generated from Uniswap/foundry-template
-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #3 from Uniswap/feat/add-rest
Feat/add rest
- Loading branch information
Showing
884 changed files
with
78,777 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
#!/bin/bash | ||
|
||
forge clean; | ||
repos=$(ls src/pkgs/); | ||
for repo in $repos | ||
do | ||
echo "Starting build of $repo"; | ||
FOUNDRY_PROFILE=$repo forge build; | ||
done |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,247 @@ | ||
// SPDX-License-Identifier: MIT | ||
// OpenZeppelin Contracts (last updated v4.7.0) (access/AccessControl.sol) | ||
|
||
pragma solidity ^0.8.0; | ||
|
||
import "./IAccessControl.sol"; | ||
import "../utils/Context.sol"; | ||
import "../utils/Strings.sol"; | ||
import "../utils/introspection/ERC165.sol"; | ||
|
||
/** | ||
* @dev Contract module that allows children to implement role-based access | ||
* control mechanisms. This is a lightweight version that doesn't allow enumerating role | ||
* members except through off-chain means by accessing the contract event logs. Some | ||
* applications may benefit from on-chain enumerability, for those cases see | ||
* {AccessControlEnumerable}. | ||
* | ||
* Roles are referred to by their `bytes32` identifier. These should be exposed | ||
* in the external API and be unique. The best way to achieve this is by | ||
* using `public constant` hash digests: | ||
* | ||
* ``` | ||
* bytes32 public constant MY_ROLE = keccak256("MY_ROLE"); | ||
* ``` | ||
* | ||
* Roles can be used to represent a set of permissions. To restrict access to a | ||
* function call, use {hasRole}: | ||
* | ||
* ``` | ||
* function foo() public { | ||
* require(hasRole(MY_ROLE, msg.sender)); | ||
* ... | ||
* } | ||
* ``` | ||
* | ||
* Roles can be granted and revoked dynamically via the {grantRole} and | ||
* {revokeRole} functions. Each role has an associated admin role, and only | ||
* accounts that have a role's admin role can call {grantRole} and {revokeRole}. | ||
* | ||
* By default, the admin role for all roles is `DEFAULT_ADMIN_ROLE`, which means | ||
* that only accounts with this role will be able to grant or revoke other | ||
* roles. More complex role relationships can be created by using | ||
* {_setRoleAdmin}. | ||
* | ||
* WARNING: The `DEFAULT_ADMIN_ROLE` is also its own admin: it has permission to | ||
* grant and revoke this role. Extra precautions should be taken to secure | ||
* accounts that have been granted it. | ||
*/ | ||
abstract contract AccessControl is Context, IAccessControl, ERC165 { | ||
struct RoleData { | ||
mapping(address => bool) members; | ||
bytes32 adminRole; | ||
} | ||
|
||
mapping(bytes32 => RoleData) private _roles; | ||
|
||
bytes32 public constant DEFAULT_ADMIN_ROLE = 0x00; | ||
|
||
/** | ||
* @dev Modifier that checks that an account has a specific role. Reverts | ||
* with a standardized message including the required role. | ||
* | ||
* The format of the revert reason is given by the following regular expression: | ||
* | ||
* /^AccessControl: account (0x[0-9a-f]{40}) is missing role (0x[0-9a-f]{64})$/ | ||
* | ||
* _Available since v4.1._ | ||
*/ | ||
modifier onlyRole(bytes32 role) { | ||
_checkRole(role); | ||
_; | ||
} | ||
|
||
/** | ||
* @dev See {IERC165-supportsInterface}. | ||
*/ | ||
function supportsInterface(bytes4 interfaceId) public view virtual override returns (bool) { | ||
return interfaceId == type(IAccessControl).interfaceId || super.supportsInterface(interfaceId); | ||
} | ||
|
||
/** | ||
* @dev Returns `true` if `account` has been granted `role`. | ||
*/ | ||
function hasRole(bytes32 role, address account) public view virtual override returns (bool) { | ||
return _roles[role].members[account]; | ||
} | ||
|
||
/** | ||
* @dev Revert with a standard message if `_msgSender()` is missing `role`. | ||
* Overriding this function changes the behavior of the {onlyRole} modifier. | ||
* | ||
* Format of the revert message is described in {_checkRole}. | ||
* | ||
* _Available since v4.6._ | ||
*/ | ||
function _checkRole(bytes32 role) internal view virtual { | ||
_checkRole(role, _msgSender()); | ||
} | ||
|
||
/** | ||
* @dev Revert with a standard message if `account` is missing `role`. | ||
* | ||
* The format of the revert reason is given by the following regular expression: | ||
* | ||
* /^AccessControl: account (0x[0-9a-f]{40}) is missing role (0x[0-9a-f]{64})$/ | ||
*/ | ||
function _checkRole(bytes32 role, address account) internal view virtual { | ||
if (!hasRole(role, account)) { | ||
revert( | ||
string( | ||
abi.encodePacked( | ||
"AccessControl: account ", | ||
Strings.toHexString(account), | ||
" is missing role ", | ||
Strings.toHexString(uint256(role), 32) | ||
) | ||
) | ||
); | ||
} | ||
} | ||
|
||
/** | ||
* @dev Returns the admin role that controls `role`. See {grantRole} and | ||
* {revokeRole}. | ||
* | ||
* To change a role's admin, use {_setRoleAdmin}. | ||
*/ | ||
function getRoleAdmin(bytes32 role) public view virtual override returns (bytes32) { | ||
return _roles[role].adminRole; | ||
} | ||
|
||
/** | ||
* @dev Grants `role` to `account`. | ||
* | ||
* If `account` had not been already granted `role`, emits a {RoleGranted} | ||
* event. | ||
* | ||
* Requirements: | ||
* | ||
* - the caller must have ``role``'s admin role. | ||
* | ||
* May emit a {RoleGranted} event. | ||
*/ | ||
function grantRole(bytes32 role, address account) public virtual override onlyRole(getRoleAdmin(role)) { | ||
_grantRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Revokes `role` from `account`. | ||
* | ||
* If `account` had been granted `role`, emits a {RoleRevoked} event. | ||
* | ||
* Requirements: | ||
* | ||
* - the caller must have ``role``'s admin role. | ||
* | ||
* May emit a {RoleRevoked} event. | ||
*/ | ||
function revokeRole(bytes32 role, address account) public virtual override onlyRole(getRoleAdmin(role)) { | ||
_revokeRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Revokes `role` from the calling account. | ||
* | ||
* Roles are often managed via {grantRole} and {revokeRole}: this function's | ||
* purpose is to provide a mechanism for accounts to lose their privileges | ||
* if they are compromised (such as when a trusted device is misplaced). | ||
* | ||
* If the calling account had been revoked `role`, emits a {RoleRevoked} | ||
* event. | ||
* | ||
* Requirements: | ||
* | ||
* - the caller must be `account`. | ||
* | ||
* May emit a {RoleRevoked} event. | ||
*/ | ||
function renounceRole(bytes32 role, address account) public virtual override { | ||
require(account == _msgSender(), "AccessControl: can only renounce roles for self"); | ||
|
||
_revokeRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Grants `role` to `account`. | ||
* | ||
* If `account` had not been already granted `role`, emits a {RoleGranted} | ||
* event. Note that unlike {grantRole}, this function doesn't perform any | ||
* checks on the calling account. | ||
* | ||
* May emit a {RoleGranted} event. | ||
* | ||
* [WARNING] | ||
* ==== | ||
* This function should only be called from the constructor when setting | ||
* up the initial roles for the system. | ||
* | ||
* Using this function in any other way is effectively circumventing the admin | ||
* system imposed by {AccessControl}. | ||
* ==== | ||
* | ||
* NOTE: This function is deprecated in favor of {_grantRole}. | ||
*/ | ||
function _setupRole(bytes32 role, address account) internal virtual { | ||
_grantRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Sets `adminRole` as ``role``'s admin role. | ||
* | ||
* Emits a {RoleAdminChanged} event. | ||
*/ | ||
function _setRoleAdmin(bytes32 role, bytes32 adminRole) internal virtual { | ||
bytes32 previousAdminRole = getRoleAdmin(role); | ||
_roles[role].adminRole = adminRole; | ||
emit RoleAdminChanged(role, previousAdminRole, adminRole); | ||
} | ||
|
||
/** | ||
* @dev Grants `role` to `account`. | ||
* | ||
* Internal function without access restriction. | ||
* | ||
* May emit a {RoleGranted} event. | ||
*/ | ||
function _grantRole(bytes32 role, address account) internal virtual { | ||
if (!hasRole(role, account)) { | ||
_roles[role].members[account] = true; | ||
emit RoleGranted(role, account, _msgSender()); | ||
} | ||
} | ||
|
||
/** | ||
* @dev Revokes `role` from `account`. | ||
* | ||
* Internal function without access restriction. | ||
* | ||
* May emit a {RoleRevoked} event. | ||
*/ | ||
function _revokeRole(bytes32 role, address account) internal virtual { | ||
if (hasRole(role, account)) { | ||
_roles[role].members[account] = false; | ||
emit RoleRevoked(role, account, _msgSender()); | ||
} | ||
} | ||
} |
45 changes: 45 additions & 0 deletions
45
lib/oz-d3ff81b/contracts/access/AccessControlCrossChain.sol
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
// SPDX-License-Identifier: MIT | ||
// OpenZeppelin Contracts (last updated v4.6.0) (access/AccessControlCrossChain.sol) | ||
|
||
pragma solidity ^0.8.4; | ||
|
||
import "./AccessControl.sol"; | ||
import "../crosschain/CrossChainEnabled.sol"; | ||
|
||
/** | ||
* @dev An extension to {AccessControl} with support for cross-chain access management. | ||
* For each role, is extension implements an equivalent "aliased" role that is used for | ||
* restricting calls originating from other chains. | ||
* | ||
* For example, if a function `myFunction` is protected by `onlyRole(SOME_ROLE)`, and | ||
* if an address `x` has role `SOME_ROLE`, it would be able to call `myFunction` directly. | ||
* A wallet or contract at the same address on another chain would however not be able | ||
* to call this function. In order to do so, it would require to have the role | ||
* `_crossChainRoleAlias(SOME_ROLE)`. | ||
* | ||
* This aliasing is required to protect against multiple contracts living at the same | ||
* address on different chains but controlled by conflicting entities. | ||
* | ||
* _Available since v4.6._ | ||
*/ | ||
abstract contract AccessControlCrossChain is AccessControl, CrossChainEnabled { | ||
bytes32 public constant CROSSCHAIN_ALIAS = keccak256("CROSSCHAIN_ALIAS"); | ||
|
||
/** | ||
* @dev See {AccessControl-_checkRole}. | ||
*/ | ||
function _checkRole(bytes32 role) internal view virtual override { | ||
if (_isCrossChain()) { | ||
_checkRole(_crossChainRoleAlias(role), _crossChainSender()); | ||
} else { | ||
super._checkRole(role); | ||
} | ||
} | ||
|
||
/** | ||
* @dev Returns the aliased role corresponding to `role`. | ||
*/ | ||
function _crossChainRoleAlias(bytes32 role) internal pure virtual returns (bytes32) { | ||
return role ^ CROSSCHAIN_ALIAS; | ||
} | ||
} |
Oops, something went wrong.