@etherisc/gif-next 0.0.2-fbe8e04-715 → 0.0.2-fca9315-260
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/artifacts/contracts/components/Component.sol/Component.dbg.json +4 -0
- package/artifacts/contracts/components/{IBaseComponent.sol/IBaseComponent.json → Component.sol/Component.json} +300 -12
- package/artifacts/contracts/components/Distribution.sol/Distribution.dbg.json +1 -1
- package/artifacts/contracts/components/Distribution.sol/Distribution.json +199 -94
- package/artifacts/contracts/components/IComponent.sol/IComponent.dbg.json +4 -0
- package/artifacts/contracts/components/{BaseComponent.sol/BaseComponent.json → IComponent.sol/IComponent.json} +86 -84
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IDistributionComponent.sol/IDistributionComponent.json +496 -0
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IPoolComponent.sol/IPoolComponent.json +522 -28
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.dbg.json +1 -1
- package/artifacts/contracts/components/IProductComponent.sol/IProductComponent.json +596 -5
- package/artifacts/contracts/components/Pool.sol/Pool.dbg.json +1 -1
- package/artifacts/contracts/components/Pool.sol/Pool.json +190 -159
- package/artifacts/contracts/components/Product.sol/Product.dbg.json +1 -1
- package/artifacts/contracts/components/Product.sol/Product.json +204 -110
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Cloner.dbg.json +1 -1
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock1.dbg.json +1 -1
- package/artifacts/contracts/experiment/cloning/Cloner.sol/Mock2.dbg.json +1 -1
- package/artifacts/contracts/experiment/errors/Require.sol/Require.dbg.json +1 -1
- package/artifacts/contracts/experiment/errors/Revert.sol/Revert.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/A.sol/A.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/A.sol/AShared.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/B.sol/B.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/C.sol/C.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IA.sol/IA.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IA.sol/ISharedA.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IB.sol/IB.dbg.json +1 -1
- package/artifacts/contracts/experiment/inheritance/IC.sol/IC.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/Dummy.sol/LifeCycleModule.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISM.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/ISM.sol/ISMEE.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/SM.sol/SM.dbg.json +1 -1
- package/artifacts/contracts/experiment/statemachine/SimpleStateMachine.sol/SimpleStateMachine.dbg.json +1 -1
- package/artifacts/contracts/experiment/types/TypeA.sol/TypeALib.dbg.json +1 -1
- package/artifacts/contracts/experiment/types/TypeB.sol/TypeBLib.dbg.json +1 -1
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +1 -1
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +38 -62
- package/artifacts/contracts/instance/Cloneable.sol/Cloneable.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.json +269 -13
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +120 -19
- package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
- package/artifacts/contracts/instance/Instance.sol/Instance.json +105 -615
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.json +208 -114
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +41 -82
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +250 -265
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +41 -120
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.dbg.json +1 -1
- package/artifacts/contracts/instance/ObjectManager.sol/ObjectManager.json +8 -32
- package/artifacts/contracts/instance/base/ComponentService.sol/ComponentService.dbg.json +4 -0
- package/artifacts/contracts/instance/base/{ComponentServiceBase.sol/ComponentServiceBase.json → ComponentService.sol/ComponentService.json} +124 -42
- package/artifacts/contracts/instance/base/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/ILifecycle.sol/ILifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/base/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/Lifecycle.sol/Lifecycle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.json +59 -16
- package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ISetup.sol/ISetup.dbg.json +1 -1
- package/artifacts/contracts/instance/module/ITreasury.sol/ITreasury.dbg.json +1 -1
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/BundleService.sol/BundleService.json +245 -66
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/BundleServiceManager.sol/BundleServiceManager.json +35 -26
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionService.sol/DistributionService.json +153 -65
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/DistributionServiceManager.sol/DistributionServiceManager.json +32 -23
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IBundleService.sol/IBundleService.json +64 -18
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IDistributionService.sol/IDistributionService.json +13 -18
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IPolicyService.sol/IPolicyService.json +120 -18
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IPoolService.sol/IPoolService.json +13 -18
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/IProductService.sol/IProductService.json +13 -18
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PolicyService.sol/PolicyService.json +334 -91
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PolicyServiceManager.sol/PolicyServiceManager.json +66 -25
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PoolService.sol/PoolService.json +153 -65
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/PoolServiceManager.sol/PoolServiceManager.json +32 -23
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ProductService.sol/ProductService.json +159 -71
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/service/ProductServiceManager.sol/ProductServiceManager.json +32 -15
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.json +2 -2
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +212 -133
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +127 -93
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.json +224 -234
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.dbg.json +4 -0
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.json +285 -0
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +68 -161
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +51 -104
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +4 -0
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +547 -0
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +13 -29
- package/artifacts/contracts/shared/ContractDeployerLib.sol/ContractDeployerLib.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.json +0 -5
- package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
- package/artifacts/contracts/shared/IService.sol/IService.json +13 -18
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +19 -6
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +1 -1
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +19 -6
- package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
- package/artifacts/contracts/shared/Registerable.sol/Registerable.json +19 -11
- package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
- package/artifacts/contracts/shared/Service.sol/Service.json +26 -18
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +1 -1
- package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +1 -1
- package/artifacts/contracts/test/TestFee.sol/TestFee.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.dbg.json +1 -1
- package/artifacts/contracts/test/TestRegisterable.sol/TestRegisterable.json +19 -11
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.dbg.json +1 -1
- package/artifacts/contracts/test/TestRoleId.sol/TestRoleId.json +2 -2
- package/artifacts/contracts/test/TestService.sol/TestService.dbg.json +1 -1
- package/artifacts/contracts/test/TestService.sol/TestService.json +44 -36
- package/artifacts/contracts/test/TestToken.sol/TestUsdc.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersion.sol/TestVersion.dbg.json +1 -1
- package/artifacts/contracts/test/TestVersionable.sol/TestVersionable.dbg.json +1 -1
- package/artifacts/contracts/test/Usdc.sol/USDC.dbg.json +1 -1
- package/artifacts/contracts/types/AddressSet.sol/LibAddressSet.dbg.json +1 -1
- package/artifacts/contracts/types/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
- package/artifacts/contracts/types/ChainId.sol/ChainIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Fee.sol/FeeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Key32.sol/Key32Lib.dbg.json +1 -1
- package/artifacts/contracts/types/NftId.sol/NftIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
- package/artifacts/contracts/types/NumberId.sol/NumberIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
- package/artifacts/contracts/types/Referral.sol/ReferralLib.dbg.json +1 -1
- package/artifacts/contracts/types/RiskId.sol/RiskIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/RoleId.sol/RoleIdLib.json +2 -2
- package/artifacts/contracts/types/StateId.sol/StateIdLib.dbg.json +1 -1
- package/artifacts/contracts/types/Timestamp.sol/TimestampLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/MathLib.dbg.json +1 -1
- package/artifacts/contracts/types/UFixed.sol/UFixedLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionLib.dbg.json +1 -1
- package/artifacts/contracts/types/Version.sol/VersionPartLib.dbg.json +1 -1
- package/contracts/components/Component.sol +216 -0
- package/contracts/components/Distribution.sol +38 -51
- package/contracts/components/IComponent.sol +43 -0
- package/contracts/components/IDistributionComponent.sol +5 -2
- package/contracts/components/IPoolComponent.sol +6 -12
- package/contracts/components/IProductComponent.sol +7 -3
- package/contracts/components/Pool.sol +42 -86
- package/contracts/components/Product.sol +58 -85
- package/contracts/instance/BundleManager.sol +7 -11
- package/contracts/instance/IInstance.sol +21 -9
- package/contracts/instance/IInstanceService.sol +12 -3
- package/contracts/instance/Instance.sol +37 -233
- package/contracts/instance/InstanceAccessManager.sol +88 -78
- package/contracts/instance/InstanceReader.sol +3 -25
- package/contracts/instance/InstanceService.sol +291 -120
- package/contracts/instance/InstanceServiceManager.sol +5 -8
- package/contracts/instance/ObjectManager.sol +7 -24
- package/contracts/instance/base/ComponentService.sol +134 -0
- package/contracts/instance/module/IAccess.sol +27 -17
- package/contracts/instance/service/BundleService.sol +41 -8
- package/contracts/instance/service/BundleServiceManager.sol +5 -8
- package/contracts/instance/service/DistributionService.sol +31 -43
- package/contracts/instance/service/DistributionServiceManager.sol +6 -9
- package/contracts/instance/service/IBundleService.sol +5 -6
- package/contracts/instance/service/IPolicyService.sol +7 -0
- package/contracts/instance/service/PolicyService.sol +67 -37
- package/contracts/instance/service/PoolService.sol +25 -39
- package/contracts/instance/service/PoolServiceManager.sol +5 -8
- package/contracts/instance/service/ProductService.sol +99 -38
- package/contracts/registry/ChainNft.sol +1 -1
- package/contracts/registry/IRegistry.sol +34 -17
- package/contracts/registry/IRegistryService.sol +28 -13
- package/contracts/registry/Registry.sol +214 -210
- package/contracts/registry/RegistryAccessManager.sol +216 -0
- package/contracts/registry/RegistryService.sol +61 -157
- package/contracts/registry/RegistryServiceManager.sol +18 -36
- package/contracts/registry/ReleaseManager.sol +332 -0
- package/contracts/registry/TokenRegistry.sol +8 -7
- package/contracts/shared/IRegisterable.sol +1 -3
- package/contracts/shared/IService.sol +2 -1
- package/contracts/shared/NftOwnable.sol +5 -0
- package/contracts/shared/ProxyManager.sol +1 -1
- package/contracts/shared/Registerable.sol +10 -14
- package/contracts/shared/Service.sol +13 -8
- package/contracts/test/TestService.sol +3 -2
- package/contracts/types/RoleId.sol +10 -12
- package/package.json +1 -1
- package/artifacts/contracts/components/BaseComponent.sol/BaseComponent.dbg.json +0 -4
- package/artifacts/contracts/components/IBaseComponent.sol/IBaseComponent.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.dbg.json +0 -4
- package/artifacts/contracts/instance/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.json +0 -1206
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.dbg.json +0 -4
- package/artifacts/contracts/instance/IAccessManagerSimple.sol/IAccessManagerSimple.json +0 -1082
- package/artifacts/contracts/instance/IInstanceBase.sol/IInstanceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/IInstanceBase.sol/IInstanceBase.json +0 -448
- package/artifacts/contracts/instance/InstanceBase.sol/InstanceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/InstanceBase.sol/InstanceBase.json +0 -763
- package/artifacts/contracts/instance/base/ComponentServiceBase.sol/ComponentServiceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.dbg.json +0 -4
- package/artifacts/contracts/instance/base/IInstanceBase.sol/IInstanceBase.json +0 -113
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/instance/service/ComponentOwnerService.sol/ComponentOwnerService.json +0 -827
- package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.dbg.json +0 -4
- package/artifacts/contracts/instance/service/IComponentOwnerService.sol/IComponentOwnerService.json +0 -466
- package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.dbg.json +0 -4
- package/artifacts/contracts/shared/RegisterableUpgradable.sol/RegisterableUpgradable.json +0 -442
- package/contracts/components/BaseComponent.sol +0 -132
- package/contracts/components/IBaseComponent.sol +0 -31
- package/contracts/instance/AccessManagerUpgradeableInitializeable.sol +0 -23
- package/contracts/instance/IAccessManagerSimple.sol +0 -391
- package/contracts/instance/IInstanceBase.sol +0 -26
- package/contracts/instance/InstanceBase.sol +0 -41
- package/contracts/instance/base/ComponentServiceBase.sol +0 -72
- package/contracts/instance/base/IInstanceBase.sol +0 -23
- package/contracts/instance/service/ComponentOwnerService.sol +0 -317
- package/contracts/instance/service/IComponentOwnerService.sol +0 -20
- package/contracts/shared/RegisterableUpgradable.sol +0 -16
@@ -1,47 +1,50 @@
|
|
1
1
|
// SPDX-License-Identifier: Apache-2.0
|
2
2
|
pragma solidity ^0.8.20;
|
3
3
|
|
4
|
-
import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
|
5
|
-
import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
|
6
|
-
import {Initializable} from "@openzeppelin/contracts/proxy/utils/Initializable.sol";
|
7
4
|
import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
|
8
|
-
import {AccessManagerUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagerUpgradeable.sol";
|
9
5
|
|
10
|
-
import {IAccess} from "./module/IAccess.sol";
|
11
|
-
import {IBundle} from "./module/IBundle.sol";
|
12
|
-
import {IPolicy} from "./module/IPolicy.sol";
|
13
|
-
import {IRisk} from "./module/IRisk.sol";
|
14
|
-
import {ISetup} from "./module/ISetup.sol";
|
15
6
|
import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
|
16
|
-
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
17
|
-
import {IInstance} from "./IInstance.sol";
|
18
|
-
import {InstanceReader} from "./InstanceReader.sol";
|
19
|
-
import {BundleManager} from "./BundleManager.sol";
|
20
7
|
import {NftId} from "../types/NftId.sol";
|
21
8
|
import {NumberId} from "../types/NumberId.sol";
|
22
|
-
import {ObjectType, BUNDLE, DISTRIBUTION, INSTANCE, POLICY, POOL, ROLE, PRODUCT, TARGET} from "../types/ObjectType.sol";
|
9
|
+
import {ObjectType, BUNDLE, DISTRIBUTION, INSTANCE, POLICY, POOL, ROLE, PRODUCT, TARGET, COMPONENT} from "../types/ObjectType.sol";
|
23
10
|
import {RiskId, RiskIdLib} from "../types/RiskId.sol";
|
24
11
|
import {RoleId, RoleIdLib} from "../types/RoleId.sol";
|
25
12
|
import {StateId, ACTIVE} from "../types/StateId.sol";
|
13
|
+
import {TimestampLib} from "../types/Timestamp.sol";
|
14
|
+
import {VersionPart} from "../types/Version.sol";
|
15
|
+
|
26
16
|
import {ERC165} from "../shared/ERC165.sol";
|
27
17
|
import {Registerable} from "../shared/Registerable.sol";
|
28
|
-
|
29
|
-
import {
|
18
|
+
|
19
|
+
import {IInstance} from "./IInstance.sol";
|
20
|
+
import {InstanceReader} from "./InstanceReader.sol";
|
21
|
+
import {InstanceAccessManager} from "./InstanceAccessManager.sol";
|
22
|
+
import {BundleManager} from "./BundleManager.sol";
|
23
|
+
|
24
|
+
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
25
|
+
|
26
|
+
import {IAccess} from "./module/IAccess.sol";
|
27
|
+
import {IBundle} from "./module/IBundle.sol";
|
28
|
+
import {IPolicy} from "./module/IPolicy.sol";
|
29
|
+
import {IRisk} from "./module/IRisk.sol";
|
30
|
+
import {ISetup} from "./module/ISetup.sol";
|
31
|
+
|
30
32
|
import {IDistributionService} from "./service/IDistributionService.sol";
|
31
33
|
import {IPoolService} from "./service/IPoolService.sol";
|
32
34
|
import {IProductService} from "./service/IProductService.sol";
|
33
35
|
import {IPolicyService} from "./service/IPolicyService.sol";
|
34
36
|
import {IBundleService} from "./service/IBundleService.sol";
|
35
|
-
import {VersionPart} from "../types/Version.sol";
|
36
|
-
import {InstanceBase} from "./InstanceBase.sol";
|
37
|
+
import {VersionPart, VersionPartLib} from "../types/Version.sol";
|
37
38
|
|
38
39
|
contract Instance is
|
39
|
-
AccessManagedUpgradeable,
|
40
40
|
IInstance,
|
41
|
-
|
42
|
-
|
41
|
+
AccessManagedUpgradeable,
|
42
|
+
Registerable,
|
43
|
+
KeyValueStore
|
43
44
|
{
|
44
45
|
|
46
|
+
uint256 public constant GIF_MAJOR_VERSION = 3;
|
47
|
+
|
45
48
|
uint64 public constant ADMIN_ROLE = type(uint64).min;
|
46
49
|
uint64 public constant PUBLIC_ROLE = type(uint64).max;
|
47
50
|
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
|
@@ -50,13 +53,7 @@ contract Instance is
|
|
50
53
|
|
51
54
|
bool private _initialized;
|
52
55
|
|
53
|
-
|
54
|
-
mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
|
55
|
-
RoleId [] internal _roles;
|
56
|
-
|
57
|
-
mapping(ShortString name => address target) internal _target;
|
58
|
-
|
59
|
-
AccessManagerUpgradeable internal _accessManager;
|
56
|
+
InstanceAccessManager internal _accessManager;
|
60
57
|
InstanceReader internal _instanceReader;
|
61
58
|
BundleManager internal _bundleManager;
|
62
59
|
|
@@ -64,138 +61,11 @@ contract Instance is
|
|
64
61
|
public
|
65
62
|
initializer
|
66
63
|
{
|
67
|
-
require(!_initialized, "Contract instance has already been initialized");
|
68
|
-
|
69
64
|
__AccessManaged_init(accessManagerAddress);
|
70
|
-
|
71
|
-
_accessManager = AccessManagerUpgradeable(accessManagerAddress);
|
72
|
-
_createRole(RoleIdLib.toRoleId(ADMIN_ROLE), "AdminRole", false, false);
|
73
|
-
_createRole(RoleIdLib.toRoleId(PUBLIC_ROLE), "PublicRole", false, false);
|
74
|
-
|
65
|
+
|
75
66
|
_initializeRegisterable(registryAddress, registryNftId, INSTANCE(), false, initialOwner, "");
|
76
67
|
|
77
68
|
_registerInterface(type(IInstance).interfaceId);
|
78
|
-
_initialized = true;
|
79
|
-
}
|
80
|
-
|
81
|
-
//--- Role ------------------------------------------------------//
|
82
|
-
function createStandardRole(RoleId roleId, string memory name) external restricted() {
|
83
|
-
_createRole(roleId, name, false, true);
|
84
|
-
}
|
85
|
-
|
86
|
-
function createCustomRole(RoleId roleId, string memory name) external restricted() {
|
87
|
-
_createRole(roleId, name, true, true);
|
88
|
-
}
|
89
|
-
|
90
|
-
function updateRole(RoleId roleId, string memory name, StateId newState) external restricted() {
|
91
|
-
(bool isCustom,) = _validateRoleParameters(roleId, name, false);
|
92
|
-
IAccess.RoleInfo memory role = _toRole(roleId, name, isCustom);
|
93
|
-
update(toRoleKey32(roleId), abi.encode(role), newState);
|
94
|
-
}
|
95
|
-
|
96
|
-
function updateRoleState(RoleId roleId, StateId newState) external restricted() {
|
97
|
-
updateState(toRoleKey32(roleId), newState);
|
98
|
-
}
|
99
|
-
|
100
|
-
function grantRole(RoleId roleId, address member) external restricted() returns (bool granted) {
|
101
|
-
Key32 roleKey = toRoleKey32(roleId);
|
102
|
-
|
103
|
-
if (!exists(roleKey)) {
|
104
|
-
revert IAccess.ErrorGrantNonexstentRole(roleId);
|
105
|
-
}
|
106
|
-
|
107
|
-
if (getState(roleKey) != ACTIVE()) {
|
108
|
-
revert IAccess.ErrorRoleIdNotActive(roleId);
|
109
|
-
}
|
110
|
-
|
111
|
-
if (!EnumerableSet.contains(_roleMembers[roleId], member)) {
|
112
|
-
_accessManager.grantRole(roleId.toInt(), member, EXECUTION_DELAY);
|
113
|
-
EnumerableSet.add(_roleMembers[roleId], member);
|
114
|
-
return true;
|
115
|
-
}
|
116
|
-
|
117
|
-
return false;
|
118
|
-
}
|
119
|
-
|
120
|
-
function revokeRole(RoleId roleId, address member) external restricted() returns (bool revoked) {
|
121
|
-
Key32 roleKey = toRoleKey32(roleId);
|
122
|
-
|
123
|
-
if (!exists(roleKey)) {
|
124
|
-
revert IAccess.ErrorRevokeNonexstentRole(roleId);
|
125
|
-
}
|
126
|
-
|
127
|
-
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
128
|
-
_accessManager.revokeRole(roleId.toInt(), member);
|
129
|
-
EnumerableSet.remove(_roleMembers[roleId], member);
|
130
|
-
return true;
|
131
|
-
}
|
132
|
-
|
133
|
-
return false;
|
134
|
-
}
|
135
|
-
|
136
|
-
/// @dev not restricted function by intention
|
137
|
-
/// the restriction to role members is already enforced by the call to the access manger
|
138
|
-
function renounceRole(RoleId roleId) external returns (bool revoked) {
|
139
|
-
address member = msg.sender;
|
140
|
-
Key32 roleKey = toRoleKey32(roleId);
|
141
|
-
|
142
|
-
if (!exists(roleKey)) {
|
143
|
-
revert IAccess.ErrorRenounceNonexstentRole(roleId);
|
144
|
-
}
|
145
|
-
|
146
|
-
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
147
|
-
_accessManager.renounceRole(roleId.toInt(), member);
|
148
|
-
EnumerableSet.remove(_roleMembers[roleId], member);
|
149
|
-
return true;
|
150
|
-
}
|
151
|
-
|
152
|
-
return false;
|
153
|
-
}
|
154
|
-
|
155
|
-
function roles() external view returns (uint256 numberOfRoles) {
|
156
|
-
return _roles.length;
|
157
|
-
}
|
158
|
-
|
159
|
-
function getRoleId(uint256 idx) external view returns (RoleId roleId) {
|
160
|
-
return _roles[idx];
|
161
|
-
}
|
162
|
-
|
163
|
-
function getRole(RoleId roleId) external view returns (IAccess.RoleInfo memory role) {
|
164
|
-
return abi.decode(getData(roleId.toKey32()), (IAccess.RoleInfo));
|
165
|
-
}
|
166
|
-
|
167
|
-
function roleMembers(RoleId roleId) external view returns (uint256 numberOfMembers) {
|
168
|
-
return EnumerableSet.length(_roleMembers[roleId]);
|
169
|
-
}
|
170
|
-
|
171
|
-
function getRoleMember(RoleId roleId, uint256 idx) external view returns (address roleMember) {
|
172
|
-
return EnumerableSet.at(_roleMembers[roleId], idx);
|
173
|
-
}
|
174
|
-
|
175
|
-
function _createRole(RoleId roleId, string memory name, bool isCustom, bool validateParameters) internal {
|
176
|
-
if (validateParameters) {
|
177
|
-
_validateRoleParameters(roleId, name, isCustom);
|
178
|
-
}
|
179
|
-
|
180
|
-
IAccess.RoleInfo memory role = _toRole(roleId, name, isCustom);
|
181
|
-
_role[role.name] = roleId;
|
182
|
-
_roles.push(roleId);
|
183
|
-
|
184
|
-
create(toRoleKey32(roleId), abi.encode(role));
|
185
|
-
}
|
186
|
-
|
187
|
-
//--- Target ------------------------------------------------------//
|
188
|
-
function createTarget(address target, IAccess.TargetInfo memory targetInfo) external restricted() {
|
189
|
-
_validateTargetParameters(target, targetInfo);
|
190
|
-
create(toTargetKey32(target), abi.encode(targetInfo));
|
191
|
-
}
|
192
|
-
|
193
|
-
function setTargetClosed(address target, bool closed) external restricted() {
|
194
|
-
if (!exists(toTargetKey32(target))) {
|
195
|
-
revert IAccess.ErrorTargetDoesNotExist(target);
|
196
|
-
}
|
197
|
-
|
198
|
-
_accessManager.setTargetClosed(target, closed);
|
199
69
|
}
|
200
70
|
|
201
71
|
//--- ProductSetup ------------------------------------------------------//
|
@@ -342,71 +212,6 @@ contract Instance is
|
|
342
212
|
}
|
343
213
|
|
344
214
|
//--- internal view/pure functions --------------------------------------//
|
345
|
-
function _toRole(RoleId roleId, string memory name, bool isCustom)
|
346
|
-
internal
|
347
|
-
pure
|
348
|
-
returns (IAccess.RoleInfo memory role)
|
349
|
-
{
|
350
|
-
return IAccess.RoleInfo(
|
351
|
-
ShortStrings.toShortString(name),
|
352
|
-
isCustom);
|
353
|
-
}
|
354
|
-
|
355
|
-
function _validateRoleParameters(
|
356
|
-
RoleId roleId,
|
357
|
-
string memory name,
|
358
|
-
bool isCustom
|
359
|
-
)
|
360
|
-
internal
|
361
|
-
view
|
362
|
-
returns (
|
363
|
-
bool roleExists,
|
364
|
-
bool roleIsCustom
|
365
|
-
)
|
366
|
-
{
|
367
|
-
Key32 roleKey = toRoleKey32(roleId);
|
368
|
-
roleExists = exists(roleKey);
|
369
|
-
if (roleExists) {
|
370
|
-
roleIsCustom = abi.decode(getData(roleKey), (IAccess.RoleInfo)).isCustom;
|
371
|
-
} else {
|
372
|
-
roleIsCustom = isCustom;
|
373
|
-
}
|
374
|
-
|
375
|
-
// check role id
|
376
|
-
uint64 roleIdInt = RoleId.unwrap(roleId);
|
377
|
-
if(roleIdInt == ADMIN_ROLE || roleIdInt == PUBLIC_ROLE) {
|
378
|
-
revert IAccess.ErrorRoleIdInvalid(roleId);
|
379
|
-
}
|
380
|
-
|
381
|
-
if (roleIsCustom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
|
382
|
-
revert IAccess.ErrorRoleIdTooSmall(roleId);
|
383
|
-
} else if (roleIsCustom && roleIdInt >= CUSTOM_ROLE_ID_MIN) {
|
384
|
-
revert IAccess.ErrorRoleIdTooBig(roleId);
|
385
|
-
}
|
386
|
-
|
387
|
-
// role name checks
|
388
|
-
ShortString nameShort = ShortStrings.toShortString(name);
|
389
|
-
if (ShortStrings.byteLength(nameShort) == 0) {
|
390
|
-
revert IAccess.ErrorRoleNameEmpty(roleId);
|
391
|
-
}
|
392
|
-
|
393
|
-
if (_role[nameShort] != RoleIdLib.zero() && _role[nameShort] != roleId) {
|
394
|
-
revert IAccess.ErrorRoleNameNotUnique(_role[nameShort], nameShort);
|
395
|
-
}
|
396
|
-
}
|
397
|
-
|
398
|
-
function _validateTargetParameters(address target, IAccess.TargetInfo memory targetInfo) internal view {
|
399
|
-
|
400
|
-
}
|
401
|
-
|
402
|
-
function toRoleKey32(RoleId roleId) public pure returns (Key32) {
|
403
|
-
return roleId.toKey32();
|
404
|
-
}
|
405
|
-
|
406
|
-
function toTargetKey32(address target) public pure returns (Key32) {
|
407
|
-
return Key32Lib.toKey32(TARGET(), KeyId.wrap(bytes20(target)));
|
408
|
-
}
|
409
|
-
|
410
215
|
function _toNftKey32(NftId nftId, ObjectType objectType) internal pure returns (Key32) {
|
411
216
|
return nftId.toKey32(objectType);
|
412
217
|
}
|
@@ -419,43 +224,42 @@ contract Instance is
|
|
419
224
|
return policyNftId.toKey32(POLICY());
|
420
225
|
}
|
421
226
|
|
422
|
-
function getComponentOwnerService() external view returns (IComponentOwnerService) {
|
423
|
-
return ComponentOwnerService(_registry.getServiceAddress("ComponentOwnerService", VersionPart.wrap(3)));
|
424
|
-
}
|
425
|
-
|
426
227
|
function getDistributionService() external view returns (IDistributionService) {
|
427
|
-
return IDistributionService(_registry.getServiceAddress(
|
228
|
+
return IDistributionService(_registry.getServiceAddress(DISTRIBUTION(), VersionPart.wrap(3)));
|
428
229
|
}
|
429
230
|
|
430
231
|
function getProductService() external view returns (IProductService) {
|
431
|
-
return IProductService(_registry.getServiceAddress(
|
232
|
+
return IProductService(_registry.getServiceAddress(PRODUCT(), VersionPart.wrap(3)));
|
432
233
|
}
|
433
234
|
|
434
235
|
function getPoolService() external view returns (IPoolService) {
|
435
|
-
return IPoolService(_registry.getServiceAddress(
|
236
|
+
return IPoolService(_registry.getServiceAddress(POOL(), VersionPart.wrap(3)));
|
436
237
|
}
|
437
238
|
|
438
239
|
function getPolicyService() external view returns (IPolicyService) {
|
439
|
-
return IPolicyService(_registry.getServiceAddress(
|
240
|
+
return IPolicyService(_registry.getServiceAddress(POLICY(), VersionPart.wrap(3)));
|
440
241
|
}
|
441
242
|
|
442
243
|
function getBundleService() external view returns (IBundleService) {
|
443
|
-
return IBundleService(_registry.getServiceAddress(
|
244
|
+
return IBundleService(_registry.getServiceAddress(BUNDLE(), VersionPart.wrap(3)));
|
444
245
|
}
|
445
246
|
|
446
247
|
function setInstanceReader(InstanceReader instanceReader) external restricted() {
|
447
|
-
require(
|
448
|
-
require(instanceReader.getInstanceNftId() == getNftId(), "NFT ID of InstanceReader does not match");
|
248
|
+
require(instanceReader.getInstance() == Instance(this), "InstanceReader instance mismatch");
|
449
249
|
_instanceReader = instanceReader;
|
450
250
|
}
|
451
251
|
|
252
|
+
function getMajorVersion() external pure returns (VersionPart majorVersion) {
|
253
|
+
return VersionPartLib.toVersionPart(GIF_MAJOR_VERSION);
|
254
|
+
}
|
255
|
+
|
452
256
|
function getInstanceReader() external view returns (InstanceReader) {
|
453
257
|
return _instanceReader;
|
454
258
|
}
|
455
259
|
|
456
260
|
function setBundleManager(BundleManager bundleManager) external restricted() {
|
457
261
|
require(address(_bundleManager) == address(0), "BundleManager is set");
|
458
|
-
require(bundleManager.
|
262
|
+
require(bundleManager.getInstance() == Instance(this), "BundleManager instance mismatch");
|
459
263
|
_bundleManager = bundleManager;
|
460
264
|
}
|
461
265
|
|
@@ -1,95 +1,54 @@
|
|
1
1
|
// SPDX-License-Identifier: Apache-2.0
|
2
2
|
pragma solidity ^0.8.20;
|
3
3
|
|
4
|
+
import {AccessManager} from "@openzeppelin/contracts/access/manager/AccessManager.sol";
|
5
|
+
import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
|
4
6
|
import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
|
5
7
|
import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
|
6
|
-
|
7
|
-
import {
|
8
|
-
|
9
|
-
import {
|
10
|
-
import {IPolicy} from "./module/IPolicy.sol";
|
11
|
-
import {IRisk} from "./module/IRisk.sol";
|
12
|
-
import {ISetup} from "./module/ISetup.sol";
|
13
|
-
import {Key32, KeyId, Key32Lib} from "../types/Key32.sol";
|
14
|
-
import {KeyValueStore} from "./base/KeyValueStore.sol";
|
15
|
-
import {NftId} from "../types/NftId.sol";
|
16
|
-
import {NumberId} from "../types/NumberId.sol";
|
17
|
-
import {ObjectType, BUNDLE, DISTRIBUTION, POLICY, POOL, ROLE, PRODUCT, TARGET} from "../types/ObjectType.sol";
|
18
|
-
import {RiskId, RiskIdLib} from "../types/RiskId.sol";
|
19
|
-
import {RoleId, RoleIdLib} from "../types/RoleId.sol";
|
20
|
-
import {StateId, ACTIVE} from "../types/StateId.sol";
|
21
|
-
import {Timestamp, TimestampLib} from "../types/Timestamp.sol";
|
8
|
+
|
9
|
+
import {RoleId, RoleIdLib } from "../types/RoleId.sol";
|
10
|
+
import {TimestampLib} from "../types/Timestamp.sol";
|
11
|
+
import {IAccess} from "./module/IAccess.sol";
|
22
12
|
|
23
13
|
contract InstanceAccessManager is
|
24
14
|
AccessManagedUpgradeable
|
25
15
|
{
|
16
|
+
using RoleIdLib for RoleId;
|
17
|
+
|
26
18
|
string public constant ADMIN_ROLE_NAME = "AdminRole";
|
27
19
|
string public constant PUBLIC_ROLE_NAME = "PublicRole";
|
28
20
|
|
29
21
|
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000;
|
30
22
|
uint32 public constant EXECUTION_DELAY = 0;
|
31
23
|
|
32
|
-
struct RoleInfo {
|
33
|
-
ShortString name;
|
34
|
-
bool isCustom;
|
35
|
-
bool isLocked;
|
36
|
-
Timestamp createdAt;
|
37
|
-
Timestamp updatedAt;
|
38
|
-
}
|
39
|
-
|
40
|
-
struct TargetInfo {
|
41
|
-
ShortString name;
|
42
|
-
bool isCustom;
|
43
|
-
bool isLocked;
|
44
|
-
Timestamp createdAt;
|
45
|
-
Timestamp updatedAt;
|
46
|
-
}
|
47
|
-
|
48
|
-
error ErrorRoleIdInvalid(RoleId roleId);
|
49
|
-
error ErrorRoleIdTooBig(RoleId roleId);
|
50
|
-
error ErrorRoleIdTooSmall(RoleId roleId);
|
51
|
-
error ErrorRoleIdAlreadyExists(RoleId roleId, ShortString name);
|
52
|
-
error ErrorRoleIdNotActive(RoleId roleId);
|
53
|
-
error ErrorRoleNameEmpty(RoleId roleId);
|
54
|
-
error ErrorRoleNameNotUnique(RoleId roleId, ShortString name);
|
55
|
-
error ErrorRoleInvalidUpdate(RoleId roleId, bool isCustom);
|
56
|
-
error ErrorRoleIsCustomIsImmutable(RoleId roleId, bool isCustom, bool isCustomExisting);
|
57
|
-
error ErrorSetLockedForNonexstentRole(RoleId roleId);
|
58
|
-
error ErrorGrantNonexstentRole(RoleId roleId);
|
59
|
-
error ErrorRevokeNonexstentRole(RoleId roleId);
|
60
|
-
error ErrorRenounceNonexstentRole(RoleId roleId);
|
61
|
-
|
62
|
-
error ErrorTargetAddressZero();
|
63
|
-
error ErrorTargetAlreadyExists(address target, ShortString name);
|
64
|
-
error ErrorTargetNameEmpty(address target);
|
65
|
-
error ErrorTargetNameExists(address target, address existingTarget, ShortString name);
|
66
|
-
error ErrorSetLockedForNonexstentTarget(address target);
|
67
|
-
|
68
24
|
// role specific state
|
69
|
-
mapping(RoleId roleId => RoleInfo info) internal _role;
|
25
|
+
mapping(RoleId roleId => IAccess.RoleInfo info) internal _role;
|
70
26
|
mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
|
71
27
|
mapping(ShortString name => RoleId roleId) internal _roleForName;
|
72
28
|
RoleId [] internal _roles;
|
73
29
|
|
74
30
|
// target specific state
|
75
|
-
mapping(address target => TargetInfo info) internal _target;
|
31
|
+
mapping(address target => IAccess.TargetInfo info) internal _target;
|
76
32
|
mapping(ShortString name => address target) internal _targetForName;
|
77
33
|
address [] internal _targets;
|
78
34
|
|
79
|
-
|
35
|
+
AccessManager internal _accessManager;
|
80
36
|
|
81
|
-
|
37
|
+
function initialize(address initialAdmin) external initializer
|
82
38
|
{
|
83
|
-
|
84
|
-
|
39
|
+
// if size of the contract gets too large, this can be externalized which will reduce the contract size considerably
|
40
|
+
_accessManager = new AccessManager(address(this));
|
41
|
+
// this service required admin rights to access manager to be able to grant/revoke roles
|
42
|
+
_accessManager.grantRole(_accessManager.ADMIN_ROLE(), initialAdmin, 0);
|
43
|
+
|
44
|
+
__AccessManaged_init(address(_accessManager));
|
85
45
|
|
86
46
|
_createRole(RoleIdLib.toRoleId(_accessManager.ADMIN_ROLE()), ADMIN_ROLE_NAME, false, false);
|
87
47
|
_createRole(RoleIdLib.toRoleId(_accessManager.PUBLIC_ROLE()), PUBLIC_ROLE_NAME, false, false);
|
88
48
|
}
|
89
49
|
|
90
50
|
//--- Role ------------------------------------------------------//
|
91
|
-
|
92
|
-
function createDefaultRole(RoleId roleId, string memory name) external restricted() {
|
51
|
+
function createGifRole(RoleId roleId, string memory name) external restricted() {
|
93
52
|
_createRole(roleId, name, false, true);
|
94
53
|
}
|
95
54
|
|
@@ -99,7 +58,7 @@ contract InstanceAccessManager is
|
|
99
58
|
|
100
59
|
function setRoleLocked(RoleId roleId, bool locked) external restricted() {
|
101
60
|
if (!roleExists(roleId)) {
|
102
|
-
revert
|
61
|
+
revert IAccess.ErrorIAccessSetLockedForNonexstentRole(roleId);
|
103
62
|
}
|
104
63
|
|
105
64
|
_role[roleId].isLocked = locked;
|
@@ -112,11 +71,11 @@ contract InstanceAccessManager is
|
|
112
71
|
|
113
72
|
function grantRole(RoleId roleId, address member) external restricted() returns (bool granted) {
|
114
73
|
if (!roleExists(roleId)) {
|
115
|
-
revert
|
74
|
+
revert IAccess.ErrorIAccessGrantNonexstentRole(roleId);
|
116
75
|
}
|
117
76
|
|
118
77
|
if (_role[roleId].isLocked) {
|
119
|
-
revert
|
78
|
+
revert IAccess.ErrorIAccessRoleIdNotActive(roleId);
|
120
79
|
}
|
121
80
|
|
122
81
|
if (!EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -130,7 +89,7 @@ contract InstanceAccessManager is
|
|
130
89
|
|
131
90
|
function revokeRole(RoleId roleId, address member) external restricted() returns (bool revoked) {
|
132
91
|
if (!roleExists(roleId)) {
|
133
|
-
revert
|
92
|
+
revert IAccess.ErrorIAccessRevokeNonexstentRole(roleId);
|
134
93
|
}
|
135
94
|
|
136
95
|
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -148,7 +107,7 @@ contract InstanceAccessManager is
|
|
148
107
|
address member = msg.sender;
|
149
108
|
|
150
109
|
if (!roleExists(roleId)) {
|
151
|
-
revert
|
110
|
+
revert IAccess.ErrorIAccessRenounceNonexstentRole(roleId);
|
152
111
|
}
|
153
112
|
|
154
113
|
if (EnumerableSet.contains(_roleMembers[roleId], member)) {
|
@@ -173,7 +132,7 @@ contract InstanceAccessManager is
|
|
173
132
|
return _roleForName[ShortStrings.toShortString(name)];
|
174
133
|
}
|
175
134
|
|
176
|
-
function getRole(RoleId roleId) external view returns (RoleInfo memory role) {
|
135
|
+
function getRole(RoleId roleId) external view returns (IAccess.RoleInfo memory role) {
|
177
136
|
return _role[roleId];
|
178
137
|
}
|
179
138
|
|
@@ -190,13 +149,19 @@ contract InstanceAccessManager is
|
|
190
149
|
}
|
191
150
|
|
192
151
|
//--- Target ------------------------------------------------------//
|
152
|
+
function createGifTarget(address target, string memory name) external restricted() {
|
153
|
+
_createTarget(target, name, false, true);
|
154
|
+
}
|
155
|
+
|
193
156
|
function createTarget(address target, string memory name) external restricted() {
|
194
157
|
_createTarget(target, name, true, true);
|
195
158
|
}
|
196
159
|
|
197
|
-
function setTargetLocked(
|
198
|
-
|
199
|
-
|
160
|
+
function setTargetLocked(string memory targetName, bool locked) external restricted() {
|
161
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
162
|
+
|
163
|
+
if (target == address(0)) {
|
164
|
+
revert IAccess.ErrorIAccessSetLockedForNonexstentTarget(target);
|
200
165
|
}
|
201
166
|
|
202
167
|
_target[target].isLocked = locked;
|
@@ -214,7 +179,7 @@ contract InstanceAccessManager is
|
|
214
179
|
_validateRoleParameters(roleId, name, isCustom);
|
215
180
|
}
|
216
181
|
|
217
|
-
RoleInfo memory role = RoleInfo(
|
182
|
+
IAccess.RoleInfo memory role = IAccess.RoleInfo(
|
218
183
|
ShortStrings.toShortString(name),
|
219
184
|
isCustom,
|
220
185
|
false, // role un-locked,
|
@@ -233,35 +198,35 @@ contract InstanceAccessManager is
|
|
233
198
|
)
|
234
199
|
internal
|
235
200
|
view
|
236
|
-
returns (RoleInfo memory existingRole)
|
201
|
+
returns (IAccess.RoleInfo memory existingRole)
|
237
202
|
{
|
238
203
|
// check role id
|
239
204
|
uint64 roleIdInt = RoleId.unwrap(roleId);
|
240
205
|
if(roleIdInt == _accessManager.ADMIN_ROLE() || roleIdInt == _accessManager.PUBLIC_ROLE()) {
|
241
|
-
revert
|
206
|
+
revert IAccess.ErrorIAccessRoleIdInvalid(roleId);
|
242
207
|
}
|
243
208
|
|
244
209
|
// prevent changing isCustom for existing roles
|
245
210
|
existingRole = _role[roleId];
|
246
211
|
|
247
212
|
if (existingRole.createdAt.gtz() && isCustom != existingRole.isCustom) {
|
248
|
-
revert
|
213
|
+
revert IAccess.ErrorIAccessRoleIsCustomIsImmutable(roleId, isCustom, existingRole.isCustom);
|
249
214
|
}
|
250
215
|
|
251
216
|
if (isCustom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
|
252
|
-
revert
|
217
|
+
revert IAccess.ErrorIAccessRoleIdTooSmall(roleId);
|
253
218
|
} else if (!isCustom && roleIdInt >= CUSTOM_ROLE_ID_MIN) {
|
254
|
-
revert
|
219
|
+
revert IAccess.ErrorIAccessRoleIdTooBig(roleId);
|
255
220
|
}
|
256
221
|
|
257
222
|
// role name checks
|
258
223
|
ShortString nameShort = ShortStrings.toShortString(name);
|
259
224
|
if (ShortStrings.byteLength(nameShort) == 0) {
|
260
|
-
revert
|
225
|
+
revert IAccess.ErrorIAccessRoleNameEmpty(roleId);
|
261
226
|
}
|
262
227
|
|
263
228
|
if (_roleForName[nameShort] != RoleIdLib.zero() && _roleForName[nameShort] != roleId) {
|
264
|
-
revert
|
229
|
+
revert IAccess.ErrorIAccessRoleNameNotUnique(_roleForName[nameShort], nameShort);
|
265
230
|
}
|
266
231
|
}
|
267
232
|
|
@@ -270,7 +235,14 @@ contract InstanceAccessManager is
|
|
270
235
|
_validateTargetParameters(target, name, isCustom);
|
271
236
|
}
|
272
237
|
|
273
|
-
|
238
|
+
if (_target[target].createdAt.gtz()) {
|
239
|
+
revert IAccess.ErrorIAccessTargetAlreadyExists(target, _target[target].name);
|
240
|
+
}
|
241
|
+
if (_targetForName[ShortStrings.toShortString(name)] != address(0)) {
|
242
|
+
revert IAccess.ErrorIAccessTargetNameExists(target, _targetForName[ShortStrings.toShortString(name)], ShortStrings.toShortString(name));
|
243
|
+
}
|
244
|
+
|
245
|
+
IAccess.TargetInfo memory info = IAccess.TargetInfo(
|
274
246
|
ShortStrings.toShortString(name),
|
275
247
|
isCustom,
|
276
248
|
_accessManager.isTargetClosed(target), // sync with state in access manager
|
@@ -283,6 +255,44 @@ contract InstanceAccessManager is
|
|
283
255
|
}
|
284
256
|
|
285
257
|
function _validateTargetParameters(address target, string memory name, bool isCustom) internal view {
|
258
|
+
// TODO: implement
|
259
|
+
}
|
260
|
+
|
261
|
+
function setTargetFunctionRole(
|
262
|
+
address target,
|
263
|
+
bytes4[] calldata selectors,
|
264
|
+
uint64 roleId
|
265
|
+
) public virtual restricted() {
|
266
|
+
_accessManager.setTargetFunctionRole(target, selectors, roleId);
|
267
|
+
}
|
268
|
+
|
269
|
+
function setTargetFunctionRole(
|
270
|
+
string memory targetName,
|
271
|
+
bytes4[] calldata selectors,
|
272
|
+
RoleId roleId
|
273
|
+
) public virtual restricted() {
|
274
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
275
|
+
uint64 roleIdInt = RoleId.unwrap(roleId);
|
276
|
+
_accessManager.setTargetFunctionRole(target, selectors, roleIdInt);
|
277
|
+
}
|
278
|
+
|
279
|
+
function setTargetClosed(string memory targetName, bool closed) public restricted() {
|
280
|
+
address target = _targetForName[ShortStrings.toShortString(targetName)];
|
281
|
+
if (target == address(0)) {
|
282
|
+
revert IAccess.ErrorIAccessTargetAddressZero();
|
283
|
+
}
|
284
|
+
_accessManager.setTargetClosed(target, closed);
|
285
|
+
}
|
286
|
+
|
287
|
+
function isTargetLocked(address target) public view returns (bool locked) {
|
288
|
+
return _accessManager.isTargetClosed(target);
|
289
|
+
}
|
286
290
|
|
291
|
+
function canCall(
|
292
|
+
address caller,
|
293
|
+
address target,
|
294
|
+
bytes4 selector
|
295
|
+
) public view virtual returns (bool immediate, uint32 delay) {
|
296
|
+
return _accessManager.canCall(caller, target, selector);
|
287
297
|
}
|
288
298
|
}
|