@story-protocol/core-sdk 0.0.1-beta-rc.10 → 0.0.1-beta-rc.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/dist/declarations/src/client.d.ts +9 -0
  2. package/dist/declarations/src/client.d.ts.map +1 -1
  3. package/dist/declarations/src/index.d.ts +2 -1
  4. package/dist/declarations/src/index.d.ts.map +1 -1
  5. package/dist/declarations/src/resources/dispute.d.ts +103 -78
  6. package/dist/declarations/src/resources/dispute.d.ts.map +1 -1
  7. package/dist/declarations/src/resources/ipAccount.d.ts +84 -76
  8. package/dist/declarations/src/resources/ipAccount.d.ts.map +1 -1
  9. package/dist/declarations/src/resources/ipAsset.d.ts +26 -756
  10. package/dist/declarations/src/resources/ipAsset.d.ts.map +1 -1
  11. package/dist/declarations/src/resources/license.d.ts +875 -858
  12. package/dist/declarations/src/resources/license.d.ts.map +1 -1
  13. package/dist/declarations/src/resources/permission.d.ts +271 -216
  14. package/dist/declarations/src/resources/permission.d.ts.map +1 -1
  15. package/dist/declarations/src/resources/policy.d.ts +1094 -277
  16. package/dist/declarations/src/resources/policy.d.ts.map +1 -1
  17. package/dist/declarations/src/resources/royalty.d.ts +2155 -0
  18. package/dist/declarations/src/resources/royalty.d.ts.map +1 -0
  19. package/dist/declarations/src/types/config.d.ts +6 -3
  20. package/dist/declarations/src/types/config.d.ts.map +1 -1
  21. package/dist/declarations/src/types/resources/ipAsset.d.ts +4 -20
  22. package/dist/declarations/src/types/resources/ipAsset.d.ts.map +1 -1
  23. package/dist/declarations/src/types/resources/royalty.d.ts +41 -0
  24. package/dist/declarations/src/types/resources/royalty.d.ts.map +1 -1
  25. package/dist/story-protocol-core-sdk.cjs.d.ts +1 -1
  26. package/dist/story-protocol-core-sdk.cjs.dev.js +910 -661
  27. package/dist/story-protocol-core-sdk.cjs.prod.js +910 -661
  28. package/dist/story-protocol-core-sdk.esm.js +912 -663
  29. package/package.json +2 -2
  30. package/dist/story-protocol-core-sdk.cjs.d.ts.map +0 -1
@@ -1,5 +1,6 @@
1
1
  import { PublicClient, WalletClient } from "viem";
2
2
  import { SetPermissionsRequest, SetPermissionsResponse } from "../types/resources/permission.js";
3
+ import { SupportedChainIds } from "../types/config.js";
3
4
  export declare class PermissionClient {
4
5
  private readonly wallet;
5
6
  private readonly rpcClient;
@@ -24,7 +25,38 @@ export declare class PermissionClient {
24
25
  readonly name: "AccessControlled__ZeroAddress";
25
26
  readonly type: "error";
26
27
  } | {
27
- readonly inputs: readonly [];
28
+ readonly inputs: readonly [{
29
+ readonly internalType: "address";
30
+ readonly name: "signer";
31
+ readonly type: "address";
32
+ }, {
33
+ readonly internalType: "address";
34
+ readonly name: "to";
35
+ readonly type: "address";
36
+ }];
37
+ readonly name: "AccessController__BothCallerAndRecipientAreNotRegisteredModule";
38
+ readonly type: "error";
39
+ } | {
40
+ readonly inputs: readonly [];
41
+ /**
42
+ * Sets the permission for a specific function call
43
+ * Each policy is represented as a mapping from an IP account address to a signer address to a recipient
44
+ * address to a function selector to a permission level. The permission level can be 0 (ABSTAIN), 1 (ALLOW), or
45
+ * 2 (DENY).
46
+ * By default, all policies are set to 0 (ABSTAIN), which means that the permission is not set.
47
+ * The owner of ipAccount by default has all permission.
48
+ * address(0) => wildcard
49
+ * bytes4(0) => wildcard
50
+ * Specific permission overrides wildcard permission.
51
+ * @param request The request object containing necessary data to set permissions.
52
+ * @param request.ipAsset The address of the IP account that grants the permission for `signer`
53
+ * @param request.signer The address that can call `to` on behalf of the `ipAccount`
54
+ * @param request.to The address that can be called by the `signer` (currently only modules can be `to`)
55
+ * @param request.func Optional. The function selector string of `to` that can be called by the `signer` on behalf of the `ipAccount`. Be default, it allows all functions.
56
+ * @param request.permission The new permission level
57
+ * @returns A Promise that resolves to an object containing the transaction hash
58
+ * @emits PermissionSet (ipAccountOwner, ipAccount, signer, to, func, permission)
59
+ */
28
60
  readonly name: "AccessController__CallerIsNotIPAccount";
29
61
  readonly type: "error";
30
62
  } | {
@@ -63,61 +95,29 @@ export declare class PermissionClient {
63
95
  readonly inputs: readonly [];
64
96
  readonly name: "AccessController__PermissionIsNotValid";
65
97
  readonly type: "error";
66
- } | {
67
- readonly inputs: readonly [{
68
- readonly internalType: "address";
69
- readonly name: "to";
70
- readonly type: "address";
71
- }];
72
- readonly name: "AccessController__RecipientIsNotRegisteredModule";
73
- readonly type: "error";
74
98
  } | {
75
99
  readonly inputs: readonly [];
76
100
  readonly name: "AccessController__SignerIsZeroAddress";
77
101
  readonly type: "error";
78
102
  } | {
79
103
  readonly inputs: readonly [];
80
- readonly name: "AncestorsVaultLAP__AlreadyClaimed";
81
- readonly type: "error";
82
- } | {
83
- readonly inputs: readonly [];
84
- readonly name: "AncestorsVaultLAP__ClaimerNotAnAncestor";
85
- readonly type: "error";
86
- } | {
87
- readonly inputs: readonly [];
88
- readonly name: "AncestorsVaultLAP__ERC20BalanceNotZero";
89
- readonly type: "error";
90
- } | {
91
- readonly inputs: readonly [];
92
- readonly name: "AncestorsVaultLAP__ETHBalanceNotZero";
93
- readonly type: "error";
94
- } | {
95
- readonly inputs: readonly [];
96
- readonly name: "AncestorsVaultLAP__InvalidAncestorsHash";
97
- readonly type: "error";
98
- } | {
99
- readonly inputs: readonly [];
100
- readonly name: "AncestorsVaultLAP__InvalidClaimer";
101
- readonly type: "error";
102
- } | {
103
- readonly inputs: readonly [];
104
- readonly name: "AncestorsVaultLAP__TransferFailed";
104
+ readonly name: "ArbitrationPolicySP__NotDisputeModule";
105
105
  readonly type: "error";
106
106
  } | {
107
107
  readonly inputs: readonly [];
108
- readonly name: "AncestorsVaultLAP__ZeroRoyaltyPolicyLAP";
108
+ readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
109
109
  readonly type: "error";
110
110
  } | {
111
111
  readonly inputs: readonly [];
112
- readonly name: "ArbitrationPolicySP__NotDisputeModule";
112
+ readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
113
113
  readonly type: "error";
114
114
  } | {
115
115
  readonly inputs: readonly [];
116
- readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
116
+ readonly name: "BasePolicyFrameworkManager__CallerNotLicensingModule";
117
117
  readonly type: "error";
118
118
  } | {
119
119
  readonly inputs: readonly [];
120
- readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
120
+ readonly name: "CoreMetadataModule__MetadataAlreadyFrozen";
121
121
  readonly type: "error";
122
122
  } | {
123
123
  readonly inputs: readonly [];
@@ -147,10 +147,6 @@ export declare class PermissionClient {
147
147
  readonly inputs: readonly [];
148
148
  readonly name: "DisputeModule__NotWhitelistedDisputeTag";
149
149
  readonly type: "error";
150
- } | {
151
- readonly inputs: readonly [];
152
- readonly name: "DisputeModule__UnauthorizedAccess";
153
- readonly type: "error";
154
150
  } | {
155
151
  readonly inputs: readonly [];
156
152
  readonly name: "DisputeModule__ZeroArbitrationPolicy";
@@ -235,6 +231,18 @@ export declare class PermissionClient {
235
231
  readonly inputs: readonly [];
236
232
  readonly name: "IPAssetRegistry__InvalidMetadataProvider";
237
233
  readonly type: "error";
234
+ } | {
235
+ readonly inputs: readonly [{
236
+ readonly internalType: "address";
237
+ readonly name: "contractAddress";
238
+ readonly type: "address";
239
+ }, {
240
+ readonly internalType: "uint256";
241
+ readonly name: "tokenId";
242
+ readonly type: "uint256";
243
+ }];
244
+ readonly name: "IPAssetRegistry__InvalidToken";
245
+ readonly type: "error";
238
246
  } | {
239
247
  readonly inputs: readonly [];
240
248
  readonly name: "IPAssetRegistry__NotYetRegistered";
@@ -251,6 +259,22 @@ export declare class PermissionClient {
251
259
  readonly inputs: readonly [];
252
260
  readonly name: "IPAssetRegistry__Unauthorized";
253
261
  readonly type: "error";
262
+ } | {
263
+ readonly inputs: readonly [{
264
+ readonly internalType: "address";
265
+ readonly name: "contractAddress";
266
+ readonly type: "address";
267
+ }];
268
+ readonly name: "IPAssetRegistry__UnsupportedIERC721";
269
+ readonly type: "error";
270
+ } | {
271
+ readonly inputs: readonly [{
272
+ readonly internalType: "address";
273
+ readonly name: "contractAddress";
274
+ readonly type: "address";
275
+ }];
276
+ readonly name: "IPAssetRegistry__UnsupportedIERC721Metadata";
277
+ readonly type: "error";
254
278
  } | {
255
279
  readonly inputs: readonly [];
256
280
  readonly name: "IPResolver_InvalidIP";
@@ -259,6 +283,30 @@ export declare class PermissionClient {
259
283
  readonly inputs: readonly [];
260
284
  readonly name: "IPResolver_Unauthorized";
261
285
  readonly type: "error";
286
+ } | {
287
+ readonly inputs: readonly [];
288
+ readonly name: "IpRoyaltyVault__AlreadyClaimed";
289
+ readonly type: "error";
290
+ } | {
291
+ readonly inputs: readonly [];
292
+ readonly name: "IpRoyaltyVault__ClaimerNotAnAncestor";
293
+ readonly type: "error";
294
+ } | {
295
+ readonly inputs: readonly [];
296
+ readonly name: "IpRoyaltyVault__NotRoyaltyPolicyLAP";
297
+ readonly type: "error";
298
+ } | {
299
+ readonly inputs: readonly [];
300
+ readonly name: "IpRoyaltyVault__SnapshotIntervalTooShort";
301
+ readonly type: "error";
302
+ } | {
303
+ readonly inputs: readonly [];
304
+ readonly name: "IpRoyaltyVault__ZeroIpId";
305
+ readonly type: "error";
306
+ } | {
307
+ readonly inputs: readonly [];
308
+ readonly name: "IpRoyaltyVault__ZeroRoyaltyPolicyLAP";
309
+ readonly type: "error";
262
310
  } | {
263
311
  readonly inputs: readonly [];
264
312
  readonly name: "LicenseRegistry__CallerNotLicensingModule";
@@ -279,10 +327,6 @@ export declare class PermissionClient {
279
327
  readonly inputs: readonly [];
280
328
  readonly name: "LicenseRegistry__ZeroLicensingModule";
281
329
  readonly type: "error";
282
- } | {
283
- readonly inputs: readonly [];
284
- readonly name: "LicensingModuleAware__CallerNotLicensingModule";
285
- readonly type: "error";
286
330
  } | {
287
331
  readonly inputs: readonly [];
288
332
  readonly name: "LicensingModule__CallerNotLicenseRegistry";
@@ -343,6 +387,10 @@ export declare class PermissionClient {
343
387
  readonly inputs: readonly [];
344
388
  readonly name: "LicensingModule__InvalidPolicyFramework";
345
389
  readonly type: "error";
390
+ } | {
391
+ readonly inputs: readonly [];
392
+ readonly name: "LicensingModule__IpAlreadyLinked";
393
+ readonly type: "error";
346
394
  } | {
347
395
  readonly inputs: readonly [];
348
396
  readonly name: "LicensingModule__LicensorDoesntHaveThisPolicy";
@@ -359,6 +407,10 @@ export declare class PermissionClient {
359
407
  readonly inputs: readonly [];
360
408
  readonly name: "LicensingModule__LinkingRevokedLicense";
361
409
  readonly type: "error";
410
+ } | {
411
+ readonly inputs: readonly [];
412
+ readonly name: "LicensingModule__MintAmountZero";
413
+ readonly type: "error";
362
414
  } | {
363
415
  readonly inputs: readonly [];
364
416
  readonly name: "LicensingModule__MintLicenseParamFailed";
@@ -395,6 +447,10 @@ export declare class PermissionClient {
395
447
  readonly inputs: readonly [];
396
448
  readonly name: "LicensingModule__PolicyNotFound";
397
449
  readonly type: "error";
450
+ } | {
451
+ readonly inputs: readonly [];
452
+ readonly name: "LicensingModule__ReceiverZeroAddress";
453
+ readonly type: "error";
398
454
  } | {
399
455
  readonly inputs: readonly [];
400
456
  readonly name: "LicensingModule__RegisterPolicyFrameworkMismatch";
@@ -523,10 +579,6 @@ export declare class PermissionClient {
523
579
  readonly inputs: readonly [];
524
580
  readonly name: "PolicyFrameworkManager__GettingPolicyWrongFramework";
525
581
  readonly type: "error";
526
- } | {
527
- readonly inputs: readonly [];
528
- readonly name: "RegistrationModule__InvalidOwner";
529
- readonly type: "error";
530
582
  } | {
531
583
  readonly inputs: readonly [];
532
584
  readonly name: "RoyaltyModule__CanOnlyMintSelectedPolicy";
@@ -547,10 +599,6 @@ export declare class PermissionClient {
547
599
  readonly inputs: readonly [];
548
600
  readonly name: "RoyaltyModule__NotAllowedCaller";
549
601
  readonly type: "error";
550
- } | {
551
- readonly inputs: readonly [];
552
- readonly name: "RoyaltyModule__NotRegisteredIpId";
553
- readonly type: "error";
554
602
  } | {
555
603
  readonly inputs: readonly [];
556
604
  readonly name: "RoyaltyModule__NotWhitelistedRoyaltyPolicy";
@@ -587,30 +635,10 @@ export declare class PermissionClient {
587
635
  readonly inputs: readonly [];
588
636
  readonly name: "RoyaltyPolicyLAP__ImplementationAlreadySet";
589
637
  readonly type: "error";
590
- } | {
591
- readonly inputs: readonly [];
592
- readonly name: "RoyaltyPolicyLAP__InvalidAncestors";
593
- readonly type: "error";
594
- } | {
595
- readonly inputs: readonly [];
596
- readonly name: "RoyaltyPolicyLAP__InvalidAncestorsHash";
597
- readonly type: "error";
598
- } | {
599
- readonly inputs: readonly [];
600
- readonly name: "RoyaltyPolicyLAP__InvalidAncestorsLength";
601
- readonly type: "error";
602
- } | {
603
- readonly inputs: readonly [];
604
- readonly name: "RoyaltyPolicyLAP__InvalidAncestorsRoyalty";
605
- readonly type: "error";
606
638
  } | {
607
639
  readonly inputs: readonly [];
608
640
  readonly name: "RoyaltyPolicyLAP__InvalidParentRoyaltiesLength";
609
641
  readonly type: "error";
610
- } | {
611
- readonly inputs: readonly [];
612
- readonly name: "RoyaltyPolicyLAP__InvalidRoyaltyAmountLength";
613
- readonly type: "error";
614
642
  } | {
615
643
  readonly inputs: readonly [];
616
644
  readonly name: "RoyaltyPolicyLAP__LastPositionNotAbleToMintLicense";
@@ -625,15 +653,15 @@ export declare class PermissionClient {
625
653
  readonly type: "error";
626
654
  } | {
627
655
  readonly inputs: readonly [];
628
- readonly name: "RoyaltyPolicyLAP__TransferFailed";
656
+ readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
629
657
  readonly type: "error";
630
658
  } | {
631
659
  readonly inputs: readonly [];
632
- readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
660
+ readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
633
661
  readonly type: "error";
634
662
  } | {
635
663
  readonly inputs: readonly [];
636
- readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
664
+ readonly name: "RoyaltyPolicyLAP__ZeroIpRoyaltyVaultBeacon";
637
665
  readonly type: "error";
638
666
  } | {
639
667
  readonly inputs: readonly [];
@@ -710,6 +738,67 @@ export declare class PermissionClient {
710
738
  })[];
711
739
  accessControllerConfig: {
712
740
  abi: ({
741
+ readonly anonymous: false;
742
+ readonly inputs: readonly [{
743
+ readonly indexed: false;
744
+ readonly internalType: "address";
745
+ readonly name: "ipAccountOwner";
746
+ readonly type: "address";
747
+ }, {
748
+ readonly indexed: true;
749
+ readonly internalType: "address";
750
+ readonly name: "ipAccount";
751
+ readonly type: "address";
752
+ }, {
753
+ readonly indexed: true;
754
+ readonly internalType: "address";
755
+ readonly name: "signer";
756
+ readonly type: "address";
757
+ }, {
758
+ readonly indexed: true;
759
+ readonly internalType: "address";
760
+ readonly name: "to";
761
+ readonly type: "address";
762
+ }, {
763
+ readonly indexed: false;
764
+ readonly internalType: "bytes4";
765
+ readonly name: "func";
766
+ readonly type: "bytes4";
767
+ }, {
768
+ readonly indexed: false;
769
+ readonly internalType: "uint8";
770
+ readonly name: "permission";
771
+ readonly type: "uint8";
772
+ }];
773
+ readonly name: "PermissionSet";
774
+ readonly type: "event";
775
+ } | {
776
+ readonly inputs: readonly [{
777
+ readonly internalType: "address";
778
+ readonly name: "ipAccount";
779
+ readonly type: "address";
780
+ }, {
781
+ readonly internalType: "address";
782
+ readonly name: "signer";
783
+ readonly type: "address";
784
+ }, {
785
+ readonly internalType: "address";
786
+ readonly name: "to";
787
+ readonly type: "address";
788
+ }, {
789
+ readonly internalType: "bytes4";
790
+ readonly name: "func";
791
+ readonly type: "bytes4";
792
+ }, {
793
+ readonly internalType: "uint8";
794
+ readonly name: "permission";
795
+ readonly type: "uint8";
796
+ }];
797
+ readonly name: "setPermission";
798
+ readonly outputs: readonly [];
799
+ readonly stateMutability: "nonpayable";
800
+ readonly type: "function";
801
+ } | {
713
802
  readonly inputs: readonly [{
714
803
  readonly internalType: "address";
715
804
  readonly name: "caller";
@@ -730,7 +819,38 @@ export declare class PermissionClient {
730
819
  readonly name: "AccessControlled__ZeroAddress";
731
820
  readonly type: "error";
732
821
  } | {
733
- readonly inputs: readonly [];
822
+ readonly inputs: readonly [{
823
+ readonly internalType: "address";
824
+ readonly name: "signer";
825
+ readonly type: "address";
826
+ }, {
827
+ readonly internalType: "address";
828
+ readonly name: "to";
829
+ readonly type: "address";
830
+ }];
831
+ readonly name: "AccessController__BothCallerAndRecipientAreNotRegisteredModule";
832
+ readonly type: "error";
833
+ } | {
834
+ readonly inputs: readonly [];
835
+ /**
836
+ * Sets the permission for a specific function call
837
+ * Each policy is represented as a mapping from an IP account address to a signer address to a recipient
838
+ * address to a function selector to a permission level. The permission level can be 0 (ABSTAIN), 1 (ALLOW), or
839
+ * 2 (DENY).
840
+ * By default, all policies are set to 0 (ABSTAIN), which means that the permission is not set.
841
+ * The owner of ipAccount by default has all permission.
842
+ * address(0) => wildcard
843
+ * bytes4(0) => wildcard
844
+ * Specific permission overrides wildcard permission.
845
+ * @param request The request object containing necessary data to set permissions.
846
+ * @param request.ipAsset The address of the IP account that grants the permission for `signer`
847
+ * @param request.signer The address that can call `to` on behalf of the `ipAccount`
848
+ * @param request.to The address that can be called by the `signer` (currently only modules can be `to`)
849
+ * @param request.func Optional. The function selector string of `to` that can be called by the `signer` on behalf of the `ipAccount`. Be default, it allows all functions.
850
+ * @param request.permission The new permission level
851
+ * @returns A Promise that resolves to an object containing the transaction hash
852
+ * @emits PermissionSet (ipAccountOwner, ipAccount, signer, to, func, permission)
853
+ */
734
854
  readonly name: "AccessController__CallerIsNotIPAccount";
735
855
  readonly type: "error";
736
856
  } | {
@@ -769,61 +889,29 @@ export declare class PermissionClient {
769
889
  readonly inputs: readonly [];
770
890
  readonly name: "AccessController__PermissionIsNotValid";
771
891
  readonly type: "error";
772
- } | {
773
- readonly inputs: readonly [{
774
- readonly internalType: "address";
775
- readonly name: "to";
776
- readonly type: "address";
777
- }];
778
- readonly name: "AccessController__RecipientIsNotRegisteredModule";
779
- readonly type: "error";
780
892
  } | {
781
893
  readonly inputs: readonly [];
782
894
  readonly name: "AccessController__SignerIsZeroAddress";
783
895
  readonly type: "error";
784
896
  } | {
785
897
  readonly inputs: readonly [];
786
- readonly name: "AncestorsVaultLAP__AlreadyClaimed";
787
- readonly type: "error";
788
- } | {
789
- readonly inputs: readonly [];
790
- readonly name: "AncestorsVaultLAP__ClaimerNotAnAncestor";
791
- readonly type: "error";
792
- } | {
793
- readonly inputs: readonly [];
794
- readonly name: "AncestorsVaultLAP__ERC20BalanceNotZero";
795
- readonly type: "error";
796
- } | {
797
- readonly inputs: readonly [];
798
- readonly name: "AncestorsVaultLAP__ETHBalanceNotZero";
799
- readonly type: "error";
800
- } | {
801
- readonly inputs: readonly [];
802
- readonly name: "AncestorsVaultLAP__InvalidAncestorsHash";
803
- readonly type: "error";
804
- } | {
805
- readonly inputs: readonly [];
806
- readonly name: "AncestorsVaultLAP__InvalidClaimer";
807
- readonly type: "error";
808
- } | {
809
- readonly inputs: readonly [];
810
- readonly name: "AncestorsVaultLAP__TransferFailed";
898
+ readonly name: "ArbitrationPolicySP__NotDisputeModule";
811
899
  readonly type: "error";
812
900
  } | {
813
901
  readonly inputs: readonly [];
814
- readonly name: "AncestorsVaultLAP__ZeroRoyaltyPolicyLAP";
902
+ readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
815
903
  readonly type: "error";
816
904
  } | {
817
905
  readonly inputs: readonly [];
818
- readonly name: "ArbitrationPolicySP__NotDisputeModule";
906
+ readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
819
907
  readonly type: "error";
820
908
  } | {
821
909
  readonly inputs: readonly [];
822
- readonly name: "ArbitrationPolicySP__ZeroDisputeModule";
910
+ readonly name: "BasePolicyFrameworkManager__CallerNotLicensingModule";
823
911
  readonly type: "error";
824
912
  } | {
825
913
  readonly inputs: readonly [];
826
- readonly name: "ArbitrationPolicySP__ZeroPaymentToken";
914
+ readonly name: "CoreMetadataModule__MetadataAlreadyFrozen";
827
915
  readonly type: "error";
828
916
  } | {
829
917
  readonly inputs: readonly [];
@@ -853,10 +941,6 @@ export declare class PermissionClient {
853
941
  readonly inputs: readonly [];
854
942
  readonly name: "DisputeModule__NotWhitelistedDisputeTag";
855
943
  readonly type: "error";
856
- } | {
857
- readonly inputs: readonly [];
858
- readonly name: "DisputeModule__UnauthorizedAccess";
859
- readonly type: "error";
860
944
  } | {
861
945
  readonly inputs: readonly [];
862
946
  readonly name: "DisputeModule__ZeroArbitrationPolicy";
@@ -941,6 +1025,18 @@ export declare class PermissionClient {
941
1025
  readonly inputs: readonly [];
942
1026
  readonly name: "IPAssetRegistry__InvalidMetadataProvider";
943
1027
  readonly type: "error";
1028
+ } | {
1029
+ readonly inputs: readonly [{
1030
+ readonly internalType: "address";
1031
+ readonly name: "contractAddress";
1032
+ readonly type: "address";
1033
+ }, {
1034
+ readonly internalType: "uint256";
1035
+ readonly name: "tokenId";
1036
+ readonly type: "uint256";
1037
+ }];
1038
+ readonly name: "IPAssetRegistry__InvalidToken";
1039
+ readonly type: "error";
944
1040
  } | {
945
1041
  readonly inputs: readonly [];
946
1042
  readonly name: "IPAssetRegistry__NotYetRegistered";
@@ -957,6 +1053,22 @@ export declare class PermissionClient {
957
1053
  readonly inputs: readonly [];
958
1054
  readonly name: "IPAssetRegistry__Unauthorized";
959
1055
  readonly type: "error";
1056
+ } | {
1057
+ readonly inputs: readonly [{
1058
+ readonly internalType: "address";
1059
+ readonly name: "contractAddress";
1060
+ readonly type: "address";
1061
+ }];
1062
+ readonly name: "IPAssetRegistry__UnsupportedIERC721";
1063
+ readonly type: "error";
1064
+ } | {
1065
+ readonly inputs: readonly [{
1066
+ readonly internalType: "address";
1067
+ readonly name: "contractAddress";
1068
+ readonly type: "address";
1069
+ }];
1070
+ readonly name: "IPAssetRegistry__UnsupportedIERC721Metadata";
1071
+ readonly type: "error";
960
1072
  } | {
961
1073
  readonly inputs: readonly [];
962
1074
  readonly name: "IPResolver_InvalidIP";
@@ -965,6 +1077,30 @@ export declare class PermissionClient {
965
1077
  readonly inputs: readonly [];
966
1078
  readonly name: "IPResolver_Unauthorized";
967
1079
  readonly type: "error";
1080
+ } | {
1081
+ readonly inputs: readonly [];
1082
+ readonly name: "IpRoyaltyVault__AlreadyClaimed";
1083
+ readonly type: "error";
1084
+ } | {
1085
+ readonly inputs: readonly [];
1086
+ readonly name: "IpRoyaltyVault__ClaimerNotAnAncestor";
1087
+ readonly type: "error";
1088
+ } | {
1089
+ readonly inputs: readonly [];
1090
+ readonly name: "IpRoyaltyVault__NotRoyaltyPolicyLAP";
1091
+ readonly type: "error";
1092
+ } | {
1093
+ readonly inputs: readonly [];
1094
+ readonly name: "IpRoyaltyVault__SnapshotIntervalTooShort";
1095
+ readonly type: "error";
1096
+ } | {
1097
+ readonly inputs: readonly [];
1098
+ readonly name: "IpRoyaltyVault__ZeroIpId";
1099
+ readonly type: "error";
1100
+ } | {
1101
+ readonly inputs: readonly [];
1102
+ readonly name: "IpRoyaltyVault__ZeroRoyaltyPolicyLAP";
1103
+ readonly type: "error";
968
1104
  } | {
969
1105
  readonly inputs: readonly [];
970
1106
  readonly name: "LicenseRegistry__CallerNotLicensingModule";
@@ -985,10 +1121,6 @@ export declare class PermissionClient {
985
1121
  readonly inputs: readonly [];
986
1122
  readonly name: "LicenseRegistry__ZeroLicensingModule";
987
1123
  readonly type: "error";
988
- } | {
989
- readonly inputs: readonly [];
990
- readonly name: "LicensingModuleAware__CallerNotLicensingModule";
991
- readonly type: "error";
992
1124
  } | {
993
1125
  readonly inputs: readonly [];
994
1126
  readonly name: "LicensingModule__CallerNotLicenseRegistry";
@@ -1049,6 +1181,10 @@ export declare class PermissionClient {
1049
1181
  readonly inputs: readonly [];
1050
1182
  readonly name: "LicensingModule__InvalidPolicyFramework";
1051
1183
  readonly type: "error";
1184
+ } | {
1185
+ readonly inputs: readonly [];
1186
+ readonly name: "LicensingModule__IpAlreadyLinked";
1187
+ readonly type: "error";
1052
1188
  } | {
1053
1189
  readonly inputs: readonly [];
1054
1190
  readonly name: "LicensingModule__LicensorDoesntHaveThisPolicy";
@@ -1065,6 +1201,10 @@ export declare class PermissionClient {
1065
1201
  readonly inputs: readonly [];
1066
1202
  readonly name: "LicensingModule__LinkingRevokedLicense";
1067
1203
  readonly type: "error";
1204
+ } | {
1205
+ readonly inputs: readonly [];
1206
+ readonly name: "LicensingModule__MintAmountZero";
1207
+ readonly type: "error";
1068
1208
  } | {
1069
1209
  readonly inputs: readonly [];
1070
1210
  readonly name: "LicensingModule__MintLicenseParamFailed";
@@ -1101,6 +1241,10 @@ export declare class PermissionClient {
1101
1241
  readonly inputs: readonly [];
1102
1242
  readonly name: "LicensingModule__PolicyNotFound";
1103
1243
  readonly type: "error";
1244
+ } | {
1245
+ readonly inputs: readonly [];
1246
+ readonly name: "LicensingModule__ReceiverZeroAddress";
1247
+ readonly type: "error";
1104
1248
  } | {
1105
1249
  readonly inputs: readonly [];
1106
1250
  readonly name: "LicensingModule__RegisterPolicyFrameworkMismatch";
@@ -1229,10 +1373,6 @@ export declare class PermissionClient {
1229
1373
  readonly inputs: readonly [];
1230
1374
  readonly name: "PolicyFrameworkManager__GettingPolicyWrongFramework";
1231
1375
  readonly type: "error";
1232
- } | {
1233
- readonly inputs: readonly [];
1234
- readonly name: "RegistrationModule__InvalidOwner";
1235
- readonly type: "error";
1236
1376
  } | {
1237
1377
  readonly inputs: readonly [];
1238
1378
  readonly name: "RoyaltyModule__CanOnlyMintSelectedPolicy";
@@ -1253,10 +1393,6 @@ export declare class PermissionClient {
1253
1393
  readonly inputs: readonly [];
1254
1394
  readonly name: "RoyaltyModule__NotAllowedCaller";
1255
1395
  readonly type: "error";
1256
- } | {
1257
- readonly inputs: readonly [];
1258
- readonly name: "RoyaltyModule__NotRegisteredIpId";
1259
- readonly type: "error";
1260
1396
  } | {
1261
1397
  readonly inputs: readonly [];
1262
1398
  readonly name: "RoyaltyModule__NotWhitelistedRoyaltyPolicy";
@@ -1293,30 +1429,10 @@ export declare class PermissionClient {
1293
1429
  readonly inputs: readonly [];
1294
1430
  readonly name: "RoyaltyPolicyLAP__ImplementationAlreadySet";
1295
1431
  readonly type: "error";
1296
- } | {
1297
- readonly inputs: readonly [];
1298
- readonly name: "RoyaltyPolicyLAP__InvalidAncestors";
1299
- readonly type: "error";
1300
- } | {
1301
- readonly inputs: readonly [];
1302
- readonly name: "RoyaltyPolicyLAP__InvalidAncestorsHash";
1303
- readonly type: "error";
1304
- } | {
1305
- readonly inputs: readonly [];
1306
- readonly name: "RoyaltyPolicyLAP__InvalidAncestorsLength";
1307
- readonly type: "error";
1308
- } | {
1309
- readonly inputs: readonly [];
1310
- readonly name: "RoyaltyPolicyLAP__InvalidAncestorsRoyalty";
1311
- readonly type: "error";
1312
1432
  } | {
1313
1433
  readonly inputs: readonly [];
1314
1434
  readonly name: "RoyaltyPolicyLAP__InvalidParentRoyaltiesLength";
1315
1435
  readonly type: "error";
1316
- } | {
1317
- readonly inputs: readonly [];
1318
- readonly name: "RoyaltyPolicyLAP__InvalidRoyaltyAmountLength";
1319
- readonly type: "error";
1320
1436
  } | {
1321
1437
  readonly inputs: readonly [];
1322
1438
  readonly name: "RoyaltyPolicyLAP__LastPositionNotAbleToMintLicense";
@@ -1331,15 +1447,15 @@ export declare class PermissionClient {
1331
1447
  readonly type: "error";
1332
1448
  } | {
1333
1449
  readonly inputs: readonly [];
1334
- readonly name: "RoyaltyPolicyLAP__TransferFailed";
1450
+ readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
1335
1451
  readonly type: "error";
1336
1452
  } | {
1337
1453
  readonly inputs: readonly [];
1338
- readonly name: "RoyaltyPolicyLAP__UnlinkableToParents";
1454
+ readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
1339
1455
  readonly type: "error";
1340
1456
  } | {
1341
1457
  readonly inputs: readonly [];
1342
- readonly name: "RoyaltyPolicyLAP__ZeroAncestorsVaultImpl";
1458
+ readonly name: "RoyaltyPolicyLAP__ZeroIpRoyaltyVaultBeacon";
1343
1459
  readonly type: "error";
1344
1460
  } | {
1345
1461
  readonly inputs: readonly [];
@@ -1357,71 +1473,10 @@ export declare class PermissionClient {
1357
1473
  readonly inputs: readonly [];
1358
1474
  readonly name: "RoyaltyPolicyLAP__ZeroRoyaltyModule";
1359
1475
  readonly type: "error";
1360
- } | {
1361
- readonly anonymous: false;
1362
- readonly inputs: readonly [{
1363
- readonly indexed: false;
1364
- readonly internalType: "address";
1365
- readonly name: "ipAccountOwner";
1366
- readonly type: "address";
1367
- }, {
1368
- readonly indexed: true;
1369
- readonly internalType: "address";
1370
- readonly name: "ipAccount";
1371
- readonly type: "address";
1372
- }, {
1373
- readonly indexed: true;
1374
- readonly internalType: "address";
1375
- readonly name: "signer";
1376
- readonly type: "address";
1377
- }, {
1378
- readonly indexed: true;
1379
- readonly internalType: "address";
1380
- readonly name: "to";
1381
- readonly type: "address";
1382
- }, {
1383
- readonly indexed: false;
1384
- readonly internalType: "bytes4";
1385
- readonly name: "func";
1386
- readonly type: "bytes4";
1387
- }, {
1388
- readonly indexed: false;
1389
- readonly internalType: "uint8";
1390
- readonly name: "permission";
1391
- readonly type: "uint8";
1392
- }];
1393
- readonly name: "PermissionSet";
1394
- readonly type: "event";
1395
- } | {
1396
- readonly inputs: readonly [{
1397
- readonly internalType: "address";
1398
- readonly name: "ipAccount";
1399
- readonly type: "address";
1400
- }, {
1401
- readonly internalType: "address";
1402
- readonly name: "signer";
1403
- readonly type: "address";
1404
- }, {
1405
- readonly internalType: "address";
1406
- readonly name: "to";
1407
- readonly type: "address";
1408
- }, {
1409
- readonly internalType: "bytes4";
1410
- readonly name: "func";
1411
- readonly type: "bytes4";
1412
- }, {
1413
- readonly internalType: "uint8";
1414
- readonly name: "permission";
1415
- readonly type: "uint8";
1416
- }];
1417
- readonly name: "setPermission";
1418
- readonly outputs: readonly [];
1419
- readonly stateMutability: "nonpayable";
1420
- readonly type: "function";
1421
1476
  })[];
1422
1477
  address: `0x${string}`;
1423
1478
  };
1424
- constructor(rpcClient: PublicClient, wallet: WalletClient);
1479
+ constructor(rpcClient: PublicClient, wallet: WalletClient, chainId: SupportedChainIds);
1425
1480
  /**
1426
1481
  * Sets the permission for a specific function call
1427
1482
  * Each policy is represented as a mapping from an IP account address to a signer address to a recipient