@story-protocol/core-sdk 0.0.1-beta-rc.10 → 0.0.1-beta-rc.12
Sign up to get free protection for your applications and to get access to all the features.
- package/dist/declarations/src/client.d.ts +9 -0
- package/dist/declarations/src/client.d.ts.map +1 -1
- package/dist/declarations/src/index.d.ts +2 -1
- package/dist/declarations/src/index.d.ts.map +1 -1
- package/dist/declarations/src/resources/dispute.d.ts +103 -78
- package/dist/declarations/src/resources/dispute.d.ts.map +1 -1
- package/dist/declarations/src/resources/ipAccount.d.ts +84 -76
- package/dist/declarations/src/resources/ipAccount.d.ts.map +1 -1
- package/dist/declarations/src/resources/ipAsset.d.ts +26 -756
- package/dist/declarations/src/resources/ipAsset.d.ts.map +1 -1
- package/dist/declarations/src/resources/license.d.ts +875 -858
- package/dist/declarations/src/resources/license.d.ts.map +1 -1
- package/dist/declarations/src/resources/permission.d.ts +271 -216
- package/dist/declarations/src/resources/permission.d.ts.map +1 -1
- package/dist/declarations/src/resources/policy.d.ts +1094 -277
- package/dist/declarations/src/resources/policy.d.ts.map +1 -1
- package/dist/declarations/src/resources/royalty.d.ts +2155 -0
- package/dist/declarations/src/resources/royalty.d.ts.map +1 -0
- package/dist/declarations/src/types/config.d.ts +6 -3
- package/dist/declarations/src/types/config.d.ts.map +1 -1
- package/dist/declarations/src/types/resources/ipAsset.d.ts +4 -20
- package/dist/declarations/src/types/resources/ipAsset.d.ts.map +1 -1
- package/dist/declarations/src/types/resources/royalty.d.ts +41 -0
- package/dist/declarations/src/types/resources/royalty.d.ts.map +1 -1
- package/dist/story-protocol-core-sdk.cjs.d.ts +1 -1
- package/dist/story-protocol-core-sdk.cjs.dev.js +910 -661
- package/dist/story-protocol-core-sdk.cjs.prod.js +910 -661
- package/dist/story-protocol-core-sdk.esm.js +912 -663
- package/package.json +2 -2
- package/dist/story-protocol-core-sdk.cjs.d.ts.map +0 -1
@@ -1,5 +1,6 @@
|
|
1
1
|
import { PublicClient, WalletClient } from "viem";
|
2
2
|
import { SetPermissionsRequest, SetPermissionsResponse } from "../types/resources/permission.js";
|
3
|
+
import { SupportedChainIds } from "../types/config.js";
|
3
4
|
export declare class PermissionClient {
|
4
5
|
private readonly wallet;
|
5
6
|
private readonly rpcClient;
|
@@ -24,7 +25,38 @@ export declare class PermissionClient {
|
|
24
25
|
readonly name: "AccessControlled__ZeroAddress";
|
25
26
|
readonly type: "error";
|
26
27
|
} | {
|
27
|
-
readonly inputs: readonly [
|
28
|
+
readonly inputs: readonly [{
|
29
|
+
readonly internalType: "address";
|
30
|
+
readonly name: "signer";
|
31
|
+
readonly type: "address";
|
32
|
+
}, {
|
33
|
+
readonly internalType: "address";
|
34
|
+
readonly name: "to";
|
35
|
+
readonly type: "address";
|
36
|
+
}];
|
37
|
+
readonly name: "AccessController__BothCallerAndRecipientAreNotRegisteredModule";
|
38
|
+
readonly type: "error";
|
39
|
+
} | {
|
40
|
+
readonly inputs: readonly [];
|
41
|
+
/**
|
42
|
+
* Sets the permission for a specific function call
|
43
|
+
* Each policy is represented as a mapping from an IP account address to a signer address to a recipient
|
44
|
+
* address to a function selector to a permission level. The permission level can be 0 (ABSTAIN), 1 (ALLOW), or
|
45
|
+
* 2 (DENY).
|
46
|
+
* By default, all policies are set to 0 (ABSTAIN), which means that the permission is not set.
|
47
|
+
* The owner of ipAccount by default has all permission.
|
48
|
+
* address(0) => wildcard
|
49
|
+
* bytes4(0) => wildcard
|
50
|
+
* Specific permission overrides wildcard permission.
|
51
|
+
* @param request The request object containing necessary data to set permissions.
|
52
|
+
* @param request.ipAsset The address of the IP account that grants the permission for `signer`
|
53
|
+
* @param request.signer The address that can call `to` on behalf of the `ipAccount`
|
54
|
+
* @param request.to The address that can be called by the `signer` (currently only modules can be `to`)
|
55
|
+
* @param request.func Optional. The function selector string of `to` that can be called by the `signer` on behalf of the `ipAccount`. Be default, it allows all functions.
|
56
|
+
* @param request.permission The new permission level
|
57
|
+
* @returns A Promise that resolves to an object containing the transaction hash
|
58
|
+
* @emits PermissionSet (ipAccountOwner, ipAccount, signer, to, func, permission)
|
59
|
+
*/
|
28
60
|
readonly name: "AccessController__CallerIsNotIPAccount";
|
29
61
|
readonly type: "error";
|
30
62
|
} | {
|
@@ -63,61 +95,29 @@ export declare class PermissionClient {
|
|
63
95
|
readonly inputs: readonly [];
|
64
96
|
readonly name: "AccessController__PermissionIsNotValid";
|
65
97
|
readonly type: "error";
|
66
|
-
} | {
|
67
|
-
readonly inputs: readonly [{
|
68
|
-
readonly internalType: "address";
|
69
|
-
readonly name: "to";
|
70
|
-
readonly type: "address";
|
71
|
-
}];
|
72
|
-
readonly name: "AccessController__RecipientIsNotRegisteredModule";
|
73
|
-
readonly type: "error";
|
74
98
|
} | {
|
75
99
|
readonly inputs: readonly [];
|
76
100
|
readonly name: "AccessController__SignerIsZeroAddress";
|
77
101
|
readonly type: "error";
|
78
102
|
} | {
|
79
103
|
readonly inputs: readonly [];
|
80
|
-
readonly name: "
|
81
|
-
readonly type: "error";
|
82
|
-
} | {
|
83
|
-
readonly inputs: readonly [];
|
84
|
-
readonly name: "AncestorsVaultLAP__ClaimerNotAnAncestor";
|
85
|
-
readonly type: "error";
|
86
|
-
} | {
|
87
|
-
readonly inputs: readonly [];
|
88
|
-
readonly name: "AncestorsVaultLAP__ERC20BalanceNotZero";
|
89
|
-
readonly type: "error";
|
90
|
-
} | {
|
91
|
-
readonly inputs: readonly [];
|
92
|
-
readonly name: "AncestorsVaultLAP__ETHBalanceNotZero";
|
93
|
-
readonly type: "error";
|
94
|
-
} | {
|
95
|
-
readonly inputs: readonly [];
|
96
|
-
readonly name: "AncestorsVaultLAP__InvalidAncestorsHash";
|
97
|
-
readonly type: "error";
|
98
|
-
} | {
|
99
|
-
readonly inputs: readonly [];
|
100
|
-
readonly name: "AncestorsVaultLAP__InvalidClaimer";
|
101
|
-
readonly type: "error";
|
102
|
-
} | {
|
103
|
-
readonly inputs: readonly [];
|
104
|
-
readonly name: "AncestorsVaultLAP__TransferFailed";
|
104
|
+
readonly name: "ArbitrationPolicySP__NotDisputeModule";
|
105
105
|
readonly type: "error";
|
106
106
|
} | {
|
107
107
|
readonly inputs: readonly [];
|
108
|
-
readonly name: "
|
108
|
+
readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
|
109
109
|
readonly type: "error";
|
110
110
|
} | {
|
111
111
|
readonly inputs: readonly [];
|
112
|
-
readonly name: "
|
112
|
+
readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
|
113
113
|
readonly type: "error";
|
114
114
|
} | {
|
115
115
|
readonly inputs: readonly [];
|
116
|
-
readonly name: "
|
116
|
+
readonly name: "BasePolicyFrameworkManager__CallerNotLicensingModule";
|
117
117
|
readonly type: "error";
|
118
118
|
} | {
|
119
119
|
readonly inputs: readonly [];
|
120
|
-
readonly name: "
|
120
|
+
readonly name: "CoreMetadataModule__MetadataAlreadyFrozen";
|
121
121
|
readonly type: "error";
|
122
122
|
} | {
|
123
123
|
readonly inputs: readonly [];
|
@@ -147,10 +147,6 @@ export declare class PermissionClient {
|
|
147
147
|
readonly inputs: readonly [];
|
148
148
|
readonly name: "DisputeModule__NotWhitelistedDisputeTag";
|
149
149
|
readonly type: "error";
|
150
|
-
} | {
|
151
|
-
readonly inputs: readonly [];
|
152
|
-
readonly name: "DisputeModule__UnauthorizedAccess";
|
153
|
-
readonly type: "error";
|
154
150
|
} | {
|
155
151
|
readonly inputs: readonly [];
|
156
152
|
readonly name: "DisputeModule__ZeroArbitrationPolicy";
|
@@ -235,6 +231,18 @@ export declare class PermissionClient {
|
|
235
231
|
readonly inputs: readonly [];
|
236
232
|
readonly name: "IPAssetRegistry__InvalidMetadataProvider";
|
237
233
|
readonly type: "error";
|
234
|
+
} | {
|
235
|
+
readonly inputs: readonly [{
|
236
|
+
readonly internalType: "address";
|
237
|
+
readonly name: "contractAddress";
|
238
|
+
readonly type: "address";
|
239
|
+
}, {
|
240
|
+
readonly internalType: "uint256";
|
241
|
+
readonly name: "tokenId";
|
242
|
+
readonly type: "uint256";
|
243
|
+
}];
|
244
|
+
readonly name: "IPAssetRegistry__InvalidToken";
|
245
|
+
readonly type: "error";
|
238
246
|
} | {
|
239
247
|
readonly inputs: readonly [];
|
240
248
|
readonly name: "IPAssetRegistry__NotYetRegistered";
|
@@ -251,6 +259,22 @@ export declare class PermissionClient {
|
|
251
259
|
readonly inputs: readonly [];
|
252
260
|
readonly name: "IPAssetRegistry__Unauthorized";
|
253
261
|
readonly type: "error";
|
262
|
+
} | {
|
263
|
+
readonly inputs: readonly [{
|
264
|
+
readonly internalType: "address";
|
265
|
+
readonly name: "contractAddress";
|
266
|
+
readonly type: "address";
|
267
|
+
}];
|
268
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721";
|
269
|
+
readonly type: "error";
|
270
|
+
} | {
|
271
|
+
readonly inputs: readonly [{
|
272
|
+
readonly internalType: "address";
|
273
|
+
readonly name: "contractAddress";
|
274
|
+
readonly type: "address";
|
275
|
+
}];
|
276
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721Metadata";
|
277
|
+
readonly type: "error";
|
254
278
|
} | {
|
255
279
|
readonly inputs: readonly [];
|
256
280
|
readonly name: "IPResolver_InvalidIP";
|
@@ -259,6 +283,30 @@ export declare class PermissionClient {
|
|
259
283
|
readonly inputs: readonly [];
|
260
284
|
readonly name: "IPResolver_Unauthorized";
|
261
285
|
readonly type: "error";
|
286
|
+
} | {
|
287
|
+
readonly inputs: readonly [];
|
288
|
+
readonly name: "IpRoyaltyVault__AlreadyClaimed";
|
289
|
+
readonly type: "error";
|
290
|
+
} | {
|
291
|
+
readonly inputs: readonly [];
|
292
|
+
readonly name: "IpRoyaltyVault__ClaimerNotAnAncestor";
|
293
|
+
readonly type: "error";
|
294
|
+
} | {
|
295
|
+
readonly inputs: readonly [];
|
296
|
+
readonly name: "IpRoyaltyVault__NotRoyaltyPolicyLAP";
|
297
|
+
readonly type: "error";
|
298
|
+
} | {
|
299
|
+
readonly inputs: readonly [];
|
300
|
+
readonly name: "IpRoyaltyVault__SnapshotIntervalTooShort";
|
301
|
+
readonly type: "error";
|
302
|
+
} | {
|
303
|
+
readonly inputs: readonly [];
|
304
|
+
readonly name: "IpRoyaltyVault__ZeroIpId";
|
305
|
+
readonly type: "error";
|
306
|
+
} | {
|
307
|
+
readonly inputs: readonly [];
|
308
|
+
readonly name: "IpRoyaltyVault__ZeroRoyaltyPolicyLAP";
|
309
|
+
readonly type: "error";
|
262
310
|
} | {
|
263
311
|
readonly inputs: readonly [];
|
264
312
|
readonly name: "LicenseRegistry__CallerNotLicensingModule";
|
@@ -279,10 +327,6 @@ export declare class PermissionClient {
|
|
279
327
|
readonly inputs: readonly [];
|
280
328
|
readonly name: "LicenseRegistry__ZeroLicensingModule";
|
281
329
|
readonly type: "error";
|
282
|
-
} | {
|
283
|
-
readonly inputs: readonly [];
|
284
|
-
readonly name: "LicensingModuleAware__CallerNotLicensingModule";
|
285
|
-
readonly type: "error";
|
286
330
|
} | {
|
287
331
|
readonly inputs: readonly [];
|
288
332
|
readonly name: "LicensingModule__CallerNotLicenseRegistry";
|
@@ -343,6 +387,10 @@ export declare class PermissionClient {
|
|
343
387
|
readonly inputs: readonly [];
|
344
388
|
readonly name: "LicensingModule__InvalidPolicyFramework";
|
345
389
|
readonly type: "error";
|
390
|
+
} | {
|
391
|
+
readonly inputs: readonly [];
|
392
|
+
readonly name: "LicensingModule__IpAlreadyLinked";
|
393
|
+
readonly type: "error";
|
346
394
|
} | {
|
347
395
|
readonly inputs: readonly [];
|
348
396
|
readonly name: "LicensingModule__LicensorDoesntHaveThisPolicy";
|
@@ -359,6 +407,10 @@ export declare class PermissionClient {
|
|
359
407
|
readonly inputs: readonly [];
|
360
408
|
readonly name: "LicensingModule__LinkingRevokedLicense";
|
361
409
|
readonly type: "error";
|
410
|
+
} | {
|
411
|
+
readonly inputs: readonly [];
|
412
|
+
readonly name: "LicensingModule__MintAmountZero";
|
413
|
+
readonly type: "error";
|
362
414
|
} | {
|
363
415
|
readonly inputs: readonly [];
|
364
416
|
readonly name: "LicensingModule__MintLicenseParamFailed";
|
@@ -395,6 +447,10 @@ export declare class PermissionClient {
|
|
395
447
|
readonly inputs: readonly [];
|
396
448
|
readonly name: "LicensingModule__PolicyNotFound";
|
397
449
|
readonly type: "error";
|
450
|
+
} | {
|
451
|
+
readonly inputs: readonly [];
|
452
|
+
readonly name: "LicensingModule__ReceiverZeroAddress";
|
453
|
+
readonly type: "error";
|
398
454
|
} | {
|
399
455
|
readonly inputs: readonly [];
|
400
456
|
readonly name: "LicensingModule__RegisterPolicyFrameworkMismatch";
|
@@ -523,10 +579,6 @@ export declare class PermissionClient {
|
|
523
579
|
readonly inputs: readonly [];
|
524
580
|
readonly name: "PolicyFrameworkManager__GettingPolicyWrongFramework";
|
525
581
|
readonly type: "error";
|
526
|
-
} | {
|
527
|
-
readonly inputs: readonly [];
|
528
|
-
readonly name: "RegistrationModule__InvalidOwner";
|
529
|
-
readonly type: "error";
|
530
582
|
} | {
|
531
583
|
readonly inputs: readonly [];
|
532
584
|
readonly name: "RoyaltyModule__CanOnlyMintSelectedPolicy";
|
@@ -547,10 +599,6 @@ export declare class PermissionClient {
|
|
547
599
|
readonly inputs: readonly [];
|
548
600
|
readonly name: "RoyaltyModule__NotAllowedCaller";
|
549
601
|
readonly type: "error";
|
550
|
-
} | {
|
551
|
-
readonly inputs: readonly [];
|
552
|
-
readonly name: "RoyaltyModule__NotRegisteredIpId";
|
553
|
-
readonly type: "error";
|
554
602
|
} | {
|
555
603
|
readonly inputs: readonly [];
|
556
604
|
readonly name: "RoyaltyModule__NotWhitelistedRoyaltyPolicy";
|
@@ -587,30 +635,10 @@ export declare class PermissionClient {
|
|
587
635
|
readonly inputs: readonly [];
|
588
636
|
readonly name: "RoyaltyPolicyLAP__ImplementationAlreadySet";
|
589
637
|
readonly type: "error";
|
590
|
-
} | {
|
591
|
-
readonly inputs: readonly [];
|
592
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestors";
|
593
|
-
readonly type: "error";
|
594
|
-
} | {
|
595
|
-
readonly inputs: readonly [];
|
596
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsHash";
|
597
|
-
readonly type: "error";
|
598
|
-
} | {
|
599
|
-
readonly inputs: readonly [];
|
600
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsLength";
|
601
|
-
readonly type: "error";
|
602
|
-
} | {
|
603
|
-
readonly inputs: readonly [];
|
604
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsRoyalty";
|
605
|
-
readonly type: "error";
|
606
638
|
} | {
|
607
639
|
readonly inputs: readonly [];
|
608
640
|
readonly name: "RoyaltyPolicyLAP__InvalidParentRoyaltiesLength";
|
609
641
|
readonly type: "error";
|
610
|
-
} | {
|
611
|
-
readonly inputs: readonly [];
|
612
|
-
readonly name: "RoyaltyPolicyLAP__InvalidRoyaltyAmountLength";
|
613
|
-
readonly type: "error";
|
614
642
|
} | {
|
615
643
|
readonly inputs: readonly [];
|
616
644
|
readonly name: "RoyaltyPolicyLAP__LastPositionNotAbleToMintLicense";
|
@@ -625,15 +653,15 @@ export declare class PermissionClient {
|
|
625
653
|
readonly type: "error";
|
626
654
|
} | {
|
627
655
|
readonly inputs: readonly [];
|
628
|
-
readonly name: "
|
656
|
+
readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
|
629
657
|
readonly type: "error";
|
630
658
|
} | {
|
631
659
|
readonly inputs: readonly [];
|
632
|
-
readonly name: "
|
660
|
+
readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
|
633
661
|
readonly type: "error";
|
634
662
|
} | {
|
635
663
|
readonly inputs: readonly [];
|
636
|
-
readonly name: "
|
664
|
+
readonly name: "RoyaltyPolicyLAP__ZeroIpRoyaltyVaultBeacon";
|
637
665
|
readonly type: "error";
|
638
666
|
} | {
|
639
667
|
readonly inputs: readonly [];
|
@@ -710,6 +738,67 @@ export declare class PermissionClient {
|
|
710
738
|
})[];
|
711
739
|
accessControllerConfig: {
|
712
740
|
abi: ({
|
741
|
+
readonly anonymous: false;
|
742
|
+
readonly inputs: readonly [{
|
743
|
+
readonly indexed: false;
|
744
|
+
readonly internalType: "address";
|
745
|
+
readonly name: "ipAccountOwner";
|
746
|
+
readonly type: "address";
|
747
|
+
}, {
|
748
|
+
readonly indexed: true;
|
749
|
+
readonly internalType: "address";
|
750
|
+
readonly name: "ipAccount";
|
751
|
+
readonly type: "address";
|
752
|
+
}, {
|
753
|
+
readonly indexed: true;
|
754
|
+
readonly internalType: "address";
|
755
|
+
readonly name: "signer";
|
756
|
+
readonly type: "address";
|
757
|
+
}, {
|
758
|
+
readonly indexed: true;
|
759
|
+
readonly internalType: "address";
|
760
|
+
readonly name: "to";
|
761
|
+
readonly type: "address";
|
762
|
+
}, {
|
763
|
+
readonly indexed: false;
|
764
|
+
readonly internalType: "bytes4";
|
765
|
+
readonly name: "func";
|
766
|
+
readonly type: "bytes4";
|
767
|
+
}, {
|
768
|
+
readonly indexed: false;
|
769
|
+
readonly internalType: "uint8";
|
770
|
+
readonly name: "permission";
|
771
|
+
readonly type: "uint8";
|
772
|
+
}];
|
773
|
+
readonly name: "PermissionSet";
|
774
|
+
readonly type: "event";
|
775
|
+
} | {
|
776
|
+
readonly inputs: readonly [{
|
777
|
+
readonly internalType: "address";
|
778
|
+
readonly name: "ipAccount";
|
779
|
+
readonly type: "address";
|
780
|
+
}, {
|
781
|
+
readonly internalType: "address";
|
782
|
+
readonly name: "signer";
|
783
|
+
readonly type: "address";
|
784
|
+
}, {
|
785
|
+
readonly internalType: "address";
|
786
|
+
readonly name: "to";
|
787
|
+
readonly type: "address";
|
788
|
+
}, {
|
789
|
+
readonly internalType: "bytes4";
|
790
|
+
readonly name: "func";
|
791
|
+
readonly type: "bytes4";
|
792
|
+
}, {
|
793
|
+
readonly internalType: "uint8";
|
794
|
+
readonly name: "permission";
|
795
|
+
readonly type: "uint8";
|
796
|
+
}];
|
797
|
+
readonly name: "setPermission";
|
798
|
+
readonly outputs: readonly [];
|
799
|
+
readonly stateMutability: "nonpayable";
|
800
|
+
readonly type: "function";
|
801
|
+
} | {
|
713
802
|
readonly inputs: readonly [{
|
714
803
|
readonly internalType: "address";
|
715
804
|
readonly name: "caller";
|
@@ -730,7 +819,38 @@ export declare class PermissionClient {
|
|
730
819
|
readonly name: "AccessControlled__ZeroAddress";
|
731
820
|
readonly type: "error";
|
732
821
|
} | {
|
733
|
-
readonly inputs: readonly [
|
822
|
+
readonly inputs: readonly [{
|
823
|
+
readonly internalType: "address";
|
824
|
+
readonly name: "signer";
|
825
|
+
readonly type: "address";
|
826
|
+
}, {
|
827
|
+
readonly internalType: "address";
|
828
|
+
readonly name: "to";
|
829
|
+
readonly type: "address";
|
830
|
+
}];
|
831
|
+
readonly name: "AccessController__BothCallerAndRecipientAreNotRegisteredModule";
|
832
|
+
readonly type: "error";
|
833
|
+
} | {
|
834
|
+
readonly inputs: readonly [];
|
835
|
+
/**
|
836
|
+
* Sets the permission for a specific function call
|
837
|
+
* Each policy is represented as a mapping from an IP account address to a signer address to a recipient
|
838
|
+
* address to a function selector to a permission level. The permission level can be 0 (ABSTAIN), 1 (ALLOW), or
|
839
|
+
* 2 (DENY).
|
840
|
+
* By default, all policies are set to 0 (ABSTAIN), which means that the permission is not set.
|
841
|
+
* The owner of ipAccount by default has all permission.
|
842
|
+
* address(0) => wildcard
|
843
|
+
* bytes4(0) => wildcard
|
844
|
+
* Specific permission overrides wildcard permission.
|
845
|
+
* @param request The request object containing necessary data to set permissions.
|
846
|
+
* @param request.ipAsset The address of the IP account that grants the permission for `signer`
|
847
|
+
* @param request.signer The address that can call `to` on behalf of the `ipAccount`
|
848
|
+
* @param request.to The address that can be called by the `signer` (currently only modules can be `to`)
|
849
|
+
* @param request.func Optional. The function selector string of `to` that can be called by the `signer` on behalf of the `ipAccount`. Be default, it allows all functions.
|
850
|
+
* @param request.permission The new permission level
|
851
|
+
* @returns A Promise that resolves to an object containing the transaction hash
|
852
|
+
* @emits PermissionSet (ipAccountOwner, ipAccount, signer, to, func, permission)
|
853
|
+
*/
|
734
854
|
readonly name: "AccessController__CallerIsNotIPAccount";
|
735
855
|
readonly type: "error";
|
736
856
|
} | {
|
@@ -769,61 +889,29 @@ export declare class PermissionClient {
|
|
769
889
|
readonly inputs: readonly [];
|
770
890
|
readonly name: "AccessController__PermissionIsNotValid";
|
771
891
|
readonly type: "error";
|
772
|
-
} | {
|
773
|
-
readonly inputs: readonly [{
|
774
|
-
readonly internalType: "address";
|
775
|
-
readonly name: "to";
|
776
|
-
readonly type: "address";
|
777
|
-
}];
|
778
|
-
readonly name: "AccessController__RecipientIsNotRegisteredModule";
|
779
|
-
readonly type: "error";
|
780
892
|
} | {
|
781
893
|
readonly inputs: readonly [];
|
782
894
|
readonly name: "AccessController__SignerIsZeroAddress";
|
783
895
|
readonly type: "error";
|
784
896
|
} | {
|
785
897
|
readonly inputs: readonly [];
|
786
|
-
readonly name: "
|
787
|
-
readonly type: "error";
|
788
|
-
} | {
|
789
|
-
readonly inputs: readonly [];
|
790
|
-
readonly name: "AncestorsVaultLAP__ClaimerNotAnAncestor";
|
791
|
-
readonly type: "error";
|
792
|
-
} | {
|
793
|
-
readonly inputs: readonly [];
|
794
|
-
readonly name: "AncestorsVaultLAP__ERC20BalanceNotZero";
|
795
|
-
readonly type: "error";
|
796
|
-
} | {
|
797
|
-
readonly inputs: readonly [];
|
798
|
-
readonly name: "AncestorsVaultLAP__ETHBalanceNotZero";
|
799
|
-
readonly type: "error";
|
800
|
-
} | {
|
801
|
-
readonly inputs: readonly [];
|
802
|
-
readonly name: "AncestorsVaultLAP__InvalidAncestorsHash";
|
803
|
-
readonly type: "error";
|
804
|
-
} | {
|
805
|
-
readonly inputs: readonly [];
|
806
|
-
readonly name: "AncestorsVaultLAP__InvalidClaimer";
|
807
|
-
readonly type: "error";
|
808
|
-
} | {
|
809
|
-
readonly inputs: readonly [];
|
810
|
-
readonly name: "AncestorsVaultLAP__TransferFailed";
|
898
|
+
readonly name: "ArbitrationPolicySP__NotDisputeModule";
|
811
899
|
readonly type: "error";
|
812
900
|
} | {
|
813
901
|
readonly inputs: readonly [];
|
814
|
-
readonly name: "
|
902
|
+
readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
|
815
903
|
readonly type: "error";
|
816
904
|
} | {
|
817
905
|
readonly inputs: readonly [];
|
818
|
-
readonly name: "
|
906
|
+
readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
|
819
907
|
readonly type: "error";
|
820
908
|
} | {
|
821
909
|
readonly inputs: readonly [];
|
822
|
-
readonly name: "
|
910
|
+
readonly name: "BasePolicyFrameworkManager__CallerNotLicensingModule";
|
823
911
|
readonly type: "error";
|
824
912
|
} | {
|
825
913
|
readonly inputs: readonly [];
|
826
|
-
readonly name: "
|
914
|
+
readonly name: "CoreMetadataModule__MetadataAlreadyFrozen";
|
827
915
|
readonly type: "error";
|
828
916
|
} | {
|
829
917
|
readonly inputs: readonly [];
|
@@ -853,10 +941,6 @@ export declare class PermissionClient {
|
|
853
941
|
readonly inputs: readonly [];
|
854
942
|
readonly name: "DisputeModule__NotWhitelistedDisputeTag";
|
855
943
|
readonly type: "error";
|
856
|
-
} | {
|
857
|
-
readonly inputs: readonly [];
|
858
|
-
readonly name: "DisputeModule__UnauthorizedAccess";
|
859
|
-
readonly type: "error";
|
860
944
|
} | {
|
861
945
|
readonly inputs: readonly [];
|
862
946
|
readonly name: "DisputeModule__ZeroArbitrationPolicy";
|
@@ -941,6 +1025,18 @@ export declare class PermissionClient {
|
|
941
1025
|
readonly inputs: readonly [];
|
942
1026
|
readonly name: "IPAssetRegistry__InvalidMetadataProvider";
|
943
1027
|
readonly type: "error";
|
1028
|
+
} | {
|
1029
|
+
readonly inputs: readonly [{
|
1030
|
+
readonly internalType: "address";
|
1031
|
+
readonly name: "contractAddress";
|
1032
|
+
readonly type: "address";
|
1033
|
+
}, {
|
1034
|
+
readonly internalType: "uint256";
|
1035
|
+
readonly name: "tokenId";
|
1036
|
+
readonly type: "uint256";
|
1037
|
+
}];
|
1038
|
+
readonly name: "IPAssetRegistry__InvalidToken";
|
1039
|
+
readonly type: "error";
|
944
1040
|
} | {
|
945
1041
|
readonly inputs: readonly [];
|
946
1042
|
readonly name: "IPAssetRegistry__NotYetRegistered";
|
@@ -957,6 +1053,22 @@ export declare class PermissionClient {
|
|
957
1053
|
readonly inputs: readonly [];
|
958
1054
|
readonly name: "IPAssetRegistry__Unauthorized";
|
959
1055
|
readonly type: "error";
|
1056
|
+
} | {
|
1057
|
+
readonly inputs: readonly [{
|
1058
|
+
readonly internalType: "address";
|
1059
|
+
readonly name: "contractAddress";
|
1060
|
+
readonly type: "address";
|
1061
|
+
}];
|
1062
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721";
|
1063
|
+
readonly type: "error";
|
1064
|
+
} | {
|
1065
|
+
readonly inputs: readonly [{
|
1066
|
+
readonly internalType: "address";
|
1067
|
+
readonly name: "contractAddress";
|
1068
|
+
readonly type: "address";
|
1069
|
+
}];
|
1070
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721Metadata";
|
1071
|
+
readonly type: "error";
|
960
1072
|
} | {
|
961
1073
|
readonly inputs: readonly [];
|
962
1074
|
readonly name: "IPResolver_InvalidIP";
|
@@ -965,6 +1077,30 @@ export declare class PermissionClient {
|
|
965
1077
|
readonly inputs: readonly [];
|
966
1078
|
readonly name: "IPResolver_Unauthorized";
|
967
1079
|
readonly type: "error";
|
1080
|
+
} | {
|
1081
|
+
readonly inputs: readonly [];
|
1082
|
+
readonly name: "IpRoyaltyVault__AlreadyClaimed";
|
1083
|
+
readonly type: "error";
|
1084
|
+
} | {
|
1085
|
+
readonly inputs: readonly [];
|
1086
|
+
readonly name: "IpRoyaltyVault__ClaimerNotAnAncestor";
|
1087
|
+
readonly type: "error";
|
1088
|
+
} | {
|
1089
|
+
readonly inputs: readonly [];
|
1090
|
+
readonly name: "IpRoyaltyVault__NotRoyaltyPolicyLAP";
|
1091
|
+
readonly type: "error";
|
1092
|
+
} | {
|
1093
|
+
readonly inputs: readonly [];
|
1094
|
+
readonly name: "IpRoyaltyVault__SnapshotIntervalTooShort";
|
1095
|
+
readonly type: "error";
|
1096
|
+
} | {
|
1097
|
+
readonly inputs: readonly [];
|
1098
|
+
readonly name: "IpRoyaltyVault__ZeroIpId";
|
1099
|
+
readonly type: "error";
|
1100
|
+
} | {
|
1101
|
+
readonly inputs: readonly [];
|
1102
|
+
readonly name: "IpRoyaltyVault__ZeroRoyaltyPolicyLAP";
|
1103
|
+
readonly type: "error";
|
968
1104
|
} | {
|
969
1105
|
readonly inputs: readonly [];
|
970
1106
|
readonly name: "LicenseRegistry__CallerNotLicensingModule";
|
@@ -985,10 +1121,6 @@ export declare class PermissionClient {
|
|
985
1121
|
readonly inputs: readonly [];
|
986
1122
|
readonly name: "LicenseRegistry__ZeroLicensingModule";
|
987
1123
|
readonly type: "error";
|
988
|
-
} | {
|
989
|
-
readonly inputs: readonly [];
|
990
|
-
readonly name: "LicensingModuleAware__CallerNotLicensingModule";
|
991
|
-
readonly type: "error";
|
992
1124
|
} | {
|
993
1125
|
readonly inputs: readonly [];
|
994
1126
|
readonly name: "LicensingModule__CallerNotLicenseRegistry";
|
@@ -1049,6 +1181,10 @@ export declare class PermissionClient {
|
|
1049
1181
|
readonly inputs: readonly [];
|
1050
1182
|
readonly name: "LicensingModule__InvalidPolicyFramework";
|
1051
1183
|
readonly type: "error";
|
1184
|
+
} | {
|
1185
|
+
readonly inputs: readonly [];
|
1186
|
+
readonly name: "LicensingModule__IpAlreadyLinked";
|
1187
|
+
readonly type: "error";
|
1052
1188
|
} | {
|
1053
1189
|
readonly inputs: readonly [];
|
1054
1190
|
readonly name: "LicensingModule__LicensorDoesntHaveThisPolicy";
|
@@ -1065,6 +1201,10 @@ export declare class PermissionClient {
|
|
1065
1201
|
readonly inputs: readonly [];
|
1066
1202
|
readonly name: "LicensingModule__LinkingRevokedLicense";
|
1067
1203
|
readonly type: "error";
|
1204
|
+
} | {
|
1205
|
+
readonly inputs: readonly [];
|
1206
|
+
readonly name: "LicensingModule__MintAmountZero";
|
1207
|
+
readonly type: "error";
|
1068
1208
|
} | {
|
1069
1209
|
readonly inputs: readonly [];
|
1070
1210
|
readonly name: "LicensingModule__MintLicenseParamFailed";
|
@@ -1101,6 +1241,10 @@ export declare class PermissionClient {
|
|
1101
1241
|
readonly inputs: readonly [];
|
1102
1242
|
readonly name: "LicensingModule__PolicyNotFound";
|
1103
1243
|
readonly type: "error";
|
1244
|
+
} | {
|
1245
|
+
readonly inputs: readonly [];
|
1246
|
+
readonly name: "LicensingModule__ReceiverZeroAddress";
|
1247
|
+
readonly type: "error";
|
1104
1248
|
} | {
|
1105
1249
|
readonly inputs: readonly [];
|
1106
1250
|
readonly name: "LicensingModule__RegisterPolicyFrameworkMismatch";
|
@@ -1229,10 +1373,6 @@ export declare class PermissionClient {
|
|
1229
1373
|
readonly inputs: readonly [];
|
1230
1374
|
readonly name: "PolicyFrameworkManager__GettingPolicyWrongFramework";
|
1231
1375
|
readonly type: "error";
|
1232
|
-
} | {
|
1233
|
-
readonly inputs: readonly [];
|
1234
|
-
readonly name: "RegistrationModule__InvalidOwner";
|
1235
|
-
readonly type: "error";
|
1236
1376
|
} | {
|
1237
1377
|
readonly inputs: readonly [];
|
1238
1378
|
readonly name: "RoyaltyModule__CanOnlyMintSelectedPolicy";
|
@@ -1253,10 +1393,6 @@ export declare class PermissionClient {
|
|
1253
1393
|
readonly inputs: readonly [];
|
1254
1394
|
readonly name: "RoyaltyModule__NotAllowedCaller";
|
1255
1395
|
readonly type: "error";
|
1256
|
-
} | {
|
1257
|
-
readonly inputs: readonly [];
|
1258
|
-
readonly name: "RoyaltyModule__NotRegisteredIpId";
|
1259
|
-
readonly type: "error";
|
1260
1396
|
} | {
|
1261
1397
|
readonly inputs: readonly [];
|
1262
1398
|
readonly name: "RoyaltyModule__NotWhitelistedRoyaltyPolicy";
|
@@ -1293,30 +1429,10 @@ export declare class PermissionClient {
|
|
1293
1429
|
readonly inputs: readonly [];
|
1294
1430
|
readonly name: "RoyaltyPolicyLAP__ImplementationAlreadySet";
|
1295
1431
|
readonly type: "error";
|
1296
|
-
} | {
|
1297
|
-
readonly inputs: readonly [];
|
1298
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestors";
|
1299
|
-
readonly type: "error";
|
1300
|
-
} | {
|
1301
|
-
readonly inputs: readonly [];
|
1302
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsHash";
|
1303
|
-
readonly type: "error";
|
1304
|
-
} | {
|
1305
|
-
readonly inputs: readonly [];
|
1306
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsLength";
|
1307
|
-
readonly type: "error";
|
1308
|
-
} | {
|
1309
|
-
readonly inputs: readonly [];
|
1310
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsRoyalty";
|
1311
|
-
readonly type: "error";
|
1312
1432
|
} | {
|
1313
1433
|
readonly inputs: readonly [];
|
1314
1434
|
readonly name: "RoyaltyPolicyLAP__InvalidParentRoyaltiesLength";
|
1315
1435
|
readonly type: "error";
|
1316
|
-
} | {
|
1317
|
-
readonly inputs: readonly [];
|
1318
|
-
readonly name: "RoyaltyPolicyLAP__InvalidRoyaltyAmountLength";
|
1319
|
-
readonly type: "error";
|
1320
1436
|
} | {
|
1321
1437
|
readonly inputs: readonly [];
|
1322
1438
|
readonly name: "RoyaltyPolicyLAP__LastPositionNotAbleToMintLicense";
|
@@ -1331,15 +1447,15 @@ export declare class PermissionClient {
|
|
1331
1447
|
readonly type: "error";
|
1332
1448
|
} | {
|
1333
1449
|
readonly inputs: readonly [];
|
1334
|
-
readonly name: "
|
1450
|
+
readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
|
1335
1451
|
readonly type: "error";
|
1336
1452
|
} | {
|
1337
1453
|
readonly inputs: readonly [];
|
1338
|
-
readonly name: "
|
1454
|
+
readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
|
1339
1455
|
readonly type: "error";
|
1340
1456
|
} | {
|
1341
1457
|
readonly inputs: readonly [];
|
1342
|
-
readonly name: "
|
1458
|
+
readonly name: "RoyaltyPolicyLAP__ZeroIpRoyaltyVaultBeacon";
|
1343
1459
|
readonly type: "error";
|
1344
1460
|
} | {
|
1345
1461
|
readonly inputs: readonly [];
|
@@ -1357,71 +1473,10 @@ export declare class PermissionClient {
|
|
1357
1473
|
readonly inputs: readonly [];
|
1358
1474
|
readonly name: "RoyaltyPolicyLAP__ZeroRoyaltyModule";
|
1359
1475
|
readonly type: "error";
|
1360
|
-
} | {
|
1361
|
-
readonly anonymous: false;
|
1362
|
-
readonly inputs: readonly [{
|
1363
|
-
readonly indexed: false;
|
1364
|
-
readonly internalType: "address";
|
1365
|
-
readonly name: "ipAccountOwner";
|
1366
|
-
readonly type: "address";
|
1367
|
-
}, {
|
1368
|
-
readonly indexed: true;
|
1369
|
-
readonly internalType: "address";
|
1370
|
-
readonly name: "ipAccount";
|
1371
|
-
readonly type: "address";
|
1372
|
-
}, {
|
1373
|
-
readonly indexed: true;
|
1374
|
-
readonly internalType: "address";
|
1375
|
-
readonly name: "signer";
|
1376
|
-
readonly type: "address";
|
1377
|
-
}, {
|
1378
|
-
readonly indexed: true;
|
1379
|
-
readonly internalType: "address";
|
1380
|
-
readonly name: "to";
|
1381
|
-
readonly type: "address";
|
1382
|
-
}, {
|
1383
|
-
readonly indexed: false;
|
1384
|
-
readonly internalType: "bytes4";
|
1385
|
-
readonly name: "func";
|
1386
|
-
readonly type: "bytes4";
|
1387
|
-
}, {
|
1388
|
-
readonly indexed: false;
|
1389
|
-
readonly internalType: "uint8";
|
1390
|
-
readonly name: "permission";
|
1391
|
-
readonly type: "uint8";
|
1392
|
-
}];
|
1393
|
-
readonly name: "PermissionSet";
|
1394
|
-
readonly type: "event";
|
1395
|
-
} | {
|
1396
|
-
readonly inputs: readonly [{
|
1397
|
-
readonly internalType: "address";
|
1398
|
-
readonly name: "ipAccount";
|
1399
|
-
readonly type: "address";
|
1400
|
-
}, {
|
1401
|
-
readonly internalType: "address";
|
1402
|
-
readonly name: "signer";
|
1403
|
-
readonly type: "address";
|
1404
|
-
}, {
|
1405
|
-
readonly internalType: "address";
|
1406
|
-
readonly name: "to";
|
1407
|
-
readonly type: "address";
|
1408
|
-
}, {
|
1409
|
-
readonly internalType: "bytes4";
|
1410
|
-
readonly name: "func";
|
1411
|
-
readonly type: "bytes4";
|
1412
|
-
}, {
|
1413
|
-
readonly internalType: "uint8";
|
1414
|
-
readonly name: "permission";
|
1415
|
-
readonly type: "uint8";
|
1416
|
-
}];
|
1417
|
-
readonly name: "setPermission";
|
1418
|
-
readonly outputs: readonly [];
|
1419
|
-
readonly stateMutability: "nonpayable";
|
1420
|
-
readonly type: "function";
|
1421
1476
|
})[];
|
1422
1477
|
address: `0x${string}`;
|
1423
1478
|
};
|
1424
|
-
constructor(rpcClient: PublicClient, wallet: WalletClient);
|
1479
|
+
constructor(rpcClient: PublicClient, wallet: WalletClient, chainId: SupportedChainIds);
|
1425
1480
|
/**
|
1426
1481
|
* Sets the permission for a specific function call
|
1427
1482
|
* Each policy is represented as a mapping from an IP account address to a signer address to a recipient
|