@etherisc/gif-next 0.0.2-fd2113c-488 → 0.0.2-fd41099-706

Sign up to get free protection for your applications and to get access to all the features.
Files changed (431) hide show
  1. package/README.md +30 -2
  2. package/artifacts/contracts/authorization/AccessAdmin.sol/AccessAdmin.dbg.json +4 -0
  3. package/artifacts/contracts/authorization/AccessAdmin.sol/AccessAdmin.json +1253 -0
  4. package/artifacts/contracts/authorization/AccessManagerCloneable.sol/AccessManagerCloneable.dbg.json +4 -0
  5. package/artifacts/contracts/authorization/AccessManagerCloneable.sol/AccessManagerCloneable.json +1206 -0
  6. package/artifacts/contracts/authorization/Authorization.sol/Authorization.dbg.json +4 -0
  7. package/artifacts/contracts/authorization/Authorization.sol/Authorization.json +358 -0
  8. package/artifacts/contracts/authorization/IAccess.sol/IAccess.dbg.json +4 -0
  9. package/artifacts/contracts/authorization/IAccess.sol/IAccess.json +10 -0
  10. package/artifacts/contracts/authorization/IAccessAdmin.sol/IAccessAdmin.dbg.json +4 -0
  11. package/artifacts/contracts/{shared → authorization}/IAccessAdmin.sol/IAccessAdmin.json +95 -252
  12. package/artifacts/contracts/authorization/IAuthorization.sol/IAuthorization.dbg.json +4 -0
  13. package/artifacts/contracts/authorization/IAuthorization.sol/IAuthorization.json +258 -0
  14. package/artifacts/contracts/authorization/IModuleAuthorization.sol/IModuleAuthorization.dbg.json +4 -0
  15. package/artifacts/contracts/authorization/IModuleAuthorization.sol/IModuleAuthorization.json +290 -0
  16. package/artifacts/contracts/authorization/IServiceAuthorization.sol/IServiceAuthorization.dbg.json +4 -0
  17. package/artifacts/contracts/{registry → authorization}/IServiceAuthorization.sol/IServiceAuthorization.json +29 -10
  18. package/artifacts/contracts/authorization/ModuleAuthorization.sol/ModuleAuthorization.dbg.json +4 -0
  19. package/artifacts/contracts/authorization/ModuleAuthorization.sol/ModuleAuthorization.json +390 -0
  20. package/artifacts/contracts/authorization/ServiceAuthorization.sol/ServiceAuthorization.dbg.json +4 -0
  21. package/artifacts/contracts/authorization/ServiceAuthorization.sol/ServiceAuthorization.json +190 -0
  22. package/artifacts/contracts/distribution/BasicDistribution.sol/BasicDistribution.dbg.json +4 -0
  23. package/artifacts/contracts/distribution/BasicDistribution.sol/BasicDistribution.json +1505 -0
  24. package/artifacts/contracts/distribution/BasicDistributionAuthorization.sol/BasicDistributionAuthorization.dbg.json +4 -0
  25. package/artifacts/contracts/distribution/BasicDistributionAuthorization.sol/BasicDistributionAuthorization.json +410 -0
  26. package/artifacts/contracts/distribution/Distribution.sol/Distribution.dbg.json +1 -1
  27. package/artifacts/contracts/distribution/Distribution.sol/Distribution.json +17 -242
  28. package/artifacts/contracts/distribution/DistributionService.sol/DistributionService.dbg.json +1 -1
  29. package/artifacts/contracts/distribution/DistributionService.sol/DistributionService.json +106 -90
  30. package/artifacts/contracts/distribution/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +1 -1
  31. package/artifacts/contracts/distribution/DistributionServiceManager.sol/DistributionServiceManager.json +55 -55
  32. package/artifacts/contracts/distribution/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
  33. package/artifacts/contracts/distribution/IDistributionComponent.sol/IDistributionComponent.json +71 -146
  34. package/artifacts/contracts/distribution/IDistributionService.sol/IDistributionService.dbg.json +1 -1
  35. package/artifacts/contracts/distribution/IDistributionService.sol/IDistributionService.json +32 -16
  36. package/artifacts/contracts/instance/BundleSet.sol/BundleSet.dbg.json +4 -0
  37. package/artifacts/contracts/instance/BundleSet.sol/BundleSet.json +703 -0
  38. package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
  39. package/artifacts/contracts/instance/IInstance.sol/IInstance.json +6 -19
  40. package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
  41. package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +32 -44
  42. package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
  43. package/artifacts/contracts/instance/Instance.sol/Instance.json +35 -96
  44. package/artifacts/contracts/instance/InstanceAdmin.sol/InstanceAdmin.dbg.json +1 -1
  45. package/artifacts/contracts/instance/InstanceAdmin.sol/InstanceAdmin.json +1208 -290
  46. package/artifacts/contracts/instance/InstanceAuthorizationV3.sol/InstanceAuthorizationV3.dbg.json +4 -0
  47. package/artifacts/contracts/instance/InstanceAuthorizationV3.sol/InstanceAuthorizationV3.json +601 -0
  48. package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
  49. package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +110 -76
  50. package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
  51. package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +65 -125
  52. package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
  53. package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +35 -59
  54. package/artifacts/contracts/instance/InstanceStore.sol/InstanceStore.dbg.json +1 -1
  55. package/artifacts/contracts/instance/InstanceStore.sol/InstanceStore.json +84 -91
  56. package/artifacts/contracts/instance/base/BalanceStore.sol/BalanceStore.dbg.json +1 -1
  57. package/artifacts/contracts/instance/base/BalanceStore.sol/BalanceStore.json +2 -2
  58. package/artifacts/contracts/instance/base/Cloneable.sol/Cloneable.dbg.json +1 -1
  59. package/artifacts/contracts/instance/base/ObjectCounter.sol/ObjectCounter.dbg.json +1 -1
  60. package/artifacts/contracts/instance/base/ObjectCounter.sol/ObjectCounter.json +2 -2
  61. package/artifacts/contracts/instance/base/ObjectLifecycle.sol/ObjectLifecycle.dbg.json +4 -0
  62. package/artifacts/contracts/instance/base/ObjectLifecycle.sol/ObjectLifecycle.json +182 -0
  63. package/artifacts/contracts/instance/base/ObjectSet.sol/ObjectSet.dbg.json +4 -0
  64. package/artifacts/contracts/instance/base/ObjectSet.sol/ObjectSet.json +181 -0
  65. package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
  66. package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
  67. package/artifacts/contracts/instance/module/IComponents.sol/IComponents.dbg.json +1 -1
  68. package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
  69. package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
  70. package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
  71. package/artifacts/contracts/mock/Dip.sol/Dip.dbg.json +1 -1
  72. package/artifacts/contracts/mock/Dip.sol/Dip.json +2 -2
  73. package/artifacts/contracts/oracle/BasicOracle.sol/BasicOracle.dbg.json +4 -0
  74. package/artifacts/contracts/oracle/BasicOracle.sol/BasicOracle.json +1155 -0
  75. package/artifacts/contracts/oracle/BasicOracleAuthorization.sol/BasicOracleAuthorization.dbg.json +4 -0
  76. package/artifacts/contracts/oracle/BasicOracleAuthorization.sol/BasicOracleAuthorization.json +418 -0
  77. package/artifacts/contracts/oracle/IOracle.sol/IOracle.dbg.json +1 -1
  78. package/artifacts/contracts/oracle/IOracle.sol/IOracle.json +43 -1
  79. package/artifacts/contracts/oracle/IOracleComponent.sol/IOracleComponent.dbg.json +1 -1
  80. package/artifacts/contracts/oracle/IOracleComponent.sol/IOracleComponent.json +13 -0
  81. package/artifacts/contracts/oracle/IOracleService.sol/IOracleService.dbg.json +1 -1
  82. package/artifacts/contracts/oracle/Oracle.sol/Oracle.dbg.json +1 -1
  83. package/artifacts/contracts/oracle/Oracle.sol/Oracle.json +13 -96
  84. package/artifacts/contracts/oracle/OracleService.sol/OracleService.dbg.json +1 -1
  85. package/artifacts/contracts/oracle/OracleService.sol/OracleService.json +32 -32
  86. package/artifacts/contracts/oracle/OracleServiceManager.sol/OracleServiceManager.dbg.json +1 -1
  87. package/artifacts/contracts/oracle/OracleServiceManager.sol/OracleServiceManager.json +34 -34
  88. package/artifacts/contracts/pool/BasicPool.sol/BasicPool.dbg.json +4 -0
  89. package/artifacts/contracts/pool/BasicPool.sol/BasicPool.json +1477 -0
  90. package/artifacts/contracts/pool/BasicPoolAuthorization.sol/BasicPoolAuthorization.dbg.json +4 -0
  91. package/artifacts/contracts/pool/BasicPoolAuthorization.sol/BasicPoolAuthorization.json +410 -0
  92. package/artifacts/contracts/pool/BundleService.sol/BundleService.dbg.json +1 -1
  93. package/artifacts/contracts/pool/BundleService.sol/BundleService.json +55 -55
  94. package/artifacts/contracts/pool/BundleServiceManager.sol/BundleServiceManager.dbg.json +1 -1
  95. package/artifacts/contracts/pool/BundleServiceManager.sol/BundleServiceManager.json +40 -40
  96. package/artifacts/contracts/pool/IBundleService.sol/IBundleService.dbg.json +1 -1
  97. package/artifacts/contracts/pool/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
  98. package/artifacts/contracts/pool/IPoolComponent.sol/IPoolComponent.json +7 -202
  99. package/artifacts/contracts/pool/IPoolService.sol/IPoolService.dbg.json +1 -1
  100. package/artifacts/contracts/pool/Pool.sol/Pool.dbg.json +1 -1
  101. package/artifacts/contracts/pool/Pool.sol/Pool.json +7 -303
  102. package/artifacts/contracts/pool/PoolService.sol/PoolService.dbg.json +1 -1
  103. package/artifacts/contracts/pool/PoolService.sol/PoolService.json +36 -36
  104. package/artifacts/contracts/pool/PoolServiceManager.sol/PoolServiceManager.dbg.json +1 -1
  105. package/artifacts/contracts/pool/PoolServiceManager.sol/PoolServiceManager.json +36 -36
  106. package/artifacts/contracts/product/ApplicationService.sol/ApplicationService.dbg.json +1 -1
  107. package/artifacts/contracts/product/ApplicationService.sol/ApplicationService.json +32 -32
  108. package/artifacts/contracts/product/ApplicationServiceManager.sol/ApplicationServiceManager.dbg.json +1 -1
  109. package/artifacts/contracts/product/ApplicationServiceManager.sol/ApplicationServiceManager.json +34 -34
  110. package/artifacts/contracts/product/BasicProduct.sol/BasicProduct.dbg.json +4 -0
  111. package/artifacts/contracts/product/BasicProduct.sol/BasicProduct.json +1299 -0
  112. package/artifacts/contracts/product/BasicProductAuthorization.sol/BasicProductAuthorization.dbg.json +4 -0
  113. package/artifacts/contracts/product/BasicProductAuthorization.sol/BasicProductAuthorization.json +410 -0
  114. package/artifacts/contracts/product/ClaimService.sol/ClaimService.dbg.json +1 -1
  115. package/artifacts/contracts/product/ClaimService.sol/ClaimService.json +72 -72
  116. package/artifacts/contracts/product/ClaimServiceManager.sol/ClaimServiceManager.dbg.json +1 -1
  117. package/artifacts/contracts/product/ClaimServiceManager.sol/ClaimServiceManager.json +54 -54
  118. package/artifacts/contracts/product/IApplicationService.sol/IApplicationService.dbg.json +1 -1
  119. package/artifacts/contracts/product/IClaimService.sol/IClaimService.dbg.json +1 -1
  120. package/artifacts/contracts/product/IPolicyService.sol/IPolicyService.dbg.json +1 -1
  121. package/artifacts/contracts/product/IPricingService.sol/IPricingService.dbg.json +1 -1
  122. package/artifacts/contracts/product/IProductComponent.sol/IProductComponent.dbg.json +1 -1
  123. package/artifacts/contracts/product/IProductComponent.sol/IProductComponent.json +13 -42
  124. package/artifacts/contracts/product/IProductService.sol/IProductService.dbg.json +1 -1
  125. package/artifacts/contracts/product/PolicyService.sol/PolicyService.dbg.json +1 -1
  126. package/artifacts/contracts/product/PolicyService.sol/PolicyService.json +50 -50
  127. package/artifacts/contracts/product/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +1 -1
  128. package/artifacts/contracts/product/PolicyServiceManager.sol/PolicyServiceManager.json +43 -43
  129. package/artifacts/contracts/product/PricingService.sol/PricingService.dbg.json +1 -1
  130. package/artifacts/contracts/product/PricingService.sol/PricingService.json +58 -58
  131. package/artifacts/contracts/product/PricingServiceManager.sol/PricingServiceManager.dbg.json +1 -1
  132. package/artifacts/contracts/product/PricingServiceManager.sol/PricingServiceManager.json +47 -47
  133. package/artifacts/contracts/product/Product.sol/Product.dbg.json +1 -1
  134. package/artifacts/contracts/product/Product.sol/Product.json +13 -153
  135. package/artifacts/contracts/product/ProductService.sol/ProductService.dbg.json +1 -1
  136. package/artifacts/contracts/product/ProductService.sol/ProductService.json +20 -20
  137. package/artifacts/contracts/product/ProductServiceManager.sol/ProductServiceManager.dbg.json +1 -1
  138. package/artifacts/contracts/product/ProductServiceManager.sol/ProductServiceManager.json +28 -28
  139. package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
  140. package/artifacts/contracts/registry/ChainNft.sol/ChainNft.json +40 -16
  141. package/artifacts/contracts/registry/GlobalRegistry.sol/GlobalRegistry.dbg.json +4 -0
  142. package/artifacts/contracts/registry/GlobalRegistry.sol/GlobalRegistry.json +1474 -0
  143. package/artifacts/contracts/registry/GlobalRegistryAdmin.sol/GlobalRegistryAdmin.dbg.json +4 -0
  144. package/artifacts/contracts/registry/GlobalRegistryAdmin.sol/GlobalRegistryAdmin.json +1876 -0
  145. package/artifacts/contracts/registry/IGlobalRegistry.sol/IGlobalRegistry.dbg.json +4 -0
  146. package/artifacts/contracts/registry/IGlobalRegistry.sol/IGlobalRegistry.json +974 -0
  147. package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
  148. package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +40 -47
  149. package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
  150. package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +0 -183
  151. package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
  152. package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
  153. package/artifacts/contracts/registry/Registry.sol/Registry.json +193 -81
  154. package/artifacts/contracts/registry/RegistryAdmin.sol/RegistryAdmin.dbg.json +1 -1
  155. package/artifacts/contracts/registry/RegistryAdmin.sol/RegistryAdmin.json +330 -378
  156. package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
  157. package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +18 -18
  158. package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
  159. package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +27 -27
  160. package/artifacts/contracts/registry/ReleaseLifecycle.sol/ReleaseLifecycle.dbg.json +4 -0
  161. package/artifacts/contracts/registry/ReleaseLifecycle.sol/ReleaseLifecycle.json +164 -0
  162. package/artifacts/contracts/registry/ReleaseRegistry.sol/ReleaseRegistry.dbg.json +4 -0
  163. package/artifacts/contracts/registry/ReleaseRegistry.sol/ReleaseRegistry.json +1140 -0
  164. package/artifacts/contracts/registry/ServiceAuthorizationV3.sol/ServiceAuthorizationV3.dbg.json +1 -1
  165. package/artifacts/contracts/registry/ServiceAuthorizationV3.sol/ServiceAuthorizationV3.json +43 -16
  166. package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +1 -1
  167. package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +4 -4
  168. package/artifacts/contracts/shared/Component.sol/Component.dbg.json +1 -1
  169. package/artifacts/contracts/shared/ComponentService.sol/ComponentService.dbg.json +1 -1
  170. package/artifacts/contracts/shared/ComponentService.sol/ComponentService.json +62 -86
  171. package/artifacts/contracts/shared/ComponentServiceManager.sol/ComponentServiceManager.dbg.json +1 -1
  172. package/artifacts/contracts/shared/ComponentServiceManager.sol/ComponentServiceManager.json +49 -61
  173. package/artifacts/contracts/shared/ComponentVerifyingService.sol/ComponentVerifyingService.dbg.json +1 -1
  174. package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
  175. package/artifacts/contracts/shared/ERC165.sol/ERC165.json +2 -2
  176. package/artifacts/contracts/shared/IComponent.sol/IComponent.dbg.json +1 -1
  177. package/artifacts/contracts/shared/IComponentService.sol/IComponentService.dbg.json +1 -1
  178. package/artifacts/contracts/shared/IInstanceLinkedComponent.sol/IInstanceLinkedComponent.dbg.json +1 -1
  179. package/artifacts/contracts/shared/IInstanceLinkedComponent.sol/IInstanceLinkedComponent.json +13 -0
  180. package/artifacts/contracts/shared/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
  181. package/artifacts/contracts/shared/IKeyValueStore.sol/IKeyValueStore.json +11 -5
  182. package/artifacts/contracts/shared/ILifecycle.sol/ILifecycle.dbg.json +1 -1
  183. package/artifacts/contracts/shared/ILifecycle.sol/ILifecycle.json +0 -5
  184. package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
  185. package/artifacts/contracts/shared/IPolicyHolder.sol/IPolicyHolder.dbg.json +1 -1
  186. package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
  187. package/artifacts/contracts/shared/IRegistryLinked.sol/IRegistryLinked.dbg.json +1 -1
  188. package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
  189. package/artifacts/contracts/shared/InitializableCustom.sol/InitializableCustom.dbg.json +1 -1
  190. package/artifacts/contracts/shared/InstanceLinkedComponent.sol/InstanceLinkedComponent.dbg.json +1 -1
  191. package/artifacts/contracts/shared/InstanceLinkedComponent.sol/InstanceLinkedComponent.json +13 -53
  192. package/artifacts/contracts/shared/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
  193. package/artifacts/contracts/shared/KeyValueStore.sol/KeyValueStore.json +15 -89
  194. package/artifacts/contracts/shared/Lifecycle.sol/Lifecycle.dbg.json +1 -1
  195. package/artifacts/contracts/shared/Lifecycle.sol/Lifecycle.json +4 -65
  196. package/artifacts/contracts/shared/MainnetContract.sol/MainnetContract.dbg.json +4 -0
  197. package/artifacts/contracts/shared/MainnetContract.sol/MainnetContract.json +34 -0
  198. package/artifacts/contracts/shared/NftIdSet.sol/NftIdSet.dbg.json +4 -0
  199. package/artifacts/contracts/shared/NftIdSet.sol/NftIdSet.json +306 -0
  200. package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
  201. package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +6 -6
  202. package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.dbg.json +1 -1
  203. package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.json +6 -6
  204. package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
  205. package/artifacts/contracts/shared/Registerable.sol/Registerable.json +8 -8
  206. package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.dbg.json +1 -1
  207. package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.json +2 -2
  208. package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
  209. package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
  210. package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.json +6 -6
  211. package/artifacts/contracts/staking/IStaking.sol/IStaking.dbg.json +1 -1
  212. package/artifacts/contracts/staking/IStakingService.sol/IStakingService.dbg.json +1 -1
  213. package/artifacts/contracts/staking/StakeManagerLib.sol/StakeManagerLib.dbg.json +1 -1
  214. package/artifacts/contracts/staking/StakeManagerLib.sol/StakeManagerLib.json +32 -32
  215. package/artifacts/contracts/staking/Staking.sol/Staking.dbg.json +1 -1
  216. package/artifacts/contracts/staking/Staking.sol/Staking.json +44 -44
  217. package/artifacts/contracts/staking/StakingLifecycle.sol/StakingLifecycle.dbg.json +4 -0
  218. package/artifacts/contracts/staking/StakingLifecycle.sol/StakingLifecycle.json +164 -0
  219. package/artifacts/contracts/staking/StakingManager.sol/StakingManager.dbg.json +1 -1
  220. package/artifacts/contracts/staking/StakingManager.sol/StakingManager.json +40 -40
  221. package/artifacts/contracts/staking/StakingReader.sol/StakingReader.dbg.json +1 -1
  222. package/artifacts/contracts/staking/StakingReader.sol/StakingReader.json +6 -6
  223. package/artifacts/contracts/staking/StakingService.sol/StakingService.dbg.json +1 -1
  224. package/artifacts/contracts/staking/StakingService.sol/StakingService.json +26 -26
  225. package/artifacts/contracts/staking/StakingServiceManager.sol/StakingServiceManager.dbg.json +1 -1
  226. package/artifacts/contracts/staking/StakingServiceManager.sol/StakingServiceManager.json +31 -31
  227. package/artifacts/contracts/staking/StakingStore.sol/StakingStore.dbg.json +1 -1
  228. package/artifacts/contracts/staking/StakingStore.sol/StakingStore.json +145 -169
  229. package/artifacts/contracts/staking/TargetManagerLib.sol/TargetManagerLib.dbg.json +1 -1
  230. package/artifacts/contracts/staking/TargetManagerLib.sol/TargetManagerLib.json +22 -22
  231. package/artifacts/contracts/type/AddressSet.sol/LibAddressSet.dbg.json +1 -1
  232. package/artifacts/contracts/type/AddressSet.sol/LibAddressSet.json +2 -2
  233. package/artifacts/contracts/type/Amount.sol/AmountLib.dbg.json +1 -1
  234. package/artifacts/contracts/type/Amount.sol/AmountLib.json +8 -8
  235. package/artifacts/contracts/type/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
  236. package/artifacts/contracts/type/Blocknumber.sol/BlocknumberLib.json +2 -2
  237. package/artifacts/contracts/type/ClaimId.sol/ClaimIdLib.dbg.json +1 -1
  238. package/artifacts/contracts/type/ClaimId.sol/ClaimIdLib.json +4 -4
  239. package/artifacts/contracts/type/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
  240. package/artifacts/contracts/type/DistributorType.sol/DistributorTypeLib.json +4 -4
  241. package/artifacts/contracts/type/Fee.sol/FeeLib.dbg.json +1 -1
  242. package/artifacts/contracts/type/Fee.sol/FeeLib.json +12 -12
  243. package/artifacts/contracts/type/Key32.sol/Key32Lib.dbg.json +1 -1
  244. package/artifacts/contracts/type/Key32.sol/Key32Lib.json +2 -2
  245. package/artifacts/contracts/type/NftId.sol/NftIdLib.dbg.json +1 -1
  246. package/artifacts/contracts/type/NftId.sol/NftIdLib.json +4 -4
  247. package/artifacts/contracts/type/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
  248. package/artifacts/contracts/type/NftIdSet.sol/LibNftIdSet.json +2 -2
  249. package/artifacts/contracts/type/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
  250. package/artifacts/contracts/type/ObjectType.sol/ObjectTypeLib.json +55 -2
  251. package/artifacts/contracts/type/PayoutId.sol/PayoutIdLib.dbg.json +1 -1
  252. package/artifacts/contracts/type/PayoutId.sol/PayoutIdLib.json +4 -4
  253. package/artifacts/contracts/type/Referral.sol/ReferralLib.dbg.json +1 -1
  254. package/artifacts/contracts/type/Referral.sol/ReferralLib.json +4 -4
  255. package/artifacts/contracts/type/RequestId.sol/RequestIdLib.dbg.json +1 -1
  256. package/artifacts/contracts/type/RequestId.sol/RequestIdLib.json +4 -4
  257. package/artifacts/contracts/type/RiskId.sol/RiskIdLib.dbg.json +1 -1
  258. package/artifacts/contracts/type/RiskId.sol/RiskIdLib.json +4 -4
  259. package/artifacts/contracts/type/RoleId.sol/RoleIdLib.dbg.json +1 -1
  260. package/artifacts/contracts/type/RoleId.sol/RoleIdLib.json +117 -14
  261. package/artifacts/contracts/type/Seconds.sol/SecondsLib.dbg.json +1 -1
  262. package/artifacts/contracts/type/Seconds.sol/SecondsLib.json +2 -2
  263. package/artifacts/contracts/type/Selector.sol/SelectorLib.dbg.json +1 -1
  264. package/artifacts/contracts/type/Selector.sol/SelectorLib.json +2 -2
  265. package/artifacts/contracts/type/Selector.sol/SelectorSetLib.dbg.json +1 -1
  266. package/artifacts/contracts/type/Selector.sol/SelectorSetLib.json +2 -2
  267. package/artifacts/contracts/type/StateId.sol/StateIdLib.dbg.json +1 -1
  268. package/artifacts/contracts/type/StateId.sol/StateIdLib.json +2 -2
  269. package/artifacts/contracts/type/String.sol/StrLib.dbg.json +1 -1
  270. package/artifacts/contracts/type/String.sol/StrLib.json +2 -2
  271. package/artifacts/contracts/type/Timestamp.sol/TimestampLib.dbg.json +1 -1
  272. package/artifacts/contracts/type/Timestamp.sol/TimestampLib.json +4 -4
  273. package/artifacts/contracts/type/UFixed.sol/MathLib.dbg.json +1 -1
  274. package/artifacts/contracts/type/UFixed.sol/MathLib.json +2 -2
  275. package/artifacts/contracts/type/UFixed.sol/UFixedLib.dbg.json +1 -1
  276. package/artifacts/contracts/type/UFixed.sol/UFixedLib.json +21 -2
  277. package/artifacts/contracts/type/Version.sol/VersionLib.dbg.json +1 -1
  278. package/artifacts/contracts/type/Version.sol/VersionLib.json +2 -2
  279. package/artifacts/contracts/type/Version.sol/VersionPartLib.dbg.json +1 -1
  280. package/artifacts/contracts/type/Version.sol/VersionPartLib.json +21 -2
  281. package/artifacts/contracts/upgradeability/IVersionable.sol/IVersionable.dbg.json +4 -0
  282. package/artifacts/contracts/{shared → upgradeability}/IVersionable.sol/IVersionable.json +1 -1
  283. package/artifacts/contracts/upgradeability/ProxyManager.sol/ProxyManager.dbg.json +4 -0
  284. package/artifacts/contracts/upgradeability/ProxyManager.sol/ProxyManager.json +617 -0
  285. package/artifacts/contracts/upgradeability/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +4 -0
  286. package/artifacts/contracts/upgradeability/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.json +129 -0
  287. package/artifacts/contracts/upgradeability/Versionable.sol/Versionable.dbg.json +4 -0
  288. package/artifacts/contracts/{shared → upgradeability}/Versionable.sol/Versionable.json +1 -1
  289. package/contracts/{shared → authorization}/AccessAdmin.sol +135 -304
  290. package/contracts/authorization/AccessManagerCloneable.sol +16 -0
  291. package/contracts/authorization/Authorization.sol +218 -0
  292. package/contracts/authorization/IAccess.sol +48 -0
  293. package/contracts/{shared → authorization}/IAccessAdmin.sol +22 -54
  294. package/contracts/authorization/IAuthorization.sol +54 -0
  295. package/contracts/authorization/IModuleAuthorization.sol +21 -0
  296. package/contracts/{registry → authorization}/IServiceAuthorization.sol +8 -5
  297. package/contracts/authorization/ModuleAuthorization.sol +78 -0
  298. package/contracts/{registry → authorization}/ServiceAuthorization.sol +21 -17
  299. package/contracts/distribution/BasicDistribution.sol +149 -0
  300. package/contracts/distribution/BasicDistributionAuthorization.sol +43 -0
  301. package/contracts/distribution/Distribution.sol +126 -104
  302. package/contracts/distribution/DistributionService.sol +12 -21
  303. package/contracts/distribution/DistributionServiceManager.sol +2 -5
  304. package/contracts/distribution/IDistributionComponent.sol +17 -35
  305. package/contracts/distribution/IDistributionService.sol +5 -1
  306. package/contracts/instance/{BundleManager.sol → BundleSet.sol} +23 -23
  307. package/contracts/instance/IInstance.sol +8 -9
  308. package/contracts/instance/IInstanceService.sol +13 -18
  309. package/contracts/instance/Instance.sol +61 -70
  310. package/contracts/instance/InstanceAdmin.sol +202 -267
  311. package/contracts/instance/InstanceAuthorizationV3.sol +202 -0
  312. package/contracts/instance/InstanceReader.sol +22 -9
  313. package/contracts/instance/InstanceService.sol +74 -70
  314. package/contracts/instance/InstanceServiceManager.sol +2 -6
  315. package/contracts/instance/InstanceStore.sol +11 -4
  316. package/contracts/instance/base/ObjectLifecycle.sol +106 -0
  317. package/contracts/instance/base/{ObjectManager.sol → ObjectSet.sol} +11 -12
  318. package/contracts/oracle/BasicOracle.sol +48 -0
  319. package/contracts/oracle/BasicOracleAuthorization.sol +46 -0
  320. package/contracts/oracle/IOracle.sol +16 -0
  321. package/contracts/oracle/Oracle.sol +61 -49
  322. package/contracts/oracle/OracleServiceManager.sol +2 -5
  323. package/contracts/pool/BasicPool.sol +164 -0
  324. package/contracts/pool/BasicPoolAuthorization.sol +49 -0
  325. package/contracts/pool/BundleService.sol +14 -26
  326. package/contracts/pool/BundleServiceManager.sol +2 -5
  327. package/contracts/pool/IPoolComponent.sol +0 -60
  328. package/contracts/pool/Pool.sol +143 -131
  329. package/contracts/pool/PoolService.sol +11 -27
  330. package/contracts/pool/PoolServiceManager.sol +2 -5
  331. package/contracts/product/ApplicationService.sol +12 -36
  332. package/contracts/product/ApplicationServiceManager.sol +2 -2
  333. package/contracts/product/BasicProduct.sol +82 -0
  334. package/contracts/product/BasicProductAuthorization.sol +40 -0
  335. package/contracts/product/ClaimService.sol +5 -31
  336. package/contracts/product/ClaimServiceManager.sol +2 -2
  337. package/contracts/product/IProductComponent.sol +6 -9
  338. package/contracts/product/PolicyServiceManager.sol +2 -5
  339. package/contracts/product/PricingServiceManager.sol +2 -5
  340. package/contracts/product/Product.sol +103 -88
  341. package/contracts/product/ProductService.sol +7 -32
  342. package/contracts/product/ProductServiceManager.sol +2 -5
  343. package/contracts/registry/ChainNft.sol +37 -23
  344. package/contracts/registry/GlobalRegistry.sol +104 -0
  345. package/contracts/registry/GlobalRegistryAdmin.sol +38 -0
  346. package/contracts/registry/IGlobalRegistry.sol +17 -0
  347. package/contracts/registry/IRegistry.sol +25 -16
  348. package/contracts/registry/IRegistryService.sol +6 -6
  349. package/contracts/registry/Registry.sol +131 -148
  350. package/contracts/registry/RegistryAdmin.sol +242 -130
  351. package/contracts/registry/RegistryService.sol +4 -18
  352. package/contracts/registry/RegistryServiceManager.sol +2 -2
  353. package/contracts/registry/ReleaseLifecycle.sol +27 -0
  354. package/contracts/registry/ReleaseRegistry.sol +533 -0
  355. package/contracts/registry/ServiceAuthorizationV3.sol +14 -14
  356. package/contracts/registry/TokenRegistry.sol +2 -2
  357. package/contracts/shared/ComponentService.sol +20 -56
  358. package/contracts/shared/ComponentServiceManager.sol +2 -2
  359. package/contracts/shared/ComponentVerifyingService.sol +1 -1
  360. package/contracts/shared/IInstanceLinkedComponent.sol +4 -0
  361. package/contracts/shared/IKeyValueStore.sol +1 -0
  362. package/contracts/shared/ILifecycle.sol +1 -2
  363. package/contracts/shared/IService.sol +1 -1
  364. package/contracts/shared/InstanceLinkedComponent.sol +26 -19
  365. package/contracts/shared/KeyValueStore.sol +6 -2
  366. package/contracts/shared/Lifecycle.sol +16 -69
  367. package/contracts/shared/MainnetContract.sol +15 -0
  368. package/contracts/shared/{NftIdSetManager.sol → NftIdSet.sol} +1 -1
  369. package/contracts/shared/Service.sol +3 -4
  370. package/contracts/staking/IStaking.sol +1 -2
  371. package/contracts/staking/IStakingService.sol +12 -5
  372. package/contracts/staking/Staking.sol +11 -14
  373. package/contracts/staking/StakingLifecycle.sol +23 -0
  374. package/contracts/staking/StakingManager.sol +2 -6
  375. package/contracts/staking/StakingReader.sol +12 -16
  376. package/contracts/staking/StakingServiceManager.sol +2 -2
  377. package/contracts/staking/StakingStore.sol +15 -23
  378. package/contracts/type/ObjectType.sol +37 -7
  379. package/contracts/type/RoleId.sol +55 -82
  380. package/contracts/type/UFixed.sol +6 -0
  381. package/contracts/type/Version.sol +3 -1
  382. package/contracts/{shared → upgradeability}/ProxyManager.sol +3 -4
  383. package/contracts/{shared → upgradeability}/UpgradableProxyWithAdmin.sol +1 -3
  384. package/package.json +6 -3
  385. package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +0 -4
  386. package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +0 -709
  387. package/artifacts/contracts/instance/InstanceAuthorizationsLib.sol/InstanceAuthorizationsLib.dbg.json +0 -4
  388. package/artifacts/contracts/instance/InstanceAuthorizationsLib.sol/InstanceAuthorizationsLib.json +0 -228
  389. package/artifacts/contracts/instance/base/ObjectManager.sol/ObjectManager.dbg.json +0 -4
  390. package/artifacts/contracts/instance/base/ObjectManager.sol/ObjectManager.json +0 -187
  391. package/artifacts/contracts/registry/IServiceAuthorization.sol/IServiceAuthorization.dbg.json +0 -4
  392. package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +0 -4
  393. package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +0 -1218
  394. package/artifacts/contracts/registry/ServiceAuthorization.sol/ServiceAuthorization.dbg.json +0 -4
  395. package/artifacts/contracts/registry/ServiceAuthorization.sol/ServiceAuthorization.json +0 -171
  396. package/artifacts/contracts/shared/AccessAdmin.sol/AccessAdmin.dbg.json +0 -4
  397. package/artifacts/contracts/shared/AccessAdmin.sol/AccessAdmin.json +0 -1559
  398. package/artifacts/contracts/shared/AccessManagerCustom.sol/AccessManagerCustom.dbg.json +0 -4
  399. package/artifacts/contracts/shared/AccessManagerCustom.sol/AccessManagerCustom.json +0 -1193
  400. package/artifacts/contracts/shared/AccessManagerExtended.sol/AccessManagerExtended.dbg.json +0 -4
  401. package/artifacts/contracts/shared/AccessManagerExtended.sol/AccessManagerExtended.json +0 -1747
  402. package/artifacts/contracts/shared/AccessManagerExtendedInitializeable.sol/AccessManagerExtendedInitializeable.dbg.json +0 -4
  403. package/artifacts/contracts/shared/AccessManagerExtendedInitializeable.sol/AccessManagerExtendedInitializeable.json +0 -1760
  404. package/artifacts/contracts/shared/AccessManagerExtendedWithDisable.sol/AccessManagerExtendedWithDisable.dbg.json +0 -4
  405. package/artifacts/contracts/shared/AccessManagerExtendedWithDisable.sol/AccessManagerExtendedWithDisable.json +0 -1838
  406. package/artifacts/contracts/shared/AccessManagerExtendedWithDisableInitializeable.sol/AccessManagerExtendedWithDisableInitializeable.dbg.json +0 -4
  407. package/artifacts/contracts/shared/AccessManagerExtendedWithDisableInitializeable.sol/AccessManagerExtendedWithDisableInitializeable.json +0 -1856
  408. package/artifacts/contracts/shared/IAccessAdmin.sol/IAccessAdmin.dbg.json +0 -4
  409. package/artifacts/contracts/shared/IAccessManagerExtended.sol/IAccessManagerExtended.dbg.json +0 -4
  410. package/artifacts/contracts/shared/IAccessManagerExtended.sol/IAccessManagerExtended.json +0 -1562
  411. package/artifacts/contracts/shared/IAccessManagerExtendedWithDisable.sol/IAccessManagerExtendedWithDisable.dbg.json +0 -4
  412. package/artifacts/contracts/shared/IAccessManagerExtendedWithDisable.sol/IAccessManagerExtendedWithDisable.json +0 -1600
  413. package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +0 -4
  414. package/artifacts/contracts/shared/NftIdSetManager.sol/NftIdSetManager.dbg.json +0 -4
  415. package/artifacts/contracts/shared/NftIdSetManager.sol/NftIdSetManager.json +0 -306
  416. package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +0 -4
  417. package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +0 -617
  418. package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +0 -4
  419. package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.json +0 -129
  420. package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +0 -4
  421. package/contracts/instance/InstanceAuthorizationsLib.sol +0 -377
  422. package/contracts/registry/ReleaseManager.sol +0 -527
  423. package/contracts/shared/AccessManagerCustom.sol +0 -741
  424. package/contracts/shared/AccessManagerExtended.sol +0 -481
  425. package/contracts/shared/AccessManagerExtendedInitializeable.sol +0 -13
  426. package/contracts/shared/AccessManagerExtendedWithDisable.sol +0 -137
  427. package/contracts/shared/AccessManagerExtendedWithDisableInitializeable.sol +0 -14
  428. package/contracts/shared/IAccessManagerExtended.sol +0 -74
  429. package/contracts/shared/IAccessManagerExtendedWithDisable.sol +0 -18
  430. /package/contracts/{shared → upgradeability}/IVersionable.sol +0 -0
  431. /package/contracts/{shared → upgradeability}/Versionable.sol +0 -0
@@ -1,741 +0,0 @@
1
- // SPDX-License-Identifier: MIT
2
- pragma solidity ^0.8.20;
3
-
4
- import {IAccessManager} from "@openzeppelin/contracts/access/manager/IAccessManager.sol";
5
- import {IAccessManaged} from "@openzeppelin/contracts/access/manager/IAccessManaged.sol";
6
- import {Address} from "@openzeppelin/contracts/utils/Address.sol";
7
- import {ContextUpgradeable} from "@openzeppelin/contracts-upgradeable/utils/ContextUpgradeable.sol";
8
- import {MulticallUpgradeable} from "@openzeppelin/contracts-upgradeable/utils/MulticallUpgradeable.sol";
9
- import {Math} from "@openzeppelin/contracts/utils/math/Math.sol";
10
- import {Time} from "@openzeppelin/contracts/utils/types/Time.sol";
11
- import {Initializable} from "@openzeppelin/contracts-upgradeable/proxy/utils/Initializable.sol";
12
-
13
- /*
14
- * copy of @openzeppelin/contract-upgradeable/access/manager/AccessManagerUpgradeable.sol" except:
15
- 1. abstract
16
- 2. renamed to AccessManagerCustom
17
- 2. _getAdminRestrictions() private view -> internal virtual view
18
- 3. _checkSelector() private pure -> internal pure
19
- */
20
- abstract contract AccessManagerCustom is
21
- Initializable,
22
- ContextUpgradeable,
23
- MulticallUpgradeable,
24
- IAccessManager
25
- {
26
- using Time for *;
27
-
28
- // Structure that stores the details for a target contract.
29
- struct TargetConfig {
30
- mapping(bytes4 selector => uint64 roleId) allowedRoles;
31
- Time.Delay adminDelay;
32
- bool closed;
33
- }
34
-
35
- // Structure that stores the details for a role/account pair. This structures fit into a single slot.
36
- struct Access {
37
- // Timepoint at which the user gets the permission.
38
- // If this is either 0 or in the future, then the role permission is not available.
39
- uint48 since;
40
- // Delay for execution. Only applies to restricted() / execute() calls.
41
- Time.Delay delay;
42
- }
43
-
44
- // Structure that stores the details of a role.
45
- struct Role {
46
- // Members of the role.
47
- mapping(address user => Access access) members;
48
- // Admin who can grant or revoke permissions.
49
- uint64 admin;
50
- // Guardian who can cancel operations targeting functions that need this role.
51
- uint64 guardian;
52
- // Delay in which the role takes effect after being granted.
53
- Time.Delay grantDelay;
54
- }
55
-
56
- // Structure that stores the details for a scheduled operation. This structure fits into a single slot.
57
- struct Schedule {
58
- // Moment at which the operation can be executed.
59
- uint48 timepoint;
60
- // Operation nonce to allow third-party contracts to identify the operation.
61
- uint32 nonce;
62
- }
63
-
64
- uint64 public constant ADMIN_ROLE = type(uint64).min; // 0
65
- uint64 public constant PUBLIC_ROLE = type(uint64).max; // 2**64-1
66
-
67
- /// @custom:storage-location erc7201:openzeppelin.storage.AccessManagerCustom
68
- struct AccessManagerStorage {
69
- mapping(address target => TargetConfig mode) _targets;
70
- mapping(uint64 roleId => Role) _roles;
71
- mapping(bytes32 operationId => Schedule) _schedules;
72
-
73
- // Used to identify operations that are currently being executed via {execute}.
74
- // This should be transient storage when supported by the EVM.
75
- bytes32 _executionId;
76
- }
77
-
78
- // TODO compute address
79
- // keccak256(abi.encode(uint256(keccak256("etherisc.storage.AccessManagerCustom")) - 1)) & ~bytes32(uint256(0xff))
80
- bytes32 private constant AccessManagerCustomStorageLocation = 0x77301bc69e8248c80abb894217605b71fa89ea6a9e8bdf359d9e8aa1dd62bf00;
81
-
82
- function _getAccessManagerCustomStorage() private pure returns (AccessManagerStorage storage $) {
83
- assembly {
84
- $.slot := AccessManagerCustomStorageLocation
85
- }
86
- }
87
-
88
- /**
89
- * @dev Check that the caller is authorized to perform the operation, following the restrictions encoded in
90
- * {_getAdminRestrictions}.
91
- */
92
- modifier onlyAuthorized() {
93
- _checkAuthorized();
94
- _;
95
- }
96
-
97
- function __AccessManagerCustom_init(address initialAdmin) internal onlyInitializing {
98
- __AccessManagerCustom_init_unchained(initialAdmin);
99
- }
100
-
101
- function __AccessManagerCustom_init_unchained(address initialAdmin) internal onlyInitializing {
102
- if (initialAdmin == address(0)) {
103
- revert AccessManagerInvalidInitialAdmin(address(0));
104
- }
105
-
106
- // admin is active immediately and without any execution delay.
107
- _grantRole(ADMIN_ROLE, initialAdmin, 0, 0);
108
- }
109
-
110
- // =================================================== GETTERS ====================================================
111
- /// @inheritdoc IAccessManager
112
- function canCall(
113
- address caller,
114
- address target,
115
- bytes4 selector
116
- ) public view virtual returns (bool immediate, uint32 delay) {
117
- if (isTargetClosed(target)) {
118
- return (false, 0);
119
- } else if (caller == address(this)) {
120
- // Caller is AccessManager, this means the call was sent through {execute} and it already checked
121
- // permissions. We verify that the call "identifier", which is set during {execute}, is correct.
122
- return (_isExecuting(target, selector), 0);
123
- } else {
124
- uint64 roleId = getTargetFunctionRole(target, selector);
125
- (bool isMember, uint32 currentDelay) = hasRole(roleId, caller);
126
- return isMember ? (currentDelay == 0, currentDelay) : (false, 0);
127
- }
128
- }
129
-
130
- /// @inheritdoc IAccessManager
131
- function expiration() public view virtual returns (uint32) {
132
- return 1 weeks;
133
- }
134
-
135
- /// @inheritdoc IAccessManager
136
- function minSetback() public view virtual returns (uint32) {
137
- return 5 days;
138
- }
139
-
140
- /// @inheritdoc IAccessManager
141
- function isTargetClosed(address target) public view virtual returns (bool) {
142
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
143
- return $._targets[target].closed;
144
- }
145
-
146
- /// @inheritdoc IAccessManager
147
- function getTargetFunctionRole(address target, bytes4 selector) public view virtual returns (uint64) {
148
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
149
- return $._targets[target].allowedRoles[selector];
150
- }
151
-
152
- /// @inheritdoc IAccessManager
153
- function getTargetAdminDelay(address target) public view virtual returns (uint32) {
154
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
155
- return $._targets[target].adminDelay.get();
156
- }
157
-
158
- /// @inheritdoc IAccessManager
159
- function getRoleAdmin(uint64 roleId) public view virtual returns (uint64) {
160
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
161
- return $._roles[roleId].admin;
162
- }
163
-
164
- /// @inheritdoc IAccessManager
165
- function getRoleGuardian(uint64 roleId) public view virtual returns (uint64) {
166
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
167
- return $._roles[roleId].guardian;
168
- }
169
-
170
- /// @inheritdoc IAccessManager
171
- function getRoleGrantDelay(uint64 roleId) public view virtual returns (uint32) {
172
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
173
- return $._roles[roleId].grantDelay.get();
174
- }
175
-
176
- /// @inheritdoc IAccessManager
177
- function getAccess(
178
- uint64 roleId,
179
- address account
180
- ) public view virtual returns (uint48 since, uint32 currentDelay, uint32 pendingDelay, uint48 effect) {
181
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
182
- Access storage access = $._roles[roleId].members[account];
183
-
184
- since = access.since;
185
- (currentDelay, pendingDelay, effect) = access.delay.getFull();
186
-
187
- return (since, currentDelay, pendingDelay, effect);
188
- }
189
-
190
- /// @inheritdoc IAccessManager
191
- function hasRole(
192
- uint64 roleId,
193
- address account
194
- ) public view virtual returns (bool isMember, uint32 executionDelay) {
195
- if (roleId == PUBLIC_ROLE) {
196
- return (true, 0);
197
- } else {
198
- (uint48 hasRoleSince, uint32 currentDelay, , ) = getAccess(roleId, account);
199
- return (hasRoleSince != 0 && hasRoleSince <= Time.timestamp(), currentDelay);
200
- }
201
- }
202
-
203
- // =============================================== ROLE MANAGEMENT ===============================================
204
- /// @inheritdoc IAccessManager
205
- function labelRole(uint64 roleId, string calldata label) public virtual onlyAuthorized {
206
- if (roleId == ADMIN_ROLE || roleId == PUBLIC_ROLE) {
207
- revert AccessManagerLockedRole(roleId);
208
- }
209
- emit RoleLabel(roleId, label);
210
- }
211
-
212
- /// @inheritdoc IAccessManager
213
- function grantRole(uint64 roleId, address account, uint32 executionDelay) public virtual onlyAuthorized {
214
- _grantRole(roleId, account, getRoleGrantDelay(roleId), executionDelay);
215
- }
216
-
217
- /// @inheritdoc IAccessManager
218
- function revokeRole(uint64 roleId, address account) public virtual onlyAuthorized {
219
- _revokeRole(roleId, account);
220
- }
221
-
222
- /// @inheritdoc IAccessManager
223
- function renounceRole(uint64 roleId, address callerConfirmation) public virtual {
224
- if (callerConfirmation != _msgSender()) {
225
- revert AccessManagerBadConfirmation();
226
- }
227
- _revokeRole(roleId, callerConfirmation);
228
- }
229
-
230
- /// @inheritdoc IAccessManager
231
- function setRoleAdmin(uint64 roleId, uint64 admin) public virtual onlyAuthorized {
232
- _setRoleAdmin(roleId, admin);
233
- }
234
-
235
- /// @inheritdoc IAccessManager
236
- function setRoleGuardian(uint64 roleId, uint64 guardian) public virtual onlyAuthorized {
237
- _setRoleGuardian(roleId, guardian);
238
- }
239
-
240
- /// @inheritdoc IAccessManager
241
- function setGrantDelay(uint64 roleId, uint32 newDelay) public virtual onlyAuthorized {
242
- _setGrantDelay(roleId, newDelay);
243
- }
244
-
245
- /**
246
- * @dev Internal version of {grantRole} without access control. Returns true if the role was newly granted.
247
- *
248
- * Emits a {RoleGranted} event.
249
- */
250
- function _grantRole(
251
- uint64 roleId,
252
- address account,
253
- uint32 grantDelay,
254
- uint32 executionDelay
255
- ) internal virtual returns (bool) {
256
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
257
- if (roleId == PUBLIC_ROLE) {
258
- revert AccessManagerLockedRole(roleId);
259
- }
260
-
261
- bool newMember = $._roles[roleId].members[account].since == 0;
262
- uint48 since;
263
-
264
- if (newMember) {
265
- since = Time.timestamp() + grantDelay;
266
- $._roles[roleId].members[account] = Access({since: since, delay: executionDelay.toDelay()});
267
- } else {
268
- // No setback here. Value can be reset by doing revoke + grant, effectively allowing the admin to perform
269
- // any change to the execution delay within the duration of the role admin delay.
270
- ($._roles[roleId].members[account].delay, since) = $._roles[roleId].members[account].delay.withUpdate(
271
- executionDelay,
272
- 0
273
- );
274
- }
275
-
276
- emit RoleGranted(roleId, account, executionDelay, since, newMember);
277
- return newMember;
278
- }
279
-
280
- /**
281
- * @dev Internal version of {revokeRole} without access control. This logic is also used by {renounceRole}.
282
- * Returns true if the role was previously granted.
283
- *
284
- * Emits a {RoleRevoked} event if the account had the role.
285
- */
286
- function _revokeRole(uint64 roleId, address account) internal virtual returns (bool) {
287
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
288
- if (roleId == PUBLIC_ROLE) {
289
- revert AccessManagerLockedRole(roleId);
290
- }
291
-
292
- if ($._roles[roleId].members[account].since == 0) {
293
- return false;
294
- }
295
-
296
- delete $._roles[roleId].members[account];
297
-
298
- emit RoleRevoked(roleId, account);
299
- return true;
300
- }
301
-
302
- /**
303
- * @dev Internal version of {setRoleAdmin} without access control.
304
- *
305
- * Emits a {RoleAdminChanged} event.
306
- *
307
- * NOTE: Setting the admin role as the `PUBLIC_ROLE` is allowed, but it will effectively allow
308
- * anyone to set grant or revoke such role.
309
- */
310
- function _setRoleAdmin(uint64 roleId, uint64 admin) internal virtual {
311
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
312
- if (roleId == ADMIN_ROLE || roleId == PUBLIC_ROLE) {
313
- revert AccessManagerLockedRole(roleId);
314
- }
315
-
316
- $._roles[roleId].admin = admin;
317
-
318
- emit RoleAdminChanged(roleId, admin);
319
- }
320
-
321
- /**
322
- * @dev Internal version of {setRoleGuardian} without access control.
323
- *
324
- * Emits a {RoleGuardianChanged} event.
325
- *
326
- * NOTE: Setting the guardian role as the `PUBLIC_ROLE` is allowed, but it will effectively allow
327
- * anyone to cancel any scheduled operation for such role.
328
- */
329
- function _setRoleGuardian(uint64 roleId, uint64 guardian) internal virtual {
330
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
331
- if (roleId == ADMIN_ROLE || roleId == PUBLIC_ROLE) {
332
- revert AccessManagerLockedRole(roleId);
333
- }
334
-
335
- $._roles[roleId].guardian = guardian;
336
-
337
- emit RoleGuardianChanged(roleId, guardian);
338
- }
339
-
340
- /**
341
- * @dev Internal version of {setGrantDelay} without access control.
342
- *
343
- * Emits a {RoleGrantDelayChanged} event.
344
- */
345
- function _setGrantDelay(uint64 roleId, uint32 newDelay) internal virtual {
346
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
347
- if (roleId == PUBLIC_ROLE) {
348
- revert AccessManagerLockedRole(roleId);
349
- }
350
-
351
- uint48 effect;
352
- ($._roles[roleId].grantDelay, effect) = $._roles[roleId].grantDelay.withUpdate(newDelay, minSetback());
353
-
354
- emit RoleGrantDelayChanged(roleId, newDelay, effect);
355
- }
356
-
357
- // ============================================= FUNCTION MANAGEMENT ==============================================
358
- /// @inheritdoc IAccessManager
359
- function setTargetFunctionRole(
360
- address target,
361
- bytes4[] calldata selectors,
362
- uint64 roleId
363
- ) public virtual onlyAuthorized {
364
- for (uint256 i = 0; i < selectors.length; ++i) {
365
- _setTargetFunctionRole(target, selectors[i], roleId);
366
- }
367
- }
368
-
369
- /**
370
- * @dev Internal version of {setTargetFunctionRole} without access control.
371
- *
372
- * Emits a {TargetFunctionRoleUpdated} event.
373
- */
374
- function _setTargetFunctionRole(address target, bytes4 selector, uint64 roleId) internal virtual {
375
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
376
- $._targets[target].allowedRoles[selector] = roleId;
377
- emit TargetFunctionRoleUpdated(target, selector, roleId);
378
- }
379
-
380
- /// @inheritdoc IAccessManager
381
- function setTargetAdminDelay(address target, uint32 newDelay) public virtual onlyAuthorized {
382
- _setTargetAdminDelay(target, newDelay);
383
- }
384
-
385
- /**
386
- * @dev Internal version of {setTargetAdminDelay} without access control.
387
- *
388
- * Emits a {TargetAdminDelayUpdated} event.
389
- */
390
- function _setTargetAdminDelay(address target, uint32 newDelay) internal virtual {
391
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
392
- uint48 effect;
393
- ($._targets[target].adminDelay, effect) = $._targets[target].adminDelay.withUpdate(newDelay, minSetback());
394
- emit TargetAdminDelayUpdated(target, newDelay, effect);
395
- }
396
-
397
- // =============================================== MODE MANAGEMENT ================================================
398
- /// @inheritdoc IAccessManager
399
- function setTargetClosed(address target, bool closed) public virtual onlyAuthorized {
400
- _setTargetClosed(target, closed);
401
- }
402
-
403
- /**
404
- * @dev Set the closed flag for a contract. This is an internal setter with no access restrictions.
405
- *
406
- * Emits a {TargetClosed} event.
407
- */
408
- function _setTargetClosed(address target, bool closed) internal virtual {
409
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
410
- if (target == address(this)) {
411
- revert AccessManagerLockedAccount(target);
412
- }
413
- $._targets[target].closed = closed;
414
- emit TargetClosed(target, closed);
415
- }
416
-
417
- // ============================================== DELAYED OPERATIONS ==============================================
418
- /// @inheritdoc IAccessManager
419
- function getSchedule(bytes32 id) public view virtual returns (uint48) {
420
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
421
- uint48 timepoint = $._schedules[id].timepoint;
422
- return _isExpired(timepoint) ? 0 : timepoint;
423
- }
424
-
425
- /// @inheritdoc IAccessManager
426
- function getNonce(bytes32 id) public view virtual returns (uint32) {
427
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
428
- return $._schedules[id].nonce;
429
- }
430
-
431
- /// @inheritdoc IAccessManager
432
- function schedule(
433
- address target,
434
- bytes calldata data,
435
- uint48 when
436
- ) public virtual returns (bytes32 operationId, uint32 nonce) {
437
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
438
- address caller = _msgSender();
439
-
440
- // Fetch restrictions that apply to the caller on the targeted function
441
- (, uint32 setback) = _canCallExtended(caller, target, data);
442
-
443
- uint48 minWhen = Time.timestamp() + setback;
444
-
445
- // if call with delay is not authorized, or if requested timing is too soon
446
- if (setback == 0 || (when > 0 && when < minWhen)) {
447
- revert AccessManagerUnauthorizedCall(caller, target, _checkSelector(data));
448
- }
449
-
450
- // Reuse variable due to stack too deep
451
- when = uint48(Math.max(when, minWhen)); // cast is safe: both inputs are uint48
452
-
453
- // If caller is authorised, schedule operation
454
- operationId = hashOperation(caller, target, data);
455
-
456
- _checkNotScheduled(operationId);
457
-
458
- unchecked {
459
- // It's not feasible to overflow the nonce in less than 1000 years
460
- nonce = $._schedules[operationId].nonce + 1;
461
- }
462
- $._schedules[operationId].timepoint = when;
463
- $._schedules[operationId].nonce = nonce;
464
- emit OperationScheduled(operationId, nonce, when, caller, target, data);
465
-
466
- // Using named return values because otherwise we get stack too deep
467
- }
468
-
469
- /**
470
- * @dev Reverts if the operation is currently scheduled and has not expired.
471
- * (Note: This function was introduced due to stack too deep errors in schedule.)
472
- */
473
- function _checkNotScheduled(bytes32 operationId) private view {
474
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
475
- uint48 prevTimepoint = $._schedules[operationId].timepoint;
476
- if (prevTimepoint != 0 && !_isExpired(prevTimepoint)) {
477
- revert AccessManagerAlreadyScheduled(operationId);
478
- }
479
- }
480
-
481
- /// @inheritdoc IAccessManager
482
- // Reentrancy is not an issue because permissions are checked on msg.sender. Additionally,
483
- // _consumeScheduledOp guarantees a scheduled operation is only executed once.
484
- // slither-disable-next-line reentrancy-no-eth
485
- function execute(address target, bytes calldata data) public payable virtual returns (uint32) {
486
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
487
- address caller = _msgSender();
488
-
489
- // Fetch restrictions that apply to the caller on the targeted function
490
- (bool immediate, uint32 setback) = _canCallExtended(caller, target, data);
491
-
492
- // If caller is not authorised, revert
493
- if (!immediate && setback == 0) {
494
- revert AccessManagerUnauthorizedCall(caller, target, _checkSelector(data));
495
- }
496
-
497
- bytes32 operationId = hashOperation(caller, target, data);
498
- uint32 nonce;
499
-
500
- // If caller is authorised, check operation was scheduled early enough
501
- // Consume an available schedule even if there is no currently enforced delay
502
- if (setback != 0 || getSchedule(operationId) != 0) {
503
- nonce = _consumeScheduledOp(operationId);
504
- }
505
-
506
- // Mark the target and selector as authorised
507
- bytes32 executionIdBefore = $._executionId;
508
- $._executionId = _hashExecutionId(target, _checkSelector(data));
509
-
510
- // Perform call
511
- Address.functionCallWithValue(target, data, msg.value);
512
-
513
- // Reset execute identifier
514
- $._executionId = executionIdBefore;
515
-
516
- return nonce;
517
- }
518
-
519
- /// @inheritdoc IAccessManager
520
- function cancel(address caller, address target, bytes calldata data) public virtual returns (uint32) {
521
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
522
- address msgsender = _msgSender();
523
- bytes4 selector = _checkSelector(data);
524
-
525
- bytes32 operationId = hashOperation(caller, target, data);
526
- if ($._schedules[operationId].timepoint == 0) {
527
- revert AccessManagerNotScheduled(operationId);
528
- } else if (caller != msgsender) {
529
- // calls can only be canceled by the account that scheduled them, a global admin, or by a guardian of the required role.
530
- (bool isAdmin, ) = hasRole(ADMIN_ROLE, msgsender);
531
- (bool isGuardian, ) = hasRole(getRoleGuardian(getTargetFunctionRole(target, selector)), msgsender);
532
- if (!isAdmin && !isGuardian) {
533
- revert AccessManagerUnauthorizedCancel(msgsender, caller, target, selector);
534
- }
535
- }
536
-
537
- delete $._schedules[operationId].timepoint; // reset the timepoint, keep the nonce
538
- uint32 nonce = $._schedules[operationId].nonce;
539
- emit OperationCanceled(operationId, nonce);
540
-
541
- return nonce;
542
- }
543
-
544
- /// @inheritdoc IAccessManager
545
- function consumeScheduledOp(address caller, bytes calldata data) public virtual {
546
- address target = _msgSender();
547
- if (IAccessManaged(target).isConsumingScheduledOp() != IAccessManaged.isConsumingScheduledOp.selector) {
548
- revert AccessManagerUnauthorizedConsume(target);
549
- }
550
- _consumeScheduledOp(hashOperation(caller, target, data));
551
- }
552
-
553
- /**
554
- * @dev Internal variant of {consumeScheduledOp} that operates on bytes32 operationId.
555
- *
556
- * Returns the nonce of the scheduled operation that is consumed.
557
- */
558
- function _consumeScheduledOp(bytes32 operationId) internal virtual returns (uint32) {
559
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
560
- uint48 timepoint = $._schedules[operationId].timepoint;
561
- uint32 nonce = $._schedules[operationId].nonce;
562
-
563
- if (timepoint == 0) {
564
- revert AccessManagerNotScheduled(operationId);
565
- } else if (timepoint > Time.timestamp()) {
566
- revert AccessManagerNotReady(operationId);
567
- } else if (_isExpired(timepoint)) {
568
- revert AccessManagerExpired(operationId);
569
- }
570
-
571
- delete $._schedules[operationId].timepoint; // reset the timepoint, keep the nonce
572
- emit OperationExecuted(operationId, nonce);
573
-
574
- return nonce;
575
- }
576
-
577
- /// @inheritdoc IAccessManager
578
- function hashOperation(address caller, address target, bytes calldata data) public view virtual returns (bytes32) {
579
- return keccak256(abi.encode(caller, target, data));
580
- }
581
-
582
- // ==================================================== OTHERS ====================================================
583
- /// @inheritdoc IAccessManager
584
- function updateAuthority(address target, address newAuthority) public virtual onlyAuthorized {
585
- IAccessManaged(target).setAuthority(newAuthority);
586
- }
587
-
588
- // ================================================= ADMIN LOGIC ==================================================
589
- /**
590
- * @dev Check if the current call is authorized according to admin logic.
591
- */
592
- function _checkAuthorized() private {
593
- address caller = msg.sender;//_msgSender();
594
- (bool immediate, uint32 delay) = _canCallSelf(caller, _msgData());
595
- if (!immediate) {
596
- if (delay == 0) {
597
- (, uint64 requiredRole, ) = _getAdminRestrictions(_msgData());
598
- revert AccessManagerUnauthorizedAccount(caller, requiredRole);
599
- } else {
600
- _consumeScheduledOp(hashOperation(caller, address(this), _msgData()));
601
- }
602
- }
603
- }
604
-
605
- /**
606
- * @dev Get the admin restrictions of a given function call based on the function and arguments involved.
607
- *
608
- * Returns:
609
- * - bool restricted: does this data match a restricted operation
610
- * - uint64: which role is this operation restricted to
611
- * - uint32: minimum delay to enforce for that operation (max between operation's delay and admin's execution delay)
612
- */
613
- /**
614
- * @dev Get the admin restrictions of a given function call based on the function and arguments involved.
615
- *
616
- * Returns:
617
- * - bool restricted: does this data match a restricted operation
618
- * - uint64: which role is this operation restricted to
619
- * - uint32: minimum delay to enforce for that operation (max between operation's delay and admin's execution delay)
620
- */
621
- function _getAdminRestrictions(
622
- bytes calldata data
623
- ) internal virtual view returns (bool restricted, uint64 roleAdminId, uint32 executionDelay) {
624
- if (data.length < 4) {
625
- return (false, 0, 0);
626
- }
627
-
628
- bytes4 selector = _checkSelector(data);
629
-
630
- // Restricted to ADMIN with no delay beside any execution delay the caller may have
631
- if (
632
- selector == this.labelRole.selector ||
633
- selector == this.setRoleAdmin.selector ||
634
- selector == this.setRoleGuardian.selector ||
635
- selector == this.setGrantDelay.selector ||
636
- selector == this.setTargetAdminDelay.selector
637
- ) {
638
- return (true, ADMIN_ROLE, 0);
639
- }
640
-
641
- // Restricted to ADMIN with the admin delay corresponding to the target
642
- if (
643
- selector == this.updateAuthority.selector ||
644
- selector == this.setTargetClosed.selector ||
645
- selector == this.setTargetFunctionRole.selector
646
- ) {
647
- // First argument is a target.
648
- address target = abi.decode(data[0x04:0x24], (address));// who is target???
649
- uint32 delay = getTargetAdminDelay(target);
650
- return (true, ADMIN_ROLE, delay);
651
- }
652
-
653
- // Restricted to that role's admin with no delay beside any execution delay the caller may have.
654
- if (selector == this.grantRole.selector || selector == this.revokeRole.selector) {
655
- // First argument is a roleId.
656
- uint64 roleId = abi.decode(data[0x04:0x24], (uint64));
657
- return (true, getRoleAdmin(roleId), 0);
658
- }
659
-
660
- return (false, 0, 0);
661
- }
662
-
663
- // =================================================== HELPERS ====================================================
664
- /**
665
- * @dev An extended version of {canCall} for internal usage that checks {_canCallSelf}
666
- * when the target is this contract.
667
- *
668
- * Returns:
669
- * - bool immediate: whether the operation can be executed immediately (with no delay)
670
- * - uint32 delay: the execution delay
671
- */
672
- function _canCallExtended(
673
- address caller,
674
- address target,
675
- bytes calldata data
676
- ) private view returns (bool immediate, uint32 delay) {
677
- if (target == address(this)) {
678
- return _canCallSelf(caller, data);
679
- } else {
680
- return data.length < 4 ? (false, 0) : canCall(caller, target, _checkSelector(data));
681
- }
682
- }
683
-
684
- /**
685
- * @dev A version of {canCall} that checks for admin restrictions in this contract.
686
- */
687
- function _canCallSelf(address caller, bytes calldata data) private view returns (bool immediate, uint32 delay) {
688
- if (data.length < 4) {
689
- return (false, 0);
690
- }
691
-
692
- if (caller == address(this)) {
693
- // Caller is AccessManager, this means the call was sent through {execute} and it already checked
694
- // permissions. We verify that the call "identifier", which is set during {execute}, is correct.
695
- return (_isExecuting(address(this), _checkSelector(data)), 0);
696
- }
697
-
698
- (bool enabled, uint64 roleId, uint32 operationDelay) = _getAdminRestrictions(data);
699
- if (!enabled) {
700
- return (false, 0);
701
- }
702
-
703
- (bool inRole, uint32 executionDelay) = hasRole(roleId, caller);
704
- if (!inRole) {
705
- return (false, 0);
706
- }
707
-
708
- // downcast is safe because both options are uint32
709
- delay = uint32(Math.max(operationDelay, executionDelay));
710
- return (delay == 0, delay);
711
- }
712
-
713
- /**
714
- * @dev Returns true if a call with `target` and `selector` is being executed via {executed}.
715
- */
716
- function _isExecuting(address target, bytes4 selector) private view returns (bool) {
717
- AccessManagerStorage storage $ = _getAccessManagerCustomStorage();
718
- return $._executionId == _hashExecutionId(target, selector);
719
- }
720
-
721
- /**
722
- * @dev Returns true if a schedule timepoint is past its expiration deadline.
723
- */
724
- function _isExpired(uint48 timepoint) private view returns (bool) {
725
- return timepoint + expiration() <= Time.timestamp();
726
- }
727
-
728
- /**
729
- * @dev Extracts the selector from calldata. Panics if data is not at least 4 bytes
730
- */
731
- function _checkSelector(bytes calldata data) internal pure returns (bytes4) {
732
- return bytes4(data[0:4]);
733
- }
734
-
735
- /**
736
- * @dev Hashing function for execute protection
737
- */
738
- function _hashExecutionId(address target, bytes4 selector) private pure returns (bytes32) {
739
- return keccak256(abi.encode(target, selector));
740
- }
741
- }