@etherisc/gif-next 0.0.2-fd4931b-974 → 0.0.2-fd4ee14-428
Sign up to get free protection for your applications and to get access to all the features.
- package/README.md +2 -1
- package/artifacts/contracts/distribution/Distribution.sol/Distribution.dbg.json +1 -1
- package/artifacts/contracts/distribution/Distribution.sol/Distribution.json +19 -13
- package/artifacts/contracts/distribution/DistributionService.sol/DistributionService.dbg.json +1 -1
- package/artifacts/contracts/distribution/DistributionService.sol/DistributionService.json +115 -80
- package/artifacts/contracts/distribution/DistributionServiceManager.sol/DistributionServiceManager.dbg.json +1 -1
- package/artifacts/contracts/distribution/DistributionServiceManager.sol/DistributionServiceManager.json +81 -54
- package/artifacts/contracts/distribution/IDistributionComponent.sol/IDistributionComponent.dbg.json +1 -1
- package/artifacts/contracts/distribution/IDistributionComponent.sol/IDistributionComponent.json +11 -5
- package/artifacts/contracts/distribution/IDistributionService.sol/IDistributionService.dbg.json +1 -1
- package/artifacts/contracts/distribution/IDistributionService.sol/IDistributionService.json +20 -1
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.dbg.json +1 -1
- package/artifacts/contracts/instance/BundleManager.sol/BundleManager.json +32 -101
- package/artifacts/contracts/instance/IInstance.sol/IInstance.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstance.sol/IInstance.json +83 -71
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/IInstanceService.sol/IInstanceService.json +121 -12
- package/artifacts/contracts/instance/Instance.sol/Instance.dbg.json +1 -1
- package/artifacts/contracts/instance/Instance.sol/Instance.json +105 -85
- package/artifacts/contracts/instance/InstanceAdmin.sol/InstanceAdmin.dbg.json +4 -0
- package/artifacts/contracts/instance/InstanceAdmin.sol/InstanceAdmin.json +708 -0
- package/artifacts/contracts/instance/InstanceAuthorizationsLib.sol/InstanceAuthorizationsLib.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceAuthorizationsLib.sol/InstanceAuthorizationsLib.json +126 -30
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceReader.sol/InstanceReader.json +195 -64
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceService.sol/InstanceService.json +206 -49
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceServiceManager.sol/InstanceServiceManager.json +74 -31
- package/artifacts/contracts/instance/InstanceStore.sol/InstanceStore.dbg.json +1 -1
- package/artifacts/contracts/instance/InstanceStore.sol/InstanceStore.json +248 -118
- package/artifacts/contracts/instance/base/BalanceStore.sol/BalanceStore.dbg.json +1 -1
- package/artifacts/contracts/instance/base/BalanceStore.sol/BalanceStore.json +2 -2
- package/artifacts/contracts/instance/base/Cloneable.sol/Cloneable.dbg.json +1 -1
- package/artifacts/contracts/instance/base/Cloneable.sol/Cloneable.json +0 -53
- package/artifacts/contracts/instance/base/ObjectCounter.sol/ObjectCounter.dbg.json +4 -0
- package/artifacts/contracts/instance/base/ObjectCounter.sol/ObjectCounter.json +10 -0
- package/artifacts/contracts/instance/base/ObjectManager.sol/ObjectManager.dbg.json +1 -1
- package/artifacts/contracts/instance/base/ObjectManager.sol/ObjectManager.json +2 -71
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IAccess.sol/IAccess.json +8 -116
- package/artifacts/contracts/instance/module/IBundle.sol/IBundle.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IComponents.sol/IComponents.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IDistribution.sol/IDistribution.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IPolicy.sol/IPolicy.dbg.json +1 -1
- package/artifacts/contracts/instance/module/IRisk.sol/IRisk.dbg.json +1 -1
- package/artifacts/contracts/mock/Dip.sol/Dip.dbg.json +1 -1
- package/artifacts/contracts/oracle/IOracle.sol/IOracle.dbg.json +4 -0
- package/artifacts/contracts/oracle/IOracle.sol/IOracle.json +10 -0
- package/artifacts/contracts/oracle/IOracleComponent.sol/IOracleComponent.dbg.json +4 -0
- package/artifacts/contracts/oracle/IOracleComponent.sol/IOracleComponent.json +759 -0
- package/artifacts/contracts/oracle/IOracleService.sol/IOracleService.dbg.json +4 -0
- package/artifacts/contracts/oracle/IOracleService.sol/IOracleService.json +675 -0
- package/artifacts/contracts/oracle/Oracle.sol/Oracle.dbg.json +4 -0
- package/artifacts/contracts/oracle/Oracle.sol/Oracle.json +1146 -0
- package/artifacts/contracts/oracle/OracleService.sol/OracleService.dbg.json +4 -0
- package/artifacts/contracts/oracle/OracleService.sol/OracleService.json +1034 -0
- package/artifacts/contracts/oracle/OracleServiceManager.sol/OracleServiceManager.dbg.json +4 -0
- package/artifacts/contracts/oracle/OracleServiceManager.sol/OracleServiceManager.json +730 -0
- package/artifacts/contracts/pool/BundleService.sol/BundleService.dbg.json +1 -1
- package/artifacts/contracts/pool/BundleService.sol/BundleService.json +91 -48
- package/artifacts/contracts/pool/BundleServiceManager.sol/BundleServiceManager.dbg.json +1 -1
- package/artifacts/contracts/pool/BundleServiceManager.sol/BundleServiceManager.json +69 -38
- package/artifacts/contracts/pool/IBundleService.sol/IBundleService.dbg.json +1 -1
- package/artifacts/contracts/pool/IBundleService.sol/IBundleService.json +20 -1
- package/artifacts/contracts/pool/IPoolComponent.sol/IPoolComponent.dbg.json +1 -1
- package/artifacts/contracts/pool/IPoolComponent.sol/IPoolComponent.json +11 -5
- package/artifacts/contracts/pool/IPoolService.sol/IPoolService.dbg.json +1 -1
- package/artifacts/contracts/pool/IPoolService.sol/IPoolService.json +35 -1
- package/artifacts/contracts/pool/Pool.sol/Pool.dbg.json +1 -1
- package/artifacts/contracts/pool/Pool.sol/Pool.json +18 -12
- package/artifacts/contracts/pool/PoolService.sol/PoolService.dbg.json +1 -1
- package/artifacts/contracts/pool/PoolService.sol/PoolService.json +84 -42
- package/artifacts/contracts/pool/PoolServiceManager.sol/PoolServiceManager.dbg.json +1 -1
- package/artifacts/contracts/pool/PoolServiceManager.sol/PoolServiceManager.json +58 -35
- package/artifacts/contracts/product/ApplicationService.sol/ApplicationService.dbg.json +1 -1
- package/artifacts/contracts/product/ApplicationService.sol/ApplicationService.json +79 -36
- package/artifacts/contracts/product/ApplicationServiceManager.sol/ApplicationServiceManager.dbg.json +1 -1
- package/artifacts/contracts/product/ApplicationServiceManager.sol/ApplicationServiceManager.json +63 -32
- package/artifacts/contracts/product/ClaimService.sol/ClaimService.dbg.json +1 -1
- package/artifacts/contracts/product/ClaimService.sol/ClaimService.json +119 -68
- package/artifacts/contracts/product/ClaimServiceManager.sol/ClaimServiceManager.dbg.json +1 -1
- package/artifacts/contracts/product/ClaimServiceManager.sol/ClaimServiceManager.json +83 -48
- package/artifacts/contracts/product/IApplicationService.sol/IApplicationService.dbg.json +1 -1
- package/artifacts/contracts/product/IApplicationService.sol/IApplicationService.json +20 -1
- package/artifacts/contracts/product/IClaimService.sol/IClaimService.dbg.json +1 -1
- package/artifacts/contracts/product/IClaimService.sol/IClaimService.json +20 -1
- package/artifacts/contracts/product/IPolicyService.sol/IPolicyService.dbg.json +1 -1
- package/artifacts/contracts/product/IPolicyService.sol/IPolicyService.json +20 -1
- package/artifacts/contracts/product/IPricingService.sol/IPricingService.dbg.json +1 -1
- package/artifacts/contracts/product/IPricingService.sol/IPricingService.json +20 -1
- package/artifacts/contracts/product/IProductComponent.sol/IProductComponent.dbg.json +1 -1
- package/artifacts/contracts/product/IProductComponent.sol/IProductComponent.json +11 -5
- package/artifacts/contracts/product/IProductService.sol/IProductService.dbg.json +1 -1
- package/artifacts/contracts/product/IProductService.sol/IProductService.json +20 -1
- package/artifacts/contracts/product/PolicyService.sol/PolicyService.dbg.json +1 -1
- package/artifacts/contracts/product/PolicyService.sol/PolicyService.json +97 -46
- package/artifacts/contracts/product/PolicyServiceManager.sol/PolicyServiceManager.dbg.json +1 -1
- package/artifacts/contracts/product/PolicyServiceManager.sol/PolicyServiceManager.json +72 -37
- package/artifacts/contracts/product/PricingService.sol/PricingService.dbg.json +1 -1
- package/artifacts/contracts/product/PricingService.sol/PricingService.json +105 -62
- package/artifacts/contracts/product/PricingServiceManager.sol/PricingServiceManager.dbg.json +1 -1
- package/artifacts/contracts/product/PricingServiceManager.sol/PricingServiceManager.json +76 -45
- package/artifacts/contracts/product/Product.sol/Product.dbg.json +1 -1
- package/artifacts/contracts/product/Product.sol/Product.json +18 -12
- package/artifacts/contracts/product/ProductService.sol/ProductService.dbg.json +1 -1
- package/artifacts/contracts/product/ProductService.sol/ProductService.json +61 -26
- package/artifacts/contracts/product/ProductServiceManager.sol/ProductServiceManager.dbg.json +1 -1
- package/artifacts/contracts/product/ProductServiceManager.sol/ProductServiceManager.json +54 -27
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.dbg.json +1 -1
- package/artifacts/contracts/registry/ChainNft.sol/ChainNft.json +2 -2
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistry.sol/IRegistry.json +82 -45
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/IRegistryService.sol/IRegistryService.json +31 -1
- package/artifacts/contracts/registry/IServiceAuthorization.sol/IServiceAuthorization.dbg.json +4 -0
- package/artifacts/contracts/registry/IServiceAuthorization.sol/IServiceAuthorization.json +129 -0
- package/artifacts/contracts/registry/ITransferInterceptor.sol/ITransferInterceptor.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.dbg.json +1 -1
- package/artifacts/contracts/registry/Registry.sol/Registry.json +254 -97
- package/artifacts/contracts/registry/RegistryAdmin.sol/RegistryAdmin.dbg.json +4 -0
- package/artifacts/contracts/registry/RegistryAdmin.sol/RegistryAdmin.json +1901 -0
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryService.sol/RegistryService.json +69 -15
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.dbg.json +1 -1
- package/artifacts/contracts/registry/RegistryServiceManager.sol/RegistryServiceManager.json +46 -30
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.dbg.json +1 -1
- package/artifacts/contracts/registry/ReleaseManager.sol/ReleaseManager.json +288 -182
- package/artifacts/contracts/registry/ServiceAuthorization.sol/ServiceAuthorization.dbg.json +4 -0
- package/artifacts/contracts/registry/ServiceAuthorization.sol/ServiceAuthorization.json +171 -0
- package/artifacts/contracts/registry/ServiceAuthorizationV3.sol/ServiceAuthorizationV3.dbg.json +4 -0
- package/artifacts/contracts/registry/ServiceAuthorizationV3.sol/ServiceAuthorizationV3.json +187 -0
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.dbg.json +1 -1
- package/artifacts/contracts/registry/TokenRegistry.sol/TokenRegistry.json +46 -177
- package/artifacts/contracts/shared/AccessAdmin.sol/AccessAdmin.dbg.json +4 -0
- package/artifacts/contracts/shared/AccessAdmin.sol/AccessAdmin.json +1559 -0
- package/artifacts/contracts/shared/AccessManagerCustom.sol/AccessManagerCustom.dbg.json +4 -0
- package/artifacts/contracts/shared/AccessManagerCustom.sol/AccessManagerCustom.json +1193 -0
- package/artifacts/contracts/shared/AccessManagerExtended.sol/AccessManagerExtended.dbg.json +4 -0
- package/artifacts/contracts/shared/AccessManagerExtended.sol/AccessManagerExtended.json +1747 -0
- package/artifacts/contracts/shared/AccessManagerExtendedInitializeable.sol/AccessManagerExtendedInitializeable.dbg.json +4 -0
- package/artifacts/contracts/shared/AccessManagerExtendedInitializeable.sol/AccessManagerExtendedInitializeable.json +1760 -0
- package/artifacts/contracts/shared/AccessManagerExtendedWithDisable.sol/AccessManagerExtendedWithDisable.dbg.json +4 -0
- package/artifacts/contracts/shared/AccessManagerExtendedWithDisable.sol/AccessManagerExtendedWithDisable.json +1838 -0
- package/artifacts/contracts/shared/AccessManagerExtendedWithDisableInitializeable.sol/AccessManagerExtendedWithDisableInitializeable.dbg.json +4 -0
- package/artifacts/contracts/shared/AccessManagerExtendedWithDisableInitializeable.sol/AccessManagerExtendedWithDisableInitializeable.json +1856 -0
- package/artifacts/contracts/shared/Component.sol/Component.dbg.json +1 -1
- package/artifacts/contracts/shared/Component.sol/Component.json +18 -12
- package/artifacts/contracts/shared/ComponentService.sol/ComponentService.dbg.json +1 -1
- package/artifacts/contracts/shared/ComponentService.sol/ComponentService.json +120 -70
- package/artifacts/contracts/shared/ComponentServiceManager.sol/ComponentServiceManager.dbg.json +1 -1
- package/artifacts/contracts/shared/ComponentServiceManager.sol/ComponentServiceManager.json +80 -49
- package/artifacts/contracts/shared/ComponentVerifyingService.sol/ComponentVerifyingService.dbg.json +1 -1
- package/artifacts/contracts/shared/ComponentVerifyingService.sol/ComponentVerifyingService.json +20 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.dbg.json +1 -1
- package/artifacts/contracts/shared/ERC165.sol/ERC165.json +2 -2
- package/artifacts/contracts/shared/IAccessAdmin.sol/IAccessAdmin.dbg.json +4 -0
- package/artifacts/contracts/shared/IAccessAdmin.sol/IAccessAdmin.json +1189 -0
- package/artifacts/contracts/shared/IAccessManagerExtended.sol/IAccessManagerExtended.dbg.json +4 -0
- package/artifacts/contracts/shared/IAccessManagerExtended.sol/IAccessManagerExtended.json +1562 -0
- package/artifacts/contracts/shared/IAccessManagerExtendedWithDisable.sol/IAccessManagerExtendedWithDisable.dbg.json +4 -0
- package/artifacts/contracts/shared/IAccessManagerExtendedWithDisable.sol/IAccessManagerExtendedWithDisable.json +1600 -0
- package/artifacts/contracts/shared/IComponent.sol/IComponent.dbg.json +1 -1
- package/artifacts/contracts/shared/IComponent.sol/IComponent.json +11 -5
- package/artifacts/contracts/shared/IComponentService.sol/IComponentService.dbg.json +1 -1
- package/artifacts/contracts/shared/IComponentService.sol/IComponentService.json +27 -1
- package/artifacts/contracts/shared/IInstanceLinkedComponent.sol/IInstanceLinkedComponent.dbg.json +1 -1
- package/artifacts/contracts/shared/IInstanceLinkedComponent.sol/IInstanceLinkedComponent.json +11 -5
- package/artifacts/contracts/shared/IKeyValueStore.sol/IKeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/shared/IKeyValueStore.sol/IKeyValueStore.json +0 -10
- package/artifacts/contracts/shared/ILifecycle.sol/ILifecycle.dbg.json +1 -1
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/INftOwnable.sol/INftOwnable.json +7 -1
- package/artifacts/contracts/shared/IPolicyHolder.sol/IPolicyHolder.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.dbg.json +1 -1
- package/artifacts/contracts/shared/IRegisterable.sol/IRegisterable.json +7 -1
- package/artifacts/contracts/shared/IRegistryLinked.sol/IRegistryLinked.dbg.json +1 -1
- package/artifacts/contracts/shared/IService.sol/IService.dbg.json +1 -1
- package/artifacts/contracts/shared/IService.sol/IService.json +20 -1
- package/artifacts/contracts/shared/IVersionable.sol/IVersionable.dbg.json +1 -1
- package/artifacts/contracts/shared/InitializableCustom.sol/InitializableCustom.dbg.json +4 -0
- package/artifacts/contracts/shared/InitializableCustom.sol/InitializableCustom.json +39 -0
- package/artifacts/contracts/shared/InstanceLinkedComponent.sol/InstanceLinkedComponent.dbg.json +1 -1
- package/artifacts/contracts/shared/InstanceLinkedComponent.sol/InstanceLinkedComponent.json +18 -12
- package/artifacts/contracts/shared/KeyValueStore.sol/KeyValueStore.dbg.json +1 -1
- package/artifacts/contracts/shared/KeyValueStore.sol/KeyValueStore.json +10 -20
- package/artifacts/contracts/shared/Lifecycle.sol/Lifecycle.dbg.json +1 -1
- package/artifacts/contracts/shared/Lifecycle.sol/Lifecycle.json +6 -6
- package/artifacts/contracts/shared/NftIdSetManager.sol/NftIdSetManager.dbg.json +1 -1
- package/artifacts/contracts/shared/NftIdSetManager.sol/NftIdSetManager.json +27 -35
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.dbg.json +1 -1
- package/artifacts/contracts/shared/NftOwnable.sol/NftOwnable.json +13 -7
- package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.dbg.json +1 -1
- package/artifacts/contracts/shared/PolicyHolder.sol/PolicyHolder.json +2 -2
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.dbg.json +1 -1
- package/artifacts/contracts/shared/ProxyManager.sol/ProxyManager.json +35 -16
- package/artifacts/contracts/shared/Registerable.sol/Registerable.dbg.json +1 -1
- package/artifacts/contracts/shared/Registerable.sol/Registerable.json +15 -9
- package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.dbg.json +1 -1
- package/artifacts/contracts/shared/RegistryLinked.sol/RegistryLinked.json +2 -2
- package/artifacts/contracts/shared/Service.sol/Service.dbg.json +1 -1
- package/artifacts/contracts/shared/Service.sol/Service.json +20 -1
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.dbg.json +1 -1
- package/artifacts/contracts/shared/TokenHandler.sol/TokenHandler.json +2 -2
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.dbg.json +1 -1
- package/artifacts/contracts/shared/UpgradableProxyWithAdmin.sol/UpgradableProxyWithAdmin.json +2 -2
- package/artifacts/contracts/shared/Versionable.sol/Versionable.dbg.json +1 -1
- package/artifacts/contracts/staking/IStaking.sol/IStaking.dbg.json +1 -1
- package/artifacts/contracts/staking/IStaking.sol/IStaking.json +247 -579
- package/artifacts/contracts/staking/IStakingService.sol/IStakingService.dbg.json +1 -1
- package/artifacts/contracts/staking/IStakingService.sol/IStakingService.json +471 -62
- package/artifacts/contracts/staking/StakeManagerLib.sol/StakeManagerLib.dbg.json +4 -0
- package/artifacts/contracts/staking/StakeManagerLib.sol/StakeManagerLib.json +460 -0
- package/artifacts/contracts/staking/Staking.sol/Staking.dbg.json +1 -1
- package/artifacts/contracts/staking/Staking.sol/Staking.json +303 -798
- package/artifacts/contracts/staking/StakingManager.sol/StakingManager.dbg.json +1 -1
- package/artifacts/contracts/staking/StakingManager.sol/StakingManager.json +81 -164
- package/artifacts/contracts/staking/StakingReader.sol/StakingReader.dbg.json +1 -1
- package/artifacts/contracts/staking/StakingReader.sol/StakingReader.json +368 -39
- package/artifacts/contracts/staking/StakingService.sol/StakingService.dbg.json +1 -1
- package/artifacts/contracts/staking/StakingService.sol/StakingService.json +503 -120
- package/artifacts/contracts/staking/StakingServiceManager.sol/StakingServiceManager.dbg.json +1 -1
- package/artifacts/contracts/staking/StakingServiceManager.sol/StakingServiceManager.json +67 -43
- package/artifacts/contracts/staking/StakingStore.sol/StakingStore.dbg.json +4 -0
- package/artifacts/contracts/staking/StakingStore.sol/StakingStore.json +2261 -0
- package/artifacts/contracts/staking/TargetManagerLib.sol/TargetManagerLib.dbg.json +1 -1
- package/artifacts/contracts/staking/TargetManagerLib.sol/TargetManagerLib.json +281 -18
- package/artifacts/contracts/type/AddressSet.sol/LibAddressSet.dbg.json +1 -1
- package/artifacts/contracts/type/AddressSet.sol/LibAddressSet.json +2 -2
- package/artifacts/contracts/type/Amount.sol/AmountLib.dbg.json +1 -1
- package/artifacts/contracts/type/Amount.sol/AmountLib.json +68 -4
- package/artifacts/contracts/type/Blocknumber.sol/BlocknumberLib.dbg.json +1 -1
- package/artifacts/contracts/type/Blocknumber.sol/BlocknumberLib.json +40 -2
- package/artifacts/contracts/type/ClaimId.sol/ClaimIdLib.dbg.json +1 -1
- package/artifacts/contracts/type/ClaimId.sol/ClaimIdLib.json +2 -2
- package/artifacts/contracts/type/DistributorType.sol/DistributorTypeLib.dbg.json +1 -1
- package/artifacts/contracts/type/DistributorType.sol/DistributorTypeLib.json +2 -2
- package/artifacts/contracts/type/Fee.sol/FeeLib.dbg.json +1 -1
- package/artifacts/contracts/type/Fee.sol/FeeLib.json +2 -2
- package/artifacts/contracts/type/Key32.sol/Key32Lib.dbg.json +1 -1
- package/artifacts/contracts/type/Key32.sol/Key32Lib.json +2 -2
- package/artifacts/contracts/type/NftId.sol/NftIdLib.dbg.json +1 -1
- package/artifacts/contracts/type/NftId.sol/NftIdLib.json +28 -4
- package/artifacts/contracts/type/NftIdSet.sol/LibNftIdSet.dbg.json +1 -1
- package/artifacts/contracts/type/NftIdSet.sol/LibNftIdSet.json +2 -2
- package/artifacts/contracts/type/ObjectType.sol/ObjectTypeLib.dbg.json +1 -1
- package/artifacts/contracts/type/ObjectType.sol/ObjectTypeLib.json +96 -2
- package/artifacts/contracts/type/PayoutId.sol/PayoutIdLib.dbg.json +1 -1
- package/artifacts/contracts/type/PayoutId.sol/PayoutIdLib.json +2 -2
- package/artifacts/contracts/type/Referral.sol/ReferralLib.dbg.json +1 -1
- package/artifacts/contracts/type/Referral.sol/ReferralLib.json +4 -4
- package/artifacts/contracts/type/RequestId.sol/RequestIdLib.dbg.json +4 -0
- package/artifacts/contracts/type/RequestId.sol/RequestIdLib.json +204 -0
- package/artifacts/contracts/type/RiskId.sol/RiskIdLib.dbg.json +1 -1
- package/artifacts/contracts/type/RiskId.sol/RiskIdLib.json +2 -2
- package/artifacts/contracts/type/RoleId.sol/RoleIdLib.dbg.json +1 -1
- package/artifacts/contracts/type/RoleId.sol/RoleIdLib.json +114 -4
- package/artifacts/contracts/type/Seconds.sol/SecondsLib.dbg.json +1 -1
- package/artifacts/contracts/type/Seconds.sol/SecondsLib.json +52 -2
- package/artifacts/contracts/type/Selector.sol/SelectorLib.dbg.json +4 -0
- package/artifacts/contracts/type/Selector.sol/SelectorLib.json +129 -0
- package/artifacts/contracts/type/Selector.sol/SelectorSetLib.dbg.json +4 -0
- package/artifacts/contracts/type/Selector.sol/SelectorSetLib.json +10 -0
- package/artifacts/contracts/type/StateId.sol/StateIdLib.dbg.json +1 -1
- package/artifacts/contracts/type/StateId.sol/StateIdLib.json +2 -2
- package/artifacts/contracts/type/String.sol/StrLib.dbg.json +4 -0
- package/artifacts/contracts/type/String.sol/StrLib.json +132 -0
- package/artifacts/contracts/type/Timestamp.sol/TimestampLib.dbg.json +1 -1
- package/artifacts/contracts/type/Timestamp.sol/TimestampLib.json +17 -4
- package/artifacts/contracts/type/UFixed.sol/MathLib.dbg.json +1 -1
- package/artifacts/contracts/type/UFixed.sol/UFixedLib.dbg.json +1 -1
- package/artifacts/contracts/type/Version.sol/VersionLib.dbg.json +1 -1
- package/artifacts/contracts/type/Version.sol/VersionLib.json +2 -2
- package/artifacts/contracts/type/Version.sol/VersionPartLib.dbg.json +1 -1
- package/artifacts/contracts/type/Version.sol/VersionPartLib.json +2 -2
- package/contracts/distribution/Distribution.sol +2 -4
- package/contracts/distribution/DistributionService.sol +5 -6
- package/contracts/distribution/DistributionServiceManager.sol +0 -12
- package/contracts/distribution/IDistributionComponent.sol +1 -1
- package/contracts/distribution/IDistributionService.sol +1 -1
- package/contracts/instance/IInstance.sol +21 -11
- package/contracts/instance/IInstanceService.sol +26 -12
- package/contracts/instance/Instance.sol +84 -49
- package/contracts/instance/InstanceAdmin.sol +331 -0
- package/contracts/instance/InstanceAuthorizationsLib.sol +192 -151
- package/contracts/instance/InstanceReader.sol +32 -6
- package/contracts/instance/InstanceService.sol +119 -47
- package/contracts/instance/InstanceStore.sol +29 -20
- package/contracts/instance/base/BalanceStore.sol +11 -6
- package/contracts/instance/base/Cloneable.sol +2 -25
- package/contracts/instance/base/ObjectCounter.sol +21 -0
- package/contracts/instance/base/ObjectManager.sol +1 -3
- package/contracts/instance/module/IAccess.sol +2 -10
- package/contracts/oracle/IOracle.sol +20 -0
- package/contracts/oracle/IOracleComponent.sol +32 -0
- package/contracts/oracle/IOracleService.sol +65 -0
- package/contracts/oracle/Oracle.sol +145 -0
- package/contracts/oracle/OracleService.sol +278 -0
- package/contracts/oracle/OracleServiceManager.sol +42 -0
- package/contracts/pool/BundleService.sol +20 -20
- package/contracts/pool/IBundleService.sol +1 -1
- package/contracts/pool/IPoolService.sol +4 -1
- package/contracts/pool/PoolService.sol +38 -10
- package/contracts/product/ApplicationService.sol +6 -6
- package/contracts/product/ClaimService.sol +12 -7
- package/contracts/product/IApplicationService.sol +1 -1
- package/contracts/product/IClaimService.sol +7 -1
- package/contracts/product/IPolicyService.sol +1 -1
- package/contracts/product/IPricingService.sol +1 -1
- package/contracts/product/IProductService.sol +1 -1
- package/contracts/product/PolicyService.sol +9 -7
- package/contracts/product/PricingService.sol +8 -9
- package/contracts/product/Product.sol +1 -1
- package/contracts/product/ProductService.sol +6 -6
- package/contracts/registry/ChainNft.sol +1 -0
- package/contracts/registry/IRegistry.sol +20 -14
- package/contracts/registry/IRegistryService.sol +1 -0
- package/contracts/registry/IServiceAuthorization.sol +35 -0
- package/contracts/registry/Registry.sol +85 -66
- package/contracts/registry/RegistryAdmin.sol +333 -0
- package/contracts/registry/RegistryService.sol +8 -70
- package/contracts/registry/RegistryServiceManager.sol +1 -20
- package/contracts/registry/ReleaseManager.sol +218 -221
- package/contracts/registry/ServiceAuthorization.sol +86 -0
- package/contracts/registry/ServiceAuthorizationV3.sol +200 -0
- package/contracts/registry/TokenRegistry.sol +56 -60
- package/contracts/shared/AccessAdmin.sol +759 -0
- package/contracts/shared/AccessManagerCustom.sol +741 -0
- package/contracts/shared/AccessManagerExtended.sol +481 -0
- package/contracts/shared/AccessManagerExtendedInitializeable.sol +13 -0
- package/contracts/shared/AccessManagerExtendedWithDisable.sol +137 -0
- package/contracts/shared/AccessManagerExtendedWithDisableInitializeable.sol +14 -0
- package/contracts/shared/Component.sol +8 -13
- package/contracts/shared/ComponentService.sol +39 -17
- package/contracts/shared/ComponentVerifyingService.sol +13 -7
- package/contracts/shared/ERC165.sol +1 -1
- package/contracts/shared/IAccessAdmin.sol +168 -0
- package/contracts/shared/IAccessManagerExtended.sol +74 -0
- package/contracts/shared/IAccessManagerExtendedWithDisable.sol +18 -0
- package/contracts/shared/IComponent.sol +3 -7
- package/contracts/shared/IComponentService.sol +11 -0
- package/contracts/shared/IKeyValueStore.sol +1 -1
- package/contracts/shared/INftOwnable.sol +1 -1
- package/contracts/shared/IService.sol +8 -1
- package/contracts/shared/InitializableCustom.sol +177 -0
- package/contracts/shared/InstanceLinkedComponent.sol +1 -2
- package/contracts/shared/KeyValueStore.sol +1 -4
- package/contracts/shared/Lifecycle.sol +11 -2
- package/contracts/shared/NftIdSetManager.sol +2 -6
- package/contracts/shared/NftOwnable.sol +2 -13
- package/contracts/shared/PolicyHolder.sol +2 -1
- package/contracts/shared/ProxyManager.sol +6 -2
- package/contracts/shared/Service.sol +28 -22
- package/contracts/staking/IStaking.sol +93 -38
- package/contracts/staking/IStakingService.sol +71 -40
- package/contracts/staking/StakeManagerLib.sol +231 -0
- package/contracts/staking/Staking.sol +302 -137
- package/contracts/staking/StakingManager.sol +22 -20
- package/contracts/staking/StakingReader.sol +119 -24
- package/contracts/staking/StakingService.sol +193 -76
- package/contracts/staking/StakingServiceManager.sol +2 -2
- package/contracts/staking/StakingStore.sol +613 -0
- package/contracts/staking/TargetManagerLib.sol +76 -10
- package/contracts/type/AddressSet.sol +1 -1
- package/contracts/type/Amount.sol +15 -1
- package/contracts/type/Blocknumber.sol +14 -2
- package/contracts/type/Fee.sol +1 -1
- package/contracts/type/NftId.sol +9 -9
- package/contracts/type/NftIdSet.sol +1 -1
- package/contracts/type/ObjectType.sol +139 -67
- package/contracts/type/Referral.sol +1 -1
- package/contracts/type/RequestId.sol +75 -0
- package/contracts/type/RiskId.sol +1 -1
- package/contracts/type/RoleId.sol +79 -21
- package/contracts/type/Seconds.sol +18 -0
- package/contracts/type/Selector.sol +102 -0
- package/contracts/type/StateId.sol +12 -0
- package/contracts/type/String.sol +53 -0
- package/contracts/type/Timestamp.sol +6 -2
- package/contracts/type/Version.sol +1 -1
- package/package.json +3 -3
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.dbg.json +0 -4
- package/artifacts/contracts/instance/InstanceAccessManager.sol/InstanceAccessManager.json +0 -1348
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.dbg.json +0 -4
- package/artifacts/contracts/registry/RegistryAccessManager.sol/RegistryAccessManager.json +0 -298
- package/artifacts/contracts/registry/ServiceAuthorizationsLib.sol/ServiceAuthorizationsLib.dbg.json +0 -4
- package/artifacts/contracts/registry/ServiceAuthorizationsLib.sol/ServiceAuthorizationsLib.json +0 -137
- package/artifacts/contracts/shared/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.dbg.json +0 -4
- package/artifacts/contracts/shared/AccessManagerUpgradeableInitializeable.sol/AccessManagerUpgradeableInitializeable.json +0 -1206
- package/contracts/instance/InstanceAccessManager.sol +0 -543
- package/contracts/registry/RegistryAccessManager.sol +0 -167
- package/contracts/registry/ServiceAuthorizationsLib.sol +0 -173
- package/contracts/shared/AccessManagerUpgradeableInitializeable.sol +0 -13
@@ -1,543 +0,0 @@
|
|
1
|
-
// SPDX-License-Identifier: Apache-2.0
|
2
|
-
pragma solidity ^0.8.20;
|
3
|
-
|
4
|
-
import {AccessManagedUpgradeable} from "@openzeppelin/contracts-upgradeable/access/manager/AccessManagedUpgradeable.sol";
|
5
|
-
import {EnumerableSet} from "@openzeppelin/contracts/utils/structs/EnumerableSet.sol";
|
6
|
-
import {ShortString, ShortStrings} from "@openzeppelin/contracts/utils/ShortStrings.sol";
|
7
|
-
|
8
|
-
import {RoleId, RoleIdLib, ADMIN_ROLE, PUBLIC_ROLE, INSTANCE_SERVICE_ROLE, INSTANCE_OWNER_ROLE, INSTANCE_ROLE} from "../type/RoleId.sol";
|
9
|
-
import {TimestampLib} from "../type/Timestamp.sol";
|
10
|
-
import {NftId} from "../type/NftId.sol";
|
11
|
-
|
12
|
-
import {AccessManagerUpgradeableInitializeable} from "../shared/AccessManagerUpgradeableInitializeable.sol";
|
13
|
-
|
14
|
-
import {IRegistry} from "../registry/IRegistry.sol";
|
15
|
-
|
16
|
-
import {IInstance} from "./IInstance.sol";
|
17
|
-
import {IAccess} from "./module/IAccess.sol";
|
18
|
-
|
19
|
-
contract InstanceAccessManager is
|
20
|
-
AccessManagedUpgradeable
|
21
|
-
{
|
22
|
-
event LogRoleCreation(RoleId roleId, ShortString name, IAccess.Type rtype);
|
23
|
-
event LogTargetCreation(address target, ShortString name, IAccess.Type ttype, bool isLocked);
|
24
|
-
|
25
|
-
using RoleIdLib for RoleId;
|
26
|
-
|
27
|
-
string public constant ADMIN_ROLE_NAME = "AdminRole";
|
28
|
-
string public constant PUBLIC_ROLE_NAME = "PublicRole";
|
29
|
-
string public constant INSTANCE_ROLE_NAME = "InstanceRole";
|
30
|
-
string public constant INSTANCE_OWNER_ROLE_NAME = "InstanceOwnerRole";
|
31
|
-
|
32
|
-
uint64 public constant CUSTOM_ROLE_ID_MIN = 10000; // MUST be even
|
33
|
-
uint32 public constant EXECUTION_DELAY = 0;
|
34
|
-
|
35
|
-
// role specific state
|
36
|
-
mapping(RoleId roleId => IAccess.RoleInfo info) internal _roleInfo;
|
37
|
-
mapping(RoleId roleId => EnumerableSet.AddressSet roleMembers) internal _roleMembers;
|
38
|
-
mapping(ShortString name => RoleId roleId) internal _roleIdForName;
|
39
|
-
RoleId [] internal _roleIds;
|
40
|
-
uint64 _idNext;
|
41
|
-
|
42
|
-
// target specific state
|
43
|
-
mapping(address target => IAccess.TargetInfo info) internal _targetInfo;
|
44
|
-
mapping(ShortString name => address target) internal _targetAddressForName;
|
45
|
-
address [] internal _targets;
|
46
|
-
|
47
|
-
AccessManagerUpgradeableInitializeable internal _accessManager;
|
48
|
-
IRegistry internal _registry;
|
49
|
-
|
50
|
-
modifier restrictedToRoleAdmin(RoleId roleId) {
|
51
|
-
RoleId admin = getRoleAdmin(roleId);
|
52
|
-
(bool inRole, uint32 executionDelay) = _accessManager.hasRole(admin.toInt(), _msgSender());
|
53
|
-
assert(executionDelay == 0); // to be sure no delayed execution functionality is used
|
54
|
-
if (!inRole) {
|
55
|
-
revert IAccess.ErrorIAccessCallerIsNotRoleAdmin(_msgSender(), roleId);
|
56
|
-
}
|
57
|
-
_;
|
58
|
-
}
|
59
|
-
|
60
|
-
// instance owner is granted upon instance nft minting in callback function
|
61
|
-
function initialize(address instanceAddress) external initializer
|
62
|
-
{
|
63
|
-
IInstance instance = IInstance(instanceAddress);
|
64
|
-
IRegistry registry = instance.getRegistry();
|
65
|
-
address authority = instance.authority();
|
66
|
-
|
67
|
-
__AccessManaged_init(authority);
|
68
|
-
|
69
|
-
_accessManager = AccessManagerUpgradeableInitializeable(authority);
|
70
|
-
_registry = registry;
|
71
|
-
_idNext = CUSTOM_ROLE_ID_MIN;
|
72
|
-
|
73
|
-
_createRole(ADMIN_ROLE(), ADMIN_ROLE_NAME, IAccess.Type.Core);
|
74
|
-
_createRole(PUBLIC_ROLE(), PUBLIC_ROLE_NAME, IAccess.Type.Core);
|
75
|
-
_createRole(INSTANCE_ROLE(), INSTANCE_ROLE_NAME, IAccess.Type.Core);
|
76
|
-
_createRole(INSTANCE_OWNER_ROLE(), INSTANCE_OWNER_ROLE_NAME, IAccess.Type.Gif);// TODO should be of core type
|
77
|
-
|
78
|
-
// assume `this` is already a member of ADMIN_ROLE
|
79
|
-
EnumerableSet.add(_roleMembers[ADMIN_ROLE()], address(this));
|
80
|
-
|
81
|
-
// grant instance role to instance contract address
|
82
|
-
grantRole(INSTANCE_ROLE(), instanceAddress);
|
83
|
-
setRoleAdmin(INSTANCE_OWNER_ROLE(), INSTANCE_ROLE());
|
84
|
-
}
|
85
|
-
|
86
|
-
//--- Role ------------------------------------------------------//
|
87
|
-
// ADMIN_ROLE
|
88
|
-
// assume all core roles are know at deployment time
|
89
|
-
// assume core roles are set and granted only during instance cloning
|
90
|
-
// assume core roles are never revoked -> core roles admin is never active after intialization
|
91
|
-
function createCoreRole(RoleId roleId, string memory name)
|
92
|
-
external
|
93
|
-
restricted()
|
94
|
-
{
|
95
|
-
_createRole(roleId, name, IAccess.Type.Core);
|
96
|
-
}
|
97
|
-
|
98
|
-
// ADMIN_ROLE
|
99
|
-
// assume gif roles can be revoked
|
100
|
-
// assume admin is INSTANCE_OWNER_ROLE or INSTANCE_ROLE
|
101
|
-
function createGifRole(RoleId roleId, string memory name, RoleId admin)
|
102
|
-
external
|
103
|
-
restricted()
|
104
|
-
{
|
105
|
-
_createRole(roleId, name, IAccess.Type.Gif);
|
106
|
-
setRoleAdmin(roleId, admin);
|
107
|
-
}
|
108
|
-
|
109
|
-
// INSTANCE_OWNER_ROLE
|
110
|
-
// TODO specify how many owners role can have -> many roles MUST have exactly 1 member?
|
111
|
-
function createRole(string memory roleName, string memory adminName)
|
112
|
-
external
|
113
|
-
restricted()
|
114
|
-
returns(RoleId roleId, RoleId admin)
|
115
|
-
{
|
116
|
-
(roleId, admin) = _getNextCustomRoleId();
|
117
|
-
|
118
|
-
_createRole(roleId, roleName, IAccess.Type.Custom);
|
119
|
-
_createRole(admin, adminName, IAccess.Type.Custom);
|
120
|
-
|
121
|
-
// TODO works without this -> why?
|
122
|
-
setRoleAdmin(roleId, admin);
|
123
|
-
setRoleAdmin(admin, INSTANCE_OWNER_ROLE());
|
124
|
-
}
|
125
|
-
|
126
|
-
// ADMIN_ROLE
|
127
|
-
// assume used by instance service only during instance cloning
|
128
|
-
// assume used only by this.createRole(), this.createGifRole() afterwards
|
129
|
-
function setRoleAdmin(RoleId roleId, RoleId admin)
|
130
|
-
public
|
131
|
-
restricted()
|
132
|
-
{
|
133
|
-
if (!roleExists(roleId)) {
|
134
|
-
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
135
|
-
}
|
136
|
-
|
137
|
-
if(_roleInfo[roleId].rtype == IAccess.Type.Core) {
|
138
|
-
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Core);
|
139
|
-
}
|
140
|
-
|
141
|
-
if (!roleExists(admin)) {
|
142
|
-
revert IAccess.ErrorIAccessRoleIdDoesNotExist(admin);
|
143
|
-
}
|
144
|
-
|
145
|
-
_roleInfo[roleId].admin = admin;
|
146
|
-
}
|
147
|
-
|
148
|
-
// TODO core role can be granted only to 1 member
|
149
|
-
function grantRole(RoleId roleId, address member)
|
150
|
-
public
|
151
|
-
restrictedToRoleAdmin(roleId)
|
152
|
-
returns (bool granted)
|
153
|
-
{
|
154
|
-
if (!roleExists(roleId)) {
|
155
|
-
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
156
|
-
}
|
157
|
-
|
158
|
-
granted = EnumerableSet.add(_roleMembers[roleId], member);
|
159
|
-
if(granted) {
|
160
|
-
_accessManager.grantRole(roleId.toInt(), member, EXECUTION_DELAY);
|
161
|
-
}
|
162
|
-
}
|
163
|
-
|
164
|
-
function revokeRole(RoleId roleId, address member)
|
165
|
-
external
|
166
|
-
restrictedToRoleAdmin(roleId)
|
167
|
-
returns (bool)
|
168
|
-
{
|
169
|
-
return _revokeRole(roleId, member);
|
170
|
-
}
|
171
|
-
|
172
|
-
// INSTANCE_OWNER_ROLE
|
173
|
-
// IMPORTANT: unbounded function, revoke all or revert
|
174
|
-
// Instance owner role decides what to do in case of custom role admin bening revoked, e.g.:
|
175
|
-
// 1) revoke custom role from ALL members
|
176
|
-
// 2) revoke custom role admin from ALL members
|
177
|
-
// 3) 1) + 2)
|
178
|
-
// 4) revoke only 1 member of custom role admin
|
179
|
-
function revokeRoleAllMembers(RoleId roleId)
|
180
|
-
external
|
181
|
-
restrictedToRoleAdmin(roleId)
|
182
|
-
returns (bool revoked)
|
183
|
-
{
|
184
|
-
if (!roleExists(roleId)) {
|
185
|
-
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
186
|
-
}
|
187
|
-
|
188
|
-
uint memberCount = EnumerableSet.length(_roleMembers[roleId]);
|
189
|
-
for(uint memberIdx = 0; memberIdx < memberCount; memberIdx++)
|
190
|
-
{
|
191
|
-
address member = EnumerableSet.at(_roleMembers[roleId], memberIdx);
|
192
|
-
EnumerableSet.remove(_roleMembers[roleId], member);
|
193
|
-
_accessManager.revokeRole(roleId.toInt(), member);
|
194
|
-
}
|
195
|
-
}
|
196
|
-
|
197
|
-
/// @dev not restricted function by intention
|
198
|
-
/// the restriction to role members is already enforced by the call to the access manager
|
199
|
-
function renounceRole(RoleId roleId)
|
200
|
-
external
|
201
|
-
returns (bool)
|
202
|
-
{
|
203
|
-
IAccess.Type rtype = _roleInfo[roleId].rtype;
|
204
|
-
if(rtype == IAccess.Type.Core || rtype == IAccess.Type.Gif) {
|
205
|
-
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, rtype);
|
206
|
-
}
|
207
|
-
|
208
|
-
address member = msg.sender;
|
209
|
-
// cannot use accessManger.renounce as it directly checks against msg.sender
|
210
|
-
return _revokeRole(roleId, member);
|
211
|
-
}
|
212
|
-
|
213
|
-
function roleExists(RoleId roleId) public view returns (bool exists) {
|
214
|
-
return _roleInfo[roleId].createdAt.gtz();
|
215
|
-
}
|
216
|
-
// TODO returns ADMIN_ROLE id for non existent roleId
|
217
|
-
function getRoleAdmin(RoleId roleId) public view returns(RoleId admin) {
|
218
|
-
return _roleInfo[roleId].admin;
|
219
|
-
}
|
220
|
-
|
221
|
-
function getRoleInfo(RoleId roleId) external view returns (IAccess.RoleInfo memory info) {
|
222
|
-
return _roleInfo[roleId];
|
223
|
-
}
|
224
|
-
|
225
|
-
function roleMembers(RoleId roleId) public view returns (uint256 numberOfMembers) {
|
226
|
-
return EnumerableSet.length(_roleMembers[roleId]);
|
227
|
-
}
|
228
|
-
|
229
|
-
function getRoleId(uint256 idx) external view returns (RoleId roleId) {
|
230
|
-
return _roleIds[idx];
|
231
|
-
}
|
232
|
-
|
233
|
-
// TODO returns ADMIN_ROLE id for non existent name
|
234
|
-
function getRoleIdForName(string memory name) external view returns (RoleId roleId) {
|
235
|
-
return _roleIdForName[ShortStrings.toShortString(name)];
|
236
|
-
}
|
237
|
-
|
238
|
-
function roleMember(RoleId roleId, uint256 idx) external view returns (address member) {
|
239
|
-
return EnumerableSet.at(_roleMembers[roleId], idx);
|
240
|
-
}
|
241
|
-
|
242
|
-
function hasRole(RoleId roleId, address account) external view returns (bool accountHasRole) {
|
243
|
-
(accountHasRole, ) = _accessManager.hasRole(roleId.toInt(), account);
|
244
|
-
}
|
245
|
-
|
246
|
-
function roles() external view returns (uint256 numberOfRoles) {
|
247
|
-
return _roleIds.length;
|
248
|
-
}
|
249
|
-
|
250
|
-
//--- Target ------------------------------------------------------//
|
251
|
-
// ADMIN_ROLE
|
252
|
-
// assume some core targets are registred (instance) while others are not (instance accesss manager, instance reader, bundle manager)
|
253
|
-
function createCoreTarget(address target, string memory name) external restricted() {
|
254
|
-
_createTarget(target, name, IAccess.Type.Core);
|
255
|
-
}
|
256
|
-
// INSTANCE_SERVICE_ROLE
|
257
|
-
// TODO check for instance mismatch?
|
258
|
-
function createGifTarget(address target, string memory name) external restricted()
|
259
|
-
{
|
260
|
-
if(!_registry.isRegistered(target)) {
|
261
|
-
revert IAccess.ErrorIAccessTargetNotRegistered(target);
|
262
|
-
}
|
263
|
-
|
264
|
-
_createTarget(target, name, IAccess.Type.Gif);
|
265
|
-
}
|
266
|
-
// INSTANCE_OWNER_ROLE
|
267
|
-
// assume custom target.authority() is constant -> target MUST not be used with different instance access manager
|
268
|
-
// assume custom target can not be registered as component -> each service which is doing component registration MUST register a gif target
|
269
|
-
// assume custom target can not be registered as instance or service -> why?
|
270
|
-
// TODO check target associated with instance owner or instance or instance components or components helpers
|
271
|
-
function createTarget(address target, string memory name) external restricted()
|
272
|
-
{
|
273
|
-
_createTarget(target, name, IAccess.Type.Custom);
|
274
|
-
}
|
275
|
-
|
276
|
-
// TODO instance owner locks component instead of revoking it access to the instance...
|
277
|
-
function setTargetLockedByService(address target, bool locked)
|
278
|
-
external
|
279
|
-
restricted // INSTANCE_SERVICE_ROLE
|
280
|
-
{
|
281
|
-
_setTargetLocked(target, locked);
|
282
|
-
}
|
283
|
-
|
284
|
-
function setTargetLockedByInstance(address target, bool locked)
|
285
|
-
external
|
286
|
-
restricted // INSTANCE_ROLE
|
287
|
-
{
|
288
|
-
_setTargetLocked(target, locked);
|
289
|
-
}
|
290
|
-
|
291
|
-
|
292
|
-
// allowed combinations of roles and targets:
|
293
|
-
//1) set core role for core target
|
294
|
-
//2) set gif role for gif target
|
295
|
-
//3) set custom role for gif target
|
296
|
-
//4) set custom role for custom target
|
297
|
-
|
298
|
-
// ADMIN_ROLE if used only during initialization, works with:
|
299
|
-
// any roles for any targets
|
300
|
-
// INSTANCE_SERVICE_ROLE if used not only during initilization, works with:
|
301
|
-
// core roles for core targets
|
302
|
-
// gif roles for gif targets
|
303
|
-
function setCoreTargetFunctionRole(
|
304
|
-
string memory targetName,
|
305
|
-
bytes4[] calldata selectors,
|
306
|
-
RoleId roleId
|
307
|
-
)
|
308
|
-
public
|
309
|
-
virtual
|
310
|
-
restricted()
|
311
|
-
{
|
312
|
-
ShortString nameShort = ShortStrings.toShortString(targetName);
|
313
|
-
address target = _targetAddressForName[nameShort];
|
314
|
-
|
315
|
-
// not custom target
|
316
|
-
if(_targetInfo[target].ttype == IAccess.Type.Custom) {
|
317
|
-
revert IAccess.ErrorIAccessTargetTypeInvalid(target, IAccess.Type.Custom);
|
318
|
-
}
|
319
|
-
|
320
|
-
// not custom role
|
321
|
-
if(_roleInfo[roleId].rtype == IAccess.Type.Custom) {
|
322
|
-
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Custom);
|
323
|
-
}
|
324
|
-
|
325
|
-
_setTargetFunctionRole(target, nameShort, selectors, roleId);
|
326
|
-
}
|
327
|
-
|
328
|
-
// INSTANCE_OWNER_ROLE
|
329
|
-
// gif role for gif target
|
330
|
-
// gif role for custom target
|
331
|
-
// custom role for gif target
|
332
|
-
// custom role for custom target
|
333
|
-
// TODO instance owner can mess with gif target (component) -> e.g. set custom role for function intendent to work with gif role
|
334
|
-
function setTargetFunctionRole(
|
335
|
-
string memory targetName,
|
336
|
-
bytes4[] calldata selectors,
|
337
|
-
RoleId roleId
|
338
|
-
)
|
339
|
-
public
|
340
|
-
virtual
|
341
|
-
restricted()
|
342
|
-
{
|
343
|
-
ShortString nameShort = ShortStrings.toShortString(targetName);
|
344
|
-
address target = _targetAddressForName[nameShort];
|
345
|
-
|
346
|
-
// not core target
|
347
|
-
if(_targetInfo[target].ttype == IAccess.Type.Core) {
|
348
|
-
revert IAccess.ErrorIAccessTargetTypeInvalid(target, IAccess.Type.Core);
|
349
|
-
}
|
350
|
-
|
351
|
-
// not core role
|
352
|
-
if(_roleInfo[roleId].rtype == IAccess.Type.Core) {
|
353
|
-
revert IAccess.ErrorIAccessRoleTypeInvalid(roleId, IAccess.Type.Core);
|
354
|
-
}
|
355
|
-
|
356
|
-
_setTargetFunctionRole(target, nameShort, selectors, roleId);
|
357
|
-
}
|
358
|
-
|
359
|
-
function getTargetAddress(string memory targetName) public view returns(address targetAddress) {
|
360
|
-
ShortString nameShort = ShortStrings.toShortString(targetName);
|
361
|
-
return _targetAddressForName[nameShort];
|
362
|
-
}
|
363
|
-
|
364
|
-
function isTargetLocked(address target) public view returns (bool locked) {
|
365
|
-
return _targetInfo[target].isLocked;
|
366
|
-
}
|
367
|
-
|
368
|
-
function targetExists(address target) public view returns (bool exists) {
|
369
|
-
return _targetInfo[target].createdAt.gtz();
|
370
|
-
}
|
371
|
-
|
372
|
-
function getTargetInfo(address target) public view returns (IAccess.TargetInfo memory) {
|
373
|
-
return _targetInfo[target];
|
374
|
-
}
|
375
|
-
|
376
|
-
//--- Role internal view/pure functions --------------------------------------//
|
377
|
-
function _createRole(RoleId roleId, string memory roleName, IAccess.Type rtype)
|
378
|
-
internal
|
379
|
-
{
|
380
|
-
ShortString name = ShortStrings.toShortString(roleName);
|
381
|
-
_validateRole(roleId, name, rtype);
|
382
|
-
|
383
|
-
if(roleExists(roleId)) {
|
384
|
-
revert IAccess.ErrorIAccessRoleIdExists(roleId);
|
385
|
-
}
|
386
|
-
|
387
|
-
if (_roleIdForName[name].gtz()) {
|
388
|
-
revert IAccess.ErrorIAccessRoleNameExists(roleId, _roleIdForName[name], name);
|
389
|
-
}
|
390
|
-
|
391
|
-
_roleInfo[roleId] = IAccess.RoleInfo(
|
392
|
-
name,
|
393
|
-
rtype,
|
394
|
-
ADMIN_ROLE(),
|
395
|
-
TimestampLib.blockTimestamp(),
|
396
|
-
TimestampLib.blockTimestamp()
|
397
|
-
);
|
398
|
-
_roleIdForName[name] = roleId;
|
399
|
-
_roleIds.push(roleId);
|
400
|
-
|
401
|
-
emit LogRoleCreation(roleId, name, rtype);
|
402
|
-
}
|
403
|
-
|
404
|
-
function _validateRole(RoleId roleId, ShortString name, IAccess.Type rtype)
|
405
|
-
internal
|
406
|
-
view
|
407
|
-
{
|
408
|
-
uint roleIdInt = roleId.toInt();
|
409
|
-
if(rtype == IAccess.Type.Custom && roleIdInt < CUSTOM_ROLE_ID_MIN) {
|
410
|
-
revert IAccess.ErrorIAccessRoleIdTooSmall(roleId);
|
411
|
-
}
|
412
|
-
|
413
|
-
if(
|
414
|
-
rtype != IAccess.Type.Custom &&
|
415
|
-
roleIdInt >= CUSTOM_ROLE_ID_MIN &&
|
416
|
-
roleIdInt != PUBLIC_ROLE().toInt())
|
417
|
-
{
|
418
|
-
revert IAccess.ErrorIAccessRoleIdTooBig(roleId);
|
419
|
-
}
|
420
|
-
|
421
|
-
// role name checks
|
422
|
-
if (ShortStrings.byteLength(name) == 0) {
|
423
|
-
revert IAccess.ErrorIAccessRoleNameEmpty(roleId);
|
424
|
-
}
|
425
|
-
}
|
426
|
-
|
427
|
-
function _revokeRole(RoleId roleId, address member)
|
428
|
-
internal
|
429
|
-
returns(bool revoked)
|
430
|
-
{
|
431
|
-
if (!roleExists(roleId)) {
|
432
|
-
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
433
|
-
}
|
434
|
-
|
435
|
-
revoked = EnumerableSet.remove(_roleMembers[roleId], member);
|
436
|
-
if(revoked) {
|
437
|
-
_accessManager.revokeRole(roleId.toInt(), member);
|
438
|
-
}
|
439
|
-
}
|
440
|
-
|
441
|
-
function _getNextCustomRoleId()
|
442
|
-
internal
|
443
|
-
returns(RoleId roleId, RoleId admin)
|
444
|
-
{
|
445
|
-
uint64 roleIdInt = _idNext;
|
446
|
-
uint64 adminInt = roleIdInt + 1;
|
447
|
-
|
448
|
-
_idNext = roleIdInt + 2;
|
449
|
-
|
450
|
-
roleId = RoleIdLib.toRoleId(roleIdInt);
|
451
|
-
admin = RoleIdLib.toRoleId(adminInt);
|
452
|
-
}
|
453
|
-
|
454
|
-
//--- Target internal view/pure functions --------------------------------------//
|
455
|
-
function _createTarget(address target, string memory targetName, IAccess.Type ttype)
|
456
|
-
internal
|
457
|
-
{
|
458
|
-
ShortString name = ShortStrings.toShortString(targetName);
|
459
|
-
_validateTarget(target, name, ttype);
|
460
|
-
|
461
|
-
if (_targetInfo[target].createdAt.gtz()) {
|
462
|
-
revert IAccess.ErrorIAccessTargetExists(target, _targetInfo[target].name);
|
463
|
-
}
|
464
|
-
|
465
|
-
if (_targetAddressForName[name] != address(0)) {
|
466
|
-
revert IAccess.ErrorIAccessTargetNameExists(
|
467
|
-
target,
|
468
|
-
_targetAddressForName[name],
|
469
|
-
name);
|
470
|
-
}
|
471
|
-
|
472
|
-
bool isLocked = _accessManager.isTargetClosed(target);// sync with state in access manager
|
473
|
-
_targetInfo[target] = IAccess.TargetInfo(
|
474
|
-
name,
|
475
|
-
ttype,
|
476
|
-
isLocked,
|
477
|
-
TimestampLib.blockTimestamp(),
|
478
|
-
TimestampLib.blockTimestamp()
|
479
|
-
);
|
480
|
-
_targetAddressForName[name] = target;
|
481
|
-
_targets.push(target);
|
482
|
-
|
483
|
-
emit LogTargetCreation(target, name, ttype, isLocked);
|
484
|
-
}
|
485
|
-
|
486
|
-
function _validateTarget(address target, ShortString name, IAccess.Type ttype)
|
487
|
-
internal
|
488
|
-
view
|
489
|
-
{
|
490
|
-
address targetAuthority = AccessManagedUpgradeable(target).authority();
|
491
|
-
if(targetAuthority != authority()) {
|
492
|
-
revert IAccess.ErrorIAccessTargetAuthorityInvalid(target, targetAuthority);
|
493
|
-
}
|
494
|
-
|
495
|
-
if (ShortStrings.byteLength(name) == 0) {
|
496
|
-
revert IAccess.ErrorIAccessTargetNameEmpty(target);
|
497
|
-
}
|
498
|
-
}
|
499
|
-
|
500
|
-
// IMPORTANT: instance access manager MUST be of Core type -> otherwise can be locked forever
|
501
|
-
function _setTargetLocked(address target, bool locked) internal
|
502
|
-
{
|
503
|
-
IAccess.Type targetType = _targetInfo[target].ttype;
|
504
|
-
if(target == address(0) || targetType == IAccess.Type.NotInitialized) {
|
505
|
-
revert IAccess.ErrorIAccessTargetDoesNotExist(target);
|
506
|
-
}
|
507
|
-
|
508
|
-
if(targetType == IAccess.Type.Core) {
|
509
|
-
revert IAccess.ErrorIAccessTargetTypeInvalid(target, targetType);
|
510
|
-
}
|
511
|
-
|
512
|
-
_targetInfo[target].isLocked = locked;
|
513
|
-
_accessManager.setTargetClosed(target, locked);
|
514
|
-
}
|
515
|
-
|
516
|
-
function _setTargetFunctionRole(
|
517
|
-
address target,
|
518
|
-
ShortString name,
|
519
|
-
bytes4[] calldata selectors,
|
520
|
-
RoleId roleId
|
521
|
-
)
|
522
|
-
internal
|
523
|
-
{
|
524
|
-
if (target == address(0)) {
|
525
|
-
revert IAccess.ErrorIAccessTargetDoesNotExist(target);
|
526
|
-
}
|
527
|
-
|
528
|
-
if (!roleExists(roleId)) {
|
529
|
-
revert IAccess.ErrorIAccessRoleIdDoesNotExist(roleId);
|
530
|
-
}
|
531
|
-
|
532
|
-
uint64 roleIdInt = RoleId.unwrap(roleId);
|
533
|
-
_accessManager.setTargetFunctionRole(target, selectors, roleIdInt);
|
534
|
-
}
|
535
|
-
|
536
|
-
function canCall(
|
537
|
-
address caller,
|
538
|
-
address target,
|
539
|
-
bytes4 selector
|
540
|
-
) public view virtual returns (bool immediate, uint32 delay) {
|
541
|
-
return _accessManager.canCall(caller, target, selector);
|
542
|
-
}
|
543
|
-
}
|
@@ -1,167 +0,0 @@
|
|
1
|
-
// SPDX-License-Identifier: UNLICENSED
|
2
|
-
pragma solidity ^0.8.20;
|
3
|
-
|
4
|
-
import {IAccessManaged} from "@openzeppelin/contracts/access/manager/IAccessManaged.sol";
|
5
|
-
import {AccessManaged} from "@openzeppelin/contracts/access/manager/AccessManaged.sol";
|
6
|
-
import {AccessManager} from "@openzeppelin/contracts/access/manager/AccessManager.sol";
|
7
|
-
import {Initializable} from "@openzeppelin/contracts/proxy/utils/Initializable.sol";
|
8
|
-
|
9
|
-
import {RoleId, RoleIdLib, GIF_MANAGER_ROLE, GIF_ADMIN_ROLE} from "../type/RoleId.sol";
|
10
|
-
|
11
|
-
import {AccessManagerUpgradeableInitializeable} from "../shared/AccessManagerUpgradeableInitializeable.sol";
|
12
|
-
|
13
|
-
import {TokenRegistry} from "./TokenRegistry.sol";
|
14
|
-
import {ReleaseManager} from "./ReleaseManager.sol";
|
15
|
-
|
16
|
-
/*
|
17
|
-
1) GIF_MANAGER_ROLE
|
18
|
-
- can have arbitrary number of members
|
19
|
-
- responsible for services registrations
|
20
|
-
- responsible for token registration and activation
|
21
|
-
|
22
|
-
2) GIF_ADMIN_ROLE
|
23
|
-
- admin of GIF_MANAGER_ROLE
|
24
|
-
- MUST have 1 member at any time
|
25
|
-
- granted/revoked ONLY in transferAdminRole() -> consider lock out situations!!!
|
26
|
-
- responsible for creation and activation of releases
|
27
|
-
*/
|
28
|
-
|
29
|
-
contract RegistryAccessManager is AccessManaged, Initializable
|
30
|
-
{
|
31
|
-
error ErrorRegistryAccessManagerReleaseManagerAuthorityMismatch();
|
32
|
-
error ErrorRegistryAccessManagerTokenRegistryZero();
|
33
|
-
|
34
|
-
uint64 public constant UNIQUE_ROLE_ID_MIN = 1000000;
|
35
|
-
|
36
|
-
address private _releaseManager;
|
37
|
-
address private _tokenRegistry;
|
38
|
-
|
39
|
-
uint64 private _idNext; // role id
|
40
|
-
|
41
|
-
|
42
|
-
// IMPORTNAT: this.authority() must be valid before initialize() function....
|
43
|
-
// -> have constructor and initializer function
|
44
|
-
constructor()
|
45
|
-
AccessManaged(msg.sender)
|
46
|
-
{
|
47
|
-
AccessManagerUpgradeableInitializeable accessManager = new AccessManagerUpgradeableInitializeable();
|
48
|
-
accessManager.initialize(address(this));
|
49
|
-
setAuthority(address(accessManager));
|
50
|
-
}
|
51
|
-
|
52
|
-
function initialize(
|
53
|
-
address admin,
|
54
|
-
address manager,
|
55
|
-
address releaseManager,
|
56
|
-
address tokenRegistry
|
57
|
-
)
|
58
|
-
external
|
59
|
-
initializer
|
60
|
-
{
|
61
|
-
// validate input
|
62
|
-
if(IAccessManaged(releaseManager).authority() != authority()) {
|
63
|
-
revert ErrorRegistryAccessManagerReleaseManagerAuthorityMismatch();
|
64
|
-
}
|
65
|
-
|
66
|
-
if(tokenRegistry == address(0)) {
|
67
|
-
revert ErrorRegistryAccessManagerTokenRegistryZero();
|
68
|
-
}
|
69
|
-
|
70
|
-
_releaseManager = releaseManager;
|
71
|
-
_tokenRegistry = tokenRegistry;
|
72
|
-
_idNext = UNIQUE_ROLE_ID_MIN;
|
73
|
-
|
74
|
-
_setAdminRole();
|
75
|
-
_setManagerRole();
|
76
|
-
|
77
|
-
_grantRole(GIF_ADMIN_ROLE(), admin, 0);
|
78
|
-
_grantRole(GIF_MANAGER_ROLE(), manager, 0);
|
79
|
-
|
80
|
-
// set admin
|
81
|
-
_setRoleAdmin(GIF_MANAGER_ROLE(), GIF_ADMIN_ROLE());
|
82
|
-
}
|
83
|
-
|
84
|
-
|
85
|
-
// set unique role for target, role forever have 1 member and never revoked
|
86
|
-
function setAndGrantUniqueRole(
|
87
|
-
address account,
|
88
|
-
address target,
|
89
|
-
bytes4[] memory selector
|
90
|
-
)
|
91
|
-
external
|
92
|
-
restricted // RELEASE_MANAGER_ROLE
|
93
|
-
returns(RoleId)
|
94
|
-
{
|
95
|
-
// TODO define and add checks
|
96
|
-
RoleId roleId = _getNextRoleId();
|
97
|
-
|
98
|
-
_setTargetFunctionRole(target, selector, roleId);
|
99
|
-
_grantRole(roleId, account, 0);
|
100
|
-
}
|
101
|
-
|
102
|
-
function setTargetFunctionRole(
|
103
|
-
address target,
|
104
|
-
bytes4[] memory selector,
|
105
|
-
RoleId roleId
|
106
|
-
)
|
107
|
-
external
|
108
|
-
restricted // RELEASE_MANAGER_ROLE
|
109
|
-
{
|
110
|
-
_setTargetFunctionRole(target, selector, roleId);
|
111
|
-
}
|
112
|
-
|
113
|
-
/*function transferAdmin(address to)
|
114
|
-
external
|
115
|
-
restricted // only with GIF_ADMIN_ROLE or nft owner
|
116
|
-
{
|
117
|
-
_accessManager.revoke(GIF_ADMIN_ROLE, );
|
118
|
-
_accesssManager.grant(GIF_ADMIN_ROLE, to, 0);
|
119
|
-
}*/
|
120
|
-
|
121
|
-
//--- view functions ----------------------------------------------------//
|
122
|
-
|
123
|
-
//--- private functions -------------------------------------------------//
|
124
|
-
|
125
|
-
function _setAdminRole() private
|
126
|
-
{
|
127
|
-
// for ReleaseManager
|
128
|
-
bytes4[] memory functionSelector = new bytes4[](3);
|
129
|
-
functionSelector[0] = ReleaseManager.registerStaking.selector;
|
130
|
-
functionSelector[1] = ReleaseManager.createNextRelease.selector;
|
131
|
-
functionSelector[2] = ReleaseManager.activateNextRelease.selector;
|
132
|
-
|
133
|
-
_setTargetFunctionRole(_releaseManager, functionSelector, GIF_ADMIN_ROLE());
|
134
|
-
}
|
135
|
-
|
136
|
-
function _setManagerRole() private
|
137
|
-
{
|
138
|
-
bytes4[] memory functionSelector = new bytes4[](2);
|
139
|
-
|
140
|
-
functionSelector[0] = ReleaseManager.registerService.selector; // for ReleaseManager
|
141
|
-
functionSelector[1] = ReleaseManager.prepareNextRelease.selector;
|
142
|
-
_setTargetFunctionRole(_releaseManager, functionSelector, GIF_MANAGER_ROLE());
|
143
|
-
|
144
|
-
// for TokenRegistry
|
145
|
-
bytes4[] memory functionSelector2 = new bytes4[](2);
|
146
|
-
functionSelector2[0] = TokenRegistry.setActive.selector;
|
147
|
-
functionSelector2[1] = TokenRegistry.setActiveForVersion.selector;
|
148
|
-
_setTargetFunctionRole(address(_tokenRegistry), functionSelector2, GIF_MANAGER_ROLE());
|
149
|
-
}
|
150
|
-
|
151
|
-
|
152
|
-
function _setTargetFunctionRole(address target, bytes4[] memory selectors, RoleId roleId) private {
|
153
|
-
AccessManager(authority()).setTargetFunctionRole(target, selectors, roleId.toInt());
|
154
|
-
}
|
155
|
-
|
156
|
-
function _setRoleAdmin(RoleId roleId, RoleId adminRoleId) private {
|
157
|
-
AccessManager(authority()).setRoleAdmin(roleId.toInt(), adminRoleId.toInt());
|
158
|
-
}
|
159
|
-
|
160
|
-
function _grantRole(RoleId roleId, address account, uint32 executionDelay) private {
|
161
|
-
AccessManager(authority()).grantRole(roleId.toInt(), account, executionDelay);
|
162
|
-
}
|
163
|
-
|
164
|
-
function _getNextRoleId() private returns(RoleId roleId) {
|
165
|
-
roleId = RoleIdLib.toRoleId(_idNext++);
|
166
|
-
}
|
167
|
-
}
|