@etherisc/gif-next 0.0.2-f2b0fa2-473 → 0.0.2-f4f2d93-430
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +75 -14
- package/artifacts/contracts/components/Component.sol/Component.dbg.json +4 -0
- package/artifacts/contracts/components/Component.sol/Component.json +842 -0
- package/artifacts/contracts/components/Distribution.sol/Distribution.dbg.json +1 -1
- package/artifacts/contracts/components/Distribution.sol/Distribution.json +948 -229
- package/artifacts/contracts/components/IComponent.sol/IComponent.dbg.json +4 -0
- package/artifacts/contracts/{shared/RegisterableUpgradable.sol/RegisterableUpgradable.json → components/IComponent.sol/IComponent.json} +295 -132
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.json +848 -31
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.json +864 -49
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.json +682 -9
- package/artifacts/contracts/components/Pool.sol/Pool.dbg.json +1 -1
- package/artifacts/contracts/components/Pool.sol/Pool.json +849 -247
- package/artifacts/contracts/components/Product.sol/Product.dbg.json +1 -1
- package/artifacts/contracts/components/Product.sol/Product.json +637 -224
- package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.dbg.json +4 -0
- package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.json +1206 -0
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +4 -0
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +778 -0
- package/artifacts/contracts/instance/Cloneable.sol/Cloneable.dbg.json +4 -0
- package/artifacts/contracts/instance/{AccessManagedSimple.sol/AccessManagedSimple.json → Cloneable.sol/Cloneable.json} +91 -2
- package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.json +2200 -184
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +368 -156
- package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
- package/artifacts/contracts/instance/Instance.sol/Instance.json +1005 -1175
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.json +593 -180
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +242 -210
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +666 -190
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +392 -75
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.dbg.json +4 -0
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.json +256 -0
- package/artifacts/contracts/instance/base/ComponentService.sol/ComponentService.dbg.json +4 -0
- package/artifacts/contracts/instance/base/{ComponentServiceBase.sol/ComponentServiceBase.json → ComponentService.sol/ComponentService.json} +276 -150
- package/artifacts/contracts/instance/base/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/ILifecycle.sol/ILifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.json +40 -10
- package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.json +36 -11
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.json +71 -45
- package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IComponents.sol/IComponents.dbg.json +4 -0
- package/artifacts/contracts/instance/module/IComponents.sol/IComponents.json +10 -0
- package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ISetup.sol/ISetup.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ITreasury.sol/ITreasury.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ApplicationService.sol/ApplicationService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ApplicationService.sol/ApplicationService.json +1039 -0
- package/artifacts/contracts/instance/service/ApplicationServiceManager.sol/ApplicationServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ApplicationServiceManager.sol/ApplicationServiceManager.json +673 -0
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.json +1231 -0
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.json +721 -0
- package/artifacts/contracts/instance/service/ClaimService.sol/ClaimService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ClaimService.sol/ClaimService.json +817 -0
- package/artifacts/contracts/instance/service/ClaimServiceManager.sol/ClaimServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ClaimServiceManager.sol/ClaimServiceManager.json +641 -0
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.json +1798 -0
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.json +805 -0
- package/artifacts/contracts/instance/service/IApplicationService.sol/IApplicationService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/IApplicationService.sol/IApplicationService.json +622 -0
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.json +659 -0
- package/artifacts/contracts/instance/service/IClaimService.sol/IClaimService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/{IComponentOwnerService.sol/IComponentOwnerService.json → IClaimService.sol/IClaimService.json} +217 -208
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.json +804 -160
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.json +606 -0
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.json +437 -154
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.json +90 -391
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.json +1092 -0
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.json +697 -0
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.json +1237 -0
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.json +661 -0
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.json +840 -0
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.dbg.json +4 -0
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.json +653 -0
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.json +15 -2
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +373 -61
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +223 -229
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.json +18 -0
- package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.json +333 -188
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.dbg.json +4 -0
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.json +285 -0
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +227 -330
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +304 -138
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +4 -0
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +559 -0
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +4 -0
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +498 -0
- package/artifacts/contracts/shared/ContractDeployerLib.sol/ContractDeployerLib.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.json +41 -3
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.json +40 -29
- package/artifacts/contracts/shared/IPolicyHolder.sol/IPolicyHolder.dbg.json +4 -0
- package/artifacts/contracts/shared/IPolicyHolder.sol/IPolicyHolder.json +129 -0
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.json +21 -34
- package/artifacts/contracts/shared/IRegistryLinked.sol/IRegistryLinked.dbg.json +4 -0
- package/artifacts/contracts/{experiment/inheritance/IB.sol/IB.json → shared/IRegistryLinked.sol/IRegistryLinked.json} +18 -20
- package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
- package/artifacts/contracts/shared/IService.sol/IService.json +86 -172
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +1 -1
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.json +2 -152
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +120 -27
- package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.dbg.json +4 -0
- package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.json +248 -0
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +1 -1
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +294 -61
- package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
- package/artifacts/contracts/shared/Registerable.sol/Registerable.json +129 -51
- package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.dbg.json +4 -0
- package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.json +84 -0
- package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
- package/artifacts/contracts/shared/Service.sol/Service.json +191 -163
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.json +2 -2
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +1 -1
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.json +2 -2
- package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +1 -1
- package/artifacts/contracts/shared/Versionable.sol/Versionable.json +2 -152
- package/artifacts/contracts/test/TestFee.sol/TestFee.dbg.json +1 -1
- package/artifacts/contracts/test/TestFee.sol/TestFee.json +2 -2
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.json +129 -51
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.dbg.json +1 -1
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.json +6 -6
- package/artifacts/contracts/test/TestService.sol/TestService.dbg.json +1 -1
- package/artifacts/contracts/test/TestService.sol/TestService.json +210 -214
- package/artifacts/contracts/test/TestToken.sol/TestUsdc.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersion.sol/TestVersion.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersion.sol/TestVersion.json +2 -2
- package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.json +8 -190
- package/artifacts/contracts/test/Usdc.sol/USDC.dbg.json +1 -1
- package/artifacts/contracts/types/AddressSet.sol/LibAddressSet.dbg.json +1 -1
- package/artifacts/contracts/types/Amount.sol/AmountLib.dbg.json +4 -0
- package/artifacts/contracts/types/Amount.sol/AmountLib.json +161 -0
- package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
- package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.json +2 -2
- package/artifacts/contracts/types/ChainId.sol/ChainIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/ClaimId.sol/ClaimIdLib.dbg.json +4 -0
- package/artifacts/contracts/types/ClaimId.sol/ClaimIdLib.json +100 -0
- package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.json +2 -2
- package/artifacts/contracts/types/Fee.sol/FeeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Fee.sol/FeeLib.json +40 -9
- package/artifacts/contracts/types/Key32.sol/Key32Lib.dbg.json +1 -1
- package/artifacts/contracts/types/Key32.sol/Key32Lib.json +2 -2
- package/artifacts/contracts/types/NftId.sol/NftIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/NftId.sol/NftIdLib.json +17 -4
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.json +26 -3
- package/artifacts/contracts/types/NumberId.sol/NumberIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.json +2 -2
- package/artifacts/contracts/types/PayoutId.sol/PayoutIdLib.dbg.json +4 -0
- package/artifacts/contracts/types/PayoutId.sol/PayoutIdLib.json +100 -0
- package/artifacts/contracts/types/Referral.sol/ReferralLib.dbg.json +1 -1
- package/artifacts/contracts/types/Referral.sol/ReferralLib.json +23 -4
- package/artifacts/contracts/types/RiskId.sol/RiskIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RiskId.sol/RiskIdLib.json +2 -2
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.json +2 -2
- package/artifacts/contracts/types/Seconds.sol/SecondsLib.dbg.json +4 -0
- package/artifacts/contracts/types/Seconds.sol/SecondsLib.json +124 -0
- package/artifacts/contracts/types/StateId.sol/StateIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/StateId.sol/StateIdLib.json +2 -2
- package/artifacts/contracts/types/Timestamp.sol/TimestampLib.dbg.json +1 -1
- package/artifacts/contracts/types/Timestamp.sol/TimestampLib.json +25 -7
- package/artifacts/contracts/types/UFixed.sol/MathLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/MathLib.json +2 -2
- package/artifacts/contracts/types/UFixed.sol/UFixedLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/UFixedLib.json +2 -2
- package/artifacts/contracts/types/Version.sol/VersionLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionLib.json +2 -2
- package/artifacts/contracts/types/Version.sol/VersionPartLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionPartLib.json +22 -3
- package/contracts/components/Component.sol +253 -0
- package/contracts/components/Distribution.sol +200 -86
- package/contracts/components/IComponent.sol +76 -0
- package/contracts/components/IDistributionComponent.sol +44 -16
- package/contracts/components/IPoolComponent.sol +88 -37
- package/contracts/components/IProductComponent.sol +10 -5
- package/contracts/components/Pool.sol +225 -181
- package/contracts/components/Product.sol +130 -134
- package/contracts/instance/AccessManagerUpgradeableInitializeable.sol +13 -0
- package/contracts/instance/BundleManager.sol +127 -0
- package/contracts/instance/Cloneable.sol +51 -0
- package/contracts/instance/IInstance.sol +81 -11
- package/contracts/instance/IInstanceService.sol +56 -1
- package/contracts/instance/Instance.sol +157 -265
- package/contracts/instance/InstanceAccessManager.sol +414 -175
- package/contracts/instance/InstanceReader.sol +40 -29
- package/contracts/instance/InstanceService.sol +447 -54
- package/contracts/instance/InstanceServiceManager.sol +11 -13
- package/contracts/instance/ObjectManager.sol +82 -0
- package/contracts/instance/base/ComponentService.sol +121 -0
- package/contracts/instance/base/KeyValueStore.sol +13 -5
- package/contracts/instance/base/Lifecycle.sol +11 -2
- package/contracts/instance/module/IAccess.sol +36 -20
- package/contracts/instance/module/IBundle.sol +8 -4
- package/contracts/instance/module/IComponents.sol +41 -0
- package/contracts/instance/module/IDistribution.sol +2 -0
- package/contracts/instance/module/IPolicy.sol +30 -3
- package/contracts/instance/module/ISetup.sol +9 -19
- package/contracts/instance/service/ApplicationService.sol +350 -0
- package/contracts/instance/service/ApplicationServiceManager.sol +35 -0
- package/contracts/instance/service/BundleService.sol +431 -0
- package/contracts/instance/service/BundleServiceManager.sol +51 -0
- package/contracts/instance/service/ClaimService.sol +151 -0
- package/contracts/instance/service/ClaimServiceManager.sol +35 -0
- package/contracts/instance/service/DistributionService.sol +435 -0
- package/contracts/instance/service/DistributionServiceManager.sol +51 -0
- package/contracts/instance/service/IApplicationService.sol +82 -0
- package/contracts/instance/service/IBundleService.sol +93 -0
- package/contracts/instance/service/IClaimService.sol +61 -0
- package/contracts/instance/service/IDistributionService.sol +87 -0
- package/contracts/instance/service/IPolicyService.sol +72 -0
- package/contracts/instance/service/IPoolService.sol +79 -17
- package/contracts/instance/service/IProductService.sol +6 -73
- package/contracts/instance/service/PolicyService.sol +362 -0
- package/contracts/instance/service/PolicyServiceManager.sol +54 -0
- package/contracts/instance/service/PoolService.sol +303 -0
- package/contracts/instance/service/PoolServiceManager.sol +51 -0
- package/contracts/instance/service/ProductService.sol +210 -0
- package/contracts/instance/service/ProductServiceManager.sol +54 -0
- package/contracts/registry/ChainNft.sol +9 -1
- package/contracts/registry/IRegistry.sol +52 -8
- package/contracts/registry/IRegistryService.sol +47 -14
- package/contracts/registry/ITransferInterceptor.sol +1 -0
- package/contracts/registry/Registry.sol +270 -226
- package/contracts/registry/RegistryAccessManager.sol +216 -0
- package/contracts/registry/RegistryService.sol +111 -268
- package/contracts/registry/RegistryServiceManager.sol +24 -26
- package/contracts/registry/ReleaseManager.sol +324 -0
- package/contracts/registry/TokenRegistry.sol +116 -0
- package/contracts/shared/ERC165.sol +14 -8
- package/contracts/shared/INftOwnable.sol +11 -10
- package/contracts/shared/IPolicyHolder.sol +26 -0
- package/contracts/shared/IRegisterable.sol +4 -6
- package/contracts/shared/IRegistryLinked.sol +12 -0
- package/contracts/shared/IService.sol +5 -4
- package/contracts/shared/IVersionable.sol +4 -47
- package/contracts/shared/NftOwnable.sol +67 -83
- package/contracts/shared/PolicyHolder.sol +81 -0
- package/contracts/shared/ProxyManager.sol +100 -25
- package/contracts/shared/Registerable.sol +16 -31
- package/contracts/shared/RegistryLinked.sol +48 -0
- package/contracts/shared/Service.sol +42 -24
- package/contracts/shared/TokenHandler.sol +11 -5
- package/contracts/shared/Versionable.sol +4 -92
- package/contracts/test/TestRegisterable.sol +1 -1
- package/contracts/test/TestService.sol +4 -3
- package/contracts/types/Amount.sol +60 -0
- package/contracts/types/Blocknumber.sol +1 -0
- package/contracts/types/ClaimId.sol +52 -0
- package/contracts/types/DistributorType.sol +2 -2
- package/contracts/types/Fee.sol +13 -5
- package/contracts/types/NftId.sol +8 -0
- package/contracts/types/NftIdSet.sol +26 -24
- package/contracts/types/ObjectType.sol +10 -5
- package/contracts/types/PayoutId.sol +54 -0
- package/contracts/types/Referral.sol +4 -0
- package/contracts/types/RoleId.sol +26 -11
- package/contracts/types/Seconds.sol +54 -0
- package/contracts/types/StateId.sol +5 -0
- package/contracts/types/Timestamp.sol +13 -13
- package/contracts/types/UFixed.sol +1 -0
- package/contracts/types/Version.sol +5 -1
- package/package.json +3 -3
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.json +0 -314
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.json +0 -267
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.dbg.json +0 -4
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.json +0 -66
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.dbg.json +0 -4
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.json +0 -24
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.dbg.json +0 -4
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.json +0 -42
- package/artifacts/contracts/experiment/errors/Require.sol/Require.dbg.json +0 -4
- package/artifacts/contracts/experiment/errors/Require.sol/Require.json +0 -105
- package/artifacts/contracts/experiment/errors/Revert.sol/Revert.dbg.json +0 -4
- package/artifacts/contracts/experiment/errors/Revert.sol/Revert.json +0 -105
- package/artifacts/contracts/experiment/inheritance/A.sol/A.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/A.sol/A.json +0 -128
- package/artifacts/contracts/experiment/inheritance/A.sol/AShared.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/A.sol/AShared.json +0 -42
- package/artifacts/contracts/experiment/inheritance/B.sol/B.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/B.sol/B.json +0 -76
- package/artifacts/contracts/experiment/inheritance/C.sol/C.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/C.sol/C.json +0 -89
- package/artifacts/contracts/experiment/inheritance/IA.sol/IA.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IA.sol/IA.json +0 -128
- package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.json +0 -37
- package/artifacts/contracts/experiment/inheritance/IB.sol/IB.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IC.sol/IC.dbg.json +0 -4
- package/artifacts/contracts/experiment/inheritance/IC.sol/IC.json +0 -63
- package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.json +0 -59
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.json +0 -124
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.json +0 -74
- package/artifacts/contracts/experiment/statemachine/SM.sol/SM.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/SM.sol/SM.json +0 -124
- package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.dbg.json +0 -4
- package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.json +0 -207
- package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.dbg.json +0 -4
- package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.json +0 -10
- package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.dbg.json +0 -4
- package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.json +0 -10
- package/artifacts/contracts/instance/AccessManagedSimple.sol/AccessManagedSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerSimple.sol/AccessManagerSimple.json +0 -1119
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.json +0 -1082
- package/artifacts/contracts/instance/base/ComponentServiceBase.sol/ComponentServiceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.json +0 -113
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.json +0 -827
- package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.dbg.json +0 -4
- package/contracts/components/BaseComponent.sol +0 -86
- package/contracts/components/IBaseComponent.sol +0 -24
- package/contracts/experiment/cloning/Cloner.sol +0 -47
- package/contracts/experiment/errors/Require.sol +0 -38
- package/contracts/experiment/errors/Revert.sol +0 -44
- package/contracts/experiment/inheritance/A.sol +0 -53
- package/contracts/experiment/inheritance/B.sol +0 -28
- package/contracts/experiment/inheritance/C.sol +0 -34
- package/contracts/experiment/inheritance/IA.sol +0 -13
- package/contracts/experiment/inheritance/IB.sol +0 -10
- package/contracts/experiment/inheritance/IC.sol +0 -12
- package/contracts/experiment/statemachine/Dummy.sol +0 -27
- package/contracts/experiment/statemachine/ISM.sol +0 -25
- package/contracts/experiment/statemachine/SM.sol +0 -57
- package/contracts/experiment/statemachine/SimpleStateMachine.sol +0 -31
- package/contracts/experiment/types/TypeA.sol +0 -47
- package/contracts/experiment/types/TypeB.sol +0 -29
- package/contracts/instance/AccessManagedSimple.sol +0 -114
- package/contracts/instance/AccessManagerSimple.sol +0 -682
- package/contracts/instance/IAccessManagerSimple.sol +0 -391
- package/contracts/instance/base/ComponentServiceBase.sol +0 -49
- package/contracts/instance/base/IInstanceBase.sol +0 -23
- package/contracts/instance/service/ComponentOwnerService.sol +0 -317
- package/contracts/instance/service/IComponentOwnerService.sol +0 -20
- package/contracts/shared/RegisterableUpgradable.sol +0 -16
| @@ -1,288 +1,527 @@ | |
| 1 1 | 
             
            // SPDX-License-Identifier: Apache-2.0
         | 
| 2 2 | 
             
            pragma solidity ^0.8.20;
         | 
| 3 3 |  | 
| 4 | 
            +
            import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
         | 
| 4 5 | 
             
            import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
         | 
| 5 6 | 
             
            import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
         | 
| 6 7 |  | 
| 7 | 
            -
            import { | 
| 8 | 
            -
            import { | 
| 9 | 
            -
            import {IBundle} from "./module/IBundle.sol";
         | 
| 10 | 
            -
            import {IPolicy} from "./module/IPolicy.sol";
         | 
| 11 | 
            -
            import {IRisk} from "./module/IRisk.sol";
         | 
| 12 | 
            -
            import {ISetup} from "./module/ISetup.sol";
         | 
| 13 | 
            -
            import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
         | 
| 14 | 
            -
            import {KeyValueStore} from "./base/KeyValueStore.sol";
         | 
| 8 | 
            +
            import {RoleId, RoleIdLib, ADMIN_ROLE, PUBLIC_ROLE, INSTANCE_SERVICE_ROLE, INSTANCE_OWNER_ROLE, INSTANCE_ROLE} from "../types/RoleId.sol";
         | 
| 9 | 
            +
            import {TimestampLib} from "../types/Timestamp.sol";
         | 
| 15 10 | 
             
            import {NftId} from "../types/NftId.sol";
         | 
| 16 | 
            -
             | 
| 17 | 
            -
            import { | 
| 18 | 
            -
             | 
| 19 | 
            -
            import { | 
| 20 | 
            -
             | 
| 21 | 
            -
            import { | 
| 11 | 
            +
             | 
| 12 | 
            +
            import {AccessManagerUpgradeableInitializeable} from "./AccessManagerUpgradeableInitializeable.sol";
         | 
| 13 | 
            +
             | 
| 14 | 
            +
            import {IRegistry} from "../registry/IRegistry.sol";
         | 
| 15 | 
            +
             | 
| 16 | 
            +
            import {IInstance} from "./IInstance.sol";
         | 
| 17 | 
            +
            import {IAccess} from "./module/IAccess.sol";
         | 
| 22 18 |  | 
| 23 19 | 
             
            contract InstanceAccessManager is
         | 
| 24 | 
            -
                 | 
| 20 | 
            +
                AccessManagedUpgradeable
         | 
| 25 21 | 
             
            {
         | 
| 22 | 
            +
                event LogRoleCreation(RoleId roleId, ShortString name, IAccess.Type rtype);
         | 
| 23 | 
            +
                event LogTargetCreation(address target, ShortString name, IAccess.Type ttype, bool isLocked);
         | 
| 24 | 
            +
             | 
| 25 | 
            +
                using RoleIdLib for RoleId;
         | 
| 26 | 
            +
             | 
| 26 27 | 
             
                string public constant ADMIN_ROLE_NAME = "AdminRole";
         | 
| 27 28 | 
             
                string public constant PUBLIC_ROLE_NAME = "PublicRole";
         | 
| 29 | 
            +
                string public constant INSTANCE_ROLE_NAME = "InstanceRole";
         | 
| 30 | 
            +
                string public constant INSTANCE_OWNER_ROLE_NAME = "InstanceOwnerRole";
         | 
| 28 31 |  | 
| 29 | 
            -
                uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
         | 
| 32 | 
            +
                uint64 public constant CUSTOM_ROLE_ID_MIN = 10000; // MUST be even
         | 
| 30 33 | 
             
                uint32 public constant EXECUTION_DELAY = 0;
         | 
| 31 34 |  | 
| 32 | 
            -
                struct RoleInfo {
         | 
| 33 | 
            -
                    ShortString name;
         | 
| 34 | 
            -
                    bool isCustom;
         | 
| 35 | 
            -
                    bool isLocked;
         | 
| 36 | 
            -
                    Timestamp createdAt;
         | 
| 37 | 
            -
                    Timestamp updatedAt;
         | 
| 38 | 
            -
                }
         | 
| 39 | 
            -
             | 
| 40 | 
            -
                struct TargetInfo {
         | 
| 41 | 
            -
                    ShortString name;
         | 
| 42 | 
            -
                    bool isCustom;
         | 
| 43 | 
            -
                    bool isLocked;
         | 
| 44 | 
            -
                    Timestamp createdAt;
         | 
| 45 | 
            -
                    Timestamp updatedAt;
         | 
| 46 | 
            -
                }
         | 
| 47 | 
            -
             | 
| 48 | 
            -
                error ErrorRoleIdInvalid(RoleId roleId);
         | 
| 49 | 
            -
                error ErrorRoleIdTooBig(RoleId roleId);
         | 
| 50 | 
            -
                error ErrorRoleIdTooSmall(RoleId roleId);
         | 
| 51 | 
            -
                error ErrorRoleIdAlreadyExists(RoleId roleId, ShortString name);
         | 
| 52 | 
            -
                error ErrorRoleIdNotActive(RoleId roleId);
         | 
| 53 | 
            -
                error ErrorRoleNameEmpty(RoleId roleId);
         | 
| 54 | 
            -
                error ErrorRoleNameNotUnique(RoleId roleId, ShortString name);
         | 
| 55 | 
            -
                error ErrorRoleInvalidUpdate(RoleId roleId, bool isCustom);
         | 
| 56 | 
            -
                error ErrorRoleIsCustomIsImmutable(RoleId roleId, bool isCustom, bool isCustomExisting);
         | 
| 57 | 
            -
                error ErrorSetLockedForNonexstentRole(RoleId roleId);
         | 
| 58 | 
            -
                error ErrorGrantNonexstentRole(RoleId roleId);
         | 
| 59 | 
            -
                error ErrorRevokeNonexstentRole(RoleId roleId);
         | 
| 60 | 
            -
                error ErrorRenounceNonexstentRole(RoleId roleId);
         | 
| 61 | 
            -
             | 
| 62 | 
            -
                error ErrorTargetAddressZero();
         | 
| 63 | 
            -
                error ErrorTargetAlreadyExists(address target, ShortString name);
         | 
| 64 | 
            -
                error ErrorTargetNameEmpty(address target);
         | 
| 65 | 
            -
                error ErrorTargetNameExists(address target, address existingTarget, ShortString name);
         | 
| 66 | 
            -
                error ErrorSetLockedForNonexstentTarget(address target);
         | 
| 67 | 
            -
             | 
| 68 35 | 
             
                // role specific state
         | 
| 69 | 
            -
                mapping(RoleId roleId => RoleInfo info) internal  | 
| 36 | 
            +
                mapping(RoleId roleId => IAccess.RoleInfo info) internal _roleInfo;
         | 
| 70 37 | 
             
                mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers; 
         | 
| 71 | 
            -
                mapping(ShortString name => RoleId roleId) internal  | 
| 72 | 
            -
                RoleId [] internal  | 
| 38 | 
            +
                mapping(ShortString name => RoleId roleId) internal _roleIdForName;
         | 
| 39 | 
            +
                RoleId [] internal _roleIds;
         | 
| 40 | 
            +
                uint64 _idNext;
         | 
| 73 41 |  | 
| 74 42 | 
             
                // target specific state
         | 
| 75 | 
            -
                mapping(address target => TargetInfo info) internal  | 
| 76 | 
            -
                mapping(ShortString name => address target) internal  | 
| 43 | 
            +
                mapping(address target => IAccess.TargetInfo info) internal _targetInfo;
         | 
| 44 | 
            +
                mapping(ShortString name => address target) internal _targetAddressForName;
         | 
| 77 45 | 
             
                address [] internal _targets;
         | 
| 78 46 |  | 
| 79 | 
            -
                 | 
| 47 | 
            +
                AccessManagerUpgradeableInitializeable internal _accessManager;
         | 
| 48 | 
            +
                IRegistry internal _registry;
         | 
| 49 | 
            +
             | 
| 50 | 
            +
                modifier restrictedToRoleAdmin(RoleId roleId) {
         | 
| 51 | 
            +
                    RoleId admin = getRoleAdmin(roleId);
         | 
| 52 | 
            +
                    (bool inRole, uint32 executionDelay) = _accessManager.hasRole(admin.toInt(), _msgSender());
         | 
| 53 | 
            +
                    assert(executionDelay == 0); // to be sure no delayed execution functionality is used
         | 
| 54 | 
            +
                    if (!inRole) {
         | 
| 55 | 
            +
                        revert IAccess.ErrorIAccessCallerIsNotRoleAdmin(_msgSender(), roleId);
         | 
| 56 | 
            +
                    }
         | 
| 57 | 
            +
                    _;
         | 
| 58 | 
            +
                }
         | 
| 80 59 |  | 
| 81 | 
            -
                 | 
| 82 | 
            -
             | 
| 60 | 
            +
                // instance owner is granted upon instance nft minting in callback function
         | 
| 61 | 
            +
                function initialize(address instanceAddress) external initializer 
         | 
| 83 62 | 
             
                {
         | 
| 84 | 
            -
                     | 
| 63 | 
            +
                    IInstance instance = IInstance(instanceAddress);
         | 
| 64 | 
            +
                    IRegistry registry = instance.getRegistry();
         | 
| 65 | 
            +
                    address authority = instance.authority();
         | 
| 85 66 |  | 
| 86 | 
            -
                     | 
| 87 | 
            -
                    _createRole(RoleIdLib.toRoleId(_accessManager.PUBLIC_ROLE()), PUBLIC_ROLE_NAME, false, false);
         | 
| 88 | 
            -
                }
         | 
| 67 | 
            +
                    __AccessManaged_init(authority);
         | 
| 89 68 |  | 
| 90 | 
            -
             | 
| 69 | 
            +
                    _accessManager = AccessManagerUpgradeableInitializeable(authority);
         | 
| 70 | 
            +
                    _registry = registry;
         | 
| 71 | 
            +
                    _idNext = CUSTOM_ROLE_ID_MIN;
         | 
| 72 | 
            +
             | 
| 73 | 
            +
                    _createRole(ADMIN_ROLE(), ADMIN_ROLE_NAME, IAccess.Type.Core);
         | 
| 74 | 
            +
                    _createRole(PUBLIC_ROLE(), PUBLIC_ROLE_NAME, IAccess.Type.Core);
         | 
| 75 | 
            +
                    _createRole(INSTANCE_ROLE(), INSTANCE_ROLE_NAME, IAccess.Type.Core);
         | 
| 76 | 
            +
                    _createRole(INSTANCE_OWNER_ROLE(), INSTANCE_OWNER_ROLE_NAME, IAccess.Type.Gif);
         | 
| 91 77 |  | 
| 92 | 
            -
             | 
| 93 | 
            -
                     | 
| 78 | 
            +
                    // assume `this` is already a member of ADMIN_ROLE
         | 
| 79 | 
            +
                    EnumerableSet.add(_roleMembers[ADMIN_ROLE()], address(this));
         | 
| 80 | 
            +
             | 
| 81 | 
            +
                    grantRole(INSTANCE_ROLE(), instanceAddress);
         | 
| 82 | 
            +
                    setRoleAdmin(INSTANCE_OWNER_ROLE(), INSTANCE_ROLE());
         | 
| 94 83 | 
             
                }
         | 
| 95 84 |  | 
| 96 | 
            -
                 | 
| 97 | 
            -
             | 
| 85 | 
            +
                //--- Role ------------------------------------------------------//
         | 
| 86 | 
            +
                // ADMIN_ROLE
         | 
| 87 | 
            +
                // assume all core roles are know at deployment time
         | 
| 88 | 
            +
                // assume core roles are set and granted only during instance cloning
         | 
| 89 | 
            +
                // assume core roles are never revoked -> core roles admin is never active after intialization
         | 
| 90 | 
            +
                function createCoreRole(RoleId roleId, string memory name)
         | 
| 91 | 
            +
                    external
         | 
| 92 | 
            +
                    restricted()
         | 
| 93 | 
            +
                {
         | 
| 94 | 
            +
                    _createRole(roleId, name, IAccess.Type.Core);
         | 
| 95 | 
            +
                }
         | 
| 96 | 
            +
                // ADMIN_ROLE
         | 
| 97 | 
            +
                // assume gif roles can be revoked
         | 
| 98 | 
            +
                // assume admin is INSTANCE_OWNER_ROLE or INSTANCE_ROLE
         | 
| 99 | 
            +
                function createGifRole(RoleId roleId, string memory name, RoleId admin) 
         | 
| 100 | 
            +
                    external
         | 
| 101 | 
            +
                    restricted()
         | 
| 102 | 
            +
                {
         | 
| 103 | 
            +
                    _createRole(roleId, name, IAccess.Type.Gif);
         | 
| 104 | 
            +
                    setRoleAdmin(roleId, admin);
         | 
| 98 105 | 
             
                }
         | 
| 99 106 |  | 
| 100 | 
            -
                 | 
| 101 | 
            -
             | 
| 102 | 
            -
             | 
| 103 | 
            -
                     | 
| 107 | 
            +
                // INSTANCE_OWNER_ROLE
         | 
| 108 | 
            +
                function createRole(string memory roleName, string memory adminName)
         | 
| 109 | 
            +
                    external
         | 
| 110 | 
            +
                    restricted()
         | 
| 111 | 
            +
                    returns(RoleId roleId, RoleId admin)
         | 
| 112 | 
            +
                {
         | 
| 113 | 
            +
                    (roleId, admin) = _getNextCustomRoleId();
         | 
| 104 114 |  | 
| 105 | 
            -
                     | 
| 106 | 
            -
                     | 
| 107 | 
            -
                }
         | 
| 115 | 
            +
                    _createRole(roleId, roleName, IAccess.Type.Custom);
         | 
| 116 | 
            +
                    _createRole(admin, adminName, IAccess.Type.Custom);
         | 
| 108 117 |  | 
| 109 | 
            -
             | 
| 110 | 
            -
                     | 
| 118 | 
            +
                    // TODO works without this -> why?
         | 
| 119 | 
            +
                    setRoleAdmin(roleId, admin);
         | 
| 120 | 
            +
                    setRoleAdmin(admin, INSTANCE_OWNER_ROLE());
         | 
| 111 121 | 
             
                }
         | 
| 112 122 |  | 
| 113 | 
            -
                 | 
| 123 | 
            +
                // ADMIN_ROLE
         | 
| 124 | 
            +
                // assume used by instance service only during instance cloning
         | 
| 125 | 
            +
                // assume used only by this.createRole(), this.createGifRole() afterwards
         | 
| 126 | 
            +
                function setRoleAdmin(RoleId roleId, RoleId admin) 
         | 
| 127 | 
            +
                    public 
         | 
| 128 | 
            +
                    restricted()
         | 
| 129 | 
            +
                {
         | 
| 114 130 | 
             
                    if (!roleExists(roleId)) {
         | 
| 115 | 
            -
                        revert  | 
| 131 | 
            +
                        revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
         | 
| 116 132 | 
             
                    }
         | 
| 117 133 |  | 
| 118 | 
            -
                    if | 
| 119 | 
            -
                        revert  | 
| 134 | 
            +
                    if(_roleInfo[roleId].rtype == IAccess.Type.Core) {
         | 
| 135 | 
            +
                        revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Core);
         | 
| 120 136 | 
             
                    }
         | 
| 121 137 |  | 
| 122 | 
            -
                    if (! | 
| 123 | 
            -
                         | 
| 124 | 
            -
             | 
| 125 | 
            -
                        return true;
         | 
| 126 | 
            -
                    }
         | 
| 138 | 
            +
                    if (!roleExists(admin)) {
         | 
| 139 | 
            +
                        revert IAccess.ErrorIAccessRoleIdDoesNotExist(admin);
         | 
| 140 | 
            +
                    }        
         | 
| 127 141 |  | 
| 128 | 
            -
                     | 
| 142 | 
            +
                    _roleInfo[roleId].admin = admin;      
         | 
| 129 143 | 
             
                }
         | 
| 130 144 |  | 
| 131 | 
            -
                function  | 
| 145 | 
            +
                function grantRole(RoleId roleId, address member) 
         | 
| 146 | 
            +
                    public
         | 
| 147 | 
            +
                    restrictedToRoleAdmin(roleId) 
         | 
| 148 | 
            +
                    returns (bool granted) 
         | 
| 149 | 
            +
                {
         | 
| 132 150 | 
             
                    if (!roleExists(roleId)) {
         | 
| 133 | 
            -
                        revert  | 
| 134 | 
            -
                    }
         | 
| 135 | 
            -
             | 
| 136 | 
            -
                    if (EnumerableSet.contains(_roleMembers[roleId], member)) {
         | 
| 137 | 
            -
                        _accessManager.revokeRole(roleId.toInt(), member);
         | 
| 138 | 
            -
                        EnumerableSet.remove(_roleMembers[roleId], member);
         | 
| 139 | 
            -
                        return true;
         | 
| 151 | 
            +
                        revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
         | 
| 140 152 | 
             
                    }
         | 
| 141 153 |  | 
| 142 | 
            -
                     | 
| 154 | 
            +
                    granted = EnumerableSet.add(_roleMembers[roleId], member);
         | 
| 155 | 
            +
                    if(granted) {
         | 
| 156 | 
            +
                        _accessManager.grantRole(roleId.toInt(), member, EXECUTION_DELAY);
         | 
| 157 | 
            +
                    }    
         | 
| 143 158 | 
             
                }
         | 
| 144 159 |  | 
| 145 | 
            -
                 | 
| 146 | 
            -
             | 
| 147 | 
            -
             | 
| 148 | 
            -
                     | 
| 160 | 
            +
                function revokeRole(RoleId roleId, address member)
         | 
| 161 | 
            +
                    external 
         | 
| 162 | 
            +
                    restrictedToRoleAdmin(roleId) 
         | 
| 163 | 
            +
                    returns (bool) 
         | 
| 164 | 
            +
                {
         | 
| 165 | 
            +
                    return _revokeRole(roleId, member);
         | 
| 166 | 
            +
                }
         | 
| 149 167 |  | 
| 168 | 
            +
                // INSTANCE_OWNER_ROLE
         | 
| 169 | 
            +
                // IMPORTANT: unbounded function, revoke all or revert
         | 
| 170 | 
            +
                // Instance owner role decides what to do in case of custom role admin bening revoked, e.g.:
         | 
| 171 | 
            +
                // 1) revoke custom role from ALL members
         | 
| 172 | 
            +
                // 2) revoke custom role admin from ALL members
         | 
| 173 | 
            +
                // 3) 1) + 2)
         | 
| 174 | 
            +
                // 4) revoke only 1 member of custom role admin
         | 
| 175 | 
            +
                function revokeRoleAllMembers(RoleId roleId) 
         | 
| 176 | 
            +
                    external
         | 
| 177 | 
            +
                    restrictedToRoleAdmin(roleId) 
         | 
| 178 | 
            +
                    returns (bool revoked)
         | 
| 179 | 
            +
                {
         | 
| 150 180 | 
             
                    if (!roleExists(roleId)) {
         | 
| 151 | 
            -
                        revert  | 
| 181 | 
            +
                        revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
         | 
| 152 182 | 
             
                    }
         | 
| 153 183 |  | 
| 154 | 
            -
                     | 
| 155 | 
            -
             | 
| 156 | 
            -
             | 
| 184 | 
            +
                    uint memberCount = EnumerableSet.length(_roleMembers[roleId]);
         | 
| 185 | 
            +
                    for(uint memberIdx = 0; memberIdx < memberCount; memberIdx++)
         | 
| 186 | 
            +
                    {
         | 
| 187 | 
            +
                        address member = EnumerableSet.at(_roleMembers[roleId], memberIdx);
         | 
| 157 188 | 
             
                        EnumerableSet.remove(_roleMembers[roleId], member);
         | 
| 158 | 
            -
                         | 
| 189 | 
            +
                        _accessManager.revokeRole(roleId.toInt(), member);
         | 
| 190 | 
            +
                    }  
         | 
| 191 | 
            +
                }
         | 
| 192 | 
            +
             | 
| 193 | 
            +
                /// @dev not restricted function by intention
         | 
| 194 | 
            +
                /// the restriction to role members is already enforced by the call to the access manager
         | 
| 195 | 
            +
                function renounceRole(RoleId roleId) 
         | 
| 196 | 
            +
                    external 
         | 
| 197 | 
            +
                    returns (bool) 
         | 
| 198 | 
            +
                {
         | 
| 199 | 
            +
                    IAccess.Type rtype = _roleInfo[roleId].rtype;
         | 
| 200 | 
            +
                    if(rtype == IAccess.Type.Core || rtype == IAccess.Type.Gif) {
         | 
| 201 | 
            +
                        revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, rtype);
         | 
| 159 202 | 
             
                    }
         | 
| 160 203 |  | 
| 161 | 
            -
                     | 
| 204 | 
            +
                    address member = msg.sender;
         | 
| 205 | 
            +
                    // cannot use accessManger.renounce as it directly checks against msg.sender
         | 
| 206 | 
            +
                    return _revokeRole(roleId, member);
         | 
| 162 207 | 
             
                }
         | 
| 163 208 |  | 
| 164 | 
            -
                function  | 
| 165 | 
            -
                    return  | 
| 209 | 
            +
                function roleExists(RoleId roleId) public view returns (bool exists) {
         | 
| 210 | 
            +
                    return _roleInfo[roleId].createdAt.gtz();
         | 
| 211 | 
            +
                }
         | 
| 212 | 
            +
                // TODO returns ADMIN_ROLE id for non existent roleId
         | 
| 213 | 
            +
                function getRoleAdmin(RoleId roleId) public view returns(RoleId admin) {
         | 
| 214 | 
            +
                    return _roleInfo[roleId].admin;
         | 
| 215 | 
            +
                }
         | 
| 216 | 
            +
             | 
| 217 | 
            +
                function getRoleInfo(RoleId roleId) external view returns (IAccess.RoleInfo memory info) {
         | 
| 218 | 
            +
                    return _roleInfo[roleId];
         | 
| 219 | 
            +
                }
         | 
| 220 | 
            +
             | 
| 221 | 
            +
                function roleMembers(RoleId roleId) public view returns (uint256 numberOfMembers) {
         | 
| 222 | 
            +
                    return EnumerableSet.length(_roleMembers[roleId]);
         | 
| 166 223 | 
             
                }
         | 
| 167 224 |  | 
| 168 225 | 
             
                function getRoleId(uint256 idx) external view returns (RoleId roleId) {
         | 
| 169 | 
            -
                    return  | 
| 226 | 
            +
                    return _roleIds[idx];
         | 
| 170 227 | 
             
                }
         | 
| 171 228 |  | 
| 229 | 
            +
                // TODO now: for non existent name returns ADMIN_ROLE id
         | 
| 172 230 | 
             
                function getRoleIdForName(string memory name) external view returns (RoleId roleId) {
         | 
| 173 | 
            -
                    return  | 
| 231 | 
            +
                    return _roleIdForName[ShortStrings.toShortString(name)];
         | 
| 174 232 | 
             
                }
         | 
| 175 233 |  | 
| 176 | 
            -
                function  | 
| 177 | 
            -
                    return  | 
| 234 | 
            +
                function roleMember(RoleId roleId, uint256 idx) external view returns (address member) {
         | 
| 235 | 
            +
                    return EnumerableSet.at(_roleMembers[roleId], idx);
         | 
| 178 236 | 
             
                }
         | 
| 179 237 |  | 
| 180 238 | 
             
                function hasRole(RoleId roleId, address account) external view returns (bool accountHasRole) {
         | 
| 181 239 | 
             
                    (accountHasRole, ) = _accessManager.hasRole(roleId.toInt(), account);
         | 
| 182 240 | 
             
                }
         | 
| 183 241 |  | 
| 184 | 
            -
                function  | 
| 185 | 
            -
                    return  | 
| 242 | 
            +
                function roles() external view returns (uint256 numberOfRoles) {
         | 
| 243 | 
            +
                    return _roleIds.length;
         | 
| 186 244 | 
             
                }
         | 
| 187 245 |  | 
| 188 | 
            -
                 | 
| 189 | 
            -
             | 
| 246 | 
            +
                //--- Target ------------------------------------------------------//
         | 
| 247 | 
            +
                // ADMIN_ROLE
         | 
| 248 | 
            +
                // assume some core targets are registred (instance) while others are not (instance accesss manager, instance reader, bundle manager)
         | 
| 249 | 
            +
                function createCoreTarget(address target, string memory name) external restricted() {
         | 
| 250 | 
            +
                    _createTarget(target, name, IAccess.Type.Core);
         | 
| 190 251 | 
             
                }
         | 
| 252 | 
            +
                // INSTANCE_SERVICE_ROLE
         | 
| 253 | 
            +
                // assume gif target is registered and belongs to the same instance as instance access manager
         | 
| 254 | 
            +
                function createGifTarget(address target, string memory name) external restricted() 
         | 
| 255 | 
            +
                {
         | 
| 256 | 
            +
                    if(!_registry.isRegistered(target)) {
         | 
| 257 | 
            +
                        revert IAccess.ErrorIAccessTargetNotRegistered(target);
         | 
| 258 | 
            +
                    }
         | 
| 191 259 |  | 
| 192 | 
            -
             | 
| 193 | 
            -
                 | 
| 194 | 
            -
             | 
| 260 | 
            +
                    _createTarget(target, name, IAccess.Type.Gif);
         | 
| 261 | 
            +
                }
         | 
| 262 | 
            +
                // INSTANCE_OWNER_ROLE
         | 
| 263 | 
            +
                // assume custom target.authority() is constant -> target MUST not be used with different instance access manager
         | 
| 264 | 
            +
                // assume custom target can not be registered as component -> each service which is doing component registration MUST register a gif target
         | 
| 265 | 
            +
                // assume custom target can not be registered as instance or service -> why?
         | 
| 266 | 
            +
                // TODO check target associated with instance owner or instance or instance components or components helpers
         | 
| 267 | 
            +
                function createTarget(address target, string memory name) external restricted() 
         | 
| 268 | 
            +
                {
         | 
| 269 | 
            +
                    _createTarget(target, name, IAccess.Type.Custom);
         | 
| 195 270 | 
             
                }
         | 
| 196 271 |  | 
| 197 | 
            -
                 | 
| 198 | 
            -
             | 
| 199 | 
            -
             | 
| 272 | 
            +
                // INSTANCE_SERVICE_ROLE
         | 
| 273 | 
            +
                // IMPORTANT: instance access manager MUST be of Core type -> otherwise will be locked forever
         | 
| 274 | 
            +
                function setTargetLocked(address target, bool locked) 
         | 
| 275 | 
            +
                    external 
         | 
| 276 | 
            +
                    restricted() 
         | 
| 277 | 
            +
                {
         | 
| 278 | 
            +
                    IAccess.Type targetType = _targetInfo[target].ttype;
         | 
| 279 | 
            +
                    if(target == address(0) || targetType == IAccess.Type.NotInitialized) {
         | 
| 280 | 
            +
                        revert IAccess.ErrorIAccessTargetDoesNotExist(target);
         | 
| 281 | 
            +
                    }
         | 
| 282 | 
            +
             | 
| 283 | 
            +
                    if(targetType == IAccess.Type.Core) {
         | 
| 284 | 
            +
                        revert IAccess.ErrorIAccessTargetTypeInvalid(target, targetType);
         | 
| 200 285 | 
             
                    }
         | 
| 201 286 |  | 
| 202 | 
            -
                     | 
| 287 | 
            +
                    // TODO isLocked is redundant but makes getTargetInfo() faster
         | 
| 288 | 
            +
                    _targetInfo[target].isLocked = locked;
         | 
| 203 289 | 
             
                    _accessManager.setTargetClosed(target, locked);
         | 
| 204 290 | 
             
                }
         | 
| 205 291 |  | 
| 206 | 
            -
                 | 
| 207 | 
            -
             | 
| 292 | 
            +
                // allowed combinations of roles and targets:
         | 
| 293 | 
            +
                //1) set core role for core target 
         | 
| 294 | 
            +
                //2) set gif role for gif target  
         | 
| 295 | 
            +
                //3) set custom role for gif target
         | 
| 296 | 
            +
                //4) set custom role for custom target
         | 
| 297 | 
            +
             | 
| 298 | 
            +
                // ADMIN_ROLE if used only during initialization, works with:
         | 
| 299 | 
            +
                //      any roles for any targets
         | 
| 300 | 
            +
                // INSTANCE_SERVICE_ROLE if used not only during initilization, works with:
         | 
| 301 | 
            +
                //      core roles for core targets
         | 
| 302 | 
            +
                //      gif roles for gif targets
         | 
| 303 | 
            +
                function setCoreTargetFunctionRole(
         | 
| 304 | 
            +
                    string memory targetName,
         | 
| 305 | 
            +
                    bytes4[] calldata selectors,
         | 
| 306 | 
            +
                    RoleId roleId
         | 
| 307 | 
            +
                ) 
         | 
| 308 | 
            +
                    public 
         | 
| 309 | 
            +
                    virtual 
         | 
| 310 | 
            +
                    restricted()
         | 
| 311 | 
            +
                {
         | 
| 312 | 
            +
                    ShortString nameShort = ShortStrings.toShortString(targetName);
         | 
| 313 | 
            +
                    address target = _targetAddressForName[nameShort];
         | 
| 314 | 
            +
             | 
| 315 | 
            +
                    // not custom target
         | 
| 316 | 
            +
                    if(_targetInfo[target].ttype == IAccess.Type.Custom) {
         | 
| 317 | 
            +
                        revert IAccess.ErrorIAccessTargetTypeInvalid(target, IAccess.Type.Custom);
         | 
| 318 | 
            +
                    }
         | 
| 319 | 
            +
             | 
| 320 | 
            +
                    // not custom role
         | 
| 321 | 
            +
                    if(_roleInfo[roleId].rtype == IAccess.Type.Custom) {
         | 
| 322 | 
            +
                        revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Custom);
         | 
| 323 | 
            +
                    }
         | 
| 324 | 
            +
             | 
| 325 | 
            +
                    _setTargetFunctionRole(target, nameShort, selectors, roleId);
         | 
| 208 326 | 
             
                }
         | 
| 209 327 |  | 
| 210 | 
            -
                 | 
| 328 | 
            +
                // INSTANCE_OWNER_ROLE
         | 
| 329 | 
            +
                // gif role for gif target
         | 
| 330 | 
            +
                // gif role for custom target
         | 
| 331 | 
            +
                // custom role for gif target
         | 
| 332 | 
            +
                // custom role for custom target
         | 
| 333 | 
            +
                // TODO instance owner can mess with gif target (component) -> e.g. set custom role for function intendent to work with gif role
         | 
| 334 | 
            +
                function setTargetFunctionRole(
         | 
| 335 | 
            +
                    string memory targetName,
         | 
| 336 | 
            +
                    bytes4[] calldata selectors,
         | 
| 337 | 
            +
                    RoleId roleId
         | 
| 338 | 
            +
                ) 
         | 
| 339 | 
            +
                    public 
         | 
| 340 | 
            +
                    virtual 
         | 
| 341 | 
            +
                    restricted() 
         | 
| 342 | 
            +
                {
         | 
| 343 | 
            +
                    ShortString nameShort = ShortStrings.toShortString(targetName);
         | 
| 344 | 
            +
                    address target = _targetAddressForName[nameShort];
         | 
| 345 | 
            +
             | 
| 346 | 
            +
                    // not core target
         | 
| 347 | 
            +
                    if(_targetInfo[target].ttype == IAccess.Type.Core) {
         | 
| 348 | 
            +
                        revert IAccess.ErrorIAccessTargetTypeInvalid(target, IAccess.Type.Core);
         | 
| 349 | 
            +
                    }
         | 
| 211 350 |  | 
| 212 | 
            -
             | 
| 213 | 
            -
                    if  | 
| 214 | 
            -
                         | 
| 351 | 
            +
                    // not core role
         | 
| 352 | 
            +
                    if(_roleInfo[roleId].rtype == IAccess.Type.Core) {
         | 
| 353 | 
            +
                        revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Core);
         | 
| 215 354 | 
             
                    }
         | 
| 216 355 |  | 
| 217 | 
            -
                     | 
| 218 | 
            -
             | 
| 219 | 
            -
             | 
| 220 | 
            -
             | 
| 221 | 
            -
             | 
| 222 | 
            -
             | 
| 356 | 
            +
                    _setTargetFunctionRole(target, nameShort, selectors, roleId);
         | 
| 357 | 
            +
                }
         | 
| 358 | 
            +
             | 
| 359 | 
            +
                function getTargetAddress(string memory targetName) public view returns(address targetAddress) {
         | 
| 360 | 
            +
                    ShortString nameShort = ShortStrings.toShortString(targetName);
         | 
| 361 | 
            +
                    return _targetAddressForName[nameShort];
         | 
| 362 | 
            +
                }
         | 
| 363 | 
            +
             | 
| 364 | 
            +
                function isTargetLocked(address target) public view returns (bool locked) {
         | 
| 365 | 
            +
                    return _accessManager.isTargetClosed(target);
         | 
| 366 | 
            +
                }
         | 
| 223 367 |  | 
| 224 | 
            -
             | 
| 225 | 
            -
                     | 
| 226 | 
            -
             | 
| 368 | 
            +
                function targetExists(address target) public view returns (bool exists) {
         | 
| 369 | 
            +
                    return _targetInfo[target].createdAt.gtz();
         | 
| 370 | 
            +
                }
         | 
| 371 | 
            +
             | 
| 372 | 
            +
                function getTargetInfo(address target) public view returns (IAccess.TargetInfo memory) {
         | 
| 373 | 
            +
                    return _targetInfo[target];
         | 
| 227 374 | 
             
                }
         | 
| 228 375 |  | 
| 229 | 
            -
                 | 
| 230 | 
            -
             | 
| 231 | 
            -
                    string memory name, 
         | 
| 232 | 
            -
                    bool isCustom
         | 
| 233 | 
            -
                )
         | 
| 376 | 
            +
                //--- Role internal view/pure functions --------------------------------------//
         | 
| 377 | 
            +
                function _createRole(RoleId roleId, string memory roleName, IAccess.Type rtype) 
         | 
| 234 378 | 
             
                    internal
         | 
| 235 | 
            -
                    view 
         | 
| 236 | 
            -
                    returns (RoleInfo memory existingRole)
         | 
| 237 379 | 
             
                {
         | 
| 238 | 
            -
                     | 
| 239 | 
            -
                     | 
| 240 | 
            -
             | 
| 241 | 
            -
             | 
| 380 | 
            +
                    ShortString name = ShortStrings.toShortString(roleName);
         | 
| 381 | 
            +
                    _validateRole(roleId, name, rtype);
         | 
| 382 | 
            +
             | 
| 383 | 
            +
                    if(roleExists(roleId)) {
         | 
| 384 | 
            +
                        revert IAccess.ErrorIAccessRoleIdExists(roleId);
         | 
| 385 | 
            +
                    }
         | 
| 386 | 
            +
             | 
| 387 | 
            +
                    if (_roleIdForName[name].gtz()) {
         | 
| 388 | 
            +
                        revert IAccess.ErrorIAccessRoleNameExists(roleId, _roleIdForName[name], name);
         | 
| 242 389 | 
             
                    }
         | 
| 243 390 |  | 
| 244 | 
            -
                     | 
| 245 | 
            -
             | 
| 391 | 
            +
                    _roleInfo[roleId] = IAccess.RoleInfo(
         | 
| 392 | 
            +
                        name,
         | 
| 393 | 
            +
                        rtype,
         | 
| 394 | 
            +
                        ADMIN_ROLE(),
         | 
| 395 | 
            +
                        TimestampLib.blockTimestamp(),
         | 
| 396 | 
            +
                        TimestampLib.blockTimestamp()
         | 
| 397 | 
            +
                    );
         | 
| 398 | 
            +
                    _roleIdForName[name] = roleId;
         | 
| 399 | 
            +
                    _roleIds.push(roleId);
         | 
| 400 | 
            +
             | 
| 401 | 
            +
                    emit LogRoleCreation(roleId, name, rtype);
         | 
| 402 | 
            +
                }
         | 
| 246 403 |  | 
| 247 | 
            -
             | 
| 248 | 
            -
             | 
| 404 | 
            +
                function _validateRole(RoleId roleId, ShortString name, IAccess.Type rtype)
         | 
| 405 | 
            +
                    internal
         | 
| 406 | 
            +
                    view
         | 
| 407 | 
            +
                {
         | 
| 408 | 
            +
                    uint roleIdInt = roleId.toInt();
         | 
| 409 | 
            +
                    if(rtype == IAccess.Type.Custom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
         | 
| 410 | 
            +
                        revert IAccess.ErrorIAccessRoleIdTooSmall(roleId);
         | 
| 249 411 | 
             
                    }
         | 
| 250 412 |  | 
| 251 | 
            -
                    if | 
| 252 | 
            -
                         | 
| 253 | 
            -
             | 
| 254 | 
            -
                         | 
| 413 | 
            +
                    if(
         | 
| 414 | 
            +
                        rtype != IAccess.Type.Custom && 
         | 
| 415 | 
            +
                        roleIdInt >= CUSTOM_ROLE_ID_MIN && 
         | 
| 416 | 
            +
                        roleIdInt != PUBLIC_ROLE().toInt()) 
         | 
| 417 | 
            +
                    {
         | 
| 418 | 
            +
                        revert IAccess.ErrorIAccessRoleIdTooBig(roleId);
         | 
| 255 419 | 
             
                    }
         | 
| 256 420 |  | 
| 257 421 | 
             
                    // role name checks
         | 
| 258 | 
            -
                     | 
| 259 | 
            -
             | 
| 260 | 
            -
                        revert ErrorRoleNameEmpty(roleId);
         | 
| 422 | 
            +
                    if (ShortStrings.byteLength(name) == 0) {
         | 
| 423 | 
            +
                        revert IAccess.ErrorIAccessRoleNameEmpty(roleId);
         | 
| 261 424 | 
             
                    }
         | 
| 425 | 
            +
                }
         | 
| 262 426 |  | 
| 263 | 
            -
             | 
| 264 | 
            -
             | 
| 427 | 
            +
                function _revokeRole(RoleId roleId, address member)
         | 
| 428 | 
            +
                    internal
         | 
| 429 | 
            +
                    returns(bool revoked)
         | 
| 430 | 
            +
                {
         | 
| 431 | 
            +
                    if (!roleExists(roleId)) {
         | 
| 432 | 
            +
                        revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
         | 
| 433 | 
            +
                    }
         | 
| 434 | 
            +
             | 
| 435 | 
            +
                    revoked = EnumerableSet.remove(_roleMembers[roleId], member);
         | 
| 436 | 
            +
                    if(revoked) {
         | 
| 437 | 
            +
                        _accessManager.revokeRole(roleId.toInt(), member);
         | 
| 265 438 | 
             
                    }
         | 
| 266 439 | 
             
                }
         | 
| 267 440 |  | 
| 268 | 
            -
                function  | 
| 269 | 
            -
                     | 
| 270 | 
            -
             | 
| 441 | 
            +
                function _getNextCustomRoleId() 
         | 
| 442 | 
            +
                    internal 
         | 
| 443 | 
            +
                    returns(RoleId roleId, RoleId admin) 
         | 
| 444 | 
            +
                {
         | 
| 445 | 
            +
                    uint64 roleIdInt = _idNext;
         | 
| 446 | 
            +
                    uint64 adminInt = roleIdInt + 1;
         | 
| 447 | 
            +
             | 
| 448 | 
            +
                    _idNext = roleIdInt + 2;
         | 
| 449 | 
            +
             | 
| 450 | 
            +
                    roleId = RoleIdLib.toRoleId(roleIdInt);
         | 
| 451 | 
            +
                    admin = RoleIdLib.toRoleId(adminInt);
         | 
| 452 | 
            +
                }
         | 
| 453 | 
            +
             | 
| 454 | 
            +
                //--- Target internal view/pure functions --------------------------------------//
         | 
| 455 | 
            +
                function _createTarget(address target, string memory targetName, IAccess.Type ttype) 
         | 
| 456 | 
            +
                    internal 
         | 
| 457 | 
            +
                {
         | 
| 458 | 
            +
                    ShortString name = ShortStrings.toShortString(targetName);
         | 
| 459 | 
            +
                    _validateTarget(target, name, ttype);
         | 
| 460 | 
            +
             | 
| 461 | 
            +
                    if (_targetInfo[target].createdAt.gtz()) {
         | 
| 462 | 
            +
                        revert IAccess.ErrorIAccessTargetExists(target, _targetInfo[target].name);
         | 
| 271 463 | 
             
                    }
         | 
| 272 464 |  | 
| 273 | 
            -
                     | 
| 274 | 
            -
                         | 
| 275 | 
            -
             | 
| 276 | 
            -
             | 
| 277 | 
            -
             | 
| 278 | 
            -
             | 
| 465 | 
            +
                    if (_targetAddressForName[name] != address(0)) {
         | 
| 466 | 
            +
                        revert IAccess.ErrorIAccessTargetNameExists(
         | 
| 467 | 
            +
                            target, 
         | 
| 468 | 
            +
                            _targetAddressForName[name], 
         | 
| 469 | 
            +
                            name);
         | 
| 470 | 
            +
                    }
         | 
| 279 471 |  | 
| 280 | 
            -
                     | 
| 281 | 
            -
                     | 
| 472 | 
            +
                    bool isLocked = _accessManager.isTargetClosed(target);// sync with state in access manager
         | 
| 473 | 
            +
                    _targetInfo[target] = IAccess.TargetInfo(
         | 
| 474 | 
            +
                        name,
         | 
| 475 | 
            +
                        ttype,
         | 
| 476 | 
            +
                        isLocked,
         | 
| 477 | 
            +
                        TimestampLib.blockTimestamp(),
         | 
| 478 | 
            +
                        TimestampLib.blockTimestamp()
         | 
| 479 | 
            +
                    );
         | 
| 480 | 
            +
                    _targetAddressForName[name] = target;
         | 
| 282 481 | 
             
                    _targets.push(target);
         | 
| 482 | 
            +
             | 
| 483 | 
            +
                    emit LogTargetCreation(target, name, ttype, isLocked); 
         | 
| 283 484 | 
             
                }
         | 
| 284 485 |  | 
| 285 | 
            -
                function  | 
| 486 | 
            +
                function _validateTarget(address target, ShortString name, IAccess.Type ttype) 
         | 
| 487 | 
            +
                    internal 
         | 
| 488 | 
            +
                    view 
         | 
| 489 | 
            +
                {
         | 
| 490 | 
            +
                    address targetAuthority = AccessManagedUpgradeable(target).authority();
         | 
| 491 | 
            +
                    if(targetAuthority != authority()) {
         | 
| 492 | 
            +
                        revert IAccess.ErrorIAccessTargetAuthorityInvalid(target, targetAuthority);
         | 
| 493 | 
            +
                    }
         | 
| 494 | 
            +
             | 
| 495 | 
            +
                    if (ShortStrings.byteLength(name) == 0) {
         | 
| 496 | 
            +
                        revert IAccess.ErrorIAccessTargetNameEmpty(target);
         | 
| 497 | 
            +
                    }
         | 
| 498 | 
            +
                }
         | 
| 499 | 
            +
             | 
| 500 | 
            +
                function _setTargetFunctionRole(
         | 
| 501 | 
            +
                    address target,
         | 
| 502 | 
            +
                    ShortString name,
         | 
| 503 | 
            +
                    bytes4[] calldata selectors,
         | 
| 504 | 
            +
                    RoleId roleId
         | 
| 505 | 
            +
                ) 
         | 
| 506 | 
            +
                    internal
         | 
| 507 | 
            +
                {
         | 
| 508 | 
            +
                    if (target == address(0)) {
         | 
| 509 | 
            +
                        revert IAccess.ErrorIAccessTargetDoesNotExist(target);
         | 
| 510 | 
            +
                    }
         | 
| 511 | 
            +
             | 
| 512 | 
            +
                    if (!roleExists(roleId)) {
         | 
| 513 | 
            +
                        revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
         | 
| 514 | 
            +
                    }
         | 
| 515 | 
            +
             | 
| 516 | 
            +
                    uint64 roleIdInt = RoleId.unwrap(roleId);
         | 
| 517 | 
            +
                    _accessManager.setTargetFunctionRole(target, selectors, roleIdInt);
         | 
| 518 | 
            +
                }
         | 
| 286 519 |  | 
| 520 | 
            +
                function canCall(
         | 
| 521 | 
            +
                    address caller,
         | 
| 522 | 
            +
                    address target,
         | 
| 523 | 
            +
                    bytes4 selector
         | 
| 524 | 
            +
                ) public view virtual returns (bool immediate, uint32 delay) {
         | 
| 525 | 
            +
                    return _accessManager.canCall(caller, target, selector);
         | 
| 287 526 | 
             
                }
         | 
| 288 527 | 
             
            }
         |