@etherisc/gif-next 0.0.2-e9148e0-933 → 0.0.2-e9a637d-547
Sign up to get free protection for your applications and to get access to all the features.
- package/README.md +65 -2
- package/artifacts/contracts/components/Component.sol/Component.dbg.json +4 -0
- package/artifacts/contracts/components/Component.sol/Component.json +842 -0
- package/artifacts/contracts/components/Distribution.sol/Distribution.dbg.json +1 -1
- package/artifacts/contracts/components/Distribution.sol/Distribution.json +941 -230
- package/artifacts/contracts/components/IComponent.sol/IComponent.dbg.json +4 -0
- package/artifacts/contracts/{shared/RegisterableUpgradable.sol/RegisterableUpgradable.json → components/IComponent.sol/IComponent.json} +295 -132
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.json +848 -31
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.json +864 -49
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.json +682 -9
- package/artifacts/contracts/components/Pool.sol/Pool.dbg.json +1 -1
- package/artifacts/contracts/components/Pool.sol/Pool.json +825 -231
- package/artifacts/contracts/components/Product.sol/Product.dbg.json +1 -1
- package/artifacts/contracts/components/Product.sol/Product.json +638 -190
- package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.dbg.json +4 -0
- package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.json +1206 -0
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +4 -0
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +778 -0
- package/artifacts/contracts/instance/Cloneable.sol/Cloneable.dbg.json +4 -0
- package/artifacts/contracts/instance/{AccessManagedSimple.sol/AccessManagedSimple.json → Cloneable.sol/Cloneable.json} +91 -2
- package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.json +346 -704
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +342 -168
- package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
- package/artifacts/contracts/instance/Instance.sol/Instance.json +405 -3100
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.json +609 -178
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +148 -247
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +536 -259
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +335 -98
- package/artifacts/contracts/instance/InstanceStore.sol/InstanceStore.dbg.json +4 -0
- package/artifacts/contracts/instance/InstanceStore.sol/InstanceStore.json +2677 -0
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.dbg.json +4 -0
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.json +256 -0
- package/artifacts/contracts/instance/base/ComponentService.sol/ComponentService.dbg.json +4 -0
- package/artifacts/contracts/instance/base/{ComponentServiceBase.sol/ComponentServiceBase.json → ComponentService.sol/ComponentService.json} +247 -180
- package/artifacts/contracts/instance/base/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/ILifecycle.sol/ILifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.json +40 -10
- package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.json +36 -11
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.json +71 -45
- package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IComponents.sol/IComponents.dbg.json +4 -0
- package/artifacts/contracts/instance/module/IComponents.sol/IComponents.json +10 -0
- package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ISetup.sol/ISetup.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ITreasury.sol/ITreasury.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ApplicationService.sol/ApplicationService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ApplicationService.sol/ApplicationService.json +1039 -0
- package/artifacts/contracts/instance/service/ApplicationServiceManager.sol/ApplicationServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ApplicationServiceManager.sol/ApplicationServiceManager.json +673 -0
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.json +1231 -0
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.json +721 -0
- package/artifacts/contracts/instance/service/ClaimService.sol/ClaimService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ClaimService.sol/ClaimService.json +817 -0
- package/artifacts/contracts/instance/service/ClaimServiceManager.sol/ClaimServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ClaimServiceManager.sol/ClaimServiceManager.json +641 -0
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.json +1341 -259
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.json +440 -79
- package/artifacts/contracts/instance/service/IApplicationService.sol/IApplicationService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/IApplicationService.sol/IApplicationService.json +622 -0
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.json +659 -0
- package/artifacts/contracts/instance/service/IClaimService.sol/IClaimService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/{IComponentOwnerService.sol/IComponentOwnerService.json → IClaimService.sol/IClaimService.json} +217 -208
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.json +804 -160
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.json +606 -0
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.json +437 -154
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.json +90 -391
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.json +1092 -0
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.json +697 -0
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.json +649 -251
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.json +305 -92
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.json +284 -502
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.json +304 -99
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.json +15 -2
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +261 -131
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +149 -230
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.json +18 -0
- package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.json +275 -226
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.dbg.json +4 -0
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.json +285 -0
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +200 -335
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +298 -141
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +4 -0
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +559 -0
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +141 -53
- package/artifacts/contracts/shared/ContractDeployerLib.sol/ContractDeployerLib.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.json +41 -3
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.json +40 -29
- package/artifacts/contracts/shared/IPolicyHolder.sol/IPolicyHolder.dbg.json +4 -0
- package/artifacts/contracts/shared/IPolicyHolder.sol/IPolicyHolder.json +129 -0
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.json +21 -34
- package/artifacts/contracts/shared/IRegistryLinked.sol/IRegistryLinked.dbg.json +4 -0
- package/artifacts/contracts/{experiment/inheritance/IB.sol/IB.json → shared/IRegistryLinked.sol/IRegistryLinked.json} +18 -20
- package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
- package/artifacts/contracts/shared/IService.sol/IService.json +86 -172
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +1 -1
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.json +2 -152
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +120 -27
- package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.dbg.json +4 -0
- package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.json +248 -0
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +1 -1
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +294 -61
- package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
- package/artifacts/contracts/shared/Registerable.sol/Registerable.json +129 -51
- package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.dbg.json +4 -0
- package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.json +84 -0
- package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
- package/artifacts/contracts/shared/Service.sol/Service.json +191 -163
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.json +2 -2
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +1 -1
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.json +2 -2
- package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +1 -1
- package/artifacts/contracts/shared/Versionable.sol/Versionable.json +2 -152
- package/artifacts/contracts/test/TestFee.sol/TestFee.dbg.json +1 -1
- package/artifacts/contracts/test/TestFee.sol/TestFee.json +2 -2
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.json +129 -51
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.dbg.json +1 -1
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.json +6 -6
- package/artifacts/contracts/test/TestService.sol/TestService.dbg.json +1 -1
- package/artifacts/contracts/test/TestService.sol/TestService.json +210 -214
- package/artifacts/contracts/test/TestToken.sol/TestUsdc.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersion.sol/TestVersion.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersion.sol/TestVersion.json +2 -2
- package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.json +8 -190
- package/artifacts/contracts/test/Usdc.sol/USDC.dbg.json +1 -1
- package/artifacts/contracts/types/AddressSet.sol/LibAddressSet.dbg.json +1 -1
- package/artifacts/contracts/types/Amount.sol/AmountLib.dbg.json +4 -0
- package/artifacts/contracts/types/Amount.sol/AmountLib.json +161 -0
- package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
- package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.json +2 -2
- package/artifacts/contracts/types/ChainId.sol/ChainIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/ClaimId.sol/ClaimIdLib.dbg.json +4 -0
- package/artifacts/contracts/types/ClaimId.sol/ClaimIdLib.json +100 -0
- package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.json +2 -2
- package/artifacts/contracts/types/Fee.sol/FeeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Fee.sol/FeeLib.json +40 -9
- package/artifacts/contracts/types/Key32.sol/Key32Lib.dbg.json +1 -1
- package/artifacts/contracts/types/Key32.sol/Key32Lib.json +2 -2
- package/artifacts/contracts/types/NftId.sol/NftIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/NftId.sol/NftIdLib.json +17 -4
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.json +26 -3
- package/artifacts/contracts/types/NumberId.sol/NumberIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.json +2 -2
- package/artifacts/contracts/types/PayoutId.sol/PayoutIdLib.dbg.json +4 -0
- package/artifacts/contracts/types/PayoutId.sol/PayoutIdLib.json +100 -0
- package/artifacts/contracts/types/Referral.sol/ReferralLib.dbg.json +1 -1
- package/artifacts/contracts/types/Referral.sol/ReferralLib.json +23 -4
- package/artifacts/contracts/types/RiskId.sol/RiskIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RiskId.sol/RiskIdLib.json +2 -2
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.json +2 -2
- package/artifacts/contracts/types/Seconds.sol/SecondsLib.dbg.json +4 -0
- package/artifacts/contracts/types/Seconds.sol/SecondsLib.json +124 -0
- package/artifacts/contracts/types/StateId.sol/StateIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/StateId.sol/StateIdLib.json +2 -2
- package/artifacts/contracts/types/Timestamp.sol/TimestampLib.dbg.json +1 -1
- package/artifacts/contracts/types/Timestamp.sol/TimestampLib.json +25 -7
- package/artifacts/contracts/types/UFixed.sol/MathLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/MathLib.json +2 -2
- package/artifacts/contracts/types/UFixed.sol/UFixedLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/UFixedLib.json +2 -2
- package/artifacts/contracts/types/Version.sol/VersionLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionLib.json +2 -2
- package/artifacts/contracts/types/Version.sol/VersionPartLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionPartLib.json +2 -2
- package/contracts/components/Component.sol +253 -0
- package/contracts/components/Distribution.sol +200 -79
- package/contracts/components/IComponent.sol +76 -0
- package/contracts/components/IDistributionComponent.sol +44 -17
- package/contracts/components/IPoolComponent.sol +88 -37
- package/contracts/components/IProductComponent.sol +10 -5
- package/contracts/components/Pool.sol +221 -160
- package/contracts/components/Product.sol +128 -119
- package/contracts/instance/AccessManagerUpgradeableInitializeable.sol +13 -0
- package/contracts/instance/BundleManager.sol +127 -0
- package/contracts/instance/Cloneable.sol +51 -0
- package/contracts/instance/IInstance.sol +43 -24
- package/contracts/instance/IInstanceService.sol +59 -5
- package/contracts/instance/Instance.sol +125 -369
- package/contracts/instance/InstanceAccessManager.sol +428 -176
- package/contracts/instance/InstanceReader.sol +21 -34
- package/contracts/instance/InstanceService.sol +466 -128
- package/contracts/instance/InstanceServiceManager.sol +6 -9
- package/contracts/instance/InstanceStore.sol +219 -0
- package/contracts/instance/ObjectManager.sol +82 -0
- package/contracts/instance/base/ComponentService.sol +121 -0
- package/contracts/instance/base/KeyValueStore.sol +13 -5
- package/contracts/instance/base/Lifecycle.sol +11 -2
- package/contracts/instance/module/IAccess.sol +36 -20
- package/contracts/instance/module/IBundle.sol +8 -5
- package/contracts/instance/module/IComponents.sol +41 -0
- package/contracts/instance/module/IDistribution.sol +2 -0
- package/contracts/instance/module/IPolicy.sol +30 -3
- package/contracts/instance/module/ISetup.sol +9 -20
- package/contracts/instance/service/ApplicationService.sol +351 -0
- package/contracts/instance/service/ApplicationServiceManager.sol +35 -0
- package/contracts/instance/service/BundleService.sol +431 -0
- package/contracts/instance/service/BundleServiceManager.sol +51 -0
- package/contracts/instance/service/ClaimService.sol +151 -0
- package/contracts/instance/service/ClaimServiceManager.sol +35 -0
- package/contracts/instance/service/DistributionService.sol +382 -33
- package/contracts/instance/service/DistributionServiceManager.sol +7 -10
- package/contracts/instance/service/IApplicationService.sol +82 -0
- package/contracts/instance/service/IBundleService.sol +93 -0
- package/contracts/instance/service/IClaimService.sol +61 -0
- package/contracts/instance/service/IDistributionService.sol +87 -0
- package/contracts/instance/service/IPolicyService.sol +72 -0
- package/contracts/instance/service/IPoolService.sol +79 -17
- package/contracts/instance/service/IProductService.sol +6 -73
- package/contracts/instance/service/PolicyService.sol +362 -0
- package/contracts/instance/service/PolicyServiceManager.sol +54 -0
- package/contracts/instance/service/PoolService.sol +217 -108
- package/contracts/instance/service/PoolServiceManager.sol +6 -9
- package/contracts/instance/service/ProductService.sol +114 -453
- package/contracts/instance/service/ProductServiceManager.sol +2 -2
- package/contracts/registry/ChainNft.sol +9 -1
- package/contracts/registry/IRegistry.sol +41 -19
- package/contracts/registry/IRegistryService.sol +31 -13
- package/contracts/registry/ITransferInterceptor.sol +1 -0
- package/contracts/registry/Registry.sol +245 -222
- package/contracts/registry/RegistryAccessManager.sol +216 -0
- package/contracts/registry/RegistryService.sol +97 -173
- package/contracts/registry/RegistryServiceManager.sol +21 -39
- package/contracts/registry/ReleaseManager.sol +324 -0
- package/contracts/registry/TokenRegistry.sol +22 -17
- package/contracts/shared/ERC165.sol +14 -12
- package/contracts/shared/INftOwnable.sol +11 -10
- package/contracts/shared/IPolicyHolder.sol +26 -0
- package/contracts/shared/IRegisterable.sol +4 -6
- package/contracts/shared/IRegistryLinked.sol +12 -0
- package/contracts/shared/IService.sol +5 -4
- package/contracts/shared/IVersionable.sol +4 -47
- package/contracts/shared/NftOwnable.sol +66 -80
- package/contracts/shared/PolicyHolder.sol +81 -0
- package/contracts/shared/ProxyManager.sol +100 -25
- package/contracts/shared/Registerable.sol +16 -32
- package/contracts/shared/RegistryLinked.sol +48 -0
- package/contracts/shared/Service.sol +41 -24
- package/contracts/shared/TokenHandler.sol +11 -5
- package/contracts/shared/Versionable.sol +4 -92
- package/contracts/test/TestRegisterable.sol +1 -1
- package/contracts/test/TestService.sol +4 -3
- package/contracts/types/Amount.sol +60 -0
- package/contracts/types/Blocknumber.sol +1 -0
- package/contracts/types/ClaimId.sol +52 -0
- package/contracts/types/DistributorType.sol +2 -2
- package/contracts/types/Fee.sol +13 -5
- package/contracts/types/NftId.sol +8 -0
- package/contracts/types/NftIdSet.sol +26 -24
- package/contracts/types/ObjectType.sol +10 -5
- package/contracts/types/PayoutId.sol +54 -0
- package/contracts/types/Referral.sol +4 -0
- package/contracts/types/RoleId.sol +26 -19
- package/contracts/types/Seconds.sol +54 -0
- package/contracts/types/StateId.sol +1 -0
- package/contracts/types/Timestamp.sol +13 -13
- package/contracts/types/UFixed.sol +1 -0
- package/contracts/types/Version.sol +1 -0
- package/package.json +3 -3
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.json +0 -327
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.json +0 -280
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.dbg.json +0 -4
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.json +0 -66
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.dbg.json +0 -4
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.json +0 -24
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.dbg.json +0 -4
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.json +0 -42
- package/artifacts/contracts/experiment/errors/Require.sol/Require.dbg.json +0 -4
- package/artifacts/contracts/experiment/errors/Require.sol/Require.json +0 -105
- package/artifacts/contracts/experiment/errors/Revert.sol/Revert.dbg.json +0 -4
- package/artifacts/contracts/experiment/errors/Revert.sol/Revert.json +0 -105
- package/artifacts/contracts/experiment/inheritance/A.sol/A.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/A.sol/A.json +0 -128
- package/artifacts/contracts/experiment/inheritance/A.sol/AShared.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/A.sol/AShared.json +0 -42
- package/artifacts/contracts/experiment/inheritance/B.sol/B.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/B.sol/B.json +0 -76
- package/artifacts/contracts/experiment/inheritance/C.sol/C.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/C.sol/C.json +0 -89
- package/artifacts/contracts/experiment/inheritance/IA.sol/IA.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IA.sol/IA.json +0 -128
- package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.json +0 -37
- package/artifacts/contracts/experiment/inheritance/IB.sol/IB.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IC.sol/IC.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IC.sol/IC.json +0 -63
- package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.json +0 -59
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.json +0 -124
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.json +0 -74
- package/artifacts/contracts/experiment/statemachine/SM.sol/SM.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/SM.sol/SM.json +0 -124
- package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.json +0 -207
- package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.dbg.json +0 -4
- package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.json +0 -10
- package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.dbg.json +0 -4
- package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.json +0 -10
- package/artifacts/contracts/instance/AccessManagedSimple.sol/AccessManagedSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.json +0 -1132
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.json +0 -1082
- package/artifacts/contracts/instance/base/ComponentServiceBase.sol/ComponentServiceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.json +0 -113
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.json +0 -827
- package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.dbg.json +0 -4
- package/contracts/components/BaseComponent.sol +0 -91
- package/contracts/components/IBaseComponent.sol +0 -25
- package/contracts/experiment/cloning/Cloner.sol +0 -47
- package/contracts/experiment/errors/Require.sol +0 -38
- package/contracts/experiment/errors/Revert.sol +0 -44
- package/contracts/experiment/inheritance/A.sol +0 -53
- package/contracts/experiment/inheritance/B.sol +0 -28
- package/contracts/experiment/inheritance/C.sol +0 -34
- package/contracts/experiment/inheritance/IA.sol +0 -13
- package/contracts/experiment/inheritance/IB.sol +0 -10
- package/contracts/experiment/inheritance/IC.sol +0 -12
- package/contracts/experiment/statemachine/Dummy.sol +0 -27
- package/contracts/experiment/statemachine/ISM.sol +0 -25
- package/contracts/experiment/statemachine/SM.sol +0 -57
- package/contracts/experiment/statemachine/SimpleStateMachine.sol +0 -31
- package/contracts/experiment/types/TypeA.sol +0 -47
- package/contracts/experiment/types/TypeB.sol +0 -29
- package/contracts/instance/AccessManagedSimple.sol +0 -115
- package/contracts/instance/AccessManagerSimple.sol +0 -692
- package/contracts/instance/IAccessManagerSimple.sol +0 -391
- package/contracts/instance/base/ComponentServiceBase.sol +0 -124
- package/contracts/instance/base/IInstanceBase.sol +0 -23
- package/contracts/instance/service/ComponentOwnerService.sol +0 -317
- package/contracts/instance/service/IComponentOwnerService.sol +0 -20
- package/contracts/shared/RegisterableUpgradable.sol +0 -16
@@ -1,288 +1,540 @@
|
|
1
1
|
// SPDX-License-Identifier: Apache-2.0
|
2
2
|
pragma solidity ^0.8.20;
|
3
3
|
|
4
|
+
import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
|
4
5
|
import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
|
5
6
|
import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
|
6
7
|
|
7
|
-
import {
|
8
|
-
import {
|
9
|
-
import {IBundle} from "./module/IBundle.sol";
|
10
|
-
import {IPolicy} from "./module/IPolicy.sol";
|
11
|
-
import {IRisk} from "./module/IRisk.sol";
|
12
|
-
import {ISetup} from "./module/ISetup.sol";
|
13
|
-
import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
|
14
|
-
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
8
|
+
import {RoleId, RoleIdLib, ADMIN_ROLE, PUBLIC_ROLE, INSTANCE_SERVICE_ROLE, INSTANCE_OWNER_ROLE, INSTANCE_ROLE} from "../types/RoleId.sol";
|
9
|
+
import {TimestampLib} from "../types/Timestamp.sol";
|
15
10
|
import {NftId} from "../types/NftId.sol";
|
16
|
-
|
17
|
-
import {
|
18
|
-
|
19
|
-
import {
|
20
|
-
|
21
|
-
import {
|
11
|
+
|
12
|
+
import {AccessManagerUpgradeableInitializeable} from "./AccessManagerUpgradeableInitializeable.sol";
|
13
|
+
|
14
|
+
import {IRegistry} from "../registry/IRegistry.sol";
|
15
|
+
|
16
|
+
import {IInstance} from "./IInstance.sol";
|
17
|
+
import {IAccess} from "./module/IAccess.sol";
|
22
18
|
|
23
19
|
contract InstanceAccessManager is
|
24
|
-
|
20
|
+
AccessManagedUpgradeable
|
25
21
|
{
|
22
|
+
event LogRoleCreation(RoleId roleId, ShortString name, IAccess.Type rtype);
|
23
|
+
event LogTargetCreation(address target, ShortString name, IAccess.Type ttype, bool isLocked);
|
24
|
+
|
25
|
+
using RoleIdLib for RoleId;
|
26
|
+
|
26
27
|
string public constant ADMIN_ROLE_NAME = "AdminRole";
|
27
28
|
string public constant PUBLIC_ROLE_NAME = "PublicRole";
|
29
|
+
string public constant INSTANCE_ROLE_NAME = "InstanceRole";
|
30
|
+
string public constant INSTANCE_OWNER_ROLE_NAME = "InstanceOwnerRole";
|
28
31
|
|
29
|
-
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
|
32
|
+
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000; // MUST be even
|
30
33
|
uint32 public constant EXECUTION_DELAY = 0;
|
31
34
|
|
32
|
-
struct RoleInfo {
|
33
|
-
ShortString name;
|
34
|
-
bool isCustom;
|
35
|
-
bool isLocked;
|
36
|
-
Timestamp createdAt;
|
37
|
-
Timestamp updatedAt;
|
38
|
-
}
|
39
|
-
|
40
|
-
struct TargetInfo {
|
41
|
-
ShortString name;
|
42
|
-
bool isCustom;
|
43
|
-
bool isLocked;
|
44
|
-
Timestamp createdAt;
|
45
|
-
Timestamp updatedAt;
|
46
|
-
}
|
47
|
-
|
48
|
-
error ErrorRoleIdInvalid(RoleId roleId);
|
49
|
-
error ErrorRoleIdTooBig(RoleId roleId);
|
50
|
-
error ErrorRoleIdTooSmall(RoleId roleId);
|
51
|
-
error ErrorRoleIdAlreadyExists(RoleId roleId, ShortString name);
|
52
|
-
error ErrorRoleIdNotActive(RoleId roleId);
|
53
|
-
error ErrorRoleNameEmpty(RoleId roleId);
|
54
|
-
error ErrorRoleNameNotUnique(RoleId roleId, ShortString name);
|
55
|
-
error ErrorRoleInvalidUpdate(RoleId roleId, bool isCustom);
|
56
|
-
error ErrorRoleIsCustomIsImmutable(RoleId roleId, bool isCustom, bool isCustomExisting);
|
57
|
-
error ErrorSetLockedForNonexstentRole(RoleId roleId);
|
58
|
-
error ErrorGrantNonexstentRole(RoleId roleId);
|
59
|
-
error ErrorRevokeNonexstentRole(RoleId roleId);
|
60
|
-
error ErrorRenounceNonexstentRole(RoleId roleId);
|
61
|
-
|
62
|
-
error ErrorTargetAddressZero();
|
63
|
-
error ErrorTargetAlreadyExists(address target, ShortString name);
|
64
|
-
error ErrorTargetNameEmpty(address target);
|
65
|
-
error ErrorTargetNameExists(address target, address existingTarget, ShortString name);
|
66
|
-
error ErrorSetLockedForNonexstentTarget(address target);
|
67
|
-
|
68
35
|
// role specific state
|
69
|
-
mapping(RoleId roleId => RoleInfo info) internal
|
36
|
+
mapping(RoleId roleId => IAccess.RoleInfo info) internal _roleInfo;
|
70
37
|
mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
|
71
|
-
mapping(ShortString name => RoleId roleId) internal
|
72
|
-
RoleId [] internal
|
38
|
+
mapping(ShortString name => RoleId roleId) internal _roleIdForName;
|
39
|
+
RoleId [] internal _roleIds;
|
40
|
+
uint64 _idNext;
|
73
41
|
|
74
42
|
// target specific state
|
75
|
-
mapping(address target => TargetInfo info) internal
|
76
|
-
mapping(ShortString name => address target) internal
|
43
|
+
mapping(address target => IAccess.TargetInfo info) internal _targetInfo;
|
44
|
+
mapping(ShortString name => address target) internal _targetAddressForName;
|
77
45
|
address [] internal _targets;
|
78
46
|
|
79
|
-
|
47
|
+
AccessManagerUpgradeableInitializeable internal _accessManager;
|
48
|
+
IRegistry internal _registry;
|
49
|
+
|
50
|
+
modifier restrictedToRoleAdmin(RoleId roleId) {
|
51
|
+
RoleId admin = getRoleAdmin(roleId);
|
52
|
+
(bool inRole, uint32 executionDelay) = _accessManager.hasRole(admin.toInt(), _msgSender());
|
53
|
+
assert(executionDelay == 0); // to be sure no delayed execution functionality is used
|
54
|
+
if (!inRole) {
|
55
|
+
revert IAccess.ErrorIAccessCallerIsNotRoleAdmin(_msgSender(), roleId);
|
56
|
+
}
|
57
|
+
_;
|
58
|
+
}
|
80
59
|
|
81
|
-
|
60
|
+
// instance owner is granted upon instance nft minting in callback function
|
61
|
+
function initialize(address instanceAddress) external initializer
|
82
62
|
{
|
83
|
-
|
84
|
-
|
63
|
+
IInstance instance = IInstance(instanceAddress);
|
64
|
+
IRegistry registry = instance.getRegistry();
|
65
|
+
address authority = instance.authority();
|
85
66
|
|
86
|
-
|
87
|
-
_createRole(RoleIdLib.toRoleId(_accessManager.PUBLIC_ROLE()), PUBLIC_ROLE_NAME, false, false);
|
88
|
-
}
|
67
|
+
__AccessManaged_init(authority);
|
89
68
|
|
90
|
-
|
69
|
+
_accessManager = AccessManagerUpgradeableInitializeable(authority);
|
70
|
+
_registry = registry;
|
71
|
+
_idNext = CUSTOM_ROLE_ID_MIN;
|
72
|
+
|
73
|
+
_createRole(ADMIN_ROLE(), ADMIN_ROLE_NAME, IAccess.Type.Core);
|
74
|
+
_createRole(PUBLIC_ROLE(), PUBLIC_ROLE_NAME, IAccess.Type.Core);
|
75
|
+
_createRole(INSTANCE_ROLE(), INSTANCE_ROLE_NAME, IAccess.Type.Core);
|
76
|
+
_createRole(INSTANCE_OWNER_ROLE(), INSTANCE_OWNER_ROLE_NAME, IAccess.Type.Gif);// TODO should be of core type
|
77
|
+
|
78
|
+
// assume `this` is already a member of ADMIN_ROLE
|
79
|
+
EnumerableSet.add(_roleMembers[ADMIN_ROLE()], address(this));
|
91
80
|
|
92
|
-
|
93
|
-
|
81
|
+
grantRole(INSTANCE_ROLE(), instanceAddress);
|
82
|
+
setRoleAdmin(INSTANCE_OWNER_ROLE(), INSTANCE_ROLE());
|
94
83
|
}
|
95
84
|
|
96
|
-
|
97
|
-
|
85
|
+
//--- Role ------------------------------------------------------//
|
86
|
+
// ADMIN_ROLE
|
87
|
+
// assume all core roles are know at deployment time
|
88
|
+
// assume core roles are set and granted only during instance cloning
|
89
|
+
// assume core roles are never revoked -> core roles admin is never active after intialization
|
90
|
+
function createCoreRole(RoleId roleId, string memory name)
|
91
|
+
external
|
92
|
+
restricted()
|
93
|
+
{
|
94
|
+
_createRole(roleId, name, IAccess.Type.Core);
|
95
|
+
}
|
96
|
+
// ADMIN_ROLE
|
97
|
+
// assume gif roles can be revoked
|
98
|
+
// assume admin is INSTANCE_OWNER_ROLE or INSTANCE_ROLE
|
99
|
+
function createGifRole(RoleId roleId, string memory name, RoleId admin)
|
100
|
+
external
|
101
|
+
restricted()
|
102
|
+
{
|
103
|
+
_createRole(roleId, name, IAccess.Type.Gif);
|
104
|
+
setRoleAdmin(roleId, admin);
|
98
105
|
}
|
99
106
|
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
107
|
+
// INSTANCE_OWNER_ROLE
|
108
|
+
function createRole(string memory roleName, string memory adminName)
|
109
|
+
external
|
110
|
+
restricted()
|
111
|
+
returns(RoleId roleId, RoleId admin)
|
112
|
+
{
|
113
|
+
(roleId, admin) = _getNextCustomRoleId();
|
104
114
|
|
105
|
-
|
106
|
-
|
107
|
-
}
|
115
|
+
_createRole(roleId, roleName, IAccess.Type.Custom);
|
116
|
+
_createRole(admin, adminName, IAccess.Type.Custom);
|
108
117
|
|
109
|
-
|
110
|
-
|
118
|
+
// TODO works without this -> why?
|
119
|
+
setRoleAdmin(roleId, admin);
|
120
|
+
setRoleAdmin(admin, INSTANCE_OWNER_ROLE());
|
111
121
|
}
|
112
122
|
|
113
|
-
|
123
|
+
// ADMIN_ROLE
|
124
|
+
// assume used by instance service only during instance cloning
|
125
|
+
// assume used only by this.createRole(), this.createGifRole() afterwards
|
126
|
+
function setRoleAdmin(RoleId roleId, RoleId admin)
|
127
|
+
public
|
128
|
+
restricted()
|
129
|
+
{
|
114
130
|
if (!roleExists(roleId)) {
|
115
|
-
revert
|
131
|
+
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
116
132
|
}
|
117
133
|
|
118
|
-
if
|
119
|
-
revert
|
134
|
+
if(_roleInfo[roleId].rtype == IAccess.Type.Core) {
|
135
|
+
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Core);
|
120
136
|
}
|
121
137
|
|
122
|
-
if (!
|
123
|
-
|
124
|
-
|
125
|
-
return true;
|
126
|
-
}
|
138
|
+
if (!roleExists(admin)) {
|
139
|
+
revert IAccess.ErrorIAccessRoleIdDoesNotExist(admin);
|
140
|
+
}
|
127
141
|
|
128
|
-
|
142
|
+
_roleInfo[roleId].admin = admin;
|
129
143
|
}
|
130
144
|
|
131
|
-
|
145
|
+
// TODO core role can be granted only to 1 member
|
146
|
+
function grantRole(RoleId roleId, address member)
|
147
|
+
public
|
148
|
+
restrictedToRoleAdmin(roleId)
|
149
|
+
returns (bool granted)
|
150
|
+
{
|
132
151
|
if (!roleExists(roleId)) {
|
133
|
-
revert
|
152
|
+
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
134
153
|
}
|
135
154
|
|
136
|
-
|
137
|
-
|
138
|
-
|
139
|
-
|
140
|
-
}
|
141
|
-
|
142
|
-
return false;
|
155
|
+
granted = EnumerableSet.add(_roleMembers[roleId], member);
|
156
|
+
if(granted) {
|
157
|
+
_accessManager.grantRole(roleId.toInt(), member, EXECUTION_DELAY);
|
158
|
+
}
|
143
159
|
}
|
144
160
|
|
145
|
-
|
146
|
-
|
147
|
-
|
148
|
-
|
161
|
+
function revokeRole(RoleId roleId, address member)
|
162
|
+
external
|
163
|
+
restrictedToRoleAdmin(roleId)
|
164
|
+
returns (bool)
|
165
|
+
{
|
166
|
+
return _revokeRole(roleId, member);
|
167
|
+
}
|
149
168
|
|
169
|
+
// INSTANCE_OWNER_ROLE
|
170
|
+
// IMPORTANT: unbounded function, revoke all or revert
|
171
|
+
// Instance owner role decides what to do in case of custom role admin bening revoked, e.g.:
|
172
|
+
// 1) revoke custom role from ALL members
|
173
|
+
// 2) revoke custom role admin from ALL members
|
174
|
+
// 3) 1) + 2)
|
175
|
+
// 4) revoke only 1 member of custom role admin
|
176
|
+
function revokeRoleAllMembers(RoleId roleId)
|
177
|
+
external
|
178
|
+
restrictedToRoleAdmin(roleId)
|
179
|
+
returns (bool revoked)
|
180
|
+
{
|
150
181
|
if (!roleExists(roleId)) {
|
151
|
-
revert
|
182
|
+
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
152
183
|
}
|
153
184
|
|
154
|
-
|
155
|
-
|
156
|
-
|
185
|
+
uint memberCount = EnumerableSet.length(_roleMembers[roleId]);
|
186
|
+
for(uint memberIdx = 0; memberIdx < memberCount; memberIdx++)
|
187
|
+
{
|
188
|
+
address member = EnumerableSet.at(_roleMembers[roleId], memberIdx);
|
157
189
|
EnumerableSet.remove(_roleMembers[roleId], member);
|
158
|
-
|
190
|
+
_accessManager.revokeRole(roleId.toInt(), member);
|
191
|
+
}
|
192
|
+
}
|
193
|
+
|
194
|
+
/// @dev not restricted function by intention
|
195
|
+
/// the restriction to role members is already enforced by the call to the access manager
|
196
|
+
function renounceRole(RoleId roleId)
|
197
|
+
external
|
198
|
+
returns (bool)
|
199
|
+
{
|
200
|
+
IAccess.Type rtype = _roleInfo[roleId].rtype;
|
201
|
+
if(rtype == IAccess.Type.Core || rtype == IAccess.Type.Gif) {
|
202
|
+
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, rtype);
|
159
203
|
}
|
160
204
|
|
161
|
-
|
205
|
+
address member = msg.sender;
|
206
|
+
// cannot use accessManger.renounce as it directly checks against msg.sender
|
207
|
+
return _revokeRole(roleId, member);
|
162
208
|
}
|
163
209
|
|
164
|
-
function
|
165
|
-
return
|
210
|
+
function roleExists(RoleId roleId) public view returns (bool exists) {
|
211
|
+
return _roleInfo[roleId].createdAt.gtz();
|
212
|
+
}
|
213
|
+
// TODO returns ADMIN_ROLE id for non existent roleId
|
214
|
+
function getRoleAdmin(RoleId roleId) public view returns(RoleId admin) {
|
215
|
+
return _roleInfo[roleId].admin;
|
216
|
+
}
|
217
|
+
|
218
|
+
function getRoleInfo(RoleId roleId) external view returns (IAccess.RoleInfo memory info) {
|
219
|
+
return _roleInfo[roleId];
|
220
|
+
}
|
221
|
+
|
222
|
+
function roleMembers(RoleId roleId) public view returns (uint256 numberOfMembers) {
|
223
|
+
return EnumerableSet.length(_roleMembers[roleId]);
|
166
224
|
}
|
167
225
|
|
168
226
|
function getRoleId(uint256 idx) external view returns (RoleId roleId) {
|
169
|
-
return
|
227
|
+
return _roleIds[idx];
|
170
228
|
}
|
171
229
|
|
230
|
+
// TODO returns ADMIN_ROLE id for non existent name
|
172
231
|
function getRoleIdForName(string memory name) external view returns (RoleId roleId) {
|
173
|
-
return
|
232
|
+
return _roleIdForName[ShortStrings.toShortString(name)];
|
174
233
|
}
|
175
234
|
|
176
|
-
function
|
177
|
-
return
|
235
|
+
function roleMember(RoleId roleId, uint256 idx) external view returns (address member) {
|
236
|
+
return EnumerableSet.at(_roleMembers[roleId], idx);
|
178
237
|
}
|
179
238
|
|
180
239
|
function hasRole(RoleId roleId, address account) external view returns (bool accountHasRole) {
|
181
240
|
(accountHasRole, ) = _accessManager.hasRole(roleId.toInt(), account);
|
182
241
|
}
|
183
242
|
|
184
|
-
function
|
185
|
-
return
|
243
|
+
function roles() external view returns (uint256 numberOfRoles) {
|
244
|
+
return _roleIds.length;
|
186
245
|
}
|
187
246
|
|
188
|
-
|
189
|
-
|
247
|
+
//--- Target ------------------------------------------------------//
|
248
|
+
// ADMIN_ROLE
|
249
|
+
// assume some core targets are registred (instance) while others are not (instance accesss manager, instance reader, bundle manager)
|
250
|
+
function createCoreTarget(address target, string memory name) external restricted() {
|
251
|
+
_createTarget(target, name, IAccess.Type.Core);
|
190
252
|
}
|
253
|
+
// INSTANCE_SERVICE_ROLE
|
254
|
+
// TODO check for instance mismatch?
|
255
|
+
function createGifTarget(address target, string memory name) external restricted()
|
256
|
+
{
|
257
|
+
if(!_registry.isRegistered(target)) {
|
258
|
+
revert IAccess.ErrorIAccessTargetNotRegistered(target);
|
259
|
+
}
|
191
260
|
|
192
|
-
|
193
|
-
|
194
|
-
|
261
|
+
_createTarget(target, name, IAccess.Type.Gif);
|
262
|
+
}
|
263
|
+
// INSTANCE_OWNER_ROLE
|
264
|
+
// assume custom target.authority() is constant -> target MUST not be used with different instance access manager
|
265
|
+
// assume custom target can not be registered as component -> each service which is doing component registration MUST register a gif target
|
266
|
+
// assume custom target can not be registered as instance or service -> why?
|
267
|
+
// TODO check target associated with instance owner or instance or instance components or components helpers
|
268
|
+
function createTarget(address target, string memory name) external restricted()
|
269
|
+
{
|
270
|
+
_createTarget(target, name, IAccess.Type.Custom);
|
271
|
+
}
|
272
|
+
|
273
|
+
// TODO instance owner locks component instead of revoking it access to the instance...
|
274
|
+
function setTargetLockedByService(address target, bool locked)
|
275
|
+
external
|
276
|
+
restricted // INSTANCE_SERVICE_ROLE
|
277
|
+
{
|
278
|
+
_setTargetLocked(target, locked);
|
279
|
+
}
|
280
|
+
|
281
|
+
function setTargetLockedByInstance(address target, bool locked)
|
282
|
+
external
|
283
|
+
restricted // INSTANCE_ROLE
|
284
|
+
{
|
285
|
+
_setTargetLocked(target, locked);
|
286
|
+
}
|
287
|
+
|
288
|
+
|
289
|
+
// allowed combinations of roles and targets:
|
290
|
+
//1) set core role for core target
|
291
|
+
//2) set gif role for gif target
|
292
|
+
//3) set custom role for gif target
|
293
|
+
//4) set custom role for custom target
|
294
|
+
|
295
|
+
// ADMIN_ROLE if used only during initialization, works with:
|
296
|
+
// any roles for any targets
|
297
|
+
// INSTANCE_SERVICE_ROLE if used not only during initilization, works with:
|
298
|
+
// core roles for core targets
|
299
|
+
// gif roles for gif targets
|
300
|
+
function setCoreTargetFunctionRole(
|
301
|
+
string memory targetName,
|
302
|
+
bytes4[] calldata selectors,
|
303
|
+
RoleId roleId
|
304
|
+
)
|
305
|
+
public
|
306
|
+
virtual
|
307
|
+
restricted()
|
308
|
+
{
|
309
|
+
ShortString nameShort = ShortStrings.toShortString(targetName);
|
310
|
+
address target = _targetAddressForName[nameShort];
|
311
|
+
|
312
|
+
// not custom target
|
313
|
+
if(_targetInfo[target].ttype == IAccess.Type.Custom) {
|
314
|
+
revert IAccess.ErrorIAccessTargetTypeInvalid(target, IAccess.Type.Custom);
|
315
|
+
}
|
316
|
+
|
317
|
+
// not custom role
|
318
|
+
if(_roleInfo[roleId].rtype == IAccess.Type.Custom) {
|
319
|
+
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Custom);
|
320
|
+
}
|
321
|
+
|
322
|
+
_setTargetFunctionRole(target, nameShort, selectors, roleId);
|
195
323
|
}
|
196
324
|
|
197
|
-
|
198
|
-
|
199
|
-
|
325
|
+
// INSTANCE_OWNER_ROLE
|
326
|
+
// gif role for gif target
|
327
|
+
// gif role for custom target
|
328
|
+
// custom role for gif target
|
329
|
+
// custom role for custom target
|
330
|
+
// TODO instance owner can mess with gif target (component) -> e.g. set custom role for function intendent to work with gif role
|
331
|
+
function setTargetFunctionRole(
|
332
|
+
string memory targetName,
|
333
|
+
bytes4[] calldata selectors,
|
334
|
+
RoleId roleId
|
335
|
+
)
|
336
|
+
public
|
337
|
+
virtual
|
338
|
+
restricted()
|
339
|
+
{
|
340
|
+
ShortString nameShort = ShortStrings.toShortString(targetName);
|
341
|
+
address target = _targetAddressForName[nameShort];
|
342
|
+
|
343
|
+
// not core target
|
344
|
+
if(_targetInfo[target].ttype == IAccess.Type.Core) {
|
345
|
+
revert IAccess.ErrorIAccessTargetTypeInvalid(target, IAccess.Type.Core);
|
200
346
|
}
|
201
347
|
|
202
|
-
|
203
|
-
|
348
|
+
// not core role
|
349
|
+
if(_roleInfo[roleId].rtype == IAccess.Type.Core) {
|
350
|
+
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Core);
|
351
|
+
}
|
352
|
+
|
353
|
+
_setTargetFunctionRole(target, nameShort, selectors, roleId);
|
354
|
+
}
|
355
|
+
|
356
|
+
function getTargetAddress(string memory targetName) public view returns(address targetAddress) {
|
357
|
+
ShortString nameShort = ShortStrings.toShortString(targetName);
|
358
|
+
return _targetAddressForName[nameShort];
|
359
|
+
}
|
360
|
+
|
361
|
+
function isTargetLocked(address target) public view returns (bool locked) {
|
362
|
+
return _targetInfo[target].isLocked;
|
204
363
|
}
|
205
364
|
|
206
365
|
function targetExists(address target) public view returns (bool exists) {
|
207
|
-
return
|
366
|
+
return _targetInfo[target].createdAt.gtz();
|
208
367
|
}
|
209
368
|
|
210
|
-
|
369
|
+
function getTargetInfo(address target) public view returns (IAccess.TargetInfo memory) {
|
370
|
+
return _targetInfo[target];
|
371
|
+
}
|
211
372
|
|
212
|
-
|
213
|
-
|
214
|
-
|
373
|
+
//--- Role internal view/pure functions --------------------------------------//
|
374
|
+
function _createRole(RoleId roleId, string memory roleName, IAccess.Type rtype)
|
375
|
+
internal
|
376
|
+
{
|
377
|
+
ShortString name = ShortStrings.toShortString(roleName);
|
378
|
+
_validateRole(roleId, name, rtype);
|
379
|
+
|
380
|
+
if(roleExists(roleId)) {
|
381
|
+
revert IAccess.ErrorIAccessRoleIdExists(roleId);
|
215
382
|
}
|
216
383
|
|
217
|
-
|
218
|
-
|
219
|
-
|
220
|
-
|
384
|
+
if (_roleIdForName[name].gtz()) {
|
385
|
+
revert IAccess.ErrorIAccessRoleNameExists(roleId, _roleIdForName[name], name);
|
386
|
+
}
|
387
|
+
|
388
|
+
_roleInfo[roleId] = IAccess.RoleInfo(
|
389
|
+
name,
|
390
|
+
rtype,
|
391
|
+
ADMIN_ROLE(),
|
221
392
|
TimestampLib.blockTimestamp(),
|
222
|
-
TimestampLib.blockTimestamp()
|
393
|
+
TimestampLib.blockTimestamp()
|
394
|
+
);
|
395
|
+
_roleIdForName[name] = roleId;
|
396
|
+
_roleIds.push(roleId);
|
223
397
|
|
224
|
-
|
225
|
-
_roleForName[role.name] = roleId;
|
226
|
-
_roles.push(roleId);
|
398
|
+
emit LogRoleCreation(roleId, name, rtype);
|
227
399
|
}
|
228
400
|
|
229
|
-
function
|
230
|
-
RoleId roleId,
|
231
|
-
string memory name,
|
232
|
-
bool isCustom
|
233
|
-
)
|
401
|
+
function _validateRole(RoleId roleId, ShortString name, IAccess.Type rtype)
|
234
402
|
internal
|
235
|
-
view
|
236
|
-
returns (RoleInfo memory existingRole)
|
403
|
+
view
|
237
404
|
{
|
238
|
-
|
239
|
-
|
240
|
-
|
241
|
-
revert ErrorRoleIdInvalid(roleId);
|
405
|
+
uint roleIdInt = roleId.toInt();
|
406
|
+
if(rtype == IAccess.Type.Custom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
|
407
|
+
revert IAccess.ErrorIAccessRoleIdTooSmall(roleId);
|
242
408
|
}
|
243
409
|
|
244
|
-
|
245
|
-
|
246
|
-
|
247
|
-
|
248
|
-
|
410
|
+
if(
|
411
|
+
rtype != IAccess.Type.Custom &&
|
412
|
+
roleIdInt >= CUSTOM_ROLE_ID_MIN &&
|
413
|
+
roleIdInt != PUBLIC_ROLE().toInt())
|
414
|
+
{
|
415
|
+
revert IAccess.ErrorIAccessRoleIdTooBig(roleId);
|
249
416
|
}
|
250
417
|
|
251
|
-
|
252
|
-
|
253
|
-
|
254
|
-
revert ErrorRoleIdTooBig(roleId);
|
418
|
+
// role name checks
|
419
|
+
if (ShortStrings.byteLength(name) == 0) {
|
420
|
+
revert IAccess.ErrorIAccessRoleNameEmpty(roleId);
|
255
421
|
}
|
422
|
+
}
|
256
423
|
|
257
|
-
|
258
|
-
|
259
|
-
|
260
|
-
|
424
|
+
function _revokeRole(RoleId roleId, address member)
|
425
|
+
internal
|
426
|
+
returns(bool revoked)
|
427
|
+
{
|
428
|
+
if (!roleExists(roleId)) {
|
429
|
+
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
261
430
|
}
|
262
431
|
|
263
|
-
|
264
|
-
|
432
|
+
revoked = EnumerableSet.remove(_roleMembers[roleId], member);
|
433
|
+
if(revoked) {
|
434
|
+
_accessManager.revokeRole(roleId.toInt(), member);
|
265
435
|
}
|
266
436
|
}
|
267
437
|
|
268
|
-
function
|
269
|
-
|
270
|
-
|
438
|
+
function _getNextCustomRoleId()
|
439
|
+
internal
|
440
|
+
returns(RoleId roleId, RoleId admin)
|
441
|
+
{
|
442
|
+
uint64 roleIdInt = _idNext;
|
443
|
+
uint64 adminInt = roleIdInt + 1;
|
444
|
+
|
445
|
+
_idNext = roleIdInt + 2;
|
446
|
+
|
447
|
+
roleId = RoleIdLib.toRoleId(roleIdInt);
|
448
|
+
admin = RoleIdLib.toRoleId(adminInt);
|
449
|
+
}
|
450
|
+
|
451
|
+
//--- Target internal view/pure functions --------------------------------------//
|
452
|
+
function _createTarget(address target, string memory targetName, IAccess.Type ttype)
|
453
|
+
internal
|
454
|
+
{
|
455
|
+
ShortString name = ShortStrings.toShortString(targetName);
|
456
|
+
_validateTarget(target, name, ttype);
|
457
|
+
|
458
|
+
if (_targetInfo[target].createdAt.gtz()) {
|
459
|
+
revert IAccess.ErrorIAccessTargetExists(target, _targetInfo[target].name);
|
271
460
|
}
|
272
461
|
|
273
|
-
|
274
|
-
|
275
|
-
|
276
|
-
|
277
|
-
|
278
|
-
|
462
|
+
if (_targetAddressForName[name] != address(0)) {
|
463
|
+
revert IAccess.ErrorIAccessTargetNameExists(
|
464
|
+
target,
|
465
|
+
_targetAddressForName[name],
|
466
|
+
name);
|
467
|
+
}
|
279
468
|
|
280
|
-
|
281
|
-
|
469
|
+
bool isLocked = _accessManager.isTargetClosed(target);// sync with state in access manager
|
470
|
+
_targetInfo[target] = IAccess.TargetInfo(
|
471
|
+
name,
|
472
|
+
ttype,
|
473
|
+
isLocked,
|
474
|
+
TimestampLib.blockTimestamp(),
|
475
|
+
TimestampLib.blockTimestamp()
|
476
|
+
);
|
477
|
+
_targetAddressForName[name] = target;
|
282
478
|
_targets.push(target);
|
479
|
+
|
480
|
+
emit LogTargetCreation(target, name, ttype, isLocked);
|
481
|
+
}
|
482
|
+
|
483
|
+
function _validateTarget(address target, ShortString name, IAccess.Type ttype)
|
484
|
+
internal
|
485
|
+
view
|
486
|
+
{
|
487
|
+
address targetAuthority = AccessManagedUpgradeable(target).authority();
|
488
|
+
if(targetAuthority != authority()) {
|
489
|
+
revert IAccess.ErrorIAccessTargetAuthorityInvalid(target, targetAuthority);
|
490
|
+
}
|
491
|
+
|
492
|
+
if (ShortStrings.byteLength(name) == 0) {
|
493
|
+
revert IAccess.ErrorIAccessTargetNameEmpty(target);
|
494
|
+
}
|
283
495
|
}
|
284
496
|
|
285
|
-
|
497
|
+
// IMPORTANT: instance access manager MUST be of Core type -> otherwise can be locked forever
|
498
|
+
function _setTargetLocked(address target, bool locked) internal
|
499
|
+
{
|
500
|
+
IAccess.Type targetType = _targetInfo[target].ttype;
|
501
|
+
if(target == address(0) || targetType == IAccess.Type.NotInitialized) {
|
502
|
+
revert IAccess.ErrorIAccessTargetDoesNotExist(target);
|
503
|
+
}
|
504
|
+
|
505
|
+
if(targetType == IAccess.Type.Core) {
|
506
|
+
revert IAccess.ErrorIAccessTargetTypeInvalid(target, targetType);
|
507
|
+
}
|
508
|
+
|
509
|
+
_targetInfo[target].isLocked = locked;
|
510
|
+
_accessManager.setTargetClosed(target, locked);
|
511
|
+
}
|
512
|
+
|
513
|
+
function _setTargetFunctionRole(
|
514
|
+
address target,
|
515
|
+
ShortString name,
|
516
|
+
bytes4[] calldata selectors,
|
517
|
+
RoleId roleId
|
518
|
+
)
|
519
|
+
internal
|
520
|
+
{
|
521
|
+
if (target == address(0)) {
|
522
|
+
revert IAccess.ErrorIAccessTargetDoesNotExist(target);
|
523
|
+
}
|
524
|
+
|
525
|
+
if (!roleExists(roleId)) {
|
526
|
+
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
527
|
+
}
|
528
|
+
|
529
|
+
uint64 roleIdInt = RoleId.unwrap(roleId);
|
530
|
+
_accessManager.setTargetFunctionRole(target, selectors, roleIdInt);
|
531
|
+
}
|
286
532
|
|
533
|
+
function canCall(
|
534
|
+
address caller,
|
535
|
+
address target,
|
536
|
+
bytes4 selector
|
537
|
+
) public view virtual returns (bool immediate, uint32 delay) {
|
538
|
+
return _accessManager.canCall(caller, target, selector);
|
287
539
|
}
|
288
540
|
}
|