@etherisc/gif-next 0.0.2-c8cedfe-604 → 0.0.2-c9b0563-536
Sign up to get free protection for your applications and to get access to all the features.
- package/README.md +63 -1
- package/artifacts/contracts/components/Component.sol/Component.dbg.json +4 -0
- package/artifacts/contracts/components/Component.sol/Component.json +656 -0
- package/artifacts/contracts/components/Distribution.sol/Distribution.dbg.json +1 -1
- package/artifacts/contracts/components/Distribution.sol/Distribution.json +311 -132
- package/artifacts/contracts/components/IComponent.sol/IComponent.dbg.json +4 -0
- package/artifacts/contracts/{shared/RegisterableUpgradable.sol/RegisterableUpgradable.json → components/IComponent.sol/IComponent.json} +171 -158
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.json +445 -1
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.json +522 -58
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.json +596 -5
- package/artifacts/contracts/components/Pool.sol/Pool.dbg.json +1 -1
- package/artifacts/contracts/components/Pool.sol/Pool.json +306 -182
- package/artifacts/contracts/components/Product.sol/Product.dbg.json +1 -1
- package/artifacts/contracts/components/Product.sol/Product.json +329 -155
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.dbg.json +1 -1
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.dbg.json +1 -1
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.dbg.json +1 -1
- package/artifacts/contracts/experiment/errors/Require.sol/Require.dbg.json +1 -1
- package/artifacts/contracts/experiment/errors/Revert.sol/Revert.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/A.sol/A.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/A.sol/AShared.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/B.sol/B.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/C.sol/C.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IA.sol/IA.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IB.sol/IB.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IC.sol/IC.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/SM.sol/SM.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.dbg.json +1 -1
- package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.dbg.json +1 -1
- package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.dbg.json +1 -1
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +4 -0
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +764 -0
- package/artifacts/contracts/instance/Cloneable.sol/Cloneable.dbg.json +4 -0
- package/artifacts/contracts/instance/{AccessManagedSimple.sol/AccessManagedSimple.json → Cloneable.sol/Cloneable.json} +86 -2
- package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.json +1629 -93
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +125 -19
- package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
- package/artifacts/contracts/instance/Instance.sol/Instance.json +185 -642
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.json +231 -114
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +164 -66
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +316 -104
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +48 -43
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.dbg.json +4 -0
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.json +261 -0
- package/artifacts/contracts/instance/base/ComponentService.sol/ComponentService.dbg.json +4 -0
- package/artifacts/contracts/instance/base/{ComponentServiceBase.sol/ComponentServiceBase.json → ComponentService.sol/ComponentService.json} +138 -16
- package/artifacts/contracts/instance/base/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/ILifecycle.sol/ILifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.json +59 -16
- package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ISetup.sol/ISetup.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ITreasury.sol/ITreasury.dbg.json +1 -1
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.json +1102 -0
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.json +449 -0
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.json +176 -40
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.json +34 -25
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/{IComponentOwnerService.sol/IComponentOwnerService.json → IBundleService.sol/IBundleService.json} +295 -46
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.json +13 -18
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.json +766 -0
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.json +15 -82
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.json +25 -245
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.json +1227 -0
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.json +505 -0
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.json +806 -0
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.json +437 -0
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.json +856 -0
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.json +437 -0
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.json +2 -2
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +195 -224
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +221 -93
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.json +208 -329
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.dbg.json +4 -0
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.json +285 -0
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +75 -112
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +51 -112
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +4 -0
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +547 -0
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +13 -29
- package/artifacts/contracts/shared/ContractDeployerLib.sol/ContractDeployerLib.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.json +0 -5
- package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
- package/artifacts/contracts/shared/IService.sol/IService.json +13 -18
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +19 -6
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +1 -1
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +19 -6
- package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
- package/artifacts/contracts/shared/Registerable.sol/Registerable.json +19 -11
- package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
- package/artifacts/contracts/shared/Service.sol/Service.json +26 -18
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +1 -1
- package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +1 -1
- package/artifacts/contracts/test/TestFee.sol/TestFee.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.json +19 -11
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.dbg.json +1 -1
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.json +2 -2
- package/artifacts/contracts/test/TestService.sol/TestService.dbg.json +1 -1
- package/artifacts/contracts/test/TestService.sol/TestService.json +44 -36
- package/artifacts/contracts/test/TestToken.sol/TestUsdc.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersion.sol/TestVersion.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.dbg.json +1 -1
- package/artifacts/contracts/test/Usdc.sol/USDC.dbg.json +1 -1
- package/artifacts/contracts/types/AddressSet.sol/LibAddressSet.dbg.json +1 -1
- package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
- package/artifacts/contracts/types/ChainId.sol/ChainIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Fee.sol/FeeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Key32.sol/Key32Lib.dbg.json +1 -1
- package/artifacts/contracts/types/NftId.sol/NftIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.json +26 -3
- package/artifacts/contracts/types/NumberId.sol/NumberIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Referral.sol/ReferralLib.dbg.json +1 -1
- package/artifacts/contracts/types/RiskId.sol/RiskIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.json +2 -2
- package/artifacts/contracts/types/StateId.sol/StateIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/Timestamp.sol/TimestampLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/MathLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/UFixedLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionPartLib.dbg.json +1 -1
- package/contracts/components/Component.sol +216 -0
- package/contracts/components/Distribution.sol +39 -52
- package/contracts/components/IComponent.sol +43 -0
- package/contracts/components/IDistributionComponent.sol +4 -3
- package/contracts/components/IPoolComponent.sol +7 -18
- package/contracts/components/IProductComponent.sol +7 -3
- package/contracts/components/Pool.sol +59 -109
- package/contracts/components/Product.sol +77 -108
- package/contracts/instance/BundleManager.sol +125 -0
- package/contracts/instance/Cloneable.sol +46 -0
- package/contracts/instance/IInstance.sol +49 -10
- package/contracts/instance/IInstanceService.sol +15 -4
- package/contracts/instance/Instance.sol +71 -245
- package/contracts/instance/InstanceAccessManager.sol +88 -78
- package/contracts/instance/InstanceReader.sol +29 -26
- package/contracts/instance/InstanceService.sol +355 -81
- package/contracts/instance/InstanceServiceManager.sol +10 -12
- package/contracts/instance/ObjectManager.sol +84 -0
- package/contracts/instance/base/ComponentService.sol +134 -0
- package/contracts/instance/module/IAccess.sol +27 -17
- package/contracts/instance/module/IBundle.sol +1 -0
- package/contracts/instance/module/ISetup.sol +3 -0
- package/contracts/instance/service/BundleService.sol +293 -0
- package/contracts/instance/service/BundleServiceManager.sol +51 -0
- package/contracts/instance/service/DistributionService.sol +44 -34
- package/contracts/instance/service/DistributionServiceManager.sol +10 -12
- package/contracts/instance/service/IBundleService.sol +44 -0
- package/contracts/instance/service/IPolicyService.sol +94 -0
- package/contracts/instance/service/IPoolService.sol +6 -23
- package/contracts/instance/service/IProductService.sol +6 -73
- package/contracts/instance/service/PolicyService.sol +538 -0
- package/contracts/instance/service/PolicyServiceManager.sol +54 -0
- package/contracts/instance/service/PoolService.sol +110 -0
- package/contracts/instance/service/PoolServiceManager.sol +51 -0
- package/contracts/instance/service/ProductService.sol +233 -0
- package/contracts/instance/service/ProductServiceManager.sol +54 -0
- package/contracts/registry/ChainNft.sol +1 -1
- package/contracts/registry/IRegistry.sol +35 -31
- package/contracts/registry/IRegistryService.sol +45 -13
- package/contracts/registry/Registry.sol +206 -243
- package/contracts/registry/RegistryAccessManager.sol +216 -0
- package/contracts/registry/RegistryService.sol +83 -220
- package/contracts/registry/RegistryServiceManager.sol +18 -36
- package/contracts/registry/ReleaseManager.sol +332 -0
- package/contracts/registry/TokenRegistry.sol +8 -7
- package/contracts/shared/IRegisterable.sol +1 -3
- package/contracts/shared/IService.sol +2 -1
- package/contracts/shared/NftOwnable.sol +7 -4
- package/contracts/shared/ProxyManager.sol +1 -1
- package/contracts/shared/Registerable.sol +10 -14
- package/contracts/shared/Service.sol +14 -8
- package/contracts/test/TestService.sol +3 -2
- package/contracts/types/NftIdSet.sol +26 -24
- package/contracts/types/RoleId.sol +10 -8
- package/package.json +3 -3
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.json +0 -327
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.json +0 -280
- package/artifacts/contracts/instance/AccessManagedSimple.sol/AccessManagedSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.json +0 -1132
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.json +0 -1082
- package/artifacts/contracts/instance/base/ComponentServiceBase.sol/ComponentServiceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.json +0 -113
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.json +0 -827
- package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.dbg.json +0 -4
- package/contracts/components/BaseComponent.sol +0 -91
- package/contracts/components/IBaseComponent.sol +0 -25
- package/contracts/instance/AccessManagedSimple.sol +0 -115
- package/contracts/instance/AccessManagerSimple.sol +0 -692
- package/contracts/instance/IAccessManagerSimple.sol +0 -391
- package/contracts/instance/base/ComponentServiceBase.sol +0 -39
- package/contracts/instance/base/IInstanceBase.sol +0 -23
- package/contracts/instance/service/ComponentOwnerService.sol +0 -317
- package/contracts/instance/service/IComponentOwnerService.sol +0 -20
- package/contracts/shared/RegisterableUpgradable.sol +0 -16
@@ -1,41 +1,50 @@
|
|
1
1
|
// SPDX-License-Identifier: Apache-2.0
|
2
2
|
pragma solidity ^0.8.20;
|
3
3
|
|
4
|
-
import {
|
5
|
-
import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
|
4
|
+
import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
|
6
5
|
|
7
|
-
import {AccessManagedSimple} from "./AccessManagedSimple.sol";
|
8
|
-
import {AccessManagerSimple} from "./AccessManagerSimple.sol";
|
9
|
-
import {IAccess} from "./module/IAccess.sol";
|
10
|
-
import {IBundle} from "./module/IBundle.sol";
|
11
|
-
import {IPolicy} from "./module/IPolicy.sol";
|
12
|
-
import {IRisk} from "./module/IRisk.sol";
|
13
|
-
import {ISetup} from "./module/ISetup.sol";
|
14
6
|
import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
|
15
|
-
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
16
|
-
import {IInstance} from "./IInstance.sol";
|
17
|
-
import {InstanceReader} from "./InstanceReader.sol";
|
18
7
|
import {NftId} from "../types/NftId.sol";
|
19
8
|
import {NumberId} from "../types/NumberId.sol";
|
20
|
-
import {ObjectType, BUNDLE, DISTRIBUTION, INSTANCE, POLICY, POOL, ROLE, PRODUCT, TARGET} from "../types/ObjectType.sol";
|
9
|
+
import {ObjectType, BUNDLE, DISTRIBUTION, INSTANCE, POLICY, POOL, ROLE, PRODUCT, TARGET, COMPONENT} from "../types/ObjectType.sol";
|
21
10
|
import {RiskId, RiskIdLib} from "../types/RiskId.sol";
|
22
11
|
import {RoleId, RoleIdLib} from "../types/RoleId.sol";
|
23
12
|
import {StateId, ACTIVE} from "../types/StateId.sol";
|
13
|
+
import {TimestampLib} from "../types/Timestamp.sol";
|
14
|
+
import {VersionPart} from "../types/Version.sol";
|
15
|
+
|
24
16
|
import {ERC165} from "../shared/ERC165.sol";
|
25
17
|
import {Registerable} from "../shared/Registerable.sol";
|
26
|
-
|
27
|
-
import {
|
18
|
+
|
19
|
+
import {IInstance} from "./IInstance.sol";
|
20
|
+
import {InstanceReader} from "./InstanceReader.sol";
|
21
|
+
import {InstanceAccessManager} from "./InstanceAccessManager.sol";
|
22
|
+
import {BundleManager} from "./BundleManager.sol";
|
23
|
+
|
24
|
+
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
25
|
+
|
26
|
+
import {IAccess} from "./module/IAccess.sol";
|
27
|
+
import {IBundle} from "./module/IBundle.sol";
|
28
|
+
import {IPolicy} from "./module/IPolicy.sol";
|
29
|
+
import {IRisk} from "./module/IRisk.sol";
|
30
|
+
import {ISetup} from "./module/ISetup.sol";
|
31
|
+
|
28
32
|
import {IDistributionService} from "./service/IDistributionService.sol";
|
29
|
-
import {
|
33
|
+
import {IPoolService} from "./service/IPoolService.sol";
|
34
|
+
import {IProductService} from "./service/IProductService.sol";
|
35
|
+
import {IPolicyService} from "./service/IPolicyService.sol";
|
36
|
+
import {IBundleService} from "./service/IBundleService.sol";
|
37
|
+
import {VersionPart, VersionPartLib} from "../types/Version.sol";
|
30
38
|
|
31
39
|
contract Instance is
|
32
|
-
AccessManagedSimple,
|
33
|
-
KeyValueStore,
|
34
40
|
IInstance,
|
35
|
-
|
36
|
-
Registerable
|
41
|
+
AccessManagedUpgradeable,
|
42
|
+
Registerable,
|
43
|
+
KeyValueStore
|
37
44
|
{
|
38
45
|
|
46
|
+
uint256 public constant GIF_MAJOR_VERSION = 3;
|
47
|
+
|
39
48
|
uint64 public constant ADMIN_ROLE = type(uint64).min;
|
40
49
|
uint64 public constant PUBLIC_ROLE = type(uint64).max;
|
41
50
|
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
|
@@ -44,153 +53,19 @@ contract Instance is
|
|
44
53
|
|
45
54
|
bool private _initialized;
|
46
55
|
|
47
|
-
|
48
|
-
mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
|
49
|
-
RoleId [] internal _roles;
|
50
|
-
|
51
|
-
mapping(ShortString name => address target) internal _target;
|
52
|
-
|
53
|
-
AccessManagerSimple internal _accessManager;
|
56
|
+
InstanceAccessManager internal _accessManager;
|
54
57
|
InstanceReader internal _instanceReader;
|
58
|
+
BundleManager internal _bundleManager;
|
55
59
|
|
56
|
-
|
60
|
+
function initialize(address accessManagerAddress, address registryAddress, NftId registryNftId, address initialOwner)
|
61
|
+
public
|
62
|
+
initializer
|
57
63
|
{
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
function initialize(address accessManagerAddress, address registryAddress, NftId registryNftId, address initialOwner) public {
|
62
|
-
require(!_initialized, "Contract instance has already been initialized");
|
63
|
-
|
64
|
-
initializeAccessManagedSimple(accessManagerAddress);
|
65
|
-
|
66
|
-
_accessManager = AccessManagerSimple(accessManagerAddress);
|
67
|
-
_createRole(RoleIdLib.toRoleId(ADMIN_ROLE), "AdminRole", false, false);
|
68
|
-
_createRole(RoleIdLib.toRoleId(PUBLIC_ROLE), "PublicRole", false, false);
|
69
|
-
|
64
|
+
__AccessManaged_init(accessManagerAddress);
|
65
|
+
|
70
66
|
_initializeRegisterable(registryAddress, registryNftId, INSTANCE(), false, initialOwner, "");
|
71
67
|
|
72
68
|
_registerInterface(type(IInstance).interfaceId);
|
73
|
-
_initialized = true;
|
74
|
-
}
|
75
|
-
|
76
|
-
//--- Role ------------------------------------------------------//
|
77
|
-
function createStandardRole(RoleId roleId, string memory name) external restricted() {
|
78
|
-
_createRole(roleId, name, false, true);
|
79
|
-
}
|
80
|
-
|
81
|
-
function createCustomRole(RoleId roleId, string memory name) external restricted() {
|
82
|
-
_createRole(roleId, name, true, true);
|
83
|
-
}
|
84
|
-
|
85
|
-
function updateRole(RoleId roleId, string memory name, StateId newState) external restricted() {
|
86
|
-
(bool isCustom,) = _validateRoleParameters(roleId, name, false);
|
87
|
-
IAccess.RoleInfo memory role = _toRole(roleId, name, isCustom);
|
88
|
-
update(toRoleKey32(roleId), abi.encode(role), newState);
|
89
|
-
}
|
90
|
-
|
91
|
-
function updateRoleState(RoleId roleId, StateId newState) external restricted() {
|
92
|
-
updateState(toRoleKey32(roleId), newState);
|
93
|
-
}
|
94
|
-
|
95
|
-
function grantRole(RoleId roleId, address member) external restricted() returns (bool granted) {
|
96
|
-
Key32 roleKey = toRoleKey32(roleId);
|
97
|
-
|
98
|
-
if (!exists(roleKey)) {
|
99
|
-
revert IAccess.ErrorGrantNonexstentRole(roleId);
|
100
|
-
}
|
101
|
-
|
102
|
-
if (getState(roleKey) != ACTIVE()) {
|
103
|
-
revert IAccess.ErrorRoleIdNotActive(roleId);
|
104
|
-
}
|
105
|
-
|
106
|
-
if (!EnumerableSet.contains(_roleMembers[roleId], member)) {
|
107
|
-
_accessManager.grantRole(roleId.toInt(), member, EXECUTION_DELAY);
|
108
|
-
EnumerableSet.add(_roleMembers[roleId], member);
|
109
|
-
return true;
|
110
|
-
}
|
111
|
-
|
112
|
-
return false;
|
113
|
-
}
|
114
|
-
|
115
|
-
function revokeRole(RoleId roleId, address member) external restricted() returns (bool revoked) {
|
116
|
-
Key32 roleKey = toRoleKey32(roleId);
|
117
|
-
|
118
|
-
if (!exists(roleKey)) {
|
119
|
-
revert IAccess.ErrorRevokeNonexstentRole(roleId);
|
120
|
-
}
|
121
|
-
|
122
|
-
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
123
|
-
_accessManager.revokeRole(roleId.toInt(), member);
|
124
|
-
EnumerableSet.remove(_roleMembers[roleId], member);
|
125
|
-
return true;
|
126
|
-
}
|
127
|
-
|
128
|
-
return false;
|
129
|
-
}
|
130
|
-
|
131
|
-
/// @dev not restricted function by intention
|
132
|
-
/// the restriction to role members is already enforced by the call to the access manger
|
133
|
-
function renounceRole(RoleId roleId) external returns (bool revoked) {
|
134
|
-
address member = msg.sender;
|
135
|
-
Key32 roleKey = toRoleKey32(roleId);
|
136
|
-
|
137
|
-
if (!exists(roleKey)) {
|
138
|
-
revert IAccess.ErrorRenounceNonexstentRole(roleId);
|
139
|
-
}
|
140
|
-
|
141
|
-
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
142
|
-
_accessManager.renounceRole(roleId.toInt(), member);
|
143
|
-
EnumerableSet.remove(_roleMembers[roleId], member);
|
144
|
-
return true;
|
145
|
-
}
|
146
|
-
|
147
|
-
return false;
|
148
|
-
}
|
149
|
-
|
150
|
-
function roles() external view returns (uint256 numberOfRoles) {
|
151
|
-
return _roles.length;
|
152
|
-
}
|
153
|
-
|
154
|
-
function getRoleId(uint256 idx) external view returns (RoleId roleId) {
|
155
|
-
return _roles[idx];
|
156
|
-
}
|
157
|
-
|
158
|
-
function getRole(RoleId roleId) external view returns (IAccess.RoleInfo memory role) {
|
159
|
-
return abi.decode(getData(roleId.toKey32()), (IAccess.RoleInfo));
|
160
|
-
}
|
161
|
-
|
162
|
-
function roleMembers(RoleId roleId) external view returns (uint256 numberOfMembers) {
|
163
|
-
return EnumerableSet.length(_roleMembers[roleId]);
|
164
|
-
}
|
165
|
-
|
166
|
-
function getRoleMember(RoleId roleId, uint256 idx) external view returns (address roleMember) {
|
167
|
-
return EnumerableSet.at(_roleMembers[roleId], idx);
|
168
|
-
}
|
169
|
-
|
170
|
-
function _createRole(RoleId roleId, string memory name, bool isCustom, bool validateParameters) internal {
|
171
|
-
if (validateParameters) {
|
172
|
-
_validateRoleParameters(roleId, name, isCustom);
|
173
|
-
}
|
174
|
-
|
175
|
-
IAccess.RoleInfo memory role = _toRole(roleId, name, isCustom);
|
176
|
-
_role[role.name] = roleId;
|
177
|
-
_roles.push(roleId);
|
178
|
-
|
179
|
-
create(toRoleKey32(roleId), abi.encode(role));
|
180
|
-
}
|
181
|
-
|
182
|
-
//--- Target ------------------------------------------------------//
|
183
|
-
function createTarget(address target, IAccess.TargetInfo memory targetInfo) external restricted() {
|
184
|
-
_validateTargetParameters(target, targetInfo);
|
185
|
-
create(toTargetKey32(target), abi.encode(targetInfo));
|
186
|
-
}
|
187
|
-
|
188
|
-
function setTargetClosed(address target, bool closed) external restricted() {
|
189
|
-
if (!exists(toTargetKey32(target))) {
|
190
|
-
revert IAccess.ErrorTargetDoesNotExist(target);
|
191
|
-
}
|
192
|
-
|
193
|
-
_accessManager.setTargetClosed(target, closed);
|
194
69
|
}
|
195
70
|
|
196
71
|
//--- ProductSetup ------------------------------------------------------//
|
@@ -220,16 +95,16 @@ contract Instance is
|
|
220
95
|
}
|
221
96
|
|
222
97
|
//--- PoolSetup ------------------------------------------------------//
|
223
|
-
function createPoolSetup(NftId
|
224
|
-
create(_toNftKey32(
|
98
|
+
function createPoolSetup(NftId poolNftId, ISetup.PoolSetupInfo memory setup) external restricted() {
|
99
|
+
create(_toNftKey32(poolNftId, POOL()), abi.encode(setup));
|
225
100
|
}
|
226
101
|
|
227
|
-
function updatePoolSetup(NftId
|
228
|
-
update(_toNftKey32(
|
102
|
+
function updatePoolSetup(NftId poolNftId, ISetup.PoolSetupInfo memory setup, StateId newState) external restricted() {
|
103
|
+
update(_toNftKey32(poolNftId, POOL()), abi.encode(setup), newState);
|
229
104
|
}
|
230
105
|
|
231
|
-
function updatePoolSetupState(NftId
|
232
|
-
updateState(_toNftKey32(
|
106
|
+
function updatePoolSetupState(NftId poolNftId, StateId newState) external restricted() {
|
107
|
+
updateState(_toNftKey32(poolNftId, POOL()), newState);
|
233
108
|
}
|
234
109
|
|
235
110
|
//--- DistributorType ---------------------------------------------------//
|
@@ -337,71 +212,6 @@ contract Instance is
|
|
337
212
|
}
|
338
213
|
|
339
214
|
//--- internal view/pure functions --------------------------------------//
|
340
|
-
function _toRole(RoleId roleId, string memory name, bool isCustom)
|
341
|
-
internal
|
342
|
-
pure
|
343
|
-
returns (IAccess.RoleInfo memory role)
|
344
|
-
{
|
345
|
-
return IAccess.RoleInfo(
|
346
|
-
ShortStrings.toShortString(name),
|
347
|
-
isCustom);
|
348
|
-
}
|
349
|
-
|
350
|
-
function _validateRoleParameters(
|
351
|
-
RoleId roleId,
|
352
|
-
string memory name,
|
353
|
-
bool isCustom
|
354
|
-
)
|
355
|
-
internal
|
356
|
-
view
|
357
|
-
returns (
|
358
|
-
bool roleExists,
|
359
|
-
bool roleIsCustom
|
360
|
-
)
|
361
|
-
{
|
362
|
-
Key32 roleKey = toRoleKey32(roleId);
|
363
|
-
roleExists = exists(roleKey);
|
364
|
-
if (roleExists) {
|
365
|
-
roleIsCustom = abi.decode(getData(roleKey), (IAccess.RoleInfo)).isCustom;
|
366
|
-
} else {
|
367
|
-
roleIsCustom = isCustom;
|
368
|
-
}
|
369
|
-
|
370
|
-
// check role id
|
371
|
-
uint64 roleIdInt = RoleId.unwrap(roleId);
|
372
|
-
if(roleIdInt == ADMIN_ROLE || roleIdInt == PUBLIC_ROLE) {
|
373
|
-
revert IAccess.ErrorRoleIdInvalid(roleId);
|
374
|
-
}
|
375
|
-
|
376
|
-
if (roleIsCustom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
|
377
|
-
revert IAccess.ErrorRoleIdTooSmall(roleId);
|
378
|
-
} else if (roleIsCustom && roleIdInt >= CUSTOM_ROLE_ID_MIN) {
|
379
|
-
revert IAccess.ErrorRoleIdTooBig(roleId);
|
380
|
-
}
|
381
|
-
|
382
|
-
// role name checks
|
383
|
-
ShortString nameShort = ShortStrings.toShortString(name);
|
384
|
-
if (ShortStrings.byteLength(nameShort) == 0) {
|
385
|
-
revert IAccess.ErrorRoleNameEmpty(roleId);
|
386
|
-
}
|
387
|
-
|
388
|
-
if (_role[nameShort] != RoleIdLib.zero() && _role[nameShort] != roleId) {
|
389
|
-
revert IAccess.ErrorRoleNameNotUnique(_role[nameShort], nameShort);
|
390
|
-
}
|
391
|
-
}
|
392
|
-
|
393
|
-
function _validateTargetParameters(address target, IAccess.TargetInfo memory targetInfo) internal view {
|
394
|
-
|
395
|
-
}
|
396
|
-
|
397
|
-
function toRoleKey32(RoleId roleId) public pure returns (Key32) {
|
398
|
-
return roleId.toKey32();
|
399
|
-
}
|
400
|
-
|
401
|
-
function toTargetKey32(address target) public pure returns (Key32) {
|
402
|
-
return Key32Lib.toKey32(TARGET(), KeyId.wrap(bytes20(target)));
|
403
|
-
}
|
404
|
-
|
405
215
|
function _toNftKey32(NftId nftId, ObjectType objectType) internal pure returns (Key32) {
|
406
216
|
return nftId.toKey32(objectType);
|
407
217
|
}
|
@@ -414,30 +224,46 @@ contract Instance is
|
|
414
224
|
return policyNftId.toKey32(POLICY());
|
415
225
|
}
|
416
226
|
|
417
|
-
function
|
418
|
-
return
|
227
|
+
function getDistributionService() external view returns (IDistributionService) {
|
228
|
+
return IDistributionService(_registry.getServiceAddress(DISTRIBUTION(), VersionPart.wrap(3)));
|
419
229
|
}
|
420
230
|
|
421
|
-
function
|
422
|
-
return
|
231
|
+
function getProductService() external view returns (IProductService) {
|
232
|
+
return IProductService(_registry.getServiceAddress(PRODUCT(), VersionPart.wrap(3)));
|
423
233
|
}
|
424
234
|
|
425
|
-
|
426
|
-
|
427
|
-
|
428
|
-
|
235
|
+
function getPoolService() external view returns (IPoolService) {
|
236
|
+
return IPoolService(_registry.getServiceAddress(POOL(), VersionPart.wrap(3)));
|
237
|
+
}
|
238
|
+
|
239
|
+
function getPolicyService() external view returns (IPolicyService) {
|
240
|
+
return IPolicyService(_registry.getServiceAddress(POLICY(), VersionPart.wrap(3)));
|
241
|
+
}
|
429
242
|
|
430
|
-
|
431
|
-
|
432
|
-
|
433
|
-
// }
|
243
|
+
function getBundleService() external view returns (IBundleService) {
|
244
|
+
return IBundleService(_registry.getServiceAddress(BUNDLE(), VersionPart.wrap(3)));
|
245
|
+
}
|
434
246
|
|
435
247
|
function setInstanceReader(InstanceReader instanceReader) external restricted() {
|
436
|
-
require(
|
248
|
+
require(instanceReader.getInstance() == Instance(this), "InstanceReader instance mismatch");
|
437
249
|
_instanceReader = instanceReader;
|
438
250
|
}
|
439
251
|
|
252
|
+
function getMajorVersion() external pure returns (VersionPart majorVersion) {
|
253
|
+
return VersionPartLib.toVersionPart(GIF_MAJOR_VERSION);
|
254
|
+
}
|
255
|
+
|
440
256
|
function getInstanceReader() external view returns (InstanceReader) {
|
441
257
|
return _instanceReader;
|
442
258
|
}
|
259
|
+
|
260
|
+
function setBundleManager(BundleManager bundleManager) external restricted() {
|
261
|
+
require(address(_bundleManager) == address(0), "BundleManager is set");
|
262
|
+
require(bundleManager.getInstance() == Instance(this), "BundleManager instance mismatch");
|
263
|
+
_bundleManager = bundleManager;
|
264
|
+
}
|
265
|
+
|
266
|
+
function getBundleManager() external view returns (BundleManager) {
|
267
|
+
return _bundleManager;
|
268
|
+
}
|
443
269
|
}
|
@@ -1,95 +1,54 @@
|
|
1
1
|
// SPDX-License-Identifier: Apache-2.0
|
2
2
|
pragma solidity ^0.8.20;
|
3
3
|
|
4
|
+
import {AccessManager} from "@openzeppelin/contracts/access/manager/AccessManager.sol";
|
5
|
+
import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
|
4
6
|
import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
|
5
7
|
import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
|
6
8
|
|
7
|
-
import {
|
8
|
-
import {
|
9
|
-
import {
|
10
|
-
import {IPolicy} from "./module/IPolicy.sol";
|
11
|
-
import {IRisk} from "./module/IRisk.sol";
|
12
|
-
import {ISetup} from "./module/ISetup.sol";
|
13
|
-
import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
|
14
|
-
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
15
|
-
import {NftId} from "../types/NftId.sol";
|
16
|
-
import {NumberId} from "../types/NumberId.sol";
|
17
|
-
import {ObjectType, BUNDLE, DISTRIBUTION, POLICY, POOL, ROLE, PRODUCT, TARGET} from "../types/ObjectType.sol";
|
18
|
-
import {RiskId, RiskIdLib} from "../types/RiskId.sol";
|
19
|
-
import {RoleId, RoleIdLib} from "../types/RoleId.sol";
|
20
|
-
import {StateId, ACTIVE} from "../types/StateId.sol";
|
21
|
-
import {Timestamp, TimestampLib} from "../types/Timestamp.sol";
|
9
|
+
import {RoleId, RoleIdLib } from "../types/RoleId.sol";
|
10
|
+
import {TimestampLib} from "../types/Timestamp.sol";
|
11
|
+
import {IAccess} from "./module/IAccess.sol";
|
22
12
|
|
23
13
|
contract InstanceAccessManager is
|
24
|
-
|
14
|
+
AccessManagedUpgradeable
|
25
15
|
{
|
16
|
+
using RoleIdLib for RoleId;
|
17
|
+
|
26
18
|
string public constant ADMIN_ROLE_NAME = "AdminRole";
|
27
19
|
string public constant PUBLIC_ROLE_NAME = "PublicRole";
|
28
20
|
|
29
21
|
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
|
30
22
|
uint32 public constant EXECUTION_DELAY = 0;
|
31
23
|
|
32
|
-
struct RoleInfo {
|
33
|
-
ShortString name;
|
34
|
-
bool isCustom;
|
35
|
-
bool isLocked;
|
36
|
-
Timestamp createdAt;
|
37
|
-
Timestamp updatedAt;
|
38
|
-
}
|
39
|
-
|
40
|
-
struct TargetInfo {
|
41
|
-
ShortString name;
|
42
|
-
bool isCustom;
|
43
|
-
bool isLocked;
|
44
|
-
Timestamp createdAt;
|
45
|
-
Timestamp updatedAt;
|
46
|
-
}
|
47
|
-
|
48
|
-
error ErrorRoleIdInvalid(RoleId roleId);
|
49
|
-
error ErrorRoleIdTooBig(RoleId roleId);
|
50
|
-
error ErrorRoleIdTooSmall(RoleId roleId);
|
51
|
-
error ErrorRoleIdAlreadyExists(RoleId roleId, ShortString name);
|
52
|
-
error ErrorRoleIdNotActive(RoleId roleId);
|
53
|
-
error ErrorRoleNameEmpty(RoleId roleId);
|
54
|
-
error ErrorRoleNameNotUnique(RoleId roleId, ShortString name);
|
55
|
-
error ErrorRoleInvalidUpdate(RoleId roleId, bool isCustom);
|
56
|
-
error ErrorRoleIsCustomIsImmutable(RoleId roleId, bool isCustom, bool isCustomExisting);
|
57
|
-
error ErrorSetLockedForNonexstentRole(RoleId roleId);
|
58
|
-
error ErrorGrantNonexstentRole(RoleId roleId);
|
59
|
-
error ErrorRevokeNonexstentRole(RoleId roleId);
|
60
|
-
error ErrorRenounceNonexstentRole(RoleId roleId);
|
61
|
-
|
62
|
-
error ErrorTargetAddressZero();
|
63
|
-
error ErrorTargetAlreadyExists(address target, ShortString name);
|
64
|
-
error ErrorTargetNameEmpty(address target);
|
65
|
-
error ErrorTargetNameExists(address target, address existingTarget, ShortString name);
|
66
|
-
error ErrorSetLockedForNonexstentTarget(address target);
|
67
|
-
|
68
24
|
// role specific state
|
69
|
-
mapping(RoleId roleId => RoleInfo info) internal _role;
|
25
|
+
mapping(RoleId roleId => IAccess.RoleInfo info) internal _role;
|
70
26
|
mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
|
71
27
|
mapping(ShortString name => RoleId roleId) internal _roleForName;
|
72
28
|
RoleId [] internal _roles;
|
73
29
|
|
74
30
|
// target specific state
|
75
|
-
mapping(address target => TargetInfo info) internal _target;
|
31
|
+
mapping(address target => IAccess.TargetInfo info) internal _target;
|
76
32
|
mapping(ShortString name => address target) internal _targetForName;
|
77
33
|
address [] internal _targets;
|
78
34
|
|
79
|
-
|
35
|
+
AccessManager internal _accessManager;
|
80
36
|
|
81
|
-
|
37
|
+
function initialize(address initialAdmin) external initializer
|
82
38
|
{
|
83
|
-
|
84
|
-
|
39
|
+
// if size of the contract gets too large, this can be externalized which will reduce the contract size considerably
|
40
|
+
_accessManager = new AccessManager(address(this));
|
41
|
+
// this service required admin rights to access manager to be able to grant/revoke roles
|
42
|
+
_accessManager.grantRole(_accessManager.ADMIN_ROLE(), initialAdmin, 0);
|
43
|
+
|
44
|
+
__AccessManaged_init(address(_accessManager));
|
85
45
|
|
86
46
|
_createRole(RoleIdLib.toRoleId(_accessManager.ADMIN_ROLE()), ADMIN_ROLE_NAME, false, false);
|
87
47
|
_createRole(RoleIdLib.toRoleId(_accessManager.PUBLIC_ROLE()), PUBLIC_ROLE_NAME, false, false);
|
88
48
|
}
|
89
49
|
|
90
50
|
//--- Role ------------------------------------------------------//
|
91
|
-
|
92
|
-
function createDefaultRole(RoleId roleId, string memory name) external restricted() {
|
51
|
+
function createGifRole(RoleId roleId, string memory name) external restricted() {
|
93
52
|
_createRole(roleId, name, false, true);
|
94
53
|
}
|
95
54
|
|
@@ -99,7 +58,7 @@ contract InstanceAccessManager is
|
|
99
58
|
|
100
59
|
function setRoleLocked(RoleId roleId, bool locked) external restricted() {
|
101
60
|
if (!roleExists(roleId)) {
|
102
|
-
revert
|
61
|
+
revert IAccess.ErrorIAccessSetLockedForNonexstentRole(roleId);
|
103
62
|
}
|
104
63
|
|
105
64
|
_role[roleId].isLocked = locked;
|
@@ -112,11 +71,11 @@ contract InstanceAccessManager is
|
|
112
71
|
|
113
72
|
function grantRole(RoleId roleId, address member) external restricted() returns (bool granted) {
|
114
73
|
if (!roleExists(roleId)) {
|
115
|
-
revert
|
74
|
+
revert IAccess.ErrorIAccessGrantNonexstentRole(roleId);
|
116
75
|
}
|
117
76
|
|
118
77
|
if (_role[roleId].isLocked) {
|
119
|
-
revert
|
78
|
+
revert IAccess.ErrorIAccessRoleIdNotActive(roleId);
|
120
79
|
}
|
121
80
|
|
122
81
|
if (!EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -130,7 +89,7 @@ contract InstanceAccessManager is
|
|
130
89
|
|
131
90
|
function revokeRole(RoleId roleId, address member) external restricted() returns (bool revoked) {
|
132
91
|
if (!roleExists(roleId)) {
|
133
|
-
revert
|
92
|
+
revert IAccess.ErrorIAccessRevokeNonexstentRole(roleId);
|
134
93
|
}
|
135
94
|
|
136
95
|
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -148,7 +107,7 @@ contract InstanceAccessManager is
|
|
148
107
|
address member = msg.sender;
|
149
108
|
|
150
109
|
if (!roleExists(roleId)) {
|
151
|
-
revert
|
110
|
+
revert IAccess.ErrorIAccessRenounceNonexstentRole(roleId);
|
152
111
|
}
|
153
112
|
|
154
113
|
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -173,7 +132,7 @@ contract InstanceAccessManager is
|
|
173
132
|
return _roleForName[ShortStrings.toShortString(name)];
|
174
133
|
}
|
175
134
|
|
176
|
-
function getRole(RoleId roleId) external view returns (RoleInfo memory role) {
|
135
|
+
function getRole(RoleId roleId) external view returns (IAccess.RoleInfo memory role) {
|
177
136
|
return _role[roleId];
|
178
137
|
}
|
179
138
|
|
@@ -190,13 +149,19 @@ contract InstanceAccessManager is
|
|
190
149
|
}
|
191
150
|
|
192
151
|
//--- Target ------------------------------------------------------//
|
152
|
+
function createGifTarget(address target, string memory name) external restricted() {
|
153
|
+
_createTarget(target, name, false, true);
|
154
|
+
}
|
155
|
+
|
193
156
|
function createTarget(address target, string memory name) external restricted() {
|
194
157
|
_createTarget(target, name, true, true);
|
195
158
|
}
|
196
159
|
|
197
|
-
function setTargetLocked(
|
198
|
-
|
199
|
-
|
160
|
+
function setTargetLocked(string memory targetName, bool locked) external restricted() {
|
161
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
162
|
+
|
163
|
+
if (target == address(0)) {
|
164
|
+
revert IAccess.ErrorIAccessSetLockedForNonexstentTarget(target);
|
200
165
|
}
|
201
166
|
|
202
167
|
_target[target].isLocked = locked;
|
@@ -214,7 +179,7 @@ contract InstanceAccessManager is
|
|
214
179
|
_validateRoleParameters(roleId, name, isCustom);
|
215
180
|
}
|
216
181
|
|
217
|
-
RoleInfo memory role = RoleInfo(
|
182
|
+
IAccess.RoleInfo memory role = IAccess.RoleInfo(
|
218
183
|
ShortStrings.toShortString(name),
|
219
184
|
isCustom,
|
220
185
|
false, // role un-locked,
|
@@ -233,35 +198,35 @@ contract InstanceAccessManager is
|
|
233
198
|
)
|
234
199
|
internal
|
235
200
|
view
|
236
|
-
returns (RoleInfo memory existingRole)
|
201
|
+
returns (IAccess.RoleInfo memory existingRole)
|
237
202
|
{
|
238
203
|
// check role id
|
239
204
|
uint64 roleIdInt = RoleId.unwrap(roleId);
|
240
205
|
if(roleIdInt == _accessManager.ADMIN_ROLE() || roleIdInt == _accessManager.PUBLIC_ROLE()) {
|
241
|
-
revert
|
206
|
+
revert IAccess.ErrorIAccessRoleIdInvalid(roleId);
|
242
207
|
}
|
243
208
|
|
244
209
|
// prevent changing isCustom for existing roles
|
245
210
|
existingRole = _role[roleId];
|
246
211
|
|
247
212
|
if (existingRole.createdAt.gtz() && isCustom != existingRole.isCustom) {
|
248
|
-
revert
|
213
|
+
revert IAccess.ErrorIAccessRoleIsCustomIsImmutable(roleId, isCustom, existingRole.isCustom);
|
249
214
|
}
|
250
215
|
|
251
216
|
if (isCustom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
|
252
|
-
revert
|
217
|
+
revert IAccess.ErrorIAccessRoleIdTooSmall(roleId);
|
253
218
|
} else if (!isCustom && roleIdInt >= CUSTOM_ROLE_ID_MIN) {
|
254
|
-
revert
|
219
|
+
revert IAccess.ErrorIAccessRoleIdTooBig(roleId);
|
255
220
|
}
|
256
221
|
|
257
222
|
// role name checks
|
258
223
|
ShortString nameShort = ShortStrings.toShortString(name);
|
259
224
|
if (ShortStrings.byteLength(nameShort) == 0) {
|
260
|
-
revert
|
225
|
+
revert IAccess.ErrorIAccessRoleNameEmpty(roleId);
|
261
226
|
}
|
262
227
|
|
263
228
|
if (_roleForName[nameShort] != RoleIdLib.zero() && _roleForName[nameShort] != roleId) {
|
264
|
-
revert
|
229
|
+
revert IAccess.ErrorIAccessRoleNameNotUnique(_roleForName[nameShort], nameShort);
|
265
230
|
}
|
266
231
|
}
|
267
232
|
|
@@ -270,7 +235,14 @@ contract InstanceAccessManager is
|
|
270
235
|
_validateTargetParameters(target, name, isCustom);
|
271
236
|
}
|
272
237
|
|
273
|
-
|
238
|
+
if (_target[target].createdAt.gtz()) {
|
239
|
+
revert IAccess.ErrorIAccessTargetAlreadyExists(target, _target[target].name);
|
240
|
+
}
|
241
|
+
if (_targetForName[ShortStrings.toShortString(name)] != address(0)) {
|
242
|
+
revert IAccess.ErrorIAccessTargetNameExists(target, _targetForName[ShortStrings.toShortString(name)], ShortStrings.toShortString(name));
|
243
|
+
}
|
244
|
+
|
245
|
+
IAccess.TargetInfo memory info = IAccess.TargetInfo(
|
274
246
|
ShortStrings.toShortString(name),
|
275
247
|
isCustom,
|
276
248
|
_accessManager.isTargetClosed(target), // sync with state in access manager
|
@@ -283,6 +255,44 @@ contract InstanceAccessManager is
|
|
283
255
|
}
|
284
256
|
|
285
257
|
function _validateTargetParameters(address target, string memory name, bool isCustom) internal view {
|
258
|
+
// TODO: implement
|
259
|
+
}
|
260
|
+
|
261
|
+
function setTargetFunctionRole(
|
262
|
+
address target,
|
263
|
+
bytes4[] calldata selectors,
|
264
|
+
uint64 roleId
|
265
|
+
) public virtual restricted() {
|
266
|
+
_accessManager.setTargetFunctionRole(target, selectors, roleId);
|
267
|
+
}
|
268
|
+
|
269
|
+
function setTargetFunctionRole(
|
270
|
+
string memory targetName,
|
271
|
+
bytes4[] calldata selectors,
|
272
|
+
RoleId roleId
|
273
|
+
) public virtual restricted() {
|
274
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
275
|
+
uint64 roleIdInt = RoleId.unwrap(roleId);
|
276
|
+
_accessManager.setTargetFunctionRole(target, selectors, roleIdInt);
|
277
|
+
}
|
278
|
+
|
279
|
+
function setTargetClosed(string memory targetName, bool closed) public restricted() {
|
280
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
281
|
+
if (target == address(0)) {
|
282
|
+
revert IAccess.ErrorIAccessTargetAddressZero();
|
283
|
+
}
|
284
|
+
_accessManager.setTargetClosed(target, closed);
|
285
|
+
}
|
286
|
+
|
287
|
+
function isTargetLocked(address target) public view returns (bool locked) {
|
288
|
+
return _accessManager.isTargetClosed(target);
|
289
|
+
}
|
286
290
|
|
291
|
+
function canCall(
|
292
|
+
address caller,
|
293
|
+
address target,
|
294
|
+
bytes4 selector
|
295
|
+
) public view virtual returns (bool immediate, uint32 delay) {
|
296
|
+
return _accessManager.canCall(caller, target, selector);
|
287
297
|
}
|
288
298
|
}
|