@etherisc/gif-next 0.0.2-c96f882-016 → 0.0.2-ca84135-795

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (268) hide show
  1. package/README.md +63 -1
  2. package/artifacts/contracts/components/Component.sol/Component.dbg.json +4 -0
  3. package/artifacts/contracts/{instance/service/IComponentOwnerService.sol/IComponentOwnerService.json → components/Component.sol/Component.json} +210 -178
  4. package/artifacts/contracts/components/Distribution.sol/Distribution.dbg.json +1 -1
  5. package/artifacts/contracts/components/Distribution.sol/Distribution.json +171 -90
  6. package/artifacts/contracts/components/IComponent.sol/IComponent.dbg.json +4 -0
  7. package/artifacts/contracts/{shared/RegisterableUpgradable.sol/RegisterableUpgradable.json → components/IComponent.sol/IComponent.json} +133 -162
  8. package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
  9. package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
  10. package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.json +28 -2
  11. package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.dbg.json +1 -1
  12. package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.json +5 -5
  13. package/artifacts/contracts/components/Pool.sol/Pool.dbg.json +1 -1
  14. package/artifacts/contracts/components/Pool.sol/Pool.json +203 -119
  15. package/artifacts/contracts/components/Product.sol/Product.dbg.json +1 -1
  16. package/artifacts/contracts/components/Product.sol/Product.json +183 -146
  17. package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.dbg.json +1 -1
  18. package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.dbg.json +1 -1
  19. package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.dbg.json +1 -1
  20. package/artifacts/contracts/experiment/errors/Require.sol/Require.dbg.json +1 -1
  21. package/artifacts/contracts/experiment/errors/Revert.sol/Revert.dbg.json +1 -1
  22. package/artifacts/contracts/experiment/inheritance/A.sol/A.dbg.json +1 -1
  23. package/artifacts/contracts/experiment/inheritance/A.sol/AShared.dbg.json +1 -1
  24. package/artifacts/contracts/experiment/inheritance/B.sol/B.dbg.json +1 -1
  25. package/artifacts/contracts/experiment/inheritance/C.sol/C.dbg.json +1 -1
  26. package/artifacts/contracts/experiment/inheritance/IA.sol/IA.dbg.json +1 -1
  27. package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.dbg.json +1 -1
  28. package/artifacts/contracts/experiment/inheritance/IB.sol/IB.dbg.json +1 -1
  29. package/artifacts/contracts/experiment/inheritance/IC.sol/IC.dbg.json +1 -1
  30. package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.dbg.json +1 -1
  31. package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.json +2 -2
  32. package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.dbg.json +1 -1
  33. package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.dbg.json +1 -1
  34. package/artifacts/contracts/experiment/statemachine/SM.sol/SM.dbg.json +1 -1
  35. package/artifacts/contracts/experiment/statemachine/SM.sol/SM.json +2 -2
  36. package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.dbg.json +1 -1
  37. package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.json +2 -2
  38. package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.dbg.json +1 -1
  39. package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.dbg.json +1 -1
  40. package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.dbg.json +4 -0
  41. package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.json +1206 -0
  42. package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +4 -0
  43. package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +764 -0
  44. package/artifacts/contracts/instance/Cloneable.sol/Cloneable.dbg.json +4 -0
  45. package/artifacts/contracts/instance/{AccessManagedSimple.sol/AccessManagedSimple.json → Cloneable.sol/Cloneable.json} +74 -3
  46. package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
  47. package/artifacts/contracts/instance/IInstance.sol/IInstance.json +1649 -28
  48. package/artifacts/contracts/instance/IInstanceBase.sol/IInstanceBase.dbg.json +4 -0
  49. package/artifacts/contracts/instance/IInstanceBase.sol/IInstanceBase.json +619 -0
  50. package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
  51. package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +104 -14
  52. package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
  53. package/artifacts/contracts/instance/Instance.sol/Instance.json +155 -662
  54. package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.dbg.json +1 -1
  55. package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.json +243 -126
  56. package/artifacts/contracts/instance/InstanceBase.sol/InstanceBase.dbg.json +4 -0
  57. package/artifacts/contracts/instance/InstanceBase.sol/InstanceBase.json +763 -0
  58. package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
  59. package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +164 -66
  60. package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
  61. package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +275 -74
  62. package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
  63. package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +52 -24
  64. package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.dbg.json +4 -0
  65. package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.json +261 -0
  66. package/artifacts/contracts/instance/base/ComponentService.sol/ComponentService.dbg.json +4 -0
  67. package/artifacts/contracts/instance/base/{ComponentServiceBase.sol/ComponentServiceBase.json → ComponentService.sol/ComponentService.json} +125 -11
  68. package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.dbg.json +1 -1
  69. package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.json +0 -13
  70. package/artifacts/contracts/instance/base/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
  71. package/artifacts/contracts/instance/base/ILifecycle.sol/ILifecycle.dbg.json +1 -1
  72. package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
  73. package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.json +2 -2
  74. package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.dbg.json +1 -1
  75. package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.json +2 -2
  76. package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
  77. package/artifacts/contracts/instance/module/IAccess.sol/IAccess.json +59 -16
  78. package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
  79. package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
  80. package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
  81. package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
  82. package/artifacts/contracts/instance/module/ISetup.sol/ISetup.dbg.json +1 -1
  83. package/artifacts/contracts/instance/module/ITreasury.sol/ITreasury.dbg.json +1 -1
  84. package/artifacts/contracts/instance/service/BundleService.sol/BundleService.dbg.json +4 -0
  85. package/artifacts/contracts/instance/service/BundleService.sol/BundleService.json +1094 -0
  86. package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.dbg.json +4 -0
  87. package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.json +436 -0
  88. package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.dbg.json +4 -0
  89. package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.json +764 -0
  90. package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +4 -0
  91. package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.json +424 -0
  92. package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.dbg.json +4 -0
  93. package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.json +720 -0
  94. package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.dbg.json +1 -1
  95. package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.json +13 -13
  96. package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.dbg.json +4 -0
  97. package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.json +771 -0
  98. package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.dbg.json +1 -1
  99. package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.json +15 -77
  100. package/artifacts/contracts/instance/service/IProductService.sol/IProductService.dbg.json +1 -1
  101. package/artifacts/contracts/instance/service/IProductService.sol/IProductService.json +25 -240
  102. package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.dbg.json +4 -0
  103. package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.json +1219 -0
  104. package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +4 -0
  105. package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.json +492 -0
  106. package/artifacts/contracts/instance/service/PoolService.sol/PoolService.dbg.json +4 -0
  107. package/artifacts/contracts/instance/service/PoolService.sol/PoolService.json +798 -0
  108. package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.dbg.json +4 -0
  109. package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.json +424 -0
  110. package/artifacts/contracts/instance/service/ProductService.sol/ProductService.dbg.json +4 -0
  111. package/artifacts/contracts/instance/service/ProductService.sol/ProductService.json +848 -0
  112. package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.dbg.json +4 -0
  113. package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.json +424 -0
  114. package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
  115. package/artifacts/contracts/registry/ChainNft.sol/ChainNft.json +2 -2
  116. package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
  117. package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +146 -229
  118. package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
  119. package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +195 -86
  120. package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
  121. package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
  122. package/artifacts/contracts/registry/Registry.sol/Registry.json +159 -316
  123. package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.dbg.json +4 -0
  124. package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.json +285 -0
  125. package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
  126. package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +38 -112
  127. package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
  128. package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +38 -95
  129. package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +4 -0
  130. package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +530 -0
  131. package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +4 -0
  132. package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +397 -0
  133. package/artifacts/contracts/shared/ContractDeployerLib.sol/ContractDeployerLib.dbg.json +1 -1
  134. package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
  135. package/artifacts/contracts/shared/ERC165.sol/ERC165.json +2 -2
  136. package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
  137. package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
  138. package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
  139. package/artifacts/contracts/shared/IService.sol/IService.json +13 -13
  140. package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +1 -1
  141. package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
  142. package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +2 -2
  143. package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +1 -1
  144. package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +2 -2
  145. package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
  146. package/artifacts/contracts/shared/Registerable.sol/Registerable.json +4 -4
  147. package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
  148. package/artifacts/contracts/shared/Service.sol/Service.json +13 -13
  149. package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
  150. package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +1 -1
  151. package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +1 -1
  152. package/artifacts/contracts/test/TestFee.sol/TestFee.dbg.json +1 -1
  153. package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.dbg.json +1 -1
  154. package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.json +4 -4
  155. package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.dbg.json +1 -1
  156. package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.json +2 -2
  157. package/artifacts/contracts/test/TestService.sol/TestService.dbg.json +1 -1
  158. package/artifacts/contracts/test/TestService.sol/TestService.json +31 -31
  159. package/artifacts/contracts/test/TestToken.sol/TestUsdc.dbg.json +1 -1
  160. package/artifacts/contracts/test/TestVersion.sol/TestVersion.dbg.json +1 -1
  161. package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.dbg.json +1 -1
  162. package/artifacts/contracts/test/Usdc.sol/USDC.dbg.json +1 -1
  163. package/artifacts/contracts/types/AddressSet.sol/LibAddressSet.dbg.json +1 -1
  164. package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
  165. package/artifacts/contracts/types/ChainId.sol/ChainIdLib.dbg.json +1 -1
  166. package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
  167. package/artifacts/contracts/types/Fee.sol/FeeLib.dbg.json +1 -1
  168. package/artifacts/contracts/types/Key32.sol/Key32Lib.dbg.json +1 -1
  169. package/artifacts/contracts/types/NftId.sol/NftIdLib.dbg.json +1 -1
  170. package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
  171. package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.json +26 -3
  172. package/artifacts/contracts/types/NumberId.sol/NumberIdLib.dbg.json +1 -1
  173. package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
  174. package/artifacts/contracts/types/Referral.sol/ReferralLib.dbg.json +1 -1
  175. package/artifacts/contracts/types/RiskId.sol/RiskIdLib.dbg.json +1 -1
  176. package/artifacts/contracts/types/RoleId.sol/RoleIdLib.dbg.json +1 -1
  177. package/artifacts/contracts/types/RoleId.sol/RoleIdLib.json +2 -2
  178. package/artifacts/contracts/types/StateId.sol/StateIdLib.dbg.json +1 -1
  179. package/artifacts/contracts/types/StateId.sol/StateIdLib.json +2 -2
  180. package/artifacts/contracts/types/Timestamp.sol/TimestampLib.dbg.json +1 -1
  181. package/artifacts/contracts/types/UFixed.sol/MathLib.dbg.json +1 -1
  182. package/artifacts/contracts/types/UFixed.sol/UFixedLib.dbg.json +1 -1
  183. package/artifacts/contracts/types/Version.sol/VersionLib.dbg.json +1 -1
  184. package/artifacts/contracts/types/Version.sol/VersionPartLib.dbg.json +1 -1
  185. package/contracts/components/Component.sol +177 -0
  186. package/contracts/components/Distribution.sol +17 -29
  187. package/contracts/components/IComponent.sol +37 -0
  188. package/contracts/components/IDistributionComponent.sol +1 -0
  189. package/contracts/components/IPoolComponent.sol +5 -1
  190. package/contracts/components/IProductComponent.sol +2 -2
  191. package/contracts/components/Pool.sol +46 -47
  192. package/contracts/components/Product.sol +57 -59
  193. package/contracts/instance/AccessManagerUpgradeableInitializeable.sol +23 -0
  194. package/contracts/instance/BundleManager.sol +125 -0
  195. package/contracts/instance/Cloneable.sol +46 -0
  196. package/contracts/instance/IInstance.sol +43 -9
  197. package/contracts/instance/IInstanceBase.sol +27 -0
  198. package/contracts/instance/IInstanceService.sol +14 -4
  199. package/contracts/instance/Instance.sol +54 -237
  200. package/contracts/instance/InstanceAccessManager.sol +93 -78
  201. package/contracts/instance/InstanceBase.sol +38 -0
  202. package/contracts/instance/InstanceReader.sol +29 -26
  203. package/contracts/instance/InstanceService.sol +301 -77
  204. package/contracts/instance/InstanceServiceManager.sol +10 -12
  205. package/contracts/instance/ObjectManager.sol +84 -0
  206. package/contracts/instance/base/ComponentService.sol +133 -0
  207. package/contracts/instance/base/IInstanceBase.sol +0 -2
  208. package/contracts/instance/module/IAccess.sol +27 -17
  209. package/contracts/instance/module/IBundle.sol +1 -0
  210. package/contracts/instance/module/ISetup.sol +3 -0
  211. package/contracts/instance/service/BundleService.sol +293 -0
  212. package/contracts/instance/service/BundleServiceManager.sol +51 -0
  213. package/contracts/instance/service/DistributionService.sol +115 -0
  214. package/contracts/instance/service/DistributionServiceManager.sol +51 -0
  215. package/contracts/instance/service/IBundleService.sol +44 -0
  216. package/contracts/instance/service/IPolicyService.sol +94 -0
  217. package/contracts/instance/service/IPoolService.sol +6 -23
  218. package/contracts/instance/service/IProductService.sol +6 -73
  219. package/contracts/instance/service/PolicyService.sol +538 -0
  220. package/contracts/instance/service/PolicyServiceManager.sol +54 -0
  221. package/contracts/instance/service/PoolService.sol +142 -0
  222. package/contracts/instance/service/PoolServiceManager.sol +51 -0
  223. package/contracts/instance/service/ProductService.sol +241 -0
  224. package/contracts/instance/service/ProductServiceManager.sol +54 -0
  225. package/contracts/registry/ChainNft.sol +1 -1
  226. package/contracts/registry/IRegistry.sol +30 -29
  227. package/contracts/registry/IRegistryService.sol +36 -14
  228. package/contracts/registry/Registry.sol +163 -239
  229. package/contracts/registry/RegistryAccessManager.sol +210 -0
  230. package/contracts/registry/RegistryService.sol +86 -218
  231. package/contracts/registry/RegistryServiceManager.sol +20 -22
  232. package/contracts/registry/ReleaseManager.sol +342 -0
  233. package/contracts/registry/TokenRegistry.sol +110 -0
  234. package/contracts/shared/ERC165.sol +6 -2
  235. package/contracts/shared/IRegisterable.sol +0 -2
  236. package/contracts/shared/IService.sol +2 -1
  237. package/contracts/shared/NftOwnable.sol +4 -4
  238. package/contracts/shared/ProxyManager.sol +1 -1
  239. package/contracts/shared/Registerable.sol +1 -0
  240. package/contracts/shared/Service.sol +14 -8
  241. package/contracts/test/TestService.sol +3 -2
  242. package/contracts/types/NftIdSet.sol +26 -24
  243. package/contracts/types/RoleId.sol +14 -6
  244. package/contracts/types/StateId.sol +4 -0
  245. package/package.json +1 -1
  246. package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.dbg.json +0 -4
  247. package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.json +0 -314
  248. package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.dbg.json +0 -4
  249. package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.json +0 -267
  250. package/artifacts/contracts/instance/AccessManagedSimple.sol/AccessManagedSimple.dbg.json +0 -4
  251. package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.dbg.json +0 -4
  252. package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.json +0 -1132
  253. package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.dbg.json +0 -4
  254. package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.json +0 -1082
  255. package/artifacts/contracts/instance/base/ComponentServiceBase.sol/ComponentServiceBase.dbg.json +0 -4
  256. package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.dbg.json +0 -4
  257. package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.json +0 -827
  258. package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.dbg.json +0 -4
  259. package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.dbg.json +0 -4
  260. package/contracts/components/BaseComponent.sol +0 -86
  261. package/contracts/components/IBaseComponent.sol +0 -24
  262. package/contracts/instance/AccessManagedSimple.sol +0 -122
  263. package/contracts/instance/AccessManagerSimple.sol +0 -692
  264. package/contracts/instance/IAccessManagerSimple.sol +0 -391
  265. package/contracts/instance/base/ComponentServiceBase.sol +0 -49
  266. package/contracts/instance/service/ComponentOwnerService.sol +0 -317
  267. package/contracts/instance/service/IComponentOwnerService.sol +0 -20
  268. package/contracts/shared/RegisterableUpgradable.sol +0 -16
@@ -3,9 +3,9 @@ pragma solidity ^0.8.20;
3
3
 
4
4
  import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
5
5
  import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
6
+ import {Initializable} from "@openzeppelin/contracts/proxy/utils/Initializable.sol";
7
+ import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
6
8
 
7
- import {AccessManagedSimple} from "./AccessManagedSimple.sol";
8
- import {AccessManagerSimple} from "./AccessManagerSimple.sol";
9
9
  import {IAccess} from "./module/IAccess.sol";
10
10
  import {IBundle} from "./module/IBundle.sol";
11
11
  import {IPolicy} from "./module/IPolicy.sol";
@@ -15,24 +15,26 @@ import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
15
15
  import {KeyValueStore} from "./base/KeyValueStore.sol";
16
16
  import {IInstance} from "./IInstance.sol";
17
17
  import {InstanceReader} from "./InstanceReader.sol";
18
+ import {InstanceAccessManager} from "./InstanceAccessManager.sol";
19
+ import {BundleManager} from "./BundleManager.sol";
18
20
  import {NftId} from "../types/NftId.sol";
19
21
  import {NumberId} from "../types/NumberId.sol";
20
- import {ObjectType, BUNDLE, DISTRIBUTION, INSTANCE, POLICY, POOL, ROLE, PRODUCT, TARGET} from "../types/ObjectType.sol";
21
- import {RiskId, RiskIdLib} from "../types/RiskId.sol";
22
- import {RoleId, RoleIdLib} from "../types/RoleId.sol";
23
- import {StateId, ACTIVE} from "../types/StateId.sol";
24
- import {ERC165} from "../shared/ERC165.sol";
25
- import {Registerable} from "../shared/Registerable.sol";
26
- import {ComponentOwnerService} from "./service/ComponentOwnerService.sol";
27
- import {IComponentOwnerService} from "./service/IComponentOwnerService.sol";
22
+ import {ObjectType, BUNDLE, DISTRIBUTION, INSTANCE, POLICY, POOL, ROLE, PRODUCT, TARGET, COMPONENT} from "../types/ObjectType.sol";
23
+ import {RiskId} from "../types/RiskId.sol";
24
+ import {StateId} from "../types/StateId.sol";
25
+ import {IDistributionService} from "./service/IDistributionService.sol";
26
+ import {IPoolService} from "./service/IPoolService.sol";
27
+ import {IProductService} from "./service/IProductService.sol";
28
+ import {IPolicyService} from "./service/IPolicyService.sol";
29
+ import {IBundleService} from "./service/IBundleService.sol";
28
30
  import {VersionPart} from "../types/Version.sol";
31
+ import {InstanceBase} from "./InstanceBase.sol";
29
32
 
30
33
  contract Instance is
31
- AccessManagedSimple,
32
- KeyValueStore,
33
34
  IInstance,
34
- ERC165,
35
- Registerable
35
+ AccessManagedUpgradeable,
36
+ // Initializable,
37
+ InstanceBase
36
38
  {
37
39
 
38
40
  uint64 public constant ADMIN_ROLE = type(uint64).min;
@@ -43,154 +45,23 @@ contract Instance is
43
45
 
44
46
  bool private _initialized;
45
47
 
46
- mapping(ShortString name => RoleId roleId) internal _role;
47
- mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
48
- RoleId [] internal _roles;
49
-
50
- mapping(ShortString name => address target) internal _target;
51
-
52
- AccessManagerSimple internal _accessManager;
53
48
  InstanceReader internal _instanceReader;
49
+ BundleManager internal _bundleManager;
54
50
 
55
- constructor(address accessManagerAddress, address registryAddress, NftId registryNftId)
56
- AccessManagedSimple(accessManagerAddress)
51
+ function initialize(address accessManagerAddress, address registryAddress, NftId registryNftId, address initialOwner)
52
+ public
53
+ initializer
57
54
  {
58
- initialize(accessManagerAddress, registryAddress, registryNftId, msg.sender);
59
- }
60
-
61
- function initialize(address accessManagerAddress, address registryAddress, NftId registryNftId, address initialOwner) public {
62
55
  require(!_initialized, "Contract instance has already been initialized");
63
56
 
64
- _accessManager = AccessManagerSimple(accessManagerAddress);
65
- _createRole(RoleIdLib.toRoleId(ADMIN_ROLE), "AdminRole", false, false);
66
- _createRole(RoleIdLib.toRoleId(PUBLIC_ROLE), "PublicRole", false, false);
67
-
57
+ __AccessManaged_init(accessManagerAddress);
58
+
68
59
  _initializeRegisterable(registryAddress, registryNftId, INSTANCE(), false, initialOwner, "");
69
60
 
70
61
  _registerInterface(type(IInstance).interfaceId);
71
62
  _initialized = true;
72
63
  }
73
64
 
74
- //--- Role ------------------------------------------------------//
75
- function createStandardRole(RoleId roleId, string memory name) external restricted() {
76
- _createRole(roleId, name, false, true);
77
- }
78
-
79
- function createCustomRole(RoleId roleId, string memory name) external restricted() {
80
- _createRole(roleId, name, true, true);
81
- }
82
-
83
- function updateRole(RoleId roleId, string memory name, StateId newState) external restricted() {
84
- (bool isCustom,) = _validateRoleParameters(roleId, name, false);
85
- IAccess.RoleInfo memory role = _toRole(roleId, name, isCustom);
86
- update(toRoleKey32(roleId), abi.encode(role), newState);
87
- }
88
-
89
- function updateRoleState(RoleId roleId, StateId newState) external restricted() {
90
- updateState(toRoleKey32(roleId), newState);
91
- }
92
-
93
- function grantRole(RoleId roleId, address member) external restricted() returns (bool granted) {
94
- Key32 roleKey = toRoleKey32(roleId);
95
-
96
- if (!exists(roleKey)) {
97
- revert IAccess.ErrorGrantNonexstentRole(roleId);
98
- }
99
-
100
- if (getState(roleKey) != ACTIVE()) {
101
- revert IAccess.ErrorRoleIdNotActive(roleId);
102
- }
103
-
104
- if (!EnumerableSet.contains(_roleMembers[roleId], member)) {
105
- _accessManager.grantRole(roleId.toInt(), member, EXECUTION_DELAY);
106
- EnumerableSet.add(_roleMembers[roleId], member);
107
- return true;
108
- }
109
-
110
- return false;
111
- }
112
-
113
- function revokeRole(RoleId roleId, address member) external restricted() returns (bool revoked) {
114
- Key32 roleKey = toRoleKey32(roleId);
115
-
116
- if (!exists(roleKey)) {
117
- revert IAccess.ErrorRevokeNonexstentRole(roleId);
118
- }
119
-
120
- if (EnumerableSet.contains(_roleMembers[roleId], member)) {
121
- _accessManager.revokeRole(roleId.toInt(), member);
122
- EnumerableSet.remove(_roleMembers[roleId], member);
123
- return true;
124
- }
125
-
126
- return false;
127
- }
128
-
129
- /// @dev not restricted function by intention
130
- /// the restriction to role members is already enforced by the call to the access manger
131
- function renounceRole(RoleId roleId) external returns (bool revoked) {
132
- address member = msg.sender;
133
- Key32 roleKey = toRoleKey32(roleId);
134
-
135
- if (!exists(roleKey)) {
136
- revert IAccess.ErrorRenounceNonexstentRole(roleId);
137
- }
138
-
139
- if (EnumerableSet.contains(_roleMembers[roleId], member)) {
140
- _accessManager.renounceRole(roleId.toInt(), member);
141
- EnumerableSet.remove(_roleMembers[roleId], member);
142
- return true;
143
- }
144
-
145
- return false;
146
- }
147
-
148
- function roles() external view returns (uint256 numberOfRoles) {
149
- return _roles.length;
150
- }
151
-
152
- function getRoleId(uint256 idx) external view returns (RoleId roleId) {
153
- return _roles[idx];
154
- }
155
-
156
- function getRole(RoleId roleId) external view returns (IAccess.RoleInfo memory role) {
157
- return abi.decode(getData(roleId.toKey32()), (IAccess.RoleInfo));
158
- }
159
-
160
- function roleMembers(RoleId roleId) external view returns (uint256 numberOfMembers) {
161
- return EnumerableSet.length(_roleMembers[roleId]);
162
- }
163
-
164
- function getRoleMember(RoleId roleId, uint256 idx) external view returns (address roleMember) {
165
- return EnumerableSet.at(_roleMembers[roleId], idx);
166
- }
167
-
168
- function _createRole(RoleId roleId, string memory name, bool isCustom, bool validateParameters) internal {
169
- if (validateParameters) {
170
- _validateRoleParameters(roleId, name, isCustom);
171
- }
172
-
173
- IAccess.RoleInfo memory role = _toRole(roleId, name, isCustom);
174
- _role[role.name] = roleId;
175
- _roles.push(roleId);
176
-
177
- create(toRoleKey32(roleId), abi.encode(role));
178
- }
179
-
180
- //--- Target ------------------------------------------------------//
181
- function createTarget(address target, IAccess.TargetInfo memory targetInfo) external restricted() {
182
- _validateTargetParameters(target, targetInfo);
183
- create(toTargetKey32(target), abi.encode(targetInfo));
184
- }
185
-
186
- function setTargetClosed(address target, bool closed) external restricted() {
187
- if (!exists(toTargetKey32(target))) {
188
- revert IAccess.ErrorTargetDoesNotExist(target);
189
- }
190
-
191
- _accessManager.setTargetClosed(target, closed);
192
- }
193
-
194
65
  //--- ProductSetup ------------------------------------------------------//
195
66
  function createProductSetup(NftId productNftId, ISetup.ProductSetupInfo memory setup) external restricted() {
196
67
  create(_toNftKey32(productNftId, PRODUCT()), abi.encode(setup));
@@ -218,16 +89,16 @@ contract Instance is
218
89
  }
219
90
 
220
91
  //--- PoolSetup ------------------------------------------------------//
221
- function createPoolSetup(NftId distributionNftId, ISetup.PoolSetupInfo memory setup) external restricted() {
222
- create(_toNftKey32(distributionNftId, POOL()), abi.encode(setup));
92
+ function createPoolSetup(NftId poolNftId, ISetup.PoolSetupInfo memory setup) external restricted() {
93
+ create(_toNftKey32(poolNftId, POOL()), abi.encode(setup));
223
94
  }
224
95
 
225
- function updatePoolSetup(NftId distributionNftId, ISetup.PoolSetupInfo memory setup, StateId newState) external restricted() {
226
- update(_toNftKey32(distributionNftId, POOL()), abi.encode(setup), newState);
96
+ function updatePoolSetup(NftId poolNftId, ISetup.PoolSetupInfo memory setup, StateId newState) external restricted() {
97
+ update(_toNftKey32(poolNftId, POOL()), abi.encode(setup), newState);
227
98
  }
228
99
 
229
- function updatePoolSetupState(NftId distributionNftId, StateId newState) external restricted() {
230
- updateState(_toNftKey32(distributionNftId, POOL()), newState);
100
+ function updatePoolSetupState(NftId poolNftId, StateId newState) external restricted() {
101
+ updateState(_toNftKey32(poolNftId, POOL()), newState);
231
102
  }
232
103
 
233
104
  //--- DistributorType ---------------------------------------------------//
@@ -335,71 +206,6 @@ contract Instance is
335
206
  }
336
207
 
337
208
  //--- internal view/pure functions --------------------------------------//
338
- function _toRole(RoleId roleId, string memory name, bool isCustom)
339
- internal
340
- pure
341
- returns (IAccess.RoleInfo memory role)
342
- {
343
- return IAccess.RoleInfo(
344
- ShortStrings.toShortString(name),
345
- isCustom);
346
- }
347
-
348
- function _validateRoleParameters(
349
- RoleId roleId,
350
- string memory name,
351
- bool isCustom
352
- )
353
- internal
354
- view
355
- returns (
356
- bool roleExists,
357
- bool roleIsCustom
358
- )
359
- {
360
- Key32 roleKey = toRoleKey32(roleId);
361
- roleExists = exists(roleKey);
362
- if (roleExists) {
363
- roleIsCustom = abi.decode(getData(roleKey), (IAccess.RoleInfo)).isCustom;
364
- } else {
365
- roleIsCustom = isCustom;
366
- }
367
-
368
- // check role id
369
- uint64 roleIdInt = RoleId.unwrap(roleId);
370
- if(roleIdInt == ADMIN_ROLE || roleIdInt == PUBLIC_ROLE) {
371
- revert IAccess.ErrorRoleIdInvalid(roleId);
372
- }
373
-
374
- if (roleIsCustom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
375
- revert IAccess.ErrorRoleIdTooSmall(roleId);
376
- } else if (roleIsCustom && roleIdInt >= CUSTOM_ROLE_ID_MIN) {
377
- revert IAccess.ErrorRoleIdTooBig(roleId);
378
- }
379
-
380
- // role name checks
381
- ShortString nameShort = ShortStrings.toShortString(name);
382
- if (ShortStrings.byteLength(nameShort) == 0) {
383
- revert IAccess.ErrorRoleNameEmpty(roleId);
384
- }
385
-
386
- if (_role[nameShort] != RoleIdLib.zero() && _role[nameShort] != roleId) {
387
- revert IAccess.ErrorRoleNameNotUnique(_role[nameShort], nameShort);
388
- }
389
- }
390
-
391
- function _validateTargetParameters(address target, IAccess.TargetInfo memory targetInfo) internal view {
392
-
393
- }
394
-
395
- function toRoleKey32(RoleId roleId) public pure returns (Key32) {
396
- return roleId.toKey32();
397
- }
398
-
399
- function toTargetKey32(address target) public pure returns (Key32) {
400
- return Key32Lib.toKey32(TARGET(), KeyId.wrap(bytes20(target)));
401
- }
402
-
403
209
  function _toNftKey32(NftId nftId, ObjectType objectType) internal pure returns (Key32) {
404
210
  return nftId.toKey32(objectType);
405
211
  }
@@ -412,31 +218,42 @@ contract Instance is
412
218
  return policyNftId.toKey32(POLICY());
413
219
  }
414
220
 
415
- function getComponentOwnerService() external view returns (IComponentOwnerService) {
416
- return ComponentOwnerService(_registry.getServiceAddress("ComponentOwnerService", VersionPart.wrap(3)));
221
+ function getDistributionService() external view returns (IDistributionService) {
222
+ return IDistributionService(_registry.getServiceAddress(DISTRIBUTION(), VersionPart.wrap(3)));
417
223
  }
418
224
 
419
- // TODO reactivate when services are available
420
- // function getDistributionService() external view returns (IDistributionService) {
421
- // return DistributionService(_registry.getServiceAddress("DistributionService", VersionPart.wrap(3)));
422
- // }
225
+ function getProductService() external view returns (IProductService) {
226
+ return IProductService(_registry.getServiceAddress(PRODUCT(), VersionPart.wrap(3)));
227
+ }
228
+
229
+ function getPoolService() external view returns (IPoolService) {
230
+ return IPoolService(_registry.getServiceAddress(POOL(), VersionPart.wrap(3)));
231
+ }
423
232
 
424
- // TODO reactivate when services are available
425
- // function getProductService() external view returns (IProductService) {
426
- // return ProductService(_registry.getServiceAddress("ProductService", VersionPart.wrap(3)));
427
- // }
233
+ function getPolicyService() external view returns (IPolicyService) {
234
+ return IPolicyService(_registry.getServiceAddress(POLICY(), VersionPart.wrap(3)));
235
+ }
428
236
 
429
- // TODO reactivate when services are available
430
- // function getPoolService() external view returns (IPoolService) {
431
- // return PoolService(_registry.getServiceAddress("PoolService", VersionPart.wrap(3)));
432
- // }
237
+ function getBundleService() external view returns (IBundleService) {
238
+ return IBundleService(_registry.getServiceAddress(BUNDLE(), VersionPart.wrap(3)));
239
+ }
433
240
 
434
241
  function setInstanceReader(InstanceReader instanceReader) external restricted() {
435
- require(address(_instanceReader) == address(0), "InstanceReader is set");
242
+ require(instanceReader.getInstance() == Instance(this), "InstanceReader instance mismatch");
436
243
  _instanceReader = instanceReader;
437
244
  }
438
245
 
439
246
  function getInstanceReader() external view returns (InstanceReader) {
440
247
  return _instanceReader;
441
248
  }
249
+
250
+ function setBundleManager(BundleManager bundleManager) external restricted() {
251
+ require(address(_bundleManager) == address(0), "BundleManager is set");
252
+ require(bundleManager.getInstance() == Instance(this), "BundleManager instance mismatch");
253
+ _bundleManager = bundleManager;
254
+ }
255
+
256
+ function getBundleManager() external view returns (BundleManager) {
257
+ return _bundleManager;
258
+ }
442
259
  }
@@ -3,93 +3,53 @@ pragma solidity ^0.8.20;
3
3
 
4
4
  import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
5
5
  import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
6
+ import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
6
7
 
7
- import {AccessManagedSimple} from "./AccessManagedSimple.sol";
8
- import {AccessManagerSimple} from "./AccessManagerSimple.sol";
9
- import {IBundle} from "./module/IBundle.sol";
10
- import {IPolicy} from "./module/IPolicy.sol";
11
- import {IRisk} from "./module/IRisk.sol";
12
- import {ISetup} from "./module/ISetup.sol";
13
- import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
14
- import {KeyValueStore} from "./base/KeyValueStore.sol";
15
- import {NftId} from "../types/NftId.sol";
16
- import {NumberId} from "../types/NumberId.sol";
17
- import {ObjectType, BUNDLE, DISTRIBUTION, POLICY, POOL, ROLE, PRODUCT, TARGET} from "../types/ObjectType.sol";
18
- import {RiskId, RiskIdLib} from "../types/RiskId.sol";
19
- import {RoleId, RoleIdLib} from "../types/RoleId.sol";
20
- import {StateId, ACTIVE} from "../types/StateId.sol";
21
- import {Timestamp, TimestampLib} from "../types/Timestamp.sol";
8
+ import {AccessManagerUpgradeableInitializeable} from "../../contracts/instance/AccessManagerUpgradeableInitializeable.sol";
9
+ import {RoleId, RoleIdLib } from "../types/RoleId.sol";
10
+ import {TimestampLib} from "../types/Timestamp.sol";
11
+ import {IAccess} from "./module/IAccess.sol";
22
12
 
23
13
  contract InstanceAccessManager is
24
- AccessManagedSimple
14
+ AccessManagedUpgradeable
25
15
  {
16
+ using RoleIdLib for RoleId;
17
+
26
18
  string public constant ADMIN_ROLE_NAME = "AdminRole";
27
19
  string public constant PUBLIC_ROLE_NAME = "PublicRole";
28
20
 
29
21
  uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
30
22
  uint32 public constant EXECUTION_DELAY = 0;
31
23
 
32
- struct RoleInfo {
33
- ShortString name;
34
- bool isCustom;
35
- bool isLocked;
36
- Timestamp createdAt;
37
- Timestamp updatedAt;
38
- }
39
-
40
- struct TargetInfo {
41
- ShortString name;
42
- bool isCustom;
43
- bool isLocked;
44
- Timestamp createdAt;
45
- Timestamp updatedAt;
46
- }
47
-
48
- error ErrorRoleIdInvalid(RoleId roleId);
49
- error ErrorRoleIdTooBig(RoleId roleId);
50
- error ErrorRoleIdTooSmall(RoleId roleId);
51
- error ErrorRoleIdAlreadyExists(RoleId roleId, ShortString name);
52
- error ErrorRoleIdNotActive(RoleId roleId);
53
- error ErrorRoleNameEmpty(RoleId roleId);
54
- error ErrorRoleNameNotUnique(RoleId roleId, ShortString name);
55
- error ErrorRoleInvalidUpdate(RoleId roleId, bool isCustom);
56
- error ErrorRoleIsCustomIsImmutable(RoleId roleId, bool isCustom, bool isCustomExisting);
57
- error ErrorSetLockedForNonexstentRole(RoleId roleId);
58
- error ErrorGrantNonexstentRole(RoleId roleId);
59
- error ErrorRevokeNonexstentRole(RoleId roleId);
60
- error ErrorRenounceNonexstentRole(RoleId roleId);
61
-
62
- error ErrorTargetAddressZero();
63
- error ErrorTargetAlreadyExists(address target, ShortString name);
64
- error ErrorTargetNameEmpty(address target);
65
- error ErrorTargetNameExists(address target, address existingTarget, ShortString name);
66
- error ErrorSetLockedForNonexstentTarget(address target);
67
-
68
24
  // role specific state
69
- mapping(RoleId roleId => RoleInfo info) internal _role;
25
+ mapping(RoleId roleId => IAccess.RoleInfo info) internal _role;
70
26
  mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
71
27
  mapping(ShortString name => RoleId roleId) internal _roleForName;
72
28
  RoleId [] internal _roles;
73
29
 
74
30
  // target specific state
75
- mapping(address target => TargetInfo info) internal _target;
31
+ mapping(address target => IAccess.TargetInfo info) internal _target;
76
32
  mapping(ShortString name => address target) internal _targetForName;
77
33
  address [] internal _targets;
78
34
 
79
- AccessManagerSimple internal _accessManager;
35
+ AccessManagerUpgradeableInitializeable internal _accessManager;
80
36
 
81
- constructor(address accessManager)
82
- AccessManagedSimple(accessManager)
37
+ function __InstanceAccessManager_initialize(address initialAdmin) external initializer
83
38
  {
84
- _accessManager = AccessManagerSimple(accessManager);
39
+ // if size of the contract gets too large, this can be externalized which will reduce the contract size considerably
40
+ _accessManager = new AccessManagerUpgradeableInitializeable();
41
+ // this service required adin rights to access manager to be able to grant/revoke roles
42
+ _accessManager.__AccessManagerUpgradeableInitializeable_init(address(this));
43
+ _accessManager.grantRole(_accessManager.ADMIN_ROLE(), initialAdmin, 0);
44
+
45
+ __AccessManaged_init(address(_accessManager));
85
46
 
86
47
  _createRole(RoleIdLib.toRoleId(_accessManager.ADMIN_ROLE()), ADMIN_ROLE_NAME, false, false);
87
48
  _createRole(RoleIdLib.toRoleId(_accessManager.PUBLIC_ROLE()), PUBLIC_ROLE_NAME, false, false);
88
49
  }
89
50
 
90
51
  //--- Role ------------------------------------------------------//
91
-
92
- function createDefaultRole(RoleId roleId, string memory name) external restricted() {
52
+ function createGifRole(RoleId roleId, string memory name) external restricted() {
93
53
  _createRole(roleId, name, false, true);
94
54
  }
95
55
 
@@ -99,7 +59,7 @@ contract InstanceAccessManager is
99
59
 
100
60
  function setRoleLocked(RoleId roleId, bool locked) external restricted() {
101
61
  if (!roleExists(roleId)) {
102
- revert ErrorSetLockedForNonexstentRole(roleId);
62
+ revert IAccess.ErrorIAccessSetLockedForNonexstentRole(roleId);
103
63
  }
104
64
 
105
65
  _role[roleId].isLocked = locked;
@@ -112,11 +72,11 @@ contract InstanceAccessManager is
112
72
 
113
73
  function grantRole(RoleId roleId, address member) external restricted() returns (bool granted) {
114
74
  if (!roleExists(roleId)) {
115
- revert ErrorGrantNonexstentRole(roleId);
75
+ revert IAccess.ErrorIAccessGrantNonexstentRole(roleId);
116
76
  }
117
77
 
118
78
  if (_role[roleId].isLocked) {
119
- revert ErrorRoleIdNotActive(roleId);
79
+ revert IAccess.ErrorIAccessRoleIdNotActive(roleId);
120
80
  }
121
81
 
122
82
  if (!EnumerableSet.contains(_roleMembers[roleId], member)) {
@@ -130,7 +90,7 @@ contract InstanceAccessManager is
130
90
 
131
91
  function revokeRole(RoleId roleId, address member) external restricted() returns (bool revoked) {
132
92
  if (!roleExists(roleId)) {
133
- revert ErrorRevokeNonexstentRole(roleId);
93
+ revert IAccess.ErrorIAccessRevokeNonexstentRole(roleId);
134
94
  }
135
95
 
136
96
  if (EnumerableSet.contains(_roleMembers[roleId], member)) {
@@ -148,7 +108,7 @@ contract InstanceAccessManager is
148
108
  address member = msg.sender;
149
109
 
150
110
  if (!roleExists(roleId)) {
151
- revert ErrorRenounceNonexstentRole(roleId);
111
+ revert IAccess.ErrorIAccessRenounceNonexstentRole(roleId);
152
112
  }
153
113
 
154
114
  if (EnumerableSet.contains(_roleMembers[roleId], member)) {
@@ -173,7 +133,7 @@ contract InstanceAccessManager is
173
133
  return _roleForName[ShortStrings.toShortString(name)];
174
134
  }
175
135
 
176
- function getRole(RoleId roleId) external view returns (RoleInfo memory role) {
136
+ function getRole(RoleId roleId) external view returns (IAccess.RoleInfo memory role) {
177
137
  return _role[roleId];
178
138
  }
179
139
 
@@ -190,13 +150,19 @@ contract InstanceAccessManager is
190
150
  }
191
151
 
192
152
  //--- Target ------------------------------------------------------//
153
+ function createGifTarget(address target, string memory name) external restricted() {
154
+ _createTarget(target, name, false, true);
155
+ }
156
+
193
157
  function createTarget(address target, string memory name) external restricted() {
194
158
  _createTarget(target, name, true, true);
195
159
  }
196
160
 
197
- function setTargetLocked(address target, bool locked) external restricted() {
198
- if (!targetExists(target)) {
199
- revert ErrorSetLockedForNonexstentTarget(target);
161
+ function setTargetLocked(string memory targetName, bool locked) external restricted() {
162
+ address target = _targetForName[ShortStrings.toShortString(targetName)];
163
+
164
+ if (target == address(0)) {
165
+ revert IAccess.ErrorIAccessSetLockedForNonexstentTarget(target);
200
166
  }
201
167
 
202
168
  _target[target].isLocked = locked;
@@ -214,7 +180,7 @@ contract InstanceAccessManager is
214
180
  _validateRoleParameters(roleId, name, isCustom);
215
181
  }
216
182
 
217
- RoleInfo memory role = RoleInfo(
183
+ IAccess.RoleInfo memory role = IAccess.RoleInfo(
218
184
  ShortStrings.toShortString(name),
219
185
  isCustom,
220
186
  false, // role un-locked,
@@ -233,35 +199,35 @@ contract InstanceAccessManager is
233
199
  )
234
200
  internal
235
201
  view
236
- returns (RoleInfo memory existingRole)
202
+ returns (IAccess.RoleInfo memory existingRole)
237
203
  {
238
204
  // check role id
239
205
  uint64 roleIdInt = RoleId.unwrap(roleId);
240
206
  if(roleIdInt == _accessManager.ADMIN_ROLE() || roleIdInt == _accessManager.PUBLIC_ROLE()) {
241
- revert ErrorRoleIdInvalid(roleId);
207
+ revert IAccess.ErrorIAccessRoleIdInvalid(roleId);
242
208
  }
243
209
 
244
210
  // prevent changing isCustom for existing roles
245
211
  existingRole = _role[roleId];
246
212
 
247
213
  if (existingRole.createdAt.gtz() && isCustom != existingRole.isCustom) {
248
- revert ErrorRoleIsCustomIsImmutable(roleId, isCustom, existingRole.isCustom);
214
+ revert IAccess.ErrorIAccessRoleIsCustomIsImmutable(roleId, isCustom, existingRole.isCustom);
249
215
  }
250
216
 
251
217
  if (isCustom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
252
- revert ErrorRoleIdTooSmall(roleId);
218
+ revert IAccess.ErrorIAccessRoleIdTooSmall(roleId);
253
219
  } else if (!isCustom && roleIdInt >= CUSTOM_ROLE_ID_MIN) {
254
- revert ErrorRoleIdTooBig(roleId);
220
+ revert IAccess.ErrorIAccessRoleIdTooBig(roleId);
255
221
  }
256
222
 
257
223
  // role name checks
258
224
  ShortString nameShort = ShortStrings.toShortString(name);
259
225
  if (ShortStrings.byteLength(nameShort) == 0) {
260
- revert ErrorRoleNameEmpty(roleId);
226
+ revert IAccess.ErrorIAccessRoleNameEmpty(roleId);
261
227
  }
262
228
 
263
229
  if (_roleForName[nameShort] != RoleIdLib.zero() && _roleForName[nameShort] != roleId) {
264
- revert ErrorRoleNameNotUnique(_roleForName[nameShort], nameShort);
230
+ revert IAccess.ErrorIAccessRoleNameNotUnique(_roleForName[nameShort], nameShort);
265
231
  }
266
232
  }
267
233
 
@@ -270,7 +236,14 @@ contract InstanceAccessManager is
270
236
  _validateTargetParameters(target, name, isCustom);
271
237
  }
272
238
 
273
- TargetInfo memory info = TargetInfo(
239
+ if (_target[target].createdAt.gtz()) {
240
+ revert IAccess.ErrorIAccessTargetAlreadyExists(target, _target[target].name);
241
+ }
242
+ if (_targetForName[ShortStrings.toShortString(name)] != address(0)) {
243
+ revert IAccess.ErrorIAccessTargetNameExists(target, _targetForName[ShortStrings.toShortString(name)], ShortStrings.toShortString(name));
244
+ }
245
+
246
+ IAccess.TargetInfo memory info = IAccess.TargetInfo(
274
247
  ShortStrings.toShortString(name),
275
248
  isCustom,
276
249
  _accessManager.isTargetClosed(target), // sync with state in access manager
@@ -283,6 +256,48 @@ contract InstanceAccessManager is
283
256
  }
284
257
 
285
258
  function _validateTargetParameters(address target, string memory name, bool isCustom) internal view {
259
+ // TODO: implement
260
+ }
261
+
262
+ function setTargetFunctionRole(
263
+ address target,
264
+ bytes4[] calldata selectors,
265
+ uint64 roleId
266
+ ) public virtual restricted() {
267
+ _accessManager.setTargetFunctionRole(target, selectors, roleId);
268
+ }
269
+
270
+ function setTargetFunctionRole(
271
+ string memory targetName,
272
+ bytes4[] calldata selectors,
273
+ RoleId roleId
274
+ ) public virtual restricted() {
275
+ address target = _targetForName[ShortStrings.toShortString(targetName)];
276
+ uint64 roleIdInt = RoleId.unwrap(roleId);
277
+ _accessManager.setTargetFunctionRole(target, selectors, roleIdInt);
278
+ }
279
+
280
+ function getAccessManager() public restricted() returns (AccessManagerUpgradeableInitializeable) {
281
+ return _accessManager;
282
+ }
283
+
284
+ function setTargetClosed(string memory targetName, bool closed) public restricted() {
285
+ address target = _targetForName[ShortStrings.toShortString(targetName)];
286
+ if (target == address(0)) {
287
+ revert IAccess.ErrorIAccessTargetAddressZero();
288
+ }
289
+ _accessManager.setTargetClosed(target, closed);
290
+ }
291
+
292
+ function isTargetLocked(address target) public view returns (bool locked) {
293
+ return _accessManager.isTargetClosed(target);
294
+ }
286
295
 
296
+ function canCall(
297
+ address caller,
298
+ address target,
299
+ bytes4 selector
300
+ ) public view virtual returns (bool immediate, uint32 delay) {
301
+ return _accessManager.canCall(caller, target, selector);
287
302
  }
288
303
  }