2
- package/contracts/instance/module/IAccess.sol +27 -17
- package/contracts/instance/service/BundleService.sol +38 -5
- package/contracts/instance/service/BundleServiceManager.sol +5 -9
- package/contracts/instance/service/DistributionService.sol +33 -32
- package/contracts/instance/service/DistributionServiceManager.sol +6 -10
- package/contracts/instance/service/IBundleService.sol +5 -6
- package/contracts/instance/service/IPolicyService.sol +7 -0
- package/contracts/instance/service/PolicyService.sol +62 -27
- package/contracts/instance/service/PoolService.sol +46 -26
- package/contracts/instance/service/PoolServiceManager.sol +5 -9
- package/contracts/instance/service/ProductService.sol +104 -31
- package/contracts/registry/IRegistry.sol +17 -3
- package/contracts/registry/IRegistryService.sol +5 -5
- package/contracts/registry/Registry.sol +30 -19
- package/contracts/registry/RegistryAccessManager.sol +27 -27
- package/contracts/registry/RegistryService.sol +22 -32
- package/contracts/registry/RegistryServiceManager.sol +4 -2
- package/contracts/registry/ReleaseManager.sol +87 -123
- package/contracts/registry/TokenRegistry.sol +4 -4
- package/contracts/shared/IRegisterable.sol +0 -2
- package/contracts/shared/NftOwnable.sol +2 -0
- package/contracts/shared/Service.sol +4 -2
- package/contracts/types/RoleId.sol +6 -7
- package/package.json +1 -1
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.dbg.json +0 -4
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.json +0 -1082
- package/artifacts/contracts/instance/base/ComponentServiceBase.sol/ComponentServiceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.json +0 -814
- package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.json +0 -466
- package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.dbg.json +0 -4
- package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.json +0 -442
- package/contracts/components/BaseComponent.sol +0 -132
- package/contracts/instance/IAccessManagerSimple.sol +0 -391
- package/contracts/instance/base/ComponentServiceBase.sol +0 -72
- package/contracts/instance/service/ComponentOwnerService.sol +0 -315
- package/contracts/instance/service/IComponentOwnerService.sol +0 -20
- package/contracts/shared/RegisterableUpgradable.sol +0 -16
@@ -4,92 +4,52 @@ pragma solidity ^0.8.20;
|
|
4
4
|
import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
|
5
5
|
import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
|
6
6
|
import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
|
7
|
-
|
8
|
-
|
9
|
-
import {
|
10
|
-
import {
|
11
|
-
import {
|
12
|
-
import {ISetup} from "./module/ISetup.sol";
|
13
|
-
import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
|
14
|
-
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
15
|
-
import {NftId} from "../types/NftId.sol";
|
16
|
-
import {NumberId} from "../types/NumberId.sol";
|
17
|
-
import {ObjectType, BUNDLE, DISTRIBUTION, POLICY, POOL, ROLE, PRODUCT, TARGET} from "../types/ObjectType.sol";
|
18
|
-
import {RiskId, RiskIdLib} from "../types/RiskId.sol";
|
19
|
-
import {RoleId, RoleIdLib} from "../types/RoleId.sol";
|
20
|
-
import {StateId, ACTIVE} from "../types/StateId.sol";
|
21
|
-
import {Timestamp, TimestampLib} from "../types/Timestamp.sol";
|
7
|
+
|
8
|
+
import {AccessManagerUpgradeableInitializeable} from "../../contracts/instance/AccessManagerUpgradeableInitializeable.sol";
|
9
|
+
import {RoleId, RoleIdLib } from "../types/RoleId.sol";
|
10
|
+
import {TimestampLib} from "../types/Timestamp.sol";
|
11
|
+
import {IAccess} from "./module/IAccess.sol";
|
22
12
|
|
23
13
|
contract InstanceAccessManager is
|
24
14
|
AccessManagedUpgradeable
|
25
15
|
{
|
16
|
+
using RoleIdLib for RoleId;
|
17
|
+
|
26
18
|
string public constant ADMIN_ROLE_NAME = "AdminRole";
|
27
19
|
string public constant PUBLIC_ROLE_NAME = "PublicRole";
|
28
20
|
|
29
21
|
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
|
30
22
|
uint32 public constant EXECUTION_DELAY = 0;
|
31
23
|
|
32
|
-
struct RoleInfo {
|
33
|
-
ShortString name;
|
34
|
-
bool isCustom;
|
35
|
-
bool isLocked;
|
36
|
-
Timestamp createdAt;
|
37
|
-
Timestamp updatedAt;
|
38
|
-
}
|
39
|
-
|
40
|
-
struct TargetInfo {
|
41
|
-
ShortString name;
|
42
|
-
bool isCustom;
|
43
|
-
bool isLocked;
|
44
|
-
Timestamp createdAt;
|
45
|
-
Timestamp updatedAt;
|
46
|
-
}
|
47
|
-
|
48
|
-
error ErrorRoleIdInvalid(RoleId roleId);
|
49
|
-
error ErrorRoleIdTooBig(RoleId roleId);
|
50
|
-
error ErrorRoleIdTooSmall(RoleId roleId);
|
51
|
-
error ErrorRoleIdAlreadyExists(RoleId roleId, ShortString name);
|
52
|
-
error ErrorRoleIdNotActive(RoleId roleId);
|
53
|
-
error ErrorRoleNameEmpty(RoleId roleId);
|
54
|
-
error ErrorRoleNameNotUnique(RoleId roleId, ShortString name);
|
55
|
-
error ErrorRoleInvalidUpdate(RoleId roleId, bool isCustom);
|
56
|
-
error ErrorRoleIsCustomIsImmutable(RoleId roleId, bool isCustom, bool isCustomExisting);
|
57
|
-
error ErrorSetLockedForNonexstentRole(RoleId roleId);
|
58
|
-
error ErrorGrantNonexstentRole(RoleId roleId);
|
59
|
-
error ErrorRevokeNonexstentRole(RoleId roleId);
|
60
|
-
error ErrorRenounceNonexstentRole(RoleId roleId);
|
61
|
-
|
62
|
-
error ErrorTargetAddressZero();
|
63
|
-
error ErrorTargetAlreadyExists(address target, ShortString name);
|
64
|
-
error ErrorTargetNameEmpty(address target);
|
65
|
-
error ErrorTargetNameExists(address target, address existingTarget, ShortString name);
|
66
|
-
error ErrorSetLockedForNonexstentTarget(address target);
|
67
|
-
|
68
24
|
// role specific state
|
69
|
-
mapping(RoleId roleId => RoleInfo info) internal _role;
|
25
|
+
mapping(RoleId roleId => IAccess.RoleInfo info) internal _role;
|
70
26
|
mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
|
71
27
|
mapping(ShortString name => RoleId roleId) internal _roleForName;
|
72
28
|
RoleId [] internal _roles;
|
73
29
|
|
74
30
|
// target specific state
|
75
|
-
mapping(address target => TargetInfo info) internal _target;
|
31
|
+
mapping(address target => IAccess.TargetInfo info) internal _target;
|
76
32
|
mapping(ShortString name => address target) internal _targetForName;
|
77
33
|
address [] internal _targets;
|
78
34
|
|
79
|
-
|
35
|
+
AccessManagerUpgradeableInitializeable internal _accessManager;
|
80
36
|
|
81
|
-
|
37
|
+
function __InstanceAccessManager_initialize(address initialAdmin) external initializer
|
82
38
|
{
|
83
|
-
|
84
|
-
|
39
|
+
// if size of the contract gets too large, this can be externalized which will reduce the contract size considerably
|
40
|
+
_accessManager = new AccessManagerUpgradeableInitializeable();
|
41
|
+
// this service required adin rights to access manager to be able to grant/revoke roles
|
42
|
+
_accessManager.__AccessManagerUpgradeableInitializeable_init(address(this));
|
43
|
+
_accessManager.grantRole(_accessManager.ADMIN_ROLE(), initialAdmin, 0);
|
44
|
+
|
45
|
+
__AccessManaged_init(address(_accessManager));
|
85
46
|
|
86
47
|
_createRole(RoleIdLib.toRoleId(_accessManager.ADMIN_ROLE()), ADMIN_ROLE_NAME, false, false);
|
87
48
|
_createRole(RoleIdLib.toRoleId(_accessManager.PUBLIC_ROLE()), PUBLIC_ROLE_NAME, false, false);
|
88
49
|
}
|
89
50
|
|
90
51
|
//--- Role ------------------------------------------------------//
|
91
|
-
|
92
|
-
function createDefaultRole(RoleId roleId, string memory name) external restricted() {
|
52
|
+
function createGifRole(RoleId roleId, string memory name) external restricted() {
|
93
53
|
_createRole(roleId, name, false, true);
|
94
54
|
}
|
95
55
|
|
@@ -99,7 +59,7 @@ contract InstanceAccessManager is
|
|
99
59
|
|
100
60
|
function setRoleLocked(RoleId roleId, bool locked) external restricted() {
|
101
61
|
if (!roleExists(roleId)) {
|
102
|
-
revert
|
62
|
+
revert IAccess.ErrorIAccessSetLockedForNonexstentRole(roleId);
|
103
63
|
}
|
104
64
|
|
105
65
|
_role[roleId].isLocked = locked;
|
@@ -112,11 +72,11 @@ contract InstanceAccessManager is
|
|
112
72
|
|
113
73
|
function grantRole(RoleId roleId, address member) external restricted() returns (bool granted) {
|
114
74
|
if (!roleExists(roleId)) {
|
115
|
-
revert
|
75
|
+
revert IAccess.ErrorIAccessGrantNonexstentRole(roleId);
|
116
76
|
}
|
117
77
|
|
118
78
|
if (_role[roleId].isLocked) {
|
119
|
-
revert
|
79
|
+
revert IAccess.ErrorIAccessRoleIdNotActive(roleId);
|
120
80
|
}
|
121
81
|
|
122
82
|
if (!EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -130,7 +90,7 @@ contract InstanceAccessManager is
|
|
130
90
|
|
131
91
|
function revokeRole(RoleId roleId, address member) external restricted() returns (bool revoked) {
|
132
92
|
if (!roleExists(roleId)) {
|
133
|
-
revert
|
93
|
+
revert IAccess.ErrorIAccessRevokeNonexstentRole(roleId);
|
134
94
|
}
|
135
95
|
|
136
96
|
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -148,7 +108,7 @@ contract InstanceAccessManager is
|
|
148
108
|
address member = msg.sender;
|
149
109
|
|
150
110
|
if (!roleExists(roleId)) {
|
151
|
-
revert
|
111
|
+
revert IAccess.ErrorIAccessRenounceNonexstentRole(roleId);
|
152
112
|
}
|
153
113
|
|
154
114
|
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -173,7 +133,7 @@ contract InstanceAccessManager is
|
|
173
133
|
return _roleForName[ShortStrings.toShortString(name)];
|
174
134
|
}
|
175
135
|
|
176
|
-
function getRole(RoleId roleId) external view returns (RoleInfo memory role) {
|
136
|
+
function getRole(RoleId roleId) external view returns (IAccess.RoleInfo memory role) {
|
177
137
|
return _role[roleId];
|
178
138
|
}
|
179
139
|
|
@@ -190,13 +150,19 @@ contract InstanceAccessManager is
|
|
190
150
|
}
|
191
151
|
|
192
152
|
//--- Target ------------------------------------------------------//
|
153
|
+
function createGifTarget(address target, string memory name) external restricted() {
|
154
|
+
_createTarget(target, name, false, true);
|
155
|
+
}
|
156
|
+
|
193
157
|
function createTarget(address target, string memory name) external restricted() {
|
194
158
|
_createTarget(target, name, true, true);
|
195
159
|
}
|
196
160
|
|
197
|
-
function setTargetLocked(
|
198
|
-
|
199
|
-
|
161
|
+
function setTargetLocked(string memory targetName, bool locked) external restricted() {
|
162
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
163
|
+
|
164
|
+
if (target == address(0)) {
|
165
|
+
revert IAccess.ErrorIAccessSetLockedForNonexstentTarget(target);
|
200
166
|
}
|
201
167
|
|
202
168
|
_target[target].isLocked = locked;
|
@@ -214,7 +180,7 @@ contract InstanceAccessManager is
|
|
214
180
|
_validateRoleParameters(roleId, name, isCustom);
|
215
181
|
}
|
216
182
|
|
217
|
-
RoleInfo memory role = RoleInfo(
|
183
|
+
IAccess.RoleInfo memory role = IAccess.RoleInfo(
|
218
184
|
ShortStrings.toShortString(name),
|
219
185
|
isCustom,
|
220
186
|
false, // role un-locked,
|
@@ -233,35 +199,35 @@ contract InstanceAccessManager is
|
|
233
199
|
)
|
234
200
|
internal
|
235
201
|
view
|
236
|
-
returns (RoleInfo memory existingRole)
|
202
|
+
returns (IAccess.RoleInfo memory existingRole)
|
237
203
|
{
|
238
204
|
// check role id
|
239
205
|
uint64 roleIdInt = RoleId.unwrap(roleId);
|
240
206
|
if(roleIdInt == _accessManager.ADMIN_ROLE() || roleIdInt == _accessManager.PUBLIC_ROLE()) {
|
241
|
-
revert
|
207
|
+
revert IAccess.ErrorIAccessRoleIdInvalid(roleId);
|
242
208
|
}
|
243
209
|
|
244
210
|
// prevent changing isCustom for existing roles
|
245
211
|
existingRole = _role[roleId];
|
246
212
|
|
247
213
|
if (existingRole.createdAt.gtz() && isCustom != existingRole.isCustom) {
|
248
|
-
revert
|
214
|
+
revert IAccess.ErrorIAccessRoleIsCustomIsImmutable(roleId, isCustom, existingRole.isCustom);
|
249
215
|
}
|
250
216
|
|
251
217
|
if (isCustom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
|
252
|
-
revert
|
218
|
+
revert IAccess.ErrorIAccessRoleIdTooSmall(roleId);
|
253
219
|
} else if (!isCustom && roleIdInt >= CUSTOM_ROLE_ID_MIN) {
|
254
|
-
revert
|
220
|
+
revert IAccess.ErrorIAccessRoleIdTooBig(roleId);
|
255
221
|
}
|
256
222
|
|
257
223
|
// role name checks
|
258
224
|
ShortString nameShort = ShortStrings.toShortString(name);
|
259
225
|
if (ShortStrings.byteLength(nameShort) == 0) {
|
260
|
-
revert
|
226
|
+
revert IAccess.ErrorIAccessRoleNameEmpty(roleId);
|
261
227
|
}
|
262
228
|
|
263
229
|
if (_roleForName[nameShort] != RoleIdLib.zero() && _roleForName[nameShort] != roleId) {
|
264
|
-
revert
|
230
|
+
revert IAccess.ErrorIAccessRoleNameNotUnique(_roleForName[nameShort], nameShort);
|
265
231
|
}
|
266
232
|
}
|
267
233
|
|
@@ -270,7 +236,14 @@ contract InstanceAccessManager is
|
|
270
236
|
_validateTargetParameters(target, name, isCustom);
|
271
237
|
}
|
272
238
|
|
273
|
-
|
239
|
+
if (_target[target].createdAt.gtz()) {
|
240
|
+
revert IAccess.ErrorIAccessTargetAlreadyExists(target, _target[target].name);
|
241
|
+
}
|
242
|
+
if (_targetForName[ShortStrings.toShortString(name)] != address(0)) {
|
243
|
+
revert IAccess.ErrorIAccessTargetNameExists(target, _targetForName[ShortStrings.toShortString(name)], ShortStrings.toShortString(name));
|
244
|
+
}
|
245
|
+
|
246
|
+
IAccess.TargetInfo memory info = IAccess.TargetInfo(
|
274
247
|
ShortStrings.toShortString(name),
|
275
248
|
isCustom,
|
276
249
|
_accessManager.isTargetClosed(target), // sync with state in access manager
|
@@ -283,6 +256,48 @@ contract InstanceAccessManager is
|
|
283
256
|
}
|
284
257
|
|
285
258
|
function _validateTargetParameters(address target, string memory name, bool isCustom) internal view {
|
259
|
+
// TODO: implement
|
260
|
+
}
|
261
|
+
|
262
|
+
function setTargetFunctionRole(
|
263
|
+
address target,
|
264
|
+
bytes4[] calldata selectors,
|
265
|
+
uint64 roleId
|
266
|
+
) public virtual restricted() {
|
267
|
+
_accessManager.setTargetFunctionRole(target, selectors, roleId);
|
268
|
+
}
|
269
|
+
|
270
|
+
function setTargetFunctionRole(
|
271
|
+
string memory targetName,
|
272
|
+
bytes4[] calldata selectors,
|
273
|
+
RoleId roleId
|
274
|
+
) public virtual restricted() {
|
275
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
276
|
+
uint64 roleIdInt = RoleId.unwrap(roleId);
|
277
|
+
_accessManager.setTargetFunctionRole(target, selectors, roleIdInt);
|
278
|
+
}
|
279
|
+
|
280
|
+
function getAccessManager() public restricted() returns (AccessManagerUpgradeableInitializeable) {
|
281
|
+
return _accessManager;
|
282
|
+
}
|
283
|
+
|
284
|
+
function setTargetClosed(string memory targetName, bool closed) public restricted() {
|
285
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
286
|
+
if (target == address(0)) {
|
287
|
+
revert IAccess.ErrorIAccessTargetAddressZero();
|
288
|
+
}
|
289
|
+
_accessManager.setTargetClosed(target, closed);
|
290
|
+
}
|
291
|
+
|
292
|
+
function isTargetLocked(address target) public view returns (bool locked) {
|
293
|
+
return _accessManager.isTargetClosed(target);
|
294
|
+
}
|
286
295
|
|
296
|
+
function canCall(
|
297
|
+
address caller,
|
298
|
+
address target,
|
299
|
+
bytes4 selector
|
300
|
+
) public view virtual returns (bool immediate, uint32 delay) {
|
301
|
+
return _accessManager.canCall(caller, target, selector);
|
287
302
|
}
|
288
303
|
}
|
@@ -22,8 +22,6 @@ import {RoleId, RoleIdLib} from "../types/RoleId.sol";
|
|
22
22
|
import {StateId, ACTIVE} from "../types/StateId.sol";
|
23
23
|
import {ERC165} from "../shared/ERC165.sol";
|
24
24
|
import {Registerable} from "../shared/Registerable.sol";
|
25
|
-
import {ComponentOwnerService} from "./service/ComponentOwnerService.sol";
|
26
|
-
import {IComponentOwnerService} from "./service/IComponentOwnerService.sol";
|
27
25
|
import {IDistributionService} from "./service/IDistributionService.sol";
|
28
26
|
import {IPoolService} from "./service/IPoolService.sol";
|
29
27
|
import {IProductService} from "./service/IProductService.sol";
|
@@ -2,22 +2,22 @@
|
|
2
2
|
pragma solidity ^0.8.20;
|
3
3
|
|
4
4
|
import {Clones} from "@openzeppelin/contracts/proxy/Clones.sol";
|
5
|
-
import {AccessManagerUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagerUpgradeable.sol";
|
6
5
|
|
7
|
-
import {AccessManagerUpgradeableInitializeable} from "./AccessManagerUpgradeableInitializeable.sol";
|
8
6
|
import {Instance} from "./Instance.sol";
|
7
|
+
import {IInstance} from "./IInstance.sol";
|
8
|
+
import {InstanceAccessManager} from "./InstanceAccessManager.sol";
|
9
9
|
import {IInstanceService} from "./IInstanceService.sol";
|
10
10
|
import {InstanceReader} from "./InstanceReader.sol";
|
11
11
|
import {BundleManager} from "./BundleManager.sol";
|
12
12
|
import {IRegistry} from "../registry/IRegistry.sol";
|
13
13
|
import {RegistryService} from "../registry/RegistryService.sol";
|
14
|
+
import {ChainNft} from "../registry/ChainNft.sol";
|
14
15
|
import {Service} from "../../contracts/shared/Service.sol";
|
15
16
|
import {IService} from "../shared/IService.sol";
|
16
17
|
import {NftId} from "../../contracts/types/NftId.sol";
|
17
18
|
import {RoleId} from "../types/RoleId.sol";
|
18
|
-
import {
|
19
|
-
import {
|
20
|
-
import {ObjectType, INSTANCE, SERVICE, PRODUCT, POOL, DISTRIBUTION, POLICY, BUNDLE} from "../types/ObjectType.sol";
|
19
|
+
import {ADMIN_ROLE, DISTRIBUTION_OWNER_ROLE, POOL_OWNER_ROLE, PRODUCT_OWNER_ROLE, INSTANCE_SERVICE_ROLE, DISTRIBUTION_SERVICE_ROLE, POOL_SERVICE_ROLE, PRODUCT_SERVICE_ROLE, POLICY_SERVICE_ROLE, BUNDLE_SERVICE_ROLE} from "../types/RoleId.sol";
|
20
|
+
import {ObjectType, INSTANCE, BUNDLE, POLICY, PRODUCT, DISTRIBUTION, REGISTRY, POOL} from "../types/ObjectType.sol";
|
21
21
|
|
22
22
|
contract InstanceService is Service, IInstanceService {
|
23
23
|
|
@@ -28,11 +28,30 @@ contract InstanceService is Service, IInstanceService {
|
|
28
28
|
|
29
29
|
// TODO update to real hash when instance is stable
|
30
30
|
bytes32 public constant INSTANCE_CREATION_CODE_HASH = bytes32(0);
|
31
|
+
string public constant NAME = "InstanceService";
|
32
|
+
|
33
|
+
modifier onlyInstanceOwner(NftId instanceNftId) {
|
34
|
+
IRegistry registry = getRegistry();
|
35
|
+
ChainNft chainNft = registry.getChainNft();
|
36
|
+
|
37
|
+
if( msg.sender != chainNft.ownerOf(instanceNftId.toInt())) {
|
38
|
+
revert ErrorInstanceServiceNotInstanceOwner(msg.sender, instanceNftId);
|
39
|
+
}
|
40
|
+
_;
|
41
|
+
}
|
42
|
+
|
43
|
+
modifier onlyRegisteredService() {
|
44
|
+
address caller = msg.sender;
|
45
|
+
if (! getRegistry().isRegisteredService(caller)) {
|
46
|
+
revert ErrorInstanceServiceRequestUnauhorized(caller);
|
47
|
+
}
|
48
|
+
_;
|
49
|
+
}
|
31
50
|
|
32
51
|
function createInstanceClone()
|
33
52
|
external
|
34
53
|
returns (
|
35
|
-
|
54
|
+
InstanceAccessManager clonedAccessManager,
|
36
55
|
Instance clonedInstance,
|
37
56
|
NftId clonedInstanceNftId,
|
38
57
|
InstanceReader clonedInstanceReader,
|
@@ -43,14 +62,14 @@ contract InstanceService is Service, IInstanceService {
|
|
43
62
|
IRegistry registry = getRegistry();
|
44
63
|
address registryAddress = address(registry);
|
45
64
|
NftId registryNftId = registry.getNftId(registryAddress);
|
46
|
-
address registryServiceAddress = registry.getServiceAddress(
|
65
|
+
address registryServiceAddress = registry.getServiceAddress(REGISTRY(), getMajorVersion());
|
47
66
|
RegistryService registryService = RegistryService(registryServiceAddress);
|
48
67
|
|
49
68
|
// initially set the authority of the access managar to this (being the instance service).
|
50
69
|
// This will allow the instance service to bootstrap the authorizations of the instance
|
51
70
|
// and then transfer the ownership of the access manager to the instance owner once everything is setup
|
52
|
-
clonedAccessManager =
|
53
|
-
clonedAccessManager.
|
71
|
+
clonedAccessManager = InstanceAccessManager(Clones.clone(_masterInstanceAccessManager));
|
72
|
+
clonedAccessManager.__InstanceAccessManager_initialize(address(this));
|
54
73
|
|
55
74
|
clonedInstance = Instance(Clones.clone(_masterInstance));
|
56
75
|
clonedInstance.initialize(address(clonedAccessManager), registryAddress, registryNftId, msg.sender);
|
@@ -71,14 +90,16 @@ contract InstanceService is Service, IInstanceService {
|
|
71
90
|
|
72
91
|
// to complete setup switch instance ownership to the instance owner
|
73
92
|
// TODO: use a role less powerful than admin, maybe INSTANCE_ADMIN (does not exist yet)
|
74
|
-
clonedAccessManager.grantRole(ADMIN_ROLE()
|
75
|
-
clonedAccessManager.revokeRole(ADMIN_ROLE()
|
93
|
+
clonedAccessManager.grantRole(ADMIN_ROLE(), instanceOwner);
|
94
|
+
clonedAccessManager.revokeRole(ADMIN_ROLE(), address(this));
|
76
95
|
|
77
96
|
emit LogInstanceCloned(address(clonedAccessManager), address(clonedInstance), address(clonedInstanceReader), clonedInstanceNftId);
|
78
97
|
}
|
79
98
|
|
80
|
-
function _grantInitialAuthorizations(
|
81
|
-
|
99
|
+
function _grantInitialAuthorizations(InstanceAccessManager clonedAccessManager, Instance clonedInstance, BundleManager clonedBundleManager) internal {
|
100
|
+
_createGifRoles(clonedAccessManager);
|
101
|
+
_createGifTargets(clonedAccessManager, clonedInstance, clonedBundleManager);
|
102
|
+
_grantDistributionServiceAuthorizations(clonedAccessManager, clonedInstance);
|
82
103
|
_grantPoolServiceAuthorizations(clonedAccessManager, clonedInstance);
|
83
104
|
_grantProductServiceAuthorizations(clonedAccessManager, clonedInstance);
|
84
105
|
_grantPolicyServiceAuthorizations(clonedAccessManager, clonedInstance);
|
@@ -86,37 +107,55 @@ contract InstanceService is Service, IInstanceService {
|
|
86
107
|
_grantInstanceServiceAuthorizations(clonedAccessManager, clonedInstance);
|
87
108
|
}
|
88
109
|
|
89
|
-
function
|
110
|
+
function _createGifRoles(InstanceAccessManager clonedAccessManager) internal {
|
111
|
+
clonedAccessManager.createGifRole(DISTRIBUTION_OWNER_ROLE(), "DistributionOwnerRole");
|
112
|
+
clonedAccessManager.createGifRole(POOL_OWNER_ROLE(), "PoolOwnerRole");
|
113
|
+
clonedAccessManager.createGifRole(PRODUCT_OWNER_ROLE(), "ProductOwnerRole");
|
114
|
+
|
115
|
+
clonedAccessManager.createGifRole(DISTRIBUTION_SERVICE_ROLE(), "DistributionServiceRole");
|
116
|
+
clonedAccessManager.createGifRole(POOL_SERVICE_ROLE(), "PoolServiceRole");
|
117
|
+
clonedAccessManager.createGifRole(PRODUCT_SERVICE_ROLE(), "ProductServiceRole");
|
118
|
+
clonedAccessManager.createGifRole(POLICY_SERVICE_ROLE(), "PolicyServiceRole");
|
119
|
+
clonedAccessManager.createGifRole(BUNDLE_SERVICE_ROLE(), "BundleServiceRole");
|
120
|
+
clonedAccessManager.createGifRole(INSTANCE_SERVICE_ROLE(), "InstanceServiceRole");
|
121
|
+
}
|
122
|
+
|
123
|
+
function _createGifTargets(InstanceAccessManager clonedAccessManager, Instance clonedInstance, BundleManager clonedBundleManager) internal {
|
124
|
+
clonedAccessManager.createGifTarget(address(clonedInstance), "Instance");
|
125
|
+
clonedAccessManager.createGifTarget(address(clonedBundleManager), "BundleManager");
|
126
|
+
}
|
127
|
+
|
128
|
+
function _grantDistributionServiceAuthorizations(InstanceAccessManager clonedAccessManager, Instance clonedInstance) internal {
|
90
129
|
// configure authorization for distribution service on instance
|
91
130
|
IRegistry registry = getRegistry();
|
92
|
-
address distributionServiceAddress = registry.getServiceAddress(DISTRIBUTION(),
|
93
|
-
clonedAccessManager.grantRole(DISTRIBUTION_SERVICE_ROLE()
|
131
|
+
address distributionServiceAddress = registry.getServiceAddress(DISTRIBUTION(), getMajorVersion());
|
132
|
+
clonedAccessManager.grantRole(DISTRIBUTION_SERVICE_ROLE(), distributionServiceAddress);
|
94
133
|
bytes4[] memory instanceDistributionServiceSelectors = new bytes4[](2);
|
95
134
|
instanceDistributionServiceSelectors[0] = clonedInstance.createDistributionSetup.selector;
|
96
135
|
instanceDistributionServiceSelectors[1] = clonedInstance.updateDistributionSetup.selector;
|
97
136
|
clonedAccessManager.setTargetFunctionRole(
|
98
|
-
|
137
|
+
"Instance",
|
99
138
|
instanceDistributionServiceSelectors,
|
100
|
-
DISTRIBUTION_SERVICE_ROLE()
|
139
|
+
DISTRIBUTION_SERVICE_ROLE());
|
101
140
|
}
|
102
141
|
|
103
|
-
function _grantPoolServiceAuthorizations(
|
142
|
+
function _grantPoolServiceAuthorizations(InstanceAccessManager clonedAccessManager, Instance clonedInstance) internal {
|
104
143
|
// configure authorization for pool service on instance
|
105
|
-
address poolServiceAddress = _registry.getServiceAddress(POOL(),
|
106
|
-
clonedAccessManager.grantRole(POOL_SERVICE_ROLE()
|
144
|
+
address poolServiceAddress = _registry.getServiceAddress(POOL(), getMajorVersion());
|
145
|
+
clonedAccessManager.grantRole(POOL_SERVICE_ROLE(), address(poolServiceAddress));
|
107
146
|
bytes4[] memory instancePoolServiceSelectors = new bytes4[](4);
|
108
147
|
instancePoolServiceSelectors[0] = clonedInstance.createPoolSetup.selector;
|
109
148
|
instancePoolServiceSelectors[1] = clonedInstance.updatePoolSetup.selector;
|
110
149
|
clonedAccessManager.setTargetFunctionRole(
|
111
|
-
|
150
|
+
"Instance",
|
112
151
|
instancePoolServiceSelectors,
|
113
|
-
POOL_SERVICE_ROLE()
|
152
|
+
POOL_SERVICE_ROLE());
|
114
153
|
}
|
115
154
|
|
116
|
-
function _grantProductServiceAuthorizations(
|
155
|
+
function _grantProductServiceAuthorizations(InstanceAccessManager clonedAccessManager, Instance clonedInstance) internal {
|
117
156
|
// configure authorization for product service on instance
|
118
|
-
address productServiceAddress = _registry.getServiceAddress(PRODUCT(),
|
119
|
-
clonedAccessManager.grantRole(PRODUCT_SERVICE_ROLE()
|
157
|
+
address productServiceAddress = _registry.getServiceAddress(PRODUCT(), getMajorVersion());
|
158
|
+
clonedAccessManager.grantRole(PRODUCT_SERVICE_ROLE(), address(productServiceAddress));
|
120
159
|
bytes4[] memory instanceProductServiceSelectors = new bytes4[](5);
|
121
160
|
instanceProductServiceSelectors[0] = clonedInstance.createProductSetup.selector;
|
122
161
|
instanceProductServiceSelectors[1] = clonedInstance.updateProductSetup.selector;
|
@@ -124,36 +163,36 @@ contract InstanceService is Service, IInstanceService {
|
|
124
163
|
instanceProductServiceSelectors[3] = clonedInstance.updateRisk.selector;
|
125
164
|
instanceProductServiceSelectors[4] = clonedInstance.updateRiskState.selector;
|
126
165
|
clonedAccessManager.setTargetFunctionRole(
|
127
|
-
|
166
|
+
"Instance",
|
128
167
|
instanceProductServiceSelectors,
|
129
|
-
PRODUCT_SERVICE_ROLE()
|
168
|
+
PRODUCT_SERVICE_ROLE());
|
130
169
|
}
|
131
170
|
|
132
|
-
function _grantPolicyServiceAuthorizations(
|
171
|
+
function _grantPolicyServiceAuthorizations(InstanceAccessManager clonedAccessManager, Instance clonedInstance) internal {
|
133
172
|
// configure authorization for policy service on instance
|
134
|
-
address policyServiceAddress = _registry.getServiceAddress(POLICY(),
|
135
|
-
clonedAccessManager.grantRole(POLICY_SERVICE_ROLE()
|
173
|
+
address policyServiceAddress = _registry.getServiceAddress(POLICY(), getMajorVersion());
|
174
|
+
clonedAccessManager.grantRole(POLICY_SERVICE_ROLE(), address(policyServiceAddress));
|
136
175
|
bytes4[] memory instancePolicyServiceSelectors = new bytes4[](3);
|
137
176
|
instancePolicyServiceSelectors[0] = clonedInstance.createPolicy.selector;
|
138
177
|
instancePolicyServiceSelectors[1] = clonedInstance.updatePolicy.selector;
|
139
178
|
instancePolicyServiceSelectors[2] = clonedInstance.updatePolicyState.selector;
|
140
179
|
clonedAccessManager.setTargetFunctionRole(
|
141
|
-
|
180
|
+
"Instance",
|
142
181
|
instancePolicyServiceSelectors,
|
143
|
-
POLICY_SERVICE_ROLE()
|
182
|
+
POLICY_SERVICE_ROLE());
|
144
183
|
}
|
145
184
|
|
146
|
-
function _grantBundleServiceAuthorizations(
|
185
|
+
function _grantBundleServiceAuthorizations(InstanceAccessManager clonedAccessManager, Instance clonedInstance, BundleManager clonedBundleManager) internal {
|
147
186
|
// configure authorization for bundle service on instance
|
148
|
-
address bundleServiceAddress = _registry.getServiceAddress(BUNDLE(),
|
149
|
-
clonedAccessManager.grantRole(BUNDLE_SERVICE_ROLE()
|
187
|
+
address bundleServiceAddress = _registry.getServiceAddress(BUNDLE(), getMajorVersion());
|
188
|
+
clonedAccessManager.grantRole(BUNDLE_SERVICE_ROLE(), address(bundleServiceAddress));
|
150
189
|
bytes4[] memory instanceBundleServiceSelectors = new bytes4[](2);
|
151
190
|
instanceBundleServiceSelectors[0] = clonedInstance.createBundle.selector;
|
152
191
|
instanceBundleServiceSelectors[1] = clonedInstance.updateBundle.selector;
|
153
192
|
clonedAccessManager.setTargetFunctionRole(
|
154
|
-
|
193
|
+
"Instance",
|
155
194
|
instanceBundleServiceSelectors,
|
156
|
-
BUNDLE_SERVICE_ROLE()
|
195
|
+
BUNDLE_SERVICE_ROLE());
|
157
196
|
|
158
197
|
// configure authorization for bundle service on bundle manager
|
159
198
|
bytes4[] memory bundleManagerBundleServiceSelectors = new bytes4[](5);
|
@@ -163,21 +202,21 @@ contract InstanceService is Service, IInstanceService {
|
|
163
202
|
bundleManagerBundleServiceSelectors[3] = clonedBundleManager.lock.selector;
|
164
203
|
bundleManagerBundleServiceSelectors[4] = clonedBundleManager.unlock.selector;
|
165
204
|
clonedAccessManager.setTargetFunctionRole(
|
166
|
-
|
205
|
+
"BundleManager",
|
167
206
|
bundleManagerBundleServiceSelectors,
|
168
|
-
BUNDLE_SERVICE_ROLE()
|
207
|
+
BUNDLE_SERVICE_ROLE());
|
169
208
|
}
|
170
209
|
|
171
|
-
function _grantInstanceServiceAuthorizations(
|
210
|
+
function _grantInstanceServiceAuthorizations(InstanceAccessManager clonedAccessManager, Instance clonedInstance) internal {
|
172
211
|
// configure authorization for instance service on instance
|
173
|
-
address instanceServiceAddress = _registry.getServiceAddress(INSTANCE(),
|
174
|
-
clonedAccessManager.grantRole(INSTANCE_SERVICE_ROLE()
|
212
|
+
address instanceServiceAddress = _registry.getServiceAddress(INSTANCE(), getMajorVersion());
|
213
|
+
clonedAccessManager.grantRole(INSTANCE_SERVICE_ROLE(), instanceServiceAddress);
|
175
214
|
bytes4[] memory instanceInstanceServiceSelectors = new bytes4[](1);
|
176
215
|
instanceInstanceServiceSelectors[0] = clonedInstance.setInstanceReader.selector;
|
177
216
|
clonedAccessManager.setTargetFunctionRole(
|
178
|
-
|
217
|
+
"Instance",
|
179
218
|
instanceInstanceServiceSelectors,
|
180
|
-
INSTANCE_SERVICE_ROLE()
|
219
|
+
INSTANCE_SERVICE_ROLE());
|
181
220
|
}
|
182
221
|
|
183
222
|
function setMasterInstance(address accessManagerAddress, address instanceAddress, address instanceReaderAddress, address bundleManagerAddress) external onlyOwner {
|
@@ -252,10 +291,6 @@ contract InstanceService is Service, IInstanceService {
|
|
252
291
|
}
|
253
292
|
|
254
293
|
/// @dev top level initializer
|
255
|
-
// 1) registry is non upgradeable -> don't need a proxy and uses constructor !
|
256
|
-
// 2) deploy registry service first -> from its initialization func it is easier to deploy registry then vice versa
|
257
|
-
// 3) deploy registry -> pass registry service address as constructor argument
|
258
|
-
// registry is getting instantiated and locked to registry service address forever
|
259
294
|
function _initialize(
|
260
295
|
address owner,
|
261
296
|
bytes memory data
|
@@ -264,36 +299,47 @@ contract InstanceService is Service, IInstanceService {
|
|
264
299
|
initializer
|
265
300
|
virtual override
|
266
301
|
{
|
267
|
-
address initialOwner
|
268
|
-
address registryAddress
|
302
|
+
address initialOwner;
|
303
|
+
address registryAddress;
|
269
304
|
(registryAddress, initialOwner) = abi.decode(data, (address, address));
|
270
305
|
// TODO while InstanceService is not deployed in InstanceServiceManager constructor
|
271
306
|
// owner is InstanceServiceManager deployer
|
272
307
|
_initializeService(registryAddress, owner);
|
273
308
|
|
274
|
-
_registerInterface(type(IService).interfaceId);
|
275
309
|
_registerInterface(type(IInstanceService).interfaceId);
|
276
310
|
}
|
277
|
-
|
278
|
-
|
279
|
-
IRegistry.ObjectInfo memory instanceObjectInfo = getRegistry().getObjectInfo(instanceNftId);
|
280
|
-
address instanceAddress = instanceObjectInfo.objectAddress;
|
281
|
-
Instance instance = Instance(instanceAddress);
|
282
|
-
AccessManagerUpgradeable accessManager = AccessManagerUpgradeable(instance.authority());
|
283
|
-
(bool isMember, uint32 executionDelay) = accessManager.hasRole(role.toInt(), account);
|
284
|
-
if (executionDelay > 0) {
|
285
|
-
return false;
|
286
|
-
}
|
287
|
-
return isMember;
|
288
|
-
}*/
|
289
|
-
function hasRole(address account, RoleId role, address instanceAddress) external view returns (bool) {
|
311
|
+
|
312
|
+
function hasRole(address account, RoleId role, address instanceAddress) public view returns (bool) {
|
290
313
|
Instance instance = Instance(instanceAddress);
|
291
|
-
|
292
|
-
|
293
|
-
if (executionDelay > 0) {
|
294
|
-
return false;
|
295
|
-
}
|
296
|
-
return isMember;
|
314
|
+
InstanceAccessManager accessManager = InstanceAccessManager(instance.authority());
|
315
|
+
return accessManager.hasRole(role, account);
|
297
316
|
}
|
317
|
+
|
318
|
+
function createTarget(NftId instanceNftId, address targetAddress, string memory targetName) external onlyRegisteredService {
|
319
|
+
IRegistry registry = getRegistry();
|
320
|
+
IRegistry.ObjectInfo memory instanceInfo = registry.getObjectInfo(instanceNftId);
|
321
|
+
Instance instance = Instance(instanceInfo.objectAddress);
|
322
|
+
InstanceAccessManager accessManager = InstanceAccessManager(instance.authority());
|
323
|
+
accessManager.createTarget(targetAddress, targetName);
|
324
|
+
}
|
325
|
+
|
326
|
+
function setTargetLocked(string memory targetName, bool locked) external {
|
327
|
+
address componentAddress = msg.sender;
|
328
|
+
IRegistry registry = getRegistry();
|
329
|
+
IRegistry.ObjectInfo memory componentInfo = registry.getObjectInfo(componentAddress);
|
330
|
+
if (componentInfo.nftId.eqz()) {
|
331
|
+
revert ErrorInstanceServiceComponentNotRegistered(componentAddress);
|
332
|
+
}
|
333
|
+
|
334
|
+
// TODO validate component type
|
335
|
+
|
336
|
+
|
337
|
+
address instanceAddress = registry.getObjectInfo(componentInfo.parentNftId).objectAddress;
|
338
|
+
IInstance instance = IInstance(instanceAddress);
|
339
|
+
|
340
|
+
InstanceAccessManager accessManager = InstanceAccessManager(instance.authority());
|
341
|
+
accessManager.setTargetClosed(targetName, locked);
|
342
|
+
}
|
343
|
+
|
298
344
|
}
|
299
345
|
|