@story-protocol/core-sdk 0.0.1-beta-rc.10 → 0.0.1-beta-rc.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/declarations/src/client.d.ts +9 -0
- package/dist/declarations/src/client.d.ts.map +1 -1
- package/dist/declarations/src/index.d.ts +2 -1
- package/dist/declarations/src/index.d.ts.map +1 -1
- package/dist/declarations/src/resources/dispute.d.ts +103 -78
- package/dist/declarations/src/resources/dispute.d.ts.map +1 -1
- package/dist/declarations/src/resources/ipAccount.d.ts +84 -76
- package/dist/declarations/src/resources/ipAccount.d.ts.map +1 -1
- package/dist/declarations/src/resources/ipAsset.d.ts +26 -756
- package/dist/declarations/src/resources/ipAsset.d.ts.map +1 -1
- package/dist/declarations/src/resources/license.d.ts +875 -858
- package/dist/declarations/src/resources/license.d.ts.map +1 -1
- package/dist/declarations/src/resources/permission.d.ts +271 -216
- package/dist/declarations/src/resources/permission.d.ts.map +1 -1
- package/dist/declarations/src/resources/policy.d.ts +1094 -277
- package/dist/declarations/src/resources/policy.d.ts.map +1 -1
- package/dist/declarations/src/resources/royalty.d.ts +2155 -0
- package/dist/declarations/src/resources/royalty.d.ts.map +1 -0
- package/dist/declarations/src/types/config.d.ts +6 -3
- package/dist/declarations/src/types/config.d.ts.map +1 -1
- package/dist/declarations/src/types/resources/ipAsset.d.ts +4 -20
- package/dist/declarations/src/types/resources/ipAsset.d.ts.map +1 -1
- package/dist/declarations/src/types/resources/royalty.d.ts +41 -0
- package/dist/declarations/src/types/resources/royalty.d.ts.map +1 -1
- package/dist/story-protocol-core-sdk.cjs.d.ts +1 -1
- package/dist/story-protocol-core-sdk.cjs.dev.js +910 -661
- package/dist/story-protocol-core-sdk.cjs.prod.js +910 -661
- package/dist/story-protocol-core-sdk.esm.js +912 -663
- package/package.json +2 -2
- package/dist/story-protocol-core-sdk.cjs.d.ts.map +0 -1
@@ -1,5 +1,6 @@
|
|
1
1
|
import { PublicClient, WalletClient } from "viem";
|
2
2
|
import { SetPermissionsRequest, SetPermissionsResponse } from "../types/resources/permission.js";
|
3
|
+
import { SupportedChainIds } from "../types/config.js";
|
3
4
|
export declare class PermissionClient {
|
4
5
|
private readonly wallet;
|
5
6
|
private readonly rpcClient;
|
@@ -24,7 +25,38 @@ export declare class PermissionClient {
|
|
24
25
|
readonly name: "AccessControlled__ZeroAddress";
|
25
26
|
readonly type: "error";
|
26
27
|
} | {
|
27
|
-
readonly inputs: readonly [
|
28
|
+
readonly inputs: readonly [{
|
29
|
+
readonly internalType: "address";
|
30
|
+
readonly name: "signer";
|
31
|
+
readonly type: "address";
|
32
|
+
}, {
|
33
|
+
readonly internalType: "address";
|
34
|
+
readonly name: "to";
|
35
|
+
readonly type: "address";
|
36
|
+
}];
|
37
|
+
readonly name: "AccessController__BothCallerAndRecipientAreNotRegisteredModule";
|
38
|
+
readonly type: "error";
|
39
|
+
} | {
|
40
|
+
readonly inputs: readonly [];
|
41
|
+
/**
|
42
|
+
* Sets the permission for a specific function call
|
43
|
+
* Each policy is represented as a mapping from an IP account address to a signer address to a recipient
|
44
|
+
* address to a function selector to a permission level. The permission level can be 0 (ABSTAIN), 1 (ALLOW), or
|
45
|
+
* 2 (DENY).
|
46
|
+
* By default, all policies are set to 0 (ABSTAIN), which means that the permission is not set.
|
47
|
+
* The owner of ipAccount by default has all permission.
|
48
|
+
* address(0) => wildcard
|
49
|
+
* bytes4(0) => wildcard
|
50
|
+
* Specific permission overrides wildcard permission.
|
51
|
+
* @param request The request object containing necessary data to set permissions.
|
52
|
+
* @param request.ipAsset The address of the IP account that grants the permission for `signer`
|
53
|
+
* @param request.signer The address that can call `to` on behalf of the `ipAccount`
|
54
|
+
* @param request.to The address that can be called by the `signer` (currently only modules can be `to`)
|
55
|
+
* @param request.func Optional. The function selector string of `to` that can be called by the `signer` on behalf of the `ipAccount`. Be default, it allows all functions.
|
56
|
+
* @param request.permission The new permission level
|
57
|
+
* @returns A Promise that resolves to an object containing the transaction hash
|
58
|
+
* @emits PermissionSet (ipAccountOwner, ipAccount, signer, to, func, permission)
|
59
|
+
*/
|
28
60
|
readonly name: "AccessController__CallerIsNotIPAccount";
|
29
61
|
readonly type: "error";
|
30
62
|
} | {
|
@@ -63,61 +95,29 @@ export declare class PermissionClient {
|
|
63
95
|
readonly inputs: readonly [];
|
64
96
|
readonly name: "AccessController__PermissionIsNotValid";
|
65
97
|
readonly type: "error";
|
66
|
-
} | {
|
67
|
-
readonly inputs: readonly [{
|
68
|
-
readonly internalType: "address";
|
69
|
-
readonly name: "to";
|
70
|
-
readonly type: "address";
|
71
|
-
}];
|
72
|
-
readonly name: "AccessController__RecipientIsNotRegisteredModule";
|
73
|
-
readonly type: "error";
|
74
98
|
} | {
|
75
99
|
readonly inputs: readonly [];
|
76
100
|
readonly name: "AccessController__SignerIsZeroAddress";
|
77
101
|
readonly type: "error";
|
78
102
|
} | {
|
79
103
|
readonly inputs: readonly [];
|
80
|
-
readonly name: "
|
81
|
-
readonly type: "error";
|
82
|
-
} | {
|
83
|
-
readonly inputs: readonly [];
|
84
|
-
readonly name: "AncestorsVaultLAP__ClaimerNotAnAncestor";
|
85
|
-
readonly type: "error";
|
86
|
-
} | {
|
87
|
-
readonly inputs: readonly [];
|
88
|
-
readonly name: "AncestorsVaultLAP__ERC20BalanceNotZero";
|
89
|
-
readonly type: "error";
|
90
|
-
} | {
|
91
|
-
readonly inputs: readonly [];
|
92
|
-
readonly name: "AncestorsVaultLAP__ETHBalanceNotZero";
|
93
|
-
readonly type: "error";
|
94
|
-
} | {
|
95
|
-
readonly inputs: readonly [];
|
96
|
-
readonly name: "AncestorsVaultLAP__InvalidAncestorsHash";
|
97
|
-
readonly type: "error";
|
98
|
-
} | {
|
99
|
-
readonly inputs: readonly [];
|
100
|
-
readonly name: "AncestorsVaultLAP__InvalidClaimer";
|
101
|
-
readonly type: "error";
|
102
|
-
} | {
|
103
|
-
readonly inputs: readonly [];
|
104
|
-
readonly name: "AncestorsVaultLAP__TransferFailed";
|
104
|
+
readonly name: "ArbitrationPolicySP__NotDisputeModule";
|
105
105
|
readonly type: "error";
|
106
106
|
} | {
|
107
107
|
readonly inputs: readonly [];
|
108
|
-
readonly name: "
|
108
|
+
readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
|
109
109
|
readonly type: "error";
|
110
110
|
} | {
|
111
111
|
readonly inputs: readonly [];
|
112
|
-
readonly name: "
|
112
|
+
readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
|
113
113
|
readonly type: "error";
|
114
114
|
} | {
|
115
115
|
readonly inputs: readonly [];
|
116
|
-
readonly name: "
|
116
|
+
readonly name: "BasePolicyFrameworkManager__CallerNotLicensingModule";
|
117
117
|
readonly type: "error";
|
118
118
|
} | {
|
119
119
|
readonly inputs: readonly [];
|
120
|
-
readonly name: "
|
120
|
+
readonly name: "CoreMetadataModule__MetadataAlreadyFrozen";
|
121
121
|
readonly type: "error";
|
122
122
|
} | {
|
123
123
|
readonly inputs: readonly [];
|
@@ -147,10 +147,6 @@ export declare class PermissionClient {
|
|
147
147
|
readonly inputs: readonly [];
|
148
148
|
readonly name: "DisputeModule__NotWhitelistedDisputeTag";
|
149
149
|
readonly type: "error";
|
150
|
-
} | {
|
151
|
-
readonly inputs: readonly [];
|
152
|
-
readonly name: "DisputeModule__UnauthorizedAccess";
|
153
|
-
readonly type: "error";
|
154
150
|
} | {
|
155
151
|
readonly inputs: readonly [];
|
156
152
|
readonly name: "DisputeModule__ZeroArbitrationPolicy";
|
@@ -235,6 +231,18 @@ export declare class PermissionClient {
|
|
235
231
|
readonly inputs: readonly [];
|
236
232
|
readonly name: "IPAssetRegistry__InvalidMetadataProvider";
|
237
233
|
readonly type: "error";
|
234
|
+
} | {
|
235
|
+
readonly inputs: readonly [{
|
236
|
+
readonly internalType: "address";
|
237
|
+
readonly name: "contractAddress";
|
238
|
+
readonly type: "address";
|
239
|
+
}, {
|
240
|
+
readonly internalType: "uint256";
|
241
|
+
readonly name: "tokenId";
|
242
|
+
readonly type: "uint256";
|
243
|
+
}];
|
244
|
+
readonly name: "IPAssetRegistry__InvalidToken";
|
245
|
+
readonly type: "error";
|
238
246
|
} | {
|
239
247
|
readonly inputs: readonly [];
|
240
248
|
readonly name: "IPAssetRegistry__NotYetRegistered";
|
@@ -251,6 +259,22 @@ export declare class PermissionClient {
|
|
251
259
|
readonly inputs: readonly [];
|
252
260
|
readonly name: "IPAssetRegistry__Unauthorized";
|
253
261
|
readonly type: "error";
|
262
|
+
} | {
|
263
|
+
readonly inputs: readonly [{
|
264
|
+
readonly internalType: "address";
|
265
|
+
readonly name: "contractAddress";
|
266
|
+
readonly type: "address";
|
267
|
+
}];
|
268
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721";
|
269
|
+
readonly type: "error";
|
270
|
+
} | {
|
271
|
+
readonly inputs: readonly [{
|
272
|
+
readonly internalType: "address";
|
273
|
+
readonly name: "contractAddress";
|
274
|
+
readonly type: "address";
|
275
|
+
}];
|
276
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721Metadata";
|
277
|
+
readonly type: "error";
|
254
278
|
} | {
|
255
279
|
readonly inputs: readonly [];
|
256
280
|
readonly name: "IPResolver_InvalidIP";
|
@@ -259,6 +283,30 @@ export declare class PermissionClient {
|
|
259
283
|
readonly inputs: readonly [];
|
260
284
|
readonly name: "IPResolver_Unauthorized";
|
261
285
|
readonly type: "error";
|
286
|
+
} | {
|
287
|
+
readonly inputs: readonly [];
|
288
|
+
readonly name: "IpRoyaltyVault__AlreadyClaimed";
|
289
|
+
readonly type: "error";
|
290
|
+
} | {
|
291
|
+
readonly inputs: readonly [];
|
292
|
+
readonly name: "IpRoyaltyVault__ClaimerNotAnAncestor";
|
293
|
+
readonly type: "error";
|
294
|
+
} | {
|
295
|
+
readonly inputs: readonly [];
|
296
|
+
readonly name: "IpRoyaltyVault__NotRoyaltyPolicyLAP";
|
297
|
+
readonly type: "error";
|
298
|
+
} | {
|
299
|
+
readonly inputs: readonly [];
|
300
|
+
readonly name: "IpRoyaltyVault__SnapshotIntervalTooShort";
|
301
|
+
readonly type: "error";
|
302
|
+
} | {
|
303
|
+
readonly inputs: readonly [];
|
304
|
+
readonly name: "IpRoyaltyVault__ZeroIpId";
|
305
|
+
readonly type: "error";
|
306
|
+
} | {
|
307
|
+
readonly inputs: readonly [];
|
308
|
+
readonly name: "IpRoyaltyVault__ZeroRoyaltyPolicyLAP";
|
309
|
+
readonly type: "error";
|
262
310
|
} | {
|
263
311
|
readonly inputs: readonly [];
|
264
312
|
readonly name: "LicenseRegistry__CallerNotLicensingModule";
|
@@ -279,10 +327,6 @@ export declare class PermissionClient {
|
|
279
327
|
readonly inputs: readonly [];
|
280
328
|
readonly name: "LicenseRegistry__ZeroLicensingModule";
|
281
329
|
readonly type: "error";
|
282
|
-
} | {
|
283
|
-
readonly inputs: readonly [];
|
284
|
-
readonly name: "LicensingModuleAware__CallerNotLicensingModule";
|
285
|
-
readonly type: "error";
|
286
330
|
} | {
|
287
331
|
readonly inputs: readonly [];
|
288
332
|
readonly name: "LicensingModule__CallerNotLicenseRegistry";
|
@@ -343,6 +387,10 @@ export declare class PermissionClient {
|
|
343
387
|
readonly inputs: readonly [];
|
344
388
|
readonly name: "LicensingModule__InvalidPolicyFramework";
|
345
389
|
readonly type: "error";
|
390
|
+
} | {
|
391
|
+
readonly inputs: readonly [];
|
392
|
+
readonly name: "LicensingModule__IpAlreadyLinked";
|
393
|
+
readonly type: "error";
|
346
394
|
} | {
|
347
395
|
readonly inputs: readonly [];
|
348
396
|
readonly name: "LicensingModule__LicensorDoesntHaveThisPolicy";
|
@@ -359,6 +407,10 @@ export declare class PermissionClient {
|
|
359
407
|
readonly inputs: readonly [];
|
360
408
|
readonly name: "LicensingModule__LinkingRevokedLicense";
|
361
409
|
readonly type: "error";
|
410
|
+
} | {
|
411
|
+
readonly inputs: readonly [];
|
412
|
+
readonly name: "LicensingModule__MintAmountZero";
|
413
|
+
readonly type: "error";
|
362
414
|
} | {
|
363
415
|
readonly inputs: readonly [];
|
364
416
|
readonly name: "LicensingModule__MintLicenseParamFailed";
|
@@ -395,6 +447,10 @@ export declare class PermissionClient {
|
|
395
447
|
readonly inputs: readonly [];
|
396
448
|
readonly name: "LicensingModule__PolicyNotFound";
|
397
449
|
readonly type: "error";
|
450
|
+
} | {
|
451
|
+
readonly inputs: readonly [];
|
452
|
+
readonly name: "LicensingModule__ReceiverZeroAddress";
|
453
|
+
readonly type: "error";
|
398
454
|
} | {
|
399
455
|
readonly inputs: readonly [];
|
400
456
|
readonly name: "LicensingModule__RegisterPolicyFrameworkMismatch";
|
@@ -523,10 +579,6 @@ export declare class PermissionClient {
|
|
523
579
|
readonly inputs: readonly [];
|
524
580
|
readonly name: "PolicyFrameworkManager__GettingPolicyWrongFramework";
|
525
581
|
readonly type: "error";
|
526
|
-
} | {
|
527
|
-
readonly inputs: readonly [];
|
528
|
-
readonly name: "RegistrationModule__InvalidOwner";
|
529
|
-
readonly type: "error";
|
530
582
|
} | {
|
531
583
|
readonly inputs: readonly [];
|
532
584
|
readonly name: "RoyaltyModule__CanOnlyMintSelectedPolicy";
|
@@ -547,10 +599,6 @@ export declare class PermissionClient {
|
|
547
599
|
readonly inputs: readonly [];
|
548
600
|
readonly name: "RoyaltyModule__NotAllowedCaller";
|
549
601
|
readonly type: "error";
|
550
|
-
} | {
|
551
|
-
readonly inputs: readonly [];
|
552
|
-
readonly name: "RoyaltyModule__NotRegisteredIpId";
|
553
|
-
readonly type: "error";
|
554
602
|
} | {
|
555
603
|
readonly inputs: readonly [];
|
556
604
|
readonly name: "RoyaltyModule__NotWhitelistedRoyaltyPolicy";
|
@@ -587,30 +635,10 @@ export declare class PermissionClient {
|
|
587
635
|
readonly inputs: readonly [];
|
588
636
|
readonly name: "RoyaltyPolicyLAP__ImplementationAlreadySet";
|
589
637
|
readonly type: "error";
|
590
|
-
} | {
|
591
|
-
readonly inputs: readonly [];
|
592
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestors";
|
593
|
-
readonly type: "error";
|
594
|
-
} | {
|
595
|
-
readonly inputs: readonly [];
|
596
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsHash";
|
597
|
-
readonly type: "error";
|
598
|
-
} | {
|
599
|
-
readonly inputs: readonly [];
|
600
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsLength";
|
601
|
-
readonly type: "error";
|
602
|
-
} | {
|
603
|
-
readonly inputs: readonly [];
|
604
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsRoyalty";
|
605
|
-
readonly type: "error";
|
606
638
|
} | {
|
607
639
|
readonly inputs: readonly [];
|
608
640
|
readonly name: "RoyaltyPolicyLAP__InvalidParentRoyaltiesLength";
|
609
641
|
readonly type: "error";
|
610
|
-
} | {
|
611
|
-
readonly inputs: readonly [];
|
612
|
-
readonly name: "RoyaltyPolicyLAP__InvalidRoyaltyAmountLength";
|
613
|
-
readonly type: "error";
|
614
642
|
} | {
|
615
643
|
readonly inputs: readonly [];
|
616
644
|
readonly name: "RoyaltyPolicyLAP__LastPositionNotAbleToMintLicense";
|
@@ -625,15 +653,15 @@ export declare class PermissionClient {
|
|
625
653
|
readonly type: "error";
|
626
654
|
} | {
|
627
655
|
readonly inputs: readonly [];
|
628
|
-
readonly name: "
|
656
|
+
readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
|
629
657
|
readonly type: "error";
|
630
658
|
} | {
|
631
659
|
readonly inputs: readonly [];
|
632
|
-
readonly name: "
|
660
|
+
readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
|
633
661
|
readonly type: "error";
|
634
662
|
} | {
|
635
663
|
readonly inputs: readonly [];
|
636
|
-
readonly name: "
|
664
|
+
readonly name: "RoyaltyPolicyLAP__ZeroIpRoyaltyVaultBeacon";
|
637
665
|
readonly type: "error";
|
638
666
|
} | {
|
639
667
|
readonly inputs: readonly [];
|
@@ -710,6 +738,67 @@ export declare class PermissionClient {
|
|
710
738
|
})[];
|
711
739
|
accessControllerConfig: {
|
712
740
|
abi: ({
|
741
|
+
readonly anonymous: false;
|
742
|
+
readonly inputs: readonly [{
|
743
|
+
readonly indexed: false;
|
744
|
+
readonly internalType: "address";
|
745
|
+
readonly name: "ipAccountOwner";
|
746
|
+
readonly type: "address";
|
747
|
+
}, {
|
748
|
+
readonly indexed: true;
|
749
|
+
readonly internalType: "address";
|
750
|
+
readonly name: "ipAccount";
|
751
|
+
readonly type: "address";
|
752
|
+
}, {
|
753
|
+
readonly indexed: true;
|
754
|
+
readonly internalType: "address";
|
755
|
+
readonly name: "signer";
|
756
|
+
readonly type: "address";
|
757
|
+
}, {
|
758
|
+
readonly indexed: true;
|
759
|
+
readonly internalType: "address";
|
760
|
+
readonly name: "to";
|
761
|
+
readonly type: "address";
|
762
|
+
}, {
|
763
|
+
readonly indexed: false;
|
764
|
+
readonly internalType: "bytes4";
|
765
|
+
readonly name: "func";
|
766
|
+
readonly type: "bytes4";
|
767
|
+
}, {
|
768
|
+
readonly indexed: false;
|
769
|
+
readonly internalType: "uint8";
|
770
|
+
readonly name: "permission";
|
771
|
+
readonly type: "uint8";
|
772
|
+
}];
|
773
|
+
readonly name: "PermissionSet";
|
774
|
+
readonly type: "event";
|
775
|
+
} | {
|
776
|
+
readonly inputs: readonly [{
|
777
|
+
readonly internalType: "address";
|
778
|
+
readonly name: "ipAccount";
|
779
|
+
readonly type: "address";
|
780
|
+
}, {
|
781
|
+
readonly internalType: "address";
|
782
|
+
readonly name: "signer";
|
783
|
+
readonly type: "address";
|
784
|
+
}, {
|
785
|
+
readonly internalType: "address";
|
786
|
+
readonly name: "to";
|
787
|
+
readonly type: "address";
|
788
|
+
}, {
|
789
|
+
readonly internalType: "bytes4";
|
790
|
+
readonly name: "func";
|
791
|
+
readonly type: "bytes4";
|
792
|
+
}, {
|
793
|
+
readonly internalType: "uint8";
|
794
|
+
readonly name: "permission";
|
795
|
+
readonly type: "uint8";
|
796
|
+
}];
|
797
|
+
readonly name: "setPermission";
|
798
|
+
readonly outputs: readonly [];
|
799
|
+
readonly stateMutability: "nonpayable";
|
800
|
+
readonly type: "function";
|
801
|
+
} | {
|
713
802
|
readonly inputs: readonly [{
|
714
803
|
readonly internalType: "address";
|
715
804
|
readonly name: "caller";
|
@@ -730,7 +819,38 @@ export declare class PermissionClient {
|
|
730
819
|
readonly name: "AccessControlled__ZeroAddress";
|
731
820
|
readonly type: "error";
|
732
821
|
} | {
|
733
|
-
readonly inputs: readonly [
|
822
|
+
readonly inputs: readonly [{
|
823
|
+
readonly internalType: "address";
|
824
|
+
readonly name: "signer";
|
825
|
+
readonly type: "address";
|
826
|
+
}, {
|
827
|
+
readonly internalType: "address";
|
828
|
+
readonly name: "to";
|
829
|
+
readonly type: "address";
|
830
|
+
}];
|
831
|
+
readonly name: "AccessController__BothCallerAndRecipientAreNotRegisteredModule";
|
832
|
+
readonly type: "error";
|
833
|
+
} | {
|
834
|
+
readonly inputs: readonly [];
|
835
|
+
/**
|
836
|
+
* Sets the permission for a specific function call
|
837
|
+
* Each policy is represented as a mapping from an IP account address to a signer address to a recipient
|
838
|
+
* address to a function selector to a permission level. The permission level can be 0 (ABSTAIN), 1 (ALLOW), or
|
839
|
+
* 2 (DENY).
|
840
|
+
* By default, all policies are set to 0 (ABSTAIN), which means that the permission is not set.
|
841
|
+
* The owner of ipAccount by default has all permission.
|
842
|
+
* address(0) => wildcard
|
843
|
+
* bytes4(0) => wildcard
|
844
|
+
* Specific permission overrides wildcard permission.
|
845
|
+
* @param request The request object containing necessary data to set permissions.
|
846
|
+
* @param request.ipAsset The address of the IP account that grants the permission for `signer`
|
847
|
+
* @param request.signer The address that can call `to` on behalf of the `ipAccount`
|
848
|
+
* @param request.to The address that can be called by the `signer` (currently only modules can be `to`)
|
849
|
+
* @param request.func Optional. The function selector string of `to` that can be called by the `signer` on behalf of the `ipAccount`. Be default, it allows all functions.
|
850
|
+
* @param request.permission The new permission level
|
851
|
+
* @returns A Promise that resolves to an object containing the transaction hash
|
852
|
+
* @emits PermissionSet (ipAccountOwner, ipAccount, signer, to, func, permission)
|
853
|
+
*/
|
734
854
|
readonly name: "AccessController__CallerIsNotIPAccount";
|
735
855
|
readonly type: "error";
|
736
856
|
} | {
|
@@ -769,61 +889,29 @@ export declare class PermissionClient {
|
|
769
889
|
readonly inputs: readonly [];
|
770
890
|
readonly name: "AccessController__PermissionIsNotValid";
|
771
891
|
readonly type: "error";
|
772
|
-
} | {
|
773
|
-
readonly inputs: readonly [{
|
774
|
-
readonly internalType: "address";
|
775
|
-
readonly name: "to";
|
776
|
-
readonly type: "address";
|
777
|
-
}];
|
778
|
-
readonly name: "AccessController__RecipientIsNotRegisteredModule";
|
779
|
-
readonly type: "error";
|
780
892
|
} | {
|
781
893
|
readonly inputs: readonly [];
|
782
894
|
readonly name: "AccessController__SignerIsZeroAddress";
|
783
895
|
readonly type: "error";
|
784
896
|
} | {
|
785
897
|
readonly inputs: readonly [];
|
786
|
-
readonly name: "
|
787
|
-
readonly type: "error";
|
788
|
-
} | {
|
789
|
-
readonly inputs: readonly [];
|
790
|
-
readonly name: "AncestorsVaultLAP__ClaimerNotAnAncestor";
|
791
|
-
readonly type: "error";
|
792
|
-
} | {
|
793
|
-
readonly inputs: readonly [];
|
794
|
-
readonly name: "AncestorsVaultLAP__ERC20BalanceNotZero";
|
795
|
-
readonly type: "error";
|
796
|
-
} | {
|
797
|
-
readonly inputs: readonly [];
|
798
|
-
readonly name: "AncestorsVaultLAP__ETHBalanceNotZero";
|
799
|
-
readonly type: "error";
|
800
|
-
} | {
|
801
|
-
readonly inputs: readonly [];
|
802
|
-
readonly name: "AncestorsVaultLAP__InvalidAncestorsHash";
|
803
|
-
readonly type: "error";
|
804
|
-
} | {
|
805
|
-
readonly inputs: readonly [];
|
806
|
-
readonly name: "AncestorsVaultLAP__InvalidClaimer";
|
807
|
-
readonly type: "error";
|
808
|
-
} | {
|
809
|
-
readonly inputs: readonly [];
|
810
|
-
readonly name: "AncestorsVaultLAP__TransferFailed";
|
898
|
+
readonly name: "ArbitrationPolicySP__NotDisputeModule";
|
811
899
|
readonly type: "error";
|
812
900
|
} | {
|
813
901
|
readonly inputs: readonly [];
|
814
|
-
readonly name: "
|
902
|
+
readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
|
815
903
|
readonly type: "error";
|
816
904
|
} | {
|
817
905
|
readonly inputs: readonly [];
|
818
|
-
readonly name: "
|
906
|
+
readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
|
819
907
|
readonly type: "error";
|
820
908
|
} | {
|
821
909
|
readonly inputs: readonly [];
|
822
|
-
readonly name: "
|
910
|
+
readonly name: "BasePolicyFrameworkManager__CallerNotLicensingModule";
|
823
911
|
readonly type: "error";
|
824
912
|
} | {
|
825
913
|
readonly inputs: readonly [];
|
826
|
-
readonly name: "
|
914
|
+
readonly name: "CoreMetadataModule__MetadataAlreadyFrozen";
|
827
915
|
readonly type: "error";
|
828
916
|
} | {
|
829
917
|
readonly inputs: readonly [];
|
@@ -853,10 +941,6 @@ export declare class PermissionClient {
|
|
853
941
|
readonly inputs: readonly [];
|
854
942
|
readonly name: "DisputeModule__NotWhitelistedDisputeTag";
|
855
943
|
readonly type: "error";
|
856
|
-
} | {
|
857
|
-
readonly inputs: readonly [];
|
858
|
-
readonly name: "DisputeModule__UnauthorizedAccess";
|
859
|
-
readonly type: "error";
|
860
944
|
} | {
|
861
945
|
readonly inputs: readonly [];
|
862
946
|
readonly name: "DisputeModule__ZeroArbitrationPolicy";
|
@@ -941,6 +1025,18 @@ export declare class PermissionClient {
|
|
941
1025
|
readonly inputs: readonly [];
|
942
1026
|
readonly name: "IPAssetRegistry__InvalidMetadataProvider";
|
943
1027
|
readonly type: "error";
|
1028
|
+
} | {
|
1029
|
+
readonly inputs: readonly [{
|
1030
|
+
readonly internalType: "address";
|
1031
|
+
readonly name: "contractAddress";
|
1032
|
+
readonly type: "address";
|
1033
|
+
}, {
|
1034
|
+
readonly internalType: "uint256";
|
1035
|
+
readonly name: "tokenId";
|
1036
|
+
readonly type: "uint256";
|
1037
|
+
}];
|
1038
|
+
readonly name: "IPAssetRegistry__InvalidToken";
|
1039
|
+
readonly type: "error";
|
944
1040
|
} | {
|
945
1041
|
readonly inputs: readonly [];
|
946
1042
|
readonly name: "IPAssetRegistry__NotYetRegistered";
|
@@ -957,6 +1053,22 @@ export declare class PermissionClient {
|
|
957
1053
|
readonly inputs: readonly [];
|
958
1054
|
readonly name: "IPAssetRegistry__Unauthorized";
|
959
1055
|
readonly type: "error";
|
1056
|
+
} | {
|
1057
|
+
readonly inputs: readonly [{
|
1058
|
+
readonly internalType: "address";
|
1059
|
+
readonly name: "contractAddress";
|
1060
|
+
readonly type: "address";
|
1061
|
+
}];
|
1062
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721";
|
1063
|
+
readonly type: "error";
|
1064
|
+
} | {
|
1065
|
+
readonly inputs: readonly [{
|
1066
|
+
readonly internalType: "address";
|
1067
|
+
readonly name: "contractAddress";
|
1068
|
+
readonly type: "address";
|
1069
|
+
}];
|
1070
|
+
readonly name: "IPAssetRegistry__UnsupportedIERC721Metadata";
|
1071
|
+
readonly type: "error";
|
960
1072
|
} | {
|
961
1073
|
readonly inputs: readonly [];
|
962
1074
|
readonly name: "IPResolver_InvalidIP";
|
@@ -965,6 +1077,30 @@ export declare class PermissionClient {
|
|
965
1077
|
readonly inputs: readonly [];
|
966
1078
|
readonly name: "IPResolver_Unauthorized";
|
967
1079
|
readonly type: "error";
|
1080
|
+
} | {
|
1081
|
+
readonly inputs: readonly [];
|
1082
|
+
readonly name: "IpRoyaltyVault__AlreadyClaimed";
|
1083
|
+
readonly type: "error";
|
1084
|
+
} | {
|
1085
|
+
readonly inputs: readonly [];
|
1086
|
+
readonly name: "IpRoyaltyVault__ClaimerNotAnAncestor";
|
1087
|
+
readonly type: "error";
|
1088
|
+
} | {
|
1089
|
+
readonly inputs: readonly [];
|
1090
|
+
readonly name: "IpRoyaltyVault__NotRoyaltyPolicyLAP";
|
1091
|
+
readonly type: "error";
|
1092
|
+
} | {
|
1093
|
+
readonly inputs: readonly [];
|
1094
|
+
readonly name: "IpRoyaltyVault__SnapshotIntervalTooShort";
|
1095
|
+
readonly type: "error";
|
1096
|
+
} | {
|
1097
|
+
readonly inputs: readonly [];
|
1098
|
+
readonly name: "IpRoyaltyVault__ZeroIpId";
|
1099
|
+
readonly type: "error";
|
1100
|
+
} | {
|
1101
|
+
readonly inputs: readonly [];
|
1102
|
+
readonly name: "IpRoyaltyVault__ZeroRoyaltyPolicyLAP";
|
1103
|
+
readonly type: "error";
|
968
1104
|
} | {
|
969
1105
|
readonly inputs: readonly [];
|
970
1106
|
readonly name: "LicenseRegistry__CallerNotLicensingModule";
|
@@ -985,10 +1121,6 @@ export declare class PermissionClient {
|
|
985
1121
|
readonly inputs: readonly [];
|
986
1122
|
readonly name: "LicenseRegistry__ZeroLicensingModule";
|
987
1123
|
readonly type: "error";
|
988
|
-
} | {
|
989
|
-
readonly inputs: readonly [];
|
990
|
-
readonly name: "LicensingModuleAware__CallerNotLicensingModule";
|
991
|
-
readonly type: "error";
|
992
1124
|
} | {
|
993
1125
|
readonly inputs: readonly [];
|
994
1126
|
readonly name: "LicensingModule__CallerNotLicenseRegistry";
|
@@ -1049,6 +1181,10 @@ export declare class PermissionClient {
|
|
1049
1181
|
readonly inputs: readonly [];
|
1050
1182
|
readonly name: "LicensingModule__InvalidPolicyFramework";
|
1051
1183
|
readonly type: "error";
|
1184
|
+
} | {
|
1185
|
+
readonly inputs: readonly [];
|
1186
|
+
readonly name: "LicensingModule__IpAlreadyLinked";
|
1187
|
+
readonly type: "error";
|
1052
1188
|
} | {
|
1053
1189
|
readonly inputs: readonly [];
|
1054
1190
|
readonly name: "LicensingModule__LicensorDoesntHaveThisPolicy";
|
@@ -1065,6 +1201,10 @@ export declare class PermissionClient {
|
|
1065
1201
|
readonly inputs: readonly [];
|
1066
1202
|
readonly name: "LicensingModule__LinkingRevokedLicense";
|
1067
1203
|
readonly type: "error";
|
1204
|
+
} | {
|
1205
|
+
readonly inputs: readonly [];
|
1206
|
+
readonly name: "LicensingModule__MintAmountZero";
|
1207
|
+
readonly type: "error";
|
1068
1208
|
} | {
|
1069
1209
|
readonly inputs: readonly [];
|
1070
1210
|
readonly name: "LicensingModule__MintLicenseParamFailed";
|
@@ -1101,6 +1241,10 @@ export declare class PermissionClient {
|
|
1101
1241
|
readonly inputs: readonly [];
|
1102
1242
|
readonly name: "LicensingModule__PolicyNotFound";
|
1103
1243
|
readonly type: "error";
|
1244
|
+
} | {
|
1245
|
+
readonly inputs: readonly [];
|
1246
|
+
readonly name: "LicensingModule__ReceiverZeroAddress";
|
1247
|
+
readonly type: "error";
|
1104
1248
|
} | {
|
1105
1249
|
readonly inputs: readonly [];
|
1106
1250
|
readonly name: "LicensingModule__RegisterPolicyFrameworkMismatch";
|
@@ -1229,10 +1373,6 @@ export declare class PermissionClient {
|
|
1229
1373
|
readonly inputs: readonly [];
|
1230
1374
|
readonly name: "PolicyFrameworkManager__GettingPolicyWrongFramework";
|
1231
1375
|
readonly type: "error";
|
1232
|
-
} | {
|
1233
|
-
readonly inputs: readonly [];
|
1234
|
-
readonly name: "RegistrationModule__InvalidOwner";
|
1235
|
-
readonly type: "error";
|
1236
1376
|
} | {
|
1237
1377
|
readonly inputs: readonly [];
|
1238
1378
|
readonly name: "RoyaltyModule__CanOnlyMintSelectedPolicy";
|
@@ -1253,10 +1393,6 @@ export declare class PermissionClient {
|
|
1253
1393
|
readonly inputs: readonly [];
|
1254
1394
|
readonly name: "RoyaltyModule__NotAllowedCaller";
|
1255
1395
|
readonly type: "error";
|
1256
|
-
} | {
|
1257
|
-
readonly inputs: readonly [];
|
1258
|
-
readonly name: "RoyaltyModule__NotRegisteredIpId";
|
1259
|
-
readonly type: "error";
|
1260
1396
|
} | {
|
1261
1397
|
readonly inputs: readonly [];
|
1262
1398
|
readonly name: "RoyaltyModule__NotWhitelistedRoyaltyPolicy";
|
@@ -1293,30 +1429,10 @@ export declare class PermissionClient {
|
|
1293
1429
|
readonly inputs: readonly [];
|
1294
1430
|
readonly name: "RoyaltyPolicyLAP__ImplementationAlreadySet";
|
1295
1431
|
readonly type: "error";
|
1296
|
-
} | {
|
1297
|
-
readonly inputs: readonly [];
|
1298
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestors";
|
1299
|
-
readonly type: "error";
|
1300
|
-
} | {
|
1301
|
-
readonly inputs: readonly [];
|
1302
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsHash";
|
1303
|
-
readonly type: "error";
|
1304
|
-
} | {
|
1305
|
-
readonly inputs: readonly [];
|
1306
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsLength";
|
1307
|
-
readonly type: "error";
|
1308
|
-
} | {
|
1309
|
-
readonly inputs: readonly [];
|
1310
|
-
readonly name: "RoyaltyPolicyLAP__InvalidAncestorsRoyalty";
|
1311
|
-
readonly type: "error";
|
1312
1432
|
} | {
|
1313
1433
|
readonly inputs: readonly [];
|
1314
1434
|
readonly name: "RoyaltyPolicyLAP__InvalidParentRoyaltiesLength";
|
1315
1435
|
readonly type: "error";
|
1316
|
-
} | {
|
1317
|
-
readonly inputs: readonly [];
|
1318
|
-
readonly name: "RoyaltyPolicyLAP__InvalidRoyaltyAmountLength";
|
1319
|
-
readonly type: "error";
|
1320
1436
|
} | {
|
1321
1437
|
readonly inputs: readonly [];
|
1322
1438
|
readonly name: "RoyaltyPolicyLAP__LastPositionNotAbleToMintLicense";
|
@@ -1331,15 +1447,15 @@ export declare class PermissionClient {
|
|
1331
1447
|
readonly type: "error";
|
1332
1448
|
} | {
|
1333
1449
|
readonly inputs: readonly [];
|
1334
|
-
readonly name: "
|
1450
|
+
readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
|
1335
1451
|
readonly type: "error";
|
1336
1452
|
} | {
|
1337
1453
|
readonly inputs: readonly [];
|
1338
|
-
readonly name: "
|
1454
|
+
readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
|
1339
1455
|
readonly type: "error";
|
1340
1456
|
} | {
|
1341
1457
|
readonly inputs: readonly [];
|
1342
|
-
readonly name: "
|
1458
|
+
readonly name: "RoyaltyPolicyLAP__ZeroIpRoyaltyVaultBeacon";
|
1343
1459
|
readonly type: "error";
|
1344
1460
|
} | {
|
1345
1461
|
readonly inputs: readonly [];
|
@@ -1357,71 +1473,10 @@ export declare class PermissionClient {
|
|
1357
1473
|
readonly inputs: readonly [];
|
1358
1474
|
readonly name: "RoyaltyPolicyLAP__ZeroRoyaltyModule";
|
1359
1475
|
readonly type: "error";
|
1360
|
-
} | {
|
1361
|
-
readonly anonymous: false;
|
1362
|
-
readonly inputs: readonly [{
|
1363
|
-
readonly indexed: false;
|
1364
|
-
readonly internalType: "address";
|
1365
|
-
readonly name: "ipAccountOwner";
|
1366
|
-
readonly type: "address";
|
1367
|
-
}, {
|
1368
|
-
readonly indexed: true;
|
1369
|
-
readonly internalType: "address";
|
1370
|
-
readonly name: "ipAccount";
|
1371
|
-
readonly type: "address";
|
1372
|
-
}, {
|
1373
|
-
readonly indexed: true;
|
1374
|
-
readonly internalType: "address";
|
1375
|
-
readonly name: "signer";
|
1376
|
-
readonly type: "address";
|
1377
|
-
}, {
|
1378
|
-
readonly indexed: true;
|
1379
|
-
readonly internalType: "address";
|
1380
|
-
readonly name: "to";
|
1381
|
-
readonly type: "address";
|
1382
|
-
}, {
|
1383
|
-
readonly indexed: false;
|
1384
|
-
readonly internalType: "bytes4";
|
1385
|
-
readonly name: "func";
|
1386
|
-
readonly type: "bytes4";
|
1387
|
-
}, {
|
1388
|
-
readonly indexed: false;
|
1389
|
-
readonly internalType: "uint8";
|
1390
|
-
readonly name: "permission";
|
1391
|
-
readonly type: "uint8";
|
1392
|
-
}];
|
1393
|
-
readonly name: "PermissionSet";
|
1394
|
-
readonly type: "event";
|
1395
|
-
} | {
|
1396
|
-
readonly inputs: readonly [{
|
1397
|
-
readonly internalType: "address";
|
1398
|
-
readonly name: "ipAccount";
|
1399
|
-
readonly type: "address";
|
1400
|
-
}, {
|
1401
|
-
readonly internalType: "address";
|
1402
|
-
readonly name: "signer";
|
1403
|
-
readonly type: "address";
|
1404
|
-
}, {
|
1405
|
-
readonly internalType: "address";
|
1406
|
-
readonly name: "to";
|
1407
|
-
readonly type: "address";
|
1408
|
-
}, {
|
1409
|
-
readonly internalType: "bytes4";
|
1410
|
-
readonly name: "func";
|
1411
|
-
readonly type: "bytes4";
|
1412
|
-
}, {
|
1413
|
-
readonly internalType: "uint8";
|
1414
|
-
readonly name: "permission";
|
1415
|
-
readonly type: "uint8";
|
1416
|
-
}];
|
1417
|
-
readonly name: "setPermission";
|
1418
|
-
readonly outputs: readonly [];
|
1419
|
-
readonly stateMutability: "nonpayable";
|
1420
|
-
readonly type: "function";
|
1421
1476
|
})[];
|
1422
1477
|
address: `0x${string}`;
|
1423
1478
|
};
|
1424
|
-
constructor(rpcClient: PublicClient, wallet: WalletClient);
|
1479
|
+
constructor(rpcClient: PublicClient, wallet: WalletClient, chainId: SupportedChainIds);
|
1425
1480
|
/**
|
1426
1481
|
* Sets the permission for a specific function call
|
1427
1482
|
* Each policy is represented as a mapping from an IP account address to a signer address to a recipient
|